Tuesday, January 28, 2020
Online Course for Phishing
Online Course for Phishing Ahmed Hassan Al-Asmari Applied Phishing PROJECT in TI-ANS-ANS-TTC The report aims to provide an online course for Social engineering (phishing) for TTC students. The proposed course is designed based on the approach of research based learning. Proposed design of the circuit is supported by the theory. The report aims to provide an online course for ICT department. The expected result is to provide a new learning course for security information Provide a new content, types, problems, solutions and how to informed about phishing technology. What is phishing? Its technique used to steal personal information through spamming, fake websites, unofficial applications or other deceptive means, thats means someone create a website which resembles original website 100% and the website which created asked for specific data such as request information entry or data update or add credit card and so on. So, this way is start by sending a message which similar to the message the original company and the content of message request to entry the link to update data, sometimes the link malicious files which help phishersto control device and steal data. To avoid Internet phishing, people should have knowledge of different types of phishing techniques and they must also be conscious of anti-phishing techniques to defend themselves from getting phished[1]. 2.1. Phishing Techniques 2.1.1. Email / Spam Phishing by using email or spam are most common phishing scam. Phishers can send the similar email to millions of users, requesting them to loading personal data. The information which are steal will used for unlawful ways. Most of the message have a note which ask users to enter the personal information to update and verify accounts. Sometime, phishers asked you to fill a form to access to a new services(Figure1)[2]. 2.1.2. Instant Messaging Instant messaging is one of the phishing ways which used by sending a message provide a link that direct user to fake website, thats website are similar to the original website. So, If user dont check the URL of this link, then he will fall on the phisherhand, sometimes its going to be hard to find out the different between the original and fake URL. Then, link contain form which phisher asked to fill(Figure2[3])[1]. Ã Ã 2.1.3. Link Manipulation link manipulation is one methods that phisher use in websites by sending a link and when user click the link it will start to direct user to the phisher website instead website which in the link. The way to prevent link manipulation is to put the indicator of mouse over the link to check the real link(Figure3[4])[1]. 2.1.4. System Reconfiguration Phishers may send a message that asked the user to change the settings of the computer. The message might arrive from a web address which comparable an official source. For example: URL can be modified by phishers to direct victim to a fake websites. For example: a URL website of a FACEBOOK may modified from www.facebook.com to www.facebo0k.com[1]. 2.1.5. Phishing through Search Engines This is one of phishing scams and that by using search engines which direct the user advertisement sites which may present low price products or services. So, when the user select some of these offers and begin to put data of the credit card, then its collected by the phishing site(Figure4[5])[6]. 2.1.6. Phone Phishing The phisher may also used phone by making calls to random users and request them personal details about bank account or any others information and the phishing caller may be automated response. They may be friendly with you, start calling you by your first name and asking you about your family. They may act working in a company you trust and asking to update your accounts or asking for credit card. So, we see that kind of phisher have a little information about you before the call and after the call, they may get all the data they want to complete steal whole data. 2.1.7. Malware Phishing Phishing scams malware its one of the technique need to be run on the users PCs. The malware is typically linked to the email sent to the user by the phishers. Once you get on the link, the malware will begin to publishing and causes damages inside PC. Sometimes, the malware attached to downloadable files. phishing was spread around the year 1995, but they was not known to people until few years. So, this is negative point for people who does not take a careful and about the phishers because they maybe make a serious problems in one day. So, it is helpful to have a basic understanding of the behind them[7]. Most of the phishing scam are successful and that because people dont know about scam methods which phishers use it. So, there are several ways to avoid to be a victim. We can get the idea about those list which may help to prevent phishers to steal your information and be aware about the following list: Keep Informed about social engineering techniques specially phishing techniques so that will help you to have an information about the methods scams that phishers use it and you know the ways to prevent all scams. Install an Anti-Phishing. So, a lot of popular Internet browsers can be Associated with anti-phishing toolbars. So, this is a common way to prevent the phishing through search engines or websites, anti-phishing toolbar can alert you from fake websites by blocking it. Such as AdBlock. Verify a sites security: its important that websites you visit are security and free from fake advertisement and illegal products. So, keep informed about the websites URL which should have to begin with https. Also, you should see an icon lock close to the address URL. Also verify the certificate of websites security. Verify your online accounts periodically as long as you dont visit your online account for a long time, verify each of your online accounts periodically and changing your passwords regularly too. Its good that each of your accounts has different password. Use best firewalls: you can use two option kinds: a desktop firewall and this is a software type install in your device, second is a network firewall this is a type of hardware which are in a routers or switches. Never Give Out Personal Information. Use Antivirus Software. Use an Alert Password from Google to alert you from phishing. We see here in this figure5 the cycle of phishers witch they move with each steps when they target personals or companies. figure below will explain this cycle more(Figure5[8])[9]: What do you think about your passwords. Do you use just one or simple to figure out variations on just one? If you do both, you shouldnt, because youre making it easy for a phishers to get access to your personal information. Every password for every site or different accounts should be different. Letters numbers and characters work best to keep password difficult and hard to get. Change them repeatedly. The special programs for internet security and system of device can help you to keep follow of your passwords. Because Google are the famous company and has too many users, Its important to set high level of security to protect users information. So, from the phishing side, Google has created a new tool which can secure users data from phishing. The main idea of this tool is to alert user when the password of account are entered in other original google.com. So, if user receive a message in e-mail and this mail are look like original webpage of Google and with a link asked you to change or update your password account. Then you click the link and start to direct you to another website and stealing your personal data. So, this tool from Google will alert you when personal data are entered in other Google account and trying to follow and show the suspicious signup page and alert you before you enter your personal data and password(Figurs6[10])[11]. There are several target in a phishing: the end users, businesses, the computer compromised to host fraudulent sites and the ISP hosting the email address. So, phishing want to get the important information from those to get all permission to control[12]. I think about the most common type of phishing technique are used is E-mail phishing so far. I chose that type because I see that in every news, TV, websites and social media. The last attacks which happen in Saudi Arabia in Jan 2017 by the virus which called SHAMOON by Green Big groups. This virus targeted most popular company in Saudi Arabia like ARAMCO and Communications and Information Technology. The virus was working for several attacks like send an E-mail to the employs of the ARAMCO company which include the malicious link and the message is similar to original messages of the company. Then, some of the employs are failed in this E-mails and the viruses are distribution and made a huge damage like stole information and delete all the data stored on the computers. So, I chose this type which is most common because of this story happened in 2017 and there is no way to stop it until we make a strengthen the defense of this attacks before happening[13]. Alic and Bob are the names used in scenario security characters. This names are chosen based on the letters of the alphabet (A)lic and (B)ob. Discoverer of this theory put names of people to make it easier to understand and study. If we suppose that Alic are sending a private messages to Bob by postal mail. Alic knew that postman are reading the message she sends. She thinking to find a way to send a message without anybody read it. So, Alic buys a lockbox and two keys (Encryption Decryption) to open it and meet Bob to give one of this keys. Alic put the message inside this lockbox. The postman cannot read the message or open it or looking through the lockbox. So, after the message delivered to Bob, he can use the key to open the lockbox and read the message. So. Bob as well can use the same method to send a message to Alic and they are sure about the security message exchange and this is called a symmetric key encryption. Lets keep continuo with Alic and Bob. Now, Bob buy a new padlock which is open and put it with the message in the lockbox and keep the key of the padlock with him. Alic receive the lockbox and buy a similar padlock which Bob sent it with the message, and puts her message and the new key of her new padlock in the lockbox. Then. she locks it with the Bobs padlock and send it to Bob. Now Bob can read the message and get the key of the padlock Alics. So, Alic and Bob can exchange messages as they want safety. If we suppose that Alic are person (A) and Bon are person (B). A want to send a private message to B but person A discover that some person who is trudy are reading the private message when send it to B. So, A thinking about some method to encryption the message when send by add a code with so that message cant opening and read until insert that code. Then, A send a message after give the code to B to decryption the message so he can read it and no one than A and B can decrypt the message because they have the same keys to encrypt and decrypt it. This method called encryption and decryption and the keys are called Symmetric-Key Encryption. Lets suppose that we have two persons Mohammed and Abdullah want to exchange encrypted messages so that no one can see it. Mohammed comes through a particular program (browser in case SSL) and produces two keys associated with each others one public key and the second are the private key. Mohammed then sends the public key to Abdullah by any method. Abdullah uses this key and encrypts the message that he has by the public key who sent by Muhammad public key. And then sends the encrypted message to Muhammad. Mohammed then decrypts the message code via the private key which is with him and associated with the public key. So, Muhammad can encrypt a message with the private key and Abdullah decrypts the message through the public key. [1]Phishing Techniques | Phishing.org. [Online]. Available: http://www.phishing.org/phishing-techniques/. [Accessed: 25-Oct-2016]. [2]The Online Service Message Email Is A Google Account Phishing Scam., Facebook Tips, 06-Jun-2011. . [3]My Computer: Text message phishing scam, My Computer. . [4]Watch Out For Facebook Phishing Scams | Simple Industries, Inc. [Online]. Available: http://www.simpleindustries.com/2010/10/tech/watch-out-for-facebook-phishing-scams.html. [Accessed: 20-Feb-2017]. [5]Ads on popular Search Engine are leading to Phishing Sites. [Online]. Available: https://www.govcert.admin.ch/blog/16/ads-on-popular-search-engine-are-leading-to-phishing-sites. [Accessed: 20-Feb-2017]. [6]Ads on popular Search Engine are leading to Phishing Sites. [Online]. Available: https://www.govcert.admin.ch/blog/16/ads-on-popular-search-engine-are-leading-to-phishing-sites. [Accessed: 28-Oct-2016]. [7]History of Phishing | Phishing.org. [Online]. Available: http://www.phishing.org/history-of-phishing/. [Accessed: 25-Oct-2016]. [8]L. Meleney, Dyre Malware Has Stolen Over $1 Billion: Is Your Companys Sensitive Data at Risk? [Online]. Available: http://blog.baymcp.com/blog/dyre-malware-has-stolen-over-1-billion-is-your-companys-sensitive-data-at-risk. [Accessed: 20-Feb-2017]. [9]Dyre Malware Has Stolen Over $1 Billion: Is Your Companys Sensitive Data at Risk? [Online]. Available: http://blog.baymcp.com/blog/dyre-malware-has-stolen-over-1-billion-is-your-companys-sensitive-data-at-risk. [Accessed: 28-Oct-2016]. [10]Phishing prevention with Password Alert FAQ G Suite Administrator Help. [Online]. Available: https://support.google.com/a/answer/6197508?hl=en. [Accessed: 20-Feb-2017]. [11]Password Alert. [Online]. Available: https://chrome.google.com/webstore/detail/password-alert/noondiphcddnnabmjcihcjfbhfklnnep. [Accessed: 28-Jan-2017]. [12]R. D. Vines, Phishing: Cutting the Identity Theft Line. John Wiley Sons, 2005. [13]Saudi Arabia warns on cyber defense as Shamoon resurfaces | Reuters. [Online]. Available: http://www.reuters.com/article/us-saudi-cyber-idUSKBN1571ZR. [Accessed: 11-Feb-2017]. [14]What Is SSL (Secure Sockets Layer)? | DigiCert.com. [Online]. Available: https://www.digicert.com/ssl.htm. [Accessed: 12-Feb-2017]. [15]HTTP to HTTPS | What is a HTTPS Certificate. [Online]. Available: https://www.instantssl.com/ssl-certificate-products/https.html. [Accessed: 12-Feb-2017]. ACADEMIC HONESTY DECLARATION I, the undersigned, declare that the attached assignment/project is wholly my own work, and that no part of it has been: copied by manual or electronic means from any work produced by any other person(s), present or past, produced by several students working together as a team (this includes one person who provides any portion of an assignment to another student or students), produced by automatic tools or aids modified to contain falsified program output, or copied from any other source including web sites, except as directly authorized by the instructor. I understand that penalties for submitting work which is not wholly my own, or distributing my work to other students, may result in penalties. Full name: Student Number: ___________________ Signature
Monday, January 20, 2020
The Style of Writing :: Writing Styles Style Essays
The Style of Writing According to the Websterââ¬â¢s New World Dictionary, the definition of style is ââ¬Å"a characteristic manner of expressionâ⬠(612). Usually words such as personal, individual, and unique also come to mind when we think of writing style. I have always associated writing style with belonging uniquely to one individual, meaning that everyone had his or her own style. After reading, ââ¬Å"Style Toward Clarity and Graceâ⬠by Joseph Williams and ââ¬Å"The Elements of Styleâ⬠by William Strunk and E.B. White, I realized that style is not as unique as I thought. In fact, as I stated in my blog space, ââ¬Å"writing has certain rules and elements that must be incorporated in to our writing in order to make our points clear to those we want to read it. Since these elements and rules are common to all writing, then style and good writing bring forth new meanings.â⬠Strunk and White start their style guide off by reminding us of the rules of word order and punctuation. Rules that include: ââ¬Å"Enclose parenthetic expressions between commasâ⬠and ââ¬Å"The number of the subject determines the number of the verbâ⬠(2,9). These rules are not optional if you want others to understand what you are writing and your purpose for writing it. Making sure your readers understand your writing is the basic principle behind Williamsââ¬â¢ book. He takes the rules, offered by Strunk and White, and adds detailed explanations of when and how. He shows us how to incorporate this knowledge into clear and effective writing. Being clear and assuring that our readers understand the message we are trying to convey, needs to be our primary goal if we are to be considered good writers. From reading both of these style-books, I have learned that good writing, excluding creative writing, uses a more purposeful approach than a personal one. Williams supplies us with clear and simple rules, which he calls suggestions, which explain that good writing must have a purpose. Good writing is only considered this if our intended readers understand the message that we are trying to convey in our writing. This has nothing to do with personal choice or personal expression because if you chose to leave out such rules then your audience will be unable to understand your writing.
Sunday, January 12, 2020
Illuminating the Illusion Essay
Jay Chiat, and expert in the advertising field, looked at advertising differently than those in the advertising business today. He launched the Energizer Bunny and Apple commercials. Not only that, he started a new age of advertising during the Super Bowl. Chiat was an amazing advertiser; however, he reached a point in 1997 where he desired to leave the marketing industry. He no longer agreed with the ideals of the advertising world. In Chiatââ¬â¢s essay, ââ¬Å"Illusions are Forever,â⬠he uncovers the true ideals of the marketing industry. His essay discusses how the lies in advertising ââ¬Å"lie in the situations, values, beliefs, and cultural norms used to sell a message.â⬠(212) Through this essay, Chiat uses strong, vivacious words to create an image of the true face of advertising. In the same manner, he includes examples and descriptions that embellish that image and grab the attention of the reader. Amidst all of this, Chiat composes his essay in a manner that allows for a clear, insightful message to come across. Chiat is indeed bitter of advertising, but that does not affect his message. He remains conversational throughout the course of the essay. The technique that Chiat uses throughout his writing is superb, and he does an excellent job of getting his message across. Chiat uses strong, vivid word choice throughout his essay to give his readers a precise image of the schemes used by todayââ¬â¢s advertisers. Chiatââ¬â¢s words ââ¬Å"unrelentingâ⬠(213) and ââ¬Å"24-hour-a-day drumbeatâ⬠(213) allow his readers to imagine how advertisers are constantly hammering their ideas into the heads of the viewers. Words such as ââ¬Å"robs usâ⬠(213) allow Chiat to make the point that advertisers rob Americans of their view of life, replacing it instead with an ââ¬Å"illusionâ⬠. Chiat also uses ââ¬Å"seductiveâ⬠(214) to give his readers a further understanding of what advertisers are seeking. Chiat is using words such as ââ¬Å"seductiveâ⬠(214) to enlighten consumers to the idea that advertisers twist their lies in a fashion that is seemingly pleasing to the eyes but is still made up of lies. Chiatââ¬â¢s words are critical of advertisers and how they do not truly care about their consumer. Chiat, nonetheless, does not blind his reader to the essayââ¬â¢s purpose by getting lost in the emotional rhetoric. Chiatââ¬â¢s writing is filled with informative and detailed rhetorical modes that greatly add to the impact of his argument. Unlike many writers who seem to get lost in their descriptions of a topic, Chiat includes examples, definitions and descriptions while still shining light upon the advertising backdrop. One instance of this occurs when Chiat uses the example of the wedding ring from DeBaers, Chiat uses this example to help the readers visualize how the advertisers seek to infiltrate the minds of their consumers. Following this example, Chiat then defines ââ¬Å"unmediatedâ⬠(213) as ââ¬Å"without mediaâ⬠(213). Chiat defines ââ¬Å"unmediatedâ⬠(213), a word that most take lightly, in an effort to give his readers a clear understanding of the strategies used by advertisers. A few paragraphs later, Chiat proceeds to describe internet advertising. Chiat gives a clear image to his readers on how internet advertisers drag adults in with their ââ¬Å"authoritative-lookingâ⬠(213) websites. Chiatââ¬â¢s placement of these examples, definitions and descriptions is excellent. He places them in positions that not only increase the flow of the writing but also pique the interests of his readers. Adding the rhetorical modes previously mentioned is very important for writers such as Chiat because there are points in writing where the pace of the writing dies down. Chiat places these modes in marvelous positions that keep up the pace of the article as it moves along. Along with descriptive words and examples, organization of ideas is also critical when writing an essay, and Chiatââ¬â¢s layout of paragraphs is very logical, and in turn deductive, in other words, the reasoning follows the thesis. Chiat opens up his essay with a bit of background on advertising in order to strengthen the thesis that follows. His thesis is clear and to the point. Because his thesis is mentioned in the beginning of the essay, and the reasoning behind his essay follows in each of the body paragraphs, Chiatââ¬â¢s essay follows this deductive style. Chiat then uses this combination to capture the readerââ¬â¢s attention and make them want to read more with each following paragraph. Chiat pulls the reader along not only with his strong words but also by arranging his ideas in a fashion that allows for a constant pace. In the same manner, each of the points that Chiat makes relates back to the thesis. The readers are not led up to anà apparent climax only to find another exposition; Chiatââ¬â¢s points are clear and flow beautifully. He includes good transitions that allow the writing to have the feel of a constant flow and not have abrupt stops in the middle of the writing where a change in direction occurs. Chiat has a great understanding of how to organize his thoughts, and he demonstrates that in his writing. Besides simply writing in a way that is pleasing to the eyes, Chiat also keeps a good tone throughout the course of the writing. This allows him to keep his readers from turning to other writings. The tone throughout his essay is bitter, but Chiat remains conversational at the same time. The descriptions of the different advertisers are definitely negative; Chiat makes it clear that he does not agree with advertisers. In the concluding paragraph of his essay, Chiat challenges us to find our own personal truth rather than the apparitional truth presented to us by advertisers. In a similar manner, Chiat says in his final paragraph that people should ignore the vision of life offered by advertisers. Amidst all of this negativity, Chiatââ¬â¢s writing maintains a conversational feel. Chiat involves his readers directly by asking them questions, having them imagine images, etcâ⬠¦ Chiat may have held a bitter tone over the course of the essay, and though in many cases writers using a bitter tone in their writing drive away their readers with their immense negativity, Chiat does not overpower his readers with his negative thoughts and descriptions. In fact, Chiatââ¬â¢s calm yet bitter tone allows his readers to better embrace his feelings. Chiat uses strong word choice and rhetorical modes, clear organization, and an inviting tone to strengthen his essay on the schemes behind advertising. These different components throughout his essay enable his readers to gain a broad understanding of Chiatââ¬â¢s different poins and the lies surrounding them every day. Chiat uses his great understanding of these different devices to uphold a steady pace and a smooth flow. Chiatââ¬â¢s ââ¬Å"Illusions are Foreverâ⬠is a well spoken essay. It captures the interests of its readers, it is very informative, and it is a very relaxed read for a negative view of advertising.
Friday, January 3, 2020
Why Voting Is Important For Public Policy - 853 Words
Voting is very essential and one of the easiest methods to influence public policy. You just need to be registered, and go to a polling station. It is simple because the government encourages people to vote, to hear a broad range of opinions. It is a form of direct democracy because when you vote, it directly affects the side or issue you support. Your vote is one more supporting opinion for a candidate or issue that is counted. Some people may think that their vote wonââ¬â¢t make a big difference, but if you look at it from another perspective it can impact smaller and local issues. Although voting is imperative because you are given this privilege at the age of 18, it is not the end of oneââ¬â¢s ability to influence government, but rather the beginning. Public policy is a system of laws that the government created for the citizens in order to maintain order. Public policy should be fair for all the citizens, however, on many occasions it is hard to accommodate for all races a nd social classes such as lower, middle, and upper class. An example of an effective method to utilize that influences public policy is civil disobedience. Letââ¬â¢s use the policy that imposed high taxation on tobacco and alcohol to demonstrate oneââ¬â¢s ability to impact the government. First and foremost the policy is beneficial for the government because it generates revenue that is earned from the products, however the consequence is that it encourages illegal activity. ThereShow MoreRelatedTo What Extent Is Voting Behaviour a Rational and Issue Based Activity in Trinidad.1469 Words à |à 6 PagesPolitics of the Caribbean Question: To what extent is voting behaviour a rational and issue based activity in Trinidad. Answer: INTRODUCTION: The study of Voting Behaviour is of fundamental importance to students of Politics. This is due to the fact that it is: a) The most widespread and quantifiable form of political behaviour. b) A rich source of information about the interaction between individuals, society and Politics. c) An important lesson about the nature of the political system andRead MoreIs Time We Stopped Pretending?923 Words à |à 4 Pagesthe best economic policy is. The average voter does not, and should not be expected to, have an understanding of economics which allows them to pick an economic model at the polls. Despite this, people think that their opinion on the economy should help decide their vote. In fact, voting patterns are almost independent of economic policy: the only contributing factor is whether the policy is interpreted as left wing or right wing (Carreirao 78). What people actually base their voting decisions on hasRead MoreU.S. Voter Participation Essay1744 Words à |à 7 Pagesdemocratic institutions. However, there is room for legitimate disagreement about the health of our democracy, in regards to the extent of civic participation. This raises the important question of how much participation there actually is in the United States. How many Americans take part in activities such as voting, attending political meetings, joining political parties, or even discussing politics with their neighbors? The answer is surprisingly few for a country that prides itself on democracyRead MoreVoting in National Elections Should be Compulsory Not Optional871 Words à |à 4 Pagesvoiced, yet now we have that right, voting does not seem so significant. Before deciding whether voting should be compulsory or optional, understanding what exactly is meant by the term ââ¬Ëcompulsory votingââ¬â¢ is essential. It is also important to educate the general public more about politics so they can make an informed decision if and when they do choose to vote. Finally, there should be a comparison with other countries which currently enforce compulsory voting to better understand how it would workRead MoreMake Your VOTE Count665 Words à |à 3 Pages The Freedictionary.com defines Voting as, ââ¬Å"To express ones preference for a candidate or for a proposed resolution of an issue; cast a vote.â⬠The Voting Rights Act was signed by President Lyndon Johnson on August 6, 1965. This was closely followed by the 15th Amendment of the American constitution, which applied a nationwide prohibition against the denial or abridgment of the right to vote on the literacy tests on a nationwide basis. The voting rights of 1965 ruled out many discriminatory actsRead MoreThe Election Of The Presidential Election Essay1493 Words à |à 6 PagesI saw people meeting to discuss the importance of voting, politically affiliated clubs holding forums to discuss the best strategies to influence voters, and the Student Government Association providing free shuttle rides that took students to the voting stations. This is why claims about the disengagement of young people baffle me. Many people, especially the older generation, argue that Millennials a re disengaged in political activity and voting (Dalton 54). This claim is false because MillennialsRead MoreNews Media And Voting Preferences Essay1391 Words à |à 6 PagesThe news media plays an important role in society. It sets the stage for political news, manages sources, and controls the information. It functions as a window to the outside world, and possesses the ability to shape public knowledge, attitudes, and voting behavior. The relationship between news media and voting preferences has become a hot topic in recent years worldwide. This paper will focus on the social and social-psychological aspects of media influence on the voting preferences of the UnitedRead MoreCivil Liberties And Civil Rights960 Words à |à 4 Pagesview of freedoms has been a continuous struggle throughout the readings. Although many members of Americaââ¬â¢s youth believe that their participation in politics is aimless, public opinion and voting are very important aspects of shaping the govern ment. Without certain civil rights being granted by the government, these important rights of expression and suffrage would not exist. There is a difference between civil liberties and civil rights in relation to the government. Civil liberties refer to anRead MoreDemocracy : A Perfect Democracy1398 Words à |à 6 Pagesa specific ideology and elements specific to the organization. But, voting along party lines in the US congress diminishes democracy because it does not allow for voters to express their individual opinions to the fullest, and it ultimately does not give the best representation of the public opinion because most people to do not have beliefs that perfectly align with just one party. In order to understand how party line voting in the US congress diminishes democracy, it is first necessary to understandRead MoreThe Extent to Which Voting by Ethnic Minorities Reflects the Voting Behaviour of the Whole Electorate683 Words à |à 3 PagesThe Extent to Which Voting by Ethnic Minorities Reflects the Voting Behaviour of the Whole Electorate In present day there are currently 12 ethnic minority MPââ¬â¢s in parliament, all of who belong to the Labour party. Ethnic minority groups tend to be part of the immigrant population and so are more likely to belong to the working class and so have a stronger party identification with labour. This can be shown in the 1997 general election in which 70% of Asian voters and 86%
Subscribe to:
Posts (Atom)