Friday, May 31, 2019

Himmler?s Reign of Terror and Ingenious :: essays research papers

One mans sickmind led to the extinction of an entire generation ofpeople. These ideas came at the worst possible time,during World War II. The ideas were horrific and evil andtoday they would be viewed as satanic but at the time theywere thought to be glorious and wonderful. This gaveHienrich Himmler a place as one of the most deviouspersons ever. Himmler went to grade school at theCathedral where he was an excellent student. It was duringthis time that Himmler became interested in Germanyshistory and war (Shrirer 130-131). After he finished gradeschool he went to Technical mellowed school. He once againresumed the role of a good student. At this time Himmlerfelt he had no rules or discipline so he dropped out of highschool and enlisted in the Army. While in the ArmyHimmler got special tutoring to finish high school (Shrirer137-138). Himmler attended a small college immaterial ofMunich. While there he did not fit in very well and didpoorly in his studies. After a short time Himml er left over(p) collegeand rejoined the military (Stewart 97). Himmler joined aparamilitary unit outside of Bayer-Munich. He was in aclass of 200 and was the best soldier. His commandingofficer said, Hes the best natural soldier Ive ever seen(Goralski 103-104). Himmler did not do much in WorldWar I. He was rumored to have killed Gihi Rhambal. hatful are not one hundred percent sure if he did, butmany believed it was he (Jarmon 132). During this time hewas mainly taking share of his family. He married a ladyMiller 2 named Marga Stoenbauer. Himmler also had adaughter named Gudren. Gudren was Himmlers daughterbut not Margas. He had Gudren with a mistress. Themistress left the baby with Himmler right after she was bornand she was never heard from again (Bauer 84-85).Shortly after World War II stony-broke out, Himmler waschosen for a special assignment. He received theassignment because he was probably the best soldier in theGerman Army. He was appointed the whirl of the Gestapo,the most feared people in Germany. The Gestapo wasformed in 1933 and the massive killings began in 1934(Rogaski 187-188). Himmler and his men dressed in allblack, so that people would recognize and think of them(Stewart 131). Himmler was respected for two mainreasons. The first was that many people thought he wasnext in command to Hitler. People figured that theyprobably should not get involved with the boss. The otherreason people liked Himmler was that Hitler liked him andif he found out anyone was saying anything about him that

Thursday, May 30, 2019

The Importance of History Essay -- essays research papers

What is history? Should we study history? Who creates history? Is history relevant? The definition of history, is a question which has sparked international debate for centuries between the writers, readers, and the makers of history. It is a vital topic which should be relevant in our lives because it?s important to acknowledge ago events that pay occurred in our world that deeply influences the represent. This essay will discuss what history is, and why we study it. archives is the study of past events leading up to the present day. It is a research, a narrative, or an account of past events and developments that be commonly related to a person, an institution, or a place. It is a branch of knowledge that records and analyzes past happenings. Focusing on the people involved in a time, place, and series of events makes history. It?s from social and cultural conditions as well as political and economical events.Within the topic of history, there is historiography which refers to the study of historical study. It is historical analysis examining the principles, theories, writings and uses of historical methods. History based on the past, or describing people who lived in the past or events that happened in the past. Historical study often focuses on events and progress that occur in particular blocks of time in order to engineer ideas. Names given to a period can vary with geographical location as can the dates of the start and end of a particular period. History can also be classified in/to social sciences and humanities. Outside fields of study, such as economics, philosophy, archeology, anthropology, and geography are common sub topics in global history. History is created by a historical entity/figure that ha... ...nd memorization of dates which is why it?s usually at the bottom of students favorite subjects We cant learn from each our mistakes or our achievements if we dont know our History.In conclusion, knowing the History of others is important t o understand where theyre coming from. Knowing where you come from is one of the best ways of knowing where you are going. History helps us progress because we know what to avoid and what to aspire for. Perhaps if more people took the time to do this, there would be less conflict, ire and hatred in the world. Someday now will be history. So if now is not relevant, neither is history and vice versa. Or looking as many historians do, If we dont pay attention to the past and learn from history, we are bound to repeat the mistakes we made in the past. Those who cannot learn from history are condemned to repeat it.

Wednesday, May 29, 2019

Analyzing Danielle Harper’s ‘A Slice of Sleep’ Essay -- Literary Analy

The great screenwriter and director Robert Bresson is quoted as saying Make visible what, without you, susceptibility never have been seen. This statement is incredibly true of Danielle Harpers screenplay A Slice of Sleep. Harper has ca-cad a world full of colorise that reads to be a world of bleak darkness as it can be joyfully bright and uplifting. The word journey is much overused, but perfectly describes the contents of Harpers script. The following discourse will be looking at how Harper has followed screenwriting conventions, such as the where, what, why and how and using democratic screenwriting theorist texts such as Robert McKees Story (1999) and Syd Fields The Definitive Guide to Screenwriting (2003)as guides to analysing Harpers script. The script is split into three split each part is identifiable by a number of factors, the use of the starry nights sky, the change in room colour collections, the quiescency patterns of the characters and the change of tone in the vo ice-over. Harpers screen play is a theoretically unconventional collective of scenes, which primarily focus on the sleeping behaviour of its habitants. Characterisation is dictated throughout by the colour schemes of the various abodes. A slice of Sleep offers a sociological view of a pamper section of society, which is enabled by the use of abstract characterisation. The first two sections of the screenplay take place within single rooms, mainly bedrooms. These rooms have all carefully been colour coordinated to differentiate between the different scenes this also allows the tone of the scene to be set. Harper states in her covering letter how she wanted to create pronounced distinction instantly between the different segments of the scrip... ...that is strengthened by the use of a narrator, whose changes in tone match the production design unveil an intimate and thought provoking tale. Reference ListBooks-McKee, R, 1999. Story. 1st ed. London Methuen Publishing.Field, S, 2003 . The Definitive Guide to Screenwriting. 1st ed. London Random House Publishing.Journals- Rodman, Howard. What a Screenplay Isnt. picture palace Journal, Online. 45.2. Winter 2006.86-89.Available at http//www.jstor.org Accessed 02 April 2012.Websites-Screenplayology.2012.screenplayology.ONLINEAvailable at http//www.screenplayology.com/.Accessed 31 March 12Screen Writers Utopia. 2012. 127 Hours Three Act Structure. ONLINE Available at http//www.screenwritersutopia.com/2012/03/18/127-hours-3-act-structure/. Accessed 01 April 12Films-Pulp Fiction.1994 DVD Quentin Tarantino. USA Miramax

The Beatles :: Essay on The Beatles

The Beatles are even today known as the greatest and most influential act of the rock era. They introduced much innovations into popular music than whatsoever other rock band of the 20th century. Moreover, they were among the few artists of any genre that were simultaneously the best at what they did, and the most popular at what they did. They were also the prototypic British rock group to achieve worldwide prominence, launching a British Invasion that made rock truly an international phenomenon.      Guitarist and immature rebel John Lennon got hooked on rock & roll in the mid-50s, and formed a band, the Quarrymen, at his high school. Around mid-1957, the Quarrymen were joined by another guitarist, Paul McCartney. A bit later they were joined by another guitarist, George Harrison, a friend of McCartneys. As the line up of the Quarrymen grew and depleted, the Quarrymen were eventually minify to the trio of guitarists Lennon, McCartney and Harrison. The Q uarrymen changed their name to the Silver Beatles in 1960, quickly dropping the "Silver" to become just the Beatles. Lennons college friend Stuart Sutcliffe joined on bass, but finding a permanent drummer was a problem until Pete Best joined in 1960.       Although the Beatles had "artfully combined the best of American musical influences , the vocal style of black rhythm and megrims groups from the 1950s, the primitive excitement of rock n roll, the flair of Elvis, and the slickness of the American "hit parade"" (Assayas, 26) they hadnt fully developed , and some of their early recordings were issued only after the bands deck out to fame.     Near the end of 1961, the Beatles exploding local popularity caught the attention of local record store manager Brian Epstein, who was soon managing the band as well. He used his contacts to acquire a January 1, 1962, audition at Decca Records. After weeks of deliberation, Decca turned them down, as did several other British labels. Epsteins perseverance was finally rewarded with an audition for producer George Martin at Parlophone, an EMI subsidiary Martin sign(a) the Beatles in mid-1962. By this time, Epstein was grooming the band for national success by influencing them to get rid of their leather jackets and throw on a suit and tie.One more major change was kicking Pete Best out of the band. Best was replaced by Ringo Starr.     As each of the groups singles sold over a million copies in the U.

Tuesday, May 28, 2019

feel safer now :: essays research papers

Feel Safer Now?1.In order for organizations to function, there must be a free flow of information. This is a complex process, which becomes even more complicated when information is expected to flow freely from one government agency to another. This is the difficulty which plagued US agencies in the events direct up to September 11th. There were several sources of equipment failures in information present before the attacks in New York. One of the large breakdowns in information was out-of-pocket to information overload. There are many agencies in the states which involve national safety, such as the FBI, CIA, NSA and DAINS. Each agency possesses vast amounts of information and it was difficult for the bureaucracies to retrace which information was credible and important from information that was inconsequential and trivial. Insufficient amounts of information and inadequate flow of information strongly affected information sharing among agencies. First, from each one agency ha d different methods and rules for doing business. Because of this information was not uniformly documented or organized. This caused trouble when it came to relaying facts and suspicions to a different agency. Secondly, the agencies sabotaged adequate flows of information by being fantastically secretive with their own knowledge. Information was not easily or willingly shared between the agencies. Next, the agencies all had critical information about the pilots of the planes which crashed into the Trade centre but failed to adequately communicate their information. The NSA and CIA both held valuable pieces of the puzzle in catching Nawaf al-Hazmi but failed to piece them together to actually realize he was a threat. Lastly, because the FBI was only responsible for crimes already committed, information was not passed on from the CIA regarding al-Hazmis link to al-Qaida. These are all severe negative results from a system breakdown due to insufficient and inadequate flow of informati on.Errors also occurred due to variation of information. The text states that written subjects are more ambiguous and make differences in interpretation much more likely. A written pass on for a search warrant for a presumed hijacker (Moussaou) was sent to the US national security court. The writers of the request failed to include valuable French reports connecting Moussaou to al-Qaida. Another interpretation of data error was incredibly blatant. NSA intercepted a conversation in Arabic and failed to translate it. This missed message spoke of a big event planned for September 11th.2.Most of the errors leading to September 11th were those which seem to be errors in hindsight.

feel safer now :: essays research papers

Feel Safer Now?1.In order for organizations to function, there must be a free flow of learning. This is a complex process, which becomes even more complicated when selective information is expected to flow freely from one government agency to another. This is the fuss which plagued US agencies in the events leading up to September 11th. There were several sources of breakdowns in information present before the attacks in New York. One of the large breakdowns in information was due to information overload. There are many agencies in the states which involve national safety, such as the FBI, CIA, NSA and DAINS. Each agency possesses enormous amounts of information and it was difficult for the bureaucracies to decipher which information was credible and important from information that was inconsequential and trivial. Insufficient amounts of information and inadequate flow of information strongly bear on information sharing among agencies. First, each agency had different methods a nd rules for doing business. Because of this information was not uniformly documented or organized. This caused trouble when it came to relaying facts and suspicions to a different agency. Secondly, the agencies sabotaged adequate flows of information by being incredibly secretive with their own knowledge. Information was not easily or willingly shared between the agencies. Next, the agencies all had critical information about the pilots of the planes which crashed into the Trade Center but failed to adequately communicate their information. The NSA and CIA both held valuable pieces of the puzzle in catching Nawaf al-Hazmi but failed to piece them together to actually realize he was a threat. Lastly, because the FBI was only responsible for crimes already committed, information was not passed on from the CIA regarding al-Hazmis link to al-Qaida. These are all severe blackball results from a system breakdown due to insufficient and inadequate flow of information.Errors also occurre d due to interpretation of information. The text states that written messages are more ambiguous and make differences in interpretation much more likely. A written request for a search warrant for a presumed hijacker (Moussaou) was sent to the US national security court. The writers of the request failed to include valuable French reports connecting Moussaou to al-Qaida. Another interpretation of data error was incredibly blatant. NSA intercepted a conversation in Arabic and failed to translate it. This missed message spoke of a big event planned for September 11th.2.Most of the errors leading to September 11th were those which seem to be errors in hindsight.

Monday, May 27, 2019

Electronic Literature as an Information System Essay

ABSTRACTElectronic lit is a term that encompasses stratagemistic texts maintaind for printed media which are consumed in electronic format, as well as text produced for electronic media that could non be printed without losing essential qualities. Some ready argued that the encumbrance of electronic lit is the practice session of multimedia, fragmentation, and/or non- variantarity. Others focussing on the role of com chargeation and complex sueing. Cybertext does non sufficiently name these systems. In this paper we propose that pictorialises of electronic literature, tacit as text (with possible inclusion of multimedia elements) forgeed to be consumed in bi- or multi-directional electronic media, are best understood as 3-tier (or n-tier) education systems. These tiers include info (the textual content), process (computational interactions) and creation (on-screen rendering of the narrative). The interaction in the midst of these floors produces what is known as the work of electronic literature.This image for electronic literature moves beyond the initial memory accesses which either treated electronic literature as reck onerized versions of print literature or foc roled solely on one spirit of the system. In this paper, we condition two basic arguments. On the one hand, we propose that the conception of electronic literature as an study system gets at the essence of electronic media, and we predict that this image bequeath become dominant in this firmament within the bordering few years. On the otherwise hand, we propose that construction education systems whitethorn alike lead in a replacement of emphasis from one-time tasty impudentties to reusable systems. Demonstrating this approach, we read flora from the _Electronic publications Collection ledger 1_ (Jason Nelson and Emily brusk) as well as newer works by Mez and the team gathered by Kate Pullinger and Chris Joseph. Glancing toward the prox, we debate the n-ti er analysis of the Global Poetic System and the La flood lamp Project.INTRODUCTIONThe fundamental attri stilles of digital narrative have been, so far, aroundly faithful to the origin of electronic text a set of linked episodes that dribble hypermedia elements. Whether or not just about features could be reproduced in printed media has been subject of debate by opponents and proponents of digital narratives. However, as the electronic media evolves, some features truly anomalous to digital narrative have appeared. For represent, signifi firet effort has been invested in creating hypertexts responsive to the commentators actions by making links dynamic additionally, there have been efforts to create systems capable of producing fiction, with varying degrees of success.Both approaches have in common that they grant greater autonomy to the computing device, therefore making of it an active part of the literary exchange. The increasing complexity of these systems has directed c ritical attention to the novelty of the processes that produce the texts. As critics produce a flood of neologisms to classify these works, the landing field is suffering from a lack of a shared style for these works, as opposed to drawing from the available computer acquaintance and well-articulated terminology of randomness systems.The set Reader, Computer, Author forms a system in which there is flow and manipulation of information, i.e. an _information system_. The interaction between the elements of an information system advise be isolated in soundal tiers. For instance one or many a(prenominal) another(prenominal) information tiers, processing tiers, and founding tiers. In general we depart talk about n-tier informationsystems. We will pass this comment in the next section. In this system, a portion of information produced (output) is taken, totally or partially, as input, i.e. there is a feedback loop and therefore the process can be characterized as a cybernetic process. Of hang, the field has already embraced the notion of the cybertext.The term cybertext was brought to the literary grounds attention by Espen Aarseth (1997). His concept foc theatrical roles on the organization of the text in order to analyze the influence of media as an integral part of literary dynamics. According to Aarseth, cybertext is not a genre in itself. In order to classify traditions, literary genres and aesthetic value, Aarseth argues, we should inspect texts at a much more local level. The concept of cybertext offers a substance to expand the reach of literary studies to include phenomena that are perceived today as foreign or marginal.In Aarseths work, cybertext denotes the general set of text machines which, prosecuted by readers, yield different texts for outgrowth. Aarseth (1997, p. 19), refuses to narrow this definition of cybertext to such vague and unfoc employ terms such as digital text or electronic literature. For the course of this paper, we will use the phrase electronic literature, as we are interested in those works that are markedly literary in that they resonate (at least on one level) through evocative linguistic content and engage with an existing literary corpus.While we find cybertext to be a useful concept, the taxonomies and schematics that mind this approach interfere with interdisciplinary discussions of electronic literature. Instead of development Aarseths neologisms such as textons, scriptons and traversal functions, we will use widely-accepted terminology in the field of computer science. This shift is important because the concepts introduced by Aarseth, which are relevant to the current discussion, can be perfectly mapped to concepts developed years earlier in computer science. While the neologisms introduced by Aarseth remain arcane, the terms used in computer science are pervasive.Although the term cybertext adds a sense of increasingly complex interactivity, its focus is primarily on the interact ion between a user anda single art prey. Such a framework, however, insufficiently describes the constitution of such an object. in spite of appearance his treatise, Aarseth is compelled to create tables of attri andes and taxonomies to map and classify each of these objects. What is needed is a framework for discussing how these systems operate and how that operation contributes to an overall literary experience.We want to make a put one over distinction between this notion of cybertext as a reading process and more thorough description of a works infrastructure. Clearly, there are many ways in which the interaction between a reader and a speckle of electronic literature can happen for instance, a bandage of electronic literature could be written in HTML or in brazen-faced, yet presenting the similar interaction with the reader. In this paper, we adapt the notion of n-tier information systems to provide a scaffolding for reading and interpreting works of electronic literatur e.The fact that the field of electronic literature is largely comprised of cybertexts (in the sense depict above) that request some sorting of processing by the computer, has do of this processing a defining characteristic. Critics and public approach new works of electronic literature with the prospect of finding creativity and mental home not solitary(prenominal) at the narrative level but also at the processing level in many strips the newness of the latter has dominated other handations.NEW, NEWER, NEWEST MEDIAUntil now, electronic literature, or elit, has been focused on the new, leading to a constant drift to reinvent the wheel, the word, the image, the delivery system, and consequently reading itself. However, such an emphasis raises a number of questions. To what extent does the novel requirement of electronic literature (as the field is currently defined) de-emphasize a textual investment in exploring the (post)human condition (the literary)? How does this emphas is on the new constrain the development of hot Media both for authors and for prospective authors? Or how does such an emphasis put elit authors into an artistic arms race taking on the aethetics of the militiary-industrial complex that produces their tools?Literary essays that treat electronic literature focus on Flash movies, blogs, HTML pages, dynami cry (out)y generated pages, conversation agents, computer games, and other software applications. A recent edition of Leonardo Almanac (AA.VV. 2006) offers several examples. Its critics/poets analyze the information landscapes of David Small, the text art experiments of Suguru Ishizaki (2003), Brian Kim Stefans 11-minute Flash performance, and Philippe Bootzs matrix poetry program. Though not all the objects are new, what they share most of all is the novelty of their surface or process or text.These works bear little resemblance to one another, a definitive characteristic of electronic literature (dissimilarity) however, their incl usion under one rubric reflects the fields fetishization of the new. This addiction, mimicking that of the hard sciences it so admires, must constantly replace old forms and old systems with the latest system. Arguably, therefore, any piece of electronic literature may only be as interesting as its form or its novel use of the form. Moreover, such an emphasis shifts the critical attention from the content (what we will call selective information) to its rendering (or demonstration plus processes) primarily.Marie-Laure Ryan (2005) raised charges against such an aesthetic in her _dichtung-digital_ article. In this piece, she rails against a certain style of new media, net.art, elit art object that follows WYSINWYG (What you see is _NOT_ what you get), where the surface presents a text that is meditateed interesting only because of a more interesting process beneath the surface. This approach, according to Ryan, focuses on the meta-property of algorithmic operation. For this aestheti c, the art resides in the productive formula, and in the sophistication of the programming, rather than in the output itself (Ryan).This means that literary, or artistic value, does not reside in what appears on the screen, but in the virtuoso programming performance that underlies the text. While Ryan goes too far in her dismissal of experimentation, her critique holds, in as much as electronic literary criticism that puts process uber alis risks not only minimizing the textual to insignificance but also losing what should be one of elits biggest goals developing new forms for other authors to use andexplore.Such an emphasis reveals a bias that has thus far dominated new media scholarship. This alike bias leads new media scholars away from literary venues for their discourse communities and or else to Boing Boing and Siggraph, sites where curiosity or commercial techno logical systemal development dominate the discussions. It is also what spells instant obsolescence to many autho rware forms.The individual who uses authorware as it was intended is not the new media artist. It is the person who uses it in a new way or who reconfigures the software to do something unintended. This trend means that electronic literary artists will constantly be compelled to drive their works towards the new, stock-still firearm it means a perpetual pruning of all prior authorware, cutting them off from theliterary tree. (We see this same logic in commerical software production where the 4.0 release reconfigures the interface and removes some of the functionality we had grown to love.)A disproportionate emphasis on the new overlooks the tremendous areas of growth in authorship on the stabilizing, if rudimentary, authoring systems. The tide of productivity (in terms of textual output of all levels of quality) is not from an endless stream of innovations but from people who are committal to writing text in established author information formats, from traditional print to blogs . It is through the use of stabilized and reusable information systems that the greater public is organism attracted to consume and produce content through digital media. Blogging is the clearest example. This is not equivalent to saying that all blogging is literary, just as not all writing is however, blogging has created a social practice of reading and writing in digital media, thus increasing the frequency at which literary pieces appear through that venue. This increased participation activity would have been impossible if each blogger had to develop their own authoring systems.To help redistribute the scholarly priorities, we propose a reconsideration of electronic literature as an n-tier information system. The consequence of this shift will be twofold premier(prenominal) of all, it will allow us to treat content and processing independently, thus creating a clear distinction between works of literary merit and works of technological craftsmanship. While thisdistinction is at best problematic, considering the information system as a whole will move the analysis away from over-priveleging processes. Secondly, we claim that this approach provides a unify framework with which all pieces of electronic literature can be studied.This paper is organized as follows in Section 1 (Introduction) we describe what is the problem we intend to explore, and what are the type of systems that will be draw in this paper. Section 2 ( information Systems) explores the components of an information system and compares the approaches of different researchers in the field. Section 3 (Examples) demonstrates that the n-tier information system approach can be used to describe a multifarious array of pieces of electronic literature. Section 4 (Discussion) explores the conclusions drawn from this study and set future directions.INFORMATION SYSTEMSSince electronic literature is intercede by a computer, it is clear that there must exist methods to enter information into the syste m, to process it, and to render an output for readers that is to say, a piece of electronic literature can be considered as an _information system_. The term information system has different meanings. For instance, in mathematics an information system is a basic knowledge-representation matrix comprised of attributes (columns) and objects (rows). In sociology, information systems are systems whose behavior is determined by goals of individual as well as technology. In our context, information system will refer to a set of persons and machines organized to collect, store, transform, and represent selective information, a definition which coincides with the one widely accepted in computer science. The domain-specific twist comes when we specify that the data contains, but is not limited to, literary information.Information systems, due to their complexity, are usually built in seams. The earliest antecedent to a multi-layer approach to software architectures goes back to Trygve Reens kaug who proposed in 1979, while visiting the Smalltalk group at Xerox PARC, a pattern known as Model-View-Controller(MVC) that intended to isolate the process layer from the presentation layer. This paradigm evolved during the next decade to give rise to multi-tier architectures, in which presentation, data and processes were isolated. In principle, it is possible to have multiple data tiers, multiple process tiers, and multiple presentation tiers. One of the most prominent paradigms to approach information systems in the field of computer science, and the one we deem more appropriate for electronic literature, is the 3-tier architecture (Eckerson, 1995). This paradigm indicates that processes of different categories should be encapsulated in three different layers1. Presentation Layer The physical rendering of the narrative piece, for example, a sequence of physical pages or the on-screen presentation of the text.2. Process Layer The rules necessary to read a text. A reader of Lat in alphabet in printed narrative, for example, must cross the text from left to right, from hap to bottom and pass the page after the last word of the last line. In digital narrative, this layer could contain the rules programmed in a computer to build a text output.3. Data Layer Here lays the text itself. It is the set of quarrel, images, video, etc., which form the narrative space.In the proposed 3-tier model, feedback is not only possible, but also a _sine qua non_ condition for the literary exchange. It is the continuation of McLluhans mantra the media is the message. In digital narrative, the media acts on the message. The cycle of feedback in digital narrative is (i) Readers receive a piece of information, and based on it they execute a new interaction with the system. (ii) The computer whence takes that input and applies logic rules that have been programmed into it by the author. (iii) The computer takes content from the data layer and renders it to the reader in the pres entation layer. (iv) step -i is repeated again. Steps i through v describe a complete cycle of feedback, thus the maximum realization of a cybertext.N-tier information systems have had, surprisingly, a relatively short penetration in the field of electronic literature. Aarseth (1997, p.62) introduced a typology for his textonomy that maps perfectly a 3-tier system Scriptons (strings as they appear to readers) correspond to the presentation layer, textons (strings as they exist in the text) correspond to the data layer, and traversal function (the mechanism by which scriptons are revealed or generated from textons and presented to the user) corresponds to the process layer.These neologisms, while necessary if we study all forms of textuality, are unnecessary if we focus on electronic literature. The methods developed in computer science permeate constantly, and at an accelerating rate, the field of electronic literature, specially as artists create pieces of increasing complexity. P ractitioners in the field of electronic literature will be better equipped to benefit from the advances in information technology if the knowledge acquired in both fields can be bridged without a common terminology attempts to generate dialog are thwarted.The first reference that used computer science terminology applied to electronic literature appeared in an article by Gutierrez (2002), in which the three layers (data, logic and presentation) were clearly defined and proposed as a paradigm for electronic literature. Gutierrez (2004, 2006) explored in detail the logic (middle) layer, proposing algorithms to manage the processes needed to deliver literary content through electronic media. His proposition follows the paradigm proposed by Eckerson (1995) and Jacobson et al (1999) the system is divided into (a) topological stationary components, (b) users, (c) and pass(a) components (processes). The processes in the system are analyzed and represented using sequence diagrams to depic t how the actions of the users cause movement and transformation of information across different topological components.The next reference belongs to Wardrip-Fruin (2006) he proposes not three, but seven components (i) author, (ii) data, (iii) process, (iv) surface, (v) interaction, (vi) outside(a) processes, and (vii) audiences. This vision corresponds to an extensive research in diverse fields, and the interpretation is given from a literary perspective. Even thoughWardrip-Fruin does not use the terminology already established in computer science, nor he makes a clear distinction between topology, actors and processes, his proposal is essentially equivalent, and independent, from Gutierrezs model. In Wardrip-Fruins model, author -i- and audience -vii- correspond to actors in the Unified Process (UP) process -iii- and interaction -v- correspond to the process layer in the 3-tier architecture (how the actors move information across layers and how it is modified) data -ii- maps dire ctly the data layer in the 3-tier model finally, surface -iv- corresponds to the presentation layer.The emergence of these information systems approaches marks the awareness that these new literary forms arise from the world of software and hence benefit from traditional computer science approaches to software. In the Language of refreshed Media, Lev Manovich called for such analysis under the rubric of Software Studies. Applying the schematics of computer science to electronic literature allows critics to consider the complexities of that literature without falling prey to the tendency to colonize electronic literature with literary theory, as Espen Aarseth warned in Cybertext. Such a framework provides a terminology rather than the imposition of yet another taxonomy or set of metaphors that will evermore prove to be both helpful and glaringly insufficient. That is not to say that n-tier approaches fit works without conflict. In fact, some of the most fruitful readings come from the pieces that complicate the n-tier distinctions.EXAMPLESDREAMAPHAGE 1 & 2 REVISING OUR SYSTEMSJason Nelsons Dreamaphage (2003, 2004) demonstrates the ways in which the n-tier model can open up the complexities and ironies of works of electronic literature. Nelson is an auteur of interfaces, and in the first version of this piece he transforms the two-dimensional screen into a three-dimensional navigable space full of various planes. The interactor travels through these planes, encountering texts on them, documentation of the disease. It is as if we are traveling through the data structure of the story itself, as ifthe data has been brought to the surface. Though in strict terms, the data is where it always was supposed to be.Each plane is an object, rendered in Flash on the fly by the processing of the navigation input and the production of vector graphics to accept the screen. However, Nelsons work distances us, alienates us from the visual metaphors that we have taken for the physical structures of data in the computer. Designers of operating systems work hard to naturalize our relationship to our information. Opening windows, shuffle folders, becomes not a visual manifestation but the transparent glimpse of the structures themselves. Neal Stephenson has written very persuasively on the effect of replacing the command line interface with these illusions.The story (or data) behind the piece is the tale of a virus epidemic, whose primary symptom is the constant repetition of a dream. Nelson writes of the virus drifting eyes. in conclusion the disease proves fatal, as patients go insane then comatose. Here the piece is evocative of the repetitive lexias of classical electronic literature, information systems that lead the reader into the same texts as a natural component of traversing the narrative. Of course, the disease also describes the interface of the planes that the user travels through, one after the other, semi-transparent planes, dreamlike visi ons.This version of Dreamaphage was not the only one Nelson published. In 2004, Nelson published a second interface. Nelson writes of the piece, Unfortunately the first version of Dreamaphage suffered from usability problems. The main interface was unwieldy (but pretty) and the books hard to find (plus the occasional computer crash) (Dreamaphage, _ELC I_) He reconceived of the piece in two dimensions to create a more stable interface. The second version is two-dimensional and Nelson has also added a few more supererogatory bits and readjusted the medical reports. In the terms of n-tier, his changes primarily affected the interface and the data layers.Here is the artist of the interface facing the uncanny return of their own artistic creation in a world where information systems do not lie in the stable binding in a book but in a contingent state that is always dependenton the environments (operating systems) and frames (browser) in which they circulate. As the user tries to find a grounding in the spaces and mixed-up moments of the disease, Nelson himself attempts to build stability into that which is always shifting. However, do to a particular difference in the way that Firefox 2.0 renders Flash at the processing layer, interactors will discover that the first step page of the second version is squeezed into a fraction of their window, rather than expanding to fill the entire window.At this superlative, we are reminded of the works epigram, All other methods are errors. The words of these books, their dreams, contain the cure. But where is the pattern? In sleeping the same dream came again. How long before I become another lost? ( chess opening). As we compare these two versions of the same information system, we see the same dream approach shot again. The first version haunts the second as we demand when will it, too, become one of the lost.Though Nelson himself seems to have an insatiable appetite for novel interfaces, his own artistic practices reson ate well with the ethos of this article. At speaking engagements, he has made it a practice to bring his interfaces, his .fla (Flash source) files, for the attendees to take and use as they please. Nelson presents his information systems with a humble declaration that the audience may no doubt be able to find even more powerful uses for these interfaces.GALATEA NOVELTY RETURNSEmily Shorts ground-breaking work of interactive fiction offers another work that, like its namesake in the piece, opens up to this discussion when approached carefully. Galateas presentation layer appears to be straight forward IF fare. The interactor is a critic, encountering Galatea, which appears to be a statue of a woman but then begins to move and talk. In this novel work of interactive fiction, the interactor will not find the traditional spacial navigation verbs (go, open, throw) to be productive, as the action focuses on one room. Likewise will other verbs prove themselves unhelpful as the user is enco uraged in the help instructions to talk orask about topics.In Shorts piece, the navigational system of IF, as it was originally instantiated in Adventure, begins to mimic a conversational system driven by keywords, ala Joseph Weizenbaums ELIZA. Spelunking through a cave is replaced with conversing through an array of conversational replies. Galatea does not always answer the same way. She has moods, or rather, your relationship with Galatea has levels of emotion. The logic layer proves to be more complex than the few verbs portend. The hunt is to figure out the combination that leads to more data.Galatea uses a novel process to put the user in the position of a safe cracker, trying to unlock the treasure of answers. Notice how novelty has re-emerged as a key attribute here.Could there be a second Galatea? Could someone write another story using Galateas procesess. Technically no, since the work was released in a No-Derivs Creative Commons license. However, in many ways, Galatea is a second, coming in the experimental wave of artistic revisions of interactive fiction that followed the demise of the commercially produced text adventures from Infocom and others. Written in Z-Machine format, Galatea is already reimagining an information system. It is a new work written in the context of Infocoms interactive fiction system.Shorts work is admittedly novel in its processes, but the literary value of this work is not defined by its novely. The data, the replies, the context they describe, the relationship they create are rich and full of literary allusions. Short has gone on to help others make their own Galatea, not only in her work to help develop the natural language IF authoring system Inform 7 but also in the conversation libraries she has authored. In doing so, she moved into the work of other developers of authoring systems, such as the makers of chatbot systems.Richard S. Wallace developed one of the most familiar of these (A.I.M.L..bot), and his work demonst rates the power of creating and sharing authorware, even in the context of the tyranny of the novel.A.L.I.C.E. is the base-line conversational system, which can be downloaded and customized. Downloading the basic, functioning A.L.I.C.E. chatbot as a foundation allows users to center on editing recognizeable inputs and systematic receipts. Rather than worrying about how the system will respond to input, authors, or botmasters, can focus on creating what they system will say.To gain respect as a botmaster/author, one cannot merely modify an out-of-the-box ALICE. The user should further customize or build from the ground up using AIML, artificial intelligence markup language, the site-specific language created for Wallaces system. They must change the way the system operateslargely, because the critical attention around chatbots follows more the model of scientific innovation more than literary depth. However, according to Wallace, despite the critics emphasis on innovations, the use rs have been flocking to ALICE, as tens of thousands of users have created chatbots using the system (Be Your Own Botmaster). AIML becomes an important test case because while users may access some elements of the system, because they are not changing fundamentals, they can only make limited forays into the scientific/innovation chatbot discussions.Thus while our n-tier model stresses the importance of creating authorware and understanding information systems, novelty still holds an important role in the development of electronic literature. Nonetheless, interactors can at least use their pre-existing literacies when they encounter an AIML bot or a work of interactive fiction written on a familiar platform.LITERATRONICALiteratronic is yet another example of an n-tier system. Its design was based entirely in the concept of division between presentation, process and data layers. Every interaction of the readers is stored in a centralized database, and influences the subsequent respons e of the system to each readers interactions. The presentation layer employs web pages on which the reader can access multiple books by multiple authors in multiple languages.The process layer is rather complex, since it uses a specialized artificial intelligence engine to adapt the book to each reader, based upon his/her interaction, i.e. and adaptive system. The data layer is a relational database that stores not only the narrative, but also readers interaction. Since there is a clear distinction between presentation, data and process, Literatronica is a 3-tier system that allows authors of multiple language to focus on the business of literary creation.MEZS CODE THE SYSTEMS THAT DO NOT USE A COMPUTER1As with many systematic critical approaches, the place where n-tier is most fruitful is the where it produces or reveals contradictions. While some works of electronic literature lend themselves to clear divisions between parts of the information system, many works in electronic lite rature complicate that very distinction as articulated in such essays as Rita Raleys code.surfacecode.depth, in which she traces out codeworks that challenge distinctions between presentation and processing layers.In the works of Mez (Maryanne Breeze), she creates works written in what N. Katherine Hayles has called a creole of computer and human languages. Mez, and other codework authors, display the data layer on the presentation layer. One critical response is to point out that as an information system, the presentation layer are the lines of code and the rest of the system is whatever medium is displaying her poem. However, such an approach missed the very complexity of Mezs work. Indeed, Mezs work is often traditional static text that puts users in the role of the processor. The n-tier model illuminates her sleight of hand.trEmdollsr_ by Mezdoll_trerumors =var=msg val=YourPleading/ TREMORConsider her short codework trEmdollsr_ published on her site and on the Critical Code Stu dies blog. It is a program that seems to describe (or self-define) the birth pangs of a new world. The work, written in what appears to be XML, cannot function by itself. It appears to assign a value to a variable named doll_trerumors, a Mez-ian (Mezozoic?) portmenteau of doll_tremors and rumors. This particular rumor beign defined is called, the fifth world, which calls up images of the Native American belief in a the perfected world coming to replace our current fourth world.This belief appears most readily in the Hopi tribe of North America. A youngster of this fifth world are fractures, or put another way, the tremor of the coming world brings with it fractures. The first, post 2 inscription, contains polymers a user set to YourDollUserName, a tertiaryperson set to Your3rdPerson, a location set to YourSoddenSelf, and a spikey set to YourSpiKeySelf. The user then becomes a molecule name within the fracture, a component of the fracture. These references to dolls and 3rd person s eem to evoke the world of avatars. In virtual worlds, users have dolls.If the first fracture is located in the avatar of the person, in their avatar, the second centers on communication from this person or user. Here the user is defined with YourPolyannaUserName, and we are in the world of overreaching optimism, in the face of a msg or message of YourPleading and a lastword. Combining these two fractures we have a sodden and spikey self pleading and uttering a last word presumably before the coming rupture into the fifth world.As with many codeworks, the presentation layer appears to be the data and logic layer. However, there is clearly another logic layer that makes these words appear on whatever inerface the reader is using. Thus, the presentation layer is a deception, a challenge to the very division of layers, a revelation that hides. At the same time, we are compelled to execute the presneted code by tracing out its logic. We must take the place of the compiler with the unders tanding that the coding structures are alsomeant to prepare or allusive subroutines, that part of our brain that is constantly listening for echoes and whispersTo produce that reading, we have had to execute that poem, at least step through it, acting as the processor. In the process of writing poetic works as data, she has swapped our traditional position vis-a-vis n-tier systems. Where traditional poetry establishes idenitity through Is, Mez has us separate with a system ready to process the user who is not ready for the fifth world, whatever that may bring. At the same time, universal or even mythical realities have been systematized or simulated. There is another layer of data that is missing, supplied by the user presumably. The poem leaves its tremors in a state of potential, waiting to operate in the context of a larger system and waiting for a user to supply the names, pleading, and lastwords.The codework means nothing to the computer. This is not to make some sort of Sear lean intervention about the inability of computers to comprehend but to point out that Mezs code is not valid XML. Of course, Mez is not writing for computer trial impression but instead relies on the less systematic processing of humans who rely on a far less rigorously specified language structure. Tremors fracture even the process of assigning some signified to these doll_trerumors.Mezs poem plays upon the layers of n-tier, exposing them and inverting them. Through the close-reading tools of Critical Code Studies, we can get to her inference and innuendo. However, we should not miss the central irony of the work, the data that is hidden, the notable lack of processing performed by this piece. Mez has hailed us into the system, and our compliance, begins the tremors that brings about this fifth world even as it lies in potential.N-tier is not the fifth world of interpretation. However, it is a tremor of recognition that literacy in information systems offers a critical awareness crucial in these emerging forms of literature. future PROJECTSTwo new projects give the sense of the electronic literature to come. The authors of this paper have been collaborating to create systems that answer Hayles call at The afterlife of Electronic Literature in Maryland to create works that move beyond the desktop. The Global Poetic System and The LA Flood Project confidence GPS, literary texts, and civic spaces to create art objects that rely on a complex relationship between various pieces of software and hardware, from mobile phones to PBX telephony to satellite technology. To fully discuss such works with the same approaches we apply to video games or Flash-based literary works is to miss this intricate interaction. However, n-tier provides a scalable framework for discussing the complex networking of systems to produce an artistic experience through software and hardware.These projects explore four types of interfaces (mobile phones, PDAs, desktop clients, and web app lications) and three ways of reading (literary adaptative texts, literary classic texts, texts constructed from the interaction of the community). The central piece that glues together literary information is geolocation. When the interactor in the world is one of the input systems, critics need a framework that can handle complexity. Because of the heterogeneousness of platforms in which these systems run, there are multiple presentation layers (e.g. phone, laptop, etc.), multiple parallel processing layers, and multiple sources of information (e.g. weather, traffic, literary content, user routes, etc.), thus requiring a n-tier approach for analysis and implementation.It is clear that as electronic literature becomes more complex, knowledge of the n-tier dilineations will be crucial not only to the reception but also the production of such works. Since the interaction of heterogenous systems is the state of our world, an n-tier approach will up critics to open up these works in wa ys that help get wind patterns and systems in our lives.DISCUSSION allow us bring down the great walls of neologisms. Let us pause for reflectionin the race for newer new media. Let us collaborate on the n-tiers of information systems to create robust writing forms and the possibility of a extending the audiences that are literate in these systems.In this paper, we have described an analytical framework that is useful to divide works of electronic literature into their forming elements, in such a way that is coherent with advances in computer science and information technology, and at the same time using a language that could be easily adopted by the electronic literature community. This framework places creators, technicians, and critics on common ground. This field does not have a unified method to analyze creative works this void is a result, perhaps, in the conviction that works of electronic literature require an element of newness and a reinvention of paradigms with every new piece.Critics are always looking for innovation. However, the unrestrained celebration of the new or novel has lead New Media to the aesthetic equivalent of an arms race. In this article we found common elements to all these pieces, bridging the gap between computer science and electronic literature with the hopes of encouraging the production of sustainable new forms, be they stand alone or composed of a conglomeration of media forms, software, and users.As works of electronic literature continue to become more complex, bringing together more heterogeneous digital forms, the n-tier model will prove scalable and nuanced to help describe each layer of the work without forcing it into a pre-set positions for the sake of theory. We have to ask at this point how does this framework handle exceptions and increasing complexity?It is interesting to consider how the proposed n-tier model might be adapted to cope with dynamic data, which seems to be the most complex case. Current literary w orks tend to process a fixed set of data, generated by the author it is the mode of traversing what changes. Several software solutions may be used to solve the issue of how this traversal is left in the hands of the user or mediated yet in some way by the author through the presentation system. The n-tier model provides a way of identifying three basic ingredients the data to be traversed, the logic for deciding how totraverse them, and the presentation which conveys to the user the selected portions at the selected moments. In this way, such systems give the impression that the reader is shaping the literary work by his/her actions. Yet this, in the simple configuration, is just an illusion.In following the labyrinth set out by the author, readers may feel that their journey through it is always being built anew. But the labyrinth itself is already fixed. Consider what would happen when these systems leave computer screens and move into the world of mobile devices and ubiquitous a rt as Hayles predicted they would at the 2007 ELO conference. How could the system cope with changing data, with a labyrinth that rebuilds itself differently each time based on the path of the user? In this endeavor, we would be shifting an increasing responsibility into the machine which is running the work. The data need not be modified by the system itself.A simple initial approach might be to allow a subset of the data to be drawn from the real environment outside the literary work. This would introduce a measure of uncertainty into the set of possible situations that the user and the system will be faced with. And it would force the author to consider a much wider range of alternative situations and/or means of solving them. Interesting initiatives along these lines might be found in the various systems that combine literary material with real-world information by using, for example, mobile hand-held devices, provided with means of geolocation and networking.With respect to the n-tier model, the changes introduced in the data layer would force additional changes in the other layers. The process layer would grow in complexity to acquire the ability to react to the different possible changes in the data layer. It could be possible for the process layer to absorb all the required changes, while retaining a version of the presentation layer similar to the one used when dealing with static data. However, this may put a heavy load on the process layer, which may result in a slightly clumsy presentation. The clumsiness would be perceived by the reader as a slight imbalance between the dynamic content being presented and the static means used for presenting it.The breaking point would be reached when readers become aware that the material they are receiving is being presented inadequately, and it is apparent that there might have been betterways of presenting it. In these cases, a more complex presentation layer is also required. In all cases, to enable the compu ter to deal with the new type of situations would require the programmer to encode some means of appreciating the material that is being handled, and some means of automatically converting it into a adequate format for communicating it to the user. In these task, current research into knowledge representation, natural language understanding, and natural language generation may provide very interesting tools. But, again, these tools would exist in processing layers, and would be dependent on data layers, so the n-tier model would still apply.The n-tier information system approach remains valid even in the most marginal cases. It promises to provide a unified framework of analysis for the field of electronic literature. Looking at electronic literature as an information system may signal another shift in disciplinary emphasis, one from a kind of high-theory humanities criticism towards something more like Human Computer Interface scholarship, which is, by its nature, highly pragmatic. mayhap a better way would be to try bring these two approaches closer together and to encourage dialogue between usability scientists and the agents of interpretation and meaning. Until this shift happens, the future of new media may be a developmental 404 error page.REFERENCESAA.VV. New Media Poetry and Poetics Special _Leonardo Almanac_, 145, September 2006. uniform resource locator http//www.leoalmanac.org/journal/vol_14/lea_v14_n05-06/index.asp first-class honours degree accessed on 12/2006.AARSETH , Espen J. _Cybertext Perspectives on Ergodic Literature_. Johns Hopkins University Press, Baltimore, MD, 1997.CALVI, Licia.Lector in rebus The role of the reader and the characteristics of hyperreading. In _Proceedings of the Tenth ACM Conference on Hypertext and Hypermedia_, pp 101-109. ACM Press, 1999.COOVER, Robert.Literary Hypertext The Passing of the Golden term of Hypertext. _Feed Magazine_. http//www.feedmag.com/document/do291lofi.html First accessed 4 August 2006.ECKERSON , Wayne W.Three Tier Client/Server Architecture Achieving Scalability, Performance, and Efficiency in Client Server Applications. _Open Information Systems_ 10, 1. January 1995 3(20).GENETTE, Gerard. _Paratexts Thresholds of Interpretations_. Cambridge University Press, New York, NY, 1997.GUTIERREZ, Juan B. Literatrnica sobre cmo y porqu crear ficcin para medios digitales. In _Proceedings of the 1er Congreso ONLINE del Observatorio para la CiberSociedad_, Barcelona, http//cibersociedad.rediris.es/congreso/comms/g04gutierrez.htm First accessed on 01/2003.GUTIERREZ, Juan B. Literatrnica Hipertexto Literario Adaptativo. in _Proceedings of the 2o Congreso del Observatorio para la Cibersociedad_. Barcelona, Spain. URL http//www.cibersociedad.net/congres2004/index_f.html First accessed on 11/2004.GUTIERREZ, Juan B. Literatronic Use of Hamiltonian cycles to produce adaptivity in literary hypertext. In _Proceedings of The Bridges Conference Mathematical Connections in Art, Music, and Scien ce_, pages 215-222. Institute of Education, University of London, August 2006.HAYLES, N. Katherine. Deeper into the Machine The Future of Electronic Literature. _Culture Machine_. Vol 5. 2003. http//svr91.edns1.com/culturem/index.php/cm/article/viewArticle/245/241 First accessed 09/2004. Storytelling in the Digital Age Narrative and Data. Digital Narratives conference. UCLA. 7 April 2005.HILLNER, Matthias.Virtual Typography Time Perception in Relation to Digital Communication. New Media Poetry and Poetics Special Issue, _Leonardo Electronic Almanac_ Vol 14, No. 5 6 (2006). http//leoalmanac.org/journal/vol_14/lea_v14_n05-06/mengberg.asp First accessed 25 Sep. 2006JACOBSON I, BOOCH G, RUMBAUGH J. _The unified software development process_. Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA, 1999.LANDOW George P. _Hypertext 2.0_. Johns Hopkins University Press, Baltimore, MD, 1997.MANOVICH, Lev. _The Language of New Media_. MIT, Cambridge, MA, 2002.MARINO, Mark. Critical Code Studies. _Electronic Book Review_, December 2006. http//www.electronicbookreview.com/thread/electropoetics/codology First Accessed 12/2006.MEZ.trEmdollsr_ _Critical Code Studies_. April 2008. http//criticalcodestudies.com/wordpress/2008/04/28/_tremdollsr_/ First accessed 04/2008.MONTFORT, Nick.Cybertext . _Electronic Book Review_, January 2001. URL http//www.altx.com/EBR/ebr11/11mon First accessed on 06/2006.NEA. _Reading At Risk A Survey of Literary Reading in America_. National Endowment for the Arts, 1100 Pennsylvania Avenue, NW. Washington, DC 20506-0001, 2004.PAJARES TOSCA, Susana and Jill Walker.Selected Bibliography of Hypertext Critcism. _JoDI_. http//jodi.tamu.edu/Articles/v03/i03/bibliography.html First accessed October 24, 2006.Raley, Rita. Code.surfaceCode.depth. _Dichtung Digital_. 2006. http//www.dichtung-digital.org/2006/1-Raley.htm First accessed 08/2006.RODRGUEZ, Jaime Alejandro. Teora, Prctica y Enseanza del Hipertexto de Ficcin El Relato Digital. Pontificia Unive rsidad Javeriana, Bogot, Colombia, 2003. http//www.javeriana.edu.co/relatodigital First accessed on 09/2003.RYAN, Marie-Laure. Narrative and the Split Condition of Digital Textuality. 1. 2005. URL http//www.brown.edu/Research/dichtung-digital/2005/1/Ryan/ First accessed 4 October 2006VERSHBOW, Ben.Flight Paths a Networked Novel. _IF Future of the Book_. December 2007 http//www.futureofthebook.org/blog/archives/2007/12/flight_paths_a_networked_novel.html First Accessed 01/2008.WALLACE, Richard S. Be Your Own Botmaster. Alice AI Foundation Inc. 2nd ed. 2004.WARDRIP-FRUIN, Noah. _Expressive Processing On Process-Intensive Literature and Digital Media_. Brown University. Providence, Rhode Island. May 2006.WARDRIP-FRUIN,Noah. Christopher Strachey the first digital artist? _Grand Text Auto_. 1 August 2005. http//grandtextauto.gatech.edu/2005/08/01/christopher-strachey-first-digital-artist/ First accessed 3 September 2006.ZWASS, Vladimir. _Foundations of Information Systems_. Mcgraw-Hill C ollege, NY 1997.

Sunday, May 26, 2019

Buddhism without Beliefs

It is a well-known event that Buddhism religion is distinguished from all Asian religions due to its three innovative and overlord sifts equal position of women emergence of Buddhism as social transformation replacement of monastery and building lay community as the principal arena of Buddhist utilize. The bind Buddhism without Beliefs by Stephen Batchelor describes the significance of three elements and their application to future development of the world. (Batchelor 1997)It is possible to suggest that the book is an intelligent effort to provide better understanding to the Buddhism religion and to make clear the attri plainlye of dharma enforce. Apparently, the book contains origins personal reflections and suggestions how to apply Buddhism studies to coetaneous era o skepticism. It is necessary to summary that the book contains three main relegates called Ground, Path, Fruition and the last section devoted to culture and imagination. The root is rather persuasive, becau se he uses arranged arguments, conclusions, facts and viewpoints to defend his position.Batchelor has managed to affect readers and to make them think about the issue. Therefore the book subscribe tos through abundant data presented to persuade readers that Buddhism is worth attention. Therefore, the apparent strength of the book is abundant data and evidence used to support the main idea. (Batchelor 1997) The firstborn part of the book Ground involves theoretical framework of Buddhism religion and explains its core issues. The write begins with explaining differences between two entities dharma practice and religious Buddhism intertwined into the history of Buddhism theory.According to Batchelor those entities are closely related and thus are inseparable. Furthermore, they have to be preserved for discovering their contemporary significance. The first and the most significant entity for Batchelor is dharma practice, because it teaches and trains how to awaken and to feel free dom from anguish. The help entity religious Buddhism is a system of belief aims at ensuring social stability as well as providing religious consolation. (p. 16)Nevertheless, the precedent admits that world view and religious expression has little to do with core Buddhas teachings, because they pertain entirely to the Asian cultural soil within which Buddhism took root. Batchelor agrees that those entities have had significant purpose in ancient time, though they are hardly applicable to contemporary society. The author argues that if the dharma practice offers alternative approach to interpretation of core values and virtues, it has to be deprived of its religious apparel and recast in a rigorously secular mode.It would result in atheist style of dharma practicing. (Batchelor 1997) Moreover, Batchelor believes that dharma practice would aim at social and personal freedom and liberation heart that mickle have to escape from suffering created by egocentric clinging. According t o Batchelor the positive moment of Buddhism is that the religion provides answers to great questions concerning place of humans in the grand abstract of things. The author seems to provide agnostic muckle of the thinks stating that the dharma is not something to believe in but something to do.(p. 17) However, Buddha didnt have answers to metaphysical questions of his day. The only known fact is that Buddha was teaching followers about sufferings and cessation. Thus the author makes a conclusion that Buddhas teachings are therapeutic, existential and may be referred to liberating agnosticism. For example, Batchelor makes an attempt to escape from metaphysical questions of his day by arguing that Buddha was merely adopting the symbols, metaphors, and imagery of his world. (p. 17)Nevertheless, Later Batchelor suggests that Buddha accepted the ideas of rebirth and kamma, though he considers them odd that a practice touch on with anguish and the ending of anguish should be obliged to adopt ancient Indian metaphysical theories and thus accept as an article of faith that cognisance cannot be explained in terms of brain function. (p. 37) However, Batchelor seems not to approve Buddhas metaphysical theories, although he doesnt completely reject the idea of rebirth or rebirth.Instead the author thinks that honest approach has to be taken in understanding life after death, because existing knowledge isnt enough to earth anything. Buddha accepts the ideas of reincarnation and kamms indicating a failure to summon forth the courage to risk a non-dogmatic and non-evasive stance on much(prenominal) crucial existential matters. (p. 38) It is apparent that the author tends to use a variety of logical arguments to approve his interpretation of Dhamma. Batchelors arguments succeed in gaining cogency due to oversimplification, selective relevant citations and rationalization.For example the author discuses four ennobling truths and finds put that these truths arent propositi ons to believe but challenges to act. (p. 7) Nevertheless, such statement is hardly truthful, because the author fails to admit that tasks imposed by the truths acquire their meaning from a specific context, namely, the quest for liberation from the vicious round of rebirths. The dichotomy between religious Buddhism and dharma practice is hardly endorsable. The author calls to recognize a spectrum of Buddhist practices, ranging from simple devotional and ethical observances to more advanced contemplative and philosophical ones.Those observances are involved into faith and understanding, though they disappear when dharma practice is regarded on the terra firma of different suggestions. The author considers premises underling the traditional Buddhist practice as reincarnation and kamm, though he thinks they are only consolatory elements crept into the religion. (p. 18-19) The second part of the book is titled Path and aims at providing relevant sketches to agnostic figures based on the dharma practice. Furthermore, author provides clear and lively account statements of the issues displaying his creativity and literary gift.The part is divided into subsections devoted to sense, overview of emptiness and development of sympathy and compassion. Apparent strength of the part is simple examples introduced in every subsection. Most original examples involve practicing awareness and mindfulness, showing essence of emptiness, challenging the findings and reflecting on common sufferings of friends, enemies and acquaintances. The second part includes also twelve links of dependent origination interpreted rather primarily and illustrated by mistaken perception.(Batchelor 1997) Nevertheless, the conception of the path is absent in Batchelors interpretation, though it is considered the traditional foundation of Buddhist religion the Going for Refuge to the tierce Jewels. The author thinks that character referenceing the path doesnt have any sense in the frame pf agnos tic conception, though omission of path seems rather significant. Furthermore, the author doesnt mention either code of moral rules or the Five Precepts. However, Batchelor slightly talks about ethical framework and proposes integrity.Despite the fact he speaks about sensational insights of integrity, the issues is still questionable as it has neither sufficient basis for ethic nor exact guidelines. (p. 48-50) The third part of the book Fruition is an exploration of consequences of dharma practice and explanation why dharma practice is called passionate agnosticism, Batchelor starts with accounting meditative path. The author explains the process of meditation stating that it consists of radical, relentless questioning of every aspect of experience.Nevertheless, such beginning makes readers profoundly perplexed, though for author this perplexed questioning is the central path itself. (p. 98) It means that the path aims at finding no goals and answers. Such conception of dharma prac tice seems bizarre and strange. Further, the author returns to meditation stating that its goal to justify belief system and to approve using the raft of the dharma practice. According to author, Buddha stresses the insight meditation, because it is able to lead to thorough knowledge of true nature. Thus Batchelor shows once more the bearing of ones starting point on ones destination.It is apparent that the author firstly starts from agnostic concept and then turns to excessive mystery and doubt. However, Batchelor believes that if a person trust dharma practice, he/she has to follow the right View and consequently to find Right cognition and Right Liberation. (p. 108) The last section is devoted to the concepts of culture and imagination. The author deals with correlations between contemporary world and Buddhist teachings and religion. In other words, Batchelor tries to find implications of Buddhism in neo world.The author asserts that throughout the Buddhism history, Dhamma has r ejuvenated itself by continually altering its forms to respond to changing social and cultural conditions. However, such statement may be considered the act of authors imagination, his gift of talented thinker and his creative vision of things. (p. 107) Batchelor has given new and fresh approach to Buddhist teachings. Some critics find Batchelors vision of Buddhism too simplistic, though it is difficult to agree with them. Batchelor seems to present his original point of view, his understanding and his perception of Buddhism.He succeeded in making viewers interested exactly by simple explanation of core Buddhist issues. Nevertheless, the author has failed to explain sufficiently the role played by orthodoxy in stimulating dharma practice. What is more important to mention is that Batchelor believes that Buddhism applied to contemporary world may rise the need to create meaning that dharma practice is able to stimulate creativity in followers. According to author, dharma practice is a new culture of waken that addresses the specific anguish of the contemporary world.(p. 109) It is necessary to conclude that Batchelor has created a new vision of Buddhism culture of awakening by stressing the integrity of Buddhist tradition and their responsibility to the present and the future. Despite the critique the book is rally worth reading, because it provides better understanding, advantages and disadvantages of not only of Buddhism religion, but also of agnostic concept. References Batchelor, Stephen. (1997). Buddhism Without Beliefs A Contemporary Guide to Awakening. New York Revierhead Books.

Saturday, May 25, 2019

Customer’s Adoption of Mobile-Commerce a Study on Emerging Economy

worldwide diary of e-Education, e-Business, e-Man historic periodment and e-Learning, Vol. 1, noe 3, wonderful 2011 Customers Ad alternative of nomadic- traffic A Study on Emerging frugality Rahmath Safeena, Nisar Hundewale, and Abdullah Kamani AbstractToday, nomadic communication technologies provide immense supernumerary scope for consumers banking transactions due to their always-on functionality and the option to access banks facilities anytime and anywhere. restless banking is a subset of electronic banking which underlies not only the determinants of the banking strain but also the special conditions of alert commerce.It is the latest and most innovative avail offered by the banks. But not enough study has been done to known regarding how customers perceive and evaluate electronically delivered industrious banking overhauls. The study considers five factors sensed usancefulness, sensed travel of commit, subjective norm, consumer sensation about wide awake banking and perceived risks associated with officious banking. This study also points out that these factors have a strong and corroborative effect on customers to accept mobile banking arranging. Index Termsm-commerce, mobile banking perceived service program, ease of expend, risk, aw arness, subjective norm.I. INTRODUCTION The proliferation of, and rapid advances in, engine room-based systems, especially those colligate to the internet, atomic number 18 leading to fundamental changes in how companies move with customers 1-3. busy phone usage has spread in a very broad manner both in developing and developed countries. With mobile communications already as a prime case for leapfrogging traditional infrastructure, mobile banking (M-Banking) has great potential for extending the provision of financial services to unbanked people through a technology that is both familiar and widespread.One of the first commercial applications of the mobile commerce was mobile banking (m-ba nking) 4, 5. The rapid growth of mobile applications has given rise to a late term m-commerce. M-commerce is defined as the application of wireless communications networks and devices to the execution of transactions with monetary value either direct or indirect 6. As the number of mobile phone recitationrs is growing, purchasing products and services using mobile phones and other mobile devices are also increasing also the use of Mobile Banking is as yet in initial stages and more re research in this field is needed 7.Internet banking and mobile banking (m-banking) has become the self-service delivery channel that allows banks to provide instruction and offer services to their customers with more dodge via the web services technology. A key component of many initiatives is the implementation of Customer Relationship Management (CRM) software product 8. Many companies in the financial services sector have been quick to implement Internet capabilities, and electronic service is becoming a viable option for interaction between financial service providers and their customers 9.Customer bliss and customer retention are more and more developing into key success factors in e-banking 2. Technology, in particular, has been increasingly employed in service organizations to enhance customer service quality and delivery, reduce costs, and standardize core service offerings 1, 9-11. Mobile banking service allows customers to manage their accounts with ease. Mols et al. , 12 utter that the diffusion of electronic banking is more determined by customer acceptance than by seller offerings.Not enough is known regarding how customers perceive and evaluate electronically delivered services. downwind and Lin 10 have also recently highlighted the need for further research to measure the influence of e-service on customer-perceived service quality and satisfaction 1. This study considers the five factors perceived usefulness, perceived ease of use, subjective norm, consu mer awareness about mobile banking and perceived risks associated with mobile banking. Half of the people that have tried mobile banking services impart not become active users.Highly publicized cases involving major security failures might have contributed to the publics concern and lack of acceptance of mobile banking. The shew study aims at examining the impact of perceived usefulness, perceived ease of use, subjective norm, and consumer awareness on mobile banking and perceived risk on the acceptance of mobile banking by the consumers. II. MOBILE BANKING With mobile commerce or m-commerce technology, consumers puke use mobile phones, Personal Digital Assistant (PDA) and laptop computers to access the internet, send and gather up messages and make transactions at ny time from any places without having tied to a particular location 13. Mobile banking is a subset of electronic banking which underlies not only the determinants of the banking seam but also the special conditions of mobile commerce. Mobile Banking has been gaining increasing popularity amongst various sections of the society for past few years, having recovered from the shock of the dot-com burst 14. Mobile Banking refers to provision and availment of banking- and financial services with the help of mobile telecommunication devices.The scope of offered services may include facilities 228 Manuscript stock July 12 revised July 25, 2011. Rahmath Safeena, Nisar Hundewale, Abdullah Kamani, are College of Computers and Information Technology, Taif University, Taif, Saudi Arabia (e-mailsafi. emailprotected com,e-mailn. emailprotected edu. sa,e-mailabd ullah. emailprotected edu. sa) world(prenominal) ledger of e-Education, e-Business, e-Management and e-Learning, Vol. 1, No. 3, solemn 2011 to conduct bank and stock market transactions, to administer accounts and to access customized study 15.With mobile technology, banks can offer services to their customers such(prenominal)(prenominal) as doin g funds transfer dapple travelling, receiving online updates of stock price or even performing stock trading while being stuck in traffic. Smart phones and 3G connectivity provide some capabilities that older text message-only phones do not. The convergence of mobile communications and distributed networked computing has provided the foundation for the development of a new channel of electronic business, mobile business 15.Mobile business (m-business) is defined as the use of the mobile information technologies, including the wireless Internet, for organizational communication and coordination, and the focal point of the firm 16. M-Banking is a term used for performing balance checks, account transactions, payments, credit applications etc. via a mobile device such as a mobile phone or Personal Digital Assistant (PDA). It is the convenient, simple, secure, anytime and anywhere banking. Many new e-commerce applications get out be possible and substantively benefit from acclivit ous ireless and mobile networks. These applications can collectively be termed wireless e-commerce or mobile commerce 17. The earliest mobile banking services were offered via SMS. With the introduction of the first primitive stylishness phones with WAP (wireless application protocol) support enabling the use of the mobile web in 1999, the first European banks started to offer mobile banking on this platform to their customers 15. SMS Banking is a Mobile technology that allows you to request and receive banking information from your bank on your mobile phone via SMS 18.WAP banking is another form of the E-banking that enables the user to communicate interactively with the bank, for which client uses only GSM mobile phone with WAP service. With its options and the method of controlling WAP banking reminds an easy form of Internet banking. WAP is a universal standard for bringing Internet-based content and advanced value-added services to wireless devices such as phones and PDAs 19. III. CONSUMER ATTITUDE TOWARDS M-BANKING Technological understructures are having significant importance in human general and professional life. This era can safely be attributed as technology revolution.The quick expansion of information technology has imbibed into the lives of millions of people. Rapid technology advancements have introduced major changes in the worldwide economic and business atmosphere 20. inquiry on consumer attitude and betrothal of mobile banking verbaliseed there are several factors predetermining the consumers attitude towards online banking such as persons demography, motivation and demeanour towards different banking technologies and individual acceptance of new technology. It has been found that consumers attitudes toward online banking are influenced by the prior experience of computer and new technology 21.The adoption of electronic banking forces consumers to consider concerns about password integrity, seclusion, data encryption, hacking, and t he protection of personal information 22. Electronic banking requires perhaps the most consumer involvement, as it requires the 229 consumer to maintain and regularly interact with additional technology (a computer and an Internet connection) 23. Consumers who use e-banking use it on an ongoing basis and need to acquire a certain comfort level with the technology to nutriment using it 24. Customer adoption is a recognized dilemma for the strategic plans of financial institutions.Several studies have investigated why individuals choose a specific bank. great consumer selection factors include convenience, service facilities, reputation and interest rates 25, 26. gibe to Delvin 27, customers have less time to spend on activities such as visit a bank and therefore want a higher(prenominal) degree of convenience and accessibility. The service-quality attributes that the Internet banks must offer to induce consumers to switch to online transactions and keep using them are perceived us efulness, ease of use, reliability, responsiveness, security, and continuous improvement 28.In another study by 29, they found that individual expectations regarding accuracy, security, network speed, user-friendliness, and user involvement and convenience were the most important quality attributes in the perceived usefulness of Internet-based e-retail banking. The crucial factors that affect an individuals stopping point to use or not to use online services the age, the difficulties of using the Internet, fear of changes in banking sector due to technological development and lack of information concerning products and services provided to customers through electronic delivery channels.Factors such as speed of transactions or the cost of using the Internet have little impact on an individuals final decision 30. In the study by 1, revealed six composite dimensions of electronic service quality, including the provision of convenient/accurate electronic banking operations the accessib ility and reliability of service provision good queue management service personalization the provision of friendly and responsive customer service and the provision of targeted customer service. perceived usefulness, security and privacy are the main perusing factors to accept online banking system 20.According to a study WAP, GPRS and 3G features from mobile devices are of no significance or influence in the adoption of e-banking services 31. IV. RESEARCH MODEL AND HYPOTHESES comprehend usefulness and perceived ease of use are the two components of Technology word meaning Model (TAM). According to 32,perceived usefulness is the extent to which a person believes that using a particular system will enhance his or her performance, while perceived ease of use is the extent to which a person believes that using a particular system will be free of effort.TAM has been widely used by information system researcher there is a common agreement among them that the model is valid in predictin g the individuals acceptance of new technologies 33-36. comprehend usefulness and perceived ease of use is significant factors affecting acceptance of an information system or new technologies. Prior research has empirically found positive relationship between perceived ease of use and perceived usefulness as critical factors on the use of e- banking 31, 37-39. Hence an application perceived to be useful transnational daybook of e-Education, e-Business, e-Management and e-Learning, Vol. , No. 3, August 2011 perceived to be easier to use than another is more likely to be accepted by users. By applying these into online banking context we hypothesizing H1 Perceived usefulness has a positive effect on intention to adopt and use MB. H2 Perceived ease of use has a positive effect on intention to adopt and use MB Adoption is the acceptance and continued use of a product, service or idea. According to 40, 41, consumers go through a process of knowledge, persuasion, decision and confirma tion before they are ready to adopt a product or service.The adoption or rejection of an innovation begins when the consumer becomes aware of the product. Consumers will seek out services which offer the best value for money. Hence, for adoption of mobile banking, it is necessary that the banks offering this service make the consumers aware about the availability of such a product and explain how it adds value relative to other products of its own or that of the competitors. An important distinction for any adoption of innovative service or product is creating awareness among the consumers about the service/product 40.The amount of information consumers have about online banking has been determine as a major factor impacting the adoption. According to 40, while the use of online banking services is fairly new experience to many people, low awareness of online banking is a major factor in causing people not to adopt online banking. In an empirical study of Australian consumers foun d that consumers were unaware about the possibilities, advantages/disadvantages multiform with online banking. Hence, we posit thatH3 Awareness about MB has a positive effect on intention to adopt and use MB Perceptions of risk are a powerful explanatory factor in consumer behavior as individuals appear to be more motivated to avoid mistakes than to maximize purchasing benefits 42. The lay down Perceived Risk reflects an individuals subjective belief about the possible minus consequences of some type of planned action or behavior, due to indwelling uncertainty. Pavlou 43 refers to perceived system risk as the overall amount of uncertainty perceived by an organization in a particular purchase situation.The Perceived Risk associated with online transactions may reduce perceptions of behavioral and environmental control, and this lack of control is likely to negatively influence e-commerce usage intentions 44. Similar is with m-commerce applications. Diffusion of innovation literat ure is often silent on perceived risk as a factor influencing the diffusion of an innovation, despite adoption behavior often being a process of dealing with the uncertainty about incorporating an innovation into ongoing practice 45.Services are inherently more risky than products and that the major reason for this is the higher levels of uncertainty which are associated with services 42, 46, 47. Polatoglu and Ekin 48 also found that perceived risk was one of the major factors affecting consumer adoption, as well as customer satisfaction of mobile banking services. Perceived risk usually arises from uncertainty. Hence we hypothesize H4 Perceived risks have a negative impact on intention to adopt and use MB. Subjective norm is the perceived social pressure to engage 230 or not to engage in a behavior.Subjective norm is determined by the list set of accessible normative beliefs concerning the expectations of important referents 49. It is the persons perception that most people who ar e important to him think he should or should not perform the behavior in question 50. individual often respond to social normative influences to establish a favorable image within a reference group. Moore and Benbasant define image as the degree to which use of an innovation is perceived to enhance ones status in social system 51. H5 Subjective norm has a positive effect on intention to adopt and use MB.RESEARCH METHODOLOGY Perceived usefulness Perceived ease of use Awareness Perceived risk Subjective Norm Fig. 1. RESEARCH MODEL Mobile Banking Adoption The key intention of this paper is to evaluate those factors that manipulate the temper of customers towards mobile banking and their growing tendency towards the online financial institutions. A survey instrument in the form of questionnaire was developed through data collected from previous studies on acceptance of mobile banking. We constructed several questions in the questionnaire based on the objectives of the research.SPSS 12 package was used for analysis. Likert scale is used in order to identify the respondents perceptions towards mobile banking adoption. During the interviews we sought general information from the managers about mobile banking and asked them to discuss the reasons for undertaking mobile banking and to highlight mobile banking development challenges. We also asked them to discuss the issues relevant to the proximo of the initiative. The questionnaires were based on customers intention to adopt mobile banking. Sample Convenience sampling method was used.It is a type of non-probability sampling which involves the sample being pull from that part of the population which is close to hand, i. e, sample population selected because it is readily available and convenient. The reasons of using this sampling type are twofold. First, it offers an easy way to obtain the primitive data for the further analysis. Second, it saves times and costs since the respondents can be randomly selected. Choo sing this campus is because of two reasons. First, those business and economics student are revealed with the knowledge of applied business and economics.At the same time, they are equipped with the knowledge of computer science, where the concept of mobile banking is not an alien for these students. Second, it was found that there is no study ever conducted in world-wide Journal of e-Education, e-Business, e-Management and e-Learning, Vol. 1, No. 3, August 2011 the campus, it leaves a motivation to the research to perform a study in order to investigate the students adoption for mobile banking in the near future. Table 1 shows the profile of the respondents. The sample shows that the number of male (78. 84%) respondents is higher than the number of female (21. 15%) respondents.The sample shows that the largest age group that responded was from 20 to 30 years of age (82. 7%), followed by age 31 to 40 (11. 5%), then 41 to 50 (03. 8%) and 50 (1. 9%). In the education background more than 55% of the respondents were postgraduate students and more than 28% were graduate students and 11. 5% were PhD students. TABLE I PROFILE OF THE RESPONDENTS Items No. of Respondent 42 Male 11 Female 20-30 43 31-40 6 41-50 2 50 1 Graduate 15 Postgraduate 29 PhD 6 former(a) 2 Factor loading values were obtained using varimax rotation. According to the above table, most of the factor loading for each instrument exceeded 0. , meeting the essentially significant level of convergent validity. Extraction Method Principal Component outline. Rotation Method Varimax with Kaiser Normalization. Rotation converged in 6 iterations. Using eigenvalue greater than 1 as a selection criterion. Each has cumulative frequency of 21. 11, 43. 16, 52. 85, 58. 55 and 69. 94 percent respectively. These factors accounted for 69% of the variance and the factor loading were greater than 0. 6. Hence the results show that H1, H2, H3, H4 and H5 are confirmed. The results are consistent and are supported by pre vious studies.TABLE II RELIABILITY TEST deciding(prenominal)s No. of items PU 7 PEU 5 AW 7 PR 6 SN 2 Reliability 0. 834 0. 760 0. 836 0. 600 0. 778 Demographics Gender Age group Education Percent 78. 84 21. 15 82. 7 11. 5 3. 8 1. 9 28. 8 55. 8 11. 5 3. 8 V. DISCUSSION AND FINDINGS Although mobile banking provides flexibility in performing financial transaction, fast and easy, however individuals are still reluctant to adopt the system because of several reasons. First, the security and privacy are two elements in the perceived risk. Without a proper knowledge of the system, individuals are not interested to test the system.Perceived usefulness, ease of use and consumer awareness has positive impact on the intention to adopt mobile banking while perceived risk has negative impact on it. When online banking is perceived as useful, customers intention to adopt it would be greater. Likewise bank customers are likely to adopt mobile banking when it is easy to use. Social influence has p ositive effect on the use of mobile technology as the individuals think that using the advanced technology will improve his image and status in the society and also it improves his performance.This shows that bank customers anchor their online banking adoption intention to the beneficial outcomes and ease of use process of the system. This conclusion is particularly important for managers as they decide how to allocate resources to retain and expand their current customer base. However, building a risk-free online transaction environment is often more difficult than providing benefits to customers. Further, the research instrument was tested for reliability using Cronbachs coefficient alpha estimate. The Cronbachs alpha values for all dimensions range from 0. 60 to 0. 93, exceeding the minimum alpha of 0. 52, thus the constructs measures are deemed reliable. Principal component factor analysis with a varimax rotation was conducted. The aim of factors analysis is to confirm the con struct validity of the scales could be performed adequately by using principle component analysis. In order to reach this, the minimum factor loading of 0. 6 on its hypothesized constructs is proposed by Nunnally 53. A number of analyses were conducted for factors analysis. 231 PU PU1-0. 680 PU2-0. 681 PU3-0. 761 PU4-0. 827 PU5-0. 664 PU6-0. 735 PU7-0. 647 TABLE III ingredient LOADING SN PEU AW PR PEU1-0. 558 AW1-0. 50 PR1-0. 833 SN1-0. 901 PEU2-0. 577 AW2-0. 711 PR2-0. 658 SN2-0. 886 PEU3-0. 537 AW3-0. 658 PR3-0. 759 PEU4-0. 569 AW4-0. 600 PR4-0. 650 PEU5-0. 824 AW5-0. 662 PR5-0. 679 AW6-0. 662 PR6-0. 741 AW7-0. 658 Code PU1 PU2 PU3 PU4 PU5 PU6 PU7 PEU1 PEU2 PEU3 PEU4 PEU5 AW1 AW2 AW3 AW4 AW5 AW6 AW7 PR1 PR2 PR3 PR4 PR5 PR6 SN1 SN2 TABLE IV FACTOR EXPLANATIONS. Statements MB gives flexibility to conduct banking business 24 hours/day MB transactions save more time. MB makes it easier for me to do my banking. MB helps me to know the declare of my account faster. MB provides me prom pt and efficient services.MB provides systems to give appropriate feedback. MB gives the joy of controlling my financial transactions. Learning to use MB was easy for me. book of instructions in the MB system are clear and understandable. I find MB system easy to use. MB has more flexible ways to search for information. I feel that user-friendliness of the MB website is important. I think that I am aware about the benefits of MB I think that I have received enough information about MB. I will frequently use MB in the future. I will strongly recommend others to use MB. I think that using the new MB service is beneficial for me.I have positive perception about using the MB service. MB is compatible to my banking needs. MB will allow unauthorized person to access personal information. MB provides accurate, relevant and up to date information. MB has the chance of data loss and fraud. MB needs expertise and training. MB has inadequate information on the website and less operational rel iability. I trust the ability of MB to protect my privacy. People who are important to me think that I should use MB facilities People who influence my behavior think I should use the MB. International Journal of e-Education, e-Business, e-Management and e-Learning, Vol. , No. 3, August 2011 VI. CONCLUSION The result of this study shows that perceived usefulness, perceived ease of use, subjective norm, consumer awareness and perceived risk are the important determinants of mobile banking adoption. This study meets the in demand(p) objective but it suffers from one setback. Study concludes that majority of customers are accepting online banking because of many favorable factors. Analysis concluded that usefulness, ease of use, subjective norm, awareness and risks related to it are the main perusing factors to accept online banking system.These factors have a strong and positive effect on customers to accept mobile banking system. The relatively small size of the sample limits genera lization of the outcome of the study. The study is concentrated on a particular location and hence the result may vary with location and the demography of the people. Similar study can be conducted in other colleges and universities and results can be compared. REFERENCES 1 E. E. Ibrahim, M. Joseph, and K. I. N. Ibeh, Customers Perception of Electronic Service Delivery in the Uk Retail Banking Sector, International Journal of Bank Marketing, vol. 4, no. 7, pp. 475-493, 2006. H. H. Bauer, M. Hammerschmidt, and T. Falk, Measuring the Quality of E-Banking Portals, International Journal of Bank Marketing, vol. 23, no. 2, pp. 153-175, 2005. A. Parasuraman and G. M. Zinkhan, Marketing To and Serving Customers through the Internet An Overview and Research Agenda, academy of Marketing Science Journal, vol. 3, no. 4, pp. 286-295, 2002. S. J. Barnes and B. Corbitt, Mobile Banking Concept and Potential, International Journal of Mobile Communications, vol. 1, no. 3, pp. 273-288, 2003.T. Laukka nen and J. Lauronen, Consumer Value Creation in Mobile Banking Services, International Journal of Mobile Communications, vol. 3, no. 4, pp. 325-338, 2005. R. Clarke, Roger Clarkes Research in e-Business, Roger Clarkes Web-Site, 2001. Online. Available Accessed http//www. rogerclarke. com/EC/EBR0106. html. 04-Apr-2010. S. Barati and S. Mohammadi, An Efficient Model to Improve Customer Acceptance of Mobile Banking, in Proceedings of the World Congress on Engineering and Computer Science, San Francisco, CA, 2009, vol. . J. Peppard, Customer Relationship Management (CRM) in Financial Services, European Management Journal, vol. 18, no. 3, p. 312327, 2000. S. Rotchanakitumnuai and M. Speece, incorporate Customer Perspectives on Business Value of Thai Internet Banking, Journal of Electronic Commerce Research, vol. 5, no. 4, pp. 270-286, 2004. G. Lee and H. Lin, Customer Perceptions of E-Service Quality in Online Shopping, International Journal of Retail & Distribution Management, vol. 33, no. 2, pp. 161-176, 2005. S. Gounaris, S. Dimitriadis, and V.Stathakopoulos, Antecedents of Perceived Quality in the Context Internet Retail Stores, Journal of Marketing Management, vol. 21, no. 7-8, pp. 669-700, 2005. N. Mols, P. Bukh, and J. Neilsen, Distribution transfer Strategies in Danish Retail Banking, International Journal of Bank Marketing, vol. 27, no. 1, pp. 37-47, 1999. J. Sreenivasan and M. N. M. Noor, A Conceptual Framework on Mobile Commerce Acceptance and role Among Malaysian Consumers The Influence of Location, Privacy, Trust and Purchasing Power, WSEAS Transactions on Information Science and Applications, vol. 7, no. 5, pp. 661-670, 2010. R. S.Tiwari, Buse, and C. Herstatt, Mobile Services in Banking Sector The employment of ripe Business Solutions in Generating Competitive Advantage, presented at the International Research Conference on Quality, Innovation and Knowledge Management, 2007, pp. 886-894. 2 3 4 5 6 7 8 9 10 11 12 13 14 15 R. S. Tiwari and Buse, T he Mobile Commerce Prospects A Strategic Analysis of Opportunities in the Banking Sector. Hamberg University Press, 2007. 16 E. Scornavacca and S. J. Barnes, M-Banking Services in Japan A Strategic Perspective, International Journal of Mobile Communications, vol. 2, no. , pp. 51-66, 2004. 17 U. Varshney and R. Vetter, A Framework for the Emerging Mobile Commerce Applications, presented at the 34th Annual Hawaii International Conference on System Sciences, Hawaii, US, 2004, p. 10. 18 Rotimi, Oludele, and Bamidele, SMS Banking Services A 21st Century Innovation in Banking Technology, Journal of Issues in Informing Science and Information Technology, vol. 4, pp. 227-234, 2007. 19 S. J. Barnes, Provision of Services Via the Wireless Application Protocol A Strategic Perspective, Electronic Markets, vol. 12, no. 1, pp. 14-21, 2002. 20 T. M. Qureshi, M. K. Zafar, and M. B.Khan, Customer Acceptance of Online Banking in Developing Economies, Journal of Internet Banking and Commerce, vol. 13, no. 1, 2008. 21 S. Laforet and X. Li, Consumers attitudes towards online and mobile banking in China, International Journal of Bank Marketing, vol. 23, no. 5, pp. 362-380, 2005. 22 Benamati and Serva, Trust and Distrust in Online Banking Their Role in Developing Countries, Information Technology for Development, vol. 13, no. 2, pp. 161-175, 2007. 23 M. K. Jane, J. M. Hogarth, and M. A. Hilgert, The Adoption of Electronic Banking Technologies by US Consumers, International Journal of Bank Marketing, vol. 2, no. 4, pp. 238-359, 2004. 24 L. J. Servon and R. Kaestner, Consumer Financial Literacy and the rival of Online Banking on the Financial Behavior of Lower-Income Bank Customers, The Journal of Consumer Affairs, vol. 42, no. 2, pp. 271-395, 2008. 25 C. Kennington, J. Hill, and A. Rakowska, Consumer Selection Criteria for Banks in Poland, International Journal of Bank Marketing, vol. 14, pp. 12-21, 1996. 26 M. Zineldin, Bank Strategic Positioning and both(prenominal) Determinants of Bank Selection, International Journal of Bank Marketing, vol. 14, 1996. 27 J.Delvin, Technology and Innovation in Retail Banking Distribution, International Journal of Bank Marketing, vol. 13, pp. 19-25, 1995. 28 Z. Liao and M. T. Cheung, Measuring Customer Satisfaction in Internet Banking a Core Framework, Communications of the ACM, vol. 51, no. 4, pp. 47-51, 2008. 29 Z. Liao and M. T. Cheung, Internet-based E-Banking and Consumer Attitudes An Empirical Study, Information & Management, vol. 39, pp. 282-295, 2002. 30 M. Mavri and G. Ioannou, Consumers Perspectives on Online Banking Services, International Journal of Consumer Studies, vol. 30, no. , pp. 552-560, 2006. 31 W. -C. Poon, Users Adoption of E-Banking Services The Malaysian Perspective, Journal of Business and Industrial Marketing, vol. 23, no. 1, pp. 59-69, 2008. 32 F. D. Davis, Perceived Usefulness, Perceived unbosom of Use and User Acceptance of Information Technology, MIS Quarterly, pp. 319-340, 1989. 33 W. J. Doll, A. Henddrickson, and X. Deng, Using Daviss Perceived Usefulness and Ease of Use Instruments for Decision Making A Confirmation and Multi-Group Invariance Analysis, Decision Science, vol. 29, no. 4, pp. 839-869, 1998. 34 W. C. Chin and P. A.Todd, On the use, usefulness and ease of use of structural par modeling in MIS research A note of caution, MIS Quarterly, vol. 19, no. 2, pp. 237-246, 1995. 35 A. H. Segars and V. Grover, Re-Examining Perceived Ease of Use and Usefulness A Confirmatory Factor Analysis, MIS Quarterly, vol. 17, pp. 517-525, 1993. 36 D. Adams, R. R. Nelson, and P. A. Todd, Perceived usefulness, ease of use and Usage of Information Technology A replication, MIS Quarterly, vol. 16, no. 2, pp. 227-248, 1992. 37 V. Venkatesh and F. D. Davis, A Model of the Antecedents of Perceived Ease of Use Development and Test, Decision Sciences, vol. 7, no. 3, pp. 451-481, 1996. 38 W. Hong, J. Y. L. Thong, W. M. Wong, and K. Y. Tam, Determinant of User Acceptance of Digital Librari es An Empirical Examination of Individual Differences and System Characteristics, Journal of Management information Systems, vol. 18, no. 3, pp. 97-124, 2001. 232 International Journal of e-Education, e-Business, e-Management and e-Learning, Vol. 1, No. 3, August 2011 39 P. Y. K. Chau, Influence of Computer Attitude and Self-Efficacy on It Usage Behavior, Journal of End User Computing, vol. 13, no. 1, pp. 26-33, 2001. 40 M.Sathye, Adoption of Internet banking by Australian consumers an empirical investigation, International Journal of Bank Marketing, vol. 17, no. 7, pp. 324-334, 1999. 41 E. M. Rogers and F. Shoemaker, Communications in Innovation. New York Free Press, 1971. 42 V. -W. Mitchell, Consumer perceived risk conceptualizations and models, European Journal of Marketing, vol. 33, no. 1/2, pp. 163-195, 1999. 43 P. A. Pavlou, Consumer acceptance of electronic commerce Integrating trust and risk with the Technology Acceptance Model, International Journal of Electronic Commerce, vol. , no. 3, pp. 101-134, 2003. 44 z Belkhamza and S. A. Wafa, The Effect of Perceived Risk on the Intention to Use E-commerce The Case of Algeria, Journal of Internet Banking and Commerce, vol. 14, no. 1, 2009. 45 L. F. Andrews and M. V. Boyle, The influence of communication sources on perceived risk about purchasing online, presented at the International Conference on Qualitative Research in IT & IT in Qualitative Research, Brisbane, Australia, 2004. 46 V. -W. Mitchell and M. Greatorex, Risk perception and reduction in the purchase of consumer services. The Service Industries Journal, vol. 13, no. 4, pp. 179-200, 1993. 47 V. -W. Mitchell and M. Greatorex, Perceived risk and risk reducing strategies across product classification, Oxford, 1990. 48 V. N. Polatoglu and S. Ekin, An Empirical Investigation of the Turkish Consumers Acceptance of Internet Banking Services, International Journal of Bank Marketing, vol. 19, no. 4, pp. 156-165, 2001. 49 I. Ajzen, From Intentions to Actions A Theory of Planned Behavior. , in Action-Control From Cognition to Behavior, J. Kuhl and J. Beckmann, Eds.Heidelberg Springer, 1985, p. 1139. 50 M. Fishbein and I. Ajzen, Belief, Attitude, Intention, and Behavior An Introduction to Theory and Research. Addison Wesley, Reading, MA, 1975. 51 V. Venkatesh and F. D. Davis, A Theoretical Extension of the Technology Aceptance Model quadruple Longitudinal Field Studies, Management Science, vol. 46, no. 2, pp. 186-204, 2000. 52 J. F. Hair, R. E. Anderson, R. L. Tatham, and W. C. Black, Multivariate Data Analysis. Upper Saddle River,NJ Prentice Hall, 1998. 53 J. C. Nunnally, Psychometric Theory. New York McGraw-Hill, 1978. 233