Sunday, January 26, 2020

Indian Cyber Warfare Capability | An Analysis

Indian Cyber Warfare Capability | An Analysis India is getting rapidly wired to the information superhighway. As India gets connected to the global village, asymmetric IW threat posed by the adversaries as well as non-state actors would be on the rise. With always ON broadband connections through DSL (Digital Subscriber Lines), Cable modems and 3G (third generation) cellular networks, widely spread across homes and offices, the cyber threat potential, has become more pronounced. As per, Mr. S.K. Gupta, Advisor (CN IT), TRAI, the definition of broadband has been modified to include only those services that offer access speeds of 512 kbps from 01 Jan 2011. This is expected to be upgraded to 2 Mbps network speeds from Jan 2015  [1]  . As brought out earlier India has carried a niche for itself in the IT Sector. Indias reliance on technology also reflects from the fact that India is shifting gears by entering into facets of e-governance. Ever since the launch of the largest software project implemented in India, the Country Wide Network for Computerised Enhanced Reservation and Ticketing (CONCERT) for the Indian Railways in 1986  [2]  , India has now brought sectors like income tax, passports, visa under the realm of e-governance. Sectors like police and judiciary are to follow. The travel sector is also heavily reliant on this. Most of the Indian banks have gone on full-scale computerisation. This has also brought in concepts of e-commerce and e-banking. The stock markets have also not remained immune. To create havoc in the country these are lucrative targets to paralyze the economic and financial institutions. The damage done can be catastrophic and irreversible. Fig-1 Indias Information Infrastructure (Source CERT-India). India currently occupies a leading position in the IT outsourcing and Business Process Outsourcing (BPO) industry. India is ideally situated in South Asia, offering a 10-12 hour time differential to North America and Europe that together encompass nearly 80 percent of the global IT business. The time zone difference ensures round the clock productivity for these nations wanting to outsource their software as well as other services requirements  [3]  . Indias total revenue due to IT and BPO outsourcing was US$33 billion, which is estimated to grow to US$60 billion by the end of year 2011. Datamonitor, a leading UK-based business information company, research indicates that 67-72% of costs to call centers operating in the US/UK are directly linked to man power costs. India, on the other hand spends only 33-40% of costs on man power. This includes training, benefits and other incentives for labor  [4]  . 83 per cent of Indian businesses had reported a security breach (against th e global 64 per cent) and 42 per cent of these had three or more breaches (as of Sept 2004). Existing Counter Cyber Security Initiatives. Having realised the importance of racing ahead of its adversaries in cyberspace, the Indian Govt has put in place various initiatives. Salient features of these initiatives have been discussed in succeeding paragraphs. NASSCOM is in the process of setting up the Data Security Council of India (DSCI) as a Self-Regulatory Organization (SRO) to establish, popularize, monitor and enforce privacy and data protection standards for Indias IT ITeS industry. National Informatics Centre (NIC). A premier organisation providing network backbone and e-governance support to the Central Government, State Governments, Union Territories, Districts and other Governments bodies. It provides wide range of information and communication technology services including nationwide communication Network for decentralized planning improvement in Government services and wider transparency of national and local governments. Indian Computer Emergency Response Team (Cert-In). Cert-In is the most important constituent of Indias cyber community. Cert-In is a functional organisation of Dept of Information Technology, Ministry of Communications and Information Technology, Govt of India, operational since 2004, with the objective of securing Indian Cyber space. It serves as a national agency for computer incident response. Its mandate states, ensure security of cyber space in the country by enhancing the security communications and information infrastructure, through proactive action and effective collaboration aimed at security incident prevention and response as well as security assurance. National Information Security Assurance Programme (NISAP). This is for Government and critical infrastructures, highlights are:  ­ Government and critical infrastructures should have a security policy and create a point of contact. (b) Mandatory for organizations to implement security control and report any security incident to Cert-In. Cert-In to create a panel of auditor for IT security. (d) All organizations to be subject to a third party audit from this panel once a year. (e) Cert-In to be reported about security compliance on periodic basis by the organizations. Indo-US Cyber Security Forum (IUSCSF). Under this forum (set up in 2001) high power delegations from both side met and several initiatives were announced. Highlights are:  ­ Setting up an India Information Sharing and Analysis Centre (ISAC) for better cooperation in anti-hacking measures. Setting up India Anti Bot Alliance to raise awareness about the emerging threats in cyberspace by the Confederation of Indian Industry (CII). Ongoing cooperation between Indias Standardization Testing and Quality Certification (STQC) and the US National Institute of Standards and Technology (NIST) would be expanded to new areas. The RD group will work on the hard problems of cyber security. Cyber forensics and anti-spasm research. Chalked the way for intensifying bilateral cooperation to control cyber-crime between the two countries. Challenges and Concerns. Some challenges and concerns are highlighted below:  ­ (a) Lack of awareness and the culture of cyber security at individual as well as institutional level. (b) Lack of trained and qualified manpower to implement the counter measures. (c) Too many information security organisations which have become weak due to turf wars or financial compulsions. (d) A weak IT Act which has become redundant due to non-exploitation and age old cyber laws. (e) No e-mail account policy especially for the defence forces, police and the agency personnel. (f) Cyber-attacks have come not only from terrorists but also from neighboring countries inimical to our National interests. Recommendations. Certain recommendations are given below:  ­ Need to sensitize the common citizens about the dangers of cyber terrorism. Cert-in should engage academic institutions and follow an aggressive strategy. (b) Joint efforts by all Government agencies including defence forces to attract qualified skilled personnel for implementation of counter measures. (c) Cyber security not to be given more lip service and the organisations dealing with the same should be given all support. No bureaucratic dominance should be permitted. (d) Agreements relating to cyber security should be given the same importance as other conventional agreements. (e) More investment in this field in terms of finance and manpower. (f) Indian agencies working after cyber security should also keep a close vigil on the developments in the IT sector of our potential adversaries. National security adviser M K Narayanan set up the National Technology Research Organization, which is also, involved in assessing cyber security threats. But the cyber security forum of the National Security Council has become defunct after the US spy incident. This has scarred the Indian establishment so badly that its now frozen in its indecision. This has seriously hampered Indias decision-making process in cyber warfare. Cyber attacks usually happen very quickly and often with great stealth. Critical war fighting operations must continue to function effectively while under cyber attack. India is yet to formulate a framework to evolve suitable response to PLA cyber warfare developments. Organisations in the pipeline. After being at the receiving end of cyber attacks from across the border for many years, India is preparing a blueprint for undertaking counter cyber warfare on unfriendly countries. According to a proposal being considered by the National Security Council, Indian agencies may be told to enhance capabilities to exploit weaknesses in the information systems of other countries and also collect online intelligence of key military activities. The proposal includes setting up laboratories in research institutions to simulate cyber attacks with the help of ethical hackers. These laboratories would be used for training intelligence agencies for offensive and defensive cyber warfare techniques. Personnel working in this area may be given legal immunity for carrying out these activities. The blueprint is likely to be put into action by the National Technical Research Organisation, the Defence Intelligence Agency and the Defence Research and Development Organisation. The plan also talks about setting up early-warning capabilities about impending attacks on the countrys information systems and developing expertise in cyber forensics, which includes tools that focus on acquiring information from attacked systems to find out sources of attacks. The Government is looking at setting up a National Testing Facility that will certify all imported software and hardware procured for key information systems. Security agencies are concerned about spyware or malware embedded into imported products which can be used by unfriendly countries to disrupt key sectors. The proposed testing facility will be on the lines of the Trust Technology Assessment Programme in the US. In order to secure key areas such as banking, Defence, the Railways, civil aviation, atomic energy and oil and gas, it is being proposed to set up a Computer Emergency Response Team for each of these sectors. Privileged information suggests the Indian government could seriously consider creating the position of a cyber security czar whose mandate would be to fundamentally overhaul cyber security and bring the currently fragmented networks under a clearly defined structure. The overhaul will demand a whole new approach outside the bureaucratic confines considering that it necessarily requires tapping the cyber security community constituted by young professionals in their 20s and 30s. Since this community is used to working in a highly non-hierarchical environment with a great deal of personal freedom the government will have to use the office of the cyber security czar as its interface with the young professionals. Threats Faced by Indian Cyberspace. Although cyber security had already been coming under government focus for some time now, a 10-month-long investigation by the University of Torontos Munk Centre for International Studies, Canadian security firm SecDev Group and US-based cyber sleuthing organisation Shadow server Foundation has added extra urgency to the task. The investigators have issued a report titled Shadows in the Cloud: An investigation into cyber espionage 2.0 which highlights how Indias defence establishment was seriously penetrated by cyber attackers based in Chengdu, the capital of Sichuan province in southwest China. The report exposes widespread penetration of computer systems at the National Security Council Secretariat, which is part of the Prime Ministers Office, Indian diplomatic missions in Kabul, Moscow, Dubai and Abuja, Military Engineer Services, Military Educational Institutions, the Institute of Defence Studies and Analyses, the National Maritime Foundation and some corporations. It is hard to quantify the damage the information obtained by the hackers can cause, but it could be potentially significant. The report has served to highlight serious flaws and vulnerabilities in Indias official information networks. Those who know how the systems work point to a lack of discipline in even seemingly trivial details such as senior government officials in sensitive positions still using email addresses on Yahoo, Hotmail and Gmail. They say inasmuch as no email system can be made foolproof, these free accounts are even less so. Even the use of social networking sites such as Facebook and Twitter are known to be prone to systematic attacks. Apart from the inherent interest in Indias defence and other establishments because of its rise as a major power, there is also another reason why the country has emerged as an important target. Its position as home to large IT companies which are in turn repositories of vast global information also makes India particularly attractive to hackers. In a sense hacking India could lead to a great deal of diverse economic, financial, health and other forms of valuable intelligence. One of the primary mandates of any future cyber security czar would be to create a multi-layered security system around its national assets in a manner that no single successful penetration would yield a treasure trove of information in one place. The cyber security czar could also be mandated to lay down standards and code of conduct for those in the government handling data of certain sensitive nature. Informed sources say the czar would report to the National Security Advisor and would often end up operating outside the traditional command and control structure of the Indian bureaucracy because of the kind of monitoring the office would be expected to do. One specific approach that the Indian government might have to consider adopting relates to what in industry parlance are known as defensive and offensive hackers. While the formers job would be to ensure strong defences against all attacks, that of the latter would be to actively be part of hackers worldwide who perform the role of flooding malware or malicious software codes used to infiltrate large systems. Such participation is crucial to pre-empting attacks. It is in this context that the Canadian investigation makes an interesting point. Under the section Patriotic Hacking the report says, The PRC has a vibrant hacker community that has been tied to targeted attacks in the past and has been linked through informal channels to elements of the Chinese state, although the nature and extent of the connections remain unclear. One common theme regarding attribution relating to attacks emerging from the PRC concerns variations of privateering model in which the state authorizes priva te persons to perform attacks against enemies of the state. Unlike China, which has developed a sizable community of defensive as well as offensive hackers, India has not even begun to evolve a cohesive approach to what cyber security experts regard as a decisive aspect of the information technology-driven world. Since the government cannot officially or even unofficially recruit these hackers, it will have to find creative ways to utilize their services and create enough indirect protections in the event some of them run afoul of law-enforcement agencies which may not know about their existence. This is clearly a grey area which many cyber security experts say is a necessary evil. It is conceivable that India may have to create its own version of patriotic hackers if it has to effectively thwart hacking attacks.

Friday, January 17, 2020

How can we know, if at all, that our behavior is ethical? Essay

As human beings, how do we recognize that our actions towards ourselves, our surroundings, and to others around us are ethical? For instance, a student is caught cheating on a test in school. Why is this pupil punished for what they have done, and how do they know their actions were right or wrong? Ethics, as described by Webster’s Revised Unabridged Dictionary, is the â€Å"science of human duty; a particular system of principles and rules concerting duty, whether true or false; rules of practice in respect to a single class of human actions; as, political or social ethics; medical ethics.† This means that ethics are what we, as humans consider right or wrong and are formed by the morals that each of us individually believe and abide by. We can find human ethics in the judicial law system, religion, and in our everyday society throughout the entire world population. Individuals in a civilized group follow judicial laws. These laws outline what we can and cannot do. Our leaders have created these laws parallel to the daily changes that humans experience in society. When these changes occur, they conclusively affect humans, resulting in new changes in the judicial law system as well. In such a case, many years ago it was thought that child labour was ethical because children were seen just as miniature adults who could accomplish the same workload as a grown man or woman. Today we realize that this is not the case, and view child labour as being unethical. As a result, laws have been made in order to protect children from being immersed in our labour force. We know through science of the mind and body, that child labour directly effects the psychological development of children. Children are not fully physiologically developed to work as hard nor for as long as grown adults can. In response to the increase in our knowledge of such resembling situations, judicial laws are also changed to follow the development of human ethics. When judicial laws and ethics are not followed, punishments serve to teach the prosecuted what is ethical and what is not. If you break a law such as killing another person, you will be tried and jailed on the lawful account of murder. T he majority of the punished will hopefully realize that what they have done is unethical, and that it should definitely not be done again. Humanitarian laws have been created as a practical (and peaceful) guide to daily living. Therefore, punishments are given to individuals who do not wish to abide by these guidelines in an attempt to change the way that they have acted in their past. In faith and religion, there are many different ethical laws that have been set since the beginning of the respective organization. These laws vary between religions and countries. In the Christian religion there are the Ten Commandments, which followers try to live by. These commandments set by God are the ethics on which the Christians should live. Humans decide which religion they wish to believe in, and in by doing so, they decide what ethics and actions are correct for them to follow. Though many of these ethics have been set a long time ago, we can still decide what we wish to follow, and what we wish to rule out. In the Islam faith, followers find ethics by what is written in the Quarn. Christians find their religious ethics through the Bibles. Such scriptures serve as religious guidelines, outlining how to morally live and act in certain situations. There are many different religions in the world, yet each and every one of them offer specific guidelines of morals and human ethics to teach the rights from the wrongs. If these ethics and behaviors are not followed, the individual will be punished. If you commit an action that goes so strongly against the ethical laws and behaviors set by your religion, results of punishment could be that; your family or religious group may shun you, or in an even worse case, you could be jailed for certain periods of time. The results are all determined by specific factors such as the specific religion, the country, and crime committed. There are many serious prices to pay for breaking the moral laws of human and religious ethics. Within society, there are unspoken and unwritten rules, that we see as ethical, by which every citizen and human being should abide. Along with these rules, we find moral obligation of considerations of what is right and wrong and this determines how people act. Such ethical laws are changed overtime because of the influence that certain individual’s actions have on society. In some cases, these actions can change our ethics making the formerly wrong actions eventually accepted by society. An example of this is how women’s fashion has changed over the last century. Seventy years ago it was unacceptable for women to show any skin above their ankles while wearing a dress. Today in Canada, we are able to se females who wear skirts and shorts without a second thought, making this action fully accepted by their surrounding society. Because of instances such as this, people follow society and views what it accepts as ethical. What may be ethical and acceptable in one part of the world may not be acceptable in another. This is judged on what the majority of the people do, and on what their religious and cultural beliefs are. In most professions, such as medicine and dentistry, there is a code of conduct, which practitioners must follow. This code of conduct is built on what society accepts as being ethical in that certain field. Humans must be mentally aware of society’s unwritten rules. These rules should come easily to all mentally stable humans, for they are based on the way individuals are raised and the morals that result from proper parental nourishment. Not following the ethics and behaving in a manner which society deems wrong can punish an individual through public or social groups. In professions where there is a code of conduct and it is broken, you could be finned or suspended from that profession. As well, your family and friends could lose your trust or respect and your image and reputation could be damaged. In the world around us there are three major parts of ethics; judicial law, religion, and the mass of moral, unwritten in our surrounding society. In each, ethical laws determine whether individual actions and behaviors are right or wrong, and outline certain punishments for breaking the ‘rules’. These punishments are given according to the severity of the crime, and religious and social, religious, and cultural belies. We base our ethics on the norms around us and how others and we ourselves act. Therefore we, as individuals, are in fact the ones who decide what actions and behaviors are ethical, morally determining our own providence.

Thursday, January 9, 2020

Online Advertising And The Internet - 2471 Words

The internet has made everything simple especially in business. The world has changed to become a global village where all people can access. They do that to check on what is new in the market or the current trends. Marketers and advertisers have seen an opportunity in the fact that people are always on the internet. They market their products on the internet by posting them on different websites for people to be able to see them. That type of advertising that takes place on the internet is referred to as online marketing or online advertising or internet advertising. It included email marketing, social media marketing, display advertising, search engine marketing (SEM), and mobile advertising. This type of marketing involves a publisher who posts the advertisement, with the permission of the owner of the website to post an advert for the viewers of the website to see. It occurs at a certain fee. Marketers have mastered the most commonly used websites, like the social media websites where they post their advertisement for the millions of people in social media to see them. They usually appear in the screen making it inevitable for a person to view it (Webb, 2007). Online advertisements have been made possible with the help of online advertising agencies. These are agencies that have specialized in online marketing. They know the product to place on a certain website because not all advertisements will go in every website. Each website will have advertisements that areShow MoreRelatedWhy Are Print Advertising Obsolete? Essay1290 Words   |  6 PagesWhy is print advertising obsolete? Nowadays, people get so many different types of advertisement such as a print advertisement, TV, and the Internet from companies. A few examples of print advertising are newspapers, magazines, or the Yellow Pages. Print advertising used to be the best choice for advertising products because it helps customers understand the products clearly and then they share it to others. However , with the development of Internet, print advertising has not had a massive impactRead MoreRelated Local and Foreign Literature and study1400 Words   |  6 PagesStar dated August 7, 2012 by Louella D. Desiderio entitled â€Å"Businesses urged to use Internet to push products†. It shows that businesses are advised to use the Internet for promoting their products and services as more consumers are going online to research before making purchases. Companies should consider using online advertisements for the products and services they offer as more and more people are using the Internet to research goods they plan to buy before making the purchase. It also states thatRead MoreOnline Advertising Methods For Advertising1719 Words   |  7 Pages Online Advertising Methods Background Every day, marketing professional come up with new ways in which they can market their products to consumers successfully. Marketing of products has significantly changed following the invention of the internet. The enormous popularity of the internet in the past decade has opened doors for marketers in a manner that one could not have imagined twenty years ago. Marketers utilize the internet for the purpose of advertising products in a great way than otherRead MoreEssay on Advertising for Online Businesses1478 Words   |  6 PagesAdvertising for Online Businesses The internet is a huge business and its constant and significant growth attracts more and more businesses to be online. In 2004, online sales reached $117 billion (www.comscore.com with more than 812 million internet users (www.internetworldstats.com/stats.htm). All these internet users are potential customers and it is essential to exploit such an opportunity. However promotion is crucial, not only to increase traffic. A basic Read MorePrivacy Issues Under Targeting Advertising1209 Words   |  5 PagesUnder Targeted Advertising Advertising has always been an important part of our society. The history of advertising can be traced to pre-modern history when it served an important purpose by allowing sellers to effectively compete with other merchants for the attention of clients in Ancient Egypt. From 1704 when the first newspaper advertisement was announced, it gradually grows into a major force in American society based primarily on newspapers and magazines (Ad Age Advertising Century, 1999)Read MoreImpact Of Marketing On Internet + Era Essay1337 Words   |  6 Pagesmarketing ways in Internet + era, the discussion of tourism promotion strategies on social network and the innovation form of Internet + tourism, in the end, it is conclusion. About the first part, it will introduce the characteristics of the Internet + times, the rise of social networks, as well as the impact of both on the new means of marketing. The internet + times have three characteristics: First, it is cross-border integration. (é »â€žÃ¦ ¥Å¡Ã¦â€" °et al.,2015:6),they believe that internet +plan’ s externalRead MoreThe Advantages Of Online Advertising1312 Words   |  6 Pages3.1 Advantages of Online Advertisement Better Targeting Targeting campaigns to a specific audience utilizing zip code, city, age or demographics ensures campaigns only reach highly qualified recipients. (Heindl, 2008) Achieve Specific Campaign Goals Online advertising enable advertisers to achieve specific campaign goals more strategically than traditional media. Advertisers can weigh creative by best performing, limit daily impressions through frequency caps and have better reach control byRead MoreE Marketing vs Traditional Marketing in the Middle East1427 Words   |  6 Pagesforms on internet based media. There was never clear method, to clearly identify the future expectations of the internet marketing. E-marketing has grown rapidly in the past decade, many companies have This paper will discuss the growth of e-marketing in the Middle East in contrast to traditional marketing. E-marketing is a relatively new form of marketing (also referred to as online advertising), includes mass email advertising, banners on websites, banners on searching engines, advertising duringRead MoreBrief Literature Review on Online Advetising884 Words   |  4 PagesOnline advertising Peter J. Danaher and Guy W. Mullarkey have published their research article entitled â€Å"Factors Affecting Online Advertising Recall : A Study of Students†. In this research article we examine factors that might impact on web advertising recall and recognition. These factors include the viewing mode, duration of page viewing, and web page context factors, including text and page background complexity and the style of the banner advertisement. Via an experimental design Peter JRead MoreInternet Marketing Relevance and Consumer Attitudes toward Internet Advertising1245 Words   |  5 Pagesdiscusses internet marketing relevance and investigates antecedents of consumer attitudes toward Internet Advertisement. The analysis is based on a consumer survey conducted in India as well as other countries. For this purpose, a representative quota sample of Internet users in India has been interviewed. The finding of this study provides marketers with an understanding of consumers, th eir attitude toward advertising, so designers and marketers can better strategize their advertising designs. Internet

Wednesday, January 1, 2020

Feminism; the Awakening - 868 Words

The Emergence of Feminism In the 19th century women were supposed live by concept of Republican Motherhood. Republican Motherhood is the idea that American women had a few main roles, to stay in their homes, to train their children to be good American citizens and to follow the demands of their husbands. This reinforced the idea of that a domestic womens life should be separate from the public world of men. Feminism is a collection of movements aimed at defining, establishing, and defending equal political, economic, and social rights for women. Feminism in 1900s pursued many freedoms that were considered scandalous before the turn of the century, and still today many believe woman should hold the classic stay at home mother role. When†¦show more content†¦Ednas relationships with Robert and Alcee show the reader of Ednas sexual awakening. Becoming aware of her desire to be sexually aroused is just part of Ednas awakening. Edna met Robert as she was at a vacation resort with her family. They immediat ely had an attraction for one another, making Robert decide to focus his attention mostly on Edna, as he usually does with one particular woman every summer: Since the age of fifteen...Robert each summer at Grand Isle had constituted himself the devoted attendant of some fair dame or damsel. (Chopin, 11) As the story progresses, the attraction Edna has for Robert becomes more and more intense. Their attraction continues Robert leaves to go to Mexico just as we come to find out they have fallen in love. Edna starts an affair with Alcee after her true love is gone. This further proves the feminist movement of sexual independence, and not having to be completely committed to one man. Most 19th century women lived by concept of Republican Motherhood, but some began to support feminist ideals that would become popular as the 20th century appears. Edna Pontellier in The Awakening by Kate Chopin is an example of a feminist woman. With her pursuing her own dreams, being able to stand up for herself and having sexual independence Edna is a strong woman ahead of herShow MoreRelatedFeminism In The Awakening1562 Words   |  7 Pagesissue of feminism, it is a sensitive topic that must be inclusive of all genders. The modern term of ‘feminism’ is defined as giving both men and women the same rights and privileges as each other. Basic human rights would give others the notion that this is how all humans should have been treated from the beginning. However, this is far from the truth. Books like The Awakening, give us an inside look at how women were treated around 100 years ago. When Kate Chopin wrote The Awakening, she createdRead MoreFeminism In The Awakeni ng1329 Words   |  6 PagesThough it was not common during the 1800’s, some women did not want to assume the traditional role of a typical Victorian lady. In Kate Chopin s The Awakening, this is just the case; she introduces us to Edna Pontellier a mother and wife during the said era. Throughout the story, we follow Edna s journey of self-discovery and self-expression through emotions, art, and sex thanks to the help of people she meets along the way. Chopin decides to end the book with Edna’s suicide to try to convey aRead MoreFeminism In The Awakening1193 Words   |  5 PagesTHE AWAKENING LAP TOPIC #3- EXPLORE HOW EACH MAN IN EDNA’S LIFE ATTEMPTED TO CONTROL AND/OR REPRESS HER EXISTENCE.. NICHOLE NARINEBRIJBASI In the time era of the 1800s, women were regarded as the weaker sex to society. Gender equality wasn’t the focal point of society as yet, leading to the oppressive mindsets of women. Men were viewed as â€Å"superior† because of their masculinity and righteousness that society had implanted into our view of socialRead MoreFeminism In The Awakening1506 Words   |  7 PagesThe Awakening LAP Topic 1 By: Lourdes Rivera AP Literature Mr. Amoroso Rivera 1 Courageous, brave, and valiant are all characteristics that are necessary for one to possess in order to be heroic. The actions an individual takes dictates the kind of person they are and the actions of a hero reflect these characteristics. If the world is against a group of people, it takes a heroic person to break away from the oppression set to hold them down. Women have faced tremendous oppression from the ideologyRead MoreFeminism In The Awakening2069 Words   |  9 PagesThough it was uncommon during the 1800’s, some women didn’t want to assume the traditional role of a typical Victorian lady. Such is the case in Kate Chopin s The Awakening; she introduces us to Edna Pontellier a mother and wife during the said era. Throughout the story, we follow Edna s journey of self-discovery and self-expression through emotions, art, and sex thanks to the help of people she meets along the way. Chopin decides to end the book with Edna’s suicide in an attempt to convey a senseRead MoreThe Awakening Feminism Essay1689 Words   |  7 PagesComing into the nineteenth century, women were looked at as feminist. â€Å"Feminism,† as we know the term today, was nonexistent in nineteenth-century America (Cruea 187). Feminist describes as someone embracing the beliefs that all people are entitled to freedom and liberty within reason. Gender, sexu al orientations, skin color, ethnicity, religion, culture or lifestyle should not be considered as a form of discrimination. Women roles, in the nineteenth century, were to take care of the cooking, cleaningRead MoreThe Awakening Feminism Essay1262 Words   |  6 PagesAfter reading The Awakening, by Kate Chopin, I believe the text is feminist. Whether Kate Chopin was deliberately writing for early feminists or not, the book has many early feminist ideas and it is shown through the main characters awakening by being eccentric. The author uses Edna Pontellier as an anti-conventional woman, breaking societal laws that govern her life, in search for individuality in a society that represses her. From a reader’s perspective in the early 1900’s, Edna would be a mentallyRead MoreEssay about Feminism in The Awakening986 Words   |  4 PagesIn the novel The Awakening, by Kate Chopin the critical approach feminism is a major aspect of the novel. According to dictionary.refe rence.com the word feminism means, â€Å"The doctrine advocating social, political, and all other rights of women equal to those of men.† The Awakening takes place during the late eighteen hundreds to early nineteen hundreds, in New Orleans. The novel is about Edna Pontellier and her family on a summer vacation. Edna, who is a wife and mother, is inferior to her husbandRead MoreThe Rise Of Feminism In The Awakening By Kate Chopin711 Words   |  3 PagesFeminism is the liberation of women and their rights as human beings. The feminism that we see today started in 1960s, but the issue began way before the 1960s. In the 1890s, Kate Chopin wrote a novella called The Awakening to tell the story of the rise of feminism within a character named Edna. In The Awakening, Kate Chopin creates feminism before it’s time by using Edna’s attitude toward her lovers, the freeness of the scenery, and her motherly attitude. These traits that Edna possesses are extremelyRead More Analysis Of Proto-Feminism In The Awakening By Kate Chopin838 Words   |  4 PagesProto-Feminism is defined as a philosophical idea in which feminism existed in a time period it was expected to be unknown. Before the 20th century, women’s liberation was not a familiar concept to society, however a great variety of literature from this time period displayed how women defended themselves for the independence and freedom they lacked. Along with the many novels written in this time period, The Awakening written by Kate Chopin in 1899 justifies this philosophy. Edna Pontellier, the