Wednesday, November 27, 2019

20 Network Security Project Topics

20 Network Security Project Topics Group projects are perhaps some of the most difficult projects that students come across in their university life. Not knowing where to start from or how to bring all the members together is a common problem. Other than this, there is also conflict on topics as different people usually have different ideas. Composing a group project on network security project topics require certain strategies and techniques that we are going to discuss in this second guide of ours. This is the guide where you can actually learn the easiest and fastest way to compose your group project on Network Security. Besides having 20 network security project topics, this guide also contains an informative essay covering one of them. The short sample essay in this guide will help you understand the key points working behind this major. In addition to this, we have also mentioned a few references at the bottom of this guide as well as the previous one, 10 Facts for a Group Project on Network Security, to help you search information regarding the topic you choose. After you’re done reading this guide, we suggest you to read our final guide, Writing a Group Project on Network Security, before you get on with writing your project. Our third and final guide contains tips, information and guidelines on how to compose a group project with ease. The methodologies and structure of writing a group project are properly outlined, structured and composed by our experts. By reading all of the guides, you’ll be able to produce a sublime essay that would persuade your teacher. With that being said, here are 20 topics on network security for you to consider: Is Biometric System More Secure? Can Quantum Computer Become a Reality and Offer Better Network Security? Is Apple Really Virus Proof? Reasons Behind Increasing Cyber Crimes Why Poor Cyber Security for Mobile Environments Is Threatening on a Global Level How Can Poor Network Security Be Responsible for Terrorism? How Changing Network Security Plans More Often Contribute Towards a Safer Connection What Role Has NASA Played in Providing Future Research Ideas Related to Privacy and Security? A Research Paper on Why Cyber Criminals Attack Government Organizations   How did Snowden Revolutionize the World of Security by Leaking NSA’s Information?   Is There a Need to Worry About Network Security?   Is Ethical Hacking a Danger For Us?   What Punishments Are Available to Cyber Criminals   Is Your Data Secure in the Cloud?   Are Some Countries More Secure Than Others?   Impact of Cyber Security Vulnerability on Organizations   How Businesses Are Protecting Against Cyber Criminals   Do All Cyber Criminals Want Money?   Should Banks be Provided More Network Security than Organizations?   Would the World Be a Better Place If Every Individual Is Granted a Right to Privacy? Now, there we go with our 20 topics as discussed, it’s time for you to take a look at our sample essay that we have chosen from the above-mentioned topics. We are positive that it will help you a lot. Sample Essay: Is Biometric System More Secure? Login credentials have been in the play for far too long to provide security to your assets and devices. Now they seem to be failing due to successful cyber attacks and with nothing 100% able to prevent such attacks from happening. However, experts are continuously working to provide better security, and Biometrics seems to be a step in the right direction. Security specialists and technologists from around the globe are taking a shot at Biometric technology to better ensure clients useful data. Biometric security has ended up being a successful and helpful approach to reinforce security, and with the innovation of cameras and unique finger impression techniques on cell phones, security has been given a new face. Biometric security has been around for quite some time now but didnt get much recognition in the field of security until Apple came up with iPhone 5S in 2013. This started the biometric era. Ranging from small devices to big security vaults, biometric technology is serving its purpose to provide better security than ever. Some common Biometric techniques include Facial Recognition, Fingerprint Impression and Voice Recognition. According to experts, some technology is stronger than other and vice versa. Passwords are not sufficient when security is at stake because breaching a password is not much difficult for professional hackers. On the other hand, Biometric confirmation is an authentic and logical approach to handle security breaches. The reason for Biometrics being better than other security providing technologies, for instance, the password security, is that passwords can be cracked if they’re weak or if the breacher is a pro, however, a unique fingerprint or retina scan cant be breached or cracked easily. The most recent Apple and Samsung cell phones, and numerous PCs and laptops are being installed with Biometric sensors. These gadgets also have a Trusted Platform Module or Trusted Execution Environment, that handles the approval of Biometric data independently from the respective device’s operating system. This is not only a step towards initiating a better security environment but also an effective way to keep away from various types of malware attacks coming from the network. With evolving technologies, the threats are likely to grow as well and older security methods are not capable to battle today’s advanced hacking threats. There is a bigger chance of security danger if you’re still dwelling on older security methods to protect something very valuable. Biometric technology has been skyrocketing in the recent years and is likely to grow and advance more. Having this technology empowered for verification and security purpose and implemented in the cell phones and other gadgets we use today have provided a safer environment for online banking, funds transfer and many other activities around the world. Its an adaptable security wall that can help businesses and individuals reduce security risks. References: Matt Curtin (1997), Introduction To Network Security.  interhack.net/pubs/network-security.pdf Joseph Migga Rizza University of Tennessee-Chattanooga Chattanooga, TN, U. S.A. , (2005) Computer Network Security. Didier Benkoel-Adechy (2017), What does the future hold for biometric authentication? Digitus-Biometrics Team (2015), 4 Reasons Why Biometric Security Is the Way Forward digitus-biometrics.com/blog/4-reasons-why-biometric-security-is-the-way-forward/ Robert Springer(2017), Biometric Security: Your Body as Your Password  http://insights.globalspec.com/article/3941/biometric-security-your-body-as-your-password Cisco. (2011). What is Network Security?  cisco.com/c/en/us/products/security/what-is-network-security.html

Saturday, November 23, 2019

Women on Death Row - Rosie Alfaro

Women on Death Row - Rosie Alfaro Marà ­a del Rosio Alfaro, also known as Rosie Alfaro, is a convicted murderer currently on death row in California for the June 15, 1990, murder of Autumn Wallace, age 9, in Anaheim, California. The Crime In June 1990, Rosie Alfaro was 18 years old, a drug addict and the mother of two and pregnant with twins. She was living in a home in Anaheim with a relative of the father of the twins, which was three blocks from the Wallace home. Alfaro was a high school friend of Autumns older sister April and had stayed with the Wallace family during her second pregnancy. However, in 1989, April began to distance herself from Alfaro, other than to occasionally give her a ride when asked. On June 15, 1990, Autumn was home from school early. The school was having early day and recessed at 2:35 p.m. Autumns mother, Linda Wallace, and April were at work and were not expected home until around 5 p.m. Autumn entertained herself by cutting out paper dolls. On the same day, Rosie Alfaro was busy buying cocaine and heroin and getting high. Her first score was around 11 a.m. and by 2 p.m. she was again out of money and drugs. A friend, Antonio Reynoso, who had been released from prison the previous day, agreed to share his drugs with her if she would agree to share her needle. When his drugs ran out, Alfaro decided that she would rob the Wallaces home to get money for more drugs. Alfaro told Reynoso that she used to live with the Wallace family and that she had left a video cassette recorder at the home and would sell it to him in exchange for drugs. Alfaro, Reynoso, an unidentified man, and Alfaros youngest baby went to the Wallace home. The men and the child waited by the car while Alfaro headed to the house. Autumn answered the door and recognized Alfaro as a friend of her sisters. Alfaro asked if she could use the restroom and Autumn let her come inside. Alfaro then managed to take a knife from the kitchen drawer and then coaxed Autumn into the bathroom. There she stabbed Autumn over 50 times in the back, chest, and head. With Autumn out the way, she went about robbing the house of various electronics, appliances, and clothing. Alfaro later admitted that she knew Autumn would be home alone and she was also aware that Autumn could identify her to the police. The Investigation April Wallace returned home at around 5:15 p.m. and found the door to the house unlocked. When she entered the home she saw that the house was a mess and that there were several items missing. She called out to Autumn, but there was no answer, so she left and went across the street to a neighbors house to wait for her mother to come home. Linda Wallace arrived home around 5:40 p.m. and was told that the house had been burglarized and that Autumn was missing. She went inside the house to search for Autumn and found her dead in the back bathroom. Neighbors told police that they saw a brownish Monte Carlo parked at the Wallace home and that two men, one holding a small child, were standing outside of the car. Police investigators were able to obtain a fingerprint from the Wallace home which matched to Alfaro. Alfaro was brought in for questioning and denied any involvement in the murder. More Evidence Sometime after the murder, Alfaro asked a friend if she could leave a bag of clothing at her house. Alfaro contacted the friend later, asking that she leave the bag outside of her home because she was heading to Mexico early the next day, but she never showed up.Investigators found out about the bag and on inspection found a pair of Aprils boots that had been reported as being stolen and a pair of Alfaros tennis shoes. A warrant for Alfaros arrest was issued and she was brought in for questioning again. Confession In a videotaped session that lasted more than four hours, Alfaro confessed that she alone murdered Autumn and then burglarizing the home. Alfaro was arrested and charged with first-degree murder and burglary. Trial In March 1992 a jury found Rosie Alfaro guilty for the murder of Autumn Wallace. The trial lasted two weeks. Sentencing - The First Penalty Phase During the first penalty phase of the trial childhood friends of Alfaro testified that she grew up in a violent home and that her father was a drunk who abused her mother. They also testified that Alfaro was using drugs as early as the sixth grade and dropped out of school in the seventh grade, at which time she began injecting daily as many as 50 speed balls (a mixture of heroin and cocaine.) Alfaros mother, Sylvia Alfaro, testified that her husband was an alcoholic who often hit both herself and Rosie in front of the other children in the family, and threw the family out of the home during drunken rages. She spoke about her daughters early drug use and her inability to quit. She said that at the age of 14, Rosie was pregnant with her first child. During that same time Rosies father abandoned the family. Who is Beto? Rosie Alfaro also took the stand and testified about her unhappy childhood, her violent father, racial prejudice she suffered at school and about her inability to get off of drugs. She expressed her remorse over the murder of Autumn Wallace, stating that we took your innocent life. With the reference of we the court ruled that she had opened the door to cross-examination regarding what went on during the crime since Alfaro had always insisted that she acted alone. During the cross-examination, Alfaro testified that she did murder Autumn, but did so under pressure from the second unidentified man that had come with her and Reynoso. She referred to the man as Beto but refused to offer any information as to his identity. She also testified that she was high on drugs and out of her head shortly before going to the Wallace home. This time she said that she did not know Autumn would be home and had never planned to harm her. She said that when Beto, who was also high on drugs, saw that Autumn was in the house he became angry and put a knife to Alfaros back and threatened to kill her and her child if she did not stab Autumn. She said she stabbed Autumn a few times, but claimed Beto must have inflicted the remainder of the stab wounds. Alfaro  said that once she came down from her high, she could not believe that Autumn was dead. The prosecutor questioned Alfaro about information regarding the identity of Beto that she had told to a mental health expert that examined her at the request of her lawyers. She testified that she initially told the doctor that the unidentified man was her fathers friend and that his name was Miguel. She then told him that the mans name was Beto and identified him in a photograph and said he had a womans name tattooed on his neck. During questioning of Alfaro and Reynoso the defense suggested that the real identity of Beto was Robert Frias Gonzales, whose nickname is Beto. However, in rebuttal the prosecution questioned Robert Gonzales who denied having anything to do with the murder of Autumn Wallace and who also did not look at all like the man that Alfaro had identified in the picture as being Beto. Unable to identify who Beto was, the jury at the first penalty phase trial was unable to agree on a sentence and the trial court was declared a mistrial. Second Penalty Phase Trial The penalty retrial was held in April 1992 before a new jury. Most of the same witnesses who testified during the first penalty trial, testified again, although this time Rosie Alfaro remained silent. In addition to the original testimony, the defense called an expert criminalist, Marc Taylor, who testified that after examining much of the evidence, that shoe prints found inside and outside the house did not match Alfaros shoes. A deputy sheriff at the Orange County jail testified for the defense about a person he saw who resembled the picture that Alfaro had identified as being Beto getting into a blue Camaro parked across the street from the main jail. Dr. Consuelo Edwards who was the mental health expert that Alfaro had first told about Beto forcing her to murder Autumn also testified for the defense. He said that Alfaros intellectual functioning was borderline, and that she had an IQ of 78 and learning disabilities that were made worse by her traumatic childhood. He described her as a follower. In rebuttal, the prosecutor had several Orange County jail employees testify about Alfaros poor behavior in jail and quoted comments that they had overheard her saying to another inmate. They testified hearing her say, Im a frustrated person who takes things out on people, and have to learn to live with that, and Im not going to be able to do this again. Im no actor. Im going to be cold this time. I just want to get this over with. Orange County investigator Robert Harper testified that Robert Frias Gonzales, who the defense claimed was Beto and the second man with Alfaro on the day of the murder, had a butterfly tattoo on his neck and not a womans name, which is what Alfaro had described. On July 14, 1992, the second penalty phase jury sentenced Rosie Alfaro to death. In August 2007, the Supreme Court of California denied Rosie Alfaros request for a stay of execution. Marà ­a del Rosio Alfaro is the first woman ever sentenced to death in Orange County.

Thursday, November 21, 2019

Case study Essay Example | Topics and Well Written Essays - 1250 words - 23

Case study - Essay Example This is one major way that Personal Greetings Company exploits Gabriella. Both the companies pay them less than they think they deserve to make. Another way to tell their exploitation is from the fact that none of them, according to the case study, has ever been credited for his work. Brandon and Gabriela seem not to have received any credit (praise or just a simple thanks you) for their work from senior staffs like the managers. The last form of exploitation comes from the fact that both of them are being overworked and mistreated. This is another typical way Baxter and Personal Greetings Company take advantage of Brandon and Gabriella. Brandon, for instance, works 20 hours a week – very long shifts perhaps with few breaks) while Gabriela is forced to do many jobs. Gabriela is even treated unfairly by Personal Greetings. He is forced to strip his clothes to in the name of working. Brandon and Gabriella are two young people who clearly depict the typical scenario of exploitation in the society. Both of them are being exploited by the system in place; something that can only be explained by ideological hegemony theory. Ideological hegemony theorizes different way in which exploitation and domination are embedded within the dominant philosophies of society. Such dominant ideas have been internalized by the society and its people to the extended that the dominated and exploited give their consent to the relationships between them and the dominant group. Brandon and Gabriella seem to have given their consent to the relationship between them (the exploited) and their respective companies (the dominant group). Neither Brandon nor Gabriella is ready to accept that he is being exploited. Based on the problem identified in the case study, Antonio Gramsci’s theory of hegemony is one theory that can explain how the concept of power and ideology work in

Tuesday, November 19, 2019

This is an individual assignment. You are to research an actual Essay

This is an individual assignment. You are to research an actual example of IT leveraging business advantage at an operational level - Essay Example The presence of fierce competition and cost restraints in the present world economic scenario make a proactive approach to envision the future results beforehand and implement appropriate measures to achieve desired results and targets is absolutely necessary. In this report the role played by the IBM Corporation in developing such strategies to enhance multifarious businesses with hardware and software solutions has been studied. The latest innovative ideas implemented by this leader in automation and IT have been incorporated in the report. Practical implementation of an IT strategy by a leader in an online gaming industry has been studied and researched up to some extent from the results obtained by it after choosing a particular IBM product. Information Technology (IT) has grown at a tremendous pace in the last decade and has left no aspect of business or human life untouched. Banking, Healthcare, Education, The Stock Market, etc. are on the verge of being exclusively run using IT. The growth in the IT industry however has not been uniform, as advances in hardware and software development have been influenced by the exclusive needs and requirements of large corporation and governments. This has produced a haphazard pattern of growth in the IT sector and the experts in the field have initiated efforts only very recently to restructure it to be uniform, efficient as well as cost effective. Almost all businesses in the developed and the developing countries are being run using latest and the most modern aspects of IT. Institutions like banks, the hotel industry, fast food chains, fast moving consumer goods industry and others have surpassed their competitors by miles using IT to leverage their businesses. One such organization is the IBM Corporation which was the pioneering organization in ushering the computer age in this century.

Sunday, November 17, 2019

Developments in Hacking, Cybercrime, and Malware Essay Example for Free

Developments in Hacking, Cybercrime, and Malware Essay The number one web based attack of 2009 was Malicious PDF activity 49% of web based attacksattempts to deliver malicious pdf content to victims through the web. The pdf attack is designed to exploit arbitrary vulnerabilities in applications that are able to process pdf’s. A successful pdf attack could compromise the integrity and security of affected computers. (Symantec Corporation, 2009) The number two web based attack of 2009 was the Microsoft Internet Explorer ADODB.Stream Object file installation weakness. This exploit accounted for 18% of the total number of web based exploits for the year. This vulnerability allows hackers to install malicious files on a vulnerable computer when a user visits a website hosting an exploit. In order for this attack to be successful, an attacker must exploit an arbitrary vulnerability that bypasses Internet Explorer Security settings.Then the attacker can execute the malicious files that were installed by the initial security weakness. This vulnerability has been known since 2003, and patches have been released since 2004. This exploit exposes the fact that many computer systems were not being kept up to date. (Symantec Corporation, 2009) The number three most common web based exploit of 2009 was the Microsoft Internet Explorer 7 uninitialized memory code execution vulnerability. This attack works by enticing a victim to open a malicious web page. Once a user opens the web page it gives the attacker the ability to execute remote code on the victims computer. Since this is a browser based attack, it gives the hacker potentially more targets than relying on a plugin that may not get installed. (Symantec Corporation, 2009) The top 3 Malware attacks of 2013 were W32.Downadup, W32.Sality, and W32.Ramnit. Although their names all begin with W32., each bug has it’s own way of exploiting a system. Let’s take for instance the W32.Downadup. This  worm has been around since 2008. This worm spreads by taking advantage of a remote code execution vulnerability found in Microsoft Windows server service RFC. This worm strives to block access to security related web sites while attempting to spread to protected network shares via brute force of weak passwords. The Security of the entire network is at stake with this worm. This virus demonstrates shows how important it is to keep servers and workstations updated with the latest virus definitions. (W32.Downadup.B, n.d.) The W32.Ramnit has been around since 2010. This worm is spread by infecting executable drives and removable drives. This malware steals bank usernames and passwords. Having a security policy prohibiting personal drives from being used in the workplace is paramount. This type of attack could cause data loss if unmitigated. (Symantec Corporation, 2013) The W32.Sality is in my opinion the nastiest of all three bugs. What makes the W32.Sality particularly nasty is that it can infect executable files on local, removable, and shared drives. W32.Sality is known as an (EPO) or entry point obscuring polymorphic file infector. Essentially, it’s a sophisticate worm-like virus that ensures its survival by downloading other malware and disabling security software. One of the most damaging features of the W32.Sality virus is how it decentralizes peer to peer networks with sophisticated code instruction that populates the network with infected computers. (W32.Sality., n.d.) References W32.Downadup.B. (n.d.). Retrieved June 26, 2014, from http://www.symantec.com/security_response/writeup.jsp?docid=2008-123015-3826-99 W32.Ramnit. (n.d.). Retrieved June 26, 2014, from http://www.symantec.com/security_response/writeup.jsp?docid=2010-011922-2056-99 W32.Sality. (n.d.). Retrieved June 26, 2014, from http://www.symantec.com/security_response/writeup.jsp?docid=2006-011714-3948-99 Symantec Corporation. (2009). Symantec Global Internet Security Threat Report Trends for 2009. Mountain View: Symantec Corporation. Symantec Corporation. (2013). Symantec Global Internet Security Threat Report Trends for 2009. Mountain View: Symantec Corporation.

Friday, November 15, 2019

Cyber Ethics Essay -- essays research papers

Cyber Ethics: Rules for Using the Web We all have heard of ethics. According to Webster’s II New College Dictionary (1995), ethics is the rules or standards governing the conduct of a person or the members of a profession. As Winn Schwartau (2001) stated â€Å"ethics is also about understanding how your actions will affect other people†. Cyber-ethics is the ethical decisions we make when using the Internet. We are tasked to use the Internet on a daily basis and we task students to use the Internet regularly, but to use it properly we must adhere to ethics. Ethics is not a law but your moral code. We must know how to avoid plagiarism, know the acceptable use of the Internet, and we must be familiar with Censorship in order to know what moral standards to follow with the World Wide Web. Plagiarism, or as Steven Gardiner (2001) calls it cyber cheating is the new twist for cheating. Over the years plagiarism has become much harder to detect. But, how do you know when a student has copied his work from online, and not give the proper credit to the rightful owner? I remember working on my undergrad and to prevent cyber cheating my professor only allowed us to use a limited number of Internet cites. The rest were to be from physical books from the library. I can see why a student would copy a paper over writing one. It only takes a few minutes to search the web, cut and paste, and then add you name. The time they saved in research just added more time for them to do the things that are fun. The second way to detect cyber cheating according to Gardiner (2001) is that if you task a student to write a paper is MLA and the paper is in APA it is almost a given that the paper was not written by the student. As most teachers are parents or have that parental instinct, they are aware of the capabilities of their students. So another way to determine if the paper is a fake is ask yourself if that student could really produce that quality of work. To understand the appropriate use of the Internet you have to know what is acceptable and what is not. The Department of Justice categorizes computer crimes in three different ways: the computer as a target, the computer as a weapon, and the computer as an accessory (e.g., para 2, â€Å"What is Cyber Crime?† n.d.). We must teach children how to use the Internet the right way. Much of what we know is learned, and the same goes for using the ... ...hnology era a living nightmare. References Crystal, J., Geide, C.A., & Salpeter, J. (2000, November). The concerned educator's guide to safety and cyber-ethics. Tech Learning [Online]. Retrieved October 22, 2004: http://www.techlearning.com/db_area/archives/TL/112000/cyberethics.htm Federal Censorship. (2002, February). Retreived October 22, 2004 from the World Wide Web:http://www.epic.org/free_speech/censorship/ Gardiner, Steven (2001). Cybercheating: A New Twist on an Old Problem. Retrieved October 22, 2004 from the World Wide Web: http://www.pdkintl.org/kappan/k0110gar.htm Radnofsky, Mary and Vuko, Evelyn ( 2004, June 1). Teacher Says: Teaching Cyber Ethics: Kids on the Internet. Washington Post Online. Retrieved October 22, 2004 from the World Wide Web: http://www.washingtonpost.com/wp-dyn/articles/A64135-2004May28.html Schwartau, Winn (2001). Cyber Ethics 101: What Are (Is) Ethics?. Retrieved October 22, 2004 from the World Wide Web: http://www.ed-u.com/cyber-ethics.htm Webster's II New College Dictionary. (1995). Boston, MA: Houghton Mifflin Company. What is a cyber crime? (n.d.). Retrieved October 22, 2004 from the World Wide Web: http://www.cybercitizenship.org/ Cyber Ethics Essay -- essays research papers Cyber Ethics: Rules for Using the Web We all have heard of ethics. According to Webster’s II New College Dictionary (1995), ethics is the rules or standards governing the conduct of a person or the members of a profession. As Winn Schwartau (2001) stated â€Å"ethics is also about understanding how your actions will affect other people†. Cyber-ethics is the ethical decisions we make when using the Internet. We are tasked to use the Internet on a daily basis and we task students to use the Internet regularly, but to use it properly we must adhere to ethics. Ethics is not a law but your moral code. We must know how to avoid plagiarism, know the acceptable use of the Internet, and we must be familiar with Censorship in order to know what moral standards to follow with the World Wide Web. Plagiarism, or as Steven Gardiner (2001) calls it cyber cheating is the new twist for cheating. Over the years plagiarism has become much harder to detect. But, how do you know when a student has copied his work from online, and not give the proper credit to the rightful owner? I remember working on my undergrad and to prevent cyber cheating my professor only allowed us to use a limited number of Internet cites. The rest were to be from physical books from the library. I can see why a student would copy a paper over writing one. It only takes a few minutes to search the web, cut and paste, and then add you name. The time they saved in research just added more time for them to do the things that are fun. The second way to detect cyber cheating according to Gardiner (2001) is that if you task a student to write a paper is MLA and the paper is in APA it is almost a given that the paper was not written by the student. As most teachers are parents or have that parental instinct, they are aware of the capabilities of their students. So another way to determine if the paper is a fake is ask yourself if that student could really produce that quality of work. To understand the appropriate use of the Internet you have to know what is acceptable and what is not. The Department of Justice categorizes computer crimes in three different ways: the computer as a target, the computer as a weapon, and the computer as an accessory (e.g., para 2, â€Å"What is Cyber Crime?† n.d.). We must teach children how to use the Internet the right way. Much of what we know is learned, and the same goes for using the ... ...hnology era a living nightmare. References Crystal, J., Geide, C.A., & Salpeter, J. (2000, November). The concerned educator's guide to safety and cyber-ethics. Tech Learning [Online]. Retrieved October 22, 2004: http://www.techlearning.com/db_area/archives/TL/112000/cyberethics.htm Federal Censorship. (2002, February). Retreived October 22, 2004 from the World Wide Web:http://www.epic.org/free_speech/censorship/ Gardiner, Steven (2001). Cybercheating: A New Twist on an Old Problem. Retrieved October 22, 2004 from the World Wide Web: http://www.pdkintl.org/kappan/k0110gar.htm Radnofsky, Mary and Vuko, Evelyn ( 2004, June 1). Teacher Says: Teaching Cyber Ethics: Kids on the Internet. Washington Post Online. Retrieved October 22, 2004 from the World Wide Web: http://www.washingtonpost.com/wp-dyn/articles/A64135-2004May28.html Schwartau, Winn (2001). Cyber Ethics 101: What Are (Is) Ethics?. Retrieved October 22, 2004 from the World Wide Web: http://www.ed-u.com/cyber-ethics.htm Webster's II New College Dictionary. (1995). Boston, MA: Houghton Mifflin Company. What is a cyber crime? (n.d.). Retrieved October 22, 2004 from the World Wide Web: http://www.cybercitizenship.org/

Tuesday, November 12, 2019

Explain the principal social perspective

Functionalism is a structural (macro) perspective that suggests that our behaviour is influenced by the society is organised. They believe that the institutions have a major impact on how we behave in the society. The individuals are constrained by the society, and the functionalists views the individuals in the society as a puppets. Functionalists says we as an individual have little power about what we do and the institution influences us. This can be seen in society in form of laws, norms, values (norm underpins values), beliefs and relationship. This theory suggests that the individuals in the society must behave properly; otherwise, they are regarded as deviant and are punished. Functionalism believes that every part of the society are interdependent with each other, which helps society to keep going. It is almost like a human body, where different parts of the body has a function together, which keep it alive and healthy; this is called organic analogy. For instance, the family helps by bringing up the next generation about the patterns of shared and stable behaviour that are called social order. Different social institution such as, legal system, political system, health system, family system and education system work together to maintain a stable society from generation to generation. For instance, the legal system provides laws, norms that underpin values, safety, discipline and order and the health system provides free health services, family system provides help in reproduction that increases the economy. All of these institutions together to form an ‘integrated whole’ society or social structure. The major function of these social constitutions are to make individual to follow the norms that underpins values and internalize them, which leads to value consensus. According to Talcott Parson, society is based on value consensus where shared and common values and behavioural norms lead to a common culture. Consensus is an agreement in the society about the values, and have freedom, equality, justice and fairness. These values are acquired by passing down from generation to generation, through primary socialisation. These values benefit everybody equally, some the example of values that exist in our society are right for equality, justice and privacy. There are mechanism of social control in the society, like punishment and rewards. Socialisation and social control ensure that there is equilibrium in the society. The process of socialisation achieves equilibrium in the society, whereas family, religion, law and mass media, which are the agents of socialisation, are responsible for maintaining the equilibrium. The functionalist believes that the western societies are meritocratic, which means the system rewards the individual in the society based on their effort and talent and social mobility is possible in this system. They also believe that people in the society can achieve status by working hard and there is equality of opportunity in the society. Talcott Parsons proposed the functionalist approach, which considers health and illness and assumes negative definition of health. He described that illness is a form of deviance that distracts proper functioning of the society, in the same way that crime does. Ill members in the society must perform a social role where sick role consists of four elements, two of which are right and responsibilities. The rights associated with the sick role was to be excused from normal social obligation and be cared for, whereas the responsibilities were to take steps to get better and co-operating with the medical professionals such as doctors. This view suggests that ill must be cared for and must be dealt with as soon as possible in order for the society to run smoothly. 1. Marxism The founder of Marxism is Karl Marx (1818-1883), who was a German philosopher, economist, sociologist and revolutionary socialist. Marxism structural (macro) perspective, where our behaviour is determined by the way society is organised. The social institutions such as laws, rules and norms have big impact on how we behave and we are controlled by the society. Marxists believes that the society is not interdependent, instead it believes that economy is the base or infrastructure of the society, and our behaviour depends upon the economy of the society. Marxists sees the society as a system that operates to make profit for the upper class. Whereas the working class are socially engineered to conform the needs of the upper class who benefit from the societies using capitalist economic system. Capitalists exists all around the world and the economies of industrial societies in the west are based on capitalism. Marxists explains that the capitalists economies compromises two main social class; the capitalists and the workers. The upper class people were the capitalists who were regarded as powerful, whereas the workers or the labours were the lower class people and were seen as powerless puppets. The capitalists exploits the workers since they do not get recognition for what they do as get have minimum wage and make surplus profit by persuading the lower class to buy the goods by advertising. The capitalists are opposite of socialism since the capitalists control what we think and what we do, the working class people are ‘brain washed’ into accepting set of beliefs that benefits the capitalists. These messages are seen to be transmitted through the cultural institutions such as media, which are controlled by the capitalists to influence the workers. The capitalists creates the dominant values that benefits the powerful and disadvantages the powerless. For instance, the monarch claim their position as god gifted and the religion help supports their point, due to which the working class people are convinced to what have to say since they have faith in their religion. Inequality in capitalist societies still exists and is unfair but they do not recognise it because the capitalists convince them that it is their fault for not achieving what they want. For instance, the capitalists would convince working class by saying the GCSE result of upper class is higher than that of lower class because they have been able to provide private tutors for their children, and it would be their fault if their children got low grade, since they were not able to provide their children with private tutors. Marxist believes that the definition of health and illness and the health and social care services provided to the powerless serve the interests of the powerful dominant classes. The capitalists regard people who do not produce wealth as unhealthy. Marxists believe that doctors are the example of agents that work for capitalists interests rather than those of patients so that they can go to work as soon as possible and provide the capitalists with healthy work force. The government allows the capitalists to make profit from the products that cause health issues, such as alcohol and tobacco. The industries that capitalists establish cause to pollute the atmosphere and produce toxic waste that affect the people and get ill. This approach believes that illness is related to difference in the social class. For instance, poverty-stricken areas have higher levels of illness and have lower life expectancy. According to this approach, the government do no handle this issue as this would make people ill, as this leads this money and the capitalists would make advantage of it. 1. Feminists Feminism is a range of movements and ideologies that work towards goal, which establish and achieve equal political, economic, cultural, personal and social rights for women. Feminism seeks to establish equal opportunities for women in different sectors like education and employment and supports for equal rights and equality of women. The feminists believe that gender inequality still exists in today’s society. Feminism is a perspective that believes that women are disadvantaged in the society and should have equal rights with the men. The feminists are critical of patriarchy. Patriarchy is a social system where the men hold the power and authority. The women have fought throughout the history for their rights and equality, which caused creation of waves of feminism. The first wave was observed in the mid late 19th century, campaigning for the change in rights for the women in early 20th century. They campaigned for two main strategy; right to vote and right to be educated. In 1928, the women were given the right to vote, but only rich women over 30 who owned property were allowed. The second wave of feminism was observed from 1960s, this lead to the formation of Women’s Rights Movement (WRM) and Women’s Liberation Movement (WLM). These organisations campaigned for right to equal pay act, domestic violence, sex discrimination, employment, violence services, education, family and health & social care. WRM and WLM were successful in achieving their rights for Equal pay Act in (1970), Sex Discrimination Act (1975) and right to be educated and be employed. Due to variation in opinion of causes of gender inequality and solutions to it, there was formation of three types of feminism; liberal feminism, Marxist feminism and radical feminism. Liberal feminism proposed that gender inequality stills exists in the society because of social and cultural attitudes that is gained by the process of socialisation i.e. primary and secondary socialisation. Liberal feminist helped to promote equality through Sex Discrimination and Equal Pay Act. Marxist feminism explained that the capitalists to earn profit using women. They would persuade women to buy groceries such as fabric softener, so that they would spend their money and exploit them. Radical feminism explains that the society is ruled by the men, whereas the female are oppressed, exploited and are regarded as second-class citizen. It states that men exploit women by relying on free domestic labour and men may use aggression to control women in the home. Through the gender role socialisation, wo men are convinced to accept female subordination and see motherhood as a key goal in life. The feminist writers have focused male domination in the medical profession and its effects on women. They are concerned with the way in which pregnancy and childbirth have been regarded as a medical issue rather than as natural process. Feminist writers have protested on the way which the medical professions and related pharmaceutical industries have given low priority about development and promotion of male contraceptives. It explains how women had to face medical conditions such as mental health, anxiety and depression using the contraceptives, due to which their position in the society is exploited. Theorist have been concerned about the impact of social inequality on women’s health and dual role of women. 1. Interactionism The founder of interactionism was Max Weber. Interpretivist describe that the society and the social structure are seen as the creation of individuals. Unlike functionalists, they see individuals of the society as actors not as puppets. The individuals have free will and are able to make choices of their own. Unlike in the functionalism, the power come from bottom to up. They believe that the people’s choices or decisions are influenced by how they make sense of social situations. For instance, marriage means different things to different person; an individual whose parents are divorced might have negative definition of marriage, whereas the individual who have grown up in a good family might have positive definition of marriage. The Interpretivist suggests that people make impression on how you perceive symbols, they make impression on what you wear. For instance, people will make assumption that you are smart, just because you wear glasses. These theorists are concerned with the small or micro scale situations rather than the systems, they focus on the individuals in social interaction situations. Interpretivist believe that our identity is based on how we see ourselves or how other sees us. For instance, if a student in the school is praised and us labelled as smart, then he/she might do better his/her studies as this helps to boost their self-esteem. We get influenced by media, friends and family about how we see ourselves. According to Browne labelling refers to â€Å"defining a person or a group in a certain way-as a particular ‘type‘ of person or a group†. According to Interpretivist people are attached to the labelled and it can actually damage some group of people such as disabled people. The person labelled behaves in the same way expected and they have fulfilled the prophecy and lived up to the label. Interactionist believe that health and illness are the product of social construction that affects people’s wellbeing. They believe that disease is socially constructed†. Disease does not exist as a social phenomenon until it is somehow perceived as existing† (Rosenberg 1989). This approach focuses on negotiation between the patients and medical practitioners. For instance, a female patient would feel comfortable to talk to female doctor about her reproductive health rather than a male doctor. They are concerned with labelling and self-image and social interaction differences affected by class, ethnicity and age. Symbolic interactionism is critical of Marxists and Functionalists as Interpretivist look individual as subjective through doctor and patient exchange. The argument here is that illness is a social diagnosis among actors rather than just a matter of physiological malfunction. 1. Postmodernism Postmodernism is an approach in sociology as well as in other subjects, which believes that society is changing rapidly and continuously, which is marked as an uncertainty and the social structure are being replaced by whole range of different and constantly changing social relationships. This theory believes that modern society was developed at around 1750s and has been replaced by the end of 20th century due to massive social change. The Functionalists and the Marxism perspective might be interested in modernity as they thought that if properly understood, societies could be improved. But the postmodernists argue that there is no longer a place in sociology for these type of theory. This theory suggests that the postmodern society has no progress, predictability (norms that people would predict to behave), order and continuity, due to which insecurities and anxiety has been developed in people living in postmodern society as people do not know how to behave and what is expected from others. Order, predictability and continuity are essential as it gives us routine and reassurance that provides us safety and security. Society has changed as it has gone through different industrial revolution or industrialisation, technological advances, urbanisation and secularisation. Industrialisation is the process of going from agricultural economy to heavy industrial/manufacturing economy. Secularisation is the decline of belief in religion due to rise of science whereas urbanisation means movement of people from rural areas to towns and cities. Postmodernists suggests that modern society no longer exists and we live in a postmodern era or in post modernity, where the society is media saturated. Due to the revolution of technology, globalisation has occurred where the world has become a smaller place to live in. The mass media has dominated our lives to the extent that we confuse media images with reality. This theory concludes that people in the postmodern society can have their own form of identities, how they want to see themselves or how they want to define themselves. There is diversity, choices and ‘pick and mix’ culture in this society. There is no imposition on people on how to behave and there is flexibility in the work. Due to fluidity and flexibility in the postmodern society, people might feel insecure and unsafe. 1. Collectivists and New Rights Collectivists Collectivists believes that their goal are more important than the individual goals because they believe that society as a whole has more importance than the individual alone. This theory focuses on the importance of the society and community and gives priority to the group goals than the individual goals. This approach aims to address the inequalities in the society due to different levels of wealth and status in the society. With an aim to sort out the inequalities, welfare state was established to get rid of five giant evils; want (poverty), idleness (unemployment), squalor (poor quality housing) and ignorance (underachievement). Services were made free after these giant evils were identified. To eradicate disease existing in the society, NHS service was established in 1948 to make sure that the people lived healthy life. The basic principle of collectivism is to provide people with education, health and social services for the individuals in the society who cannot afford it through taxes then access on the basis of rights as opposed to the ability to pay. These helped to provide foundation for the Welfare State which is based on the collectivists principle ‘cradle to grave’ or child to old age pension. This approach was adopted by The Labour Party who represented workers which aimed for the redistribution of wealth through taxes. In this policy, the government would cut off taxes from the wealthy people and share it with the poor (shares some ideas with Marxists). Collectivists believes that we have equal rights and the government should administer responsibility for Welfare State. The New Rights criticises the Collectivism as it creates the dependency culture. They point out that people become irresponsible, lazy and don not work as benefits are demotivating for the people. New rights The New Right was popular during 1980s. They are the political movement with a considerable cultural influence that looks at individualism and distrust of the state as controlling and interfering in what is essentially the private world of the individual. They proposed to cut the public spending and cut taxes. They wanted the rich people to have more money to spend money as they choose. The New rights was critical of Collectivists stating that the rising costs to government of the welfare state were preventing the economic growth and the individuals were becoming dependant on the welfare state. The New Rights were critical of public services owned/controlled by the government and they preferred pro private services e.g. education and health care. The New Right is argued to favour ‘the rich’, but they believe that everybody in the society has equal opportunity, so anyone can become rich. E.g. Alan Sugar. They believe that people must be responsible for their own and their family’s welfare and they should not be dependent on the government. The New Rights are completely opposite to Collectivism. The most radical New Rights would abolish the Welfare State. g) Bio-medical and social models Bio medical Model Biomedical model focuses on the physical or biological aspects of disease and illness. The doctors or the health care professionals are associated with the care and treatment of diseases in this model of health. The bio medical model accept a ‘negative’ definition of health. The negative definition of health explains that the individual believes that they have good state of health and wellbeing because they have absence of physical illness, disease, injury, mental stress, free from pain and discomfort. The bio medical model of is dominant model in our society since it is based on objectivity thus this model has influenced or convinced people in the society. This model emphasises on diagnosis and treatment of the individuals separately from their living condition, due to which this model is not holistic approach. The reasons for illness are not at the centre of biomedical model. This model believes that health is a biological normality and describe that having ill health is deviant. This model believes that the disease is caused by identical factors such as germs, genes and accidents. They can be identified by having examination tests like blood, urine, saliva test, X-ray and MRI. They accept that the professionals diagnose disease then treatment is identified and cure is offered to the patient. The professionals views the human body as a machine and see things very clinically and do not really take consideration to people’s feeling. They often promote the view that disease or illness is temporary. This model indicates that we all have equal chance of getting ill and some people get ill due to weak health, whereas some people get ill due to factors such as weak sanitation. It assumes that medical treatment has had the most important impact on improving the health of individual. For instance, the NHS helps in the prolonged and preserves life, but this can be argued as health of an individual had already started to get better due to access to clean water, exercise and diet. The strength of bio medical model of health is that it is based on scientific knowledge and research and has provided many effective treatments for disease and physical condition. The bio medical model of health has be successful to provide many effective cure and treatments for disease throughout the history of humankind. The weakness of biomedical model of health is that the treatments can be expensive and require training or expertise to deliver and this model focuses on the individual and pays insufficient attention to environmental and social factors, which is not a holistic approach. Social Model The social model accepts the positive definition of health. The positive definition of health can be described as the achievement and maintenance of physical fitness and mental stability. This model believes that health is a relative concept and a social construct. For instance, being voluptuous centuries ago was a sign of good health, but today’s day it is regarded as health issue or overweight. This model claims that ill health is caused due to social factors (including environmental factors). For instance people can get ill because of the unhealthy diet they are consuming, poor living condition or pollution. This model is critical of ‘modern’ medicine, which are elements of biomedical model. E.g. Iatrogenisis medicine caused deformity in the baby consumed by pregnant mother eaten for nausea sickness. It argues with the biomedical model saying that illness is not randomly distributed and are critical of the assumption that medical treatments has had the most important impact on improving health. Social model can explain why population level health improvements were achieved when social conditions improved late 19th/early 20th centuries due to the improvement of sanitation and supply of clean water the health of population improved, and argues it was not because free health services was delivered to the people. The strengths of social model of health is that it focuses population health and takes a broad range of factors into account and it is widely used and understood by health care practitioners in developed countries. This model offers board and flexible and inclusive way of understanding health and illness. Whereas the weakness of this model is they do not have a clear way of identifying or classifying health problems and this model cannot explain illness or many mental health problems where there are no physical signs or symptoms, which can be distressing. The social model cannot be used to address an individual’s health problems, especially where emergency care is needed.

Sunday, November 10, 2019

The Marshall Plan

THE MARSHALL PLAN By the end of World War II much of Europe was devastated. The region’s economic structure was ruined and the devastation to agriculture left millions starving and homeless. During the war, Axis powers targeted the transportation infrastructure, leaving railways, bridges, and roads in a state of severe disrepair. Much of the civilian merchant shipping industry had also suffered severe damage. Due to the economic strain placed on the European countries during the war, many had exhausted their treasuries. If not for The United State’s aid in the form of the Lend-Lease program during wartime efforts, this damage would have been much worse and the outcome may have been different. The United States however, did not suffer the same severity of destruction on its own territory. Consequently its massive agriculture and manufacturing base was still intact. For these reasons, The United States saw it necessary to offer goods, services, and monies to any European or Asian country, be it an Allied or Axis power. The U. S. continued providing aid after the war was over. Between 1945 and 1948, the U. S. ent $12 billion in aid to European Nations. The world’s major economies were crumbling and the U. S. realized the global impact. General George C. Marshall introduced a recovery plan in 1947, the European Recovery Plan or ERP. This plan, which later became known as the Marshall Plan, was the primary program for rebuilding and creating a stronger economic foundation for the countries of Western Europe during the post-war era, 1948-1952. The Marshall Plan provided an additional $13 billion in aid to European nations. Post-war relief from the U. S. totaled $25 billion. With a GDP of $258 billion, U. S. post-war investment in foreign countries totaled 10% of its GDP. For all Marshall Plan participants, the economic output was 35% higher in 1951 than the 1938 pre-war era. Poverty and starvation disappeared and Western Europe began two decades of growth in which it saw a drastic increase in the standards of living. This plan was a key element in European recovery and integration. It erased trade barriers and set up institutions to coordinate a global economy. Efforts were made to model European industrial and business practices using the more efficient American models. The Marshall Plan and the Bretton Woods system mandated free trade throughout the region. Through these acts, European nations standardized international exchange rates, set up the International Monetary Fund and the International Bank for Reconstruction and Development, which is now part of the World Bank Group. The European Coal and Steel Community which eventually became the European Union has roots in the Marshall Plan. Today, the term â€Å"Marshall Plan† has become a metaphor for any large scale government program that is designed to solve a specific social problem. It is usually used when calling for federal spending to correct a perceived failure of the private sector. The Marshall Plan has played an integral part in establishing a global economy. References http://www. polsci. ucsb. edu/faculty/cohen/inpress/bretton. html http://www. archives. gov/exhibits/featured_documents/marshall_plan/ http://en. wikipedia. org/wiki/Marshall_Plan#Criticism http://en. wikipedia. org/wiki/Marshall_Plan http://en. wikiquote. org/wiki/George_Marshall#Essentials_to_Peace_. 281953. 29 The Marshall Plan By the end of WWII the political map of the world was distinctly shaped. The former allies in anti-Hitler coalition entered into the era of ideological, military and industrial confrontation the humanity had never a chance to experience before; a confrontation used to be known as the Cold War with its iron curtain, unprecedented arm race and the support of various regimes including those which built their state doctrine on the ideology of terrorism.The political map of the post-war Europe was divided into two political camps, a pro-Soviet Eastern alliance and the Western Europe exhausted by the bloody war. The natural disasters of 1947-1947 ruined the agricultural infrastructure of some European countries. Especially damaged was transportation infrastructure, as railways, bridges, and roads had all been heavily targeted by air strikes, while much merchant shipping had been sunk.By and large the small towns and villages in Western Europe had suffered little damage, but the destruction of transportation left them economically isolated. None of these problems could be easily remedied, as most nations engaged in the war had exhausted their treasuries in its execution. With the formation of the confronting political camps the urgent political and economic actions were required first of all to reconstruct the economy of the countries opposed to the pro-Soviet block and secondly, to restrain the further expansion of the Soviet Union in Europe.The Marshall Plan (from its enactment, officially the European Recovery Program (ERP)) was the primary plan of the United States for rebuilding the allied countries of Europe and repelling communism after World War II. The initiative was named for United States Secretary of State George Marshall and was largely the creation of State Department officials, especially William L. Clayton and George F. Kennan. 1 In fact the Plan was offered to the Soviet Union if it accepted certain conditions like the changes in the political system and the outer control.It was understood that the conditions suggested by the US Administration would never be accepted by the Soviet rulers. The general idea of the Marshall Plan presupposed the elimination the tariffs, close economic integration and it could be said that the Plan was the beginning of the Euro integration process which is taking place nowadays. The attitude towards the idea of the European reconstruction was rather controversial in America. First of all such foreign policy was new for the United States and changed the foreign policy of the pre-war isolationism.At the same time the lessons of the WWII showed that the global security could not be provided under the isolationism doctrine. The State Department under Harry S. Truman was dedicated to pursuing an activist foreign policy, but the Congress was somewhat less interested. Originally, it was hoped that little would need to be done to rebuild Europe and that the United Kingdom and France, with the help of their c olonies, would quickly rebuild their economies.By 1947 there was still little progress, however. A series of cold winters aggravated an already poor situation. The European economies did not seem to be growing as high unemployment and food shortages led to strikes and unrest in several nations. In 1947 the European economies were still well below their pre-war levels and were showing few signs of growth. Agricultural production was 83% of 1938 levels, industrial production was 88%, and exports only 59%. 2It was the objective reality that the United States was the only country the economy of which was not seriously damaged by the war and the bipolar nature of the post WWII world needed some action restraining the Soviet influence. The ruinous effect of the WWII was the fertile soil for spreading the Communist ideas and consequently the influence of the USSR which was not limited by the ideology only but by the growing military, political and economic presence.On June, June 5, 1947 Se cretary of State George Marshall gave the address to the graduating class of Harvard University in which he stated the preparedness of the United States to give the aid to European countries. The most important provision of the speech was that the Europeans should create their own plan of the economic reconstruction and the United States would finance such reconstruction. UK and France considered it necessary to invite the Soviet Union to join the European program of the post war reconstruction.Such appeal to Stalin would exclude possibly hostility from the USSR on one hand but on the other hand it was clear that the USSR would never accept the offer because the Cold War had already started by that time by the Soviet leaders. The major reason the aid was rejected by the Soviet rulers was that the Plan presupposed the creation of the unified European economy which was incompatible with the command economy of Soviet socialism. The US Administration considered the global economic stabi lity to the guarantee of the political stability and security which was stated in Marshall Plan Speech in Harvard.â€Å"It is logical that the United States should do whatever it is able to do to assist in the return of normal economic health in the world, without which there can be no political stability and no assured peace. Our policy is directed not against any country or doctrine but against hunger, poverty, desperation and chaos. Its purpose should be the revival of a working economy in the world so as to permit the emergence of political and social conditions in which free institutions can exist†. 3The position of the Soviet Union and it allies towards the Marshall Plan was rather predictable. Soviet rulers considered the Marshall Plan to be an attempt to destroy the Soviet domination in the Eastern Europe. The USSR allies influenced by the USSR, Poland and Czechoslovakia rejected the offered aid. Finland also declined in order to avoid antagonizing the Soviets. The So viet Union's â€Å"alternative† to the Marshall plan, which was purported to involve Soviet subsidies and trade with eastern Europe, became known as the Molotov Plan, and later, the COMECON.4 Some scholars consider the Marshall Plan to be a milestone and even a starting point on the long term global confrontation known as the Cold War. â€Å"Our analysis of the Marshall Plan will show that it was American policies as much as (and perhaps more than) Soviet actions that finally led to the division of Europe and thus to the Cold War itself. Many historians will feel uncomfortable with this conclusion; and it is certainly not a point of view that is popular with American historians, especially now. Nor should this much surprise us.After all, the Marshall Plan has always tended to receive favorable reviews within the United States—partly because few appear inclined to think critically about an act of generosity involving something close to $13 billion;19 partly because in the context of 1947 the Marshall Plan stood in sharp contrast to its shrill predecessor, the Truman Doctrine; and partly because of the huge reputation of George Marshall, whose role in the Marshall Plan was commemorated by the British government with the scholarships that still bear his name. †5Cox and Kennedy-Pipe suggest that the Marshall Plan was one of the major reasons of the division of Europe and it led to the Cold War. But this approach looks like that which is a little bit simplified. The confrontation of the USSR and USA was unavoidable no matter what political processes took place in the post WWII globe. First of all the confrontation was originally programmed in the ideological difference of the two systems. Nowadays we can observe the nominally Communist China and Vietnam integrating in the world market economy.The modern economies of China and Vietnam have nothing common with the traditional communist command economy. It could be said that the ideological basis of the modern China and Vietnam contradicts completely to the traditional communist approach to economy when the market and the competition according to classics of Marxism-Leninism are aimed to exploitation of the working class and prosperity of the ruling class. Nobody knows what kind of confrontation would be if the Marshall Plan were not introduced.One of the possible scenarios could be that the Europe remained in ruins, Soviets gained the unlimited influence and the greater part of Europe would get involved into the crazy arm race without any restrictive factor which would lead to the new global conflict. The Marxian ideologists interpreted the Marshall Plan as the manifestation of the US neo-colonial global policy. â€Å"US imperialism has never had need to operate in the traditional manner of the British, French or German imperialisms. These countries had to acquire direct political possession of the colonial areas in order to control, subjugate and exploit them.American imp erialism, with its overwhelming capacity to produce, has always used economic penetration as its main weapon of gaining economic and political control over another country. †6 The American Marshall Plan was heavily criticized both in the United States and abroad. The opinions ranged from â€Å"the betrayal of the American interests† to â€Å"the attempt of global domination† but there was no any reasonable alternative suggested. The political aim of the Marshall Plan as it was stated above was to restrain the Soviet expansion and influence in the post War Europe and the entire world.The United States and the USSR were two global superpowers which defeated the Hitler block. At the same time as it was stated above they have basic system ideological differences which in their essence were incompatible. The United States and the USSR were destined to confrontation due to such differences. The first post – war political initiative of the USSR was the creation o f the pro-Soviet block in Europe. Germany, Italy and Japan were destructed and demoralized to oppose the growing Soviet influence. The spread of the Soviet influence created the real threat to the entire world.What is more, the situation looked like paradox because the United States assisted to strengthen the position of its ideological opponent in the world. Due to its geopolitical position the United States could not provide the symmetric political presence in Europe. The Great Britain ran its traditional isolationist policy. France was not economically and politically strong enough to oppose the Soviet influence. â€Å"If Russia came to control Europe and Asia, this control could be founded only on communist dictatorships maintained against the will of the majorities of the peoples.The mere existence of a great free country like our own, to which anti-Soviet forces could gravitate, would then be a major danger (even more than it is today) to the security of the Soviet political structure. For this reason, the Russians would inevitably focus the full force of their economic and military power upon the destruction of our society, with a view to establishing here a regime subservient to themselves which would make no further trouble for them. They would hope that in this way the conscience of the world could be finally silenced†. 7Such attitude towards position of Russia was a little bit exaggerated especially when Mr. Kennan said about the direct Russian aggression against the United States but still it indicated the real threat of Russian influence in the world. It is worth reminding that Mr. Kennan spoke about the Soviet threat to American society in 1948 when there were only two dominating military and political forces in the world, the USA and the USSR, one of which started forming the military and political block risking the superpower global balance. It is worth noting that the initial confrontation of the superpowers was the battle for minds.The Europeans with their destructed economies had the options to choose either the ideology of Communism with its dictatorship and command economy or find the way to rehabilitate their post-war economies on the basis of free market and the United States entered this battle for the sake of the Europeans. The post-war situation is similar to that of nowadays when the United States faces the problem of battling the global terrorism including the economic measures. As Gordon O. F. Johnson notes â€Å"Today we are fighting for the minds of those throughout the world who are inclined to support and sympathize with international terrorists.Just as the aim of the Marshall Plan was to â€Å"drain the swamps† where communism was drawing support, so we today must â€Å"drain the swamps† where international terrorism recruits and draws its support. †8 The outcomes of the Marshall Plan are of great significance for Europe and entire world. The most important of them is that the United States and the civilized community introduced and implemented the unprecedented tool of collective reconstruction. It is worth mentioning that the post-war European economies were rehabilitated by the Europeans themselves with the assistance of the United States.The essence of the Marshall speech at Harvard was that the European countries were supposed to reconstruct their countries themselves and the United States was not supposed to interfere into this process. That is, the United States provided only the tools for reconstruction without imposing any dictatorship. Another important outcome of the Marshall Plan was that the former enemies in the World War II succeeded to join their efforts in building the new Europe taking away the political, economic and ideological disagreements of the former enemies in the bloodiest war of the human history.The Marshall Plan apart from its economic value became the factor consolidating Europe. â€Å"The objective of the Marshall Plan wa s not to solve the problem of poverty by handouts and welfare systems, but rather to foster successful enterprises which would create productive jobs with a genuine future. Jobs and a strong middle class were key to fighting communism. They were key for Europeans to rebuild from the rubble and offer hope for their youth who were the most susceptible to the message of international communism. †8The history of the mankind knows a lot of examples when the political and economic actions were imposed from outside. The Marshall Plan gave the brilliant example when the effective assistance program had the local character. It was taken as fair and sincere action because of its transparency and the complete lack of the outer dictatorship. It had a great ideological value as well indicating that people of the countries which were completely destructed by the devastating war were able to rehabilitate their economies and rebuild their home countries. Citation 1. Wikipedia 2. Ibid 3.Text o f the Marshall Plan Speech 4. Wikipedia 5. Cox and Kennedy-Pipe 6. Homer Paxon 7. George F. Kennan 8. Gordon O. F. Johnson 9. Ibid Bibliography †¢ Marshall Plan, Wikipedia, available at http://en. wikipedia. org/wiki/Marshall_Plan#searchInput, retrieved 9. 11. 2006 †¢ Text of the Marshall Plan Speech, available at http://www. marshallfoundation. org/marshall_plan_speech_harvard. html#top, retrieved 9. 11. 2006 †¢ Cox and Kennedy-Pipe, The Tragedy of American Diplomacy? Rethinking the Marshall Plan, available at http://www. polisci. ucla. edu/faculty/trachtenberg/cv/jcws(marshall%20orig). pdf, retrieved 9.11. 2006 †¢ Homer Paxon Marshall Plan: Road to Conquest Analysis of the American Way of Imperialism, From New International, Vol. 14 No. 5, July 1948, pp. 138-143. , available at http://www. marxists. org/history/etol/newspape/ni/vol14/no05/paxon. htm#top, retrieved 9. 11. 2006 †¢ George F. Kennan on the Strategic Background, available at http://www. marshal lfoundation. org/marshall_plan_information. html, retrieved 9. 11. 2006 †¢ Gordon O. F. Johnson, Lessons for Today from the Marshall Plan, CIPE. ORG Feature Service: Technical Paper Series January 2002, available at CIPE. ORG, retrieved 9. 11. 2006.

Friday, November 8, 2019

Tree Disks and the Cross-Sections of Tree Limbs, Trunks

Tree Disks and the Cross-Sections of Tree Limbs, Trunks For those of you who dont know what a tree cookie is, a  tree cookie is a sliced portion of a tree trunk or limb that can show each and every annual ring on a viewable plane. A tree cross-section disk or cookie can be one of the best botanical teaching aids to kids and adults on things happening in a tree and environmental effects on trees. It is especially effective visually in conifer specimens and more specifically pine. Finding the Perfect Tree Cookie Selecting a tree species that shows well is important when showing annual ring structure. Species that display visible dark annual rings are pines, spruces, cedar, and firs. Conifers used as Christmas trees are great for this if you use a real tree over the holiday. The wood is soft, easy to cut, and sand, and always displays nice rings. Deciduous or broad-leaved trees can show nice rings by cutting their thick faster-growing branches (that also contain annual rings). Best trees for branch collections are oaks, ashes, maples, elms, cherry, and walnut. Trunk slices from these trees are often too large for display where rings are usually too tight and light to easily count. The best tool for quickly felling a small tree is the standard curved large tooth pruning saw. A pruning saw will make quick work on a small trees base or when cutting larger branches. At this point, you need to make a decision on whether to cut the cookies without drying or dry larger poles for cutting cross-sections later. These poles should be cut into four-foot segments with no end less than 2 inches in diameter. The ideal slice size for quick production and use for a classroom is about the diameter of a soda can. Slice the logs into cookie segments between 1 to 2 inches thick. Use the same pruning saw or, for a fine surface, use a motor-driven saw such as a radial arm saw. Drying Logs in a Kiln or Under Sheltered Storage Kiln-drying short poles can be a more involved step to carry out but make for a much better tree slice specimen. A sawmill yard supervisor can dry your tree cookie logs in days using their lumber kiln. These logs will be sufficiently dry, feel much lighter and easier to cut with little to no chance of cracking. If you have time and a space you can set the logs in a dry, well-ventilated place for about a year. Drying Cookies From Green Trees Drying cookies cut from green trees is critical. If the sections are not dried properly, they will attract mold and fungus and lose bark. Store your cut cookies in a dry, well-ventilated surface under low humidity for three to ten days. Turn them over daily to allow both sides to dry. Placing them on a driveway on a sunny day also works. Cracking is a major problem if the cookie is not dried over sufficient time with adequate ventilation. Getting the perfect â€Å"uncracked† cookie is a challenge, and the best way to prevent cracking is to cut cookies from a dried, not green, log or branch. Remember that the smaller the cookie, the less likely cracking will occur. Try cutting cookies from dried limbs, as the grain is often tighter in the limbs than in the main stem. Curing Cookies Using PEG Good preserving with less cracking results when you soak fresh-cut green cookies in polyethylene glycol (PEG). PEG draws the water out and replaces it with the PEG, which is a waxy material with excellent wood stabilizing properties. It also is not cheap and should be used primarily for your best specimens. The disks from fresh-cut wood should be wrapped in plastic or immersed in water to keep in green condition until they can be treated. The PEG soaking time to obtain sufficient penetration against splitting and checking depends on the solution, the size, and thickness of the disks, and the species of wood. One month is usually sufficient soaking time and there is a drying time also associated.

Tuesday, November 5, 2019

Making the Most of Palindromes

Making the Most of Palindromes Making the Most of Palindromes Making the Most of Palindromes By Guest Author Anyone can come up with a list of palindromes. The real challenge is to use them intelligently in published writing. Can a writer incorporate palindromes (words or phrases that read the same backwards and forwards) in any meaningful and credible way? Or will they remain nothing more than amusing stand-alone oddities? Here are five suggested uses for palindromes in fiction writing: 1. Place them in the mouth of a social misfit. Anyone who quotes palindromes incessantly in real life (â€Å"Go hang a salami, I’m a lasagna hog†) is clearly a person to be pitied. Waiting their moment to spring their new-found witticism upon the unsuspecting audience (â€Å"We panic in a pew†), the palindrome bore will never create one of his own and is always oblivious to the drooping eyelids on his hapless victims. If your novel contains such a nerd, stick a palindrome or two in his mouth and let your readers wince. 2. Use in crime or supernatural genres as a means of filling out a character’s profile. A serial killer who leaves palindromes as his calling card, for instance, may be more memorable than one who merely cuts a lock of the victim’s hair. â€Å"Borrow or rob† seems a possible option for such a criminal. Or, perhaps, â€Å"Dennis and Edna sinned†, for a nasty double murder. 3. Incorporate into historic works especially those set in the ancient world. Both Greek and Roman cultures used palindromes. The Sator Square, for instance, confounds scholars to the present day, with over fifty published books or academic articles seeking to explain this four-ways Latin palindrome: ROTAS OPERA TENET AREPO SATOR The words literally mean, â€Å"The farmer Arepo uses his plough as his form of work†, and have been discovered etched onto several Roman buildings across Europe. Some have suggested that the graffiti is evidence of an early Christian household the letters, stretched out, make the phrase PATER NOSTER (â€Å"Our Father†) in the shape of a cross, with a spare A and O (representing Alpha and Omega). Alternatively, it has been described as a piece of magical incantation, used in Greek-inspired mystery religion. The word Abracadabra was used in a similar way in the second century as a triangular chant believed to posses healing properties. Whatever the meaning, the graffiti shows that palindromes were part of the culture of the classical civilizations. Writers locating their stories in those worlds could do worse than slip in the odd back-to-front phrase   if they can create or find one. 4.   Throw into a comedy, or use as part of a comic interlude. Hammy, Pythonesque work may best suit a character tasked with the immortal lines, â€Å"Satan, oscillate my metallic sonatas†, or, â€Å"Ten animals I slam in a net†. Perhaps a suitable palindromic name (Mike Kim, for instance) might also be appropriate for this individual. 5. Create palindrome poetry. We are indebted again to the ancients, who occasionally came up with such verse. Greek, Sanskrit and Hebrew palindromes have all been discovered mostly in the form of proverbs or short poems. Surely, the mother of all niche literature would be to publish your own palindrome poetry, create the blog and monetize the experience through a palindrome product store. Mugs engraved with â€Å"A nut for a jar of tuna† (and your logo) are guaranteed to enliven any office. Perhaps not. The challenge for the palindrome poet, of course, is to get beyond the one-line Napoleons Lament, â€Å"Able was I ere I saw Elba.† The English languages first full-length palindrome novel would, of course, take the art form to the ultimate level and ensure that the writer’s memory would never fade. A reviewer of such a ground-breaking work may, themselves, be tempted to lapse into palindromic praise: â€Å"Are we not drawn onward, we few, drawn onward to new era?† Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Fiction Writing category, check our popular posts, or choose a related post below:Good At, Good In, and Good With"Certified" and "Certificated"While vs. Whilst

Sunday, November 3, 2019

Feasibility Study to explore the potential viability of a business in Coursework

Feasibility Study to explore the potential viability of a business in the UAE - Coursework Example Feasibility Study to explore the potential viability of a business in the UAE Essentially a feasibility study intended to explore the viability of a business idea or entity involves various considerations.The intended feasibility study revolves within the tourism industry. This paper intends to consider venturing in hospitality section in one of the Emirates in the United Arab Emirates (UAE). This is a service industry that will offer all the hospitality services in a 3- star hotel, particularly to tourists both home-based and international (NEYADI, 2002). Hospitality industry in the UAE is one of the competitive ventures. Both the local and global investors have for the past decade invested in this industry, and have continued to sustain the market trends in service delivery and client satisfaction. United Arab Emirates The coverage and vastness of how much the United Arab Emirates has developed in almost all sectors of economy, primarily in the last decade is consummate, even ahead of the global standards (MAHMOUD, 2012). This incredible growth in political, social and economic sectors has put the United Arabs Emirate in the international chart as one of the cutthroat commercial centers in the world. The UAE is situated in the East of the Arab globe. It stretches to the Gulf of Oman and to the North of the Arabian. UAE has an area of 83,600 km2. The area has plentiful islands. Sand dunes, isolated oases, and extensive deserts characterize the region. Abu Dhabi is the largest of the Emirates. It has an area of 67,300Km2, followed by Dubai with 3,900Km2 and Sharjah occupy an area of 2,600 Km2 (NEYADI, 2002). A federation of seven Emirates formed the United Arab Emirates in 197. The emirates include Sharjah, Ras Al Khima, Dubai, Ajman, Abu Dhabi, Fujairah and Umm Al Quwain. The political structure The UAE observes distinctive leadership. It has no legal political parties. The supreme power rests with the seven heritable Emirs sheikhs. The President who is the commander in chief heads the Armed forces. The prime minister heads the defense ministry and he is the ruler of Dubai. Rulers administrate the other emirates. The Federal National Council, which was formed in 1972, is the UAE parliament (MAHMOUD, 2012). The FNC is presumed as the milestone of the federation’s legitimate and legislative process. The FDC is accountable in advising the cabinet arm of the government and the supreme council. However, the FNC has no jurisdiction to take precedence over the arms’ decisions. The principal function of the council is to offer administrative and lawmaking roles as stipulated by the constitution. The UAE was founding associate of the (GCC). The Gulf Cooperation Council (GCC) members include UAE, Qatar, Bahrain, Saudi Arabia, Kuwait and the Sultanate of Oman. This kind of leadership has continually provided a stable political environment, which is conducive for investments. Economic trend Political stability has contributed immeasurably to the economic growth attributed to primary sectors of the economy. Some of these sectors include tourism, agriculture oil and gas. The UAE’s GDP has continually grown due to the unremitting political stability (MAHMOUD, 2012). The consequent economic stability is the significant factor for both home and global investors. It is essential to note that, the projected 3-star hotel and resort stands a better position in developing at a high rate due to the well- established financial backdrop based on sound economic ethics under the management of sound institutions (NEYADI, 2002). The social patterns in relation to the UAE population The UAE’

Friday, November 1, 2019

Financial Appraisal Essay Example | Topics and Well Written Essays - 500 words

Financial Appraisal - Essay Example For ARR, the formula is also simple and easy to understand. However, it neglects time value of money and focuses on profit instead of cash flow. When calculating the NPV in public sector projects, additional factors should be taken into considerations. Because it deals with the public sector, the analysis should go beyond financial to measure the social costs and benefits of the project. For example, even if the project is financially feasible and will yield returns, negative externalities such as pollution should also be taken into account. It should be noted that a governmental institution and the public sector is not a profit maximize but is focused in bringing the highest level of social welfare. Post audit appraisal is essential at the end of the life of the project in order to assess if the initial goals or projections have been adequately met. This also measures the level of understanding of the company in projecting the future of a project. Through post-audit appraisal, the company can evaluate itself on why projections did not materialize. The learning from post-audit appraisal will enable the company to apply it in future project evaluations.