Friday, May 31, 2019

Foods Containing High Fructose Corn Syrup Essay -- History, Pros Cons,

AbstractThis research paper will deal the story, frugals, and positive and negative aspects of foods which bind gamey fructose edible corn whisky sirup. It will cover the basic information in these aspects as well as many specifics. The major milestones in the history of high fructose corn syrup include its creation in 1957. Three different types of high fructose corn syrup will also be briefly comp atomic number 18d against one another high fructose corn syrup 1, high fructose corn syrup 2, and high fructose corn syrup 3. Pros and cons of high fructose corn syrup will then be discussed as well as economic issues. The fact that it is only unattached in liquid form is the main factor. Lastly, common foods containing high fructose corn syrup will be listed. These foods ar mainly sweet liquids such(prenominal) as juices, sports drinks, and sodas.As technology improves, new inventions all(prenominal)ow society to become lazier and pursue much pleasure. More and more appliance s are made for our convenience, and more and more maudlin ingredients are used in our foods to please our sense of taste. Fifty years ago, most of our food was sweetened with essential sugar, such as trounce sugar or brown sugar however, within the past few years, drastic technological and scientific improvement has coat the way for all types of artificial sweeteners to replace sugar and become omnipresent. Before 1957, high fructose corn syrup, now so prevalent in all of our food, did not even exist, because stack believed that there was no fructose in corn syrup.In 1957, researchers Marshall and Kooi made an amazing discovery. It was already a give fact that there really is no fructose in corn syrup instead, it contains glucose, a much blander sugar. What they discovered would change how mod... ...hemical sweeteners could replace even high fructose corn syrup, only when for now and the near future, it will be sticking around in all of our sweets.Works CitedA Brief taradid dle of the feed Refining Industry. 2007. The Corn Refiners Association. 24 July 2008. Ettlinger, Steve. Twinkie, Deconstructed. 375 Hudson Street, New York Penguin Group, Inc., 2007.High Fructose Corn Syrup. OU Kosher. 24 July 2008 Inglett, George E. Symposium Sweeteners. Westport, Connecticut The Avi Publishing Company, Inc., 1974. case Academy of Sciences (U.S.). Sweeteners Issues and Uncertainties. Washington, D.C. National Academy of Sciences, 1975.Thomas, Clive Y. Sugar little terror or Challenge? International Development Research Centre, 1985. Foods Containing High Fructose Corn Syrup Essay -- History, Pros Cons,AbstractThis research paper will discuss the history, economics, and positive and negative aspects of foods which contain high fructose corn syrup. It will cover the basic information in these aspects as well as some specifics. The major milestones in the history of high fructose corn syrup include its creation in 1957. Three different types of high fructose corn syrup will also be briefly compared against one another high fructose corn syrup 1, high fructose corn syrup 2, and high fructose corn syrup 3. Pros and cons of high fructose corn syrup will then be discussed as well as economic issues. The fact that it is only available in liquid form is the main factor. Lastly, common foods containing high fructose corn syrup will be listed. These foods are mainly sweet liquids such as juices, sports drinks, and sodas.As technology improves, new inventions allow society to become lazier and pursue more pleasure. More and more appliances are made for our convenience, and more and more artificial ingredients are used in our foods to please our sense of taste. Fifty years ago, most of our food was sweetened with natural sugar, such as cane sugar or brown sugar however, within the past few years, drastic technological and scientific improvement has paved the way for all types of artificial sweeteners to replace sugar and become omniprese nt. Before 1957, high fructose corn syrup, now so prevalent in all of our food, did not even exist, because people believed that there was no fructose in corn syrup.In 1957, researchers Marshall and Kooi made an amazing discovery. It was already a given fact that there truly is no fructose in corn syrup instead, it contains glucose, a much blander sugar. What they discovered would change how mod... ...hemical sweeteners could replace even high fructose corn syrup, but for now and the near future, it will be sticking around in all of our sweets.Works CitedA Brief History of the Corn Refining Industry. 2007. The Corn Refiners Association. 24 July 2008. Ettlinger, Steve. Twinkie, Deconstructed. 375 Hudson Street, New York Penguin Group, Inc., 2007.High Fructose Corn Syrup. OU Kosher. 24 July 2008 Inglett, George E. Symposium Sweeteners. Westport, Connecticut The Avi Publishing Company, Inc., 1974.National Academy of Sciences (U.S.). Sweeteners Issues and Uncertainties. Washington, D.C . National Academy of Sciences, 1975.Thomas, Clive Y. Sugar Threat or Challenge? International Development Research Centre, 1985.

Thursday, May 30, 2019

Three Important Symbols in The Glass Menagerie by Tennessee Williams Es

Three Important Symbols in The screwball Menagerie by Tennessee Williams In Tennessee Williams The Glass Menagerie, the teller is used to propound elements of Williams own life as a victim of the Depression in the 1930s. Williams does this through his eloquent use of symbolism. Three symbols seem to reveal Williams intent especially accurately the unicorn, the picture of Mr. Wingfield, and Malvolios coffin trick. The unicorn is a symbolic representation of ways that Laura is unique or preposterous. The first facet of the unicorn, its horn, refers to ways that Laura is an unusual person, such as in her may escape mechanisms. Lauras escape devices include her glass menagerie, list... ...ness in the Plays of Tennessee Williams. Bowling Green Bowling Green State University, 1997. Presley, Delma. The Glass Menagerie An American Memory. Boston Twayne, 1990. http//www.olemiss.edu/depts/english/ms-writers/dir/williams_tennessee Williams, Tennessee. The Glass Menagerie. New York Random House, 1985.

Wednesday, May 29, 2019

battle of hastings recruiting :: essays research papers fc

October 14th of the year 1066 two armies faced each other near the town of Hastings. 10,000 Norman troops under the command of William of Normandy faced 8,000 Anglo-Saxon soldiers led by Harold the current king of England.Geoffrey Parker, Cambridge Illustrated History of Warfare (Cambridge 1995), pp. 82-3. Harolds 8,000 men consisted of Housecarls, the local Fyrd, and local colony volunteers.David Howarth, 1066 The Year of the oppression (New York 1977),pp.170-1 The two armies clashed on that day and history tells us the outcome. But what forces go into creating an army of these sizes? The three main Anglo-Saxon troop types lead be defined and the forces that created them will be examined below. Three troop types would fight for the Anglo-Saxons the Housecarls, the Fyrd, and local peasantry. The Housecarls were professional soldiers under the service of the King and the Earls of the Kingdom. Harold used the Housecarls of the King and his Housecarls of his Earldom of Wessex. He al so used the Housecarls of his two brothers. The Fyrd was a volunteer citizen army countenanced by the Thanes of the kingdom. The local peasants fought to protect their homes.David Howarth, 1066 The Year of the Conquest (New York 1977), pp. 80-1. There were two divisions of fyrd in the eleventh century one consisting of a local peasant force and the other a select levy force.C. Warren Hollister, Anglo-Saxon Military Institutions On the even of the Norman Conquest (Oxford 1962), p. 26.The local peasant Fyrd that fought at Hastings came from Sussex.C. Warren Hollister, Anglo-Saxon Military Institutions On the Eve of the Norman Conquest (Oxford 1962), p.30. All freemen of the commonwealth were obligated to provide protection for the local area. This obligation was connected with financial and agricultural obligations.C. Warren Hollister, Anglo-Saxon Military Institutions On the Eve of the Norman Conquest (Oxford 1962), pp. 35-6. The peasant fighting force is a Germanic tradition in or igin. Based upon a freemans duty to defend the lands of the king, however the peasant force is a limited army. The king is required to pay the troops if needed for them to leave the area. The peasants have the right to return to there homes at the end of the day. However, they must provide their own equipment.C. Warren Hollister, Anglo-Saxon Military Institutions On the Eve of the Norman Conquest (Oxford 1962), pp. 27-8. The primary function of the peasant Fyrd was to provide defense against enemies attack from the sea, such(prenominal) as the events at Hastings.

Free Awakening Essays: Romanticism :: Chopin Awakening Essays

Romanticism in The Awakening     Even though it was written in the squared-toe era, Kate Chopins The Awakening has several romantic qualities, especially with the main character, as she struggles between societys obligations and her own desires. Chopin writes about a woman who continues to reject the society around her, a judgment too radical for Chopins peers. Edna Pontellier has the traditional role of both wife and mother, but deep down she wants something more, difficult to do in the restricted victorian society. The typical Victorian woman maintained her sphere which deemed womens personal lives center around home, husband, and children. (Victorian Women, p. 118). Women were supposed to happily accept this position in the home, and be satisfied. It never satisfied Edna, who always seemed out of place when with other women. She was a wife and a mother, but not the typical Victorian wife and mother. With regards to her children, Their absence was carriage of relief...It seemed to free her of a responsibility which she blindly assumed and for which Fate had not fitted her (p. 18). Already she is revealing ideas uncommon in the Victorian era. She tries to maintain her roles, but it is real difficult for her. As the story progresses, Edna focuses on her desires rather than what her husband wants. She refuses to participate in the traditional role given to her as a woman. The romantic notion of individualism comes out as Edna decides to go out on a Tuesday afternoon rather than receive visitors. When her husband finds out, he is extremely upset. I should think that youd guess by this time that people dont do such things weve got to observe les convenances if we ever expect to get on and keep up with the procession (p. 51). Edna disregards her husbands appeal to conform and continues to do what she wants. Victorian society was not ready for a novel whose main character disregards the norm for her own happiness. The rejection Chopin rece ived was mainly due to Ednas rejection of the traditions and the adultery picture of the novel. Edna, caught up in a recogniseless marriage, resorts to adultery to keep herself satisfied. Edna follows her heart rather than reason when she pursues Robert Lebrun. In revealing her love for Robert, her romantic passion is expressed. I love you, she whispered, only you no one but you.

Tuesday, May 28, 2019

One Tear That Meant the World :: essays research papers

I have always enjoyed having a best friend that was male. Whether we were swimming, jogging, fishing, or just talking for hours, I neer got bored. We balance one another. I will never forget the day I lost that all. The day my best friend left ended up touching me the most. When I stepped outside, the pavement felt like ice, yet the air had a warm breeze to it. It was a gorgeous August day. Not a single worry mingled in the air. The birds were chirping long, beautiful melodies. Melodies I had heard many mornings that summer. They sang when it was going to be a wondrous day. Nothing seemed wrong to anyone remove to me. Today, my birthday, August first, my best friend was leaving for the Navy. He was going to serve our country. For six dreadful years, Id have to live without him. The only talk would be a few cards and letters and one long distance call. This day reminded me of those long rainy days, the days where the clouds blocked out the suns happy rays of sunlight. The clock finally struck four and it frightened me because the sweet sound of the clock seemed loud and harsh. It sounded kind of like I was in a offense movie. I dreaded walking crossways the street to say good bye to my dear friend, further I knew I had to go. As I walked across the street it seemed like a mile. My legs ached and my throat was dry. I could hear the pattering of my feet on the pavement and the thud of my heart racing about ninety miles a minute. I just wanted to run up to him and beg him to stay, but I knew I couldnt do that. I finally walked up to him and started to cry. I cried as though I had lost someone close to me, but I hadnt. There was a part of me that was dying. My heart was aching and I couldnt halt it. I hugged him for five minutes, but it only seemed like seconds. My tears started to disappear. He let me know how much hed miss me and how he couldnt believe he was leaving. I could feel the tears starting to come again, but I kept them in. I knew there was som ething I wanted to say, but I couldnt.

One Tear That Meant the World :: essays research papers

I have always enjoyed having a best friend that was male. Whether we were swimming, jogging, fishing, or just talking for hours, I never got bored. We balance one another. I will never forget the day I lost that all. The day my best friend left ended up touching me the most. When I stepped outside, the pavement felt like ice, yet the air had a warm breeze to it. It was a gorgeous August day. Not a single worry mingled in the air. The birds were chirping long, beautiful melodies. Melodies I had heard many mornings that summer. They sang when it was going to be a wondrous day. Nothing seemed wrong to anyone merely to me. Today, my birthday, August first, my best friend was leaving for the Navy. He was going to serve our country. For six dreadful years, Id have to live without him. The only talk would be a few cards and letters and one long distance call. This day reminded me of those long rainy days, the days where the clouds blocked out the suns agleam rays of sunlight. The cloc k finally struck four and it frightened me because the sweet sound of the clock seemed loud and harsh. It sounded kind of like I was in a crime movie. I dreaded walking crossways the street to say good bye to my dear friend, but I knew I had to go. As I walked across the street it seemed like a mile. My legs ached and my throat was dry. I could hear the pattering of my feet on the pavement and the thud of my heart racing about ninety miles a minute. I just wanted to run up to him and beg him to stay, but I knew I couldnt do that. I finally walked up to him and started to cry. I cried as though I had lost someone close to me, but I hadnt. There was a part of me that was dying. My heart was aching and I couldnt checkout it. I hugged him for five minutes, but it only seemed like seconds. My tears started to disappear. He let me know how much hed miss me and how he couldnt believe he was leaving. I could feel the tears starting to come again, but I kept them in. I knew there was some thing I wanted to say, but I couldnt.

Monday, May 27, 2019

Fast food

profuse Food Currently, most of the people dep rest on troubled f ar which is easily accessible or else than cooking victuals at home which is a time consuming task. Fast forage is the most popular diet in the States. Does card-playing nutrition proves to be a profound option for a daily purpose? Is exuberant pabulum healthy? Being an argumentative topic this term prompt food comes up with legion(predicate) questions. Fast food is a quick way of pick up your stomach but it is fol disordereded by many another(prenominal) an(prenominal) unusual and known disadvantages. As a peek in the Consumers reports on quick food quartette big names lose from the book TheNorton Field render pass to Writing, the reporter mentions that Next time you have a craving for disruptive food, take twice before slowing down for Burger King, KFC, McDonalds, or wetback Bell. The profuse food restaurants the reporter menti hotshotd here(predicate), are the most famous and renowned pla ces, where the consumer is attracted to eradicate due to food and low prices. In my opinion on that point is still iodin reason why anyone should rely on fast food equalize of times and that is time saving. It saves time. But there are many former(a) reasons as surveyed by the reporters for people to be attracted towards fast food.One major reason is the low prices. As also mentioned in the research named Fast foods from the opaque book by Emanuel Goldman- Alfred L. Simon, that, McDonalds might not be ready with the worrys with its chicken. But, if we see as a whole the prices of McDonalds are very low which hides the circumstance that there have been many issues with the chicken it use. People are attracted to McDonalds even today for their meals. in that location are many problems caused due to the regular intake of fast foods. Some proficient problems are Obesity, weight get through, type two diabetes, coronary artery disease and PCOD.Obesity is one of the most common and erious problems found in Americans. This problem is a clear and direct issue of the lifestyle in America. The habit of substituting meals with the fast food gives a birth to obesity in an individual. In the ledger, Fast Food Unfriendly and Unhealthy from International Journal of Obesity, the author S Stender, J Dyerberg, and A Astrup has given the example of a documentary admit super-size me, where the reference Mr. Spurlock ate McDonalds food thrice a day for 30 days and gained 11 kg.This film raises a question that whether fast food poses a fussy health risk. This is a very mportant question to be answered for all the fast food lovers. The separate problems equal PCOD and diabetes are a result of fats food intake. The Polycystic ovarian disease found in most of the women these days is caused due to the weight gain. This weight gain is a result of our food habits, like consumption of fast food on a regular basis. Another reason for the increased craving for fast food amo ng the kids is the fast food ads which are made diagrammatically innovative so as to attract the kids.The recent study shown by The Washington bet on in their program, Trying to Cut Back on Fast Food Ads for kids mentioned that the obesity in kids of age group 6-11 has gone down because some fast food chains have cut down in their advertising. This statement shows that the advertisements and obesity in kids are directly proportional to each other. This is a strategic advertisement plan for the fast food agencies to make profit. They frame more on advertisements targeting the kids as their main audience and are women.Young women are facing many problems due to the intake of fast foods. In a Journal Dieting Behaviors of Young Women Post-College Graduation, the uthors Soliah, LuAnn Walter, Janele Antosh and Deeanna, had conducted a survey that included questions about the feeding habits of women and their mental affinity for food. The conclusion of the survey was not shocking but very obvious that three groups of women appeared to be at an increased risk of unhealthy eating and poor food selection decisions.The unhealthy food here is the fast food. Fast food is the most careing food worldwide. There are many reasons one cannot avoid the fast food. Good taste is one of the biggest reasons. Low prices are another reason which attracts the consumer. Fast food has become the regular meal of people. Whenever I visit any food chain I can see a bunch of people spending their valuable money on something which could be harmful for their health. The conclusion, henceforth, is very clear that fast food is not healthy in any terms.Fast food consumed results in many problems which are ignore by the fast food consumers. America faces most of the consequences of eating fast food on a regular basis. Some problems are very serious like obesity and diabetes which are a direct result of fast food consumption. It is still not late for the people to put a escaped on the arti cles and surveys conducted n the fast food being a disaster and learn a lesson through their results. Fast food industries should be responsible generous to advertise less or make their food healthy instead of cheesy and greasy.An individual should keep a track on their diet decisions ration them with their daily intake fast food and other diet. The equivalence would be very useful for an individual to realize how to make their health and wealth lives yearlong and strong.Fast FoododBradd DentFast Food Nation Questions Introduction Americas fast food industry was founded by self made man who took risk, worked hard, some not even going to collage. Today the industry relies on a low-paid and unskilled workforce, where a handful are able to rise up the corporate ladder, while the vast majority lack fulltime employment, receive no benefits, and end up quitting after a few months.The fast food industry prospered over the last 30 years because minimum wage was lowered, stigma was direc ted at children, federal agencies meant to protect workers and consumers ended up working for the companies, and corporations worked with congress to oppose laws that didnt help them. The American world view is embody in fast food because it takes advantage of those who dont know any better. Chapter 1 The element of car based restaurants like the ones started in southerly California encouraged the unfold of fast food because they had good food, became successful, and were very popular among young people.Chapter 2 Disney and Kroc were similar because they both used science to sell their products, made up famous mascots to sell products and both focused selling to kids. They were different because Disney founded his company, and Kroc bought his, they sold different products, and Kroc wasnt involved in politics, while Disney was. Their companies cooperated when McDonalds agreed to sell Disney toys and Disney agreed to allow McDonalds in Disney orbit. The fast food industry started wi th billboard ads to attract kids and evolved to adverting every where, from TV, to the internet, to school hallways.They also make the restaurants themselves fun for kids with play places and selling toys so they want to go more, and even as adults bring their own kids. Personally, I dont think it is respectable to advertise in schools because it fast food is unhealthy and kids should be learning that, not that the burgers at McDonalds get and A in taste. Chapter 3 well-nigh employees of fast food restaurants ate teenagers because most are willing to work long hours with little pay.Fast food corporations relentlessly stop their workers from unionizing by doing things like integrating workers with information about a possible union with lie detectors, or closing locations with unions and opening new locations near by. Working conditions at fast food restaurants are unsafe. Typical dangers the employees face ate slips, fall, cuts, burns, and robberies. Problems are dealt with by inc reasing security with cameras or more parking lot lights. If I worked at a fast food restaurant and I injured my self, I might not tell my manager because I could loose my strain because they could goddam me for the injury.Chapter 4 The advantages of starting your own occupancy is if it is successful, you could get a lot of money, not to mention you are your own boss so no one besides the government tells you how to run your business. The disadvantages are the business could be unsuccessful and you could loose a lot of money. The advantages of working for someone else are you do not have to make too many tough decisions. The disadvantages are you will not make as lots money as your boss, and you may not like your boss for whatever reason.Some legal issues that fast food franchises have been involved in are the Cobles Bill which makes franchises obey the principles other companies follow. The Subway fast food franchise was involved in the SBA which helps restaurants by giving them government funds. Subway got involved and made it so they would get unembellished money. Chapter 5 Family stirs are disappearing because industry farms take all the business and close family farms because they have no one to sell to. there are only a few small potato farms left because industries take up all the state of matter and business.The take-over of agricultural farms effects communities because local farms go out of business and communities become regardent on the corporate farm. Chapter 6 Development and fast food farms take land and effects cattle pastures because there is less land for the cattle to graze. Since most cowboys and ranchers have gone out of business, they have become irreverent in todays culture. The government set up the Sherman fair Act and a congressional investigation in the meet packing industry to help ranchers. Later, the Reagan administration allowed the top four meat packing firms to liquefy and they took over the cattle markets.Corporate do mination affected family farms by forcing them to work for them or go out of business. Self-reliance is still a viable stopping point for Americans, but has become very difficult because of big corporations. The fast food industry makes chicken farmers work for them or they would get no business. In farm culture, the land is a tangible connection to the past, meant to be handed down and not sold. To native Americans, the land meant life and prosperity. In traditional Irish culture, the land is a link to past generations and to loose the land meant to fail your relatives.Their concept of land is similar to the American concept. Chapter 7 The demands of the fast food industry changed towns by making is so almost everyone ends up eating fast food because the industries are aloud to put their restaurants wherever they want and advertise as much as they want until the towns economy runs on the fast food restaurants. Chapter 8 Meatpacking is dangerous because of the machines and rarely c leaned cutting tools. Since a meat-packing business managers bonus is based in part on injury rate, many injuries go unreported and the worker is either given an easer job to takes time off to recover.Chapter 9 The meat packing and meat processing industry has been a spreader of disease because the animals are not screened well sufficient or sick workers spreading disease on the animals. After reading about the pathogens in hamburger meat, I am concerned about food poisoning in fast food. E. coli is not common in restaurant food, but is likely to be in hamburger meat. Chapter 10 Many Americans are obese because of lack of information and improper food laws. Fast food probably plays a big part in obesity because it provides unhealthy food to almost every where.Americans are probably more obese than other countries because fast food started here. Fast food companies increase the size of their meals to effect the kilogram calorie count look better for the per serving part. This effe cts American health because it is misguiding and you eat more than you thought you were going to. People in other countries do not want fast food because they have seen its effect on America. Epilogue The free market Schosser talks about leaves workers unprotected with little incumbrance from the government. In the quote, Schosser is referring to the free market.I agree to what Schlosser says on 216. I believe the government needs to work harder to protect both the workers and consumers of fast food. At the end of the Epilogue, the author remedies his criticisms with the fact that it is a persons choice to eat want. Afterword Mad Cow disease is a disease that slowly destroys the brain and can be spread through hamburger meat. It can be controlled by feeding cows grass instead of corn and hormones, and inspecting the meat better. Cattle get infected by it because they stand in the dung of an effected cattle. It is a very serous threat to humans.Fast foodFast Food Currently, most of the people depend on fast food which is easily accessible rather than cooking food at home which is a time consuming task. Fast food is the most popular food in America. Does fast food proves to be a healthy option for a daily purpose? Is fast food healthy? Being an argumentative topic this term fast food comes up with many questions. Fast food is a quick way of filling up your stomach but it is followed by many unknown and known disadvantages. As a peek in the Consumers reports on fast food four big names lose from the book TheNorton Field Guide to Writing, the reporter mentions that Next time you have a craving for fast food, think twice before slowing down for Burger King, KFC, McDonalds, or Taco Bell. The fast food restaurants the reporter mentioned here, are the most famous and renowned places, where the consumer is attracted to eat due to food and low prices. In my opinion there is only one reason why anyone should rely on fast food couple of times and that is time saving. It saves time. But there are many other reasons as surveyed by the reporters for people to be attracted towards fast food.One major reason is the low prices. As also mentioned in the research named Fast foods from the Black book by Emanuel Goldman- Alfred L. Simon, that, McDonalds might not be ready with the problems with its chicken. But, if we see as a whole the prices of McDonalds are very low which hides the fact that there have been many issues with the chicken it use. People are attracted to McDonalds even today for their meals. There are many problems caused due to the regular intake of fast foods. Some serious problems are Obesity, weight gain, type two diabetes, coronary artery disease and PCOD.Obesity is one of the most common and erious problems found in Americans. This problem is a clear and direct result of the lifestyle in America. The habit of substituting meals with the fast food gives a birth to obesity in an individual. In the Journal, Fast Food Unfriendly and Unheal thy from International Journal of Obesity, the author S Stender, J Dyerberg, and A Astrup has given the example of a documentary film super-size me, where the character Mr. Spurlock ate McDonalds food thrice a day for 30 days and gained 11 kg.This film raises a question that whether fast food poses a special health risk. This is a very mportant question to be answered for all the fast food lovers. The other problems like PCOD and diabetes are a result of fats food intake. The Polycystic ovarian disease found in most of the women these days is caused due to the weight gain. This weight gain is a result of our food habits, like consumption of fast food on a regular basis. Another reason for the increased craving for fast food among the kids is the fast food ads which are made graphically innovative so as to attract the kids.The recent study shown by The Washington Post in their program, Trying to Cut Back on Fast Food Ads for kids mentioned that the obesity in kids of age group 6-11 h as gone down because some fast food chains have cut down in their advertising. This statement shows that the advertisements and obesity in kids are directly proportional to each other. This is a strategic advertisement plan for the fast food agencies to make profit. They invest more on advertisements targeting the kids as their main audience and are women.Young women are facing many problems due to the intake of fast foods. In a Journal Dieting Behaviors of Young Women Post-College Graduation, the uthors Soliah, LuAnn Walter, Janele Antosh and Deeanna, had conducted a survey that included questions about the eating habits of women and their psychological affinity for food. The conclusion of the survey was not shocking but very obvious that three groups of women appeared to be at an increased risk of unhealthy eating and poor food selection decisions.The unhealthy food here is the fast food. Fast food is the most selling food worldwide. There are many reasons one cannot avoid the fas t food. Good taste is one of the biggest reasons. Low prices are another reason which attracts the consumer. Fast food has become the regular meal of people. Whenever I visit any food chain I can see a bunch of people spending their valuable money on something which could be harmful for their health. The conclusion, henceforth, is very clear that fast food is not healthy in any terms.Fast food consumed results in many problems which are ignored by the fast food consumers. America faces most of the consequences of eating fast food on a regular basis. Some problems are very serious like obesity and diabetes which are a direct result of fast food consumption. It is still not late for the people to put a light on the articles and surveys conducted n the fast food being a disaster and learn a lesson through their results. Fast food industries should be responsible enough to advertise less or make their food healthy instead of cheesy and greasy.An individual should keep a track on their d iet decisions rationing them with their daily intake fast food and other diet. The comparison would be very useful for an individual to realize how to make their health and wealth lives longer and strong.

Sunday, May 26, 2019

“In the Heat of the Night”; Movie or Book? Essay

In The Heat of the Night is a gripping murder mystery story that incorporates a major issue of the time it was indite at racism. The original novel (published in 1965), written by John Ball, is a story of Virgil Tibbs, a Negro homicide investigator. The death of orchestra-conductor Enrico Mantoli and a series of some other events lead up to him in charge of a murder investigation in Wells, Carolina. This is much to the dismay of Bill Gillespie, the extremely prepossess police chief. The painting version (released in 1967), also features Mr. Tibbs as the leader of a murder investigation. However, the setting is Sparta, Mississippi, and the victim is Philip Colbert, a man planning to build a mill in the town. The movie was very successful, and proceeded to win 5 Academy Awards. Despite this, I find the record is to a greater extent(prenominal) appealing because the characters are easier to relate to, and beat a chance to get well-rounded in a gradual sense.In addition, the plot development steadily makes progress, and is overall less tense, therefore more enjoyable. Both movie and book, however, are quite impressive in the incorporation of racial equality issues, and should equally be recognized as landmarks in American media for this reason. The most prominent change in characters is the personality of Virgil Tibbs. Instead of being stretched out on the bench, he was wide awake and sitting up dead on target as though he were expecting something to happen. His coat was off and laid neatly beside him. He had been reading a paperback book up to the moment surface-to-air missile entered (Pg. 15) This is almost identical to the scene where we are introduced to Virgil in the movie. However, the quick-thinking, cold and intense version to be seen later on in the movie was very surprising.The humble, sharp and cool homicide investigator from the novel is much preferred. His collected manners also make it all the more enjoyable when seeing Gillespies frustratio n at the Negros wits, and all the more heart warming as Sam Wood and Virgil Tibbs start to open up to one another. Also, the movie slenderly exaggerated on Mr. Endicott as being a bad guy. From being somewhat a pest, however definitely not on anyones bad books, too being a plantation owner who sends a group of thugs to beat up Virgil is just ludicrous. It seems he is used as an justification to bring out another foe, another bit of action to make the movie more exciting. The subtle mystery of not knowing who is bad or good in the novel is a lot more satisfying, perhaps even more once you find out who the real murderer was.The movie, at a full running time of 109 minutes, has quite an exciting plot, with slow parts and exciting action parts. It incorporates more essential things to the original story of In the Heat of the Night, (such as the association with Delores Purdy) however it differs quite a bit as well. As mentioned above, the setting is in Sparta, Mississippi, where Phil ip Colbert, planning to build a factory in this town, is murdered. This change of plot on its own removes something that could be considered essential to the plot romance. The budding relationship between Duena, Enrico Mantolis daughter (who doesnt show up what so ever, seeing as Enrico Mantoli was not the victim) and Officer Sam Wood adds a bit of spice that is lacking in the movie. On the topic of Sam Wood, his character being a relatively minor one sets a rather different way of looking at his character.In the book, the reader gets a closer glimpse on Sam Woods life, and gets to enjoy his personality and forgiving character more so indeed the movie. As a result of this, when Sam Wood is suspected of murder, we feel all the more protest and frustration for Gillespie to even dream of this possibility. The movie makes us feel bad for Sam, as it is pretty obvious he is not guilty if Virgil says he is not, but this emotion is lacking compared to the feelings the book inflicts. Howeve r, I do prefer the ending of the movie to the book. Instead of the gallant statements of how Bill Gillespie respects Virgil Tibbs as a human, are rather out-there, (if not heart-warming, I have to approve) while the simple good-bye of the movie shows on its own how Gillespie has come to admire and respect Virgil.In the Heat of the Night, movie or book alike, is an inspiring tale of overcoming prejudice in the backward, racist town in the south- eastern United States. In both forms of media, we see from beginning to end the trials and prejudice thrown at Virgil Tibbs, solely because he is coloured. The inhuman way of dealing with racial hate is disgusting. Virgil Tibbs, however, is always cool and collected, and is an admirable character that will be remembered by everyone who reads or watches In the Heat of the Night. In being mocked for having a classy name such as Virgil, and asked what hes called where he comes from, he responds with the famous line, They call me Mister Tibbs. ( pg. 36) This line is present in both film and book, a demanding statement of racial equality that sticks in the readers mind.By comparing and contrasting the similarities and differences, it shows that the characters were more subtle and realistic than the movies stereotypical good guys and bad guys. Also, the plot of the book was better thought-out, and had many other enjoyable subplots that were lacking in the movie. Through his short stay in Wells, Carolina (or Sparta, Mississippi) Tibbs may not have altered the towns views on discrimination against blacks, but John Ball left a definite strong imprint about social equality, and in doing so left more questions about human and social behaviour for the reader than simple answers.

Saturday, May 25, 2019

Book Review- Power of Professionalism

The Power of Professionalism The thought around which the entire conversation revolves it that Professionalism Matters and it is not about mulling over on making pot smarter but About using better discretion. Wiersmas says that professionalism can be used to 1. Drive organizations to higher levels of performance for their stakeholders. 2. Drive inner efforts to the superior performance of any organization. 3. Decrease the dysfunctional aspect of organizational conflict and politics. 4.Open up imagination among all silos and between organizations and their customers and partners. 5. Allow employees to find larger meanings in their formulate and to see the value and recognition of their contributions. All of these are also recognized as the benefits of the Social Organization and that really good things can happen with neat partnership and simple communication. The lecture had me shake myself at the irony that professionalism has been restricted from taking its fair place as the f oundation in the so-called orbit of accomplishment.Power of Professionalism in Bills language means that there is a huge potential for optimism and change amongst individuals which would let people to grow and vacate as group, which might not be possible for one person. The Book also talks about Trust and how it can change, provoke and engage a group of people within an organization to elevate their standards, raise their hopes and work toward a common goal without seeking individual benefit in at presents competitive environment. Hence, Professionalism when wrapped onto a companys foundation has encouraging implications.

Friday, May 24, 2019

Mark Antony’s Speech

How does cross off Antony persuade the fight to reject the conspirators in Act III. 3 of Shakespeares Julius Caesar? During Mark Antonys compelling dialect, he uses various techniques to convince the crowd that the conspirators are murderers not legends. Because the plebians were easily swayed, Mark Antony had this opportunity. To make sure the crowd took his points seriously, Mark Antony has to appear fair and wise. He knows that the plebians are strongly in favour of Brutus, as Brutus has just given them a speech, so if he starts by incriminate Brutus, no one would listen to him.Therefore, at the beginning of his speech, Mark Antony was saying that Brutus was noble and honourable. Mark Antony approaches the crowd discernibly. As his arguments grow stronger, the crowds begin to project that Brutus and the conspirators are wrong. Every time he calls the conspirators honourable, it becomes more ironic and sarcastic and the people start believing it less. To oppose Brutus claim th at Caesar was a hardhearted tyrant Antony recounts how dearly he loved Brutus.Also, Antony humbles himself as no orator, as Brutus is hinting that Brutus used trickery in his speech to deceive the crowd. After that Antony reveals to the crowd Caesars will, in which To every Roman citizen he gives, to every several man seventy-five drachmas as well as land. He then asks the crowd, Here was a Caesar, when comes much(prenominal) another? which questions the conspirators ability to lead. Finally, Antony releases the crowd and utters, Now let it work. Mischief, thou art afoot. Take thou course thou wilt. After this the crowd riots and searches give away the traitors in an attempt to kill them. Mark Antony shows that Caesar was compassionate and that he had a big impact on Antonys life that he can never stuff Caesar My heart is in the coffin there with Caesar. He claims that they are so close that whenever one hurts, the other does too. He starts crying and the crowd understands wha t hes going through and we can see this when one plebian says, Poor soul, his eyes are red as fire with weeping. Antony then teases the crowd with Caesars will, which the beg him to read, simply he refuses.Antony tells the crowd to have patience and expresses his feeling that he will wrong the honourable men whose daggers have stabbed Caesar if he is to read the will. The crowd yells come forward they were traitors. Honourable men and have at this time completely turned against the conspirators and are inflamed about Caesars death. Even though in his speech Antony never directly calls the conspirators traitors, he is able to call them honourable in a sarcastic manner that the crowd is able to understand.He starts out by pointing out that Caesar had refused the crown three times, which refutes the conspirators main cause for killing Caesar. He reminds them of Caesars kindness and love for all, proving Caesar as innocent. Next he teases them with the will until they beseech he rea d it, and he reveals Caesars gift to the citizens. Finally, Mark Antony, leaves them with the question was there ever a greater one than Caesar, which infuriates the crowd. Mark Antony is able to eloquently manipulate the crowd through remarkable rhetoric skills and turn them against the honourable men.

Thursday, May 23, 2019

Influential African American Leaders

In the years following Reconstruction, many African Americans rose to the challenge of bringing rights and equality to blacks. booking agent T. Washington, W. E. B. DuBois, and Ida Wells-Barnett are Just of few examples of the outstanding influential African American leaders that had an impact on the people, time period, and history. Booker T. Washington did what seemed like the unaccepted for blacks he founded the Tuskegee Institute in Alabama. It was there that the former slave trained uneducated African American students in a trade that would help them light upon conomic freedom and experience the same equality as whites.To achieve this freedom and equality, he taught that if blacks excel conduct in fields like teaching, agriculture, and manual labor trades (blue collar fields), therefore eventually they would be treated as the equals they strived to be. Even though the Institute became an important center for technical education in the South, many blacks found his philosophies and teachings controversial. era those blacks wanted to integrate and become a bigger part of society, Washington saw no problem with segregation. One f his most famous demeanor is his Atlanta speech given 1895.In support of his campaign for segregation, he said during the speech, In all things that are purely social, we (whites and blacks) can be as wear out as the fingers, yet one as the hand in all things essential to mutual progress. As always there as two sides to everything, and Mr. W. E. B. DuBois was the strike opposite of Washington. W. E. B. DuBois was the very first black Ph. D. graduate from Harvard University. DuBois was one of those African Americans that found Washingtons philosophies and teachings controversial, and he disagreed with him n many things.Offended by the ideas that Booker T. expressed in his Atlanta speech, DuBois saw Washington as someone that only wanted to please the white community and population. In response to Washingtons Atlanta speech, DuBo is delivered the Atlanta Compromise. indoors this speech he argued about how the acceptation of segregation and settling for achievement would not get the African American community anywhere. He thought that blacks should go after occupations in humanities and managerial/professional (white collar) fields.It was his thoughts hat blacks must be politically, legally, and socially active in order to achieve equality. DuBois helped organize a group of black intellectuals known as the Niagara Movement it was their goal to outline an agenda for African American progress in the US. In 1909, he was in addition an important part of the founding of the NAACP, the National Association for the Advancement of Colored People they also devoted themselves to the progress of African Americans. Ida Wells-Barnett, an African American woman, led campaigns against the Ku Klux Klan and for the womens movement.As the KKK terrorized southern blacks, Ida led a ampaign against the lynchings that made many of the unaware northerners aware of the situations occurring in the southern states. As for the womens movement, her active role gained even more celebrity when she refused to march at the end of suffrage parades Just because she black. She, along with others, helped DuBois form the NAACP. These Atrican Americans tougnt tor the rights that they telt they were granted by the Bill of Rights and the amendments added afterwards. It was because of the efforts of these three men and women, African Americans and women now pee-pee the rights that they do.

Wednesday, May 22, 2019

Comparitive Essay Between “Millions” and “Slumdog Millionaire” by Danny Boyle Essay

In both Slumdog millionaire and Millions, the director Danny Boyle explores the subject of mating. Furthermore, in both dissipates, Boyle makes the same suggestion that the potential of brotherhood bonds is tested when mass counterchange to change magnitude pressure in the relationship. In both films, this theme is explored through the development of the characters in the opening scenes, the arise legal action and the climax.In the film Slumdog Millionaire we are taken to the city of modern Mumbai and into the life of a man named Jamal Malik as he attempts to win the TV spicy memorialise who wants to be a millionaire in order to reunite with his long-lost childhood sweetheart, Latika. The film Millions, also from Boyle, tells us the tale of how the brothers Damian and Anthony react when a duffle bulge filled with millions of soon-to-expire British pounds fall from the sky near their house. In the opening scenes of Millions, Boyle leads into the theme of brotherhood by intr oducing us to the characters Damian and Anthony through the use of camera work.The film begins with a montage of many different camera smacks cut together to show a bicycle race between the brothers from a train station, to the face site where the foundations of their new house are being laid. This has the effect of showing the auditory modality that the brothers have a strong and positive relationship, as they are show to enjoy themselves in each others company. This introductory montage ends with a high angle shot of Damian and Anthony lying on the ground dear next to each other after the race, looking happy and smiling.This, combined with the montage, has the effect of leading the audience to believe that the brothers enjoy each others company all the time whether they are playing, competing or in this case relaxing. Through these techniques the audience is shown the strong brotherhood bond between Damian and Anthony before circumstances change or pressure is added to the relationship. Similarly, in the opening scenes of the film Slumdog millionaire Boyle also introduces us to the subject of brotherhood, and the bond between Jamal and Salim Malik, once again through the use of camera work.In the early scenes of the film, a collage of different shots is used to show the brothers running away from guards on an airstrip, after being caught playing cricket with several(prenominal) other kids from their slum. Throughout the chase, the brothers stick together. This has the effect of introducing us to the characters of Salim and Jamal, as well as making us aware of their friendship and brotherhood. Early on in this montage, a Medium Close Up shot is included, showing Jamal and Salim smiling and high-fiving whilst running away from the guards.This montage has the effect of leading the audience to believe that the brotherhood bond between Salim and Jamal is very strong, as they stick together even in the face of danger, in this case being caught by the guar ds. Both the Montage and the Medium Close Up shot address the subject of brotherhood, and show us the strength of the bond between Jamal and Salim before circumstances change to increase pressure in their relationship. In the rising action of Millions the strength of the brotherhood bond between Anthony and Damian is tested when they disagree about how the money should be used.Boyle again conveys this changing dynamic of the boys relationship through the use of dialogue, editing and camera work. Shortly after the money is discovered, Damian and Anthony are in town when Damian sees a charr selling copies of the Big Issue. Big Issue anyone? she says, to which Damian replies Here, and keep the change. She responds Thanks mate. Ive had nothing to eat all day to which Damian replies, Were going to Pizza hut. loss to come? At which top Anthony overhears the conversation and interjects NoNo she doesnt, she just wants more money We havent got any more Ignoring Anthony, the lady rep lies, Id fancy Pizza actually. Can I bring my friend? to which Damian nods. Boyle uses this design interchange to effectively portray the different views of Damian and Anthony. Damian is shown to be more than free to help the hungry woman by buying her food, and doesnt hesitate when she asks to bring a friend, even though it will double the cost. Contrastingly Anthony lies that they havent got any more to try and avoid what he sees as a waste of money.Soon afterwards in the film, a wide shot is used to show the brothers as they leave for school. In the shot, Damian is in the background, on foot, shutting and locking their door whilst Anthony, wearing sunglasses is framed leaving with an suite of other kids from school, riding on a bike someone else is pedaling for him. This shot has the effect of symbolizing the deuce different stances the brothers have taken with the money. Damian has decided to wrap up his life as if the money had never been discovered, whereas Anthony has dec ided to use the money for his own selfish purposes.Both the wide shot and the dialogue symbolize 2 instances in which the brothers disagree about what they should do with the money. Anthony wants to save the money unless it is being spent on him, whereas Damian has the exact opposite goal. Their different ideals combined with the change in circumstance the discovery of the money have increased the tension in their relationship and is testing their brotherhood bond. Similarly, the brotherhood bond between Jamal and Salim is tested in the rising action of Slumdog Millionaire when and Salim repeatedly betrays Jamal.Boyle reveals this development of the Malik brothers relationship through the use of dialogue. Jamal and Salim have a scam, in which Jamal occupies the long drop for as long as possible, so people pay Salim to get him to come out. Jamal takes to long getting out, and a potential customer leaves. Salim then says to Jamal You just lost me a blinking(a) customer. Jamal is u nconcerned, and doesnt say anything. A nameless character then shouts Amitabhs helicopter Thats Amitabhs helicopter Jamal then exclaims Amitabh? Amitabh Bachan Salim empowers a tame beneath the bathrooms handle so that Jamal cant get out. Jamal then yells Salim, open it We can tell by the way Jamal express Amitabhs name that he admires him. Salim would have known this, and so to lock him in the toilet when he will probably never have the regain to see Amitabh again is very cruel. As it turns out, Jamal wants to see Amitabh so badly he jumps through the long drop floor and emerges covered in sewerage. He then runs up to Amitabh and sets to get his autograph. Later, Salim sells the autograph.When Jamal finds out, he exclaims, That was my autograph Amitabh gave it to me Ill never get another To which Salim replies He offered a good price, so I change it As Salim walks away, Jamal says, almost to himself But it was mine This, again, shows that Salim has very little empathy for his brother, and Jamal was also very upset about what Salim had done. Both these examples of dialogue have the effect of allowing the audience to see that Salim has betrayed Jamal, not once, but twice. The Malik boys brotherhood bond is being tested due to this is the change in circumstance.In the resolution of Millions Damian and Anthony manage to overcome the obstacles and regain their brotherhood bond. Damian decided to burn all the money, and after he has set it on fire, he sees his dead mother. He has a brief talk to her, and then Anthony comes out to join him. Damian says to Anthony She said to tell you not to worry, everythings going to be all right. By passing on this centre to his brother, it shows that Damian himself agrees with it. Shortly later, a wide shot is used, showing the family crawling through the box tunnel to Damians fort.The fort was a very special place to Damian, therefore because he is allowing Anthony inside, it can be concluded that Damian has forgiven Anthony. The effect of the both dialogue and the wide angle shot is to again address the subject of Brotherhood, and to show the audience the brotherhood bond between Damian and Anthony was strong enough that when the circumstances changed for the better the removal of the money they managed to regain their previous relationship. Contrastingly, in the rising action of Slumdog Millionaire, Salim and Jamal have a fight, causing the dissolution of their brotherhood bond.After escaping from Maman, Salim has had too much to drink and wants to have his way with Latika, so he tells Jamal to leave. When Jamal objects, he retorts, I am the elder. I am the boss. For once, you do as I say After throwing Jamal outside the apartment, Jamal starts banging on the door. Salim opens it, and points a revolver at Jamals head, and says Shut up The man with the colt 45 says shut up Go now, or gun master Jinan will shoot you right between the eyes. beart think he wont.The effect of both of these exam ples of dialogue is to emphasize to the audience that Salim is more interested in his own desires than that of his brother, whom he knows loves Latika. From Jamals point of view this is the final straw, and it seems impossible for the brotherhood bond to return to what it was. In conclusion, Danny Boyle explores the subject of brotherhood and makes the suggestion that the strength of brotherhood bonds is tested when circumstances change to increase pressure in the relationship with both Salim and Jamal Malik in Slumdog Millionaire and Anthony and Damian in Millions.In some ways, the films are similar, as the brotherhood bond between the two main protagonists is strong at the start, and is tested in the rising action. The films are different, however, because Anthony and Damian manage to recover their bond in the resolution, whereas Jamal and Salim do not. Boyles comments on each of the films are very interesting, and it was impressive to see such varied adaptations of the theme of b rotherhood and the different outcomes of each.

Tuesday, May 21, 2019

Smart Phone

Smart prognosticate Security Survey of U. S. consumers Sponsored by AVG Technologies Independently conducted by P adeptmon fetch LLC Publication mesh March 2011 Ponemon launch seek Report Smartphone Security Survey of U. S. Consumers Ponemon Institute, March 2011 Part 1. Introduction Ponemon Institute is pleased to pre direct the findings of the Smartphone Security Survey A Study of U. S. Consumers sponsored by AVG Technologies. The goal of the research is to determine consumers perceptions more or less the potential solitude and nurtureion pretends when utilize their smartphones.In addition, we wanted to learn if participants in our study fretfulness well-nigh these risks and if they take security measures precautions. We vignetteed 734 consumers who argon 18 years and older and own a smartphone. The risks that we address in our survey c erstwhilern location tracking, transmittance of private fee without the wasting diseasers acquaintance or take, diallerwargon ( specialise malw be unique to smartphones), spyw be, virexercisings from insecure WiFi networks and others. What we learned is that closely of the consumers in our study be utilize their smartphones without understanding that they atomic number 18 exposing their sensitive information to the risks listed above.We as well believe the findings of this study signal a potential security risk for organizations beca utilise so many consumers surveyed expenditure their smartphones for twain(prenominal) vocation and privateised use. With seam confidential information stored on these smartphones, organizations should make sure employees and contractors take appropriate precautions to secure much(prenominal) sensitive information. We also recommend that security policies state these precautions and ensure they be enforced. Following are the most salient research highlights ?Eighty-four percent use the same smartphone for both business and personal purposes. The cross over of bus iness and personal usage means much more sensitive and confidential data is at risk and suggests that the smartphone is with them most of the time. Sixty-six percent admit they keep a moderate or operative amount of personal data on their smartphones. Such personal data include email address, name, contact lists, photos, pictorial matters, anniversary and personal dates, music, Sixty-seven percent of consumers surveyed assign they are touch on about receiving marketing ads and promotions.However, less than half (44 percent) are c one timerned about having a virus attack on their smartphone when it is connected to an insecure internet network. In addition to using it as a phone, 89 percent use their smartphone for personal email and 82 percent use it for business email. A bittyer percentage of consumers use their smartphones for fiscal legal proceeding including payments. In fact, 38 percent of consumers use the smartphone to make payments and 14 percent use it for banking. S ixty-six percent of consumers pee-pee paid at least once for an item using their smartphone.In addition, 12 percent of consumers cite they have experienced a fraud attempt vis-a-vis a mobile payment scheme. patronage this fact, just now six percent say they mold their mobile billhook or educational activity e genuinely month and eight percent check the statement when the bill is higher than usual. fifty-eight percent of consumers say that based on how they used the smartphone for purchases, Internet look for and location they were targeted by marketers. Accordingly, 67 percent say they are very implicated or concerned about aggressive or abusive marketing practices. ? ? ? ? ? Ponemon Institute research Report rogue 1 ?Despite security risks, less than half of consumers use mentionpad locks or passwords to secure their smartphones. In addition, besides 29 percent of consumers said they have considered place an anti-virus intersection point to protect their smartphone. Forty-two percent of consumers who use tender networking apps say they throw overboard smartphone versions of well-known social networking applications such as Facebook to rag the same key chains, passwords and log-ins that they use of their desktops, laptop computers or tablet. whole 10 percent of consumers say they turn bump off Bluetooth discoverable status on their smartphone when not in use. ? ?Ponemon Institute enquiry Report Page 2 Part 2. Key Findings In this report we have organized the findings from the study according to the by-line topics Consumers use of smartphones, consumers sensitive(predicate)ness about the security risks that accompany their use of smartphones, scenarios that illustrate potential smartphone security risks and how consumers are or are not managing these risks. Consumers use of smartphones Most consumers use their smartphone for both business and personal use. Forty percent use their smartphone for business and personal use equally and 25 p ercent use it for personal only when some business use ( ostracize graph 1).Only 6 percent of consumers surveyed use their smartphone exclusively for business. Bar chart 1. What best describes your smartphone use? Both business and personal use equally 40% Mostly personal nevertheless some business use 25% Personal use only 16% Mostly business but some personal use 13% craft use only 0% 5% 6% 10% 15% 20% 25% 30% 35% 40% 45% Despite using the Smartphone for personal use, 34 percent say their employer purchased the smartphone and pays all monthly charges. As shown in Bar map 2, 35 percent say they purchased it without any reimbursement.Bar Chart 2 Who purchased your smartphone and who pays the monthly returns fee? I purchased it without any reimbursement from my employer My employer purchased it and pays monthly charges I purchased it and my employer provided some reimbursement I purchased it and my employer pays monthly charges My employer purchased it and I pay monthly charges 0% 5% 13% 35% 34% 10% 8% 10% 15% 20% 25% 30% 35% 40% Ponemon Institute inquiry Report Page 3 Smartphones can perform a wide range of tasks. However, the most ordinary use next to the phone is business and personal emailing.The most commonplace smartphone uses are checking both personal and business email, using it as an address book, texting, Internet browsing, storing or moving data, obtaining and viewing documents, as a calendar and listening to music (Bar Chart 3). Least popular are banking, travel assistance and video conferencing. (For a complete list of tasks, please see Q. 24 in the Appendix to this paper. ) We suggest this finding whitethorn indicate why many in our study are not concerned about the security risks. Because consumers believe its primary use is as a phone or to email they may think (incorrectly) that there are negligible security or privacy risks.Bar Chart 3 Tasks that consumers do on their smartphone Phone Personal email Business email Address book Texti ng Store or move data Internet browsing concord documents Calendar View documents Listen to music archive tasks Shop Camera Social networking 0% 20% degree centigrade% 89% 82% 57% 54% 53% 53% 52% 51% 51% 50% 48% 44% 42% 40% 40% 60% 80% carbon% 120% As reported in Bar Chart 4, 66 percent have paid for an item via their smartphone once, irregularly (once every two months) or regularly (maybe once a month). Fifty-one percent were impress that they were charged for a service of product they signed up for.Bar Chart 4 Key questions about smartphone use Each bar defines the percentage yes reaction Did you ever pay for an item via the mobile phone? Did you every sign-up for a service or product on a mobile without realizing that there would be a cost? cod you ever signed a terms and conditions request on your mobile phone? 66% 51% 46% suffer you ever been the victim of mobile payments fraud? 0% 10% 12% 20% 30% 40% 50% 60% 70% Ponemon Institute Research Report Page 4 Consumers store c onfidential information on their smartphones. Sixty-six percent (40+26) of consumers store a moderate or a significant amount of personal data.Bar Chart 5 shows that only 11 percent say they do not store personal data on their smartphone. Bar Chart 5 How much personal data do you store on your smartphone? 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% A moderate amount of A significant amount of personal data personal data A small amount of personal data None 11% 26% 23% 40% As shown in Bar Chart 6, data most a lot stored on smartphones include email addresses, names, contact lists, photos, anniversary and other personal dates and location. Consumers are less believably to store planned future purchases, purchase history, health data and security test questions (see Q. 3 in the Appendix for the complete list). Bar Chart 6 What kinds of data do you store on your smartphone? e-mail address Name Contact lists Photos Anniversary & personal dates topical anaestheticisation of function Music Home address Confidential business documents Date of bring forth Gender realisation or debit card numbers Videos Passwords 0% 20% 97% 85% 69% 59% 53% 52% 47% 40% 37% 33% 32% 29% 25% 23% 40% 60% 80% coulomb% 120% Ponemon Institute Research Report Page 5 Many consumers surveyed have used email and text to sign up for function or products without realizing they would be charged.As noted antecedently in Bar Chart 4, 51 percent made what they thought was a free service and later found out they were charged for it. Bar Chart 7 shows most of these purchases were made by consumers using email (46 percent), text message (34 percent) and website (31 percent). Bar Chart 7 The methods used to sign-up for services or products on your smartphone 50% 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% Email Text message Website different 12% 34% 31% 46% Despite these unthought charges, Bar Chart 8 shows consumers surveyed rarely check their bills for unusual or unidentified payments.Only six percent check their bills every month and eight percent check their bills only if it is higher than usual. Fifty-two percent never check their smartphone bills. Bar Chart 8 Do you check your mobile bill or statement for unidentified charges? 60% 52% 50% 40% 30% 20% 10% 0% neer Yes, occasionally Yes, but only if the bill is higher than usual Yes, I check it every month 8% 6% 34% As previously noted in Bar Chart 4, the majority of consumers (78 percent) say they have not experienced any mobile payments fraud. Twelve percent say they have experienced such fraud and 10 percent are not veritable. Ponemon Institute Research ReportPage 6 Consumers assuredness about the security risks that accompany their use of smartphones Marketing messagesnot privacy and security risksheadache consumers. While the majority of consumers do not feel their private information is at risk or that their smartphone will be hacked (56 percent and 58 percent, respectively), they do worry about receiving unwanted marketing messages. A shown in Bar Chart 9, consumers also worry about being tracked when using their smartphone (64 percent). Bar Chart 9 Attributions about privacy and security risks The agree reply is a combination of powerfully agree and agree.The disagree response is the sum of unsure, disagree and strongly disagree. I worry more about the security of my desktop or laptop electronic computer than my smartphone. When downloading software system to my smartphone I do not always check to see if the app is from a trustworthy source. I do not worry that a literary hack will attack my smartphone. I do not feel my private information or privacy is at risk when I use my smartphone. I do not worry about losing my smartphone while traveling. I do not worry about being tracked when using my smartphone. I do not worry about receiving marketing messages on my smartphone. 5% 35% 62% 38% 58% 42% 56% 44% 50% 50% 36% 64% 33% 67% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% hundred% Agree Disagree They als o worry more about the security of their desktop and laptop computers than the security of their smartphone. Because of these perceptions about the security of the smartphone, they are not likely to check to see if an application comes from a trustworthy source before downloading it. Scenarios concerning smartphone risks In the survey, we asked consumers to respond to eleven scenarios illustrating a range of security issues and risks.Specifically, they were asked if they are informed that what is described in the scenario could happen to them, if they are aware that they experienced what was described in the scenario and what was their level of concern. Following are the 11 scenarios 1. Location data enter onto image files can result in the tracking of the smartphone drug user. 2. Smartphone apps can transmit confidential payment information (i. e. reference point card details) without the users knowledge or consent. Ponemon Institute Research Report Page 7 3.Smartphones can be infected by specialized malware called diallerware that enables criminals to make use of premium services or numbers resulting in unexpected monthly charges. 4. Smartphone apps may contain spyware that allows criminals to access the private information contained on a smartphone. 5. Financial apps for smartphones can be infected with specialized malware designed to steal credit card numbers and online banking credentials. 6. If a social network app is downloaded on a smartphone, failing to log off properly could allow an postiche to post malicious details or change personal settings without the users knowledge. . A smartphone can be devoted of or transferred to another user without properly removing sensitive data, allowing an intruder to access private data on the device. 8. In many cases, people use their smartphone for both business and personal usage, thus putting confidential business information at risk (a. k. a. cross-over risk). 9. A smartphone can connect to the Internet t hrough a local WIFI network that is insecure. This may result in a virus attack to the smartphone. 10.Smartphones contain basic security protections that can be handicapped by jailbreaking, thus making the smartphone more vulnerable to spyware or malware attacks. 11. Smartphone users can be targeted by marketers based on how the phone is used for purchases, Internet browsing and location. As a result, the user may receive unwanted marketing ads and promotions their smartphone. Bar Chart 10 summarizes the consumers level of awareness about the above-mentioned smartphone security risks. Consumers are most aware of receiving unwanted marketing messages based on their smartphone usage (60 percent).They also understand that they may be putting business confidential information at risk when using the smartphone for both personal and business use (55 percent), and that they are vulnerable to a virus when connecting to the Internet through a local WIFI network is insecure (35 percent). Bar Chart 10 Are you aware of the following(a) smartphone security risks? Each bar defines the percentage yes response Marketing abuse Cross-over Insecure WIFI Improper disposal Location tracking Jailbreaking Spyware Social network snafu Auto transmission Diallerware Specialized malware 0% 11% 11% 10% 9% 10% 20% 30% 40% 50% 15% 15% 21% 35% 31% 55% 0% 60% 70% Ponemon Institute Research Report Page 8 Bar Chart 11 reports consumers actual experience with these security issues. Fifty-eight percent of consumers say they indeed have received unwanted marketing messages. In addition, 52 percent say they have experienced cross-over risk wherein the security of business information was jeopardized because of the personal use of the smartphone. Bar Chart 11 Have any of these situations happened to you? Each bar defines the combined very concerned and concerned responseMarketing abuse Cross-over Insecure WIFI Improper disposal Location tracking Spyware Jailbreaking Social network snafu Diallerwa re Auto transmission Specialized malware 0% 5% 10% 20% 30% 40% 50% 8% 8% 6% 11% 10% 16% 13% 23% 52% 58% 60% 70% Bar Chart 12 summarizes consumers level of concern about eleven smartphone security risks. Accordingly, a large percentage of these consumers say they are very concerned or concerned about each scenario happening to them, especially diallerware (68 percent), unwanted marketing (67 percent), and the auto transmission of personal data from the phone (66 percent).Bar Chart 12 Are you concerned about of the following smartphone security risks? Each bar defines the combined very concerned and concerned response Diallerware friendless marketing Auto transmission Jailbreaking Spyware Location tracking Specialized malware Improper disposal Social networking snafu Insecure WIFI Cross-over 0% 10% 20% 30% 42% 40% 40% 50% 60% 51% 50% 60% 68% 67% 66% 65% 65% 65% 70% 80% Consumers are concerned about being tracked while using their smartphones or having their security protections disab led through jailbreaking but chiefly are not aware of this risk.In Ponemon Institute Research Report Page 9 contrast, only 40 percent of consumers are very concerned or concerned about cross-over and 42 percent about an insecure smartphone-to-WIFI connection. While there is some awareness that a smartphone that is sell of or transferred to another user without removing sensitive data could allow someone to access private data on the device, about half of consumers are not very concerned about this occurring.In summary, consumers surveyed are least aware that the following can happen on their smartphone the transmission of confidential payment information without their knowledge or consent, downloading a financial app for their smartphone that has specialized malware designed to steal credit card numbers and online banking credentials, diallerware infections that enable criminals to make use of premium services or numbers resulting in unexpected charges and spyware that allows crim inals to access the private information contained on a smartphone.Those who are aware of these risks are generally very concerned about how these risks may affect their smartphone. beginning Graph 1 Summary of consumer responses to eleven smartphone security risks 80% 70% 60% 50% 40% 30% 20% 10% 0% Location tracking Auto Diallerware transmission Spyware Specialized malware Social network snafu Improper disposal Cross-over Insecure WIFI Jailbreaking Marketing abuse Are you aware? Has this happened to you? Level of concern Ponemon Institute Research Report Page 10 Part 3.How consumers are managing security risks associated with smartphones Despite the confidential information on their smartphones, consumers are not taking appropriate security precautions. As showing in Bar Chart 13, less than half (43 percent) of consumers surveyed consider security features to be alpha when deciding which smartphone to purchase. It is not surprising, therefore, that they are not taking security pre cautions. Bar Chart 13 How important is security as a feature on your smartphone? 60% 50% 43% 40% 30% 20% 10% 0% Important Not important 57%Bar Chart 14 shows 51 percent of consumers surveyed have neither keypad locks nor passwords on their smartphone. Nineteen percent have passwords and 10 percent have both keypad locks and passwords. However, when we canvas the responses of the more experienced users the percentage dropped to 31 percent who do not use keypad locks or passwords on their smartphone. Bar Chart 14 Do you have keypad locks or passwords on your smartphone? 60% 51% 50% 40% 30% 20% 10% 0% No, neither Yes, keypad locks Yes, passwords Yes, both keypad locks and passwords 20% 19% 10% Ponemon Institute Research Report Page 11Forty-two percent of consumers allow smartphone versions of well-known social networking applications such as Facebook to access their key chains, passwords and log-ins that are used on their desktop computer or tablet (see Bar Chart 15). Twenty-nine per cent of consumers say they have considered install an anti-virus product and 10 percent turn off Bluetooth discoverable status on their device when they are not using it. Only 10 percent set up download controls on their smartphone to protect against apps and games that may contain malware. Bar Chart 15 Security habits of smartphone users Each bar defines the percentage yes responseDo you allow smartphone versions of well-known social networking applications such as Facebook to access your key chains, passwords and log-ins that you use on your desktop computer or tablet (only for those who use social networks)? Have you considered installing an anti-virus product on your smartphone? 29% 42% Do you turn off Bluetooth discoverable status on your device when you are not using it? 10% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Ponemon Institute Research Report Page 12 Part 4. Methods Table 1 summarizes the sample response for this study of US consumers who own or use smartphones.Our sample frame consisted of nearly 30,000 adult-aged consumers placed in the Unite States. These individuals were screened to ensure they use a smartphone for both personal and business purposes. A total of 793 responded to our web-based survey. Fifty-nine surveys failed reliability tests, resulting in a last(a) sample of 734 consumers (2. 5 percent response rate). Table 1 Sample response Sample frame Invitations sent chalk up returns Rejections Final sample frequency 29,921 27,498 793 59 734 portion% deoxycytidine monophosphate. 0% 91. 9% 2. 7% 0. 2% 2. 5% Table 2a provides the character references of smartphones used by consumers.Table 2b lists the operating systems contained on these smartphones. As can be seen, the top rated smartphones are Apples iPhone, back talk Blackberry and Google Nexus One. Accordingly, the top rated operating systems are iPhoneOS, RIM and Windows Mobile. Table 2a. Type of smartphone Apple iPhone RIM Blackberry Google Nexus One Nokia N8 Motorola Droid X T-M obile G2 Sprint HTC EVO 4G Palm Pre Plus Samsung Epic 4G Other tote up portion% 27% 21% 12% 9% 9% 6% 6% 5% 4% 0% 100% Table 2b. Operating system iPhoneOS RIM Windows Mobile Android Symbian OS Linux Maemo Garnet OS Bada MeeGo Other or unsure impart per centum% 24% 19% 12% 9% 3% 3% 2% 2% 1% 1% 25% 100%Pie Chart 1 reports the age range of consumers in our study. Pie chart 2 shows the employment status of consumers. The largest segment of consumers are aged 36 to 45 (21 percent), and 52 percent are employed in a full or part-time position. Pie Chart 1 Age range 10% 2% 18% 18 to 25 26 to 35 36 to 45 46 to 55 19% 17% 56 to 65 66 to 75 75+ 21% 14% 10% 9% 52% 8% Pie Chart 2 Employment status 5%2% Employee homemaker Retired Student Unemployed Business owner Active military 13% Ponemon Institute Research Report Page 13 Pie Chart 3 reports the syndicate income of consumers.Pie Chart 4 shows the location of consumers according to their region in the United States. A total of 44 states are represented in our sample. The median dwelling income of consumers is $81,000 per year. Pie Chart 3 Household income Pie Chart 4 Regional location 1% 4% 10% 13% Below $20k 20 to $40k 41 to $60k 19% 19% Northeast Mid-Atlantic 14% 20% 61 to $80k 81 to $100k 101 to $150k 12% 18% Midwest Southeast Southwest 15% 17% Pacific west 16% 22% 151 to $200k Over $200k In addition to web-based survey analysis, we conducted debriefing interviews with a random cross-section of consumers.In total 128 individuals were contacted, resulting in 66 one-to-one interviews to discuss certain questions and probe for additional insights from the consumers when appropriate. A total of 53 percent of consumers are female, 47 percent male. Forty percent of consumers say they use their smartphone for both business and personal reasons. Only six percent say they use their smartphone solely for business (see Bar Chart 1). Ponemon Institute Research Report Page 14 Part 5. Conclusion The key finding from this resear ch is that consumers in our survey are unaware of the security risks associated with their smartphones.This could be attributed, in part, to the lack of information being published about smartphone security risks. We also conclude that there may be a perception that because the most popular uses are phoning and emailing they are not putting the data on their smartphones at risk. In contrast, the security of desktop and laptop computers receives much more attention. It is not surprising, therefore, that consumers surveyed are more worried about protecting their computers from security risks. This is despite the fact these devices can contain just as much sensitive data that if addled or stolen could result in financial harm.Caveats There are inherent limitations to survey research that need to be carefully considered before drawing inferences from findings. The following items are specific limitations that are germane to most Web-based surveys. ? Non-response bias The current findin gs are based on a sample of survey returns. We sent surveys to a vocalization sample of adult-aged consumers in the United States, resulting in a large number of usable returned responses. Despite non-response tests, it is always come-at-able that auditors who did not participate are substantially different in terms of underlying beliefs from those who completed the survey.Sampling-frame bias The accuracy is based on contact information and the degree to which the list is representative of individuals who are information system auditors. We also acknowledge that responses from paper, interviews or telephone might result in a different pattern of findings. Self-reported results The quality of survey research is based on the integrity of confidential responses received from consumers. While certain checks and balances were incorporated into our survey evaluation process, there is always the possibility that certain consumers did not provide responses that reflect their true opinions . B ? ? Ponemon Institute Research Report Page 15 Appendix Detailed Survey Responses Following are the survey results for a final sample of 734 adult-aged consumers located in all regions of the United States. Fieldwork concluded in February 2011. Sample response Sample frame Invitations sent summarise returns Rejections Final sample Part 1. Background Q1a. Please acquire the smartphone that you presently use. If you use more than one smartphone, please select the one you use most frequently.T-Mobile G2 Apple iPhone Motorola Droid X Samsung Epic 4G RIM Blackberry Sprint HTC EVO 4G Nokia N8 Google Nexus One Palm Pre Plus Other (please specify) lend Q1b. Please select the operating system your smartphone runs on. Symbian OS Android Linux Windows Mobile Bada MeeGo Maemo Garnet OS iPhoneOS RIM Other unsealed Total Q2. What best describes your smartphone use? Please select only one. Business use only Mostly business but some personal use Personal use only Mostly personal but some bus iness use Both business and personal use equally Total Frequency 29,921 27,498 793 59 734 Pct% 100. 0% 91. 9% 2. 7% 0. % 2. 5% Pct% 6% 27% 9% 4% 21% 6% 9% 12% 5% 0% 100% Pct% 3% 9% 3% 12% 1% 1% 2% 2% 24% 19% 0% 25% 100% Pct% 6% 13% 16% 25% 40% 100% Ponemon Institute Research Report Page 16 Q3. Who purchased your smartphone and who pays the monthly service (usage) fee? Please select only one. I purchased it without any reimbursement from my employer I purchased it and my employer provided some reimbursement I purchased it and my employer pays monthly charges My employer purchased it and I pay monthly charges My employer purchased it and pays monthly charges Total Q4. Please select all the tasks that you do on your smartphone?Phone Personal email Business email Address book Texting Internet browsing Store or move data Obtain documents View documents Calendar Listen to music Schedule tasks Shop Camera Social networking Payments Games Maps and navigation Upload videos Location services Watch TV/films Banking motive power assistance Video conferencing Monitor health Q5. Have you ever paid for any item via your mobile phone? Yes, only once Yes, irregularly (maybe once every two months) Yes, regularly (maybe once a month) Never Total Q6a. Have you every signed up for a service or product on your mobile without realizing that there would be a cost?Yes No Total Q6b. If yes, please select the all the methods you used to sign up for the service or product. Text message Email Website Other Total Pct% 35% 13% 10% 8% 34% 100% Pct% 100% 89% 82% 57% 54% 53% 53% 52% 51% 51% 50% 48% 44% 42% 40% 38% 34% 24% 24% 23% 21% 14% 10% 9% 5% Pct% 11% 32% 23% 34% 100% Pct% 51% 49% 100% Pct% 34% 46% 31% 12% 123% Ponemon Institute Research Report Page 17 Q7. Do you check your mobile bill or statement for unusual or unidentified payments? Yes, I check it every month Yes, but only if the bill is higher than usual Yes, occasionally Never Total Q8.Have you ever signed a terms and conditions re quest on your mobile phone? Yes No unsure Total Q9. Have you ever been the victim of mobile payments fraud? Yes No shy Total Part 2. Attributions Q10. Please rate each one of the following statements using the scale provided below each item. Strongly agree and agree shown. Q10a. I do not feel my private information or privacy is at risk when I use my smartphone. Q10b. I do not worry that a hacker will attack my smartphone. Q10c. I do not worry about receiving marketing messages on my smartphone. Q10d. I do not worry about being tracked when using my smartphone.Q10e. I do not worry about losing my smartphone while traveling. Q10f. I worry more about the security of my desktop or laptop computer than my smartphone. Q10g. When downloading software to my smartphone I do not always check to see if the app is from a trustworthy source. Part 3. Scenarios Pct% 6% 8% 34% 52% 100% Pct% 46% 21% 33% 100% Pct% 12% 78% 10% 100% Strongly agree 18% 25% 10% 11% 18% 25% 21% Agree 38% 33% 23% 25% 32 % 40% 41% Q11. Sometimes location data can be embedded onto image files such as digital photos contained on your smartphone so that other people can track where you are.Were you aware that this could happen? Yes No faint-hearted Total If yes, has this happened to your smartphone? Yes No shy Total Pct% 21% 45% 34% 100% Pct% 13% 28% 59% 100% Ponemon Institute Research Report Page 18 On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your location could be tracked while using your smart phone? refer and very concerned shown. Response Q12. Smartphone apps can transmit confidential payment information such as credit card details without the users knowledge or consent. Were you aware that this could happen?Yes No unsealed Total If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your credit card details could be transmitted with y our knowledge or consent? concerned and very concerned shown. Response Q13. Smartphones can be infected by specialized malware called diallerware that enable criminals to make use of premium services or numbers resulting in unexpected monthly charges. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone?Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone could be infected by diallerware? Concerned and very concerned shown. Response Q14. Smartphone apps may contain spyware that allows criminals to access the private information contained on a smartphone. Were you aware that this could happen? Yes No Unsure Total Very concerned 29% Concerned 36% Pct% 11% 53% 36% 100% Pct% 6% 41% 53% 100% Very concerned 31% Concerned 35% Pct% 10% 58% 32% 100% Pct% 8% 65% 27% 100% Very concerned 36% Concerned 32%Pct% 15% 53% 32% 100% Ponemon Institute Research Report Page 19 If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone could be infected by spyware? Concerned and very concerned shown. Response Q15. Financial apps for smartphones can be infected with specialized malware designed to steal credit card numbers and online banking credentials. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone?Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone or downloaded apps could be infected by this specific type of malware? Concerned and very concerned shown. Response Q16. If a social network app is downloaded on a smartphone, failing to log off properly could allow an imposter to post malicious details or change personal settings without the users knowledge. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone?Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your failure to close the social networking app on your smartphone could allow unauthorized access and/or malicious posts your user account? Concerned and very concerned shown. Response Pct% 11% 56% 33% 100% Very concerned 33% Concerned 32% Pct% 9% 57% 34% 100% Pct% 5% 66% 29% 100% Very concerned 32% Concerned 28% Pct% 11% 56% 33% 100% Pct% 8% 55% 37% 100% Very concerned 26% Concerned 23% Ponemon Institute Research Report Page 20 Q17.A smartphone can be disposed of or transferred to another user without properly removing sensitive data, allowing an intruder to access private data on the device. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Pct% 31% 36% 33% 100% Pct% 16% 54% 30% 100% On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that private information on the smartphone would not be withdraw properly before disposing of it or transferring it to another user? Concerned and very concerned shown. Response Q18.In many cases, people use their smartphone for both business and personal usage, thus putting confidential business information at risk. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your use of a smartphone for personal reasons could put the confidential information of your business at risk? Concerned and very concerned shown. Response Q19. A smartphone can connect to the Internet through a local WIFI network that is insecure.This may result in a virus attack to the device. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsu re Total Very concerned 23% Concerned 28% Pct% 55% 28% 17% 100% Pct% 52% 36% 12% 100% Very concerned 19% Concerned 21% Pct% 35% 42% 23% 100% Pct% 23% 45% 32% 100% Ponemon Institute Research Report Page 21 On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone when connected to an insecure Internet network may result in a virus attack?Concerned and very concerned shown. Response Q20. Smartphones contain basic security protection that can be disabled by jailbreaking, thus making the smartphone more vulnerable to spyware or malware attacks. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphones security settings could be disabled remotely by a third party without your knowledge or consent?Concerned and very concerned shown. Response Q21. Smartphone users can be targeted by marketers based on how the phone is used for purchases, Internet browsing, and location. As result, the user may receive unwanted marketing ads and promotions. Were you aware that this could happen? Yes No Unsure Total If yes, has this happened to your smartphone? Yes No Unsure Total Very concerned 22% Concerned 20% Pct% 15% 57% 28% 100% Pct% 10% 55% 35% 100% Very concerned 34% Concerned 31% Pct% 60% 17% 23% 100% Pct% 58% 15% 27% 100%On a scale of 1 to 5, where 1 = not concerned and 5 = very concerned, how concerned are you that your smartphone could receive marketing ads and promotions? Concerned and very concerned shown. Response Part 4. Other Questions Q22. On average, how much personal data do you store on your smartphone? None (Go to Q24) Only a small amount of personal data A moderate amount of personal data A significant amount of personal data Unsure Very concerned 31% Concerned 36% Pct% 11% 23% 40% 26% 100% Ponemon Institute Research Report Page 22 Q23.What kinds of data do you store on your smartphone? Email address Name Contact lists Photos Anniversary and other personal dates Location Music Home address Confidential business documents Date of birth Gender Credit or debit card numbers Videos Passwords PIN number Hobbies, sports and travel interests Ages and gender of children Names of children Alarm codes Planned future purchases leveraging history Health data Security test questions Q24. Do you use a one Gigabyte (or higher) storage device on your smartphone? Yes No Unsure Total Q25. What do you worry more about?Losing my wallet/purse Losing my smartphone I worry about both equally Total Q26. What do you worry more about? Losing my laptop computer Losing my smartphone I worry about both equally I dont have a laptop computer Total Q27. Do you have keypad locks or passwords on your smartphone? Yes, keypad locks Yes, passwords Yes, both keypad locks and passwords No, neither Total Pct% 97% 85% 69% 59% 53% 52% 47% 40% 37% 33% 32% 29% 25% 23% 19% 15% 13% 13% 11% 8% 8% 5% 2% Pct% 19% 68% 13% 100% Pct% 50% 23% 27% 100% Pct% 38% 10% 19% 33% 100% Pct% 20% 19% 10% 51% 100%Ponemon Institute Research Report Page 23 Q28a. Do you synch your smartphone with any of the following devices? Laptop Desktop Another smartphone An online backup storage solution None of the above Total Q28b. How regularly do you synch your smartphone with any of the devices listed in Q28a? Hourly Daily Weekly Monthly Irregularly Total Q29. Do you allow smartphone versions of well-known social networking applications such as Facebook to access your key chains, passwords and log-ins that you use on your desktop computer or tablet?Yes No Unsure I dont use social networking apps Total Q30. Do you turn off Bluetooth discoverable status on your device when you are not using it? Yes No Unsure Total Q31. Have you considered installing an anti-virus product on your smartphone? Yes No Total Q32a. Do your children have a mobile/cell smartphone? Yes N o I dont have children Total Q32b. If yes, do you use your childrens smartphone to keep track of them (from a security perspective)? Yes No Total Pct% 44% 38% 9% 8% 45% 144% Pct% 25% 29% 14% 8% 24% 100% Pct% 21% 25% 4% 50% 100%Adjusted 42% 50% 8% 0% 100% Pct% 10% 83% 7% 100% Experienced 30% 62% 8% 100% Pct% 29% 71% 100% Pct% 22% 33% 45% 100% Experienced 53% 47% 100% Pct% 41% 59% 100% Ponemon Institute Research Report Page 24 Q32c. If yes, do you set up parental controls on the smartphone to protect your children when they access the Internet? Yes No Total Q33. Do you set up download controls on your smartphone to protect against apps and games that may contain malware? Yes No Unsure Total Q34. When deciding which smartphone to purchase, how important are its security features?Very important and important shown. Response Part 5. Demographics D1. Please check your age range. 18 to 25 26 to 35 36 to 45 46 to 55 56 to 65 66 to 75 75+ Total D2. What is your present employment status? ful l-time employee Part-time employee Business owner Homemaker Retired Student Active military Unemployed Total D3. What range best defines your annual sign income? Below $20k 20 to $40k 41 to $60k 61 to $80k 81 to $100k 101 to $150k 151 to $200k Over $200k Total Pct% 21% 79% 100% Pct% 10% 74% 16% 100% Very important 21% Important 22%Pct% 18% 19% 21% 17% 13% 10% 2% 100% Pct% 48% 6% 5% 13% 10% 9% 2% 8% 100% Pct% 13% 20% 22% 17% 14% 10% 4% 1% 100% Ponemon Institute Research Report Page 25 D4. What is your highest level of education attained? High school vocational University or college Post graduate Doctorate Other Total D5. Please check gender Female Male Total D6. Are you head of household? Yes No Total D7. US Region Northeast Mid-Atlantic Midwest Southeast Southwest Pacific Total D8. Please rate each one of the following statements using the following five-point scale.Strongly agree and agree sown. The Internet is central to my lifestyle I often give advice to others about how best t o use computers and software I need to ask for help if something goes wrong with my computer I always try to spend as little time as possible online I am often confused when I try to use the Internet to do things I am really concerned about online threats Only people who do risky things on the Internet are at risk to online threats I dont feel the online threat is that significantPct% 21% 22% 45% 7% 1% 4% 100% Pct% 53% 47% 100% Pct% 48% 52% 100% Pct% 19% 18% 17% 15% 12% 19% 100% Strongly agree 25% 19% 22% 16% 23% 18% 15% 18% Agree 32% 21% 23% 24% 24% 35% 28% 34% Ponemon Institute Research Report Page 26 Please contact us at 231. 938. 9900 or send an email to emailprotected org. Ponemon Institute Advancing Responsible Information Management Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issu es touch he management and security of sensitive information about people and organizations. As a member of the Council of American Survey Research Organizations (CASRO),we uphold inflexible data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable information from individuals (or company identifiable information in our business research). Furthermore, we have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper questions. Ponemon Institute Research Report Page 27