Tuesday, December 24, 2019

Our Body Is A Resource Of Untapped Potential - 954 Words

Your body is a resource of untapped potential. Your mind has the ability to stop you or propel you forward. Where is your mindset? People don t want to acknowledge fear. Your fear will keep you stuck. Making excuses, procrastinating and putting off uncomfortable things is easy to do. Instead of speaking about your fears what if you spoke to your fears? Speaking back to that fearful voice brings you one step closer to taking back your power. How would you be different if you developed a positive mindset? There are three innate fears in infants including sudden motion, loud or abrupt noises, and sudden approach. As you get older those fears diminish. What did they get replaced with? Avoidance, many times, is a learned response to a†¦show more content†¦This could include resentments, anger, sadness or feeling trapped. Choose to let go of the fear. What would you say? Are there things that you always wanted to say, but never had the ability to verbalize? Make the choice to find your voice and talk back to the fear. Take charge and release the thoughts and emotions that feed your resistance. While tapping the karate chop spot on either hand, repeat these phrases out loud, (or change the words to fit your exact situation). Set up: Even though I have this fear and it keeps me from doing things, I deeply love and accept all parts of myself. Even though I spend time thinking about what I don t want to do and will avoid things that are uncomfortable for me, I choose to continue working toward my goals. Even though I do certain things that appear positive, sometimes they are really to avoid my fears, and I can choose to release my fears when I am ready to moving forward with confidence and poise. Eyebrow: I have been stuck with this for too long now. Side of Eye: This fear has a grip on me and I don t know how to release it. Under Eye: I avoid doing some things because I am fearful. Nose: This fear is a burden. Chin: This fear overshadows me. Collarbone: This fear affects my self confidence. Under Arm: This fear has been around for too long. Head: I will tackle this fear when I am ready to with confidence and courage. Eyebrow: I know that this fear served a purpose. Side of Eye: This fear helped to protect me at one time.Show MoreRelatedGene Therapy And Germline Therapy1612 Words   |  7 Pagesgene therapy is when blood cells are extracted from a person and a normal gene is then inserted into the defective cell. This does not prevent the disease from occurring in future generations because it doesn’t affect the sperm and egg cells, only the body cells. Although, this is a treatment that has to be repeated several times throughout a person’s life as the effects can wear off. Germline gene therapy however occurs in the reproductive cells where there is genetic modification to these cells occursRead MoreMy Chance For A Chance1026 Words   |  5 Pagesgive them and you have to take them. Kera taught me this. It was through our relationship that I was able to see just how offering another chance could allow an individual to reach their true potential. Now of course there were adjustments made, plan-of-actions created, and countless r eflections pondered, but at its core, we were simply providing each other another chance for success to occur, growth to be realized, and potential to be reached. Providing these chances allowed for, what I would considerRead MoreThe Eight Limbs of Yoga1053 Words   |  4 PagesThe Eight Limbs. (n.d.). Eight Limbs of Yoga. Retrieved May 2, 2014, from http://www.yogajournal.com/basics/158 Yoga is composed of eight limbs. The first limb is Yama. Yama is focusing on our ethical standards and conducting ourselves in a positive manner. There are five Yama’s, the first is Ahimsa. Ahimsa teaches us to develop the ability to be compassionate to ourselves. The second Yama is Satya. Satya encourages us to accept that we are not responsible for someone else’s emotional reactions.Read MoreAnalyzing The Energies Of Men1360 Words   |  6 Pages It is a myth that we only use about 10 percent of our brains, and that the other 90 percent is full of untapped potential and undiscovere d abilities. The myth may have been started in the 1890s. Psychologist William James, who wrote in his 1907 text The Energies of Men, â€Å"we are making use of only a small part of our possible mental and physical resources.† This was a plausible claim at the time. Lowell Thomas brought up what James said in his foreword to Dale Carnegie s book, How to Win FriendsRead MoreIndustrial Hemp Struggles with Marijuana Stigma1198 Words   |  5 Pagesrepresenting the beginning of the end for hemp as a major agricultural asset to the United States. Industrial hemp contains no psychotropic qualities that create a â€Å"high† like marijuana. Considering that hemp’s unique qualities can help solve some of our country’s major problems, it becomes increasingly ridiculous that it remains off limits due to ignorance and poor lawmaking. The United States government needs to create a legal distinction between marijuana and industrial hemp. The time is now toRead MoreAssignment13 18 Words   |  6 PagesBusiness without Borders Case Connection China in Africa: A Big Step Forward, or a Bigger Step Backward? Entering an untapped international market can strengthen a business tremendously—but what if the costs outweigh the benefits for the market itself? China has long been an important player on the global stage, but recent advances in manufacturing, natural resources, and energy production have catapulted the expansive country to the forefront of international trade. Currently the world’sRead MoreBussiness Qa Essay1476 Words   |  6 Pagesand â€Å"weak† currency. What are the advantages and disadvantages of each? 5. Why is outsourcing such an attractive way for firms to tap into foreign markets? What are the risks of foreign outsourcing? 6. Outline the potential pros and cons of the 3 key strategies for developing foreign markets: exporting, licensing and franchising, and direct investment. 7. Explain how countertrading works. What are the benefits and drawbacks for both parties that engageRead MoreNew Product: Nike Fitness1525 Words   |  6 Pagesfour people), and in large groups (eight to twelve people). The fitness center will offer unique fitness programs and classes that are available every week in both indoor and outdoor arenas. Nike-certified trainers will strive to utilize the full potential of Nike products by incorporating them into their workouts. In addition to providing treatment for injured clients, Nike Fitness will have its own chiropractors and a Nike Health cafà © to provide for their nutritional needs. Food served at the cafà ©Read MoreThe Urgent Question of How to Motivate Employees1046 Words   |  4 Pages1. Introduction The question of how to motivate employees is the most urgent. Because employees are valuable resource of any organization. And their willing to satisfy customer needs, increase and improve productivity is vital for an organization growth and success. Therefore, managers should clearly understand needs of their workers. The aim of this project is to try to understand what can be done in order to motivate the workforce competently. This report presents an example of motivation planRead MoreDo We Really Use 10% of the Brain?601 Words   |  2 Pageshistory to explain gaps in scientific research or as a way to make a quick buck. The myth may have originated from the writings of William James, a psychologist and philosopher who wrote, â€Å"We are making use of only a small part of our possible mental and physical resources.† in his psychology book, The Energies of Man. That quote was possibly converted into the ten percent myth of today. It is also said that Albert Einstein refe renced the myth in relation to his own intelligence though there are no

Monday, December 16, 2019

Aviation Security Free Essays

Prior to the 9/11 attack, the US Aviation had little concern over the threat of either hijacking or terrorism. Surveys detailing the passengers’ concerns in flights were more directed towards the airlines’ maintenance and safety than the risk of being hijacked or being attacked by terrorists (Rosenzweig and Kochems, 2005). But after the 9/11 attack, especially with terrorists having used planes as the instruments for initiating a global anxiety over terrorism, aviation security has become an utmost priority of the Department of Homeland Security (Decker, 2005). We will write a custom essay sample on Aviation Security or any similar topic only for you Order Now Increased international concern over terrorist-related aviation security heightened after the attack. This is evidenced by several complaints and questions issued immediately after 9/11. According to the Citizens’ Complaint and Petition as filed with NY AG Eliot Spitzer on November 2004, New York citizens were dissatisfied with official investigations done regarding the attack. Some of the implications of the complaint include the citizens’ suspicion of unsatisfactory intelligence prior to September 11 and that some government officials are responsible for the attack and are directly to blame for the tragedy. In other words, the citizens doubt that the tragedy was a result of mere incompetence on the part of the intelligence committee but more of an act of complicity between the terrorists and some officials. Quoting from the complaint: â€Å"A majority of citizens come to suspect high crimes and treachery within their own government, but cannot find officials with enough courage, power or independence to thoroughly investigate their concerns and restore the public trust (2004). † Moreover, the citizens are concerned that the government is deliberately hiding the real results of the investigation regarding the 9/11 attack keeping their questions from being answered and their peace of mind untended. Representative Cynthia McKinney of Georgia responded to a 9/11 briefing saying that a number of families of the 9/11 tragedy’s victims share her concerns about the truth on all aspects about the 9/11 attack: â€Å"This calls for another look at the government’s account of 9/11, which guides so much of what has happened since. Mistakes of fact, intentional or not, have changed and guided America into costly wars and increased insecurity at home. They need to be addressed and scrutinized, not dismissed and used to attack those who discover or raise those (2005). † Although not stated directly such complaints imply the citizens’ concern for justice and the assurance that their government could be trusted with providing them with their right to a safe environment. Such actions and concerns by the citizens force the government to respond by enhancing security measures especially in aviation, and improving intelligence and investigative capabilities as demanded by the rising anxiety resulting from the tragedy. The complaint also expressed concerns over the taxing effect of â€Å"exaggerated† security measures on civil liberty but notwithstanding, most are still willing to sacrifice the said liberty in exchange for the safety that they demand to be ensured of. In this era of terrorist threat, the citizens regard their civil liberty as second only to their safety. This proves the growing concern of the public over security with its extent emphasized by the object they are willing to exchange it for (O’Connor, 2006). In ensuring the safety of the people and the state, one very important factor to consider is the efficiency in allocation of resources. Clearly, it would be unwise to try to protect everything from terrorist attacks because of limited resources and the asymmetric aspect of risks and consequences afforded to different assets. Here assets refer to people, structures, places, ideas, or any possible object (or non-object) that terrorists may direct their attack to (Rosenzweig and Kochems, 2005). The Secretary of the Department of Homeland Security, Michael Chertoff, recognizes the state’s limitation in resources and emphasized in one of his speeches, the need for an â€Å"objective measure of risk (Rosenzweig and Kochems, 2005). † Here is where the risk-based approach to counterterrorism comes. In other words, prioritization is very important in ensuring the efficiency in allocation of resources. The efficiency in allocation of resources can be realized by using the risk-based approach. Risk-based Approach to counterterrorism involves the identification and analysis of risks or threats, vulnerability, and criticality. The assessment of these factors is critical in determining how to allocate resources efficiently for maximum prevention of terrorism, which is the main purpose counterterrorism (Decker, 2005). The analysis of threats involves the identification of current assets that are most at risk to terrorist attacks, the capacity of the terrorists to attack the asset, the chance of success of the possible attack and the possible consequences if such attacks were successful (Decker, 2005). If the analysis of threats involves the risks, the analysis of vulnerabilities involves the assessment of the state’s limitations in terms of resources, capabilities and assets. The identification of possible structures which are most at risk to being attacked, the limitations of intelligence, the limitations in terms of funds, are aspects which are important in the analysis of vulnerabilities because these weaknesses, aside from being easily manipulated by terrorists to their advantage, could also cripple our forces if successfully attacked (Decker, 2005). The analysis of criticality involves the possible effect of a successful attack. Here, the differences in consequences afforded by successful attacks are considered. It is important to consider in the analysis of criticality, the assets’ functions and the degree to which a successful attack would cause damage not only to the states’ functions but also to the peoples’ psychological status and moral excellence (Decker, 2005). To summarize, risk is the primary consideration in the actions and decisions executed for the prevention of terrorism. Analyzing the processes involved in the risk-based approach to counterterrorism, we can deduce that the factors influencing the â€Å"objective† value attributed to â€Å"risk† are the probability of attack, the probability of a successful attack and the probable degree of damage caused by the successful attack (Rosenzweig and Kochems, 2005). Considering the factors involved in the assessment of risk, aviation deserves to be one of those included in the list of high priority assets. The success of the 9/11 attack exemplifies the degree of risk involved in aviation. The probability of attack is high considering the limitations in security especially when an airline is not on land, which also increases its chance of success. The damage involved includes the lives of civilians, the loss of the airline involved, disruption in economic activity and abstract losses such as psychological and morale discord. In response to the threat associated with aviation, TSA Administrator Kip Hawley announced changes in security procedures. These changes include more intensive screenings and a longer list of prohibited items. Understandably, firearms, ammunition and any other explosive including fireworks are not permitted at the checkpoint and in any checked or carry-on baggage. Lighters, pocketknives, teargas and other weapons of self-defense are now prohibited at checkpoint (â€Å"TSA reminds passengers to:†¦ †, 2006). A more intensive detection procedure for greater threats such as explosives and guns is now implemented. One security tactic implemented in aviation is that of unpredictability. This is called the layered-screening approach. Various random methods are now used to screen passengers. According to Hawley, it is important that the aviation security is equipped with the â€Å"weapon of uncertainty† so as not to let terrorists gain the advantage of knowledge to easily maneuver situations for the accomplishment of their terrorist plans. Also, according to Hawley, this tactic will help the security team in focusing endeavors to preventing individuals from gaining access to the object of their harmful intent (â€Å"TSA Unveils Enhanced Security Screening Procedures and Changes to the Prohibited Items List†, 2005). Before, aviation security measures include only passing through metal detectors and the screening of baggage. The new security measure now includes additional screenings such as screening of shoes and clothes for explosives, more extensive inspections of baggage and the passenger himself. All these additional measures are done randomly in accordance with the layered screening approach (â€Å"TSA Unveils Enhanced Security Screening Procedures and Changes to the Prohibited Items List†, 2005). Secure Flight is a program specially designed for the enhancement of aviation security, specifically targeted to the prevention of terrorist attacks. This program involves the screening of passengers against a terrorist watch list provided by the FBI: an enhanced screening process, identity authentication process, checking of a passenger name against a database and an appeals process for misidentified passengers (Elias, 2005). It is developed to displace the Computer Assisted Prescreening System. The reliability of the program has been questioned because of possible damage to civil liberties, as names are not always unique (Singel, 2004). Although the detection of terrorist-passengers is essential in ensuring safety, the program’s imperviousness to hackers is questionable. Just recently, the Associated Press reported the suspension of the program because of this issue. Still, Hawley recognizes that the program is essential to aviation security (â€Å"Secure Flight†, 2006). In any case, the main problems associated with security checks involve damages to civil liberties and privacy. Programs like Secure Flight, CAPPS and Clear, operated by a private company, Verified Identity Pass, Inc. are continually being suspended due to issues concerning privacy. In a report done by the Department of Homeland Security, the Electronic Privacy Information Center (EPIC), EPIC impels the TSA to suspend all private programs including Clear until the concerns over the implications of the programs on privacy are resolved, especially with the use of databases and watch lists. Also, EPIC impels the suspension of the programs until regulations are polished to comply with laws on Privacy (â€Å"Comments on the Electronic Privacy Information Center†, 2005). PDD 39 or the US Counterterrorism Policy formally states the US’ position regarding terrorism. It outlines the country’s purposes and procedures in implementing counterterrorism strategies. It treats all aspects of terrorism whether it is direct or indirect participation both as a crime and a threat to the national security. In this regard, the US Policy on counterterrorism vows to apply all means to fight terrorism (Clinton, 1995). Specifically, the US counterterrorism policy aims to reduce the state’s vulnerabilities against possible threats, deter terrorism, enhance facilities, prevent entrance of weapons of mass destruction and further lead agency responsibilities. The implementation of such tasks is delegated to specific departments. In the case of aviation, it is the TSA, part of the Department of Homeland Security that is tasked in ensuring the safety of flight passengers as well as the transportation of cargo. In the event of increased threats of terrorism, the TSA’s security measures as outlined in the previous paragraphs, have been satisfactory in providing the citizens security (â€Å"Aviation Security: Efforts to measure†¦Ã¢â‚¬ , 2003). For instance, the more intensive screening done to passengers is consistent to the US counterterrorism policies. One, it prevents the entrance of terrorists and thus their inducing terror to the citizens inside national boundaries. Also, the intensive screening and enhanced detection capacities prevent the entrance of weapons of mass destruction, reducing the risks such weapons afford the citizens and other assets of the nation. Specifically, the TSA policy involved in the prevention of weapons of mass destruction is the stricter monitoring of freight, as well as the passengers’ baggage (â€Å"Airport Passenger Screening:†¦Ã¢â‚¬ , 2003). Other TSA policies that are consistent with the US counterterrorism policy is its enhanced list of prohibited items. Now that pocketknives, teargas and even lighters are prohibited at checkpoint, the probability of hijacking is reduced. Efforts like training screeners also deter terrorism by decreasing the likelihood of small detection errors that could have caused heavy damage to the nation. Proposals like the implementation of CAPP and Secure flight, although plagued by criticisms (Singel, 2004), are also aimed to comply with the US Counterterrorism policies. Both of which could be placed under the â€Å"enhancing counterterrorism capabilities† aspect of the US counterterrorism policies. Counterterrorism measures, aside from its mission being to combat terrorism, are done to give the citizens a perception of safety with its heightened efforts to ensure their security. This is very evident in the security measures implemented in airports where passengers are doubly screened, to the dismay of those with terrorist purposes and those shouting for their civil liberties. Given the extra efforts by the Department of Homeland Security to grant the citizens their right to safety, the citizens were supposed to feel extra safe. This is not the case. Extra efforts to provide the citizens the safety they deserve only confirms the degree of danger they perceive to be in to. To add to this, the media overly emphasize the risk posed by terrorism fueling with publicity-derived strength. If the government’s efforts are directed towards giving the citizens security or at least a perception of it, the terrorists, being what they are, aim to instill fear and terror, if not physically with bombs, at least psychologically. It appears that the media and the perpetrators of terror are living symbiotically: the media are giving the terrorists its required publicity to instill terror in the minds of the people and the terrorists provide the media with good stories to tell. In addition, it is the media which gives so much coverage to the extra counterterrorist efforts given by the government which reflects not only the strengths but also its weaknesses. The very idea that the efforts of the government to provide the citizens with security are with loopholes has much more effect in the people’s minds even if its strengths outweighs the weaknesses. The result is the realization of terrorist goals which is to instill fear and terror in every possible way as well as influence the media audience with distrust in the government’s security efforts (Bowdish, 2006). The internet seems to provide the terrorists with one of the best means to disseminate fear, taking advantage of the anonymity and its fast-paced nature. Lots of websites in the internet are now being maintained, unbeknownst to the civilians, by terrorists (Glass, 2001). This medium is especially useful in speedy dissemination of visuals and ideas that instill fear. Other methods include: manipulating reports by promoting contrived neutrality, indirectly aimed at making civilians question any actions done by the state, its policies, security measures and its legitimacy. Some civilians, with their good intention of fighting for freedom are unknowingly influenced by propaganda tactically planned by terrorists (Bowdish, 2006). They are unknowing victims of terrorist machinations. With the government’s passing of new policies aimed at securing the people, specifically, the layered screening done in airports, and the new and unpredictable methods strategically imposed to prevent easy entrance of terrorists in the US, the government has satisfactorily defended the state and most importantly its citizens from terrorism. Unfortunately, the government could only do so with the physical aspect of terrorism. Information can easily be manipulated and with very minimal censorship through the media and from this terrorist weapon, the government can do very little to protect the citizens. The government is not in control of the information disseminated in the media, nor do they have the power to choose which information to be withheld and which information to be broadcasted. In addition, it would not be unwise to control the media as this would only add to the psychological effect that the terrorists, with the help of the media, are producing (Bowdish, 2006). Counterterrorism methods employed today are very much similar to the methods employed in the 1980’s during the Drug War when in 1984; President Ronald Reagan militarized the drug war starting from urine testing and forfeiture of properties towards a decreased threshold of arrest with only hearsay evidence and the use of surveillance systems (â€Å"Drug War†, 2004). Similar to the counterterrorism methods expounded in the revised US Patriot Act, the government officials have expanded powers over gathering information which involves, like that in the Drug War, lower threshold of evidence needed for the arrest of suspected individuals, and forfeiture of properties of those suspected to be working for terrorists. Like in the Drug War, the efforts and procedures employed in combating terrorism are not fully supported by the citizens. Both in the 1980s drug war and today’s counterterrorism involve the citizens’ derision over the loss of their civil liberty and their petition for human rights (â€Å"Drug War†, 2004). In both events, there is an increase in government spending, in 1980’s, to contain drug use and at present, to combat terrorism and increase national security. During the drug war, campaigns for and against the legalization of marijuana had spread in all mediums of communication: radio, newspaper and television. In today’s war against terrorism, the internet has been added to the list of mediums used in campaigns. Like today’s war against terrorism, the efforts in reducing drug use in the 1980s seemed to be futile. Despite the government’s efforts in preventing increase in drug use through the passage of laws and implementation of stricter penalties, the rate of drug abuse had not changed significantly. Today’s war on terrorism involves the same seemingly futile efforts. Terrorists, being as they are, would not be easily deterred by any law or security measure (Bowdish, 2006). They would always try to find means to gain access to whatever vulnerability the nation may have and actuate their terrorist plans. But still, even with this seeming futility, the government is supposed to act towards the betterment of the society and that betterment does not include any hazard and that includes both drugs and terrorism. References â€Å"Airport Passenger Screening: Preliminary Observations on Progress Made and Challenges Remaining†. (Sep 2003). General Accounting Office Report to the Chairman, Subcommittee on Aviation, Committee on Transportation and Infrastructure, House of Representatives. Washington DC: US. â€Å"Aviation Security: Efforts to Measure Effectiveness and Strengthen Security Programs†. (20 Nov. 2003). General Accounting Office Testimony Before the Committee on Government Reform, House of Representatives. Washington DC: Berrick, C. Bowdish, R. (5 May 2006). Cerberus to Mind: Media as Sentinel in the Fight against Terrorism. Strategic Insights. 5 (5). â€Å"Citizens’ Complaint and Petition as Filed With NY AG Eliot Spitzer† (19 November 2004). The Justice for 9/11 Steering Committee. USA. Clinton, W. (21 Jun. 2005). PDD 39: US Policy on Counterterrorism. The White House. Washington, D. C. â€Å"Comments of the Electronic Privacy Information Center† (08 Dec. 2005). Department of Homeland Security. Washington DC: Rotenberg, M. Decker, R. (2005). Homeland Security: A Risk Management Approach Can Guide Preperedness Efforts. Testimony before the Senate Committee on Government Affairs. USA. â€Å"Drug War 101†. (n. d. ). Human Rights and Drug War Website. Retrieved 10 August 2006 from the World Wide Web: http://www. hr95. org/dw101. htm. Elias, B. et. al. (04 Mar 2005). Homeland Security: Air Passenger Prescreening and Counterterrorism. CRS Report for Congress. US. The Library of Congress. Glass, A. (Dec. 2001). The War on Terrorism Goes Online: Media and Government Response to First Post-Internet Crisis. Press, Politics and Public Policy Working Paper Series. The Joan Shorenstein Center, Harvard University. McKinney, C. (10 Aug. 2005). Response to a Coverage of the 9/11 Briefings. Washington, DC. O’Connor, T. (06 Jun 2006). Civic Liberties in Domestic Terrorism. In Megalinks in Criminal Justice. Retrieved August 10, 2006, from http://faculty. ncwc. edu/toconnor/429/429lect19. htm. Rosenzweig P. and Kochems A. (2005). Risk Assessment and Risk Management: Necessary Tools for Homeland Security. Backgrounder. (1889), pp. 1-4. â€Å"Secure Flight† (Feb. 2006). Center for media and Democracy. Retrieved 10 August 2006 from the World Wide Web: http://www. sourcewatch. org/index. php? title=Secure_Flight. Singel, R. (27 Aug. 2004). Secure Flight Gets Wary Welcome. Wired News. Retrieved 10 August 2006 from the World Wide Web: http://www. wired. com/news/privacy/0,1848,64748,00. html â€Å"TSA Reminds Passengers to:† (31 May 2006). Oklahoma Office of Homeland Security. Oklahoma:USA. â€Å"TSA Unveils Enhanced Security Screening Procedures and Changes to the Prohibited Items List† (06 Dec 2005). Oklahoma Office of Homeland Security. Oklahoma: USA. How to cite Aviation Security, Papers

Saturday, December 7, 2019

Critical Essay for Training and Development - myassignmenthelp

Question: Write about theCritical Essay for Training and Development. Answer: Introduction Learning in the 21st Century has changed dramatically. Due to internet technologies, there is increased skill competition as locational barriers have been put down. Organizations have the ability of sourcing their manpower from a variety of countries if those individuals have the desired skill sets. Also, the internet has given individuals access to huge amounts of information making it easier to do academic research. The internet contains information concerning a wide range of academic disciplines which can suit any individual. Increased numbers of people have seen the need to enrol in institutions of learning in order to increase their level of competitiveness in the industry. It is no longer enough for people to have a high school degree, analytical skills, communication skills and other technical skills have become high in demand. Internet technologies have increased the accessibility to these tertiary learning institutions through distance learning. Despite the ease of access to information and distant learning opportunities, adult learners still continue to face challenges in the process of obtaining academic excellence. Responsibilities and time management are challenges faced by adult learners that see some of them drop from the already enrolled courses while some of them fail to pursue them altogether. It is of importance for these adult learners to have some characteristics that will enable them succeed in their enrolment in tertiary institutions. This paper therefore outlines some of the characteristics that are necessary for adult learners enrolled tertiary institutions in the 21st century. This paper will consider self-directed learners, digital literate learners, open minded learners, results oriented and learners that are apt in time management strategies. Characteristics of Successful Adult Learners Successful adult learners need to embrace self-directed learning. Self-directed learning involves the learner taking responsibility and control over the learning process. Self-directed learning can take both external control and internal monitoring. While external control focuses on the instructors input on the learning materials while internal control takes account on the role of the student with regard to self-management strategies. It enables the adult learner to perform their learning goals and managing their learning resources. The adult learner can take control of internal monitoring process of their learning process through proper planning, application of different strategies and use of internet resources to obtain relevant information. According to Karakas Manisaligil (2012) there is a positive correlation between self-directed learning and learning outcomes for individuals. For example, the student can request for the instructor to change the assignment dates or request for additional instruction. The student also takes the initiative to diagnose his learning skills, designing and pursuit of educational outcomes. The student can master certain topics within the course process without direct input from the instructor. Web based learning has made self-management necessary for successful academic activity due to their convenience and versatility in accommodating various learning strategies. The individual is given the ability to adjust their learning schedules with the other activities that they might be engaged in. Responsibility in self-directed learning can be established through managing timetables, active participation in the classroom, submission of assignments and classroom engagement. It is through self-directed learning that the individuals are able to achieve commitment levels that are required in tertiary learning (Tattersall Koper, 2005). At last, the investigations of the present review showed a connection between SDL inclination and schola rly accomplishment. These discoveries can likewise be clarified inside the system of the self-directed motivational writing which demonstrates that fruitful learners have more viable and effective learning methodologies for getting to and utilizing their insight, are self-inspired, and can screen and change their techniques to enhance their learning results. At the point when learners perceive their adapting needs, plan learning destinations, select substance, draw up learning techniques, obtain showing materials and media, recognize extra human and physical assets and make utilization of them, and they themselves arrange, control, assess, and assess their own learning, they will probably perform exceedingly on learning undertakings (Karakas Manisaligil, 2012). Successful adult learners need to accommodate digital literacy. Internet technologies require the use of a variety of multimedia digital tools such as social media, chat rooms, and video and presentations which are commonly used in the dissemination of knowledge by tertiary institutions. Also, information literacy as a component of digital literacy involves the ability to locate required information in an efficient manner, evaluation of information and relevant sources as well as the incorporation of selected information into a specified task. It also requires the access and use of information in an ethical and legal way through the avoidance of plagiarism (Warschauer, 2007). The internet has wide amounts of information, it is however necessary that this information is effectively filtered for them to be applicable in the educational activity being engaged in. The individual needs to have the ability of interpreting, designing and creating content that uses a wide range of media. It also involves frame composition, video editing techniques and the effects of typography. These skills are important not only for occupational purposes, but also for artistic purposes and civic purposes. It gives the individuals the ability to increase the number of available job opportunities that require multimodal content. It also enables the individuals to participate in community discussions in order to get more insight on the issues being studied. Also, digital literacy is significant when the students want to obtain data from surveys as they can facilitate online based surveys which are less costly compared to the traditional forms of survey related activities (Warschauer, 2007). Therefore a successful adult learner requires being digitally literate in order to effectively participate in the learning process. Successful adult learners need to be open minded in the learning process. Open mindedness requires the adaptation of newer learning theories which are more relevant in the 21st century dynamics. There are three learning structures which are most prevalent in adult learners which are the inferred hypothesis, casual hypothesis, and formal hypothesis. Scholastic specialists utilize the formal hypothesis when they apply complex hypothetical systems to produce new learning. Tacit hypothesis outlines the procurement of metacognitive abilities as happening with no particular learning structure (Kenner Weinnerman, 2011). As indicated by implicit hypothesis, grown-up learners obtain their metacognitive aptitudes from associates, educators, and the nearby culture. Adult learners likely have these abilities profoundly imbued into their reasonable system, which may make it troublesome for them to change, paying little respect to the level of blunder coming about because of a defective implicitl y created learning hypothesis (Kenner Weinnerman, 2011). These learning strategies often act as a hindrance to learning and may make it more difficult for the adult learner to engage fully in the process. People who utilize casual hypothesis still procure their metacognitive abilities after some time from their companions and their condition; however they have no less than a simple cognizant point of view with respect to their metacognitive structure. For adult learners a lot of their casual metacognitive procedures create in working environment conditions, where metacognitive advancement is perceived by their companions as an indication of insight, which unites knowledge, experience, and reflection. Particular inquiries that can urge grown-up learners to contrast their down to earth information and the aptitudes required in their scholastic vocation can incorporate breaking down reference utilization in scholarly written work yet not in expert updates and the part of first individ ual in various composition shapes. Other materials that can be displayed in this structure incorporate presenting the part of inclination and instructive versus influential written work styles. Therefore the adult learners need to critically approach the information provided in the available instructional materials in order to obtain maximum use from them. Open mindedness is a necessary skill that accommodates the dynamism of learning in the 21st century. Conclusion Learning in the 21st century can be a challenging affair especially with the limited time available to individuals. For this reason, adult learners need to have some traits that can set them up for success. One of the traits is self-directed learning. It is important that the learners take charge of their learning process. This can be done through active participation, self-assessment and communication with instructors. In this way an adult learner can take responsibility of his academic pursuits. The other trait is digital literacy. A successful adult learner needs to have the ability to use multiple digital tools since most of the materials in tertiary institutions are digitally oriented. The learner needs the ability to use multimedia internet tools or successful learning and participation. Adult learners in the 21st century need to be open minded to new learning approaches and experiences that are effective in the 21st Century. In this way they will be open to new ideas and more effective learning strategies. Successful adult learners need to recognize that the learning process is just as important as the results being sought after. In this way they will be able to learn more than they initially might have had. Lastly, time management skills are of importance to adult learners since they need to juggle the responsibilities that they have in their lives in order to become successful in their pursuits. The applications of these characteristics are important in order to facilitate the success of adult learners in tertiary institutions. References Karakas, F., Manisaligil, A. (2012). Reorienting self-directed learning for the creative digital era.European Journal of Training and Development,36(7), 712-731. Kenner, C., Weinerman, J. (2011). Adult learning theory: Applications to non-traditional college students.Journal of College Reading and Learning,41(2), 87-96. Tattersall, C., Manderveld, J., Van den Berg, B., Van Es, R., Janssen, J., Koper, R. (2005). Self organising wayfinding support for lifelong learners.Education and Information technologies,10(1), 111-123. Warschauer, M. (2007). The paradoxical future of digital learning.Learning Inquiry,1(1), 41-49.