Tuesday, December 31, 2019

Information Security Research Paper

Introduction Security management is a wide subject of management associated to assets control, human resources, as well as physical securities safety operations. It comprises the marking of a company’s data assets and the documentation, growth, and execution of regulations, steps, standards, and outlines. In network control, it refers to the set of operations, which protects systems and telecommunications links from illegal access by individuals, organizations, acts, or effects and they entail a number of sub functions like developing, controlling, and deleting security services and approaches. This also involves allocating security-significant data, presenting essential incidents, managing the allocation of main items and authorizing users’ access, privileges, and rights. A virus scanner is a form of antivirus program with the ability of searching a system to detect virus signatures. These detected virus signatures normally attach themselves to executable applications and programs like e-mail clients. Consequently, a virus scanner has the ability of either searching all the executable programs during the period when the system has been booted or scanning a file. File scanning is important in the sense that viruses can also change the data or the information in the file (Burns, 2007). Discussion Control tools like the data categorization, risk evaluation, and risk examination are applied to classify threats, weigh assets and rate system susceptibility in order to successfully management may be executed. With the emergence of e-commerce and public Internet, personal computers alongside computer networks, when not sufficiently supervised, are rousingly susceptible to harmful attacks. Viruses, hackers, malicious workers or even human error entirely demonstrate open and severer dangers to networks. All computer applicants right from highest casual Internet users to big organizations, may be influenced by network security breaks. Nevertheless, security breaks may usually be avoided by use of the readily available virus scanners. Risk or viruses being protected by the scanners refer to any action or occurrence with the ability to cause damage to a company by the exposure, alternation, or harming of data, or through the denial of crucial services (Dennis, et al.,1992). It is clear, therefore, that while the Internet has changed a highly developed the manner in which we conduct business transactions, this enormous network together with its related technologies have opened the door to a rising amount of security dangers that need to be prevented to allow upward business transaction (Brynjolfsson Hitt, 2000). In spite of the expensive danger of prospective security breaks, the Internet may be one of the satisfying approach through which individuals can carry out their businesses. People, usually have fears and suspicions while carrying out online transactions, and from that emerges the mistrust of the Internet. This mistrust may restrain the business chances of organizations, mainly those that are entirely Web depended. Therefore, organizations should endorse security regulations and establish precautions, which not just are essential but are also considered as effective. Firms should be in a position to communicate sufficiently the way they have arranged to safeguard their clients (Swanson Guttmann, 2006). The capacity of security to assist the vision of a company can be restricted by a number of aspects, like the social matters. For instance, security and workplace privacy may interfere. Usually, security is executed on an IT structure through pointing applicants and trailing their operations. Nevertheless, anticipation of privacy differs and may be broken by a number of security approaches. Despite privacy being a highly essential societal matter, it is not just one. The trend of information, mainly between the citizens and the government is the other condition where security can require adjustments to aid a community objective. Furthermore, a number of validation approaches can be taken intrusive in certain cultures or environments. Security approaches must be chosen and executed with an identification of the appropriate and valid concerns of others. This can entail weighing the security conditions of data applicants and owners with societal objectives. Nevertheless, policies and an ticipations adjust in relation to the suitable application of security management. These adjustments can either raise or reduce security (Burns, 2007). During the company operations, different people always use computers; hence, incident response should be created at network implementation. This denotes the travels in reaction to a network spasm or equivalent incident, which influences networks, and organization information. An incident response plan is focused at framing the reaction processes, which must occur when a network is being confronted or there is compromised security. The incident response plan must help a company while addressing the occurrence in systematic fashion. When the computer are not in use it is advisable to always put them off and disconnect any network cables since they can be used by hackers to get access to company details. Everyone should also be cautious while sending or receiving emails, or other information that look suspicious (Henderson Venkatraman, 1993). Use of information technology in business With the presence of information security like the one of virus scanners in any business, it implies that there must be also information technology that can help in reinforcing business strategy. Therefore, the next session of our discussion is going to focus on the idea of information technology and its application in the business. Consequently, there are several forms of information technologies in any business. However, in this case, we are going to focus on Tracking systems and EDI. Use of the Technology Order Processing Order processing involves diverse measures of carrying out work in an organization such as packaging, picking up, and delivery of both products and services to the required destination.   A business organization should develop software which is effective in taking orders from customers. The company benefits from this system because it helps in unifying all the departments handling the orders, furthermore it enables efficiency in handling of orders. Lastly, Order Processing enables a company to reduce the manual entry of information associated to sales order and does not call for making changes to the existing business practices (Powner, 2009). Electronic data interchange Electronic Data Interchange can be defined as a means of exchanging information between organizations through the use of electronic means. For example a company can transfer electronic documents from one company to another through the use of internet software such as E-mail (Ray Acharya, 2004). Tracking System To ensure more efficiency in a business organization, the company should launch an electronic tracking system that would supervise the movement of documents and files across different departments. Due to this, the company’s managers and workers should be able to maintain a constant watch over the exchanged of important documents and receipts at different departments in the progression of making decision (Schwalbe, 2010). Competitive Advantage Tracking systems and EDI to   Company Tracking systems and EDI can support business strategy. The goals of the any given company can be achieved through the use of effective systems, the application of technology so that the transaction process can be carried out in the shortest time possible. This Tracking systems and EDI will benefit the company in various ways such as saving the company’s money. This is achieved by using this system instead of using the normal process of passing information which entails an enormous deal of human interactions and facilities such as paper documents, holding meetings, using faxes, and others (Powner, 2009). Secondly, the company will benefit a lot in this new system because it will reduce the handling costs such as sorting, organizing and disbursing paper document. Besides, it will reduce the problems of retrieving the lost paper documents. Tracking systems and EDI such as Electronic data interchange will helps the company in reducing the storing space which the paper documents could have occupied. Furthermore, the use of this system will assist the company to reduce the unnecessary expenses such as the cost of manual entry because of the possibility in the system of storing and manipulating data electronically (Henderson Venkatraman, 1993). Thirdly, the use of Electronic Data Interchange will reduce errors, for example recording and billing errors. This is possible because the use of the system will reduce the need to rekey documents in the place of destination. Besides, the system is so faster whereby the information send is received immediately. This is very essential for business companies because they can use this information in serving their customers and making decisions which might be used by the subsidiary companies (Rittenberg, 2009). The human resource managers need to organize their employees so as to select the team to be trained so that they can handle the new system in the company. These employees should be selected basing on their competitive nature, their educational background, and the leadership skills which they posses. It is economical to train few employees because the company will later adopt the in house training whereby the employees who are already trained will train their colleagues. This is necessary for the succession purposes in the organization (Henderson Venkatraman, 1993). Network security In any organization, traffic may increase in the company’s website. At this point, there is need to ensure that there is sufficient security in the networks. Intruders also need to be detected and documented. In this case, such network security items as intrusion detection items, firewalls and security zones have to be used to make the network extremely secure (Brynjolfsson Hitt, 2000). First and foremost, it is of subtle importance to have security zone facts that will guide every activity. These are portions of network with specific security details and requirements. This zone will have to be introduced in order to assist in filtering and separate the incoming and outbound traffic. This will enable one design a zone to host all networks protected from the internet. Moreover, this zone enables one defines a zone within a specific network to control access to certain servers that hold sensitive details. Some common zones include LAN, FTP and extranet (Venkatesh, et L., 2003). Switch security facts should be introduced in order to increase the security of the network. Some of these are the virtual LAN, MAC filtering security, and the port authentication. Others are the use of the telephony security facts the transmission media security facts and the wireless authentication encryption facts. All these will server to improve the security of the internet in any connection (Venkatesh, et L., 2003). Another item that has to be introduced is IDS facts. These are intruder detection systems that are fixed in a special device of networks that has the ability any suspicious activities and attacks via the internet. They made use of the administration of the IDS, in multiple ways to monitor events, alerts and control any sensor device available to the computer. After sensing the traffic, it categorizes them into various levels as positive, false positive and even negative. For effective maintenance of security, it is therefore important to introduce or make use of IDS facts. With the mobile security facts, one should be aware of the various security considerations as the infra red, Bluetooth, PDA smart phone, wireless application among others. These are the applications that pose danger to the security of the network if maximum care is not taken (Venkatesh, et L., 2003). Implementations and Recommendations Offering an efficient computer security needs an elaborate mechanism, which involves a range of areas both internally and externally of the computer security area. This elaborate mechanism spreads across the whole data life cycle. To function successfully, security management usually relies on the appropriate functioning of some other measures. The process of scanning computers is a continuous process and need regular updates because they are used in a dynamic environment. The constant security checks are because users and system technologies, information in the systems, related threats, and security conditions change frequently. A number of modifications influence system security: linkage to outside networks, technological growth, an alteration in use or value of data, or the introduction of fresh threats all prompt the need for constant checks. Furthermore, security has never been 100% sufficient when a system is executed. System applicants and controllers initiate fresh approaches to bypass security deliberately or inadvertently. Alterations within the environment or the system may develop fresh susceptibilities. Tough observance to process is seldom and processes become obsolete through time. These matters, therefore, make it appropriate to reevaluate from time to time the security of IT forms (Stephen Daniel, 2000). Conclusion In order to safeguard their clients, organizations should protect their workers and associates from security breaks. This is, therefore, the other reason why security scanners must be readily available to users at all the time. The Intranets, Extranets, and Internet allow quick and successful interaction among workers and other associates. Nevertheless, such interaction and efficiency may of course be limited by the influence of a network spasm. Legislation is the other factor, which pushes for the desire to have security scanners. Government identifies both the significance of the Internet as well as the idea that sizeable amounts of world economic output are based on it. Virus scanners are therefore very vital in providing security to information. References Bloomfield, B. (1997).Information technology and organizations: strategies, networks, and integration. New York, NY: Oxford University Press. Brynjolfsson, E. Hitt, L. (2000). Beyond Computation: Information Technology, Organizational Transformation and Business Performance.The Journal of Economic Perspectives.Vol. 14, No. 4 (Autumn, 2000), pp. 23-48 Burns, B. (2007). Security power tools. New York, NY: OReilly Media, Inc. Dennis A. Adams, R. Ryan N. Peter A. (1992). Perceived Usefulness, Ease of Use, and Usage of Information Technology: A Replication.MIS Quarterly.Vol. 16, No. 2 (Jun., 1992), pp.    227-247 Henderson J. C. Venkatraman, N. (1993). Strategic alignment: leveraging information technology for transforming organizations.IBM Systems Journal archive.Vol.32(1), January 1993 Kurtz, D. and Boon, E. L. (2009) Contemporary Business 2009 Update. New York, NY: Cengage Learning New York, NY: Cengage Learning. Powner, D. (2009). Information Technology: Federal Laws, Regulations, and Mandatory Standards for Securing Private Sector IT Systems and Data in Critical Infrastructure Sectors. New York, NY: DIANE Publishing. Stephen D.    Daniel E. (2000).The Resurgence of Growth in the Late 1990s: Is Information Technology the Story? The Journal of Economic Perspectives.Vol. 14, No. 4 (Autumn,   2000), pp. 3-22 Swanson, M. and Guttmann, B. (2006). Generally Accepted Principles and Practices for Securing Information Technology Systems. Retrieved on December 5, 2011, from http://csrc.nist.gov/publications/nistpubs/800-14/800-14.pdf Venkatesh, V., Michael G. Morris, G., Fred D. (2003). User Acceptance of Information Technology: Toward a Unified ViewMIS Quarterly.Vol. 27, No. 3 (Sep., 2003), pp.   Ã‚  Ã‚   425-478.

Monday, December 23, 2019

Argumentative Essay On Social Media - 1240 Words

Out of the variety of news sources such as TV, radio, or newspapers, one of the popular sources in today’s world is social media. People are getting addicted to and can’t live without social media such as Facebook, Twitter, or Instagram. They use social media as of where they can post their status but also where they can receive a lot of different news. While social media are spreading any kinds of news such as trend, celebrity or even politics, people easily get the information that is not true called â€Å"fake news.† The fake news raises the major problem in social media as the news source. Once people see the news, they tend to believe and share it. Liking can spread out fake news in a second. When people like the news, the activity†¦show more content†¦However, if the news is based just on rumors, what would it be? It would turn out fake news. The recent memorable incident relating to the fake news would be during the 2016 US presidential campaign. In â€Å"The Journal of Economic Perspectives,† Enrico Moretti and Gordon Hanson state that fake news had some influence over the election result that Trump became the US president (Moretti and Hanson. 235). They also mention that they discover 41 articles which support Clinton or are against Trump and 115 articles which support Trump and are against Clinton (Moretti and Hanson. 225). These pro-Clinton articles were shared on Facebook 7.6 million times and these pro-Trump articles were shared 30.3 million times (Moretti and Hanson. 225). What makes surprising about this fact is those articles later turned out to be fake news. Before the news about Clinton’s scandals was leaked, there were much less of people who would vote for Trump and much less of fake news criticizing her. Nonetheless, her scandals came out, those fake news based on rumors increased the number. People read them out of their curiosity and shared them in a second. These incidents reveal that both of p eople who deliver news and who receive news have the lack of responsibility. In the article â€Å"News in an online world: The need for an â€Å"automatic crap detector,†Show MoreRelatedArgumentative Essay On Social Media1082 Words   |  5 PagesArgumentative essay on social media Nowadays, we are living in the most advanced technology era as we have a lot of gadgets to communicate with each other. Just a few decades back, people had to wait for a week or two to receive a letter but now, we able to talk, char and make friends in a mere twinkling of an eye. Social media has become part and parcel of our everyday lives. The idea behind the social media is to enable us to hold better contact with friends, family and new people. There are manyRead MoreArgumentative essay on social media757 Words   |  4 Pagesï » ¿Argument essay about social media Nowadays, a lot of people are using social media such as Facebook, Twitter, Tumbler and so on. Since the Internet has propagated rapidly, social media have progressed a lot. The generalization of the internet makes us to live conveniently and fast. People are almost using smart phones, i-phones or comfortable devices which can access to internet. These equipments make us to do social network easily. It helps contact friends, family, and other people even thoughRead MoreArgumentative Essay822 Words   |  4 PagesArgumentative Essay The function of an argumentative essay is to show that your assertion (opinion, theory, and hypothesis) about some phenomenon or phenomena is correct or more truthful than others. The art of argumentation is not an easy skill to acquire. Many people might think that if one simply has an opinion, one can argue it successfully, and these folks are always surprised when others dont agree with them because their logic seems so correct. Argumentative writing is the act of formingRead MoreReading Culture 5th Edition By Diana George And John Trimbur977 Words   |  4 Pagesthe argumentative essays, visual illustrations, and notable references one is so familiar with. The authors expressed their several definitions on the word â€Å"culture† and how it was used differently as time passed by. The authors also expressed their thoughts on digital communication and presented arguments from various writers who depict the pros and cons of this new cyber age of connectivity and interactivit y. Forty-eight pages of academically- acclaimed arguments, illustrations, and essay examplesRead MoreArgumentative Reflection934 Words   |  4 PagesArgumentative Essay Reflection One of my central struggles throughout high school has been writing essays and reports for all classes not just english. I was a little worried when I signed up to take this course, since it counted as a college credit. Even though I was worried about taking this course, but I am thankful that I did. The main reason behind my decision to take this course is because I thought it would better prepare me for college. This argumentative essay was one of the hardest essayRead MoreIs Facebook Making Us Lonely?1274 Words   |  6 PagesIn an argumentative essay, the author can write about the topic he or she is most interested in to try to persuade people to be on his or her side. Authors can use any of the many written strategies that exist to make his or her essay credible to the audience. Some authors use more than one rhetorical tool in their essays, while others keep their essays simple. It really does not matter how many rhetorical tools an author uses; all that it matters is how t he author uses them to accomplish his orRead MoreFeminism, Religion, And The Internet1529 Words   |  7 Pagesactivist for sexual assault prevention. In this Journal of Feminist Studies in Religion by the Indiana University Press, Dysert’s essay Roundtable: Feminism, Religion, and the Internet, focuses on the evolution of feminist studies in religion and how social media has helped create discussion and a forum for women to talk about the issues that arise. Throughout her essay, Dysert mainly highlights examples of websites, blogs, and other outlets on the Internet where people can post stories of experiencesRead MoreTelevised Violence causes Aggression in Young Boys1555 Words   |  7 PagesTelevised Violence causes Aggression in Young Boys Young boys are evidently influenced by things in their environment such as media, peers, and family. Elementary school aged boys are influenced easily because these are critical years in developing their sense of individuality and social skills with their peers. The vulnerably of young boys are a reason why they are a target of the popular culture of displaying television violence because they have rarely encountered it in previous years so theyRead MoreReflective Reflection748 Words   |  3 Pagescase of this English composition class, reflecting on completed essays has allowed me to analyze the development of my writing over the semester. Although this semester consisted of only five essays, it has become apparent to me that my writing has improved in many aspects throughout the semester. One general example of this improvement is the vocabulary, where simple vocabulary in the first essay had become more complex by the final essays. Additionally, I also believe that my writing has become moreRead MoreLearning Competencies1019 Words   |  5 PagesIII LISTENING 1. Shift from one listening strategy to another depending on the text and one ¶s purpose for listening 1.1 Use attentive listening with informative texts and analytical and critical listening with argumentative texts 1.2 Single out reasons cited in argumentative texts and assess the worth of ideas presented based on a set of criteria 1.2.1 Determine whether arguments and conclusions are logical or illogical 1.2.2 Determine the stand of a speaker on a given issue 1.2.3 Determine

Sunday, December 15, 2019

Communication and Assisting Service Users Free Essays

How to communicate and assist service users on how to do what they can not do After the handing over, we are assigned to service users in other to support them with their personal care needs. In the morning, i knock at the service users doors and say morning to prepare them to get ready for a wash. For those that are unable to have access to toilet facilities, i apply a manual handling by supporting them in movement from the bed to the toilet by using hoist or wheelchair which must be in good standard and for those who are able; I make sure they use the toilet. We will write a custom essay sample on Communication and Assisting Service Users or any similar topic only for you Order Now Communication comes in many ways, you can communicate with service users verbally, body language or eye to eye contact. The process of care and communication to provide a good care is something which should be carefully planned to meant to be helping the service user, it is very important to know the well being response to individual needs to provide right care that the service user benefit from and contribute to overall improvement in care plan. So after providing the help for those who are able and unable to help themselves, I then give report in the hand over book to enable the staff taking over from me knows where problems are and how resident have been and what they need. This is where communication comes in, to instruct somebody to do something verbally or through hand written in the hand over book or care plan. During the process of personal care, some of the service users are very aggressive or they have a challenging behaviour response to the service you are rendering to them, you calm them down or go away for some minutes and then come back to them and make sure all these is written in the hand over book or your care plan for the staff to know what is happening and how to go about it. I also communicate with the service users while giving them a wash, i ask them if they had good sleep and also ask them for the colour or type of cloth he or she would like to wear. After washing and dressing up, i take the resident to where he or she will sit for his or her breakfast. When is coming to food, every resident own identity to what they like or dislike. By following these, individual needs are met and these promote the well being of service user. That is open flexible approach. When dealing with service user’s food, the first thing you do is to wash your hand, make sure the area is clean, don’t forget to get your apron on and make sure you get to the service user according to their needs and you must write everything in the care plan or hand over book, how the service user ate and drink to enable the staff the well being of the service user. After all these, the activities of the day begins, some like watching television, playing ball, games, i even assist them in reading news papers and also chart with them. At the end of the day, I give reports on what has happen during the shift, things that need to be extra vigilant about and how the residents are generally in the book of hand over and care plan. How to cite Communication and Assisting Service Users, Papers

Saturday, December 7, 2019

Raising self esteem free essay sample

Introduction This paper explains briefly the research proposal which specifically focuses on the programs proven to be effective in raising self-esteem in at-risk youth. This research proposal includes the background of the study, statement of the problem, statement of hypothesis, the significance of this study and scope and limitation of the study. Background of the Study The extent to which youth are labeled at-risk varies according to different authorities from psychology, education, sociology, and other fields (Astroh, 1993). Some authorities maintain that all youth are born at high risk (Glenn Nelsen, 1988). Others estimate that one-quarter of 10-17 year olds are at-risk Dryfoos, 1990). In more recent development, the number of youth in their high-risk years who commit offenses will increase: by 2010, 10- to 14-year-old juvenile offenders are projected to increase by about 6 percent, while ages 15 to 19 are expected to increase nearly 20 percent Brown Sevcik, 1999). Effective at-risk youth programs begin with determining who are going to be served. We will write a custom essay sample on Raising self esteem or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page It is through them that programs determine the kinds of designs that are most appropriate for at-risk youth and the policies needed to support an effective high performance youth training system. According to Astroh (1993), broad generalizations about youth can detract from targeted efforts to address real-not perceived-problems in local communities. The loose definition of at-risk youth refers to those youth most likely to fail in school and the labor market. Furthermore, the Juvenile Justice and Delinquency Prevention Act adopted by Congress defines youth at risk as a youth at risk of educational failure or dropping out of school or involvement in delinquent activities (Brown Sevcik, 1999). More specifically, there are some methods in defining at-risk youth such as the Group Characteristics and the Skill Levels (Center for Human Resources, 1993). In the first method, at-risk population is defined in terms of demographic characteristics—having low income, being black or Hispanic, having dropped out of school, or receiving welfare. More recently, behavioral characteristics such as court-involvement, teen parenting and substance abuse have been identified as additional risk factors. At-risk youth, then, are frequently defined in terms of a list of characteristics, or combinations of characteristics (CHR, 1993). Many states depend exclusively on these kinds of demographic indicators to define the at-risk population, because of the strong research base (CHR, 1993). However, the major drawback to using only group characteristics is that when used in planning, they tend to mask the real skill issues that need to be addressed (CHR, 1993). The Skill Levels approach defines at-risk youth in terms of specific skill deficits or levels of employability; it focuses much more specifically on skills which can be matched up more directly with employer expectations (CHR, 1993). However, some practitioners argue that a purely skill-based definition fails to take into account important social and cultural barriers to Employment (CHR, 1993). To address this problem, CHR (1993) comes up with a hybrid definition. Here, one might define at-risk youth as those who are dropouts, or minorities, or teen parents and who lack specific educational and/or work skills. The purpose of a hybrid definition is to gain the advantages of the skill approach that is, targeting those with clearly specified employment skill needs while formally recognizing some of the social factors that exacerbate the risks of failure in the labor market (CHR, 1993). By including demographic and/or social characteristics, the hybrid approach may also make it easier for youth serving agencies to develop common definitions. To meet the needs of at-risk youth, the community needs to respond by developing intervention services for them that focus on building self-esteem, alternative leisure patterns, redirecting inappropriate lifestyles or behaviors, developing personal skills, assisting with pre-employment training, development of morals and values and enhancing the quality of life through positive recreation experiences (Brown Sevcik, 1999). According to the Association of African American Role Models (2003), one of most overlooked qualities missing in today’s at-risk youth is the building, maintaining, and utilizing self-esteem to achieve personal growth and success. Raising low self-esteem can be a difficult process but one that is surely successful with the intervention of an effective programempowering and counseling at-risk youth to visualize themselves as productive members of their communities (AAARM, 2003). Moreover, teaching self-esteem becomes a process that is continued by the at-risk youth themselves as their positive and productive attitudes permeate their interactions with those around them (AAARM, 2003). Brown and Sevcik (1999) state that recreational programs build self-esteem, self-discipline, commitment and teamwork. Moreover, Therapeutic recreation plays an important role in reaching at-risk youth (Brown Sevcik, 1999). Similarly, the 1992 Decima Report (1992) shows that through cultural alternatives, youth essential life skills including responsibility, self-esteem, cooperation, discipline and patience are built. Cultural activity builds self-discipline and perseverance in our youth; learning to play a musical instrument, rehearsing a play or executing a mosaic mural requires long hours of practice, focus and perseverance, all components of self-discipline, a trait that many at-risk youth are desperately lacking. (Americans for the Arts, 1997) In a more recent report by the Presidents Committee on the Arts and Humanities (1999), organized youth activities can deter risky behavior in adolescents; students who participate in band, orchestra, chorus or a school play are significantly less likely than non-participants to drop out of school, be arrested, use drugs or engage in binge drinking (SasCultre, 2003). Under this therapeutic recreational program, three methods of service are combined: Intervention, Diversion, and Prevention (Brown Sevcik, 1999). The program involves at-risk youth in a school-directed recreational program within the community, developing an awareness of and interest in opportunities available to them outside the school day; enables them to experience fun leisure activities; and to develop healthy friendships, good sportsmanship, mentoring with individuals within the community and healthy leisure interests (Brown Sevcik, 1999). With these premises, the researchers will conduct this study to find out and to ascertain the responses made by the Social Work Institutions towards the raising self-esteem in at risk youths. Statement of the Problem This researcher finds the necessity for a study that specifically tackles how successful programs are in raising at-risk youth’s self-esteem. This study intends to know why some programs fail. This proposed research study will try to answer the following queries: 1. What are the needs of at-risk youths in a program? 2. What are the factors that affect the success and effectiveness of a program in terms of raising self-esteem in at-risk youth? 3. What are the measures that should be done to improve a program? Hypothesis There is a significant difference in the raising of self-esteem of the at risk youths at ___________________ when grouped according to gender and age. Significance of the Study This study will be a significant endeavor in boosting self-esteem in at-risk youth. This study will be helpful to social workers this will serve as a guide for them when dealing with at-risk kids. By understanding the needs of these children, in terms of their self-esteem, and presenting the cause of failures of some programs, administrators will be able to design means in raising self-esteem. This could lead to the success of the program. Scope and Limitation This research study will only cover male and female at-risk youth who are currently under a program and whose ages range from 16 to 22. Thus, the programs that will be discussed in the entire study are from the Philippines, although, some programs from other countries might be briefly tackled. This study will only focus on the determination of what causes a program intended to raise self-esteem in at-risk youth, to succeed or to fail. Further, this study will operate based on its definition of at-risk youth. The outcome of this study will be limited only to the data gathered from sociology books and journals and from the primary data gathered from the result of the survey and interview that will be conducted by the researcher. The conclusion and recommendation will only apply to a program which specifically aims to boost self-esteem in at-risk youth. Its application to other sociological domain of helping at-risk youth will need further research. As stated above, this research will partially base its findings through quantitative research methods because this permits a flexible and iterative approach. During data gathering the choice and design of methods are constantly modified, based on ongoing analysis. This allows investigation of important new issues about raising self-esteem in at-risk youth within a Program and questions as they arise, and allows the investigator to drop unproductive areas of research from the original research plan. This study will also employ qualitative research method because it will attempt to find and build theories that will explain the relationship of one variable with another variable through qualitative elements in research. Through this method, qualitative elements that do not have standard measures such as behavior, attitudes, opinions, and beliefs within the restaurants will be analyzed. Furthermore qualitative research is multi-method in focus, involving an interpretative, naturalistic approach to its subject matter. This means that qualitative researchers study things in their natural settings, attempting to make sense of, or interpret phenomena in terms of the meanings people bring to them. The focus group discussion, on the other hand, will be conducted with the consent of the administrators. The secondary sources of data will come from published articles from Sociology journals, books and related studies on at-risk youth and programs intended to raise self-esteem in at-risk youth. For this research design, the researcher will gather data, collate published studies from different local and foreign universities and articles from social science journals; and make a content analysis of the collected documentary and verbal material. Afterwards, the researcher will summarize all the information, make a conclusion based on the null hypotheses posited and provide insightful recommendations on the dealing with organizational management. Definition of Terms For the clearer understanding Chapter 2 Review of related literature Several related literature and studies conducted locally and abroad gave great help to researchers. Some of these studies are similar to the present study in methodology but the researchers believed that because of differences in social setting by the study, the result would not be the same. Based on the data in â€Å"Improving the Self Esteem of At-risk Youth† (Levine, Majerovitz, Schnur, Robinson, and Soman, 2008), it describes and evaluate a program, RESOLVE, designed to increase self-esteem and encourage healthy lifestyle choices of at-risk youth. This federally-funded (U. S. Administration for Children and Families, CBAE) program combines an educational component teaching healthy lifestyles, goal setting, and refusal skills to avoid unhealthy behaviors with a vocational training and recreational component. The emphasis of this evaluation is to assess the impact of program participation on self-esteem and knowledge of healthy behaviors. Self-esteem was chosen as a target variable for intervention based on its central role in predicting mental health and well-being, as well as enhanced health and social behaviors (Mann, Hosman, Schaalma, and deVries, 2004). Strong family and community relationships are predictors of high self-esteem (Greene and Way, 2005). These relationships are disrupted for foster care youth, placing them at risk for low self-esteem. Low self-esteem and disruption in family and community relationships is associated with poor social and lifestyle choices. For example, lack of a father figure and low self-esteem are associated with higher risk of teen pregnancy among Jamaican youth (Keddie, 1992). Low self-esteem and disruption in family and community relationships is associated with poor social and lifestyle choices. For example, lack of a father figure and low self-esteem are associated with higher risk of teen pregnancy among Jamaican youth (Keddie, 1992). Adolescents who had lower self-esteem at baseline reported initiating sex earlier and having had risky partners (Ethier et al. , 2003). Peer group programs that increased self-esteem among youth with severe behavior problems from dysfunctional families helped to reduce problem behaviors (Frank, 1996). A number of programs designed to encourage healthy life choices among at-risk adolescents have been reported in the literature. The most successful programs combine traditionally-presented curriculum with opportunities for practical application outside the classroom. For example, the Teen Outreach Program (Allen, Philliber, and Hoggson, 1990) links volunteer work to classroom experience for at-risk youth. The program significantly reduced pregnancy and school drop-out rates among participants across a spectrum of ethnic groups. A similar program, the Quantum Opportunities Program (Hahn, Leavitt, and Aaron, 1994) offers education, mentoring, and volunteer service opportunities to disadvantaged youth. School drop-out rates and teen pregnancy decreased, while employment or further education increased. The Catalano and colleagues (2004) review on positive youth development (PYD) was commissioned by the US Department of Health Human Services, completed in 2002, and conducted by a team of researchers at the University of Washington (Catalano, et al. , 2004). The review ultimately included twenty-five program evaluations, and findings indicate promising results for strength-based programs serving youth and children. The review’s definition of PYD is very broad, including any intervention that meets at least one of fifteen constructs6; none of which stipulated involvement of young people in program decisions or design. The broad inclusion criteria for PYD programs coupled with a lack of predetermined outcomes largely explain why so many evaluations were included in the review. In contrast to the Catalano and colleagues review, the forthcoming review will focus on youth empowerment, reduce program heterogeneity, and minimize the chance of spurious conclusions due to a lack of predetermined outcomes. The Wallerstein (2006) review, conducted for the World Health Organization, was the only review identified by the authors that directly addressed empowerment strategies. The review explores empowerment broadly for all age groups and with an interest in health outcomes. Wallerstein gives a useful overview of various themes within the broader empowerment movement and gives a framework for empowerment that includes multiple levels of outcomes. The broad, international review of outcomes linked to empowerment offers valuable context for this protocol. The resulting framework includes a heavy emphasis on self-efficacy, community engagement, and social bonding, which reinforce their importance as outcomes of interest in the planned review.