Saturday, August 31, 2019
Cyber Terrorism and Information Warfare
As the use of computer technology becomes wide, people have tended to use them both for beneficial and destructive purposes. As the use of computer technology becomes more, they continue to be used for more complex and inter-reliant threats to humanity. The use of computer technology for destructive purposes takes place in the form of cyber crime, cyber terrorism and information warfare. The focus of this paper is on cyber crime and information warfare. The two have a number of similarities as well as differences.They are both applications of computer and information technology that are in use in the society in the information era. Information has been relied upon in different sectors in different countries and around the world. This has made information a very powerful tool for the economy of many countries. Information has also become a target for criminal activities like terrorism and a target to wage war (Lewis, 2002). This paper discusses the similarities and differences between cyber terrorism and information warfare. The paper begins with the description of the two concepts. Cyber terrorismCyber terrorism is the use of computing resources to engage in terrorist activities. It can also be defined as the calculated use of computers or computing networks aimed at harming, or to further social, economical, political or ideological, or such goals. People have tended to use the secrecy afforded by cyberspace to wage terrorism activities towards communities or an entire country. This has tended to cause threat and panic to people without physical presence of the attacker. The terrorists using cyberspace target computers and information to cause harm and damage to the targeted group or nation.There have been claims by some factions of scholars that cyber terrorism does not exist and that what is referred to by the use of this term is information warfare. They feel that it is not possible to use computer technology to wage serious harm or damage in a population d ue to the availability of protective technology. However, it is a fact is that cyber terrorism is a concept that is applicable in the current world of technology (Brenner, 2006). Information warfare Information warfare on the other hand is defined as the use of computer technology to wage war.It can also be defined as the use and management of information and technology in order to gain a competitive advantage over one’s adversaries. Information can be manipulated in various ways to ensure that one country gains an edge over its opponents. Information has become a very crucial tool for use in different aspects of human life. Information has come to be used as a powerful weapon in times of clashes or conflicts. This warfare is closely associated with psychological warfare. The attacking country targets the information sector of the country that it is up against (Lewis, 2002).Similarities Both cyber terrorism and cyber warfare make use of information technology and/ or networks to carry out their objectives. Regardless of their difference in objectives, information is a critical tool for both cyber terrorism and information warfare. Information warfare can be carried out in different ways: jamming or hijacking of TV and radio transmissions; disabling logistic networks; disabling or spoofing communication networks of the enemies; and sabotaging stock exchange dealings (Lewis, 2002). These are all means of use of information in warfare.Cyber terrorism can also take various forms like attacks against networks of the target group or country; threats against a community or country that are made electronically; hacking into systems; defacing networks; and denying service to the target group. It is clear that both are destructive applications of computer and information technology. The users of both cyber terrorism and information warfare use and go after the information sector of the target group or country with the aim of causing havoc (Brenner, 2006).Both cyb er terrorism and information warfare are destructive, but have not been developed to the level of destruction like the other weapons, such as the bomb. The kind of damage caused by cyber terrorism and information warfare is not large-scale, although the technologies are still being developed. It would not be possible to carry out such a destructive act like the one that happened in the United States, commonly known as the September 11 attacks (Che, Deng, Chao & Huang, 2009).Despite the fact that there are some remote examples of cyber terrorism and information warfare in the world today, they are not as pronounced as those that use the conventional weapons like bombs. All the examples and instances that are provided on the use of information for warfare and terrorism cannot compare with the use of methods like bombing, air planes and other convectional methods. However, the possible destruction that is likely to happen due to the development in technology cannot be ignored. The two concepts, cyber terrorism and information warfare are based on computer and information technology.It is a known fact that technology is developing at a very speedy rate. As a result, the technology applied in both cyber terrorism and information is not the same way it was when the two concepts were developed. It is also a fact that they are likely to be more complicated and destructive. While most countries there are development of cyber warfare capabilities, there are individual factions and groups that are developing cyber terrorism capabilities (Che, Deng, Chao and Huang, 2009). Both cyber terrorism and information warfare are destructive processes that can cause terror and damage in a place or country where they are applied.Despite the fact that cyber terrorism is not likely to cause the kind of destruction like what took place during the September 11 attacks, they are likely to cause a security scare to the public. For example, it is possible for hackers to wage terrorism atta cks by hacking into hospital systems (Brenner, 2006). Another way that this can be carried out is by launching sequenced, coordinated attacks shutting down Automatic Teller Machine systems and other financial systems in selected towns or cities.When this is carried out in a large-scale, it can be realized that this is not a random act, but an organized terrorist attack. This can lead to panic about the security and economic damage to a country. Same case with information warfare; despite the fact that unlike cyber terrorism information warfare is not aimed at harming civilians and properties, it leads to both direct and indirect effects to countries they are aimed at and their citizens. Just like cyber terrorism, information warfare causes panic on the public as well as other economic effects on the country (Collin, 1996).For example, where transmissions are hijacked to pass on hate information or other destructive information, it is possible for people to be very scared for their s ecurity. Attacking economic sectors using information technology during war or as a weapon endangers the economic status of a country. In fact, paralyzing the information sector of a country leads to massive economic costs to that country. This means that these two applications of computer and information technology are very destructive and costly to the affected country (Lewis, 2002).Both cyber terrorism and information warfare are complex problems that need to be addressed very first in national security policies. They are becoming more sophisticated and require sophisticated means to counter. They are both attacks that can paralyze the infrastructure of a country completely. The use of information for terrorism and warfare is based on the premise that information has become a very crucial resource in development and has been relied upon by countries and organizations in their daily operations (Collin, 1996).The attackers have come to realize that the best part to hit and raise ha voc is the information technology sector. The information technology sector has become the most vulnerable point that can be hit to feel the greatest effect. Studies have found out that susceptibility of information networks and the critical infrastructure have put national security in dire risk. This can be supported by the fast growth in technology and its spreading to the economic sector of many countries. This is usually the target of cyber terrorism and information warfare.The users of these two applications of computer technology targets where a country will feel the most effect when hit. This is no better than the information sector of their target (Brenner, 2006). It is easy to spot real-world terrorism just as it is to spot real-world warfare. When dealing with real-world acts, terrorism or warfare is easier to identify, thus making it easier to counter. Where a real-life attack is carried out it is possible to know that the government is either dealing with terrorism or wa rfare. Simply put, it is easy to identify terrorism or warfare in the real-world.This is not the case with cyber terrorism or cyber warfare. Where these takes place, it is not possible to immediately identify what one is dealing with. There are no people who are physically available to carry out the acts. When a real-world terrorist attack is carried out, there will be a suicide bomber who hijacks a plane or bombs a building. In real-world warfare, there are military personnel with characteristic attire and characteristic badge. This way, it will be possible to tell that it was a terrorist attack or war against a particular group or country.This is not the case with cyber terrorism and information warfare (Lewis, 2002). The activities are carried in secrecy and most of the times unless someone claims to be involved, it might be difficult to identify the perpetrators. In case of information warfare, it might be hard to identify the country involved in the attacks. It is then possible that a country could be a target of cyber terrorism or information warfare and not even be aware of it. The two applications are complex and cannot be easily identified and dealt with (Che, Deng, Chao & Huang, 2009). DifferencesThe primary focus of information warfare is not to inflict injuries or death to civilians and property. Information warfare is not aimed at demoralizing or intimidating civilians. Cyber terrorism is aimed at the achievement of a particular objective. This is done mostly through intimidation and any other means as long as the message is communicated. Injuring people, causing death, and damaging property is one of the ways used to communicate the message. They achieve their objectives by destroying as much life and property as possible. Cyber terrorists do not mind the lives that will be lost or the damage that will be caused in the process.For instant, the terrorist attacks in Romania. This happened at an Antarctic research center where terrorists accessed th e computer resources that controlled life support systems. In the process, the lives of 58 scientists were put in danger (Kalathil & Boas, 2003). However, the perpetrators were stopped before a serious harm was caused. Terrorism generally is a destructive act that is carried out for selfish purposes, while information warfare is an act that is aimed at protecting a country from destruction by its enemies (Lewis, 2002).Information warfare is legal and mostly designed by the ministry of defense as a weapon of defense to a nation in time of war. As already mentioned, it is the use of technology to gain competitive advantage over the opponents. This means that it is not an illegal means of attack, like cyber terrorism. Most of the time, information warfare is carried out by the conventional military force. There are for example some nations that have trained or are training people who are referred to as hacker warriors. These hacker warriors are used in time of war to wage attacks again st enemy nation-states.Cyber terrorism on the other hand is dangerous and unlawful attacks towards a target group to further some selfish objectives. Cyber terrorism is carried out by people who are part of a faction that is united by an obligation to a particular political philosophy. The distinguishing factor from cyber terrorism is that war is a struggle between countries or nations states (Che, Deng, Chao & Huang, 2009). Information warfare is meant to be a collateral event. This means that the information attacks are aimed at protecting one’s country and its citizen.During war, the aim of the fighters is to protect one’s country and its people from adversaries. This means that the objective of information warfare is very different from that of cyber terrorism. In most cases, cyber terrorism is not a collateral event. It is used for selfish objectives of the attacking groups. It is also important to note that most of the times cyber terrorism is not initiated by la wful combatants. This means that the perpetrators do not operate legally as is the case during war (Brenner, 2006).Cyber terrorism is aimed at causing damage and harm to a target group for a particular objective of the attacking groups. Some of the objectives of cyber terrorism include ideological, political, religious, and in some cases economical. Unlike in cyber terrorism, war is restricted to attacks between groups (armies) who act on behalf of their countries in the war. The use of technology in this case is aimed at the army or armies of the enemy nations. In warfare, the use of information is rational and justifiable, unlike the use of terrorism attacks where the acts are irrational and cannot be justified (Lewis, 2002).Cyber terrorism is basically one-sided. This means that in most cases cyber terrorism cannot be reciprocated. In most cases, its anonymity characteristic makes it hard to find out the perpetrator(s). Cyber terrorism is aimed at a specific population to further the objectives of the attacker. On the other hand, information warfare is aimed at attacking adversaries. This means that unlike cyber terrorism, it is aimed at triumphing against one’s enemies. It is used against opponents during war and is just limited to that purpose (Che, Deng, Chao & Huang, 2009).Conclusion This aim of this paper was to make a comparison and contraction of the two concepts that apply information computer technology, cyber terrorism and information warfare. The two concepts differ in definition because while cyber terrorism is the use of computing resources to engage in terrorist activities, information warfare is defined as the use of computer technology to wage war. These concepts have a lot in common, from being based on computer technology, to the kind of effects they are likely to cause to a country and its people.They are both destructive effects of information and computer technology. They are however different from their motive, to the kinds of p eople who carry out the attacks. While cyber terrorism is an unlawful act aimed at causing intimidation in achievement of different objectives, information warfare is a lawful activity carried out by military personnel aimed at coming out victorious over opponents. These two activities have led to a security scare around the world due to the effects that they lead to. They are concepts that are supposed to be address in national security policies as a matter of urgency.Despite the fact that they have not become so open in the society today, with a few remote cases being reported, with the development in technology and over reliance on technology in different sectors, it is possible that they will increase. There is need to develop more sophisticated technologies to counter this. References: Brenner, S. (2006). C3: Cyber crime, cyber terrorism and cyber warfare. Retrieved on May 11, 2010 from http://cyb3rcrim3. blogspot. com/2006/06/c3-cybercrime-cyberterrorism and. html Che, H. , De ng, D. , Chao, H. & Huang, Y. (2009).â€Å"Next Generation of Terrorism: Ubiquitous Cyber Terrorism with the Accumulation of all Intangible Fears,†Journal of Universal Computer Science, vol. 15, no. 12. Collin, B. (1996). The future of cyber terrorism. Paper presented at the 11th Annual International Symposium on Criminal Justice Issues, University of Illinois at Chicago. Kalathil, S. & Boas, T. (2003). Open networks, closed regimes. Washington DC: Brookings. Lewis, J. (2002). Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats, Washington DC: Center for Strategic and International Studies.
Friday, August 30, 2019
Advertising and Older Consumers: Image and Ageism
In past years the market that most advertisers aimed towards was the Gen X group. Now many advertisers are shooting at the even younger Generation Y. The interesting thing is that many of these products advertised are items that all generations use, such as food, soft drinks, clothing, cars, entertainment, etc. Rarely are older generations revealed using these products in print ads or commercials. The Issue: This creates the issue to advertisers that they stereotype older generations and reinforce society's misconception that people over 50 are feeble, pitiable, or incompetent. In many cases advertisers do just this. Remember the commercial for Lifecall emergency alert device in the early 90's where the elderly Ms. Fletcher fell in her bathroom and, while lying there helpless, she calls out, â€Å"I've fallen and I can't get up.†Despite the importance of this product to seniors who live alone, the commercial quickly became the brunt of many jokes, including skits on Saturday Night Live and the Tonight Show. Could Lifecall have designed a better advertising campaign that would not have alienated or mocked its target market? This brings up the question of whether advertisers have a responsibility to change the mindset that being over 50 is old? Are they responsible to change the way society views 50+? Can they even change society's views of 50+? Absolutely! By utilizing cross-generational advertising, marketers can benefit the consumers, companies, advertisers, and society as a whole. The Stakeholders: 50+ Consumers – The nature of the 50+ age group is rapidly changing. Humans are living longer and are more active than ever before. They don't feel old and feeble, so why would they want to support product advertising that makes them appear weak and vulnerable? They don't. Advertisers/Corporations – Advertising is the primary source that companies use to inform and educate the public about their product while influencing consumers to purchase it. In the past marketers have primarily advertised towards younger generations because they have more impulsive buying behaviors. Also, according to the case, many executives in the marketing field are from younger generations; therefore, they create advertising campaigns with which they can identify. Society – The overall public, including the target market, views marketing campaigns. Almost everyone has access to publications and television that contain advertising directed at specific groups. For example, children watch the programs their parent's watch and parents watch children's programming. We are all exposed to advertising that might or might not be directed towards our generational market and it influences our opinions about those groups. Utilitarianism Theory: Cross-generational advertising is a method of marketing that illustrates many generations using the same products without segregating or degrading any generational groups. This will produce the greatest long-term benefits to the most number of stakeholders. First, using models from Generation Y through the GI Generation will create awareness and a better understanding of age diversity in the consumer market. In turn, stereotypes of older generations will be broken. This could lead to a social and economic breakthrough. Older generations will feel more accepted in society and will have the urge to be more active. As they become more active, greater consumer spending is generated which benefits the corporation's overall profits and its stockholders. Free Market Theory: According to the IPC Magazine survey identified in the case, 62% of women prefer to see women their own age advertising products towards them1. In addition the over-50 age groups claim the majority of wealth and generate over 51% of consumer spending in the United States2 (see Graph). If companies would advertise using over-50 models and actors, brand recognition would be established because the older consumers would identify with the advertisement and therefore purchase the product. If you look at this from a company's perspective, there is a substantial market vying for cross-generational advertising. Since the company exists to make money for its shareholders, what would be better than to target the market that possesses the greatest wealth and majority of consumer spending? Rights Theory: Companies have the right to advertise their products to the target markets of their choice. At the same time the consumer has a right to be informed without being misled or deceived. In many cases the messages that advertisements relay give consumers misperceptions about a particular generational group. For example, the majority of pharmaceuticals are advertised using 50+ models. Rarely are these models used for products such as apparel, soft drinks, or new cars. This gives the general public the misconception that anyone over 50 is sick, weak, and unable to use the products that â€Å"everyone†else uses. Justice Theory: When reviewing ageism in advertising, the over-50 population is treated less equitably. A cross-generational marketing strategy would allow 50+ models to advertise everyday products while still appealing to younger markets. This would compensate for past injustices to older generations by finally giving them an accurate portrayal in the media. Marketing campaigns could also incorporate models from different generations to distribute equal time and equal representation in advertising. In the end, future retribution will be given to millions of older Americans as age discrimination in the media is diminished. Social Contract Theory: In the end, advertisers need to gain the trust of their consumers. As long as they continue to mock older generations or ignore them all together, they run the risk of â€Å"punitive reactions – consumer boycott, regulation, media hostility, financial loss, and above all loss of reputation1.†They also owe society a picture of reality when it comes to the aging population. The Baby Boomer generation, with a population of 76 million, is the largest and most economically powerful demographic group in the US3. As a majority of this group has already passed the 50-year mark and the rest are soon to follow, an accurate depiction of our modern day aging process is needed because eventually everyone will pass through these same life stages.
Thursday, August 29, 2019
Thesis1
READING MATERIALS IN DEVELOPING VOCABULARY SKILLS OF FIRST YEAR EDUCATION STUDENTS AT PAMANTASAN NG CABUAYO CABUYAO, LAGUNA: AN ASSESSMENT S. Y. 2011-2012 A Thesis Presented to the Faculty of Pamantasan ng Cabuyao Cabuyao, Laguna In Partial Fulfillment of The Requirements for the Degree of Bachelor of Secondary Education Major in English by: Magallanes, Neressa B. Manago, Annie Vie A. Minor, Ma. Airene M. Sarinas, Mary Grace C. Villanueva, Elsa L. Villanueva, Lyn G. ACKNOWLEDGMENTS The researchers would like to take this opportunity to extend their heartfelt gratitude to those who contributed in the success of the study.To  our  parents  and  family,  for  loving  and  supporting  us  morally  and  financially. To Dr. Gaudencio L. Lat  for  being  considerate  and  understanding  in the administration of the study. To Professor Honeylie Buitre and Professor Mary Grace Laugico, for giving insights and helping us in the statistical treatment. To Professor Edwin  Paming for allowing us to conduct the test during his class. To Professor Michelle Morado, for her competent educational guidance and assistance from the very start until the completion of the study. To Mr.Ronnie Batiao for his assistance, valuable advices, and generous support. To Ms. Annie Vie Manago, for letting us use her laptop for the typing and editing of the manuscript. To Ms. Elham Kashef Saberi and Ms. Azadeh Kashef Saberi for their help, cooperation and generous support for the completion of this study. To our teachers, for sharing their knowledge and intelligence with the researchers. To our classmates, for sharing ideas, concepts and even mom ents inside and outside the classroom. The Researchers Vocabulary skills, in particular, are important.Why is it important? What are the advantages one can get from gaining a wide range of vocabulary? How do we learn from reading materials? Is reading materials a significant factor in one’s learning ability? It is a fact that reading materials helps in developing the vocabulary skills of the students. They become well informed by reading different reading materials such as educational books, journals, newspapers, dictionaries, and magazines. Most knowledge is transmitted to the printed page or electronically through the World Wide Web.However, based on the results of the study, exposure to reading materials does not necessarily mean that you are skilled in terms of vocabulary. There are many factors which needs to be considered such as the age, gender, preferred reading material, reading styles and socio-economic status. The main aim of this study is to determine how reading materials help develop vocabulary skills of First Year Education of Pamantasan ng Cabuyao. How does their learning styles, age, socio-economic status affects the development of their vocabulary skills? Summary of Findings:The following are the findings of the study: 1. Majority of the respondents with the frequency of 38 at 38% belong to 17 years of age. Female respondents register at a frequency of 80 comprising 80% of the total number of the respo ndents. Most of the respondents  belong to the middle class at a frequency of 55%. 2. The  following are the results of a series of tests which reveals that majority read books with weighted mean of 3. 81, which implies that the students often read books rather than magazines, dictionaries, journals, and newspapers. . In a series of test conducted, it shows that book is the common reading material read by the students which helps in developing vocabulary skills. 4. The comparative analysis  resulted in the significant relationship between the exposure to the different reading materials and vocabulary skills development of the respondents. 5. The results of the series of the tests revealed that  silent reading is the preferred reading style of the students which helps them develop their vocabulary skills, with a weighted mean of 2. 3 and is verbally interpreted as the highest rank among other reading styles. Summary of Conclusions: Based on the above stated results of the investigation, the following conclusion are drawn: 1. A typical respondent of the study is a female  First Year Education student of Pamantasan ng Cabuyao belonging to the age of 17. Furthermore, the results   showed that more or less half of the respondents belong to the  middle class as to their socio- economic status with a frequency of 55 (55%). . The First Year Education students of Pamantasan ng Cabuyao choose to read books frequently rather than magazines, dictionaries, journals, and  newspaper  which could help them in developing their vocabulary skills. 3. The common reading materials has no bearing on developing vocabulary skills of  the First Year Education students at Pamantasan ng Cabuyao. 4. Different reading materials has no bearing on developing vocabulary skills of  the First Year Education at  Pamantasan ng Cabuyao. 5.Silent, oral, and extensive reading are the top three that is most preferred reading styles of the First Year education Students at Pamantasan ng Cabuyao  that helps develop their vocabulary skills. Recommendations: Based on the result and conclusion of the investigation, the researchers hereby recommend the following:  1. The school must provide interesting reading materials appropriate to the age of the students . Therefore, the  reading materials must be of general interest to all  readers  both female and male.Reading materials that contains interesting facts and trivia’s tend to attract readers from both gender. The results also shows that most of the students  from the College of Education  belongs to the middle class, butà ‚  it does not mean that those students   from low, higher and highest class should be satisfied with their vocabulary skills. They are recommended to read more, especially  English in order for them to improve their vocabulary skills that will be necessary in their future professions.It also recommended that the government should provide reading materials in every schools. 2. The school must provide more interesting reading materials in the library and the teachers should require to their students to go in the library to read newspapers, journals, magazines, books, and dictionaries. They will be motivated  to read if the reading materials provided for them concerns the affective domain. 3. More reading and vocabulary e xercises are recommended for further enhancement of the students vocabulary skills.Even though the students preferred to read books as the most common reading materials which helps in developing vocabulary skills, the  teachers should  promote and motivate  the students to read other reading materials. Teachers should also motivate the students to read magazines, newspapers, journals and dictionaries. 4. It is recommended that students and teachers must read more different reading materials and make as a daily habit in order to develop their vocabulary skills.Also recommended that teachers should consider the different reading materials that will be used and its significance, they should consider the individual differences  of  the stud ents in motivating   them to read. 5. The reading styles of the students should continuously indulge  themselves in reading for them to improve their vocabulary skills. Although some of the  respondents got average scores in the test, it is not a reason for them to be satisfied.They are still recommended to read newspaper, magazines, journals, dictionaries, and books  so they can enhance their vocabulary skills and become effective teachers in the future. TABLE OF CONTENTS PAGE TITLE PAGE†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ i APPROVAL SHEET†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. ii ACKNOWLEDGMENT†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ iii ABSTRACT†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ iv TABLE OF CONTENTS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. v LIST OF FIGURES†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. vi LISTS OF TABLES†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. vii Chapter I: THE PROBLEM AND ITS BACKGR OUNDIntroduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 1 Background of the Study                                                                Statement of the Problem†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦3 Hypotheses of the Study†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 4 ObjectivesÂ Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â à ‚                                               Scope and Delimitations†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦. 5 Significance of the Study                                 Theoretical Framework†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 6 Definition of Terms†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 9 Chapter II: REVIEW OF RELATED LITERATURERelated Local Literature†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 12 Related Foreign Literature                                                             Related Local Studies†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 17 Synthesis of Related Literature and Studies†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 19 Chapter III: RESEARCH METHODOLOGY Research Design†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 21 Respondents of the Study                                                               Data Gathering Tools/Instrument†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 22 Data Gathering Procedure Statistical Treatments of DataChapter IV: PRESENTATION, ANALYSIS, AND INTERPRETATION Profile of the Respondent†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 26 Statistical Treatment†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦27 Reading Styles of the Respondents†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 28 Chapter V: SUMMARY, FINDINGS, CONCLUSIONS, AND RE COMMENDATION SUMMARY†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦32 CONCLUSIONS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 33 RECOMMENDATION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 34 APPENDICES Bibliography Survey Questionnaire Curriculum Vitae LIST OF FIGURES FIGURE 1: CONCEPTUAL PARADIGM LIST OF TABLES 1. Table 1. . The percentage distribution of the respondents according to age. Table 1. 2 The percentage distribution of the respondents according to gender. Table 1. 3The percentage distribution of the respondents according to socio- economic status 2 &3. Table 2&3. Kinds of reading materials, common reading materials and fr equency of reading that helps in developing vocabulary skills. 4. Table 4. Test of Hypothesis for Pearson Correlation Coefficient Value 5. Table 5. Reading styles of the students which helps them develop their vocabulary skills.Chapter 1 THE PROBLEM AND ITS BACKGROUND Introduction Reading is the basic tool in learning other subjects taught in school. It   is also an instrument in understanding the different subject areas like arithmetic, science, social studies, English and other  subjects depending on the ability to read. Some students are able  to sound words although they do not know what the  word means. In the real sense this is not reading, what the students do is nothing  but word  calling (Galves,2005).When we read, th ere must be comprehension, otherwise no learning takes  place. Some of the students nowadays are fond of reading books. Some  understand what the author wants to convey while others cannot, others  just simply read it without analyzing the words  used, or simply for fun and entertainment only. On  the  other  hand, some would consider it as a habit. Reading books affect the student’s or learner’s way of thinking, the way they act, the way they communicate and interact with other people.It proves that learning is limitless because some are not contented in one reference only. Reading is a good hobby, yet it needs proper parental guidance to prevent the child or youth in reading books or any reading  material which is inappropriate for their age level . Students often get addicted in reading, especially pocketbooks, and tend to disregard their assignments and even their duties at home. Reading is a good, meaningful and relaxing way of spending your past time, instead of playing cards , window shopping, and  hanging out with friends.By reading, you will learn more, it will broaden your mind and help you understand what is the reality of life. Sometimes, it changes people’s perception or views in life and somehow develops and enhances good personality, because of the ideas and knowledge earned from what has been read. According to Cziko et al (2000) reading is sharing and get ting information and idea from the text. Many people think of reading skills which is taught once  and for all on few years of school.More often credits (or blame) for students reading ability goes to primary teachers. Upper elementary and secondary school teachers at grade level only need to teach new concepts relevant to their students ability to comprehend. See this way, reading  process; readers decode each word in a text and then automatically comprehend the meaning of the words as they do their everyday  spoken  language. Reading  makes  our  mind active because it is significant to apply   the acquired knowledge  in our daily lives.Our  imagination expands   and enhances  our cognitive ability through what the readers have read. Also, through reading , ability to analyze and evaluate the text to criticize or make some conclusion is also developed. In  reading, you  recognize the structure of grammar. A child exposed in   reading earlier in his/her childhood  stage   provides exercise in his/ her mind. It   also develops their cognitive ability and improves their intelligence.It is for this reason that the researchers will undertake this study and use the first year Education students as the  respondents; the purpose is to find out how students would cope with their education by means of determining the reading materials  that could enhance the vocabulary of the students. Objectives 1. To determine the vocabulary development of the respondents when grouped according to:  1. 1    Age 1. 2    Gender 1. 3    Socio-economic status 2. To determine the kind of reading materials being read and the  frequency of reading. 3.To determine what reading materials commonly read by the students helps in developing their vocabulary skills. 4. To determine the significant relationship between exposure of different reading materials and developing the vocabulary skills of the students. 5. To ascertain  the reading styles of the students in developing vocabulary skills. Statement of the Problem This study will attempt  to find out on how reading materials help in developing the vocabulary skills of the students/learners particularly in selected First Year Education students (BSED and BEEd) at PnC.Specifically, the study will be answering the following questions: 1. What is the demographic profile of the respondents in terms of: 1. 1  Age; 1. 2 Gender; and 1. 2  Socio-economic Status? 2. What kind of reading materials are being read and the frequency of reading? 3. What are the common reading materials read by the students that helps in developing their vocabulary skills:             3. 1 Books; 3. 2. Magazines; 3. 3. Journals; 3. 4. Newspapers; and 3. 5. Dictionary? 4.Is there any significant relationship of exposure in different reading materials and  developing vocabulary skills of the students? 5. What are the reading styles of the students which helps them to develop their            vocabulary skills? Hypothesis of the Study To be able to answer the above questions, the study divided the following hypothesis. Null hypothesis- There is no significant relationship between exposure to different reading materials and the vocabulary skills of the students.Alternative hypothesis- There is a significant relationship between exposure to different reading materials and the vocabulary skills of the students. Objectives 1. To determine the  vocabulary development of the r espondents when grouped according  to: 1. 1  Age; 1. 2  Gender 1. 3  Socioeconomic status 2. To determine the kind of reading materials being read and the  frequency of reading. 3. To determine what reading materials commonly read by the students helps in developing their vocabulary skills. . To determine the significant relationship between exposure  of different reading materials and developing the vocabulary skills of the students. 5. To ascertain  the reading styles of the students in developing vocabulary skills. SCOPE AND LIMITATION This study limits its coverage on first year Education students at Pamantasan ng Cabuyao, Laguna. It’s main purpose is to determine the effectiveness of reading materials in developing  vocabulary skills of the respondents.In  this study, the researchers limit the use of English reading materials on the following:  educational books, journals, magazines, newspapers, and dictionary. The researchers limits their reading styles in oral, silent, scanning, skimming, extensive, and intensive types of reading. DELIMITATION This study did not cover  other courses, year levels, other reading materials other than educational books, journals, magazines, newspapers, and dictionary and reading styles other than oral, silent,, scanning, skimming, extensive, intensive reading styles of the respondents.SIGNIFICANCE OF THE STUDY This res earch study wants to gain information on the reading materials in developing  vocabulary skills of selected First Year Education students at Pamantasan ng Cabuyao, Laguna, school year 2011-2012. This will serve as the  springboard or basis to improve the vocabulary skills of the students. School Administrators. The result can be used as the basis for providing reading materials taking into consideration the needs of college students in developing their vocabulary skills.School Instructors and Professors. The findings  of the study could help instructors and professors to identify the reading materials being used where they have to apply certain techniques and strategies in relation of developing vocabulary skills. Students. The  result  of  the study may provide the concerned pupils how to broaden the vocabulary skills. Theoretical framework: Robert Gagne’s Information Processing Theory or Information-processing Approach  (1950).The two theoretical ideas considered fundamental to cognitive psychology and information processing framework were â€Å"chunking† and the  test-operate- test-exit (TOTE). Chunk is any meaningful unit of information and is good or appropriate for the capacity of the short-term memory, like for example familiarizing any digit, word, chess positions, or students’ faces. It implies that short-term memor y could only hold 5-9 chunks of information either seven plus or minus two. TOTE can possibly replace the stimulus response as fundamental unit of behavior.Here, there is aconduction of testing cycle which is repeated for several times to determine the success of its operation until the goal is achieved which can be a good foundation for problem- solving tasks. Origin of information processing theory began in cybernetics, game theory, communication theory and information theory which gained its popularity when these things reach their full development. This theory likened the mind to a processing system where knowledge i s represented in the form of symbols.It is important to study information-processing approach in order to understand how information is encoded,  processed, stored, and retrieved. In  sensory registers, information from external environment is represented in its original sensory form where there is a separate register for each sensory modality like visual, auditory, tactile, kinesthetic, or olfactory that can hold large amount of information, yet only for a matter of milliseconds. Information can be lost at the end of that time unless it can be described during the  pattern recognition process.Short-term Memory System (STM) functions in two important ways: 1) it organizes information by integrating new information with the existing information and 2) it temporarily stores information for  the learners’ use (Kameenui, Carnine, Dixon, Simmons, & Coyne, 2002). Also known as the  working memory, the short-term memory system has a smaller capacity, but its representations are more durable. In STM, we utilize different strategies and techniques to remember or solve problems.Limited pieces of information only can be stored, and for a short period of time. On the other hand, if we do some cognitive operations on the data, we can store them in the  long-term memory (LTM). Data that is stored at the LTM is expected to be stored indefinitely, and is labeled as verbal or visual information for future use; it includes the episodic and semantic knowledge. There are several ways to develop/strengthen the short-term memory system these are repetition, chunking, identification of logical patterns  Brownell (2002).The Long-term Memory System  (LTM) is a warehouse of knowledge. It is also known as data bank that stores information likened to a floppy disk, hard desktop USB that stores huge amount of information. When we perceive something with our sensory modalities, we are able to form and arrange  information in to meaningful order as we progressively make connections in our brain. The group of neurons help us integrate knowledge, arrange it, and utilize it in a meaningful context so we can understand the everyday occurrences.For sensory input to be effective, all our senses should be fully operational. A student who cannot  see or hear better is not in better condition to attend to and process the environmental stimuli. Brownell (2002) also identified certain LTM techniques they are association, categorization, mediation, imagery, and mnemonics. Aquino (2009). According to Lockhart (2000) that in recall, you produce a fact, a word, or other item from me mory. Fill- in -the- blank tests  require that you recall items from memory.In recognition, you select or otherwise identify an item as being one that you learned previously. Working memory holds only the most recently activated  portion of long-term memory, and it moves these activated elements into and out of brief, temporary memory storage ( Dosher). Conceptual Framework: Input Process Output Definition of Terms The following words are used operationally in this study: Communication.This refers in giving or receiving of information, this can be done by gestures, writings and by talking. Comprehension. This refers to the readers understanding to what the author has written. according to the expert, it requires the fusion in meanings of separate words  into chain of related ideas. Decode – Figure out how to pronounce. Education – This refers to the acquisition of knowledge, skills, abilities and attitude, through instruction and training. Effectiveness. This word refers to an expected response. It is synonymous to the word  success.Extensive reading. Comprehensive  reading of long texts or books for the expres purpose of discerning global meaning images is the art of extensive reading. It is reading imaginatively, creatively, and critically. Intensive reading. This reading strategy which is  characterized by deliberate attention and    deep concentration. It  is  reading for details. Learning. This refers to the psychological activity in development such as acquisition   of  symbol knowledge or motor skills, and as intellectual and   creative process.Long term memory. Warehouse of knowledge and also known as data bank that stores information  likened to floppy disk, hard disk, or USB that stores huge  amount of information. Reading. Refers to the recognition of printed or written symbol, which serve as stimuli  for the recall. Reading  Interest. This refers to the pleasure or enjoyment of someone when interprets or understand a reading materials. Sensory  Register. Information   from external environment is represe nted in its original sensory  form.Scanning. The research for a specific information or for an appropriate answer to a particular question is referred to as scanning. Skimming. As a  strategy, skimming refers to the method of glancing rapidly through  the reading selection or text for the purpose of extracting the thought , the gist or main points. Short term memory. Temporarily stores information for the learner’s use, also known as  the working memory. It has a smaller capacity but its representations  are more durable. Chapter 2RELATED LITERATURE AND STUDIES The literature that follow are taken from different authors that enlighten the researchers on angle and aspects of the current study. RELATED LITERATURE Local Literature Rea ding is a dynamic process in which   the reader interacts with the  text to construct  meaning. Inherent in constructing meaning is the reader's ability to activate prior knowledge use reading strategies and adapt to the reading situation. (Ma. Cecilia Crudo 2005) Foreign LiteratureThe importance  of vocabulary to life success makes it of practical importance for Investigation (Hoff 2007). Executive functioning refers to a variety of related cognitive skills that involve the ability to maintain task-relevant information in short-term memory, as well as the ability to manipulate this information through the engagement of focused attention (National Institute of Child Health and Human Development Early Child Care Research Network [NICHD ECCRN], 2005; Wolfe Bell, 2007).Among these skills are working memory and cognitive inhibitory control, both of which are associated with frontal lobe function. Children who are able to engage in goal-directed behavior by reducing their attention to distracting stimuli, either internal or external, demonstrate such skills. When in a  learning situation with other children or adults, increasing levels of shyness may be associated with a decreased  ability to focus attention on the task at hand.Exploration of, and engagement with, the environment fosters the developm ent of vocabulary (Hart, 2004; Horn & Blankson, 2005;). Family environments provide opportunities for the development of vocabulary. Individuals who are reared in home environments that encourage exploration have many opportunities for the  development of vocabulary.Indeed,  research  has repeatedly supported the proposition that opportunities for productive activityâ€â€the extent to which toys and learning materials are available in the home environment, along with the extent to which parents directly teach their child concepts and take their child to places and events that provide enrichment–are positively related to vocabulary (Bradley & Corwyn, 2005; Bradley,Corwyn, Burchinal, McAdoo, & Garcia Coll, 2001 ;).Research also indicates that engagement in productive activities is related to attention focusing and memory, both of which are elements of executive functioning (NICHD ECCRN, 2005). Swerling (2005) opines that reading of text-such as books, magazines and newspapers, plays a key role in developments of reading fluency (speed and ease of reading), vocabulary, background and even spelling.Memory is the means by which we retain and draw on our  past experiences to use that information about past experience( Tulving 2000; and Craik,2000). As process, memory refers to the dynamic mechanisms associated with storing, retaining, and retrieving information about past experience (Hernandez Blase, 2003). Specifically, cognitive psychologist have identified three common operations of memory: encoding, storage, and retrieval(Baddeley,2000).According to Lockhart,(2000) that in recall, you produce a fact, a word, or other item from memory. Fill- in -the- blank tests require that you recall items from memory. in recognition. RELATED STUDIES Foreign Studies According to Ehri and Rosenthal (2011),  an experiment with different assignments was conducted to  examine the effectiveness of a technique to acquire unfamiliar English vocabulary words during text reading.Lower socio-economic status, language  minority fifth graders (M = 10 years, 7 months n = 62) silentlyà ‚ read eight passages each focused on an uncommon multi-syllabic word that was underlined, embedded in a meaningful context, defined, depicted, and repeated three times. Students were grouped by word reading ability, matched into pairs, and randomly assigned to one of two conditions. In the strategy condition, students orally pronounced the underlined words during silent reading.In the control condition, students penciled a check if they had seen the underlined words before but did not say the words aloud. Results of ANNOVAs showed that the oral strategy enhanced vocabulary learning (ps ; . 01), with poorer readers showing bigger effect sizes than  better readers in remembering pronunciation-meaning associations and spellings of the words. In a second experiment, 32 fifth graders from the same school described the strategies they use when encountering uncommon words in context.Better readers reported more word-level strategies whereas poorer readers reported  more text-based strategies. Our explanation is that application of the word-level strategy of decoding new words aloud strengthened connections between spellings, pronunciations, and meanings in memory compared to silent reading of new words, particularly among poor readers who were less skilled and less likely to use this strategy unless   instruc ted to do so.According to Derakhshan and Shahrzad (2011), a solid body of research findings substantiates that most vocabulary, in first, second or foreign language, is learned incidentally which is defined as learning vocabulary as a by-product of any activity not precisely geared to vocabulary learning.Therefore, the present  study mainly focused on the effect of teaching and intervention in deriving  word meaning on incidental vocabulary learning in EFL context; secondly, it aimed to find out whether the contextualized words that appear with more clues learned better and consequently kept longer; finally, it sought to explore whether instructio n could lead to increase in incidental vocabulary learning in the text. To  these ends, 50 freshmen Iranian college students  from Teacher Training University of Azerbaijan participated in this study.These students enrolled for the reading class in two separate semesters. The results of the TOEFL and Vocabulary Level Test (VLT) revealed that the participants enjoyed approximately the same level of proficiency. There were two post-tests which were taken  at certain time intervals. The results of this study showed that the instruction in deriving word meaning had positive effect on students' incidental vocabulary learning. Also it was concluded that students should meet  the words in contextualized forms more frequently in order to keep and retain them in the long run.Beck, McKeown and Kucan, (2002), there is tremendous need for more vocabulary instruction at all grade levels by all teachers. The number of words that students need to learn is exceedingly large; on average students should add 2,000  to 3,000 new words a year to their reading vocabularies. Students who enter school with limited vocabulary knowledge. At first-grade, high – performing students, but that differential gets magnified each year, resulting in igh-performing 12th grade  students knowing about four times as many words as the low-performing 12th graders(Hart and Risley, 2001). According to Hirch(2003), word knowledge is crucial to reading comprehension and determines how well students will be able  to comprehend the texts they read in middle  and high school. Comprehension  is far more than  recognizing words and remembering  their meanings. However, if a student’s does not know the meanings of a sufficient proportion of the words in the text, comprehension is impossible.Vocabulary experts agree that adequate reading comprehension depends on a person already knowing between 90 and 95 percent of the words  in a text. Knowing at least 90 percent of the words enable the reader to get the main idea fro m the  reading and guess what many of the unfamiliar words mean, which will help them learn new words. Readers  do not recognize at least 90 percent   of  the words will not only  have difficulty comprehending the text, but they will miss out on the opportunity to learn new words.Piksuki  and Chard (2003), young children naturally learn to communicate through listening  and  speaking. In order to make the transition to communicating through reading and  writing, they need a large meaning vocabulary and effective decoding  skills. There is an  abundance of  research evidence to show that an effective decoding  strate gy allow student not only to identify printed words accurately but to do so rapidly and automatically. Juel  at al. 2003) showed that while teachers  in kindergarten spent  considerable time reading and  discussing books  to children with below average  vocabularies, these activities had minimal impact on the progress of the children. Only when teachers spent focused on time on the vocabulary did significant growth occur . We apply the term â€Å"instructional read aloud†  to read aloud events where,  to stimulate an interest in books in reading, there also a deliberate teaching of skills that will promote independence in reading,  such as an increased vocabulary.Local studies According to Garcia (2006)  if children will not read, they are less likely to develop automatically, vocabulary and concepts about the world as well as intrinsic motivation to read. In a book by Villamin et al, (2001) different levels of thinking was classified with interaction between the reader and the text may occur, which are literal, inferential, critical, and creative. However, it is in the creative level of comprehension that the reading, in its fullest sense, is said to truly occur.Dr. Thomas C. Barrett developed a taxonomy now popular known as â€Å"The Barrett Taxonomy of Re ading Comprehension† to meet the needs of teachers and instructional materials developers   who wanted a systematic, structural approach to teaching reading skills. (Alcantara et al, 2003) Literal comprehension is the understanding of surface meanings or idea that are explicitly printed in  reading materials. It is merely determining what the writer or idea that are explicitly printed in reading material.It is merely determining what the is conveying. Comprehending at the inferential level involves determining relationships and drawing from these the writer’s intended meanings which are implied in the reading material. Reading at the critical level requires the reader to judge the worth of ideas presented and the effectiveness of presentation. Reading at the creative level involves the integration of  bright ideas read with prior knowledge and experience so that the new ideas and deeper insights are formed.This levels of comprehension follow an ascending sequence of difficulty  and complexity of thinking – with literal comprehension as the lowest level while creative comprehension at the highest. Thus, comprehension is not just â€Å"understanding,†  but feeling the emotional experience embedded, reasoning, judging, and creating. This thinking processes may not necessarily follow a hierarchal  sequence for the reason that comprehension may occur any level of thinking. All reading require a considerable amount of understanding the literal sense â€Å"of what is read.  And fully gain from the reading experience and enjoy it as well, the reader must go beyond the literal level of comprehension and reach the heights of the creative level. In some classroom,  teachers are trying out several techniques to see which would facilitate comprehension – language experience, dimensional approach, program instruction, diagnostic – prescriptive method, semantic webbing/mapping, story grammar etc. The last approach seems to offer possibilities of integrating some basic communication skills that enhance comprehension.A careful scrutiny however, reveals that the grammar is not an entirely new technique. (Alcantara et al, 2003) Assessment of Related Literature and Studies The related literature summed – up has significant relationship with the present study for the reason of presenting the definition of the word  reading and its significance in vocabulary development, the importance of interests in reading and it also enumerated different reading materials which is subject of this present day.The study conducted by foreign and local researchers has bearing because of the other similarities  of other variables with the present study. The  researchers of the  present study cleared that there is no duplication, the similarities are necessary to  find out if the findings are true and valid in other places. Synthesis In reading, one must possess a wide range of vocabulary. A reader’s vocabulary is valuable in reading comprehension. A reader with a good amount of words in his vocabulary is able to grasp the meaning of the words.One disadvantage of a poor vocabulary is the reader will consume more time in searching for the meaning of a certain word. Chapter 3 RESEARCH METHODOLOGY The objective of the research would not be realized without a plan or strategy. This chapter presents the method, instrument use, source of data, validation, administration, and collection of questionnaires, presentations of the respondents of the study, and the statistical treatment of the data. Research DesignThe researchers used the descriptive method of research to elicit answer to the statement of the problem in the study. Descriptive research is defined by Arevalo (2005), as a fact finding research with sufficient interpretation. The researchers used this research design because the main purpose of descriptive  method is to measure the variable or factors in a certain study. Thus, this surv ey can measure the  vocabulary skills of Education students at Pamantasan ng Cabuyao. Respondents  of the StudyThe  subject of  this study consisted of selected First Year Education students at Pamantasan  ng Cabuyao. Their total   population  is equal to 130. The proponents is able to select 98 of its members 75%  of their total number. In simple random sampling technique was utilized in choosing the sample members. In determining sample size, the Slovin’s formula was used. The computation of the sample size was given below. N=   = = = 98 Where n = sample size; N = population size; and e = margin of error (either 0. 01 or 0. 05) Development  of Research InstrumentsIn   preparation  of  the  questionnaire the major research  instrument  used   by the researchers is the consultation of several knowledgeable persons and gathering of information through educational books. The researchers also make it a point that the items are sufficient enough  to answer all the specific questions under the statement of  the problem. After the final draft of the questionnaire, the researchers submitted it to the thesis adviser for necessary corrections, after which it was finalized. Data Gathering ProcedureThe researchers conducted this study and gathered data by distributing que stionnaires to be answered by selected respondents. Before working on this research, the researchers asked the permission of the Dean of College of Education at Pamantasan ng Cabuyao to conduct the study through the distribution of questionnaire to the respondents. After the researchers has secured the letter of permission from the Dean, the researchers personally administered the distribution of questionnaire to the respondents in their respective classroom.After the respondents  had answered the questionnaire, the researchers checked the answer sheets. The raw scores were collected and tallied in tables. The results were analyzed and interpreted in the light of the goals of the study. Validation ofà ‚ Research Instrument For validation purposes, the researchers read several theses and consulted English teachers for the questionnaire. It was validated through the students of the same level from other school before it was administered to the  respondents. Statistical Treatment of DataAfter  the data gathering, the data were tallied, analyzed, and interpreted using statistical tools. To determine if  there is a relationship between  exposure  to  reading  materials and  vocabulary  skills of         Selected First Year Education students at Pamantasan ng Cabuyao ,the correlation  was  established  using  Pearson  Coefficient  of Correlation. (http://davidmlane. com/hyperstat/A51911. html) The formula is Where: N – number of respondents X – first variable Y – second variable r -relationship The following are the statistical treatment applied in the study.The frequency and percent distributions were used in presenting the reading materials in developing the vocabulary skills of first year education students of Pamantasan ng Cabuyao. The percentage formula is: %=  x 100% Total frequency 1. Percentage 2. Weighted mean 3. Pearson Value Interpretation for Computed Mean |Weighted Mean |Interpretation |Symbol | |0. 505-1. 500 |Never |N | |1. 505-2. 00 |Seldom |Se | |2. 505-3. 500 |Sometimes |So | |3. 505-4. 500 |Often |O | |4. 505-5. 500 |Always |A | 4. Test of Hypothesis Tc l = r Decision rule: At 5% level of significance, If tc
Wednesday, August 28, 2019
The English Disease, an explanation of how and why people become Essay
The English Disease, an explanation of how and why people become involved in football hooliganism, and how the state deals with it - Essay Example The research also evaluated the current state of laws and measures and found them to be both insufficient and at times redundant to curb football hooliganism. The research recommends that the state move away from treating football hooliganism as just another crime. Instead, there is a need to undertake an exhaustive study into the reasons why football hooligans operate. Once these reasons are know, the state needs to build up partnership with local communities, schools and families in both preventing and reporting incidences of football hooliganism. There has been an increased in the incidences of football fans creating havoc and indulging in fights before, during and after the matches of their favourite teams. These incidences are seen as a revival of what had come to be known as football hooliganism and had plagued the game in the 1960s through the 1980s. The term, ‘football hooliganism’, itself is defined in various ways and includes several different acts of vandalism. Football hooliganism has largely been described in the media as acts of violence and chaos created by the fans of football clubs during the matches. The term is also inclusive of acts of violence and even gang wars that may occur at a much later period after the matches are over or before they have begun, and would include fan clubs and gangs. Though, football hooliganism is recognized by the state as a crime that leads to arrests and punishments, the term itself has not been clearly defined in legal terms. The current paper endeavours to arrive at a conclusive understanding of the term football hooliganism and to develop a holistic definition for the same. With this, it is expected that insights could be gained for developing better prevention and penal programs. Moreover, the phenomenon of football hooliganism that had originally been noticed in the early 18th century has
Managing Corporate Finance - MBA Programme Research Paper
Managing Corporate Finance - MBA Programme - Research Paper Example With a net debt component of  £679 million in the capital base and  £700 million as equity capital the interest coverage ratio of the company was comfortably placed at 46.0 times in 1996. However, this ratio could not be sustained for long as in the immediate year it fell to 6.7. This may be due to the additional debt of  £262 million issued by the company in 1997. But in the following two years it discharged its debts worth  £10 million and  £176 million respectively. Interestingly, even after the discharge of this debt, the interest coverage ratio declined to 6.7 times. This may be due to the influence of macroeconomic factors like increase in interest rates. The interest rates prevailing in the UK in 1996 was in the range of 6 - 6.25 %. For the most part of the year, the monetary authority kept reducing the interest rate by 0.25 percent. But thereafter the interest rates in the UK started moving upwards. It reached up to 7.25 percent by the end of 1997. This was an increase of 100 basis points over the last year. This appears to be the main reason for the high-interest amount paid by British Energy in 1997. After this the company was running in losses till the next two years. It recorded a loss of  £4292 million in the financial year 2002-03. The Executive Chairman tried to assure the investors of the financial stability of the company but this did not pay off as in the Financial Services authority suspended the dealing of British Energy shares. This forced the company to seek government support of  £650 million.Â
Tuesday, August 27, 2019
Examination of Sadie Bennings Video Diaries Essay
Examination of Sadie Bennings Video Diaries - Essay Example There are many theoretical points which Russell points out in her article to prove the validity of her interpretation in Benning’s work. These would be:   †¢Ã‚ A Sense of self stuck in understanding and surveillance. Russell is backed by Walter Benjamin to justify that personalized experience and observation play paramount roles in auto ethnography (Ho, 12). For example Benjamin argues that â€Å"Theory the philosophy and intellectual life as inseparable from his own experience of modernity and his identity as a German Jew.†Here Benjamin does permeate his script in the form of experience as opposed to quintessence. He perceived his own life as a composition of public reality this if sensed keenly, Susan Back-moss argues that â€Å"no individual could live a resolved life in a social world that was neither.†(p.276) †¢Ã‚ Dramatization of subjectivity. Russell says that it is â€Å"no longer essential to have a revealing of the essential sel f but a representation of self as a performance This is a position of â€Å"discursive anxiety and articulations.†It is in the text depicted that, auto ethnography is the most likely to be the truck and the strategy that shall be used for exigent of obligatory outward appearances of individuality. It is too used for exploring the discursive potential of inauthentic subjectivities†¢Ã‚ Ethnography as structure of self-fashioning. Russell argues that the ethnographer represents himself as the as a â€Å"the fiction that does inscribe the doublings within the ethnographic text†.... These would be: A Sense of self stuck in understanding and surveillance. Russell is backed by Walter Benjamin to justify that personalized experience and observation play paramount roles in auto ethnography (Ho, 12). For example Benjamin argues that â€Å"Theory the philosophy and intellectual life as inseparable from his own experience of modernity and his identity as a German Jew.†Here Benjamin does permeate his script in the form of experience as opposed to quintessence. He perceived his own life as a composition of public reality this if sensed keenly, Susan Back-moss argues that â€Å"no individual could live a resolved life in a social world that was neither.†(p.276) Dramatization of subjectivity. Russell says that it is â€Å"no longer essential to have a revealing of the essential self but a representation of self as a performance This is a position of â€Å"discursive anxiety and articulations.†It is in the text depicted that, auto ethnography is the most likely to be the truck and the strategy that shall be used for exigent of obligatory outward appearances of individuality. It is too used for exploring the discursive potential of inauthentic subjectivities Ethnography as structure of self-fashioning. Russell argues that the ethnographer represents himself as the as a â€Å"fiction that does inscribe the doublings within the ethnographic text†: â€Å"It fashion and individual with the authority to represent and to interpret and even to believe though with ironical aspects the truth that surround the discrepant world†. The other aspect includes the oxymoronic label of auto ethnography. This is announcing of the full go kaput of the colonialist teachings of the ethnography and the critical gusto for it’s variety
Monday, August 26, 2019
Analysis of Important Project Management Factors Essay
Analysis of Important Project Management Factors - Essay Example Though, many researchers have presented a wide variety of ethical theories for other disciplines. But still there is not considerable progress in the field of project management (Siguroarson, 2009; Mingers & Walsham, 2010; Stahl, 2008). In the past few years there have emerged massive changes in the field of information technology. In fact, it has changed the world considerably and at the present we have started believing that the majority of business organizations are well aware of the fact that their significant liability to global and local societies is further than only generating and maximizing profit. In other words, there is at the present a rising concern with the question of how organizations and their project teams should react, as well as this situation leads us to think about ethics as the suitable academic and idealistic area. Additionally, it is predominantly significant for the project management of IT projects for the reason that they involve a wide variety of social and environmental effects. These effects can emerge in result of project management of latest technologies and the organizations that have power over them. On the other hand, researchers have not paid considerable attention in putting into practice a practical implementation of ethical information system mechanism (Siguroarson, 2009; Mingers & Walsham, 2010; Stahl, 2008). In addition, (Couger, 1989; Laudon, 1998), believe that there is no methodical study or literature which can be acknowledged as one discovery, for instance, project management ethics, IT ethics, information system ethics, business ethics, and in medical and legal ethics. There could be many reasons behind it for instance the current and past literature on...In this scenario, the ethical decision will be based on the maximum total utility. In view of the fact that this theory focuses on the results or outcomes of decisions, hence it is typically acknowledged as 'consequentialist'. On the other hand Kantian deontolog y follows a basically different idea and determines the ethical superiority of a decision in keeping with the purpose of the decision maker. In this scenario, the ethical assessment of a maxim relies on whether it can be imagined or universalized as a general rule. In view of the fact that this approach focuses on the duty bound intention of the decision maker with little focus to consequences hence it is acknowledged as deontological. In addition, a set of ethical theories frequently discussed in the context of project management paradigm minimized both the significance of responsibility and consequences, however focuses on the decision maker. The third ethical theory is known as virtue ethics, which does not take into consideration hypothetical difference between right and wrong on the basis of outside features of an act however it is actually foundational upon the way in which a certain act focuses on the character of the decision maker (Siguroarson, 2009; Walsham, 2003; Charlesw orth & Sewry, 2002). All the ethical theories are implemented on humans for the reason that they all guide the people to differentiate between right and wrong. In addition, all the theories demonstrate that we should do good and avoid bad activities but their way of explanation is different from one another.
Sunday, August 25, 2019
AS2 Evaluation Report Essay Example | Topics and Well Written Essays - 1750 words
AS2 Evaluation Report - Essay Example intervention of the mass media as a method of engaging the wider segment of the community to establish an idealistic perspective of prosperity and economic development. The report considers entertainment and education for the young people as style that not only educate and entertain the community but also a technique of enlightening the essentiality of positive attitude towards developmental projects. The report presents an extensive description of innovative approaches as models of participation and community engagement. On the same note, cultural activities and electronic technologies are viewed as a way of enhancing social marketing campaigns to boost economic performance of the community. The study has an objective of establishing requisite procedures for collecting and interpreting communicable information in a bid to support the priority setting for addressing the concern of marginalized groups in a society. Be that as it may, societal outreach and mobilization has always been considered as a number one priority for engaging the marginalized groups since the dawn of time. The community sensitization and mobilization comprises of diverse issues that involves meeting and trainings. In view of the previous studies and comments posed by profound scholars, community engagement through traditional authorities and cultural activities are perceived as a stepping stone towards defining the needs of the disadvantaged groups in the community. Mass media has been conceptualized as technique of engaging and enlightening a wider segment of the community on the essentiality of grasping developmental perspectives. In a strong sense, mass media basically targets the young people since they are believed to have what it takes to implement and put into practice the developmental agendas for facilitating economic performance of a community. The use of television, billboards and quite a number of mass media procedures is quite essential in enabling the majority of disadvantaged
Saturday, August 24, 2019
Digital camera Research Paper Example | Topics and Well Written Essays - 1000 words
Digital camera - Research Paper Example They all come in difference sizes, features and of course with price variations from two figures to four figures. It therefore becomes all the more necessary that we must go for a camera most suitable for our requirements. Some of the key features in modern day digital camera are; i. Resolution: i.e. a key determinant of picture quality. This indicates the number of pixels or picture elements that can be packed inside the picture. More the pixels clearer will be the picture, because that implies the picture can have more details in it. Now a days, we talk of megapixels i.e. million pixels. The number of megapixels also limits the size of the print that we can take from the picture. And if we try to enlarge the picture further, it becomes blurred or broken into squares. Some of the standard sizes for print are; ii. Types of Lens: The lens is another very important feature of the camera. In fact the lens happens to be the first thing that will create the picture. The lens could be made up of plastic or glass. The clarity of glass lens is much more than their plastic counterparts. Normally Carl Zeiss offers good quality glass lenses. But the cost of glass lenses becomes more. Another distinguishing feature for the lens is the zooming facility. A zoom lens we can take clearer pictures of distant objects. The zoom lens allows us to magnify or shrink the subject to include more area in the picture. The zoom comes in the form of 2X, 3X, 4X etc. As the zoom range goes up so does the price of the camera. In addition the digital camera comes with digital zoom as well, which is helpful for cropping up the picture. iii. Shutter Speed: We need to be more careful about this future while purchasing manual cameras, because the shutter speed determines the duration of the exposure time. The slower the shutter speed, the more will be the exposure. In this case the picture will be able to record more depth of the picture. But, if during the exposure time there’s some shake
Subscribe to:
Posts (Atom)