Thursday, August 27, 2020

Have Technology Taken over Some People Lives Essay Example for Free

Have Technology Taken over Some People Lives Essay Is there a worry about individuals getting excessively reliant on innovation? Do you think a lot of innovation is a lot for your youngsters? Does innovation influence the cerebrum? A few of us imagine that there is a likelihood that an excessive amount of innovation is influencing our youngsters. They appear to not get the idea of things. Children today can’t assume in a reasonable manner. Everything accomplished for youngsters is through some sort of innovation. Innovation is instructed at such a youthful age, that kids don’t get the chance to learn all alone and when they show up high school it appears to turn out to be increasingly obvious. Sarah Harris in a MailOne article â€Å"Too much web use can harm young people brains† says, â€Å"Excessive web use may cause portions of teenagers’ minds to die, an examination uncovers. Researchers found indications of decay of dim issue in the cerebrums of substantial web clients that deteriorated after some time. This could influence their fixation and memory, just as their capacity to settle on choices and set objectives. It could likewise decrease their hindrances and lead to ‘inappropriate’ conduct. Specialists took MRI mind checks from 18 college understudies, matured 19, who went through eight to 13 hours daily messing around on the web, six days every week. The understudies were delegated web addicts in the wake of responding to eight inquiries, including whether they had attempted to quit any pretense of utilizing PCs and whether they had deceived relatives about the measure of time they spent on the web. contrasted them and a benchmark group of 18 understudies who went through less than two hours per day on the web. One lot of MRI pictures concentrated on dark issue at the brain’s wrinkled surface, or cortex, where the handling of memory, feelings, discourse, sight, hearing and engine control happens. Looking at dim issue between the two gatherings uncovered decay inside a few little districts of all the online addicts’ cerebrums. The sweeps demonstrated that the more drawn out their web enslavement proceeded, the ‘more serious’ the harm was. The scientists likewise discovered changes in profound cerebrum tissue called white issue, through which messages go between various regions of dim issue in the sensory system. These ‘structural variations from the norm were most likely connected with practical disabilities in subjective control’, they state. The scientists included that these variations from the norm could have made the young people all the more ‘easily web dependent’, however finished up they ‘were the outcome of IAD (web dependence disorder)’. ‘Our results proposed long haul web enslavement would bring about cerebrum basic alterations,’ they said. The investigation, distributed in the PLoS ONE diary, was completed by neuroscientists and radiologists at colleges and medical clinics in China, where 24million young people are assessed to be dependent on the web. Reminder: Dr Aric Sigman said it was a disgrace that we required photographs of minds to understand that sitting before a screen isn't useful for childrens wellbeing In Britain, kids spend a normal of five hours and 20 minutes every day before TV or PC screens, as per gauges by the statistical surveying organization Childwise. Dr Aric Sigman, an individual of the Royal Society of Medicine, depicted the Chinese examination as a ‘wake-up call’. He stated: ‘It strikes me as a horrible disgrace that our general public requires photographs of cerebrums contracting so as to pay attention to the sound judgment presumption that extended periods before screens isn't useful for our children’s wellbeing. ’ Baroness Greenfield, educator of pharmacology at Oxford University, depicted the outcomes as ‘very striking’. She stated: ‘It shows there’s an extremely away from between the quantity of years these youngsters have been dependent on the web and changes in their minds. ‘We need to accomplish more examinations and we have to put more cash in investigate and have more investigations like this. The neuroscientist has recently cautioned there could be a connection between children’s poor capacities to focus and the utilization of PCs and informal communication sites. She is worried that insufficient consideration is being paid to prove that PC use is changing youthful people’s minds. Educator Karl Friston, a neuroscientist at University College London, told the Scientific American diary the methods utilized in the little scope study were thorough. He stated: ‘It conflicts with instinct, yet you don’t need an enormous example size. That the outcomes show anything critical at all is telling. ’

Saturday, August 22, 2020

Security Issues in Software Defined Networks - MyAssignmenthelp

Question: Examine about theSecurity Issues in Software Defined Networks. Answer: Presentation The ascent of SDN has begun basic excitement for reevaluating the set up approaches to manage framework building just as plan. The SDN is a thought, which is absolutely to break the standard systems or frameworks where the switches picks the exercises to do. The Software Defined Networking makes it possible to manage a set up organize in the product, by creating programs that change the system activities to run well with specific applications and conditions. The SDN programming engineers deal with a couple of complexities related to two-layered plan, low level capacities and event reordering . Security Issues or difficulties in Software Defined Networks The trustworthiness and security of SDN remain hazardous, particularly with the controller that is a singular motivation behind dissatisfaction. The security ought to be wherever inside the SDN. As showed by Bindra, the SDN security ought to be consolidated with the building, and furthermore be passed on to the organization to guarantee the openness, genuineness, and assurance of each and every related resource alongside the data (Bindra, Sood, 2016). Past the structure itself, how the security of SDN should be sent, regulated, and controlled in the SDN circumstance is still especially up for grabs. There are fighting methodologies that some trust security is fittingly introduced in the framework, while others accept that it is suitably embedded in servers, accumulating and other enrolling devices. Regardless, the courses of action are planned to make a circumstance that is increasingly versatile, compelling, and secure (Benzekki, El Fergougui, Elbelrhiti Elalaoui, 2016). Another cla ss is producing for the wellbeing security inside the cutting bound conditions called SDSec, which passes on to sort out the security approval by disengaging the wellbeing control level from the wellbeing getting ready just as sending planes, similar to the way SDN concrete the system control level from the causing level. The result is a dynamic appropriated structure that virtualizes the framework security prerequisite work, scales like virtual machines just as administered like a lone, sound framework. The wellbeing or security challenges for SDN differ in a couple of respects from those of the customary systems as a result of the specific framework execution just as SDN's unavoidable control just as programmability traits. For instance, the possibility of reliably united control may reveal a movement of high-regard focal points for aggressors or programmers while the ability to direct get the entrance to the control plane results in another attack surface. Furthermore, for SDN, v arious weakness examinations have been executed and a couple of these considerations are actualized on OpenFlow show (Channegowda, Nejabati, Simeonidou, 2013). As per Duan, the Software Defined Networking bunch is amazingly aware of the issue (Duan, Ansari, Toy, 2016). The Open Networking Center, steward, has circulated a paper in the 2016 that recognized the two potential SDN security difficulties or issues, or streets of possible aggressors that the association must address. The engaged controller is the Normal single expectation of attack just as the disappointment of the system. The Southbound UI, for example, OpenFlow among the data sending devices and controller are vulnerable against the risks that could corrupt the openness, execution and trustworthiness of the entire system (Cui, Yu, Yan, 2016). As showed by Khondoker, the principal thing which originates from clients about the SDN is that they see security challenges in the SDN as an inhibitor to the SDN (Dayal, Maity, Srivastava, Khondoker, 2016). The Software Defined Networking controller is the prime concentration for developers since it is both, a fundamental issue of outcome in the system just as the potential primary issue for the disappointment of the system. I accept that my presents have totally contributed on help the perusers to get information about the difficulties of the SDN just as I likewise locate the rundown introduced by all the chose peer surveys exact. In light of the remarkable SDN security challenges, this report include the SDN security standards, wellbeing necessities for the ONF conventions, just as the security examination of the Software Defined Networking. There are huge number of chances for the assailant to reveal the correct to the entire supporting of the system movement direct just by modifying the controller (Farshin, Sharifian, 2017). To be sure, even traditional system organization instruments don't enable to logically change the entire lead of the system on the center point to center premise. The Program-capacity of the Software Defined Networking controllers show a twofold edged blade. The creators present wellbeing applications on a whole controller's northbound UI to make changed ways to deal with use security procedures on the system. Those worries train the SDN controller to apply the switches and switches that it oversee as a system execution centers. In any case, that programmable northward interface is more over a potential blemish. Those applications may remake the framework through the controller. Developers can trap the specialists to present dealt applications. With satisfactory finding out about the welcoming applications proceeding onward the SDN controller, the software engineer could cause the framework to achieve something absolutely unanticipated by the framework boss just by conveying an exactly made group stream to the system (LIN, WANG, 2016). One significant issue that isn't tended to appropriately in this conversation is that the attackers can concentrate on a system part from inside the entire system itself. An assailant could speculatively expand the unapproved physical and virtual access to the client system and exchange off a host which is starting at now connected with the SDN and a while later endeavor to play out the attacks to destabilize the parts of the system. This could be a sort of DoS attack or it could be a kind of cushioning ambush for endeavoring to ambush the system components. The Centralized Control is the other issue which isn't enough referenced in the companions. The Centralized control or reasonably united control has revealed a high-regard advantage for attackers (Muciaccia, Passaro, 2017). The attackers may try to control the rudimentary system execution and even control or deal with the entire system by deluding or exchanging off a SDN controller. This is especially from a greater number of ind ependent assets in a completely scattered control area. Then again, the Provability is the other issue which is likewise perhaps the greatest test in the SDN. This new strategy presents the requirements that don't exist in the shut administrative spaces similarly as making sure about structure genuineness, pariah data and open interfaces. An attacker could in like manner utilize these shows and attempt to start up new streams into the device's stream table (Sha, He, Fu, Sun, Li, 2015). This test is fundamental, in light of the fact that as SDN creates, it ensures its reasonable deftness. The correspondence expert communities the same have the ability to basically stimulate a chance to pass on the new applications and organization as a prompt outcome of programming portrayed advancement. From a system watching perspective, it in like manner makes the association of execution events, less difficult and satisfying the quick on-demand development. The unpreventable uptick well known for the new system, system and limit in programming portrayed structure speaks to a danger for checking the stages. These plans must have the ability to add watching capacity to suit the quick advancement of the structure. On the off chance that that they ca exclude additional breaking point demands, they can quickly wind up discernibly over-bought in, making the execution imperturbability holes. Not at all like the legacy establishment in the SDN world, the clients can have an alternate overlay topology running on the arousing system. As indicated by Smelyansky, the SDN challenges put a few effects on the reality (Smelyansky, 2017). For instance, on the off chance that if a few representatives in an association are not centering, it truly transforms into the amazingly extremely high-advantage focusing point for the programmer, who may be effectively exchange off, change a portion of the clients code base just as re-content the control of the action to such an extent that the workers ex-filtrating the data just as holding the data at some spot where an assailant can totally sniff it, said Smelyansky, the security master of Voodoo and a main worker at IANS (Smelyansky, 2017). The controller is the essential attack focus just as thusly, it must be completely hardened. Setting wellbeing principles of the whole controller alongside framework the framework constituent regularly descends with the goal that they have the OS cementing. Every single endorsed movement for cementing the OCL servers are appropriate here. In an y case, numerous affiliations will request to about control or screen controllers in the association for a dubious exercises. The affiliations likewise need to deflect the disliked access to the Software Defined Networking control systems (Yan, Zhang, Vasilakos, 2015). The Software Defined Networking structure should consider the plan of secure and approved head access to the controller. Reflection and Conclusion After this examination, I have increased a great deal of information about the SDN challenges. It has been reflected in this investigation that over the ongoing years, the Software Defined Networking has made from just an idea to a perspective that the broad systems organization venders are getting a handle on just as taking their models for the future endeavor arran

Friday, August 21, 2020

Essay Writing Service - What to Look For When Looking for Best Essay Writing Service?

Essay Writing Service - What to Look For When Looking for Best Essay Writing Service?If you are planning to use the best essay writing service, you need to know the basics and techniques on how you can check if you are going to get the best service. This article will give you some tips on how to choose the best essay writing service.First, you have to determine the type of essay writing service that you want to choose. Many people get confused on what type of service they should get. After all, you want to get a quality essay writing service which will allow you to get the right essay and not let you regret over the result of your essay.Now, you should know that there are many types of service in the market. But if you want to get the best service, you should make sure that the writing service is capable of giving you an easy writing and will help you write well. But if you are not sure, it is better for you to get a freelance essay writing service because they are usually a good wri ter and you can easily tell their quality by their writing skills.Another thing that you should consider is the company's reputation. It is important to check the company's past writing records to be sure that they can handle your demands. If they do not have any previous record, it will mean that they will not be able to provide the best services.However, if you think that they cannot offer you quality services, you should also look at their testimonials and review from previous clients to know if they can provide you the best essay writing service. Many companies who offer cheap writing services will not be able to provide you good quality writing, but they will still give you the cheap prices.On the other hand, if you want to get the best essay writing service, you need to be careful to avoid getting the cheap services. It is very important to be familiar with the details of a business as well as their policies before hiring them.If you know what the company does, you will be abl e to judge if they really are capable of providing you with good quality writing and not just cheap services. After all, when it comes to these things, you should always choose the best one because of its worth.But if you still need more guidance on how to choose the best, you can read some more articles that can help you out. Remember that the most important thing is to get the best one because you are going to pay for it.

Tuesday, May 26, 2020

Gender Roles And Gender Inequality - 1576 Words

and girls when women already earn less than men in economic spheres (â€Å"Fact Sheet†, 2010). The underlying gender roles and gender inequality that persists in South Africa help not only to explain their unbelievably difficult daily burdens but it also aids in the understanding of the lack of economic and political representation of women in the region (Bentley, 2004). Within South Africa there is a significant gap in the lack of opportunity and representation of women within the economic and political sphere, which directly correlates to their poverty. Often times the universal equality and importance of all members of society is not often respected, this is evident in the histories and devastations of apartheid in South Africa, but also in†¦show more content†¦The economic and political empowerment of women not only would improve the lives of women, but of the children that depend on them and the direct and extended family members that rely on the help of women, in which the HIV/AIDS epidemic has heightened (Schreiner, Mohapi Koppen, 2004). Females are more likely than men to live in households below the poverty line, lack the economic and political power to improve their status due to their underrepresentation, and thus lack the ability and clout to influence policy in ways that can bring social services or developmental status to wome n in need. Advocating for the educational and political achievement of women leads other young girls to see this and strive to be successful, breaking the cycle of disenfranchised women. Women in leadership can also help to promote and create opportunities for other women, and may also help to engage in policy-making that will be more effective because they bring a greater level of understanding to the issues at hand. For example, a recent effort in South Africa to expand the development of female lawmakers â€Å"helped advance legislation promoting gender equality such as providing equal land rights to women and ensuring reproductive rights† (Diop, 2015). Increasing the educational achievement of women within South Africa couldShow MoreRelatedGender Roles And Gender Inequality1390 Words   |  6 PagesA gender role is defined by the Oxford Dictionary as â€Å"the role or behavior learned by a person as appropriate to their gender, determined by the prevailing cultural nor ms.† For generations, this confining social construct has dictated how people from both main genders should act and think, keeping them from reaching their full potentials. Though we have made progress over the years, these sexist mindsets are still embedded into the hearts of many today. I am here to point out the negative consequencesRead MoreGender Roles And Gender Inequality1262 Words   |  6 Pagesthe role of both the male and the female in society. As time passed and civilization progressed, the question of the role of the women has also changed. Men and women in society have had many differences, which included things such as gender roles, gender inequality, inequality in the workforce, and sex discrimination. Also, the questions of what it takes to be a man or to be a woman is very important. For many different cultures, gender differences are extremely important, as well as the role itRead MoreGender Inequality And Gender Roles1872 Words   |  8 PagesGender inequ ality is amongst us all in any given society. Although gender is not as simple as may seem. Gender comes into play along with a number of different aspects such as sex, gender and gender roles. Each of these aspects play a significant part when speaking of the different social problems encountered by men and women. Sex makes up the biological differences; of male or female. Gender is the socially learned behaviors that are attached to the sexes (Henslin, p. 322), which create Gender RolesRead MoreGender Inequality And Gender Roles2518 Words   |  11 PagesSOC 100 7/5/2015 ESSAY 1 Gender has dominated the daily lives of many Americans as it has become a preordained law to which everyone has to follow in order to be socially accepted as a normal human being. But over the years, gender has angered the modern generation into a new breed of social activist, that are fighting for the standing principle of equality regardless of sex. Brought by the lingering effects of gender role, and the inequality that accompanies it, gender has created a schism, notRead MoreThe Inequality Of Women And Gender Roles892 Words   |  4 Pagesmost gender discrimination from society the issue of inequality of women and gender roles still lingers within our social institutions. We allow those in higher classes to hold so much privilege that they use their power to enforce social controls in order to place individuals who are devalued into a controlled category of difference. Father Roy Bourgeois was a priest for forty plus years in the Catholic church, believing and preaching his rel igious doctrine that specifically cut out the role of womenRead MoreThe Inequality Between Gender Roles1280 Words   |  6 Pagesover time and how we manage to strongly standby what we belief no matter the circumstances. At a young age I began to recognize the roles between male and female figures in a household. These traditional roles I was familiar with were not satisfying, but overtime I was able to embrace new beliefs about how I wanted a female to be seen as. The inequality between gender roles in society was something I was very intrigued by because it was the first time in my life that I began to fight for something IRead MoreGender Roles, Race, And Inequality1966 Words   |  8 PagesFeminism is the approach to gender roles, race, and inequality in women. It also refers to individuals or organizations that promote changes to society to end the issues involving women. Feminism addresses economic, social, political and cultural differences of power and rights. Sexism plays a huge role in feminism. Generally, people are inferior if they are identified as a black woman and those identified as white women are superior and experience more advantages. Society has formed a culture whereRead MoreThe Role Of Gender Inequality On Young Girls873 Words   |  4 PagesThe Role of Gender Inequality All parents care about equality. Not only for all races, but for all genders as well. Equality is, and will always be the basic foundation of humanity. However, we still see gender inequality on a daily basis negatively affecting not only women, but young girls as well. This is because society uses women to appeal to an audience, and portrays them as being objects. If gender inequality stays a prominent part of the American culture, equality will never be reached. Read MoreGender Roles And Inequality During The 21st Century Essay1425 Words   |  6 PagesIn context of today, gender roles and inequality is controversial and has sparked numerous social debates across the world. However, the role of gender has not just become an issues in the 21st century but in truth has been affecting the lives of men and woman for hundreds of years. During the renaissance when Saint Teresa lived, woman’s role in the functioning of society were often either forgotten or dismissed as their voi ce was significantly less powerful then a man’s say. Woman were often consideredRead MoreGender Roles Equal Inequality A Doll’s House by Henrik Ibsen536 Words   |  2 Pages Beauty models, movie stars, and music artists have become role models for thousands of people despite submitting to gender roles and stereotypes. Even though some teens may believe that they are immune to the presence of these gender roles, the media, society, their cultural beliefs, and their peers are capable of influencing them into changing their opinions and life choices. An example of this is how Nora is treated like a doll and a child by her husband and blindly accepts the life that society

Wednesday, May 6, 2020

Immigrant Children and U.S Education - 1257 Words

Aware of the free education provided by the United States government to any school age children, immigrants both legal and illegal continue to be attracted to the United States, migrating in an attempt to provide better opportunities for their families and themselves. As the number of illegal immigrants living in the United states continues to rise and the percentage of illegal immigrant households which consist of children also continues to rise, it is important for the American government to examine the effect that these illegal children are having on the United States public education system. How educators and policymakers address the increasing diversification of the population will ultimately determine the stability of communities in†¦show more content†¦with out proper management of immigrant children in the school system, these underachieving schools will take the blunt force of the student population increase and due to lack of resources and funding the schools have, the schools will continue to strip the students of their equality to opportunity. As the immigration population continues to increase â€Å"immigration has become the determinate factor in population growth.Show MoreRelatedThe Face Of Education And The Changes It Has Undertaken Throughout History1425 Words   |  6 PagesThe face of education and the changes it has undertaken throughout history in the U.S. is a constant flow that thus alters the fabric of the American society. To provide an educated workforce for the future has been the job of educators for centuries, but with a greater immigration movement and presence, an educator s’ ability is limited and the fate of such children are left to suffer. Pulling from America’s position as a â€Å"melting pot† of different cultures and people, students should not be subjugatedRead MoreThe Dream Act And Daca Essay1405 Words   |  6 Pageshave given many undocumented children the ability to have a pathway to ci tizenship. Proponents of The Dream Act believed in the social support within the family by supporting family unification. However, due to its failure to pass, millions of undocumented children are now at risk of being extradited and having their families separated. Although the U.S. government created a new policy known as the Deferred Action for Childhood Arrivals (DACA), it is not providing immigrants with the same opportunityRead More Illegal Immigrants and the Educational System Essay993 Words   |  4 PagesIllegal Immigrants and the Educational System Secondary education is a highly debated subject. Many critics of secondary education say that inner-city high schools and students are not receiving the same attention as students from non inner-city high schools. Two of the biggest concerns are the lack of school funding that inner-city high schools are receive and the low success rate in sending inner-city high schools graduates to college. Critics say that while inner-city high schoolsRead MoreThe Death Of Omar Mohamed Kalmio1194 Words   |  5 Pages Omar Mohamed Kalmio was granted protection by the U.S. due to leaving his country as a refugee. In 2011 not only did he kill his girlfriend, but also her brother, mother and mother’s boyfriend. Prior to this incident ,Mohamed had been incarcerated for stabbing a person in the face and other areas causing the victim to have a collapsed lung. Even with this history of violent offenses, Kalimo only received a year in jail for this crime. Not to mention, within the same year he also was convictedRead MoreThe Issue Of Illegal Immigration1519 Words   |  7 Pageslegal and illegal immigration. Legal immigrants are here legally. They have the proper, legal documents that allow them to live and work in the U.S. without complications. Illegal immigrants are defined as anyone who was born in a country other than the U.S. to parents who are not official U.S. citizens; they enter the U.S. without legal documents to prove their legal citizenship. Yet before the twentieth century, many individuals and families immigrated to the U.S. without restriction, and illegalRead MoreEffects of Immigration on the Economy Essay1387 Words   |  6 Pages| Illegal Immigrants Are They A Stress On Our Economy. | | | Joanna Przyborski | 10/27/2012 | | Illegal immigration is an issue that has been highly debated in the United States for decades, and the effects of these immigrants will be for many to come, especially with the country in a recession and many people in economic trouble. December 1, 2008 the National Bureau of Economic Research officially declared the U.S. in a recession. Before 2007, U.S. economy has grown inRead MoreFederal Driver s License And Deferred Action883 Words   |  4 Pagesyoung adult immigrants have become more integrated into the nation’s economic and social institutions (Two Years, 2014). Almost 60% of DACA beneficiaries have obtained a new job, 45% have increased their earnings, 49% have opened their first bank account, 57% have obtained a driver’s license, and 21% have obtained Health Care (Two Years, 2014). In a recent CAP report, â€Å"Assessing the Economic Impacts of Granting Deferred Action through DACA and DAPA,† estimates have shown that the U.S. economy willRead M oreIllegal Immigration And The United States1624 Words   |  7 Pagesillegal immigrants in the Unites States, opponents of illegal immigration dispute that concept of granting amnesty to these immigrants. These arguments include that certain jobs will be stolen, and an increase in crime rate would develop. Despite the fact that illegal immigration is controversial, recent studies and social trends have shown that granting amnesty to illegal immigrants would be beneficial to the country because illegal immigrants would strengthen our economy, illegal immigrant familiesRead MoreEssay on Cause and Effect of Illegal Immigration 1344 Words   |  6 Pagesremains as one of the major problems on the U.S-Mexico border in our country. The effect of having illegal immigrants in our country puts the U.S in a dire situation. Many people are even starting to question the authority of the U.S. Customs and U.S. Border Patrol agents. Even though Homeland Security is always consistently hiring fo r U.S customs and border patrol agents to watch over the southern border to make sure no illegal immigrants sneak into the U.S. Many people are blaming illegal immigrationRead More English Should be the National Language Essay1004 Words   |  5 PagesRock, immigrants have been culturally diverse and have spoken many languages. When the Pilgrims arrived in the New World, they did not know how to communicate with the natives. Through intense study the natives learned the Pilgrims’ language. Even with the common language they were still a melting pot of different culture. Some would say that America has gotten over the language/ cultural barriers and now almost everyone speaks the common language of English, but there are still many immigrants who

Tuesday, May 5, 2020

Business Research Report Proposal Pivotal Business Element

Question: Describe about the Business Research Report Proposal for Pivotal Business Element. Answer: Introduction Marketing of any service or product is considered the pivotal element to increase the sale of that underlying offering. In this regards, viral marketing is one of the effective modes of marketing communication. Viral marketing focuses on the social networks or internet users to spread their information about the existing product or service as well as the brand positioning by adding new products. The targeted population in this mode of marketing are regular users of internet and social sites like Facebook, or any ecommerce websites/pages (Grewal Levy, 2011). Media of viral marketing - Various websites pages, apps, mails, messages, video or audio clips, games and eBooks are most popular medium of viral marketing in the commercial world. Methods of viral marketing - E-polling services, SEO, radio, web search engines, and advertisement or so on are the various methods of viral marketing. Research Topic It is essential to determine the various factors related to the viral marketing and the crucial impact on the decision of the customer about buying or availing the service. The topic adopted in this research study is Major impacts of viral marketing on the customers decision making activity. The main intention is to find the relation of viral marketing with the customer intention of making a purchase (Kerin, Hartley Rudelius, 2011). Research Questions The main research questions which would be addressed by the researcher at the end of the research work with the help of analysis, expected results, recommendations are highlighted below (Jolibert, 2012). What is the extent of the ties between the customer decision making ability and viral marketing and its comparison with other forms of traditional marketing? What are the major factors of the viral marketing in the regards of marketing communication that needs to be taken into consideration by the marketers? Research Methodology and Techniques In the process of research study, the researcher will plan a framework related to the research study. It includes usage of tools and techniques in order to collect the data and then examine to obtain the expected optimum outcomes. The data need to be gathered from several authentic sources to get the accurate result. The significant work schedule would be created in order to conduct the research work efficiently in terms of time and cost. Primary and secondary both type of data would be collected and examined with the help of qualitative and quantitative methods of data analysis process. Also the theoretical view from literature would be taken into consideration to find the percentage variation in the current study work (Hillier, 2006). Research Process Research Problem This step includes the complete understanding of the research topic and their various aspects in order to determine the answer of basic research questions. Literature Review and Background Study The previous research outcomes along with their description are also examined by the researcher so that a variation can be drawn with the current research outcomes. This will provide the essential framework for the research study and also provide clarity with related to the viral marketing and their subsequently impacts on the decision making ability of the customers. The necessary theoretical views from the literature are also notified by the researcher for future reference (Lieberman et. al., 2011). Research Model This step includes the preparation of the suitable research models to perform the research work. Various efficient and appropriate tools and practice were selected by the researcher to determine the impact of the viral marketing on the decision of the customer. The literature review description about the research study will provide a rough estimate to decide the suitable tools and method for current research study. (Mathematical model based on the literature review) (Hastie, Tibshirani Friedman, 2001). Research Design The selection of the appropriate research design is crucial for the research work, because this step of research study will provide indication of the expected expenditure in the terms of time, cost and effort for collecting the information and data for the research study. (Descriptive research design is selected) (Hillier, 2006). Collection of Data After selecting the suitable research design for the research study work, the next step is to collect the data and factors to support the research work. The source of the data collection should be authentic as it is preferable (Both primary and secondary data). Analysis of the Data Various techniques can be used on the part of the researcher to analyse the collected data and information. The quantitative and quantitative data analysis methods have been selected for the research study work. The imperative step is to express the data and outcomes into various forms like pie charts, tables, graphs in MS excel.(Both methods qualitative and quantitative has been adopted and MS excel to express the outcome and data) (Flick, 2015). Possible Research Outcomes The final step includes the preparation of a final report based on the evidences, analysis, suggestions and outcome of the research study work. Data Collection and Analysis For the primary data collection method researcher has adopted the questionnaire method by conducting survey in the procedure of descriptive research design. The questionnaire would be made on the basis of the research questions. The secondary data will be gathered from various sources like websites, articles, eBooks, newspapers or so on. The only requisite is the upgrade data of the secondary data sources. The sample size is selected as 75 people, which includes 50 young people (18-25 ages), 10 children (age from 15- 18), 15 people (25- 45 ages).These are the targeted population which are actively use the internet which is suitable to find the suggestion and questions and their perceptions about the viral marketing and their impact on the purchasing decision process. The collected data will be analysed based on the relation established on the basis of literature review and the data analysis methods. These methods are qualitative data analysis and quantitative data analysis. Various o nline and offline survey would be performed The various responses and suggestion swill help the researcher to define the number of variables. However, the numeric data (variables based on the responses) would be expressed in mathematics derivation and would express in terms of graphs, tables, pie charts, either in MS excel or in statistical tool like SPSS (as per the ease). The values of the qualitative data will be compared with the literature reviews value and possible conclusions would be expressed. Expected Research Outcomes This research study will provide an estimate about the impact of the viral marketing on the decision making activity of the customers. Using literature review, a comparison can be drawn with the other more traditional means. The expected figures from the collected data will provide information which would help the researcher to answer the research question and also for further research work. It will help to create various essential strategies to improve the mode and method of viral marketing and make it more effective and attract the customers towards the product or service (Hutt Speh, 2013). References Grewal, D Levy, M 2011, Marketing, 4th ed., McGraw Hill/Irwin, New York Flick, U, 2015.Introducing research methodology: A beginner's guide to doing a research project, Sage Publications, New York Hastie, T, Tibshirani, R Friedman, J 2001, The Elements of Statistical Learning, Springer Publications, New York Hillier, F. 2006, Introduction to Operations Research, 4th eds. McGraw Hill Publications, New York Hutt, M Speh, T 2013, Business marketing management. 6th ed., Cengage Learning, Sydney Jolibert, A 2012,Marketing management, 5th ed., Palgrave Macmillan, Hampshire Kerin, R, Hartley, S Rudelius, W 2011, Marketing, 3rd ed., McGraw-Hill/Irwin, New York Lieberman, FJ, Nag, B, Hiller, FS Basu, P 2011, Introduction To Operations Research, 9th ed.,, Tata McGraw Hill Publishers, New Delhi