Saturday, January 25, 2020
Introduction Theoretical Theories Of Investment Economics Essay
Introduction Theoretical Theories Of Investment Economics Essay Investment is a strategic variable in the determination of the level and growth of income. It has been defined in various ways by various economists. Generally, it refers to any act of spending with a prospective yield. To the economist, it refers precisely to the process of capital formation whereby there is net addition to the existing assets including inventories and goods in the pipeline of production. It is the actual production of capital equipment, tools and other produced means of production. Investment might be capital formation: Financial Capital and Physical or real capital. There are gross, net and autonomous investments where: Gross Investment= Net Investment + Autonomous Investment Autonomous Investment also known as Government Investment refers to investment which remains the same whatever the level of income. It refers mainly to the investment made on houses, roads, public buildings and other parts of Infrastructure made by the government. Moreover Gross investment is the amount that a company has invested on an asset or business without taking factoring in depreciation into consideration. In other words it is the total amount of money spent for the creation of new capital assets like Plant and Machinery, Factory Building etc. It is the total expenditure made on new capital assets in a period. Furthermore in economics, Net Investment refers to an activity of spending which will cause an increase in the availability of fixed capital goods or means of production. It is the total spending on new fixed investment minus replacement investment, which simply replaces depreciated capital goods. In fact it is Gross investment less Capital Consumption during a period of time. Private Investment depends on various categories of variables. So various theories of investment have been presented and they are provided overleaf:- Fisher Theory of Investment This theory was developed in 1930. Fishers theory was originally developed as a theory of capital, but as he assumes that all capital is circulating, then it is just as proper to conceive of it as a theory of investment. It was provided by Fisher that during the production process, all capital is used up, such that a stock of capital K did not exist. In fact all capital is just investment. There was a condition imposed by Fisher stating that Investment in any given period of time will yield outputs in the nest period. This is illustrated through the equation below: Y2=F [N,I1] Y2 = Output in period 2 I1 = Investment done in period 1 N = labor Assuming a world with only two periods of time, t=1, 2. Investment done in period 1 yields output in period 2. Moreover Fisher assumes that labor is constant Keynesian Theory The Keynesian theory was developed after that John Maynard Keynes (1936) followed suit of the Fisher theory. Keynes stated that there is an independent investment function in the economy. An important aspect of the Keynesian theory is that although savings and investment must be identical, ex-post savings and investment decisions are made by different decision makers and there is reason why ex-ante savings should equal ex-ante investment. According to Trygve Haavelmo (1960) The Keynesian approach places far less emphasis on the adjustment nature of investment. Instead, they tend to have a more behavioral take on the investment decision. Namely, the Keynesian approach argues that investment is simply what capitalists do. Every period, workers consume and capitalists invest as a matter of course. They believe that the main decision is the investment decision; the capital stock just follows from the investment patterns rather than being an important thing that needs to be optimally deci ded Accelerator Principle Theory Over the past two decades, the acceleration principle has played a vital role in the theory of Investment. In fact, this theory was developed before the Keynesian theory; however it became apparent after Keynes investment theory in the twentieth century. The accelerator is generally associated with the name of J.M Clark though it seems to have been first developed by the French economist Albert Aftalion. The basis of the accelerator principle is based on the fact that changes in factors affecting national income would affect investment. In other words, big percentages changes are witnessed due to small in consumer spending. This type of investment is known as induced investment since; it is induced by changes in consumption and income. Furthermore, the accelerator is just the numerical value of the relationship between the increases in investment caused by an increase in income. Normally, it will be positive when national income increases. On the other hand, it might fall to zero if the national output or income remains costant. Neo-Classical Theory In 1971, the neoclassical approach which is a version of the flexible accelerator model was formulated by Jorgenson and others. Flexible Accelerator Model is a more general form of the accelerator model. It is assumed that firms will choose only a fraction, a, of the gap between desired and current actual level of capital stock each period. The larger the gap between the desired capital stock and the actual capital stock, the greater a firms rate of investment. This is illustrated below: I = a [K* -K-1] I = planned net investment during period t K* = desired level of capital stock K-1 = current actual level of capital stock at beginning of period t (end of period t-1) a = adjustment factor, 0 The desired capital stock is proportional to output and the investors cost of capital which in turn depends on the price of capital goods, the real rate of interest, the rate of depreciation and the tax structure. It is important to note that most recent empirical works are based on Jorgenson investment function. In fact Jorgenson provides that a decrease in interest rate would cause an increase in investment by reducing the cost of capital. In 1967, Hall and Jorgenson provide the Hall Jorgenson Model of Investment. The model illustrates that the level of capital stock that is chosen by an optimizing firm depend on various economic features like the production function, depreciation rates, taxes, interest rates. In fact Hall and Jorgenson had used the neoclassical theory of optimal capital accumulation to analyze the relationship between tax policy and investment expenditures. They concluded that tax policy is very effective in changing the level and timing on Investment expenditures. Q theory of Investment The Q theory of Investment, introduced by Tobin (1969) is a popularly accepted theory of real investment. In fact it is a basic tool used for financial market analysis.It is a positive function of Qwhich can be defined as the ratio of the market value of the existing capital to the replacement cost of capital. Q can be defined as follows: Q=Stock Value of Firm/Replacement cost of Investment Q is a barometer for investors as it tends to assess a firms prospect. When Q is greater than one, the firm would make additional investment because the profits generated would be greater than the cost of firms assets. If Q is less than one, the firm would be better off selling its assets instead of trying to put them to use as the firms value is less than what it cost to reproduce their capital. The ideal state is where Q is approximately equal to one denoting that the firm is in equilibrium. The Q theory of investment can also depend on adjustment cost. Literature on this issue was done by Eisner and Strotz (1963), Lucas (1967), Gould (19678) and Tredway (1969). Later Mussa (1977), Abel (1979, 1982) and Yoshikawa (1980) showed that Investment is an increasing function of the shadow price of installed capital. This is such only when there are convex adjustment costs. Marginal Q Model of Investment Moreover Abel (1981) and Hayaski (1982) introduced the marginal q model associated with smooth convex costs of adjustments. They assume that capital market are perfect, such that investment is undertake until the marginal value of an additional unit of investment has decreased to the exact value of the riskless interest rate. Abel (1981) describes marginal q as The optimal rate of Investment is an increasing function of the slope of the value function with respect to the capital stock (marginal q). Abe; states that an increase in any factors that affect price can cause an increase, a decrease or even do not affect investment rate. The effect will depend on the covariance sign of the price with a weighted average of all prices. Hayaski (1982) provides that under linear homogeneity, marginal q is equal to average q. However when marginal q is not equal to average q, it is marginal q which is relevant for investment. In fact marginal q is just a stochastic version of the Q theory of Inv estment. Neo-Classical theory and Q theory of Investment (Panageas 2005) According to Stravos Panageas (2005), the neoclassical theory provides that Investment and the stock market are linked through the Tobin q. This is because the net present value of the company is the value of the company, so when the stock market is rising, there should be an increase in Investment to equate the Q ratio. This involves speculation. Panageas (2005) states that If firms maximizes share prices, then Investment reacts to speculate overpricing. However he also provides that when investment is controlled by shareholders, who do not have perfect access to the market, the link between investment and speculation will not hold. There might be costs to access the market like capital gains taxes, price pressure etc. The model used by Panageas also aid to distinguish between rational and behavioural theories of asset pricing anomalies. Models associated with non-convex costs There are also models with Non-convex costs of adjustments. King and Thomas (2006) states Non-convex adjustment costs imply distributed lags in aggregate series similar to those generated by convex costs, because they stagger the lumpy adjustments undertaken by individual firms in response to shocks. These non- convex costs is linked with the investment theory. A number of influential partial equilibrium studies (Caballero and Engel, 1999; Cooper, Haltiwanger and Power, 1999; Caballero, Engel and Haltiwanger, 1995) have showed that these investments models cause great changes in investment demand following large aggregate shocks. Theories of Interest Rate There is a vast spectrum of interest rate at a given period of time in a country. The interest rate will depend on several variables such as nature of loans, duration of loans, credit worthiness of borrower, hire purchase agreements. When those variables are held constant, the rate of interest or pure interest rate is obtained. The most common theories used to explain interest rate determinations are the Loanable Funds Theory (Neo Classical) and the Liquidity Preference Theory (Keynesian Theory). Furthermore the ISLM model is held for a fully integrated approach. Loanable Funds Theory/ Neo Classical Theory We will first consider the Loanable funds theory which is also known as the neo classical theory of interest. It was developed by the Swedish economist Knot Wickshell (1851-1926). The rate of interest is obtained through the demand and supply of loans in the credit market. The demand for loan is mainly to invest, to consume and to hoard. Traditionally the demand curve will slope downward because a fall in interest rate will attract borrowings. The supply of loans comes from 4 important sources. These are saving, bank money, dishoarding and disinvestment. The supply curve will be upward sloping since a higher rate of interest will induce these sources to supply more loans. So according to the Loanable funds theory, the rate of interest will be determined where these two curves intersect. This is shown below: Rate of interest SL R1 Q1 DL Figure 1.1 Loanable Funds According to figure 1.1, the equilibrium rate will be R1 and Q1 will be the amount of loan that are demanded and supplied. Interest rate either above or below the equilibrium rate will be restored to the equilibrium rate through upward and downward pressure. Changes in the demand and supply of loan will alter interest rate. For example, technological changes might increase the demand for loanable funds. So according to this theory, the rate of interest is the price that equate the demand for and the supply of loanable funds. Liquidity Preference Theory/Keynesian Theory The Liquidity Preference Theory was developed by Keynes. Keynes described interest rate as a purely monetary phenomenon which is determined by the demand and supply of money. Keynes identified 3 reasons why people would prefer liquidity rather that assets. These are: Transactions demand for money The transaction demand is the demand to hold money in order to meet day to day transactions. The amount of cash which the individual will keep in his possession will depend on his size of his personal income and the length of time between his pay days. Precautionary demand for money The precautionary demand is the demand to hold money in order to meet unforeseen events such as illness, being unemployed. The amount of money that the individual will hold for precautionary motives will depend on the individuals condition, economic and political conditions which he lives. The size of his income, nature of the person and foresightedness will also affects the precautionary motives of a person. Speculative demand for money Speculative demand is the demand to hold money as oppose to the holding of bonds. There is an inverse relationship between bonds and the rate of interest. When the price of bond tends to rise, rate of interest will fall due to the inverse relationship, so people will be buying bonds to sell them later when the price actually rises. However when bond prices are expected to fall leading to a rise in the rate of interest, people will sell bonds to avoid losses. According to Keynes, when the interest rate is high, speculative demand for money will be low and vice versa. The supply of money is the amount of money in circulation at a specified time period. It is the central bank which will be determining the supply of money. It is fixed at any given period of time. According to the Liquidity Preference theory, the rate of interest is determined where these two curves intersect as illustrated below: R1 Liquidity Preference (LP) Quantity of money Q1 Q2 S2 Rate of Interest S1 R2 Figure 1.2 As illustrated by figure 1.2, the money supply is represented by S1Q1 along the LP function. The rate of interest will be R1 where the supply of money intersects the LP function. If there is an increase in the money supply to S2Q2, there will be an excess in the supply of money causing people to adjust their demand portfolio by purchasing bonds. The price of bonds will rise leading to a fall in interest rate to R2. Investment/Saving-Liquidity Preference/Money supply (IS-LM) Model The previous two theories does not take into consideration in changes in national income to affect the rate of interest. The IS-LM model is used to arrive at a determinate solution. In fact it is part of the Keynesian theory. In the IS-LM model, interest rate is the only determinant of investment. The IS-LM model assumes that a higher interest rate will result in lower investment and vice versa. In this model interest rate will change due to changes in factors like business activity, credit creation by a bank, confidence, the level of national debt, inflows of funds and even international forces. Keynes provided the investment schedule where interest rate is the only primary determinant of investment. The schedule shows the amount of investment that firms would carry out at each rate of interest.
Friday, January 17, 2020
Contemporary Chinese female art and artists Essay
Introduction In the 1990s, China adopted western feminism and it influenced and rapidly raised the Chinese feminism concept. There were many themes of exhibition focused on female art and female artists, an example of this is the ââ¬Å"Chinese Women Art Exhibitionâ⬠1 ââ¬Å"Chinese Women Art Exhibitionâ⬠in 1998, the Frauen museum (Womenââ¬â¢s Museum), Bonn, Germany ââ¬Å"Ã¥ Šå ¤ ©Ã©âÅ -ä ¸ Ã¥Å"â¹Ã¥ ¥ ³Ã¦â¬ §Ã¨â" è ¡âÃ¥ ±â¢Ã¢â¬ , é⠱è ç â"åŠÆ', Ã¥ ¾ ·Ã¥Å"â¹Ã¦ ³ ¢Ã¦ ©Ã¥ © ¦Ã¥ ¥ ³Ã¨â" è ¡âÃ¥ šçⰠ©Ã© ¤ ¨, Ã¥ Æ'Ã¥ ±â¢Ã¨â" è ¡âÃ¥ ® ¶Ã¦Å"â°Ã¤ ¸ Ã¥Å"â¹, æ ¸ ¯Ã¥ °Ã¥ Šæ µ ·Ã¥ ¤â"å⦠±Ã¨ ¨Ë25ä º º. in 1998 and the ââ¬Å"Century Female Art Exhibitionâ⬠2 ââ¬Å"Century Female Art Exhibitionâ⬠in 1998, the China National Art Gallery, Beijing, China ââ¬Å"ä ¸â"ç ´â¬,Ã¥ ¥ ³Ã¦â¬ §Ã¨â" è ¡âÃ¥ ±â¢Ã¢â¬ , Ã¥ â¡Ã¦â" ¹Ã¨ËŸç â"åŠÆ',ä ¸ Ã¥Å"â¹Ã¨â" è ¡âç âç © ¶Ã©â¢ ¢Ã¦â"â¡Ã¥Å'â"èâ" è ¡â,Ã¥ ¤ §Ã¥Å" °Ã¨ ³â¡Ã§â ¢Ã§ ® ¡Ã§ â æÅ"â°Ã©â¢ å⦠¬Ã¥ ¸Ã¤ ¸ »Ã¦Å' ,Ã¥ ±â¢Ã¨ ¦ ½Ã§ »Ã¥ ±â¢(é⢠¶Ã¥â ç⢠½Ã¤ ¸ »Ã¦Å' ),èâ" Ã¥â Ã¥ ±â¢(Ã¥ ¾ è⢠¹Ã¤ ¸ »Ã¦Å' ),Ã¥ ¤â"Ã¥Å"ËÃ¥ ±â¢(ç ¾â¦Ã© ºâ"ä ¸ »Ã¦Å' ),çⰠ¹Ã¥ ±â¢(è ³Ëæâ" ¹Ã¨ËŸä ¸ »Ã¦Å' )Ã¥âºâºÃ¥â¬â¹Ã©Æ' ¨Ã¥Ëâ .Ã¥ ±â¢Ã¨ ¦ ½Ã¨ ¨ ç «â¹Ã¤ ¸â°Ã¥â¬â¹Ã§ Žé â¦:æâ"â¡Ã¥Å'â"èâ" è ¡âÃ¥ ¸Ã§ ¤ ¾Ã§ Ž(ç ²Ã§ Žèâ¬â¦:Ã¥ ¡Å¾Ã¥ £ ¬Ã¨â" è ¡âÃ¥ · ¥Ã¤ ½Å"Ã¥ ® ¤,åŠâ°Ã¨â¢ ¹,èâ"âºÃ¤ ¿ çââ¢,æžâ"Ã¥ ¤ ©Ã¨â¹â",æ ¢ æ ´ é Ë) æⰠ¹Ã¨ ©â¢Ã¥ ® ¶Ã§ Ž(ç ²Ã§ Žèâ¬â¦:Ã¥ §Å"æ °,Ã¥ «Ã¨ââº,æžâ"Ã¥ » ¶,æâ"â¡Ã© ³ ³Ã¥ââ¬,æ Žè⢠¹) æ⠶èâ" Ã¥ ® ¶Ã§ Ž(ç ²Ã§ Žèâ¬â¦:Ã¥ ¤ ä ¿Å Ã¥ ¨Å",Ã¥ ¾ æš çâ¡â¢,Ã¥ ¼ µÃ¦ º «Ã¥ ¸â¢,Ã¥ «Ã© ¼Å½Ã§Å½â°,Ã¥ ¾ è⢠¹) in 1998. Only female artists could participate in this category of art exhibition. Although the exhibitions revealed the importance of women art in modern Chinese art, there was no specific description to define the quality of female art and female artists. From this it can be asked: What is Chinese female art and is it a category in the making of the modern and contemporary Chinese art? Contemporary Chinese art frequently referred to as avant-garde art, sustained to expand ever since the 1980ââ¬â¢s as an improvement of contemporary, post-Cultural art developments. During this period, China opened the economic door to world and western influence poured into Chinese culture; bringing the concept of feminism in China. Furthermore, Chinese artist were also released from the control of extreme political condition, and female artists were set about to re-create their own image, contributing to a gradual awakening of womenââ¬â¢s consciousness. Indeed, it is in this newly awakened consciousness that Chinese female art in contemporary world can be delineated. In this paper, I would like to discuss how three generation groups of female artists (1980s, 1990s, and overseas) present their works and how they express their female quality through those art pieces. Finally, I also would like to bring out the concept and definition of quality of female art in contemporary Chine se art. The ââ¬â¢85 New Wave Artââ¬â¢ movement brought about many young female artists who devoted themselves to approach the womanââ¬â¢s nature of body and also found new ways to present the attention on the female subject. Female artists alongside male artists, expressed their own attitudes towards contemporary China. In the beginning stages of this period, women artist paid little attention to their own expression through maintaining with the large scale influence and borrowing from modern western art. However, the nature of contemporary art developed so that the concept of womenââ¬â¢s artistic consciousness started to emerge. After 1989, neo-expressionism brought new stage in China. Artists, both male and female, started to focus on the essence of human spirit and also emphasized on rational and critical concepts. Womenââ¬â¢s consciousness began to emerge and women began to explore their own experience and find an appropriate way of expression in contemporary Chinese art. Most female artists pursued to define the essence of womenââ¬â¢s consciousness or confirm womenââ¬â¢s consciousness itself. They promoted freedom from traditional male-dominated society and pursued womenââ¬â¢s equal position with men. Many women art exhibitions were also held in this period, and female art and female artists began to be paid attention. Since the 1980s, not only local Chinese female artists came about to give rise to Chinese womenââ¬â¢s art, but some overseas Chinese female artists also worked to this end. They created the works through different experiences and feelings in looking for the essence of womenââ¬â¢s consciousness. These artists mostly left China after the Cultural Revolution, prior to the social changes in China. They have their unique ways to present their ideas and expressions, like looking back to Chinese history and pursuing the art essences that they need. With differences in personal backgrounds and generations, female artists in all these three groups have varying and unique ways in presenting their art through different content and influence. But to Chinese female artists, the intention is to express their female touch and feeling in a changing Chinese society in which the womenââ¬â¢s gender role is constantly changing and reshaping. In their art, females in these three groups share not only expressions and feelings based on their female sensitivity but also their observations to social concern. In the following sections, I choose three contemporary Chinese female artists, Hung Liu, Yu Hong, and Cui Xiuwen, and define the quality of female art through their works. Traditional female role in China Most literature focuses on Chinese culture and history with key stresses on the function of language, geography, philosophies, and art. On the other hand, women are missing in almost all fields. Chinese civilizationââ¬â¢s culture and arts are male-dominated and male-oriented. Chinese art, whether primordial or contemporary, is art that instigated in or is practiced in China mostly by Chinese male artists. The arts of a society mirror manââ¬â¢s values and attitudes. Women were always portrayed as objects of observation by men. Moreover, according to I-Jing, ââ¬Å"women are more naturally aligned with the spiritual and emotional bodies, which are more non-linear and spatially oriented (all those yin qualities); while men are more naturally aligned with the mental and physical bodies, which are more linear and temporally oriented (all those yang qualities).â⬠3 Malin, David. 2006. Creating Sacred Space. Bodymath.com. http://www.bodymath.com/articles/archives/Feb06_Creating_Sacred_Space.pdf (February, 2006) Yang is mostly considered more important than yin, and is regarded as of secondary importance. This makes gender roles have typical stereotypes with women always portrayed with weakness and sickness. Chinese women had been confined to the family, at the mercy of their husbands for thousands of years. History and tradition have stifled womenââ¬â¢s voices. In China, women lived within a society dominated by men, where women were not authorized to involve themselves in the public field and consequently were not integrated in historical descriptions. For example, in the Forbidden City, women were not allowed to walk in some public spaces because those spaces were symbolized as the maleââ¬â¢s power and authority. ââ¬Å"No woman ever took part in the grand ceremonies staged before the Hall of Supreme Harmony, which were supreme demonstrations of male ruling power.â⬠4 Wu, Hung. Beyond Stereotypes: The Twelve Beauties in Qing Court Art and the ââ¬Å"Dream of the Red Chamberâ⬠. Writing Women in Late Imperial China, ed. Ellen Widmer& Kang-I Sun Chang, 315-316. Stanford, CA: Stanford University Press, 1997. Undertakings by Chinese women highlight the custom of foot binding succeeded from late Song to Ming Dynasties and even sustained to several indications into the 20th century. Foot binding has an effect to a degree in all classes of Chinese women and at a certain point, persuaded women to have bound feet and to dwell in the private sphere of their homes. Having bound feet was directly correlated to Chinese art in modern times. Contemporary Chinese women role The year 1976 marked a shift in political, economic, and cultural policy, a shift that erupted out of the self-imported isolation of three decades and opened China up to the outside world. Western influence started to come into China and brought many new concepts to strike Chinese society. During the 1980s, the western feminism also began to influence and raised rapidly womenââ¬â¢s consciousness. ââ¬Å"By the mid-1980ââ¬â¢s, though, the plethora of newly founded womenââ¬â¢s magazines explicitly discussed womenââ¬â¢s problems at work and in the family. The pages of China Womenââ¬â¢s News were filled with exposà ©s and denunciations of discrimination faced by women. ââ¬Å"Feminist outcriesâ⬠began to appear with some regularity in print. This recognition of gender inequality also found expression in the emergence of separate womenââ¬â¢s organizationsââ¬âschools, professional societies, and womenââ¬â¢s studies groups.â⬠5 Hershatter, Gail& Honig, Emily. Feminist Voices. Personal Voices: Chinese Women in the 1980ââ¬â¢s. 308. Stanford, CA:Stanford University Press, 1988. Women became aware of their unequal state in society and began to pay attention on female issues. In 1990s, new modern women images emerged. Women focused on individual characteristic and pursued their confidence and profession. The new women were as strong and intellectual as men or better, and they could even afford more of what they desire without anymore having to depend on men and be at a lower statute in society. ââ¬Å"Metropolis ran a special feature on women of talent in its November 1999 issue. One illustration show a confident woman pointing to the screen of her laptop computer while a male colleague with furrowed brow struggles to comprehend what he sees. An article entitled ââ¬Å"Thirty Traits of the Talented Womanâ⬠6 ââ¬Å"Thirty Traits of the Talented Womanâ⬠explains that the woman should be intelligent, sharp-witted, well-informed, knowledgeable, well-spoken, and has good taste; she is independent, self-respecting, and conscious of womenââ¬â¢s equality; she if principled but gentle, with a good sense of humor, and easy to get along with. She is understanding, generous, and sensitive to the feelings to others, but not suspicious. She is a doer-straightforward, efficient, and self-controlled. She is a bit of a rebel but not confrontational. While she may be attractive to men, her attraction is based on personality, not beauty. Her life is well-balanced; love is never her only concern. Dadushi (Metropolis) 14 (November 1999): 102-103 lists her characteristics.â⬠7 Julia F. Andrews and Kuiyi Shen. The New Chinese Woman and Lifestyle Magazines in the Late 1990s. Popular China: Unofficial Culture in a Globalizing Society. Ed. Perry Link, Richard P. Madsen, and Paul G. Pickowicz, 151. Lanham, Maryland: Rowman & Littlefield Publishers, Inc., 2002 New modern women were portrayed as beautiful and intellectual individuals. They could stand in the same level in society with men. Contemporary Chinese female artists and works Contemporary Chinese female artists use a lot of ways to express and convey their feelings and this is done effectively in their image. Basically, there are five important themes involved in their works to describe their voice and thought. First, female artists usually use their sensitivity to express womenââ¬â¢s touch through body and gesture. Body and gesture presentations help artists to voice their opinions and feelings accompanied with their understanding of being women. Cui Xiuwen8 Cui Xiuwen, born in Heilongjiang, China, 1970. She graduated with MFA from the Central Academy of Fine Art, Beijing, China in 1996. Cui Xiuwenââ¬â¢s works have consistently engaged themes of sexuality and gender. Her paintings show the blurred boundary between public and private, and the relationship between history and memory. She uses a wide range of media and subject matters to explore the messages she wants to pass, bringing disturbing insights to bear on those issues. , her series works, ââ¬Å"Loversâ⬠(1999), she creates bold and sensitive relationship and intimate activity between man and woman. In the piece, she reveals both heterosexual and homosexual features, and presents a nervous sexual interaction that hints at Paul Cezanneââ¬â¢s colors. In ââ¬Å"Lovers 5â⬠(1999), strong and intense orange color background emphasizes the two human figures in the front when having sex, and also marks the nervous and excited atmosphere between them. While seeing this painting, the feeling is along with two figures through position, activity, and touch. This is primary human nature and human form however is heterosexual or homosexual. ââ¬Å"â⬠I create themes about gender, not themes about sexuality,â⬠she explains. ââ¬Å"I focus on human beings, only the human form in the world. If you want to know what it is to be human, you have to gain an insight into the relationship between man and woman.â⬠â⬠9 Ma, Maggie. The Colors of Cui Xiuwen. Artzine: A Chinese Contemporary Art Portal. http://www.artzinechina.com/display_vol_aid168_en.html Yu Hongââ¬â¢s10 Yu Hong, born in Xiââ¬â¢an,China, 1966. 1995 earned MFA from the Central Academy of Fine arts, Beijing, China. Simple and realistic are the two best words to describe her works. Initially, Yu Hongââ¬â¢s paintings combine highly realistic portraits wit unreal surroundings and colorations, suggestion a sense of dislocation from the world. She presents her world and experience through works without any extraordinary images or ideas. Though paintings often represent a tranquil feeling, they depict the significance of life. Her early work, ââ¬Å"Nudeâ⬠(1988) was against masculinity appropriation of the spectacle of womanââ¬â¢s body in the Cultural Revolution. She portrays realistically, womanââ¬â¢s naked body, smooth and soft pose which present the touch and quality of female. Yu Hong reverses the traditional must-be female image. She depicts naked woman body in front only with red high heel shoes. ââ¬Å"Chinese pictures of the human body, clothes or semi-clothed, (in a furtive pornography [of specifically erotic pictures]), are-to Western eyes-meager, schematic and inadequateâ⬠.11 Angela Zito & Tani E.Barlow.The Body Invisible in Chinese Art?. Body, Subject & Power in China. Chicago: The university of Chicago Press. There were no naked body images in traditional Chinese pictures, but here Yu Hong presented the naked woman body to represent the true nature and beauty of human form intended à against masculinity of the body and tradition. Another type of presentation, like Hung Liuââ¬â¢s12 Hung Liu, born in China on the eve of the Cultural Revolution, 1982 earned her MFA in mural painting from the Central Academy of Fine Art, Beijing, China, immigrated to the United States later on and also earned MFA in visual arts from University of California, San Diego. She is interested in looking at how women existed in Chinese history for long time. Her works are touched with the painful reality of womenââ¬â¢s status on China. As a Chinese woman and immigrant in the United States, Hung Liu chooses different ways to identify herself through looking back the Chinese history and portraying female issue on art work. Her paintings are based on late 19th and early 20th century Chinese photographs. Some were taken by foreign tourists, while others were taken by the Chinese. Often, the pictures are of beautiful young prostitutes. In traditional Chinese society, prostitutes belong to the low social class and disdained by people. But, indeed, they play an important role during that period, especially for photograph art and portrait paintings. In her work, ââ¬Å"Odalisqueâ⬠(1992), she creates a monumental altar to an anonymous woman, a turn of the century Chinese prostitute. Hung Liu reclaims a place in history for the Chinese prostitute by transforming the small photograph into large scale painting. ââ¬Å"To the painting, with their flattened surfaces, Liu attaches wooden altars, on which she sets small jade-colored vases of glass flowers or tiny embroidered shoes for bound feet. Like the lacquer panels and the lifeless glass flowers, the prostitutes are mere decorations, passive, powerless, and empty in a culture that traditional counted emptiness as a female virtue.â⬠13 Kim, Elaine H.1996. ââ¬Å"Bad Womenâ⬠: Asian American Visual Artists Hanh Thi Pham, Hung Liu, and Yong Soon Min. Feminist Studies, Inc. http://www.jstor.org/pss/3178131 The traditional Chinese clothing of the woman contrasts with the ornate, Western design of the sofa upon which she reclines and the flowered, Victorian-style backdrop. In addition, her gaze turns to the viewer and marks us conscious of viewerââ¬â¢s role as outside observers. The painting recalls the western artist, Edouard Manetââ¬â¢s painting, ââ¬Å"Olympiaâ⬠(1863). She touches a moment that registers the encounter between a past China and the trope of the prostitute, sexuality as commodity advertised through the relation of displayed body to the gaze of that Western technology, camera. ââ¬Å"ââ¬Å"I donââ¬â¢t want their stories to be forgotten; I donââ¬â¢t want them to disappear without a trace.â⬠14 Kim, Elaine H.1996. ââ¬Å"Bad Womenâ⬠: Asian American Visual Artists Hanh Thi Pham, Hung Liu, and Yong Soon Min. Feminist Studies, Inc. http://www.jstor.org/pss/3178131 As she says, she intends to document the anonymous women in history. Hung Liuââ¬â¢s painting combines western aesthetics with Chinese subject matter (prostitute), a cross-cultural blend that communicates her unique sense of beauty and emotion to the viewer through extraordinarily skillful handing of paint. Second, family and growing background are the significant influences to female artist when creating their works. Their works sometimes are revealed the images about family or childhood memory, and even extend to related personal expression and concern. Yu Hong, ââ¬Å"Witness to Growthâ⬠(1966-2006), in which Yu Hong uses her own family photographs to create a self-portrait for each year of her life, and portraits for each year of her daughterââ¬â¢s life. The idea and composition of paintings dwell deeply in her concerned questions: What is the social expectation to female role in our society? How do these expectations build up the life of a woman? In this series of paintings, she not only narrates the story in how growing process, but also how society changes a womanââ¬â¢s life. Yu Hong discards an enthusiastic and rational thinking, but returns to the history by an imperturbable and objective manner instead. Yu Hong chooses a newspaper or magazine spread to complement each image of painting, and makes connection between private and public area of her own life. ââ¬Å"Witness to Growthâ⬠(1995),a painting of herself aged twenty-nine years old, Yu Hongââ¬â¢s daughter lying on her body, family burden (role of mother) and society change (modern woman) bring heavy pressure and make her rethink the meaning of gender role and seek the balance between those roles. Next to the painting, artist places a contemporaneous China 1995 newspaper depicting ââ¬Å"women waiting for job opportunityâ⬠. Chinese economy was flourishing rapidly during this period, and it also brought extremely competition in working position. Many women lost jobs, and many young girls lost opportunity of education. Society change quickly marked negative effect to female and deprived of their chance. At this time, western feminism came into China; women began to pursue their equality to men in society and also look for their female identity. This feminism trend aroused women to think about their roles between family and society as mothers and working women. In contrast, one year-old Yu Hongââ¬â¢s daughter, she seemed a new generation is growing. A new age is coming. The painting engages the juxtaposition of the weight of contemporary Chinaââ¬â¢s history with the simplicity of life in its purest, most uncomplicated state of being. Here is a relatively quiet life lived in the midst of an almost constant political, cultural, and economic maelstrom. Yu Hong provides the necessary retreat into ordinary that enables the progression of life through the juxtaposition of the photograph and painting. Cultural Revolution was a significant historical event, especially rooted in people who grew up during this period. Hun Liuââ¬â¢s stunning reproductions of historical photographs of Chinese life, which address the cultural collisions she faced while coming of age during the decade of the Cultural Revolution in China. Personal items such as photographs were forbidden during Cultural Revolution, and her family destroyed most of their family photos out of fear. As a result, Hung Liu creates her paintings from anonymous photographs of historical China, particularly with reclaiming the lost histories of nameless women, has been strongly influenced by the losses she and her family suffered. Many of her paintings depict restrictive Chinese Cultural Revolution Scene and express her voice to against this history. Hung Liuââ¬â¢s painting, ââ¬Å"Three Gracesâ⬠(2001), the source photographs for this painting depict women in paramilitary uniforms in heroic poses, shown from below to give the appearance of greater height and stature. These fighters for Maoââ¬â¢s cause carry primitive rifles as they march forward to engage in the revolutionary struggle. During the Cultural Revolution, young students and young people were mobilized by Chinese government, called ââ¬Å"red guardsâ⬠or ââ¬Å"Hong Wei Bingâ⬠. The Hong Wei Bing traveled throughout China, going to schools, universities, and institutions, spreading the teaching of Mao. They aimed to attack the old society (old ideas, cultures, manners, and customs) with violence, but indeed they followed blindly by governmentââ¬â¢s propaganda. And the Cultural Revolution also put young intellectuals and artist like Hung Liu into the rice fields to be ââ¬Å"re-educatedâ⬠by peasants. Hung Liu chooses plain clothes worn by the women in the original photographs with flowers, painted in the traditional Chinese style. The drips of oil paint that enliven the paintingââ¬â¢s surface are a part of Western praxis with its reference to the personifications of beauty, charm, and grace. As she says, ââ¬Å"ââ¬Å"The oil washes and drips hat seep through my paintings contributes to a sense of loss while dissolving the historical authenticity of the photographs I paint from. Color is a way of making contact with subjects that are fading into the gray tones of history.â⬠â⬠15 Going Away, Coming Home: 80 Blessings from Oakland Artist hung Liu. Port Of Oakland. http://www.museumca.org/press/pdf/Liu%20fact%20sheet%20fnl.pdf Through this revolutionary background, Hung Liu had experienced a deep touch. This painting not only looks for the memory of girlsââ¬â¢ but also expresses Hung Liuââ¬â¢s feeling of the Cultural Revolution through the image and drip. Third, artists look for identifying womenââ¬â¢s importance and missing recognition of social status because women in society are always ignored and made to play an unimportant role. Indeed, they are actually as significant as men in our world. Hung Liuââ¬â¢s paintings often narrate identity and story issues. She documents in her art the forgotten lives of anonymous people, especially those of women. She tries to recall their erased identity from society and appear their stories and meaning of existence back. Her work, ââ¬Å"We have Been Naught We Shall Be allâ⬠(2007), a series of three canvases edged by bands to mimic widescreen film format, those works are inspired by Daughters of China (1949), a Ling Zifeng film based on the heroic actions of a group of women officers and soldiers during the Sino-Japanese War. Hung Liuââ¬â¢s empathetic response to the final moments of the women, as they carry a wounded comrade into the river to draw away enemy fire from the Chinese Resistance fighters, brings to the fore the theme of personal sacrifice. The images of women are taken by realistic presentation, Hung Liu bases on original photographic image of film. She reserves womenââ¬â¢s face without any color and intends to keep their original identify and recall their heroic dignity, accompanied by respect. The paintings from left to right, it seems catching the moment and movement when women carrying the wounded body toward the front. Hung Liu uses the yellow color on three canvases, the background of left painting is coloring yellow, yellow is on wounded body and womenââ¬â¢s figures of central canvas, and only little yellow color on right canvas. Moreover, yellow symbolizes the sharp memory. Hung Liu arranges the yellow on three canvases perfectly along with womenââ¬â¢s action and moment. This presents a balance between image and time. Her art work is concerned about what has been lost in transit between female and history. Hung Liu desires to give those nameless women place in history, and she would like to identify those women as significant heroes in our society. As Hung Liuââ¬â¢s concept, Yu Hong creates the ââ¬Å"Sheâ⬠series to portray the spirit and lives of women. The meaning of ââ¬Å"existenceâ⬠in our world is then recorded. Different career women have also played different roles to show their importance. ââ¬Å"She-security guardâ⬠, Yu Hong arranges one photographic image picked by security guard aside with one oil painting made by her. The photographic image is taken in front of the museum in her leisure time. Security guard wears white shirt with likely smile. In the photo, she raises her hand and poses ââ¬Å"YAâ⬠. Contrary to the next, the painting shows her working place. She wears yellow ochrecolor uniform and concentrate on her job with highly respect. The light is the parking light seems leading us to take a glance on her working place and tries to understand her work. Artist organizes this placement purposely and intent to show the importance of security guard in society. Yu Hong depicts the portrait image to let audience snoop security guardââ¬â¢s life between working place and personal life. She is the individual with singularity; no one can replace her in this career position. Yu Hong still presents her realistic style on paintings, and she intends to record different modern female in different levels of life. As she says, ââ¬Å"If life can move slower, people can notice and pay attention in every detail and experience. I wish life could be freed from the restraint, so the essence of real life could be discovered. â⬠16 ââ¬Å"æËâÃ¥ ° ±Ã¦Ë ¯Ã¥ ¸Å'æÅ"âºÃ§âŸæ ´ »Ã§ ¯â¬Ã¥ ¥ æ⦠¢Ã¤ ¸â¬Ã© »Å¾, éâ¬â¢Ã¦ ¨ £Ã¤ º ºÃ¥â¬âÃ¥ ¯Ã¤ » ¥Ã¥ ¾Å¾Ã¥ ® ¹Ã¥Å" °Ã§âŸæ ´ », æ⦠¢Ã¦â¦ ¢Ã¥Å" °Ã© «âæÅ"Æ'. æËâæ ³ ¨Ã©â¡ ç ´ °Ã§ ¯â¬,æËâÃ¥ ¾ËÃ¥ ¸Å'æÅ"âºÃ§âŸæ ´ »Ã¨Æ' ½Ã¥ ¤ æâ ç⠶ä ¸â¬Ã¤ ºâº, éâ¬â¢Ã¦ ¨ £Ã§âŸæ ´ »Ã§Å¡âæÅ" ¬Ã§Å"Ÿçâ¹â¬Ã¦â¦â¹Ã¦â° èÆ' ½Ã§Å"Ÿæ £Ã¨ ¢ «Ã¤ º ºÃ¥â¬âç⢠¼Ã¨ ¦ ºÃ¢â¬ . Enjoy the Life-Yu Hong. Febay.com. http://www.febay.com.cn/magazine/ArticleShow.asp?ArticleID=18433 (April, 2007) Yu Hong represents the reality of space on womanââ¬â¢s personal life and working life, elegant skills on portrait image, and female sensibility on womanââ¬â¢s experience. She also represents an inner desire of a female artist be responsible and conscious of womenââ¬â¢s social status. Fourth, the present reality of sadness and pain of Chinese women who are suffering under a cruelly male-dominated world illustrate the image to challenge traditional patriarchy. In the works of Hung Liu, she has examined foot binding, practiced in China from the Song Dynasty until the beginning of the twentieth century. Many Chinese womenââ¬â¢s feet were bound from birth to artificially confine their growth, distorting them into small, twisted fists that were sexually attractive to men. The painful, deforming practice of foot binding was used to make a Chinese woman walk in an extremely difficult way, but their mincing steps were considered delicate and lovely. Bound feet left women handicapped, which also ensured that they remained subservient. Moreover, it stressed the value of appearance while making a virtue of hiding oneââ¬â¢s pain and suffering, making it a combination of esthetics and cruelty. In one piece of her work called ââ¬Å"Bonsaiâ⬠(1992), Hung Liu placed a photograph next to an anatomical line drawing showing the cross-section of a human body flanked on either side by Chinese characters. The only decipherable physiognomic attributes in this figural drawing are the heart, what appears to be a spine, and a suggestion of intestinal organs. What are most astonishing observations about this drawing are the absence of legs and the egg shape of the figure that almost mirrors the contour of the woman in the photograph. By placing these two images within the same interpretive context. Hung Liu has reinforced the notion of the womanââ¬â¢s incapacitated movement. Womanââ¬â¢s physical movement had been limited by the mutilation of her feet in the same way that a tiny bonsai tree is confined to restrict its growth. She had been bound by Chinese societal and cultural practices as an object of male gratification. Hung Liu shows the Chinese aesthetic tradition with cruel reality in male- dominated society. She also presents how unfair beauty standards were to women in the long period. As a Chinese woman, the piece would make a you think about your grand grandmother or grandmother suffering this pain in order to satisfy menââ¬â¢s taste and standard. Her art work is concerned about what has been severed from the surroundings. She touches the sadness and painful reality of womenââ¬â¢s status in China. As a woman, she uses her sensibility to depict and voice for womenââ¬â¢s gender role. From her paintings, not only narrate stories but also represent true reality in our society. The young artist Cui Xiuwen creates bold, sensitive caricatures of works as ââ¬Å"Intersection Seriesâ⬠in 1998. In the piece, she records the full front side of a manââ¬â¢s naked body and dressed a young girl holding a rose. The painting is also done in connection with Cezanneââ¬â¢s colors and narrative story-telling and nervous relationship between female and male. Cui Xiuwen colors the girlââ¬â¢s dress and dog on green color. Green color symbolizes the protection from fears and anxieties connected with the demands of others (men). The rose is represented as girlââ¬â¢s pure virginity which is inviolate. Girlââ¬â¢s face also reveals innocence. On the contrary, manââ¬â¢ genitals are bit off by girlââ¬â¢s dog, blooding through his underwear. His extremely fearful and shocking face shows on his face with opened mouth and big eyes. In traditional Chinese society, patriarchy dominates the world and power. Genitals are the symbol of patriarchy. Cui Xiuwen boldly challenges to patriarchic society and tries to reverse the social position between female and male. In traditional Chinese art, art is confined to the men society. Women always played being viewed characters; men played viewer roles, but here, the artist breaks traditional art concept and reverses art presentation. The reversal shows Cui Xiuwenââ¬â¢s stance on the feminism. She makes up fictional story image to express her own challenging patriarchic desire. Intensive and extraordinary color and story throw a huge stone to the eyes of the audience. This also brings new dispute to contemporary Chinese society. Finally, concern about female and social issues, the year 1976 marked a shift in political, economic, and cultural policy, a shift that opened China up to the outside world. Afterward, society is changing rapidly. There are more and more social issues emerged such as teen-age crime and pregnant teen-age girl. Social value shifts to wrong path. Artists see this situation and use observations to bring the problem and question to audience. Yu Hong, she approaches new art presentation on ââ¬Å"Figure and Groundâ⬠. The works portrays some young girls practicing gymnastics. Images seem simple, but paintings neatly summarized a sophisticated thread of thought the artist has been developing over the years, and they express that thought in a way that ties the works visually to certain aesthetic principles found in traditional Chinese painting. As a group, paintings represent a fresh vision and a new level in artistââ¬â¢s oeuvre. Each painting in the series depicts from one to three girls against a blank ground, bent into contorted positions as they practice gymnastics. Yu Hong bases the paintings on photographs she took at her daughterââ¬â¢s gymnastics class. The girls wear black leotards in addition to some combination of tight black pants, black and white striped shirt, and black slippers. ââ¬Å"As the artist has said, the paintings ââ¬Å"are all about girls doing artistic gymnastics. People, especially girls, have to change themselves to suit society.â⬠The images are a simple but highly effective metaphor for the place of young girls in contemporary society.â⬠17 Erickson, Britta. Figure and Ground: Yu Hongââ¬â¢s Gymnastics series. Yu Hong. Beijing, China: Loft. Although the students in Yu Hongââ¬â¢s daughterââ¬â¢s gymnastics class range in age from six to teenage, the age of the girls portrayed in Figure and Ground is narrowed to about nine to twelve. Those are the years when girls move from childhood to puberty and begin to come under the heavy pressure of societyââ¬â¢s expectations. Teenage is a special period, and it is easy to lead a child to wrong path. Cui Xiuwenââ¬â¢s strength and certainty seems to have naturally transformed into a desire of the home, of having a family, and in a wish, difficult to admit but naturally inevitable, of maternity. This is what the images of her work, ââ¬Å"Angelâ⬠, inspire. Artist approaches her own sensitive observation to current social issue related to young age girl. This work does not want to criticize a social and universal situation. It brings up the awareness and the realization of an individual as a singular feeling. Cui Xiuwen wants to express how a young mother, especially teen-age mother in China feels and what fears she has to face. She uses a young model to create strong emotions. Rows of white young girls, ghost like girls, and the same girl repeated over, and in the same state of pregnancy, but the figures are positioned at various scales, which express the different types of fear they have. Alone, staring at the horizon, scared and worried in a procession that goes from the Forbidden City and continues on what can be a highway such as the Beijing ring road o the expressway to the airport. This represents the time when society is changing, and girls are unable to go back to the prior time and have no choice but to go forwardt. They look at the front but only darkness is surrounding them. ââ¬Å"ââ¬Å"No longer wishing to see the outside world, reality, nor to be confronted by it or to have to deal with itâ⬠, is the artistââ¬â¢s explanation. Falling pregnant has distinctly different meanings and implications at different ages of woman. Both for the woman and it terms of how the external world judges the fact. Do they applaud or condemn. Cui Xiuwen asks ââ¬Å"Can a woman choose to have a baby alone, single, because she bows to maternal instinct, and does not feel the need to be married?â⬠â⬠18 Smith, Karen. Photo series ââ¬Å"Angelâ⬠of 2006 and ââ¬Å"One day in 2004â⬠. Catalog of DF2 Gallery. Los Angeles:DF2 Gallery Cui Xiuwen brings the question to make the audience aware about the young pregnant girlââ¬â¢s problem rather than criticize her . She uses retrospective manner to represent the image on her works. Her works do not strike us, nor are they extraordinarily critical, but rather leave significant questions in our minds. Conclusion Yu Hong, Cui Xiuwen, and Hung Liu though are being in different generation groups; they all aim to represent female qualities and voice for women through their works. Yu Hong was brought into the world at the start of the Cultural Revolution in 1966, during which almost every aspect of Chinese life was being re-evaluated. When re-examining the historical evidence and cultural production of the period, it becomes difficult to imagine life being brought into the world during such a period of upheaval. In many cultural products that are marketed as personal memories, the political economic situation is placed directly into the foreground of the narrative, and personal details become a way of contextualizing the nationââ¬â¢s story. Yu Hongââ¬â¢s method of storytelling makes the personal much more central. Her generation, is a group existing between old (artists were trained as Russian realists) and young (artists were influence by emancipation movement) generations. Yu Hongââ¬â¢s works always present old tradition concept (family as central start point) and new social concept which is related to social issues. Cui Xiuwen has been called many things-avant-garde, transgressive, feminist, controversial, and even over-the-top-buts never creatively stagnant. She is born a new kind of human, who grew up in a relatively open social environment and came of age in the increasingly more globalised information age. Her paintings and later photographs are always with frank depictions of human sexuality and controversial issues, which present her ideas and feelings about the new modern society. But Hung Liu, she was born in 1948 in China. During the Cultural Revolution, she was sent to the country to work in the fields and be ââ¬Å"reeducatedâ⬠. Hung Liu studied the acceptable artistic style of Socialist Realism while in China. After immigrating to San Diego, she learned that it is important for an artist to think and that art is intertwined with, not separate from life. Her works depict the cultural mixing that takes place when an individual moves to a new country and also reality of hidden history in China. She much focuses on historical sources to present the image of reality. Three generation group of artists have their own unique presentations through their works and also are influenced on their own social backgrounds. But, female are the most important image and concepts of their commonality of works. By focusing on a female rather than on a male, three artists challenge a tradition of patriarchy. In the art pieces, the narrator (three female artists) and the protagonists (female image in works) are all women. As such, they present the viewer with a distinctively female view of the world. In historical constructions, womenââ¬â¢s lives were generally touched only indirectly in contrast to their fathers, husbands, or brothers. Yu Hong, Cui Xiuwen, and Hung Liu show the womenââ¬â¢s lives being immediately influenced by the external world and also their ââ¬Å"existenceâ⬠and ââ¬Å"importanceâ⬠in our society. History, society, and family have been great influences upon the development of female art in China. Because of the oppression that Chinese women have faced from a patriarchal society, female art exhibit intense emotions of sadness, pain, and revolution against the male dominated Chinese social stratification. There are many paintings, and photographs that depict the detrimental state that Chinese women were in during the more rigid periods of Chinese history. Various works of art from photos to paintings show female opposition against various Chinese traditions that have oppressed their gender for generations. Many female artists who driven by extreme emotion focused on work that mirrored their sense of retribution against male dominance. Art work that feature females ââ¬Å"turning the tablesâ⬠on men are common among more liberal female artists. There is also a lot of work that defy traditional Chinese art that is also patriarchal. Such works make use of non-conventional materials and subjects as a way to challenge the male dominated norms. This shows an image of the Chinese female artist as someone who wants to break free from an oppressive condition through the use of personal expression. The qualities linked with the use of the expression in art for them taking account of use of words importantly as the innermost artistic element, simplification, appropriation, representation of user or popular culture as well as art itself. The artists believe that art makes people realize the truth-at least the truth that is given to all to understand, and brings back eliminated women state in Chinese tradition. Chinese female artists have become more motivated to do art not only because of talent, but they convey reality and truth through art. In currently modern world, the majority is focusing on economic flourishing, globalization, and new technology. Most people have forgotten the essence of life and the simple things that make us live along with the many troubles of humanity and theses contemporary Chinese female artists, through exploring modern art are still preserving the real essence of making art and what art means to them, and the female artists also discover their own experience and find an appropriate way of expression in Chinese art. In relation to this, the female artist thus gives superior importance to the role of women in Chinese society. Many daring works aim to recognize female contribution to the family, government, and society which goes largely undistinguished in past generations. Here the Chinese female artists aim to open viewersââ¬â¢ hearts and minds to the true worth of the Chinese woman. Works of art that show how important Chinese women are also tend to show how much they are taken for granted. The Chinese woman artist was also found to be sensitive with the changing times. As society evolved over years of political, economic, and social change, so did female artistry change with it. In fact, female art can be concluded to be much more versatile than Chinese male art which is considered more traditional and unyielding to time. Another difference duly noted between male and female works of art in China was that females tend to express more depth and daringness in terms of depicting sensual subjects. Years of yearning for equality with their male partners have also implied years of dissatisfaction with how males see copulation rituals. The outlet of this repression can be observed with how meaningful and rich Chinese female works of sensual art are. The female artist takes her time to craft the intricate details that add flavor to a romantic scene. The female artist is able to bring out the humanity of a sensitive scene and does not confine the subject to feral lust. Instead, the focus is upon the intimateness of interaction that is not meant to sexually arouse but rather to emotionally move viewers. Lastly, the image of the Chinese female artist is one that is deeply devoted to the value of family. Influences from childhood memories can be seen in the works of many female artists and is regarded as a sense of personal beauty added to general themes. Those are the themes that provide the overall picture in which female art is framed. Chinese female art can be compared to a strong, demanding voice that echoes the grievances of an oppressed gender and outwardly shows how important it is and why people should take notice. It is forceful and bold, more than willing to reject the norms in order to convey its meaning to an internal society that it deems as largely unsympathetic to their concerns. At the same time, female art is delicate and sweet, showing not intent to please but a true expression of beauty. Lastly, it can be concluded that female art is greatly influenced by changing times and each generation of female artists have their own issues to face which are reflected in the works that they produce. Despite female art showing the capability of female artists, it is also a representation of quality artistic work. These qualities contents highly essence of female touch and voice, and also produce with strong female expression through the artworks. Female art is not only made by female artist, on contrary, it is an art with enthusiastic female quality. These five categories of female quality present the sense of female beauty and expression, artistsââ¬â¢Ã¢â¬â¢ sensitivity of women, and extraordinary and skillful handling of paint. Observe the female art movement in the western society and Chinese society, there is no gap between them. In the west or China, the essence of quality of female art has maintained the same content and concept. In recently decade, female consciousness emerges and brings new concept to women. Women begin to understand themselves more and express their feelings to others. With a modern course of awareness in Chinese contemporary art in the global market, Chinese female artist are expectant that they will reach their ultimate objective; Chinese female artist must have a say. They will continue to explore and find a new way to express their art and voice for women, and the quality of female art will also get more abundant themes.
Thursday, January 9, 2020
Mediaââ¬â¢s Role In Body Images Essay - 1325 Words
Mediaââ¬â¢s Role In Body Images Authors can effectively get their point across by using different rhetorical techniques. In the two articles that I will examine, the authors mainly used a pathos appeal. Authors use pathos to get a social and emotional application across to the reader. Another rhetorical technique that is used by many authors is ethos. Ethos is a technique that can be used by an author saying that since they are perhaps a doctor or may have belonged to a certain organization for a long time, then they know more about a topic than somebody who may not have had the same moral values or interests. Logos, or the logic that the reader may conclude from the author, is an additional rhetorical technique that isâ⬠¦show more contentâ⬠¦When females realize they will not be able to accomplish the same body that the famous acquire, they come very self-conscious and some even develop eating disorders. The mediaââ¬â¢s role in self-images has greatly affected the way people preserve themselves in todayââ¬â¢s society. In David Butlerââ¬â¢s Slim Pickings, he mostly uses pathos to get his point across to the reader. His website consists of a short statement that contains his thoughts and feelings about Calista Flockhart, an actress that is highly criticized for an unhealthy body image. After his statement, the author poses a questionnaire to the reader to answer about whether or not actresses perpetuate unhealthy body images? The reader has the chance to answer yes, no, or not sure. After answering the question they can write their own statement regarding how they feel about this issue. Along the side of the authorââ¬â¢s statement and his question are the results of his poll to date. Below the question lies the statements different people gave regarding the question. The best way to get an issue across to the public is to allow them to read what their peers believe. Having the author ask his question allows this website to have the reader be interactive with this issue. When I had checked this web page, twenty differentShow MoreRelated Enjoyment of Being a Girl: Overcoming Industry Standards Essay1489 Words à |à 6 Pagesnegative images of women. These places all share one thing; negative images of women. Women are being used as a sex object and are not portrayed how the average woman looks. These portrayals can lead to loss of self-esteem and also weight loss. Women should know that they need their spiritual health to live happily and not be influenced by the images that the media portray as the ââ¬Å"perfectâ⬠body. Women need to have a feeling of being safe, powerful and comfortable within their own bodies. nbsp;nbsp;nbsp;nbsp;nbsp;ââ¬Å"MediaRead MoreA Culture Of Perfection : Media s Influence On Adolescents1362 Words à |à 6 Pages A Culture of Perfection: Mediaââ¬â¢s Influence on Adolescents Comparison. It is one of the most dangerous and detrimental habits within our society. We fall into a routine of ââ¬Å"self-checkingâ⬠ourselves against others; mentally taking notes of what we can improve and what we are doing better. We all know that comparison often takes itsââ¬â¢ toll on our confidence and self-worth; what we may not realize, however, is how early these destructive habits begin and why. The mediaââ¬â¢s influence is everywhere andRead MoreMedia s Effect On Teens986 Words à |à 4 Pagesinfluenced by the invisible hands of money hungry media. According to the Centers for disease control and prevention (CDC), the suicide rate is currently the third largest leading causes of death among teenagers, and the numbers are growing day by day. Mediaââ¬â¢s contribution to this upward trend of suicide may be debatable, but we canââ¬â¢t deny the influence of television commercials on teens. Through false advertisements, unrealistic standard of beauty, and s ocial norms, Media is fueling a national epidemicRead MoreMedia s Effect On Society s Perceptions Of Women s Body Image1474 Words à |à 6 PagesMediaââ¬â¢s effect on societyââ¬â¢s perceptions of womenââ¬â¢s body image causes mental health issues Part 1: 1. Group Topic Our groupââ¬â¢s main topic explores womenââ¬â¢s mental health and the issues around it that affect women socially, politically, and economically. 2. Individual Subject â⬠¨ In the beginning of my report I was researching juvenile women affected by mental disorders and mediaââ¬â¢s influence on it. I had several disorders I was going to discuss, however, I became embedded into the subject surroundingRead MoreMass Media s Influence On Body Image1414 Words à |à 6 PagesMass Mediaââ¬â¢s Influence on Body Image Over the years a debate over who is to blame over the decline in how girls perceive themselves has arisen. With Photoshop being the societal norm concerning the media, it has become difficult for many to understand where the line between real and near impossible standards lies. Youths see an image edited to ââ¬Å"perfectionâ⬠and strive to reach the standards that they imagine due to the images displayed on magazines, television and social media. From Disney to magazinesRead MoreEssay about The Mediaââ¬â¢s Effect on Adolescent Bodies 1725 Words à |à 7 PagesThe Mediaââ¬â¢s Effect on Adolescent Bodies The stringent standard Barbie-doll proportions of body image and what is considered beautiful in todayââ¬â¢s media has resulted in devastating effects on adolescent women. The images displayed of women who have long beautiful legs, thin waist lines and smooth flawless skin are very hard to ignore. Throughout history the female body has been on display as a selling tool to coerce people into buying that new fancy car or the latest new appliance that can makeRead MoreTeenage Girls and Body Image Essay1291 Words à |à 6 Pagesof influence from the mediaââ¬â¢s message. The problem with this is the media has a specific way of doing things and can be negative to a susceptible teenage girl. Mediaââ¬â¢s way of portraying a woman can be skewed and unrealistic way from what reality is. Teenage girls then have a desire for this look or way. In this essay the three ways I will describe as to why the media can negatively affect a teenage girls body image is by showing unrealistic bodie s and women, women whose bodies are desirable by a massRead MorePositive Adult Role Models1038 Words à |à 4 PagesPositive Adult Role Models Imagine living in a world where teens are doing drugs, pressuring their peers, and trying to be just like the models in magazines. Unfortunately, thatââ¬â¢s the world we live in today. What do these teens need? They need positive adult role models. It is important for a teen to be influenced by positive adult role models while growing up; because if they donââ¬â¢t have positive adult role models, teens can be influenced by negative media, negative peer pressure, and teen drugRead MoreAre You Beach Body Ready?1232 Words à |à 5 Pagesââ¬Å"Are you beach body ready?â⬠This is a slogan of a controversial advertisement in the UK with a slender, yet curvy woman in a bikini. Even though this commercial is for promoting diet products, the focal unrealistic, idealized female body image in a bikini and her seductive eyes make the most women ashamed of their body images. Sweney reported, the advertisement was a controversial issue due to a reason of womenââ¬â¢s sexual objectif ication and banned in the UK eventually. Even though the advertisementRead MoreEssay on Media Impacts and College Life1485 Words à |à 6 PagesFrom the Inside Looking Out As a college female growing up in a media-crazed age, I am deeply troubled and affected by the medias support of the thin ideology. I am a classic example of the medias impact on females and the downward spiral of self-satisfaction. Being present in the center of college life, I am in the midst of the hormonal sea of students. Whether its at class or watching the sorority and fraternity kids run around during rush week, there is always chasing for approval between
Tuesday, December 31, 2019
Evaluation Of An Anecdotal Record - 1178 Words
During my observation of Grace, I used anecdotal records, checklists, rating scales, and a running record (Nicolson Shipstead, 1998, p. 136-140). My anecdotal record, checklist, rating scale and running record were all pilot tested when peers looked at them during an in class assignment. First, I will explain that an anecdotal record can be defined as a short written story of one incident that is developmental significance (Nicolson Shipstead, 1998, p. 151) This story is sort and records the childââ¬â¢s or childrenââ¬â¢s age and the developmental significance are stated. The second method is a checklist (Nicolson Shipstead, 1998, p. 158-172). A checklist is a list of behaviors/ noticeable behaviors. A checklist is easy to use and leavesâ⬠¦show more contentâ⬠¦My running record lasted for nine minutes. During my running record, I just recorded the child s naturally occurring behavior. Data and Significance First I will go over my anecdotal records. First to deal with the topic I chose a cognitive development related to memory. Two of these anecdotal records show the development of cognition. Grace 4;6 after Grace picked out the book she wanted read to her, the caregiver was reading the cat in the Hatâ⬠to Grace. After the cat fell down Grace said ââ¬Å"I bump headâ⬠, talking about an event that happened in the past. Psychosocial development -- self-concept. Cognition ââ¬â memory. Grace 4;6 When 13-month-old Luke arrives, Grace runs over to her caregiver and touches the red vest the caregiver is wearing. ââ¬Å"Luky too!â⬠She exclaims. Indicating that Luke is also wearing a vest. Luke is wearing an orange vest. Cognitive development -- classification. The first shows how Grace remembers a situation where she bumped her head like the Story although this is an example of self-concept it is also an example of memory specifically recall memory. The second example also fits in with cognitive development. Grace is classified the vests Luke and her caregiver were wearing. The second method I use during my observation is a checklist. Grace used language to express how she felt. This was very clear from my checklist. One of the things on my check list was ââ¬Å"child
Monday, December 23, 2019
The Developmental Period Of A Child Was Truly Misunderstood
For many years of human history, the developmental period of a child was truly misunderstood. The mind of a developing child was thought simply to be a miniature model of the fully developed engine of thinking. It is often hard to remember the earliest stages of the human development process. However, revered researchers like Jean Piaget, John Kohlberg, and Erik Erikson have made extensive efforts in observing the different stages of human development. In punctuating these stages, the consensus has demarcated the expanse of human growth into four major stages: Infancy (birth-2 years), Preschool (3-6 years), Middle Childhood (7-12 years), and Adolescence (12-18). The specific contributions made by the Psychologists above mentionedâ⬠¦show more contentâ⬠¦The extent of my life socially was completely dependent on the relationship between me and my caretakers. According to Erikson, this is understood as a period of trust and mistrust, deeming me as completely reliant on who ever is responsible for me to provide, invoking trust, or to neglect, causing a sense of mistrust. But while I was coming along physically, cognitively, and socially, I was also beginning to establish an understanding of the world morally. By the standards of Kohlberg, this span of my life falls comfortably within the preconventional stage of development. This asserts that I justified my actions on the sound principle of obedience and punishment, meaning that the sole motivation for my actions was founded on avoiding punishment or seeking praise and were not any deeds done by my own rationale. Now I certainly cannot attest to remembering this stage of my life, developmentally, as I grow older, the more that I can remember to this day. The next stage of life that I passed through can be categorized as the Preschool period and lasts for the ages of 3-6 years old. Throughout these years, I continued to refine my motor skills and was very interactive with my environment because of my further advanced mobility. The physical development of children in this stage is known to taper off but still be quite apparent, which aligns quite similarly to what was described toShow MoreRelatedNarcissism: Psychological Theories and Therapeutic Interventions in T4446 Words à |à 18 PagesNarcissism: Psychological Theories and Therapeutic Interventions in the Narcissistic Disorders Introduction Understanding the Narcissistic Phenomenon The so called narcissistic personality disorder is a complex and often misunderstood disorder. The cardinal feature of the narcissistic personality is the grandiose sense of self importance, but paradoxically underneath this grandiosity the narcissist suffers from a chronically fragile low self esteem. The grandiosity of the narcissistRead MoreExploring How Language Acquisition Takes Place On A Second Language Or If It Is Possible?2812 Words à |à 12 Pagesultimate attainment is possible in a second language or if it is possible at all. Exploring how language acquisition takes place in a childââ¬â¢s life to how similar it is to second language acquisition in an adultââ¬â¢s life. By looking at the critical period in ones life, pieces will start to form together making it quite possible to believe that the theory of ultimate attainment actually does exist and that it may or may not be possible in a second language depending on the circumstances and the humanRead MoreA Brief Note On Depression And The Depression2842 Words à |à 12 Pagesseveral episodes throughout their lifetime. Persistent depressive disorder is a depressed mood that lasts for at least two years or longer. A person that is diagnosed with this kind of depression may have episodes of major depression along with periods of less severe symptoms, but these symptoms must last for two years. Postpartum depression is brought on by hormonal and physical changes and the new responsibility of caring for a newborn. According to Everyday Health, 85% of new moms feel some sadnessRead MoreAbnormal Psychology. Classification and Assessment of Abnormal Behavior20707 Words à |à 83 Pages99ââ¬â100 SUMMING UP 100ââ¬â101 T R U T H or F I C T I O N ââ¬Å"Jerry Has a Panic Attack on the Interstateâ⬠Interviewer: Can you tell me a bit about what it was that brought you to the clinic? Jerry: Well, . . . after the first of the year, I started getting these panic attacks. I didnââ¬â¢t know what the panic attack was. Interviewer: Well, what was it that you experienced? Jerry: Uhm, the heart beating, racing . . . Interviewer: Your heart started to race on you. Jerry: And then uh, I couldnââ¬â¢t be in oneRead MoreIntercultural Communication21031 Words à |à 85 PagesIntercultural Communication 1. A review of the development of intercultural communication study Although the phenomenon of intercultural communication is as old as human society, the study of intercultural communication is of recent origin. It was first started in the United States. Communication scholars commonly recognize E. T. Hall as the father of the field of intercultural communication study (Condon, 1981; Dodd, 1982; Gudykunst, 1985; Singer, 1987). He conceptualized this new field ofRead MoreOrganisational Theory230255 Words à |à 922 Pagestheory. It is both rigorous and accessible, clearly and unashamedly pitched for readers who wish to engage with theoretical issues whilst also maintaining a practical focus on why organization theory matters. I felt in good hands here, confident that I was being offered a deeply informed, reliable and intelligently constructed account. The opening chapter carefully and helpfully explains terms, including ââ¬Ëtheoryââ¬â¢ and ââ¬Ëepistemologyââ¬â¢ that can form an unexplored bedrock to texts in the field. It then offersRead MoreStrategic Marketing Management337596 Words à |à 1351 PagesStrategic Marketing Management Dedication This book is dedicated to the authorsââ¬â¢ wives ââ¬â Gillian and Rosie ââ¬â and to Ben Gilligan for their support while it was being written. Acknowledgements Our thanks go to Janice Nunn for all the effort that she put in to the preparation of the manuscript. Strategic Marketing Management Planning, implementation and control Third edition Richard M.S. Wilson Emeritus Professor of Business Administration The Business School Loughborough University Read MoreLibrary Management204752 Words à |à 820 Pages 240 . . . . . 247 . . . . . 273 . . . . . 278 . . . . . 284 . . . . . 286 . . . . . 359 . . . . . 378 . . . . . . . . . . . . . . . . . . . . 383 389 394 399 . . . . . 469 Preface Thirty years ago, when the first edition of this book was published, little had been written about the management of libraries and information centers. Those seeking advice, examples, and information about how to manage libraries were forced to search for answers in the literature of public administrationRead MoreDeveloping Management Skills404131 Words à |à 1617 PagesPermissions Department, One Lake Street, Upper Saddle River, New Jersey 07458. Many of the designations by manufacturers and seller to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed in initial caps or all caps. Library of Congress Cataloging-in-Publication Data Whetten, David A. (David Allred) Developing management skills /David A. Whetten, Kim S. Cameron.ââ¬â8th edRead MoreFundamentals of Hrm263904 Words à |à 1056 PagesFinley Dorothy Sinclair Sandra Dumas Susan McLaughlin Kevin Murphy Laura Ierardi Allison Morris Hilary Newman mb editorial services David Levy à ©Michael Eudenbach/Getty Images, Inc. This book was set in 10/12 ITC Legacy Serif Book by Aptaracorp, Inc. and printed and bound by Courier/Kendallville. The cover was printed by Courier/Kendallville. This book is printed on acid free paper. Copyright à © 2010, 2007, 2005, 2002 John Wiley Sons, Inc. All rights reserved. No part of this publication may be reproduced
Sunday, December 15, 2019
Website and Shopping Cart Free Essays
I am the owner of a clothing store along the jersey shore boardwalk and decide to engage in e-commerce AFEISHA HERRY STRAYER UNIVERSITY MICHAEL HOWARD BUS107 11/26/2011 I am the owner of a clothing store along the jersey shore boardwalk and decide to engage in e-commerce I am the owner of a small clothing store along jersey shore and I am being offered 1000 for my domain name that I will use in the process of e-commerce. Firstly the domain name that I will be using must be pronounceable, brandable, makes sense and also be available, if my domain name is effective in helping the business to grow, I will not sell it. An effective domain name is not easy to compose and sometimes obtain, from my experience I know that a great domain name creates a good impression online and makes you influence people and eventually they will buy your products if you are selling something, all of this I would have taken into consideration before I created a domain name, from my point of view I would not sell an effective domain name if I know it will give my business a boost. We will write a custom essay sample on Website and Shopping Cart or any similar topic only for you Order Now Also I will look at the bigger picture I know that I can make a bigger profit if I keep my domain name than to sell it for 1000 which I might not even make a profit on. On the other hand itââ¬â¢s ok if someone has a good domain name and wishes to sell it I donââ¬â¢t see it as being unethical, it all comes down to a personââ¬â¢s decision on how effective and useful the name is to them and if they will benefit from which ever decision they make. The e-commerce software you will be using must provide a catalog display, shopping cart capabilities, and transaction processing. The convenience and usability for the customer are benefits of these functions. State how each of these functions could be beneficial to your business. Catalogs offer consumers a wide range of products of either generalized or specialized nature, the shopping cart acts as a mediator between payment processors and website as well as a janitor helping customers finds the amenities provided. A shopping cart thatââ¬â¢s easy to navigate and flexible enough to cater for the personal needs of the customers, improves the site usability and makes online shopping a pleasant experience for the customers. In the absence of a shopping cart the customers wouldnââ¬â¢t have a place to store and manage multiple items and would not have to order separately. For a business the shopping cart software organizes the information for successful transactions and ensures that things run orderly and smoothly. It enables the employer to handle the customers more easily with shopping cart integration; it would really be hard for the business operators to manage their client if every person would have to order every time he chooses a product. Business owners are benefited due to a better functionality that comes with the majority of shopping cart systems that offer features such as back end marketing, wish list and inventory tracking. A good quality shopping cart offers rich functional capabilities to the e-commerce business such as a concise catalog management and a simplified business management by producing a wide array of reports to manage the finances better, monitor sales and provide improved customer service. A shopping cart removes any obstacles in the way of the online customers and the growth of an online business. Transaction processing is a type of computer processing that takes place in a computer user. Every business has to deal with some form of transactions, how a company decides to manage these transactions can be a important factor in the success. As a business grows its number of transactions usually grows as well . Transaction processing is a tool that can help growing business deal with their increasing number of transactions. The advent of online technology has made the international distribution of goods and information a quick and often simple process. The emergence of features like secure servers, one click shopping, and tracking of packages over the internet have helped make them feel more at ease with the process. Transaction processing offer a rapid processing for any business, reliability, standardization, controlled access, transaction processing qualifiers, atomicity consistency, isolation and durability. Transactions processing support routine day to day activities that occur in the normal course of business that help the company add value to its product and services, business expect transaction rocessing to accomplish a number of specific objectives process data generated by and about transactions, maintain a high degree of accuracy and integrity, produce timely documents and reports, increase labor efficiency, help provide increased service, help build and maintain customer loyalty and achieve competitive advantage. Creating an effective presence on the web using revenue the seller establishes a brand image, and then uses the strength of that image to sell through printed catalogues mailed to prospective buyers. Buyers place orders by mail or by calling a telephone number provided an effective site is one that create an attractive presence that meets the objectives of the business or organization by attracting visitors to the web site, making the site interesting enough that visitors stay and explore, convincing visitors to follow the sites links to obtain information creating an impression consistent with the organization is desired image, building a trusting relationship with visitors and encouraging visitors to return to the site. Business accomplishes all of their goals for their website in their current web presence. Having a site that is accessible and easy for people to use can improve your web presences. Even making sure that the site encourages visitors to trust and even develop feelings of loyalty towards the organization behind the web site. An effective site should give the visitor easy access to the organizations history, a statement of objective or mission statement, information about products or services, financial information and a way to communicate with the organization. Presentation is also important, but so is realizing that the web is an interactive medium. Web site usability is important for a company on the World Wide Web a company is web site is the only point of contact that a company has with anyone who is interested in it. Thus companies rely on their web presence in order to achieve their online goals, be they commercials or otherwise. A company sets its usability goals through a combination of user proofing. The company then needs to qualitatively and quantitatively specify these goals then prioritize them so as to determine its usability goals. According to Nielsen and loranger the three most important characteristics that distinguish a usable web site are simplicity, naturalness and ease of use. When good usability is implemented in conjunction with good web design characteristics, especially visual attractiveness, it results in a web site that positively affects users behavior and the trust that a user has in the company to whom the website belongs. This trust is also affected by the userââ¬â¢s perceived usability that is the perception that the user has about the usability of a website before he/she actually makes use of it. Researchers such as safavi have proven that website having a user friendly design and an easy to use interface increases user satisfaction. Research also shows that the importance of web site usability increases in relation to the competition that exists within the environment that website is operating in. I can find no better quote than jakob Nielsenââ¬â¢s famous phrase that on the web ââ¬Å" the user experiences usability first and pays laterâ⬠meaning that users are always at a click away from leaving a website they are in if they do not find it usable. To develop a web marketing strategy for my business I will first have considered who is my customer, what I have to offer and understand where I am and what I can do helps me to create an effective marketing strategy. In identifying the market segment that I will target I must do some research on my market , identifying who are my main competitors are, what are they doing online, what are their weaknesses and strength, do they offer a guarantee, is their product really good and do they build links constantly or not. Also who are my favorite customers, what forces them to buy one or another product, read reviews, forums, testimonials to find out as much as I can about my target market. After I have performed a through online market research itââ¬â¢s time to systematize the data I have. What are the main strengths and weaknesses of my competitors? My marketing strategy for the company will focus on the market segment of an entire family with young children, to reach that segment my business will feature clothing for every category of the family, fashionable and affordable is the key to attracting customers. To advertise my business on the web firstly I will create a very effective website with a very outstanding domain name, a creative and innovative web page, and informative information about my business. After creating an effective website how I display the products on the site has to do with how I would advertise, my advertising has to be interested , entertaining and capturing so that my target market would want to buy my product by just hearing about out. A good advertisement helps to gain customers. Reference Brewer, it, 2003 website usability of the www as practice. In first Latin American web congress la- webââ¬â¢03. Santiago, Chile, 2003 Belanger,F , et, al,2006,website success metrics, addressing the duality of goals. Communication of the acm. 4a Baker, Michael the Strategic Marketing Plan Audit 2008. ISBN 1902433998 * Laermer, Richard; Simmons, Mark, Punk Marketing, New Yorkà : Harper Collins, 2007 ISBN 978-0-06-115110-1 (Review of the book by Marilyn Scrizzi, in Journal of Consumer Marketing 24(7), 2007) Schneider 2011/9th edition pg 140 How to cite Website and Shopping Cart, Papers
Saturday, December 7, 2019
Addressing Cloud Security Computing Issues -Myassignmenthelp.Com
Question: Discuss About The Addressing Cloud Security Computing Issues? Anawer: Introduction: Big Data is considered to be very much important for the IT world. For this reason, the Big Data cannot be overlooked in the IT world. The main reasons which lies behind this is the prominent increase in the data along with the services that are related with this data. So it becomes increasing important to explore this field along with looking into the matter of improving the ways of Big data analysis especially in the clouds (Purcell 2014). These two key aspects are the big data and the cloud computing. The Paper An Evaluation of Major Threats in Cloud Computing Associated with Big Data by Kamalpreet Kaur, Ali Syed, Azeem Mohammad, Malka N. Halgamuge states that most of the organisations relies on the power of the databases. And when the organisations outsources their database in the form of big data then they transfer all their data to the cloud (Hashem et al. 2015). The paper also indicates that the security challenges act as one of the most prominent issues related to the cloud c omputing and big data. Some of the major issues related to big data were also observed in this paper. The paper also indicates that due to various security threats clouds are not getting adopted on a larger scale despite of the presence of various advantages. The data sources have been analysed in this paper which helped a lot in identification of the gaps. The report provides the necessary solutions for the issues related to the analysis of the big data in the cloud. Literature review: A very important role is played by the big data in the world of business. this is due to fact that storing of the complex data in a secure way is one of the crucial aspects of the corporate operations. Big data refers to the huge amount of data in the structured, semi-structured, and unstructured form (Ji et al. 2012). There are 3Vs in the Big data and this mainly includes the high volume of data, high velocity of data and high variety of different types of information that are in need of getting mined. But the specific quantity of data is not mentioned anywhere, and the data can be in petabytes or Exabyte (Demirkan and Delen 2013). Peter Skomoroch stated that it was not possible to process the big data due to the difficulty, proneness to errors, and large time consuming nature of the data. This was difficult before the invention of the various data technologies like the MapReduce and Hadoop. These new technologies have greatly helped in the processing of the datasets than the tradit ional processing tools. There are many organisations which are associated with the collection of the complex data. This data is collected by the doing the worldwide surveys so as to improve the process of decision making that are extremely important for the sustaining of the healthy future for the organisations business process (Fernndez et al. 2014). It can be stated that there are various security challenges which comes up with the use of the clouds. Analysis of The Outsourcing Data and The Applications: Cloud computing is something which is capable of providing access to the data present in the clouds anytime anywhere. But the challenge remains that is checking of the authorized entities (Inukollu Arsi and Ravuri 2014). The significant challenges arising due to the monitoring of the clouds and many more results in the suffering of the cloud computing in reaching its full potential. So the users have to rely on the third part and the cloud providers for the purpose of making their data secure along with maintenance of the communication related to the reliability with the customers. When a user is making use of the cloud for the purpose of making decisions regarding the complex data and the platforms then it might seem that there is no other computing which has been done here (Demchenko et al. 2012). This happens due to the fact that there is no existence of any technical mechanism for the prevention of the accessing the data of the users unethically by the cloud providers. So the sig nificance of building up a new layer increases for the purpose of supporting a contractual negotiation phase between the providers of the cloud and the end-users. So it can be concluded that there is an essential need for the combination of technical as well as non-technical mechanism for the purpose of gaining the trust towards the use of the cloud computing environment. Analysis of The Security and The Privacy Challenges: Cloud computing consists of a service level agreement which is a contractual agreement used for the building up of new layers for the purpose of supporting a contractual negotiation phase. This phase mainly exists between the cloud customers and the cloud providers. Still the difficulty of bargaining remains regarding the security, privacy, as well as the trust (Zissis and Lekkas 2012). Despite of all this there are still some ways in which can be used for the purpose of assuring the customers. This assurance is mainly given for the purpose of making the customers understand that the cloud service providers provides services which is subjected to the contractual agreement initially this makes the process difficult. Access control: The need of credential based access control is increasing in cloud computing. The main reason for the existence of this for the accessing the control and the services so as to make sure that the important as well as the provenance information of the customer does not get leaked (Hashizume et al. 2013). Trust management: There are various way of managing the trust with the customers. there is an essential need of building up new policies for access control (Chen and Zhao 2012). This should be done instead of telling the customers that their data will never get breached for the purpose of management of the trust among the customers. Authentication and identity management: The main reason lying behind the use of identity management is for the purpose of determining an authenticate user along with the services (Ren Wang and Wang 2012). This is mainly based upon the credentials and the characteristics of the users. Privacy and protection of the data: Among the discussed challenges privacy is one of the biggest issue. There are many organisations which are not comfortable with the storing of their confidential data outside their premises. By use of the outsourcing data shared infrastructure, there is a risk of putting the customers background information at risk (Almorsy Grundy and Mller 2016). This is mainly used for various purposes and this mainly includes the auditing, tracing back along with the historically based access control. Along with this it also shows the balance that exists between the personal information of the client and the privacy. This is one of the biggest drawback that exists in the cloud environment. Analysis of the method and the material used in this paper: The research method that has been used in this paper for the purpose of interpreting the trends of the data sourced is by analysing the contents. This analysis is mainly done so as to find out the various proceedings along with measuring the processes so as to assist in the solving of the perplexing and the complex issues (Ryan 2013). A historic logic method has been used in this research. This will be greatly helping in assisting the interpretation of the findings regarding the security matters in the cloud computing that has discovered in the previous researches. By the process of evaluation of the gathered information and opinions form the experts has greatly helped in the study so as to shed a light in the area of cloud computing for further developments. Analysis of the Results: The results help in concluding that there are various domains in the cloud environment and these domains faces various security as well as privacy challenges. For this reason, there is an essential need for the users to thing before migrating their data to the cloud (Srinivasan et al. 2012). The challenges regarding the security can be categorised into various type and this includes the network level, data level, authentication level and many more. The major concern beside all this is the security of the sensitive information. For the purpose of enhancing the security it is becomes necessarily important to provide the access control along with the authentication and authorisation of the data that are to be stored in the clouds. CIA or Confidentiality, Integrity and Availability are the three major elements involved in the information security (Behl and Behl 2012). Along with this it should also be ensured that these three elements are being provided to the customers by the cloud prov iders. The paper also provides a figure which shows that the level of integrity is 24%, level of confidentiality is 31% and the level of availability is 19%. This results to be most threatening attributes when compared with the other attributes. The other attributes mainly include the usability, accountability, security and reliability. The biggest risk included in cloud computing are the security of the data, integrity and recovery. Along with this it is also important to know about the location in which the data is being stored and what are things that are being done with the stored data (Ali Khan and Vasilakos 2015). Besides all this it is also important to know what will happen if the cloud fails and if the data are being backed up or not. Third party networks are used by the cloud computing technology for the purpose of accessing the cloud services. This gives arise to various risks while accessing the services in the clouds. The users need to compare the various cloud services before moving into the cloud. The cloud services are becoming much more popular as they are much more convenient along with being affordable and provide a space for storage. Along with the above discussed issues there are also various attacks to the cloud system. This attacks mainly includes the loss of data, denial of the service, unauthorized access to the data, unauthorized modification and many more. According to Bleikertz et al. (2010) there are various advantages of using the cloud computing and this advantages are followed by the various challenges like the security, privacy and the security. This are the main reason due to which the adaptation of cloud computing has been prevented. The paper also expresses the fact that they are highly adoptable. Along with these the complex cloud computing administrations are arranged by making use of the web utilization by the clients or the cloud customers. The paper also states that in case of any wrong designing of the cloud computing by the customers increases the vulnerabilities regarding the security issues (Rao and Selvamani 2015). A particular methodology has been used in this paper so as help the audie nce in understanding the issues that might arise from the side of the user and the server. The main strength of the work done by this paper is that it provides a robust analysis of the various vulnerabilities along with the security attacks. Initially this analysis will be helping the vendors in the enhancing various security policies. Lombardi et al. (2010) discussed about a new architecture and transparent cloud protection system (TCPS) for the purpose of improving the cloud resources security due to the protection problems integrity in the cloud environment. It was also guaranteed by them that they have been able to identify the problems related to integrity protection along with addressing the issues related to integrity. They have also proposed a framework in which the TCPS can be utilized for the purpose of watching the integrity of the visitor along with keeping of honesty and virtualization. For the purpose of managing the image system in TCPS, the image filters have been used by them along with the scanners so as to detect the malicious image in order to prevent t hem from vulnerabilities and the security attacks. The main strength of the work done by Lombardi et al. is that it has proposed instrument that provides an enhanced rate of security, transparency and interrupt identification system. Along with this the limitation of this work is that they have not tested it to an expert cloud computing situation nor they havent accepted their work. Method for the Solving of problem: Some of the suggested method related to the solving of the issues during the use of big data in the clouds are listed below: Shipping of the Disk Drives to the Clouds: The problems related to problems in the plumbing can be solved by shipping the disk drives to the cloud environment. This will be helping a lot. Use of Data Mining techniques: The problem related to the malware diffusion can be tackled by making use of the data mining technique. This technique will greatly help in the identification of the malware in the cloud and eliminate the treats by the cyber criminals which happens to be a threat regarding the security and privacy of the customers (Bhadauria and Sanyal 2012). Use of the Access Control Techniques: For the purpose of securing the infrastructure of the big data systems there is a need of securing the distributed computation as well as the data stored. For the purpose of securing the data itself the information dissemination should be preserving the privacy along with this the sensitive data should be also protected by the use of cryptography and granular access control techniques (Modi et al. 2013). Enormous volume of the data necessities needs to be managed which are scalable along with the enabling of the efficient audits as well as the data provenance. Modelling: There is a need of validating the threat models which will be mainly covering the various types of cyber-attacks or any kind of data leakages which are mainly caused by the cybercriminals. Possible solutions: After the formalization of the threat model there is an essential need of finding the tractable solution. Implementation: The solution that are found out are to be implemented in the existing technologies and the infrastructure which will be initially followed by the comparison of the solutions with the different types of threat models. Different evaluation criteria for addressing the Security of the Big Data: After analyzing the security challenges related to big data the following solutions can be applied so as to eliminate all the risks. Some of the solutions are listed below: One of the major thing that is to be included in the new security solution is the extension of the secure perimeter of the big data from the enterprise to the public cloud (Puthal et al. 2015). By adopting this method, a new trustful data provenance mechanism will be created that will be initially helping in the mitigation of the risks related to the DDoS attacks which are mainly launched against the infrastructures of the big data. There is a mandatory need of addressing the legal requirements by the mechanisms regarding the handling of the data. One of the best way of securing the big data is by the implementation of the secure Information technology. This encryption technology is mainly used for the purpose of securing the confidential data and this might include the PII, PHI, IP along with various encryption keys and many more (Arora Parashar and Transforming 2013). This need to be done so as put the correct locking and unlocking mechanism for the data. For this process to become successful there is an essential need for making this mechanism transparent to the end-user along with having a low impact of the performance and scalability of the data as well. Beside the security recommendations there is an essential need for considering the security of the IT infrastructure itself. The common practice regarding the security includes placing of the security controls at the very edge of the network. In case if the security perimeter is violated by the attacker then all the data present inside will be accessed very easily (Ahmed and Hossain 2014). This leads to the need of new security measures which can be done by moving the security controls near the big data. By proper monitoring, analyzing and learning of the usage of the data along with the access which is one of the important aspect for the continual improvement of the security of the infrastructure that is holding the data. This will also leverage the security measures that are existing right now. Conclusion: This report helps a lot in identifying the various gaps along with the various security challenges that are related big data in the clouds. The report also helps in understanding the fact that cloud computing is one of the emerging technology which is being adopted by various organizations. This organizations design and develop their system for the purpose of stay ahead in the market of competition. Besides the security challenges there are also other technologies that are very much problematic and this includes the database, networking, virtualization and also the operating system as well. This paper has used different studies for the identification of the major problems related to the research. Along with this it also helps in identifying the major things that are to be taken into account so as to make sure that the big data are being moved toward the success. The report also helps in concluding that in the Relational Database Management RDBM the problem regarding the protection of the system from any kind of attack by making use of the resources along with which the only one important problem is the mitigation of the risks. Various mitigation problems have been discussed in this report and by the adaptation of this methods a great amount of risk will be eliminated. References: Ahmed, M. and Hossain, M.A., 2014. Cloud computing and security issues in the cloud.International Journal of Network Security Its Applications,6(1), p.25. Ali, M., Khan, S.U. and Vasilakos, A.V., 2015. Security in cloud computing: Opportunities and challenges.Information Sciences,305, pp.357-383. Almorsy, M., Grundy, J. and Mller, I., 2016. An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Arora, R., Parashar, A. and Transforming, C.C.I., 2013. Secure user data in cloud computing using encryption algorithms.International journal of engineering research and applications,3(4), pp.1922-1926. Behl, A. and Behl, K., 2012, October. An analysis of cloud computing security issues. InInformation and Communication Technologies (WICT), 2012 World Congress on(pp. 109-114). IEEE. Bhadauria, R. and Sanyal, S., 2012. Survey on security issues in cloud computing and associated mitigation techniques.arXiv preprint arXiv:1204.0764. Chen, D. and Zhao, H., 2012, March. Data security and privacy protection issues in cloud computing. InComputer Science and Electronics Engineering (ICCSEE), 2012 International Conference on(Vol. 1, pp. 647-651). IEEE. Demchenko, Y., Zhao, Z., Grosso, P., Wibisono, A. and De Laat, C., 2012, December. Addressing big data challenges for scientific data infrastructure. InCloud Computing Technology and Science (CloudCom), 2012 IEEE 4th International Conference on(pp. 614-617). IEEE. Demirkan, H. and Delen, D., 2013. Leveraging the capabilities of service-oriented decision support systems: Putting analytics and big data in cloud.Decision Support Systems,55(1), pp.412-421. Fernndez, A., del Ro, S., Lpez, V., Bawakid, A., del Jesus, M.J., Bentez, J.M. and Herrera, F., 2014. Big Data with Cloud Computing: an insight on the computing environment, MapReduce, and programming frameworks.Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery,4(5), pp.380-409. Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The rise of big data on cloud computing: Review and open research issues.Information Systems,47, pp.98-115. Hashizume, K., Rosado, D.G., Fernndez-Medina, E. and Fernandez, E.B., 2013. An analysis of security issues for cloud computing.Journal of Internet Services and Applications,4(1), p.5. Inukollu, V.N., Arsi, S. and Ravuri, S.R., 2014. Security issues associated with big data in cloud computing.International Journal of Network Security Its Applications,6(3), p.45. Ji, C., Li, Y., Qiu, W., Awada, U. and Li, K., 2012, December. Big data processing in cloud computing environments. InPervasive Systems, Algorithms and Networks (ISPAN), 2012 12th International Symposium on(pp. 17-23). IEEE. Lombardi, F., Di Pietro, R. (2010, March). Transparent security for cloud. InProceedings of the 2010 ACM symposium on applied computing(pp. 414-415). ACM. Modi, C., Patel, D., Borisaniya, B., Patel, A. and Rajarajan, M., 2013. A survey on security issues and solutions at different layers of Cloud computing.The Journal of Supercomputing,63(2), pp.561-592. Purcell, B.M., 2014. Big data using cloud computing.Journal of Technology Research,5, p.1. Puthal, D., Sahoo, B.P.S., Mishra, S. and Swain, S., 2015, January. Cloud computing features, issues, and challenges: a big picture. InComputational Intelligence and Networks (CINE), 2015 International Conference on(pp. 116-123). IEEE. Rao, R.V. and Selvamani, K., 2015. Data security challenges and its solutions in cloud computing.Procedia Computer Science,48, pp.204-209. Ren, K., Wang, C. and Wang, Q., 2012. Security challenges for the public cloud.IEEE Internet Computing,16(1), pp.69-73. Ryan, M.D., 2013. Cloud computing security: The scientific challenge, and a survey of solutions.Journal of Systems and Software,86(9), pp.2263-2268. Shaikh, Farhan Bashir, and Sajjad Haider. "Security threats in cloud computing." InInternet technology and secured transactions (ICITST), 2011 international conference for, pp. 214-219. IEEE, 2010. Srinivasan, M.K., Sarukesi, K., Rodrigues, P., Manoj, M.S. and Revathy, P., 2012, August. State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment. InProceedings of the international conference on advances in computing, communications and informatics(pp. 470-476). ACM. Zissis, D. and Lekkas, D., 2012. Addressing cloud computing security issues.Future Generation computer systems,28(3), pp.583-592.
Subscribe to:
Posts (Atom)