Monday, January 27, 2020

Ulysses program in price water house coopers

Ulysses program in price water house coopers The Ulysses Program is a leadership development program that is partnering with PricewaterhouseCoopers to enhance leadership potentials. The incorporation of Ulysses to PwC has lead to emergence of a diversified team in the global field (PricewaterhouseCoopers, 2000). There are several competitive challenges that motivated PwC in developing the Ulysses Program: Q1 PricewaterhouseCoopers (PwC) and other partners saw a need to initiate a new design in the leadership training that could help in bringing up executives, who would fit in the global diversity and transnational nature of the operations of the firm in late 90s (Storey 2003). The firm needed to orient people to become leaders who had a wider scoop in the leadership skills that did not only fit a particular situation but rather could handle any arising challenge across the globe. The quench to conform to this situation led to the emergence of the Ulysses Program which was perceived to incorporate most of the best traits that were needed in the partnering PwC, to bring out developmental leadership links to various communities. Ulysses was meant to instill concepts of leadership qualities among personnel in the PwC which would enable it meet its core goals (Sparrow et al., 2004). The program was initiated in the year 2001 where the firm sent a number of people to the developing countries where they were supposed to employ their leadership qualities in environments that posed different challenges. Compared to their home countries, the developing countries experienced political, social and economic challenges that called for a totally different approach in both running and management (Pless Maak 2009 pp.58). PwC therefore had to be multicultural oriented and accustomed to relatively poor technological advancements that the developing countries had. In realizing this, small teams were dispatched to operate in these fields on rotational basis, each constituting eight weeks working with NGOs, intergovernmental agencies and community based organizations. The exercise mainly comprised working to confront Aids epidemic scourge, poverty challenges, conflict and environmental degradation (CS). It was back in the year 2000 that the leadership team of the PwC drew attention to the global ever-changing trends in business running and management. PwC however lacked a global leading capacity to meet with the challenges presented by the intricate worldwide business and was at the verge of being left behind as top performing partners in leadership. Other big companies were taking a lead in the Ulysses Program in efforts to nurture leaders all over the globe through exposing them to varied environmental situations so that their leading skills are enhanced. Within a period of five years, the Ulysses Program had already dispatched 80 partners through its program and with 22 participants in the year 2006 (Marquez 2005 pp.50). In the year 2004, the firm resolved to deploy its staff in countries in Africa that were experiencing varied problems that ranged from health to economic. Most important of the teams that comprised of 18 young partners coming from different PwC boundaries was one sent to combat challenges presented by HIV/AIDS in various African countries especially in Namibia and Uganda. Other included landmine improvement in Eritrea, reintegration of ex-combatants in East Timor and the small project development in Ecuador (Hofstede, 2004) Learning activity in the Ulysses project was program to take several levels for each individual team and in the organization levels where there is cross exchange of the acquired knowledge between clients and the organization. All the members who were sent out for a particular mission were supposed to report back to the firm on their experiences during their leadership responsibilities. These briefing were critical in analyzing what was better to adopt which enabled the PwC to keep on refining the Ulysses model so as to meet the global leadership requirements in a better way (Marquez 2005 pp.51). Q2. Ulysses program has been able to make PwCs business strategy and goals successful. On its launching, the firms were more inclined towards the partners from Europe and USA only. This posed a misbalancing which Ulysses came as a solution by ensuring a multicultural and geographical diversity amongst all the teams. Its wider scoop of approximate 8000 partners from member firms of 768 cities coming from 139 countries made it possible to effectively incorporate different cultures and locations. All the participating candidates in the Ulysses project were required to have been selected from the heads of each company from respective territories. These nominations were based on excellence and thus ensured candidates with the best leadership potential per took the leadership roles (PricewaterhouseCoopers, 2000). The joint PwC and Ulysses for instance applied their global business expertise in Southern Belize which turned out to be very successful. In the program, Brian McCann, a PwC client service that was a partner from Boston and who specialized in merges and acquisition, the rewards- both personal and professional, took part in the Ulysses project, was recruited and surprisingly found himself as the only member originating from the US team. This team (Belize) consisted of other colleagues from Malaysia, Sweden and Germany (Patton, 2004). The team lead in activities of leadership with Ta`axche Conservation trust (YCT) which was an NGO located in Southern Belize. The local government and the private sector were also involved in evaluating the growth and income-generating potential of the eco-tourism market in the region. The priority for the team incorporated building capacity in YCT, to ensure excellent services in meeting the needs of the local Mayan people. Economic conditions in souther n Belize were desolate, with approximately half of the population being no employed and 75% earning less than $200 a month (Patton, 2004). In spite of the tough circumstances and a short time framework, the team was able to deliver an exceptional work product for the clients. Through them, an international microgrant program looking for a local partner in Belize was put in place. They also wrote a proposal for YCT which was to offer micro funding for 100 new and on hand small businesses in the region over the following two years. The Ulysses team also started up a business training workshop for members of a Mayan womens craft center, developed a business plan for YCT and its woodworking training center, put up a computerized accounting systems for the Trust, and evaluated income generating opportunities for the Belize Forestry Department (Patton, 2004). Q3. The effectiveness of the Ulysses program can be determined through weighing on the Success of the outcomes of various projects under which were steered by Ulysses. It is therefore important to evaluate them against the programs goals which were: To recognize and build up future leaders of PwC to take on senior leadership responsibilities at national and international levels within a time span of five to ten years. To put up a global network of PwC leadership talent To enhance PwCs capacity to capitalize on its diversity and transnational nature of its operation To train leaders to guide the leadership in the global world of ambiguity and tension between diverse interests and stake holders groups To encourage the business sector to move towards a more responsible and sustainable business model In reflection towards this, Ulysses was successful in promoting a co-learning environment and openly worked with the participants on their interpersonal improvement tactics concerning to what the desired to learn from NGO partners. Further, the program was able to bring out cultural differences as an enabler as opposed to earlier perception that it was a barrier. The incorporation of diverse cultures was able to enhance on team acceptance, quality and more innovations which became part of the culture of PwC. Building relationships with clients and stakeholders across borders brought more collaboration which resulted to more success (CPID, 2005). Reports coming from PwC show that the program cycle has advanced offering the participants with wider global perspectives which are relevant to any company running its businesses all over the world (CS). Douglas Ready, a director in the International Consortium for Executive Development Research noted that the Ulysses Program has helped candidates to confront challenges that are beyond the strict confines of accounting and consultation skills. In addition, he argues that the program has instilled ideals like the community involvement that are elementary to its business culture (CRME, 2005). Ulysses has also offered a chance to partnering firms to rely on. The program has forced them to take on projects that are not in their proficiency. An example is during 2003 summer where McCann developed a business plan for an ecotourism group in Belize (Hempel Porges, 2004 p.74). This development castigated more innovation in diverse fields. McCanns most vivid memory is a dinner that he had with a Mayan farmer after spending a day discussing on a plan; Though the conditions were not favorable due to lack of electricity (CS). All PwC partners agree that theyve already put into practice their experiences to the charge of administrating people and clients. A Malaysian partner Jennifer Chang once pointed out that her team noticed a shift in her managerial style after the Belize trip. She listened more and became more flexible. According to her, it is after witnessing how other organization took long to effect decisions that one gained the patience for the people that one is working with. Ayub was among those promoted in June 2003 who became a manager of 20 partners. In his view, face-to-face conversations were better over e-mail due to the low-tech approach, building trust. The adoption of this technique made him achieve a significant progressive difference in Namibia.ÂÂ   Ulysses is even prone to be more than a expedition of personal discovery for a handful of partners. It could help build leaders capable of confronting the challenges of an increasingly global business (CS). Q4. Ulysses program presents both advantages and disadvantages in offering leadership development programs to its partners. During the short duration that candidates are enrolled in the program, they develop skills of leadership which arms them with good network as future leaders of PwC taking responsibility for longer periods of five to ten years (Evans et al., 2002). This is a relatively shorter training period as compared to other traditional ways where courses take up three to five years. On the other hand, the longer serving term takes the perspective that the world being highly ambiguous with tensions amid varied interests and stakeholders groups exists. Future PwC leaders are then predestined to forefront and shape a business model that is more accountable and sustainable and allows joint venture between business and civic societies (Dickmann Harris, 2005). The Ulysses program poses another benefit in that the concepts instilled to participants are directly related to building leaders who in return can be able to build businesses. The program thus focuses on unlocking performance and embracing diversity that makes its models well versant with global business environments and the demands related. Its can be argument reasonably that, whenever a brand is made, a sustainable business is also created to complement it (Jain 2004 pp. 13). Further, Ulysses eight-week program project in developing countries that merges NGOs and inter-governmental organizations seeks to bring a cohesive forum that is able to meet most of the challenges that a respective country may be experiencing. As opposed to the traditional ways, this program is more involving: participants are required to deliver developmental project managed by a partner organizations which moulds them to be innovative (Bhaskar-Shrinivas et al., 2005). In East Timor for instance, a UN project attempting to give ex-combatants of the independence struggle new meaning to their jobs and lives in their communities; PwC partners were drawn in to access the efficiency of the project. It was able to deploy its multinational teams and transfer them to the area to apply their capabilities and develop strategies that reflected new skills and behaviors. In additional, Ulysses participants benefit in the program, among other the GP initiative where there is a strong focus on su pport for intra-company network building (Harris et al., 2003). On the other hand, Ulysses is an expensive program that snatches away the original glamour of PwC as the enormous leading firm in training global world leaders thus a disadvantage.

Sunday, January 19, 2020

Betting Shop computer investigation Essay

The task given to me for the following essay was: – Assume you have been called in to investigate suspected incidences of computer crime enacted through the computer system at a local betting office. Describe how you would conduct the search and seizure operation. Also explain why you would conduct the operation in the manner you describe. Keywords: – Electronic, Evidence, Investigation, Computers, Seizure, Forensic, Computing Introduction I was recently given the task of Head of Forensic Computing Investigation into Operation Gamble. Operation Gamble had been in place for over 12 weeks, in this time it had become obvious that there was every possibility that some kind of computer crimes were being committed on a everyday basis. This job entails making sure that nothing is overlooked, that everything is done in a methodical manner, everything needs logging in one way or another. There are many things to think about , and many that need acting upon, decisions often need to be made on site at the time of the search. Hopefully this essay will inform the reader of a little knowledge into the world of forensic computing investigation. Also that it will become clear that the successful prosecution of offenders means that the investigation must be done thoroughly from start to finish. ACPO state there are 4 principles that should be adhered to at all times, so when reading this must be took into consideration. The four principles are as follows:- Principle 1: No action taken by law enforcement agencies or their agents should change data held on a computer or storage media which may subsequently be relied upon in court. Principle 2: In exceptional circumstances, where a person finds it necessary to access original data held on a computer or on storage media, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions. Principle 3: An audit trail or other record of all processes applied to computer based electronic evidence should be created and preserved. An independent third party should be able to examine those processes and achieve the same result. Principle 4: The person in charge of the investigation (the case officer) has overall responsibility for ensuring that the law and these principles are adhered to. Ruth Sutton’s investigation into a local betting shop. Firstly I was called into the office and was allocated a new case, which involved investigating a betting shop that may have been involved in some kind of fraud or computer misuse. I wasn’t given any information in detail. Without having much detailed information I have to prepare the investigation as though I am looking for every kind of electronic crime there is. With an open mind it makes the investigation much more through and lengthy, maybe turning up more clues to what has been occurring in this particular establishment. Also as I have been put in charge of this investigation I make sure that all staff that had been drafted in to help with this investigation had the expertise to do so, they all needed to be aware how volatile forensic data is, how easily evidence can be lost, changed, or altered and therefore inadmissible in court. If I were to be given this case and was previously made aware that it was child pornography that I was looking for this would set my mind thinking, and turning into the direction of looking for not only images but perhaps photography equipment, chat logs, email, internet usage logs. On the other hand it is a much different case for fraud. Accounting would be looked into address books, credit card data, calendars, credit card skimmers, the list just goes on and on. Having no idea could turn up more things as child porn can often be attached to a ring, perhaps in that ring credit card fraud is being used to purchase entry to child porn sights, so with my open mind and that of my colleagues I start my investigation. Within the ACPO (Association Of Chief Police Officers) guidelines there are 4 stages that are involved in gaining forensic evidence. They are: – 1. Acquiring the evidence 2. Identifying the evidence 3. Evaluating any evidence found 4. Presenting the evidence. For the purposes of my investigation in fact all forensic computing investigations, the first 3 rules are paramount as they all rely upon each other being performed correctly. Although it must be said if any of the rules are not followed correctly this wouldn’t even get as far as the presenting Evidence rule, as there could be no successful prosecution. Preparation Knowing this is a retail betting shop, the first decision to be made is the time that we will serve our warrant to search the premises. After not much deliberation it is decided to carry out the search before opening time, I was aware that the manager opened up every morning at 8am so meeting him as he opened up would be the best policy. The reason for this decision is that with less staff and no customers there would be less chance of anyone being able to tamper with any networks, data, or any other relevant evidence. In the past it has been known for one member of staff to distract an investigator, while another removes vital evidence. As time went on 3 other members of staff arrived for work, they were all taken aside and asked details of what there job involved, where there individual workstation was and any usernames, passwords or encryption keys that may be relevant to the case. On Entry On entry it was most important to visually identify anything that could be possible evidence. The following items were identified and noted down: – 1. Computer 2. Laptop 3. Usb stick 4. Digital camera 5. Printer 6. Scanner 7. Mobile Phones 8. Cd’s & Dvd’s 9. PDA All these items could be relevant in gaining evidence as they all may contain relevant data. My reasons for each item were as follows: – 1. Computer – This is obvious that looking for forensic data the desktop computer could hold lots of evidence. 2. Laptop – Same reasons as above. 3. Usb Stick – This could also contain data. 4. Digital Camera – may contain images or even files of any data 5. Printer – Printers have their own memory now so this could contain much needed evidence. 6. Scanner – May have been used to scan fraudulent documents (if there is any damage or imperfections to the glass this could show that a particular document was created with its use. 7. Mobile Phones – Mobile phones have own operating system, could contain not only contacts but also images, files, and time logs etc, lots of relevant data. 8. Cd’s & Dvd’s – Another item that could contain lots of data. 9. PDA – This like a mobile phone has its own operating system and could be used to store relevant data, contacts, time logs etc. Before any searches in drawers or anything was moved the whole area was photographed, picturing where all the above items were exactly in relation to the shop. This is done to document the evidence in a visual manner, that can be looked at after things have been moved to unsurface perhaps more clues, for example If a computer mouse was sitting on the left hand side of the desk, perhaps the manager is right handed so it could lead to a clue that perhaps a left handed member of staff uses that desk, which the computer is sitting on. Photographs were taken of the computer screen as it was on and had the user names on it, this was also documented by text. The computer felt quite warm so this could give clues as to whether it had been left on overnight or perhaps used before we had gained entry to the premises. Photographs were also taken of all the cables at the back of the computer, so as reconstructing at a later stage would be easier, also the cables were labelled. The desktop computer was then switched off by removing the power from the computer not the wall socket. The laptop was the next item to be dealt with, it was switched off so removal of the battery was next. Next a search took place which would involve looking in drawers, cupboards etc. The items I was looking for were: – 1. Any paper work that may give some clues to any passwords that may have been used 2. Memory Cards 3. Credit card Skimmers 4. Address books 5. Appointment cards/books 6. GPS SAT NAV equipment 7. CCTV footage Most of these items were found lurking in and around the vicinity of the desk where the desktop computer was located, other than the CCTV footage that was located in the DVD recorder next to the kitchen door. The DVD recorder contained a DVD- rw (DVD re- writable), which was left in place until also photographed and noted while in situ. The rest of the items were subsequently photographed and logged before anything else was done. The reasons for seizing these items were as follows: – 1. Paperwork – passwords, contacts etc. 2. Memory Cards – Data, Images 3. Credit card skimmers – Evidence in itself or even more so if there is data contained on the magnetic strip. 4. Address books – Contacts 5. Appointment cards/books – verify evidence of suspects whereabouts 6. GPS SAT NAV – Travel logs, previous places visited 7. CCTV – Evidence to say who has been in the premises, and when as the camera will have its own time logs. The manger was then asked a few questions about any passwords or encryption keys he may have been aware of, this was done to try and gain any extra information regarding passwords, encryption etc, as this could all save time when it comes to imaging and gaining access to files. All the questions and answers were noted down in a methodical manner. Seizing the evidence The decision was made by myself to take the equipment, rather than live image at the suspected crime scene, as there was no network, wireless or otherwise, I felt this was the best decision to make as the imaging could be done under labatory conditions. Also as there was quite an amount of electronic data that would need to be imaged, this would take far too long and would not be efficient to do so. Although it is seen best for the raw electronic data to be accessed least as possible due to its volatile nature, this would only have to be done the once in the lab, once imaged they actual items (pc, laptop) would not need to be handled again as the image would be an exact copy. Fingerprinting would need to be done, but this could not occur until all equipment had been imaged, as the chemicals used can be destructive The laptop was known to have Bluetooth capability, and wifi so this had to be put into a shielded box, so as that it could not receive any signals from anywhere else. The mobile phone and PDA were treated in the same manner. The boxes were tagged and everything noted so as to start the chain of evidence for these items. All that had to be done now was to actually bag up all the evidence. This has to be done and sealed in anti static bags, and all written down in a methodical manner. This was done item by item individually as each item was tagged and bagged it had to be logged in a chain of evidence. This took quite a long time but this job cannot be rushed, as anything missed could be fatal to a prosecution. Next was the issue of transportation, this would need to be done strategically so as not to damage any possible data evidence. These would have to be kept away from any magnetic fields, e. g. speakers, radios etc, so they were removed with a van that had storage boxes within so as the seized equipment would not get too warm, cold, or anything else happen to them. Evaluating the Evidence This is where the real investigation continues, and where more light may be shed on the situation concerning electronic data found. Encase was used to image the hard drive of the desktop computer and laptop, and various other software was used for the acquisition of the other electronic items. Once imaged work would begin on searching labouredly through the data. To finish this investigation could take quite a few man-hours, as there is so much data to work through. Now is when this case is turned over to the other specialists that I work alongside. Conclusion Alas my work has ended now in this case as I have finished my job of searching the crime scene and seizing the evidence, after a full week of preparation before the actual search, I am quite pleased with the result. I am no clearer about any crimes that were or may have been committed, but hopefully due to myself carrying out the investigation thoroughly I have led the way for a successful prosecution to go ahead. References :- National hi-tech crime unit (2008) The ACPO Good Practice Guide for Computer-Based Electronic Evidence www. acpo. police. uk/asp/policies/Data/gpg_computer_based_evidence_v3. pdf [accessed 05/05/2008]. Computer Crime: ACPO Guidelines (2008) http://www. dataclinic. co. uk/computer-ACPO. htm [accessed 07/05/08].

Saturday, January 11, 2020

Memoirs

Anne Frank is the best known of these two people, far more than Romeo Dallaire. Her struggle for survival and her eventual plight of death in a concentration camp have awed the world for the last sixty years. Just a young girl who had the rest of her life to look forward to and her youthful plans for that life that were snuffed short by a war machine and the hatred of a man she would never see, Adolph Hitler. Hitler’s madness and his intricate hatred for followers of the Jewish faith subsequently brought a halt to millions of lives of people that had never seen him, known him or would have ever harmed him. His fanatical crusade for the â€Å"Arian† race to populate the world and do an ethnic cleansing of any other race, creed or religion created one of the most horrendous and infamous atrocities in world history, the Holocaust. Everyone who has ever read Diary of a Young Girl could not help but be moved by Anne Frank’s courage and optimism during her enforced hiding with her family and the other residents in that attic as she tried to maintain hope in the ominous face of an adverse society that had invaded her native country. It is truly amazing how she managed to maintain her sanity and her outlook on life through such a horrific ordeal. Just fifteen years old with very little experience at life, she seemed to possess a profound ability to see things as they â€Å"really were† and not as she or the others would have wished them to be. Yet, it did not seem to quell her belief that there was good in people and that only a few were responsible for the misery that is often imposed upon others simply because of another’s beliefs or policies. It has to make one wonder if it were not partly because it was a more innocent time in the world when children were not constantly besieged by violence, crime or prejudice. Though probably one of the world’s most famous victims of prejudice, Anne Frank maintained that innocence through her whole life. She was a child caught in a nightmare not of her own making and she along with millions of others suffered because of that nightmare. Romeo Dallaire was a military man that by choice involved him in these types of matters. A Canadian Major General, Dallaire, headed a small United Nations peacekeeping force, UNAMIR, in Rwanda, Africa. Horrible atrocities became evident to him and he set out to appeal for help in these murders that were so ethnic in nature. It involved a conflict that the ruling regime, the Hutu, had begun mass massacres of the Tutsis, a different sect within the country. It was totally classified as ethnic in policy. When Dallaire faxed for advice in 1994, his fax was treated with little or no attention. The United Nations refused to acknowledge it as genocide and would not allow Dallaire to do anything beyond the regular rules that his small military unit was allowed to pursue. Dallaire had to sit back helplessly and watch this atrocity go unchecked. Unlike Anne Frank, he was not a personal victim but he was just as helpless in changing the effect of what was happening. In his writings later, Shake Hands With The Devil, Dallaire expounded on the ineffectualness of Genocide Committees, such as the UN had, when it was doubtful if a particular action within a country can be termed as ethnic genocide. Time has proven constantly that other countries or even the United Nations in these more modern times are extremely hesitant to act despite sometimes often insurmountable proof that ethnic cleansing is occurring and it should be stopped immediately. So what similarities would be between Anne Frank and Romeo Dallaire? They both wrote important works on the results and after effects of ethnic cleansing and genocidal war. Anne Frank’s viewpoint came from an innocent bystander. Her only crime? She was a Jew. She had led a quiet gentle life within a loving family structure and she was only aware of the persecution of the Jewish population by what was happening around her. Once in seclusion, her writings intensified as she grew more and more aware of the plight of other people and of her childhood friends and their families either frantically trying to escape or captured by the Nazis and sent to the concentration camps where most of them never returned. Her diary, which she referred to as â€Å"Kitty†, was begun before she and her family were forced into hiding. It shows all the normal qualities of a young girl her age. Her young hopes and dreams and the beginnings of puberty. Her delightful and expectant views of what life would be like when she was grown were the strongest proof of her innocence. She was a friendly, astute and open person and those qualities did stand her in good stead while she remained in hiding for two years. She managed to maintain a very mature calm while some of the older adults around her were literally â€Å"falling to pieces.† She seemed to rise above the petty squabbles and accusations that formed when so many people are crammed into such close quarters for so long. She tried not to dwell on the lack of food, fresh air, or miserable living conditions that she existed in but instead took a very philosophical point of view of what was happening around her and to her. Her incredible courage has inspired people constantly through the years since her untimely death and the publication of her diary. She very clearly knew the difference between right and wrong. Through her diary, she made a world wake up to how quickly one group can impose its values on another and if the imposed group refused those values, then violence and mass death could erupt from it. To quote the old phrase â€Å"Out of the mouths of babes†, whether trite or not, in this instance, a child taught an adult world what was wrong with prejudice, stupidity and the aggressiveness of war. Romeo Dallaire’s own writings have been a good source for endless purposes as far as a teaching and informative guide to how not to miss the very clear signs of ethnic war. Because Dallaire’s hands were tied in the military sense and the United Nations’ refusal to act upon his advice from the situation that eventually escalated into a full scale war. Dallaire is often quoted by writers on war and genocide because his graphic description of how the massacring of the Tutsis people in Rwanda should have been clear warning signs of what was going to happen. It is one thing to set of councils against genocide but to refuse to act upon situations that fall under the jurisdiction of these councils is almost as heinous as the very acts of war themselves. In an odd comparison, Anne Frank and Romeo Dallaire were exactly alike as they were both witnesses to these atrocities and they were both completely helpless to do anything to stop them outside of writing about them. It is perhaps some comfort that through both of their written observations, we, as a world, are better able to see the fallacy in these types of confrontations and hopefully in the future, take more steps to insure that they never happen again. Works Cited/ References: 1.How to Prevent Genocide: A Guide for Policymakers, Scholars, and the Concerned Citizen by John G. Heindenrich, Praeger Publishing, 2001 2. The Door of Opportunity: Creating a Permanent Peacekeeping Force:   Journal Article by Lionel Rosenblatt, Larry Thompson, World Policy Journal, Vol. 15, 1998 3. Understanding Anne Frank’s the Diary of A Young Girl, A Student Casebook to Issues, Sources, and Historical Documents by Hedda   Rosner Kopf, Greenwood Press, 1998 4. Anne Frank: The Biography: Magazine Article by Martyn Bedford; New Statesman, Vol. 129, April 2, 1999

Friday, January 3, 2020

The Role Of Women During The Canterbury Tales By William...

The role of women in society has been well documented through world literature. â€Å"And the reality is that for a large bulk of human history, women have been treated as the subordinate to men and have not been given a voice†(David Splawn, 2015). Works such as The Canterbury Tales by Geoffrey Chaucer, Hamlet by William Shakespeare,The Education of Women by Daniel Defoe, and A Doll’s House by Henrik Ibsen. These works come from a wide variety of time periods, they range from the middle ages to the modern era, where the first was published around 900 years before the last. While women make up approximately half of the population of the world, literature does not reflect this ratio. Even with such population, most works do not even focus on women. Few works have dealt with the role of women in society throughout the history of literature, but it has become more and more of a recurring theme as time passes. Works like The Canterbury Tales by Geoffrey Chaucer and Ham let by William Shakespeare were rare for their time due to how they portrayed female characters. Works like The Education of Women by Daniel Defoe and A Doll’s House by Henrik Ibsen were wrote in a time of change and were not as rare as the other works published in the same time period. Geoffrey Chaucer slams the role of women in his novel, The Canterbury Tales. â€Å"Chaucer tells three stories told by women. Each of these women do not fully fulfill the images connected with the role the character is supposed