Wednesday, July 31, 2019

Individual Privacy vs National Security Essay

Introduction Since the terrorist attack of 9/11, America has been in a high level conflict with terrorist around the world, particularly the group known as Al Qaeda. There has been many discussions within the U.S. Congress about the measures of how to effectively combat this organization and their members, here and abroad. Consequently, the issue of individual privacy vs. national security has generated discussions within the civilian and government sectors. To date, the discussions continues with many private citizens who feels they are constantly losing their privacy , when will it end, and how long will it continue. In this report, it will discuss where privacy issues began and where the public see individual privacy vs. national security come together in its most recent society. Do the public succumb to total governmental control, or do they propose continued debate in the nation’s process of the national security process. There are always two sides of a story, the pros and cons, the laurels and pitfalls, or the good and the bad, and for the public, it has to decide which side in each of these is the right side it feels is the best possible side to be on. One hand, national security is decided by the government to protect its citizens, by the measures it puts into place it feels is necessary, and what duration these measures will be in effect. On the other hand, the level of security and safety is set without discrimination to all. This results in the dilemma of the battle between individual privacy versus national security issues, that are essential to the individual, the public, and government. The Claim: What privacy should an individual lose to protect against terrorist because It gives society a level of feeling protected by the protections in place. The public can only maintain a limit of safety by giving up a degree of privacy to governmental agencies in order to protect this basic need; and it is a trade off to give up a certain amount of privacy, but not complete privacy. Justification of Claim: The justification of the claim is that it is prudent and the right of the public to debate the process of privacy, which the public has come to rely on for many years. Even though limited under the constitution, privacy rights and national security is important to the country’s citizens on all levels of government. The Bill of Rights is the area where citizens’ rights are specified, and over the years of war, and specifically after 9/11, citizens have seen and felt an erosion of their rights. Constitutional protections of individual rights not expressed specifically by the Bill of Rights is being at best controversial, (Linder 2012a). Many originalists, including most famously Judge Robert Bork in his ill-fated Supreme Court confirmation hearings, have argued that no such general right of privacy exists. The Supreme Court, however, beginning as early as 1923 and continuing through its recent decisions, has broadly read the â€Å"liberty† guarantee of the Fourteenth Amendment to guarantee a fairly broad right of privacy that has come to encompass decisions about child rearing, procreation, marriage, and termination of medical treatment. Polls show most Americans support this broader reading of the Constitution, (Linder 2012b). Looking forward under this decision, each citizen relies on its government to maintain a fair level of protection and security as well as maintaining a balanced level of privacy. The justification for this claim shows how the rights of individuals is a must, within the American society, compared to the national security of the country’s territory and a balanced approach it must give to its people within previous rulings. Individual Privacy vs. National Security After 9/11 a set of laws was set in place to protect us from Terrorism and terrorist attacks and placed under a new governmental act called the Patriot Act. With the past occurrences of 9/11, with the airlines planes crashing into the twin towers in New York City, and the Pentagon, it was not hard to convince the public this action was not needed. The residing administration presented stacks of follow-up attacks to Congress from experts and officials on a daily basis with grim pictures or scenarios of possible attacks on nuclear facilities, schools, shopping centers, and  others alike, that the public saw measures in place as acceptable and adequate, (Downing 2008a). Downing further states; Americans have seen their privacy and other rights curtailed in previous wars but the present-day privations are unfounded only in the duration of these rights. Just how long will the duration of war on terrorism and rights last, it has already lasted longer than any other US wars. Further sources of concern to the public, are the rich array of devices and techniques of the government, such as improved computer programs, databases, and surveillance gear, never before used in previous wars and never devoted as resources to any state or its partners. What if any remedies are there in the political system in the privacy of individuals versus national security protections and concerns? The courts have narrowed away some of the concerns, but the bulk of these powers, many of them are still persisting. Congress has been hesitant to amend passing the Patriot Act and its follow-ups, due to fear of being labeled unpatriotic, but also for fear of being blamed for further terror attacks. So far, no president or presidential candidate will probably seek to curb the purview of the Committee on the public safety, nor hardly mention future changes. Privacy, like its colleague individualism, has been in decline anyway †Ã¢â‚¬Å" putting up only token resistance here and th ere against mass society, a corporate-based economy, and relentless bureaucratization. So perhaps the war on terror requires us to bid a fond adieu to privacy and send it off to government bureaus for safekeeping. They broke it, it’s theirs (Downing, 2008b) According to laws enacted by the government after recent terrorist activities, it has the right to eavesdrop on telephone communications, monitor online communications of suspects, and incorporate surveillance on anyone it feels is a threat. With recent attacks upon American soil and the loss of thousands of lives, law enforcement agencies have asked for broader and pervasive laws to counter security challenges. Some have asked if these changes will impact the privacy of its citizens, and indeed over the years, history has shown the rights and liberties of citizens have been curtailed and in some instances revoked completely. One example, during World War II 120,000 Japanese Americans were forced into internment camps. Nowhere in the U.S. Constitution is there a harmonization-of-laws guarantee, by definition (An adjustment of differences and inconsistencies among the difference of  measurements, methods, procedures, schedules, specifications, or systems to make them uniformed to or mutually compatible with). In 1803 Chief John Marshall said in his opinion Marbury v. Madison, the Supreme Court is the final arbiter of â€Å"what the law is.† 2003 Tracy Mitrano Marshall also stated, that settling the duties of inconsistencies, disharmonizations, and contradictions falls to the duties of the Court, which in its practices, means that many such problems may go unaddressed for years and some of the controversies may never be resolved. Complications and constitutionally are thought of as checks and balances, and the cost of checks and balances systems are weighed in confusion and consternation and capricious that have the appearance of resolving conflicts once and for all. Before we go deeper into the analysis of the legislation, let’s examine the following terms of privacy and security. The American Heritage Dictionary defines privacy as secluded from sight, presence or intrusions of others, confined to one person. There are those who have pointed out that nowhere in the constitution the word privacy appears. The word security comes from the Latin word Securus, meaning carefree. Definitions of security begin with freedom from danger, risk, harm, etc. No matter what measures are taken to assert security, no one should think the outcome would mean complete freedom. Notice how the definition of the word security, implies that its function is as the means to quality, freedom, no less and not as an end to itself, as balance is the key. The American history provides us a variety of examples of how that balance has shifted over time. The Alien and Sedition Acts of the 1790s were the first example of a federal law believed to have thrown off the balance in favor of security over civil liberties, designed to silence and weaken the Democratic-Republican Party by the Federal P arty. To protect the new United States from an antagonistic French Revolutionary government as legal devices over the Naturalization Act, that actually backfired, ensuring the Revolution of the 1800’s to expire. This episode stands as a lesson of federal legislative overreach-political impulses of legislation touted as patriotic and necessary for national security, and the dissolving of the Federal Party. The internment of the Japanese, remains the opposite of Roosevelt’s emergency measures, which were the most shameful of all mistaken emergency legislative measures. As in each case of emergency legislation that protects national security, it also  curbs civil liberties and must be interpreted in context of a very complex history. Acts and organizations such as FERPA, HIPAA, and FSMA shares the purpose of preserving the privacy of records in keeping with the foundational tenents of fair-information practices. These fair-information practices are as such are transparency, relevancy, the ability to correct records, institutional obligations to maintain records of disclosures and provide notice to subjects, and finally, the security of those records. Dealing with paper records years ago, under FERPA regulations, colleges and universities now are struggling with the task of bringing electronic security up to the same level of confidentiality and availability. Due to the creation of IT security programs-which include policies, procedures, guidelines, risk assessment, and education/training-corresponds to new legal developments such as FMSA and HIPAA, which raises the specter of liability, legal requirements should also come as an encouragement for IT professionals. Intrusion-detection and -response plans require leadership, articulated practices, enforcement polices, and education within the campus communities, all of which relevant hardware and software as well as highly trained personnel to address these matters adequately and professionally. Sharing-of-information legislation, under national security, such as the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (the USA- Patriot Act) and the Homeland Security Act pulls in a direction contrary to privacy legislation. It is the longest piece of legislation of emergency legislation, well over a hundred pages, passed in the shortest time period, in all American history. It comes with three overall goals: (1) to enhance government to government information sharing (by lifting regulations that had monitored law enforcement relations between federal, state and local authorities, (2) to allow government surveillance and encourage private entities to share information with the government (by alleviating legal liability); and (3) create and expand existing criminal law design to fight terrorism (by adding specific provisions and expanding the definition and powers of existing legislation. So vast is the reorganizatio n of the federal government under this act , the implications have yet to be spelled out. But there are two are already along with, the Student and Exchange Visitor Information System (SEVIS) program, which requires every college and  university to report, abuses and fraud crimes, specifically allowing the death penalty for any abuse, (i.e. hacking) that results in serious physical injury or death. The second is the goal of the USA-Patriot Act-government surveillance and these two aspects of the Homeland Security Act have the most direct impact on scholarship and research, libraries, and IT resources in higher education. (Tracy Mitrano, 2003) Further in notations of privacy and national security, (Bajaj and Austen 28 Sep 2010) report, the United States and law enforcement and security agencies have raised concerns with new proposals electronic powers to track terrorist and criminals and unscramble their encrypted messages through e-mail and other digital communications. Officials from India have also stated they will seek greater access to encrypted data sent over popul ar Internet sources such as Gmail, Skype and other sources such as private networks that allow users to bypass traditional phone line links or logging in to remote corporate computer systems. Some have said that India’s campaign to monitor data transmissions within their borders may hurt other important national security goals: by attracting other global businesses and becoming a hub for technology innovations. In another report by, (Kandra, Anne; Brandt, Andrew; Aquino, Grace Jan 2002) Federal legislation passed in October gave investigators more tools for apprehending terrorists. Proponents of the law said it was needed to protect ourselves. Opponents said it will threaten our constitutional rights. But whatever position you take on these issues, it is important to know how the new laws will affect everyone’s lives online. They continue to report, the Patriot Act is complex and powerful, and it also broadens the definition of terrorism and increases the penalties for the crime of terrorism. Some of the more drastic changes in the law involve electronic surveillance. The act allows federal investigators to implement more powerful tools to monitor phone call s, email messages, and even Web surfing. What are the implications of this new type of surveillance for your Internet privacy? It is difficult to say exactly. The Patriot Act is vague on many key points, and understandably, law enforcement officials are not eager to show details about tools like the controversial Internet surveillance system, DCS1000 (and more commonly recognized by its previous name, Carnivore). â€Å"One of the biggest issues with Carnivore is that we don’t really know how it works,† says Ari Schwartz, associate director of the  Center for Democracy in Technology, a nonprofit group based in Washington, D.C., that focuses on preserving privacy and civil liberties on the Internet. What are the implications of this new type of surveillance for your Internet privacy? It is difficult to say exactly. The Patriot Act is vague on many key points, and understandably, law enforcement officials are not eager to show details about tools like the controversial Internet surveillance system, DCS1000 (and more commonly recognized by its previous name, Carnivore). â€Å"One of the biggest issues with Carnivore is that we don’t really know how it works,† says Ari Schwartz, associate director of the Center for Democracy in Technology, a nonprofit group based in Washington, D.C., that focuses on preserving privacy and civil liberties on the Internet. It is probably a fair assessment to say that joking when sending an e-mail about planting a bomb is not very good idea these days, and researching biological terror techniques over the Internet is not conceivably a good idea which would also draw suspicion. (Kandra et al., Jan 2002) Under the Patriot Act Amendments, the FERPA Act has a health and safety exception. It is well known to students and administrators, who invoke it to look at a student’s record in the case where a student is missing and police hopes to find clues to the student’s disappearance from their e-mail. The Patriot Act added a new terrorism exception design to protect the health and safety of everyone e lse. It is worth noting the broad definition of domestic terrorism, meaning activities that involve dangerous acts of human life, that are in violation of the criminal laws of the United States or any state, that appear to be intended to intimidate or coerce a civilian population or individuals, influence the policy of a government by intimidation or coercion , or affect the conduct of a government by mass destruction, assassination, or kidnapping and occur primarily within the United States. Within the principal of the Homeland Security act, its job is to reorganize a significant amount of the federal law enforcement and immigration and naturalization bureaucracy under the roof of one central agency, which grew out of concern that compartmentalization federal intelligence and law enforcement structures did not permit adequate study and intelligence and warning. The Homeland Security Act has already had a noticeable impact on immigration. The Student and Exchange Visitor Information System (SEVIS) a mandatory government issued program that tracks  the whereabouts of visiting foreign students attending colleges and universities. The concept is nothing new, as there were widespread disuse of bureaucratic disorganization from within the INS. The Patriot Act echoed the existing INS laws to require mandatory reporting and enforcement, and the Homeland Security Act passed on the baton. Civil privacy legislation that includes security legislation such as FERPA, HIPAA, and FSMA should be the rule. National security information sharing and anti-terrorist legislation, such as the USA-PATRIOT Act and the Homeland Security Act—should be the exception. With the USA-PATRIOT Act divergence from traditional constitutional standards, there have been many people who are concerned that the exceptions may soon swallow the rule. Tensions between these two types of legislations speaks to the more general concern of the American society at large, about a reduction of privacy overall, whether caused by changes in the law, in social norms, or in the very nature of information technologies. Even today with new technology its task has grown and evolved in recent years, and over the past three decades, the challenges have grown to protect individual and personal privacy, and to curb privacy violations. In general, several surveys and polls that were taken seem to suggest that the public feels there has been a loss of privacy and intrusions and the backdrop behind these new proposals could potentially impact privacy and civil liberties on a greater scale. Analysis from an ethics point of view, there are major concerns under national debate on tensions between privacy and security. Below are the following measures of security being proposed and public, personal and privacy issues under consideration. 1. Stricter security measures at airports, ports, points of interest in the U.S., and gathering places such as stadiums, and other large mass venue, (A) Extensive checks of baggage, personal searches and vehicles, (B) Intensive custom and immigration checks, (C) Restrictions within airport areas and certain public places, (D) Additional spot searches and personal property checks in key public areas, (E) Increased surveillance and monitoring of movements in key public areas. 2. Detailed, accurate identification and verification of identities and background,. (A) Mandatory issuance of national identity cards for all people, (B) Increase use of facial profiling systems for assessment of potential suspects. 3. Increased surveillance of all communities. (A) Monitoring via Internet  (‘Carnivore’}wireless, wire-lines, satellite, etc., (B) Broader wiretapping powers, (C) Broader (and possible indefinite) detention, arrest, and asset seizure powers, (D) Authority for blanket searches, secret searches, (E) Website activity monitoring and data collection, (F) Access to personal and business records of all kinds. 4. Tighter immigration laws to screen immigrants/visitors more thoroughly, (A) More thorough screening of credentials and backgrounds of visa applicants, (B) Tracking of movements of immigrants and other visiting foreign nationals through databases. (Krishnamurthy, 2001a) CRITERIA FOR ETHICAL DECISION-MAKING: (See additional charts posted be low by Krishnamurthy). POSSIBLE ACTIONS The proposed increases in security measures may be beneficial for the good of everyone if implemented in an impartial manner regardless to race, ethnicity, religion. Accountability and transparency in law enforcement procedures, especially on privacy issues must continue to be preserved, despite recent attacks. The judicial system must be empowered to deal effectively with all abuses of proposed security measures with regards to protecting the constitutional rights and liberties of all its citizens. It must also ensure anyone accused has adequate legal representation and a fair chance to prove their innocence. Ensure that the current atmosphere of rich ethnic and cultural diversity environment of the country with one another is not compromised. 1. Assess that this is a real and tangible problem we are facing. 2. If so, can it be handled without impacting/violating privacy at all. 3. If not, can it be handled by making it as less intrusive as possible. There are possibilities that additional lengthy investments for public infrastructure needed to be made nationwide to expand capability of existing systems or newly incorporated systems to handle the challenges. 5. VIRTUES APPROACH GOALS: A focus on individual development of virtues A thoughtful reflection on self-realization of human potential The developing virtuous habits and attitudes leading to ethical action throughout the communities. POSSIBLE ACTIONS An assessment of whether the proposed measures will reinforce positive virtues we hold important, such as our patriotism, self-sacrifice, compassion, patience and courage, or whether these options could harbor destructive traits leading to religious intolerance, less compassion, racism, fear, and suspicion. To impress upon more awareness through debates and discussions across the nation to distinguish religion from universal human values of peaceful co-existence, mutual respect, and non-violence, and  human dignity. To focus on cultivating tolerance, compassion and patience (Krishnamurthy, 2001c). The following abstract articles shows and or explains further privacy and security issues since the terrorism of 9/11/2001 put in place as part of measures private citizens may need to become accustomed to in their part of loss of privacy rights in their security of national security. Security and Privacy After September 11: The Health Care Example Abstract: The following article examines the collaboration between privacy and security in relations to the medical rule, issued in 2000 under the Health Insurance Portability and Accountability Act (HIPAA). Studies shows that the HIPAA stands up well to concerns of post 9/11 era. Affairs about public safety are met by current provisions that permit revelations to protect national security, to react to emergency situations, and to respond to law enforcement investigations. The article examines in particular detail the envisioned Model State Emergency Health Powers Act, sketched in the wake of the 2001 anthrax attacks. It has been argued by Professors Lawrence Gostin and James Hodge that this Act is justified by a new â€Å"model of information sharing† for medical information purposes. This article concludes that public health concerns are suitably addressed by the existing HIPAA rule, and that a â€Å"model of information sharing† sends completely the wrong signal about how the health system will handle issues of data privacy and security. More generally, the article investigates positions of â€Å"security vs. privacy†, where both values are antagonistic, and situations of â€Å"security and privacy†, where both values work together. (Swire and Steinfeld January 22, 2003) Civil Liberties vs. Security: Public Opinion in the Context of the Terrorist Attacks on America Abstract: This abstract article discusses, in the tradition of research on political tolerance and democratic rights in context, this analysis uses a national survey of Americans directed shortly after the September 11, 2001 attack on America to study people’s eagerness to trade off civil liberties for grander personal safety and security. We find that the bigger people’s perception of threat, the lower their endorsement for civil liberties. This  effect interrelates, however, with trust in government. The lower people’s trust in government, the less willing they will agree for a trade off of civil liberties for security, regardless of their perceptions of threat. It is known that African Americans are much less likely or willing to trade civil liberties for security than their counterparts of whites or Latinos, even with other circumstances taken into account. This may be their long-standing commitment of their struggles for human and civil rights. In matters of party issues, liberals may be less likely to trade off civil liberties than moderates or conservatives, but liberals tend to converge toward the position taken by conservatives when their sense of the threat of terrorism becomes high. While this is not a projection of the future, the results suggest that Americans’ commitment to democratic values is greatly dependent on other concerns and that the context of a wide-ranging threat to national or personal security can provoke a considerable readiness to give up rights. (Davis & Silver, 2003) Mobile cameras as new technologies of surveillance? How citizens experience the use of mobile cameras in public nightscapes Abstract: In surveillance studies using mobile camera technologies in public nightscapes, terms such as sousveillance and inverse surveillance define forms of surveillance that have a bottom-up and democratic character. On the other hand, in this paper this democratic notion is queried by looking into procedures and occurrences with both Closed Circuit Television (CCTV) and mobile cameras by Dutch citizens. By superseding in the nightlife district of the Rotterdami city centre, data has been collected on both mobile and CCTV camera confrontations. From this, an investigation is made into how mobile cameras are practiced in the Nightlife landscape. Comparing these practices with CCTV provides understanding into new surveillance issues that come into view due to the mobile camera. Analyzing surveillance technologies, provides prospective as hybrid groups, that may take different shapes in different places, and allows for involvements that attempts to improve our perception of current changes in the surveillance technology landscape. (Timan & Oudshoorn, 2012) The Spy in the Cab: The Use and Abuse of Taxicab Cameras in San Francisco Abstract: Since 2003 security cameras were required in San Francisco taxicabs. Their story has come to contain many features that are familiar to surveillance examinations. Their acceptability is explored of the trajectory using the concept of surveillance slack, and the stages and tensions where the line of use and abuse is has been drawn. The effectiveness of what the cameras are perceived to be doing, the integration of its use, and how the slackness or tautness of surveillance interacts in tension and conflicts. Since its first introduction, the new technology initial reaction was met with moral panic. This is just another element of privacy intrusion in the name of national security, the public now must adapt to. (Anderson, 2012) These abstracts are the several indications of elements put into place after the 9/11 Terrorist attacks in 2001. Privacy rights have eroded over the years since, by the US Government claims to protect its citizens. From cameras, in inconspicuous places, wire-tapping, and monitoring e-mail, and social sites, these are just a few of the acts we are controlled under. Needless to say, we may never see these laws or acts diminish anytime soon, so it is better to adjust now, and band together before further intrusions are brought upon society. My assessment of the information taken from this report is that the privacy rights we hold as individuals within the country are vague, although most Americans seem to think their rights are guaranteed by the U.S. Constitution . Although under the 14th Amendment a certain amount of rights has been guaranteed, even these rights can be limited by the powers of the U.S. Government, especially during a time of war, or other emerging acts. When you look at the broad powers of war, emergency acts, and even the powers that exists of the U.S. Congress, we can assume any privacy we hold true is basically up to the representatives we elect to represent us. We as a people of the republic come together when there are disasters, and acts of terror, and differs on many policies of the day, but what we have as collected group is the power of vote, and this power is what we can use to help balance the power of our existing government. The research of this paper was conducted using various sites concerning a  combination of privacy of individual citizens, versus the introduction of laws enacted by the US Government, since the terror attack of 9/11/2001. Taking in all the information collected, and analyzed, this report has been intended to show the privacy each citizen held before and after the attack. It comprised what the public has perceived as a given right, over what was actually allowed by law. Conclusion The Claim: What privacy rights should an individual lose to protect against terrorists? It gives society a level of feeling safe by the protections in place. The public can only maintain a limit of safety by giving up a degree of privacy to governmental agencies in order to protect this basic need; and it is a trade off to give up a certain amount of privacy. On one hand individual privacy seems to be an inherent right thought of by the public as a Constitutional right. On the other, it is limited rights given by the 14th Amendment. Whatever rights we hold true today is the norm, yet not all true rights we bear are in real existence. What remedies in the political system in the privacy of individual privacies versus national security protections and concerns? The courts have narrowed away some of these concerns, but the bulk of the powers still exists. Even though Congress has been hesitant to amend the Patriot Act, in fear of being too intrusive, the powers to be are that it has the power to limit the society’s individual rights. Throughout the years rights have been in decline, and we wonder whether it will be because of terrorist acts, the U.S. Patriot Act, or the Homeland Security Act, it is something we all will have to get accustomed to. References (Anderson, 2012) Surveillance & Society, ISSN 1477-7487  © Surveillance Studies Network, Retrieved from http://library.queensu.ca/ojs/index.php/surveillance-and-society/article/view/cab_spy Bajaj, V. And Austen, I. (28 Sep 2010) B1 New York Times, Privacy vs. National Security: [Business/Financial Desk] http://search.proquest.com.proxy-library.ashford.edu/docview/755073818/fulltext/13AA4752BA6755D6A1B/1?accountid=32521 Darren W. Davis, Brian D. Silver, (12 DEC 2003) American Journal Of Political Science, Retrieved from http://onlinelibrary.wiley.com/doi/10.1111/j.0092-5853.2004.00054.x/abstract Downing, B. M. (2008, August 26th) The Agonist Retrieved from http://agonist.org/national_security_versus_individual_privacy_no_line/ (Kandra et al., Jan 2002): 37-41PC World 20. 1National security vs. online privacy http://search.proquest.com.proxy-library.ashford.edu/docview/231422330/fulltext/13AA49614672EB98EE2/3?accountid=32521 Krishnamurthy, B. (Posted 11/01/01) Website. Markkula Center for Applied Ethics Retrieved from http://www.scu.edu/ethics/publications/briefings/privacy.html Linder, D. (2012). Exploring constitutional law. Informally published manuscript, educational, non-commercial site, umkc.edu, Kansas City, United States. Retrieved from http://law2.umkc.edu/faculty/projects/ft rials/conlaw/home.html Miltrano, T. (January 1, 2003) Web Page title. EDUCAUSEREVIEW ONLINE Retrieved from http://www.educause.edu/ero/article/civil-privacy-and-national-security-legislation-three-dimensional-view Swire, Peter P. and Steinfeld, Lauren, Security and Privacy After September 11: The Health Care Example. Minnesota Law Review, Forthcoming. Available at SSRN: http://ssrn.com/abstract=347322 (Timan & Oudshoorn, 2012) Surveillance & Society, ISSN 1477-7487  © Surveillance Studies Network, 2012 Retrieved from http://library.queensu.ca/ojs/index.php/surveillance-and-society/article/view/mobiles Downing, (2008a) and (2008b) Krishnamurthy, (2001a), (2001b) and (2001c) Linder, (2012a) and (2012b)

The Impact Of Personality And Gender Of Branding Decisions

Personality and gender have an impact on branding decisions and reactions by consumers. Therefore, it would serve businesses well if products and services are shaped around customer preferences, knowing their unique and particular needs, and their sense of aesthetics. An evidence to support this contention is a study called ‘visual marketing’ in which participants were shown a slide containing stimuli for testing while an eye-tracking equipment monitored their eye movements. Afterwards, they were asked to indicate how much they liked/disliked the stimuli.Results showed that there is a clear correlation between the number of fixations on an image and subsequent spontaneous and prompted recall of that stimulus. There is also a better recall of images the participants had liked. This means, therefore, that when advertising or branding a product, the emphasis should be the need to know and understand the target audience, and what they like to see. Factors like space, color, imagery or details were found to have an effect on the beholder.For example, children would associate dark colors with negative emotions while happy emotions for bright ones. They would also prefer large figures to smaller ones. While the marketing rule stipulates that the costumer should always be the focus, however, the factor of the creator and the â€Å"production aesthetic† may deter the accomplishment of this end. Creatives tend to impose their personalities in their creations. Each creative has his/her own sense of self which always, consciously or unconsciously, come out through the work.Behind the brands out there in the market could be the reflection of personalities of the creatives who made them. An implication of this is that creatives will tend to produce work that reflects their own career aspirations, creative impulses, ethics and beliefs. They would produce advertising that appeal to themselves. They would produce work that they find appealing and interesting to them instead of to the consumers, contradictory to the marketing idea that the consumer preferences should take precedence over that of the creatives.Aside from aesthetic preferences, the gender of the creative also affects the branding of products. Gender affects the graphic expression of the individual. One’s shape, color, detailing and perspective preferences are usually associated with the gender one belongs to. To ensure that the product or service appeals to the target consumer, the ‘production aesthetic’ and the ‘preference aesthetic’ should be the same.The personality and gender of the creatives should be aligned with the consumers. Recruiters should hire marketing staff members whose personalities and genders are congruent to the external stakeholders. In an era of high competition, delivering products that appeal to specific customer segments is a high priority. Reference for the journal: Authors: Moss, Gloria Source: The Journal of Bra nd Management, Volume 14, Number 4, 1 April 2007 , pp. 279-300 Publisher: Palgrave Macmillan

Tuesday, July 30, 2019

American Government Agencies Post 9/11

According to Timothy Manning, Deputy Administrator for Protection and National Preparedness at the Department of Homeland Security's (DHS) Federal Emergency Management Agency (FEMA). Since the September 2001 terrorist attacks, significant and measurable strides have taken place to improve preparedness for the hazards faced by all levels of government and all segments of society (DHS, 2012). FEMA is now part of the DHS's Emergency Preparedness and Response Directorate. FEMA is tasked with advising on building codes and flood plain management; teaching people how to get through a disaster; helping equip local and state emergency preparedness teams; coordinating the federal response to a disaster; making disaster assistance available to states, communities, businesses, and individuals; training emergency managers; supporting the nation's fire service; and administering the national flood and crime insurance programs.Listed below are some of the improvements that have taken place post 9/11 (DHS, 2012). In the four years between 2006 and 2010, the proportion of states and urban areas that were confident in the effectiveness of their emergency operations plans increased from 40 percent to more than 75 percent; commercial radio broadcasters, in partnership with FEMA, today can deliver public warning messages to more than 84 percent of the U.S. population, up from 67 percent in 2009. By the end of 2013, coverage is expected to expand to more than 90 percent of the population; Since 2001, federal, state and local governments have built a network of specialized teams capable of interdicting and disrupting a variety of imminent threats. That network includes 1,100 Hazardous Materials Response Teams, 5,400 SWAT teams, and 469 FBI-trained and accredited bomb squads; Prior to the Sept. 11 terrorist attacks, major population centers in many parts of the country lacked structural collapse and urban search and rescue capabilities. Today, 97 percent of the nation is within a 4-hour drive of an urban search and rescue team; and Government agencies at all levels have improved their strategic and tactical communications planning and coordination. In 2006, only 42 percent of the nation's urban areas had a strategic plan in place to guide interoperable communications. Today, 100 percent of the nation's highest-risk urban areas are capable of establishing response-level interoperable communications within one hour of an event involving multiple jurisdictions and agencies. According to Factsheet: U.S. Customs and Border Protection Actions Taken Since 9/11,U.S. Customs and Border Protection are addressing the terrorist threat 24-hours a day. There is a multi-layered approach that encompasses working with our foreign counterparts, employing intelligence, technology, advanced information in the field and the most professional workforce worldwide. CBP uses various strategies and employs the latest in technology to accomplish its goals. We have extended our zone of security beyond our physical borders through the use of bilateral and private-sector partnerships, targeting and scrutinizing advance information on people and products coming into this country. CBP has achieved much since its creation in March 2003. Some of the most significant accomplishments are as follows: Improved anti-terrorism training for all CBP personnel. CBP has implemented anti-terrorism training for all personnel with a special focus on training related to weapons of mass effect. This includes identifying and intercepting potential instruments of terrorism using non-intrusive inspection technology and radiation detection equipment. The Student and Exchange Visitor System (SEVIS) were implemented in August 2003. It is an Internet/Intranet based system operated by U.S. Immigration and Customs Enforcement that electronically captures, maintains, and monitors information relevant to each foreign student, exchange visitor, and their dependents. SEVIS provides CBP with a mechanism to facilitate the entry of bonafide students and exchange visitors and quickly identify possible status violators. Augmented Integrated Surveillance Intelligence System (ISIS), that uses remotely monitored night-day camera and sensing systems to better detect, monitor, and respond to illegal crossings, on both the Northern and Southern borders. Deployed radiation detection technology including Personal Radiation Detectors (PRDs) to more than 10,400 CBP officers and agents, and Radiation Isotope Identification Detection System (RIIDS) to over 60 Border Patrol field locations. Increased the amount of Remote Video Surveillance Systems (RVSS) which are pole mounted cameras that provide coverage 24 hours a day/7 days a week to detect illegal crossings, on both our Northern and Southern borders. Implemented a Geographic Information System (GIS), a Southwest border initiative, which tracks illegal migration patterns to better deploy personnel and resources to establish control of our border. Overall these agencies have impressed me the most. In recent light of the Boston Marathon Bombing, the emergency response was remarkable which shows that there has been much training and procedures put into place since 9/11 and that we as a nation are prepared and capable of handling any situation that might come our way.

Monday, July 29, 2019

EC 444 Essay Example | Topics and Well Written Essays - 500 words

EC 444 - Essay Example When income becomes scarce, the curve flattens. The third property is indifference map which reflects different levels of utility. An individual will attain maximum total utility on the highest position of the indifference curve. The fourth property is work-leisure preference of the individual. The shape of the curve is determined by individual’s preferences, occupation, and personal circumstances. A flat curve reflects a person with an occupying job. A nursing mother will have a relatively steep indifference curve because much of her time is spent on non-labor market activities. An individual’s budget is controlled by the amount of wages earned. Budget constraint is reflected by the wages earned and this has an overall effect on the shape of the indifference curve. Individual’s maximum utility is attainable at the highest position on the indifference curve. Changes in wage rates have an effect on the number of working hours. An increase in the number of working hours increases the wage rate but with time wage increase may reduce the number of working hours. Wage rate is affected by income and substitution effects. Income effect results from the change in the desired number of working hours as a result of income change, wages are kept constant. An increase in income means more money will be available to spend on purchasing leisure. The resulting effect is the reduction of desired number of working hours. Substitution effect results from the change in the desired number of working hours as a result changes in wage rate, income is kept constant. When leisure becomes expensive, it is sensible for the individual to work more hours and reduce time spend on leisure. The resulting effect is increase in the number of working hours. The overall net effect will depend on the magnitude of income and substitution effect. Women are responsive to changes in wage rates than men. This is due to the differences in allocation of time. Men use their time

Sunday, July 28, 2019

The Development of Electronic Music in the age of Post Modernism Essay

The Development of Electronic Music in the age of Post Modernism - Essay Example This further allowed the reintegration of Acoustic sounds to allow for the reintegration of Acoustic sounds through carefully sampled computer based musical instruments. (Schwartz, S. 1993.).This is particularly true in terms of the graphic signal-processing software which when it came out allowed for real-time MIDI control allowing the post modern composer to use this system even with limited technical knowledge. Chadabe, J, 1997).The availability of of such techniques and the further advent into the market of the Yamaha DX-7 MIDI keyboard in 1985 and of hard disk recording and editing softwares were all set to revolutionise Electronic music. (Schwartz, S. 1993.).The nineties further paved the way for more interactive computer-assisted performance and the release of the multimedia CD-ROM meant that the MIDI sequencing programmes were all set to expand to include digital audio. Chadabe, J, 1997). This is in contrast to the position of technology available for the electronic composers back in the 1940’s. where as the musicians were still struggling with amplifiers (for example John Cage’s Imaginary Landscape no.1 (1939)).Towards the fifties there was the Radio-diffusion-television upon which the modern musique concrete is based upon.The founders of the French version of the Groupe de Musicque Concrete included the likes of Messiaen, Boulez and Stockhausen. Another studio opened very soon under Karlheinz Stockhausen and made generous use of electronic sound generators and modifiers.

Saturday, July 27, 2019

Death Penalty Research Paper Example | Topics and Well Written Essays - 1000 words

Death Penalty - Research Paper Example The dark chapters of dealing with the provisions of death penalty must be removed from legal literature once for all. Much ambiguity and hesitation exists in the area of awarding the capital punishment in USA. Elucidating the scenario Franklin E. Zimring writes, â€Å"Some States reverse eight out of every ten death sentences on appeal, while other States affirm eight out of ten. And the current system of American capital punishment seems to be hated in equal measure by the opponents of capital punishment system and by those who support execution but desire more certainty and less delay.†(8) The undercurrent of displeasure against the death penalty is evident. The protagonists who insist for retaining the death penalty quote the progress made in the field of scientific research for investigation of crimes. DNA testing and other methods help to establish the guilt beyond doubt. The chances of innocent persons put to death are impossibility. The advocates of death penalty have certain strong arguments that appeal to the emotions. One of them is the grave issue of terrorism. The need to provide exemplary punishment to such enemies of humankind cannot be brushed aside easily. Some merit exists in the above arguments, and yet an enlightened society has to rely on options other than death penalty, which is a cruel procedure. It is the duty of the state to make a condemned prisoner a worthy individual. Since death penalty applies closure to the life-force of the convict, where is the chance for him to reform? The family members undergo untold miseries and some of them will suffer from life-long shocks that may result in severe physical and psychological problems. Instead, prosecutors need to have a variety of other types of punishments to teach a hard lesson to the one condemned to death sentence. This is a better procedure to serve the ends of justice. Punishment should be appropriate to the magnitude of the crime. Someone

Friday, July 26, 2019

EU Economy Essay Example | Topics and Well Written Essays - 3250 words

EU Economy - Essay Example ..5 4.2 Pillar 2†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...5 5.0 Past Reforms†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 5 5.1 CAP Expenditure and CAP Reform Path†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 6 6.0 Various Perspectives on Proposed Reforms†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.6 6.1 Farmers View point†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...6 6.2 NGOs Perspective†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..7 6.3 Research Institutes and Experts’ Opinions†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦7 7.0 Does the CAP Defy Trade Theory?........................................................9 8.0 Ricardo's Comparative Advantage Theory and the CAP†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦9 9.0 Heckscher and Ohlin Theory and the CAP†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦10 10.0 Ground for Choices †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦10 11.0 Guiding Principles for Reforms†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..11 11.1 Global Food Security†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..12 11.2 Environment Initiatives†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. ... Initially, during ‘60s, it was formulated to increase the agricultural production and achieve food security. Since then much has changed at the global level and the world has progressed to trading in a tariff-free regime under the auspices of World Trade Organization. It has been agreed that resources are scarce and must be harnessed efficiently to enhance economic wealth of the nations within EU. The existing CAP within EU with direct payments on per hectare basis does not make any sense. The agricultural subsidies cost huge proportion of the EU budget. Providing export subsidies to produce surplus to dump it in the international market at the cost of developing countries, especially poor African countries, defy the basic probity and economic sense. Sweeping reforms are needed that can take care of environmental issues, climate mitigation, reduce water pollution, support efficient farming and rural development, provide fair international competition and encourage innovation in agriculture increasing productivity levels. Introduction This policy paper is for the attention of the Agricultural Commissioner, EU and is designed to explore whether the CAP should be reformed, and if so then in what way it should be modified to address the current issues. The paper is structured around understanding existing CAP and its relevance in reference to various economic theories that economists have proposed in last few decades to enhance the global wealth. It will look into various perspectives on proposed reforms and the available choices to address environmental issues. The paper finally provides concrete recommendations on the future CAP. Historical Account The Common Agricultural Policy (CAP) had its modest beginning in 1962. Since

Thursday, July 25, 2019

Statistical Models for Forecasting milk production Statistics Project

Statistical Models for Forecasting milk production - Statistics Project Example In time series analysis, an autoregressive integrated moving average (ARIMA) model is a generalization of an autoregressive moving average (ARMA) model. In theory, the most general class of models for forecasting a time series are stationary and can be made stationary by transformations such as differencing and logging. ARIMA models form an important part of the Box-Jenkins approach to time-series modeling. A non-seasonal ARIMA model is classified as an ARIMA (p, d, q) model, where: p is the number of autoregressive terms, d is the number of non-seasonal differences and q is the number of moving average terms.Estimation At the identification stage one or more models are tentatively chosen that seem to provide statistically adequate representations of the available data. The parameters are estimated by modified least squares or the maximum likelihood techniques appropriate to time series data.Diagnostic For adequacy of the model, the residuals are examined from the fitted model and alternative models are considered. Different models can be obtained for various combinations of AR and MA individually and collectively. The satisfactory model is considered which adequately fits the data.Method selection The best model is obtained on the basis of minimum value of Akaike Information Criteria (AIC) which is given by:   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   AIC = -2 log L + 2m   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Where m = p + q   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   L is the likelihood function p& q are orders of Auto-Regressive and Moving Average models respectively - number of parameters, Akaike (1974)

An Assessment of the Current Economic Conditions of Africa Essay

An Assessment of the Current Economic Conditions of Africa - Essay Example However, the continent managed to present a 5% rise in economic activity. This was as a result of greater metal and oil prices, significant boost in formal development aid and enhanced economic stability. In 2011, the economic growth of Africa fell. The current economy of Africa seems to be recovering from a ‘devastating’ situation, following the economic performance decline in 2011. The African region has been shaken by the natural phenomenon as well as critical civil wars within countries, among other human activated activities. When all this is combined, it will always impact into a region’s economy either in a positive, or a negative manner. In a span of one decade, we have seen the continent’s economy fall and with no time able to recover again. Africa’s economy was not at its worst in 2011 as many would think; holding 3.4% GDP growth from 5% in 2010. Tracing back to 2009, the economy was even lower with 3%; a percentage lower than in 2011 befor e shooting to 5%, which means that the continent has the capability to put itself back to a better position, which would contribute to an increase in the total world economic growth. This is the reason to disagree with the position that the decline was devastating; instead it is better to term the decline as average though the impact was deeply felt by the population of the continent. Africa is a continent with about 54 countries, and over one billion people living at different levels of life. This prompts the need for development in the countries that have loopholes in governance among other necessities, to fasten the growth. In one way or the other, all the countries new and existing need to co-operate and focus on one mission of strengthening the economy. Africa’s economic situation in the 1st phase of 2012 shows a forecast of recovering process by end of 2012. â€Å"With the gradual recovery of North African economies, Africa’s average growth is expected to reboun d to 4.5% in 2012 and 4.8% in 2013† (â€Å"African economic outlook 2012: Macroeconomic† 15). North African economy had been compressed following the political problems, social tension and civil wars experienced. These are countries with credible sources of oil depositories where the pressure within was felt in the whole of Africa. In South Africa, the 2010 GDP growth was at 2.9%, with an estimated increase to 3.1% in 2011(â€Å"South Africa† africaeconomicoutlook.org). However, due to basic local weaknesses and the weak global economic recovery, there was an expected slowdown in growth in 2012. In 2013, the GDP growth of South Africa was estimated to rise to 3.6% (â€Å"South Africa† africaeconomicoutlook.org). In 2011, the rate of consumption and investment grew by 3.5% and 5.2% respectively(â€Å"South Africa† africaeconomicoutlook.org). Africa was the largest beneficiary of the IDA (International Development Association), World Bank’s fun d in 2011, with a $ 7.0 billion financial commitment to improve the economy and population’s living condition to eradicate poverty (â€Å"The World Bank Annual Report 2011† 3). Much remains to be achieved in the continent despite the huge borrowing and aids received in the region. Even after the debt relief in 2005 that was a ‘salvation’ of the African countries, debt seems to be on the rise though the act the suppressed rate of borrowing. Today more than ever, the continent has changed the rate and pattern of borrowing. African countries are keen on the interests and conditions involved when taking development funds, this has resulted to China being preferred over the World Bank on financial lending in Africa. However, Africa still remains fragile where the total expenditure in most countries

Wednesday, July 24, 2019

Compares and contrasts the kernels of different operating systems Essay - 1

Compares and contrasts the kernels of different operating systems - Essay Example This operating system is developed for common users. However, there are many other kinds of operating systems which serve specific operations and functions of individual users and organizations. In this scenario, Kernel is the most important element of an operating system. It allows an operating system to carry out some specific routines and tasks. The basic purpose of this research is to compare and contrast kernels of different operating system. This paper presents a comparative analysis of different operating systems and their kernels. An operating system is the most important element of a system. It runs all the software applications and tools installed on a computer (Tanenbaum, 2008). The kernel is simply the "core" or inner most level of any OS or operating system. The kernel offers many callable routines that permit other applications to display text, access files and graphics, obtain input from a mouse or keyboard, and some other similar facilities. There are diverse kinds of OS models available nowadays. A number of them are employed in on-hand freeware and commercial OSs, plus others are being made at universities as technology and research based projects. All operating systems types have their powerful aspects and their flaws making them suitable for diverse kinds of functions and hardware. Certainly, computers have transformed a lot, as a result kernels have transformed as well too. Earlier operating systems are yet foundational upon the low-performant hardware of the 60s and 70s, however do offer constan cy as newer operating systems require technology power of the contemporary processors as well as still have to prove themselves (Sewell, 2013; Dumon, 1998). Kernel is the most significant element of an OS, and it composed of two fractions, user space (un-privileged operating mode) as well as kernel space (privileged operating mode). The early idea of monolithic kernel and normal

Tuesday, July 23, 2019

Quality Management Tools & Techniques Research Paper

Quality Management Tools & Techniques - Research Paper Example This is what has necessitated then implementation of the quality management tool and technique. These tools play a very critical role in ensuring that the products that are produced are of high quality. At the same time they play a key role in management of the performance of the organization. The quality management tools Quality in production is very necessary to ensure competitiveness in the market. This is the basis for the seven management tools and technique. These techniques were first developed in Japan in the year 1960 and their application so the improvement of quality in production and ensure consistency in the products produced. The tools uses statistical techniques to make sure that what comes out of the production house meets the end users need and requirements, as mention the tools are six in number. These tools are basically used to collect data then arrange it and finally do an analysis to the data. In doing so the information collected is organized in a way that is e asy to understand and this makes it possible to identify problems in the system (Hakes, C 203). Check sheet pareto chart Cause and effect diagram Histogram Scatter diagram Charts Check sheet This is a kind of sheet that is used to show variations over a period of time. The variations are analyzed and can easily show the performance over that period. These charts can enable the organization to identify the problems before implementing new system because it is used at the end of a particular period or when there is need for change of system. Therefore it can play a very critical role in ensuring that the new system does not have the same problems as the other system had. This has been used in my case the footwear industry in the analysis of its production after every end of a year. The records are analyzed and the necessary decisions taken to improve production. In my analysis of the records I find out that at most cases the production increased after the implementation of new systems . Here is an example of a check sheet Pareto chart This is a chart that prioritizes issues. It is used to analyze problems by basically showing the most frequent issue. In this type of a chart the issue that has the most appearance comes first in the chart then the other issues follow in that order to the list. The chart can be very critical in an organization since it can be used to identify what problems are occurring in the organization frequently, and as such seek for the solution to this problem. The chart does not only show the problem but it also shows the cause of that problem so in an organization it can be used to tackle some of the frequently experienced problems that the organization face from time to time and seek a solution to them. Just looking at my case, an interview with the Footwear industry management on how they have found this chart important amazed me. I found out that for the period of the ten years they have been applying this chart to identify the problems in their production and they have found it very effective. Below is an example of a Pareto chart. The cause and effect diagram This chart is also popularly known as the fish born. This arises from the way the diagram is designed that is, the diagram has the main bar then there are line

Monday, July 22, 2019

The Island of Human Nature Essay Example for Free

The Island of Human Nature Essay When Lord of the Flies was first released, William Golding described the novels theme in a publicity questionnaire as an attempt to trace the defects of society back to the defects of human nature. (Kennard) Since the island is a microcosm, Golding uses it to reflect our world and give comments on it and his view of human nature. In the novel a group of children are stranded on an island when their plane crashes. The freedom of having no parents while living in a society that does not enforce rules and laws are eliminated. In this novel William Golding uses the objects, characters, and setting show that what happened in the story is just not a story; they help prove the author’s belief that humankind is savage. Each character signifies an important idea or theme from our world, and the statement he makes about human nature is that mankind will turn savage for supremacy. As the novel is an allegory, each character is symbolized clearly as someone in our society. â€Å"Piggy could think. He could go step by step inside that fat head of his, only Piggy was no chief. But Piggy, for all his ludicrous body, had brains (Golding, 71). † Piggy is the scientific and intellectual aspect of society. He is a thinker, philosopher and someone who always advises for good. Similarities to Albert Einstein can also be seen in Piggy, because people did not care that he thought the atomic bomb was a bad weapon just like no one cared about what Piggy said or did. Another main character, Ralph, is like Franklin Roosevelt, who could not stop World War Two from breaking out. He signifies the confused that are always uncertain in the recognition between good and evil: The failure of the island society comes about because of an innate tendency towards violence in the boys. Golding is, then, in opposition to the romantic notion of noble primitives knowing the distinction between good and evil. Human beings are not innately innocent, so human progress is unlikely. (Kennard) When the kids on the island are confronted with a choice between reasons civilizing influence and animalitys self-indulgent savagery, they choose to abandon the values of the civilization that Ralph represents. Ralph in Lord of the Flies also represents democracy and is responsible. He is the politician who relies on social order and government, and his political failures show that he cannot oppress the evil within the other boys. One of the most influential boys whose evil Ralph cannot control is Jack. Jack is a symbol of Adolph Hitler. He is a crazy leader who killed many people because he wanted dominance. ?Like Hitler, Jack is a dictator; he is ignorant. Jack is the hunter who is consumed by his own fear and the greater force of his own capacity for evil. Roger is even worse than Jack, even though he is not like that from the beginning. He is similar to Satan or even Dr. Mengele who was Hitler’s worker and did horrific operations on people. Roger is cruel and has gone far beyond from being a savage because he purposely, with a sense of delirious abandonment, leaned all his weight on the lever, resulting in Piggy’s death. Struggles between moral conscience and a heart of darkness are symbolized in the conflict between Ralph and Jack. That also represents the struggle between the forces of civilization and anarchy. The tussle between Jack and Ralph for leadership is the allegory of our political leaders who always fight and kill for the sake of control. In the same way that the way the boys are being lead astray by Jack, the leaders of our world take advantage of the masses. The impulses and the behavior of the boys are those of adults. Like adults, he boys realize that the only way that they will keep everyone alive and safe is through rule, yet the frustration of living apart from society tempts many boys to unleash the evil inside them. At last, when no one follows order anymore, the boys hand themselves to bestiality and surviving becomes a combat in between the two tribes. This same choice is made constantly all over the world, all throughout history — the source of the grief Golding sought to convey. â€Å"Lord of the Flies is concerned with the fall of man to savagery with the loss of innocence. † (Kennard) He places supposedly innocent schoolboys in the protected environment of an uninhabited tropical island to illustrate the point that barbarity is not confined to certain people in particular environments but exists in everyone. William Golding shows that the smallest boys acting out, in innocence, is the same as the cruel desire for mastery shown by Jack and his tribe while hunting pigs. The adults waging the war that stranded the boys on the island in the first place are also enacting the desire to rule others. Many aspects of Lord of the Flies can symbolize the struggle for command. Our world is very fertile like the island, but in their ambition to get the supremacy the leaders destroy this world just like the boys who burn the whole island to ashes without realizing that they are destroying their own means of survival. The division of the boys in litluns and biguns is the allegory of the classes in our world. Litluns symbolize the common people, while the biguns are the metaphor of the ruling, powerful and political classes. The island on which the boys find themselves is allegorically our world in miniature. Lord of the Flies was driven by Goldings consideration of human evil, a complex topic that involves an examination not only of human nature but also the causes, effects, and manifestations of evil. Each character signifies an important idea or theme from our world, and the statement he makes about human nature is that mankind will turn savage for supremacy. Golding addresses these topics through the intricate allegory of his novel.

Sunday, July 21, 2019

Discussion on the importance of classroom management

Discussion on the importance of classroom management The main question that goes through every teacher after each of his or her lesson would certainly be, Have I done my job effectively? Normally, I can tell whether a lesson has gone well or the opposite. As much as I love sharing knowledge with my students, my experience of merely two years of college teaching has taught myself that it must go hand-in-hand with good management of my classroom. Good classroom management translates into effective teaching which promotes healthy teaching and learning environment. This, in turn, will facilitate both students and teacher in achieving the main principle of learning. Although classroom management would generally be imperative to teachers, a research by Fowler Ã…Å ¾araplÄÂ ± (2010) found that it is also important to students. Therefore it is a significant skill that teachers should acquire (Stoughton, 2007). Classroom management is important primarily in achieving optimal learning. Current teaching practices are more student-oriented where in due course the students will get the most out of the teaching and learning process. This is accomplished by creating a positive learning environment for the students. Students learn best when they are comfortable with their surroundings especially through the building of strong student-teacher relationship. In an article by Marzano Marzano (2003), they highlighted the finding of their study which indicates that the teachers who had a good relationship with their students had 31 percent fewer discipline problems, rule violations and related problems over a years time compared to those who didnt. This provides evidence that strong student-teacher bonding helps the teacher in dealing with problems and misbehaviour among students. By building a strong relationship with students, the positive learning environment has taken place and so the teachers can expect active participation in class. The last thing a teacher would want is when he or she is hoping for a response from the students, but didnt receive any. I found it very useful to remember the names of each of my students and I would try my best to identify each of them by the end of first month class meeting. I discovered that it is an excellent way in obtaining students involvement in class. In a way, I wanted to show that they are of significant individuals to me and also there is no favouritism in my class where the teacher will only remember two or three names of selected few. The students will usually be more proactive to give their thoughts and feedbacks during and after lessons. Subsequently, I will know how effective my teaching has been and how effective the learning has taken place. Students and teacher can be thought of as a team where teamwork and cooperation plays a vital role in achieving team goals. This cooperation can be obtained with the teachers good management skills in the classroom. The teacher will need the support from his or her students in order to deliver lesson on his or her best effort. Therefore, students cooperation in avoiding any misconduct during lessons is much needed by the teacher. Of course the teacher should be firm in handling these kinds of behaviour, but prevention is better than cure. I would try as much as possible to avoid using anger as a counter measure because it will end up straining the relationship built with the students. Ultimately to steer clear of the situation, I know that it is best to tell the students first hand of what I deem is acceptable and what is not. In addition to helping the teacher doing his or her job effectively, students cooperation developed through classroom management can also mould students into young citizens. Metzger (2000) suggests that in a democratic society, the teacher can use classroom management strategies to define the students as good citizens in the near future. This can be done by bringing up the concept of power sharing. The students will be given responsibilities on their own behaviour and making their own decisions, not just following orders. This will also benefit the teachers in a sense that they will feel less pressured because of the constant need of monitoring the students. In fact, they can have the opportunity to really work together with their students. Adequate preparations and properly lay out plans of conducting lessons is also a form of classroom management that is important in designing a positive classroom climate. A positive classroom climate is another key benefit of true classroom management. Checking the overall condition of the classroom before meeting the students is very important to make sure that the facilities provided can be used as effective teaching aids. The teacher can also anticipate potential problems that may occur during lessons due to uncomfortable settings in the classroom. Instead of just cancelling class and replacing them, the teacher can plan ahead what could be done or has a backup plan in case something didnt go as initially planned. This will greatly improve the teachers teaching in the future and gaining experience in managing future classes. Finally, classroom management is also a good way to get off to a right start with students. First day of class is the best time to communicate rules and procedures, explaining the syllabus and expectations. Some teachers will also begin the first day of class with ice-breakers or fun activities so that the students feel excited and will look forward to attending future meetings. It also creates opportunity for the teacher and students to get to know each other better which will help in building quality student-teacher relationship. Last semester I did an activity which benefited my students and myself, which is identifying what type of learning styles we have. It helped me to tailor fit my teaching approach to suit particular group of students and also helped the students to focus more on their strong points. Conclusively, classroom management is important because it is one of the aspects of effective teaching. Effective teaching will take place when a positive learning environment has been created. Of course this relies on a good bond between the students and the teacher which can be built with a proper management of the first day of class. By clearly stating the rules and teachers expectations of the students, the teacher will find no problem in obtaining students engagement in class. Proper classroom management is of great importance to the students, as it is for the teachers. At the end of the day, hopefully after successfully implementing classroom management strategies, the teacher can safely say, Yes, I have done my job effectively.

A Study On Common Social Classes Sociology Essay

A Study On Common Social Classes Sociology Essay Karl Marx and Max Weber are without question the two most influential sociologists to have emerged in the 19th century. Marxs theories are seen as the foundation of modern communism, and he himself is seen as a revolutionist. Marxs work has been very influential and has stood as an inspiration for social change. Max Weber, writing a generation later, emerged as a giant in nineteenth- and early twentieth-century German sociology and social theory. Whereas Marx anticipated the inevitability of revolutionary change, Weber offered a more staid and pessimistic vision. Society is seen as divided into four groups, the upper class, middle class, working class and lower class. This is known as the class system (http://www.gpwu.ac.jp/~biddle/the_class_sysytem.htm). The upper class tend to consist of people with inherited wealth and includes some of the oldest families, with many of them being titled aristocrats. The upper classes are defined by their title, but also by their education and by their pastimes (http://www.en.articlesgratuits.com/social-stratification-in-great-britain-id3024.php). The middle class are the majority of society today. They include high skilled craftsmen, lower and middle management and business people. The working class consists of farmers and factory workers. The lower class consists of people with a low income, low level of education and high unemployment rates. There are two significant sociologists in the discussion about social class, Karl Marx and Max Weber. Karl Marx was one of the first writers to analyse class differences. His understanding of class was someones relationship to the means of production. He saw class as being a phenomenon of any society, where ownership of wealth and the means of production (M.O.P) in the capitalist system, dominated the wage earners or proletariat. Marx considered that there were two prominent classes- the owners of the means of production and the workers. Marx talked mainly about the two great classes- owners and workers, but he was aware of a third class, which he called petit bourgeoisie (http://copland.udel.edu/~cmarks/What%20is%20social%20class.htm). This was the middle class which were owners of small businesses. Marx argued that the only thing that the workers owned was their ability to work (http://copland.udel.edu/~cmarks/What%20is%20social%20class.htm), what he called ‘labour power. The owners had power over workers as they paid the workers wages and could determine what wage they rece ived, and exploited them. As a result, there is a basic conflict of interest between the two classes. The worker becomes all the poorer the more wealth he produces, the more his production increases in power and range. The worker becomes an ever cheaper commodity the more commodities he creates. With the increasing value of the world of things proceeds in direct proportion to the devaluation of the world of men. Labour produces not only commodities; it produces itself and the and the worker as a commodity- and does so in the proportion in which it produces commodities generally. (Marx, Economic and Philosophic Manuscripts (1844) cited in http://www.historyguide.org/intellect/marx.html). Marx believed all societies are class societies with people set against each other by their differing relationship to the means of production. He felt that the lack of powers of workers was the source of exploitation and the basis of class conflict (http://copland.udel.edu/~cmarks/What%20is%20social%20class.htm). Marx argued that the basic contradictions contained in a capitalist economic system would lead to its eventual destruction. The proletariat would overthrow the bourgeoisie and seize the means of production, the source of power. Property would be communally owned and, all members of society would now share the same relationship to the means of production, bringing an end to the exploitation and as a result a classless society would emerge. In Capital (1867/1967), for example, Marx talked about the capitalists as werewolves and vampires who suck the blood out of the workers, and he was very sympathetic to the plight of the prolectariat. (Ritzer, Sociological Theory, 4th edition, Singapore, 1996, p 29). Marx argued that the class struggle was the driving force of social change. Marx also talked about class consciousness. Class consciousness as occurs when false consciousness has been replaced by a full awareness of the true situation, by a realization of the nature of exploitation, like the workers realising they are being used. When owners convinced workers that their situations were compatible, this Marx called false consciousness. Marx noted a difference between a ‘class in itself and a ‘class for itself. He believed a class in itself is a social group whose members share the same relationship to the means of production. A class for itself is a social group where its members have class consciousness and class solidarity. Class solidarity, which he believed was when members of a class develop a common identity and recognise their shared interests and unite. Marx believed that certain factors in the development of a capitalist economy would accelerate its loss of positi on (Macionis, Plummer, Sociology: A Global Introduction, 2005, 3rd edition, p. 202-206). These factors would end in the polarization of the two main classes. The gap between the proletariat and the bourgeoisie will become greater and the difference between these two groups will become even more extreme. Marx argued in the course of a working day, workers produce more than is actually needed by employers to repay the cost of hiring them. This surplus value is the source of profit, which capitalists are able to put to their own use (Giddens and Griffiths, Sociology, 5th Edition, p.301). Marx made the essential point that class was primarily based upon economic circumstances. Max Weber didnt agree with Marxs view that power derived only from economic relations and the relationship to private property of the MOP. The scope of Webers analysis ranges more widely than that of Marx; the origins of capitalism, the development of capitalism, the nature of a future society, and concepts and approaches that Marx downplayed- religion, ideas, values, meaning, and social action (http://uregina.ca/~gingrich/o902.htm). Weber also talked about power, class, status and party, as he was aware of its value. By class Weber is referring to ones participation in the market either by capital, skill or education. It refers to the unequal distribution of economic rewards. By status, Weber argues that groups form because their members share a similar status situation, like priests and monarchy. Unlike classes, members of status groups are aware of their common status situation. By party Weber means a group of people who commit to some practical goal or activity. He believed part ies were groups which are specifically concerned with influencing policies and making decisions in the interests of their members. These groups include trade unions and professional associations (Macionis, Plummer, Sociology: A Global Introduction, 2005, third Edition, p 206). Weber disagreed with Marx on a number of his theories. Weber saw no evidence to support the theory of the polarization of classes. Although he did see some decline in the numbers of the petty bourgeoisie due to competition from large companies, he argued that they enter white-collar or skilled manual trades rather than being depressed into the ranks of unskilled manual workers. Weber argued that the middle class increases rather than declines as capitalism develops. Therefore Weber saw a diversification of classes and an expansion of the white-collar middle class, rather than polarization as Marx did. Weber also disagreed with Marx on the idea of the proletarian revolution. Weber argued that people with similar class situations would not just develop a common identity and try to overthrow the bourgeoisie and seize the means of production. He believed that workers who were dissatisfied with their class situation would respond in different ways. Webers theories on social stratification are significant, because they show that other factors of social stratification and not just class, affect peoples lives (Giddens and Griffiths, Sociology, 5th Edition, p.302-303). Max Weber and Karl Marx had a difference of opinion over what was the driving force behind changes in society. But they both agreed that class is a function of economic participation and does not see capitalism as an idealistic form of society. Like Marx, Weber saw class in economic terms, arguing that classes develop in market economies in which individuals compete for economic gain. He defined a class as a group of individuals who share a similar position in a market economy and receive similar economic rewards. This Weber called is market situation. Marx and Weber argued these theories during the 19th century. Much of Marxs predictions have been wrong. Capitalist societies did not become increasingly polarised between labour and capital, instead the middle class grew larger and larger and the importance of manual labour steadily declined. Only a quarter of a century ago, some 40 per cent of the working population was in blue-collar work. Now, in the UK, only about 18 per cent is, and this proportion is still dropping. Moreover, the conditions under which working-class people are living, and the styles of live they are following, are altering. Giddens and Griffiths, Sociology, 5th Edition, p.315. Some critics today question the theoretical and historical validity of ‘class as an analytic construct or as a political actor. In this line, some question Marxs reliance on 19th century notions that linked science with the idea of ‘progress. Many observe that capitalism has changed much since Marxs time and that class differences and relationships are much more complex. Although Marxs prediction of an imminent collapse of the capitalist system and the proletarian revolution has not materialised, some of the most forceful passages in Marx book the Communist Manifesto actually refer to the greatest achievements of the bourgeoisie class and to complete changes in the ways human history has been made after its ascendance to power. Marx can then be credited to be one of the first thinkers to recognise the fact that the capitalist system represented the biggest breakthrough in human history. Marx predicted that as capitalism developed, a polarization of classes would take place between the oppressed and exploited proletariat on the one hand, and the exploiters on the other. Such class polarization has not occurred (Carter and Stokes, Democratic Theory Today: Challenges for the 21st Century, 1st Edition, 2002, p.254). In the last half of the 20th century, almost half of the people in the world lived in countries governed by principles based on Marxs work such as the Soviet Union and the countries of Eastern Europe. Although it is true that many of Marxs predictions about the course of the revolutionary movement were wrong, there is no doubt that he was a true genius. Nowadays, in the 21st century, there is more focus on inequality and not so much class. Equality is the state of being equal or the same. People are living in poverty if their income and resources (material, cultural and social) are so inadequate as to preclude them from having a standard of living which is regarded as acceptable by Irish society generally. As a result of inadequate income and resources people may be excluded and marginalised from participating in activities which are considered the norm for other people in society National Anti-Poverty Strategy, http://www.socialinclusion.ie/poverty.html Modern society believes everyone should be given an equal chance to succeed in life, and stresses equal opportunities. But we all know not everybody is treated equally in reality. Marxs view of class was about someones relationship to the means of production, that isnt the case anymore. There is cultural, material as well as social inequality in Ireland today. A report published in 2002, revealed Ireland to be one of the richest countries but also one of the most unequal. Social researcher Brian Harvey found that the treatment of asylum seekers and refugees was inadequate and that there were difficulties for poor people getting fast access to justice (http://www.rte.ie/news/2002/0404/report.html). In another report released in 2008, there was a study on the health, health behaviour and well being among children from the travelling community, immigrant children, children with disabilities and children from disadvantaged schools in comparison to other children. The findings showed tha t there were inequalities in health among children from these groupings and the other children, so it proves that children just arent being treated the same (http://www.nuigalway.ie/hbsc/documents/press_release__7th_oct.pdf). People look down their noses at the travelling community, most pubs and shops dont even let them onto their premises. People look down at the travelling community as they see them as having no house, no job and see them as being lower class. We can see the difference in class when this happens. Ireland went from being one of the poorest countries to being one of the richest and the majority of Irish society is now working class. It seems gender, disability, ethnicity, age, sexuality and religion are just some of the groups that are more likely to experience inequality in Ireland. Conclusion While both Marx and Weber were interested by the changes happening in society in the industrialization, Marx was looking for a revolution while Weber was exploring the factors as to why capitalism had come to pass. Though many of Marxs predictions are yet to materialize, there is no doubt that he was one of the most influential thinkers of the 19th century. Exploring how the capitalist economic system generates conflict between classes, Marxs analysis of social stratification has had enormous influence on sociological thinking in recent decades. Webers writing on stratification is significant because it shows other factors of stratification other than class that strongly influences peoples lives. Weber discussed class, status and party as important separate aspects of social stratification thus providing a more comprehensive analysis than that of Marx. Thanks to Marx and Weber we have a better understanding of social class. Bibliography †¢ www.businessdictionary.com/definition/social-class.html †¢ http://www.gpwu.ac.jp/~biddle/the_class_sysytem.htm †¢ http://www.en.articlesgratuits.com/social-stratification-in-great-britain-id3024.php †¢ http://copland.udel.edu/~cmarks/What%20is%20social%20class.htm †¢ Marx, Economic and Philosophic Manuscripts (1844) cited in http://www.historyguide.org/intellect/marx.html †¢ Ritzer, Sociological Theory, 4th edition, Singapore, 1996 †¢ Macionis, Plummer, Sociology: A Global Introduction, 2005, 3rd edition †¢ Giddens and Griffiths, Sociology, 5th Edition †¢ http://uregina.ca/~gingrich/o902.htm †¢ Carter and Stokes, Democratic Theory Today: Challenges for the 21st Century, 1st Edition, 2002 †¢ http://www.socialinclusion.ie/poverty.html †¢ http://www.rte.ie/news/2002/0404/report.html †¢ http://www.nuigalway.ie/hbsc/documents/press_release__7th_oct.pdf †¢ Albrow, Sociology; The Basics, 1999, London †¢ Gerth and Mills, From Max Weber Essays in Sociology, 2009, Oxon †¢ Ballantine, The Sociology of Education â€Å"A Systematic Analysis†, Fifth Edition, New Jersey, 2001 †¢ Bellamy and Ross, A Textual Introduction to Social and Political Theory, Manchester, 1996

Saturday, July 20, 2019

The Door :: essays research papers

The Door stage 1 preparations In the short story â€Å" The Door â€Å" by author E.B. White, he relates one of the experiments that he conducted to one of his own personal experiences. This was done in a controlled environment, the purpose of this task was to create an alternate reality. An alternate reality is to simulate a substitution of what may be considered reality itself. To achieve this alternate reality this experiment must require an enclosure, in other words a rectangular prism where the walls will be high enough to prevent the rats escape. Not to mention, two other important materials are needed to complete the experiment which include a rat, and food for it. Then the food will be placed behind one of the three contiguous chambers in the enclosure. All three doors will closed yet unlocked, each having a marking of its own on it including a circle, a square and a triangle. Then the rat will be placed inside of the enclosure, thus signifying that the experiment has begun. This experiment will be done several times until an alternate reality is created. To set up this alternate reality it will take three steps. In the first step the rat will be placed in to open area of the enclosure. While the rat is in this enclosure all doors will be open. Then when the rat is hungry the food will be placed behind the door with the circle. Soon after the rat will try and find this food and to do so it will use the process of elimination. Until the rat finally finds the food it has been looking for, which is the food. This part of the stage will be repeated until the rat has figure out that circle equals food. Thus giving it a specific memory that will later on help create this alternate reality. Soon after that stage 2 will begin. Where the rat motor memory will be eliminated so that the rat must relay entirely on its visual image of the circle. The one difference in this stage is that the symbols will be changed after each trail. Un-like stage 1 where the circle was place in the center of the two other doors. Then the rat is placed in the enclosure yet again and the rat finds its self using trail and error. Until the rat starts to realize this process isnt working due to te fact that the symbol keeps being moved.

Friday, July 19, 2019

Personal Narrative- A Preventable Death Essay -- Personal Narrative

Personal Narrative- A Preventable Death He looks at his watch and realizes that he has to leave now before he gets yelled at due to missing the 12:00 curfew. Upon my cousin Sean's arrival home, he begged his mom for an extended curfew, after all he was the star of the 19991 homecoming football game at Royalton high school, he should have been able to stay out later. After losing this fight with rather stubborn mom, and her giving him a stern "Sean I am not going over this again, it is late and I would like you to live until morning, so you need to go downstairs and get some sleep." he hung his head and went downstairs. Sean decided to be rebellious and ignore the part where his mother said to go to bed. After deciding that his mom and dad were finally asleep and wouldn't hear his truck start, he crawled out of his window and returned to the party. His parents were suddenly awoken by a loud knocking. Unfortunately it was not Sean. It was a Police Officer from their town, "Are you the parents of a mister Sean Schmidt?" "Yes," Sean's parents paused as they knew what was soon to come "we are his parents, officer, how can we help you?" "I am afraid that your son has been injured in a car accident and I need you to come to the hospital with me." "Sean is downstairs sleeping, I watched him go down there when he came home last night," Anne said and then spun around and ran downstairs, in an attempt to prove the Police Officer wrong "Allen, he is gone!" She shouted back up the stairs in disbelief and horror. They then went to the hospital hoping that they would get to hug him, hold him, and make him better. It didn't hit them until they were in the morgue identifying the body of their dead son, they were never going to be able to ho... ..., you know I'll make it home just fine' after fighting with him for about 20 minutes, I told him to leave." We both just sat there and cried. Her crying was all due to how much she missed him, and so was most of mine. The rest of my tears came from the fact that one of the biggest influences in my life killed himself for one night of fun, and free beer. I had learned after that, that no matter how much people laughed at you for being the "designated dumb ass" at all of our high school parties, that it was well worth it. If only one person had taken his keys, or stayed sober and drove Sean home, I wouldn't be writing this paper on his death, I would be writing it on how he always made us laugh when he would lip sync to all of those Ray Stevens’ songs, and how the family gatherings could never start without him. Was that one night of fun and free beer really worth it? Personal Narrative- A Preventable Death Essay -- Personal Narrative Personal Narrative- A Preventable Death He looks at his watch and realizes that he has to leave now before he gets yelled at due to missing the 12:00 curfew. Upon my cousin Sean's arrival home, he begged his mom for an extended curfew, after all he was the star of the 19991 homecoming football game at Royalton high school, he should have been able to stay out later. After losing this fight with rather stubborn mom, and her giving him a stern "Sean I am not going over this again, it is late and I would like you to live until morning, so you need to go downstairs and get some sleep." he hung his head and went downstairs. Sean decided to be rebellious and ignore the part where his mother said to go to bed. After deciding that his mom and dad were finally asleep and wouldn't hear his truck start, he crawled out of his window and returned to the party. His parents were suddenly awoken by a loud knocking. Unfortunately it was not Sean. It was a Police Officer from their town, "Are you the parents of a mister Sean Schmidt?" "Yes," Sean's parents paused as they knew what was soon to come "we are his parents, officer, how can we help you?" "I am afraid that your son has been injured in a car accident and I need you to come to the hospital with me." "Sean is downstairs sleeping, I watched him go down there when he came home last night," Anne said and then spun around and ran downstairs, in an attempt to prove the Police Officer wrong "Allen, he is gone!" She shouted back up the stairs in disbelief and horror. They then went to the hospital hoping that they would get to hug him, hold him, and make him better. It didn't hit them until they were in the morgue identifying the body of their dead son, they were never going to be able to ho... ..., you know I'll make it home just fine' after fighting with him for about 20 minutes, I told him to leave." We both just sat there and cried. Her crying was all due to how much she missed him, and so was most of mine. The rest of my tears came from the fact that one of the biggest influences in my life killed himself for one night of fun, and free beer. I had learned after that, that no matter how much people laughed at you for being the "designated dumb ass" at all of our high school parties, that it was well worth it. If only one person had taken his keys, or stayed sober and drove Sean home, I wouldn't be writing this paper on his death, I would be writing it on how he always made us laugh when he would lip sync to all of those Ray Stevens’ songs, and how the family gatherings could never start without him. Was that one night of fun and free beer really worth it?

Thursday, July 18, 2019

Does Increased Carbon Dioxide Emissions Cause Global Warming? Essay

The warming of the Earth’s atmosphere is one of the most important environmental issues in the world today. The volatile climate and changes of heat in the atmosphere are connected with an increase of large amounts of greenhouse gases in the atmosphere. It is often talked about that the primary reason why the global warming situation is increasing is due to the increase of the amount of greenhouse gases present in the Earth’s atmosphere, primarily the amount of carbon dioxide emissions. The increased carbon dioxide amount in the atmosphere that causes global warming is a cause of concern for many people because of its potential dangerous effects to the Earth and the environment. However, there are opposing arguments against this claim, and they refute that it is not accurate to mainly attribute the problem of global warming to the increasing carbon dioxide emission caused by the activities of humans. Audience My audience will be the one’s opposing the claim that carbon dioxide emissions cause global warming. The one’s opposing this claim believes that global warming is natural and the greenhouse gases do not cause global warming. That is true to some extent; however, if we did not build all of the industrial plants after the Industrial Revolution, which produces all of the carbon dioxide emissions global warming would not be as bad. To many scientists global warming refers to the observation that the Earth is warming, without any indication of what might be causing the warming of the atmosphere. This definition indicates that global warming can be due to various factors, and one of these reasons includes the greenhouse effect. The greenhouse effect, meanwhile, is a warming near the surface of the Earth that results whe... ...make our planet the only planet known to be habitable. I was able to use this book to better improve my reader’s knowledge of global warming and the effects of global warming. "What is Global Warming? - National Wildlife Federation." Home - National Wildlife Federation. National Wildlife Federation, n.d. Web. 18 Nov. 2011. . This article defines global warming and talks about how it is happening now. The article also goes in depth of how global warming is caused by humans and the effects that global warming are causing. Another thing the article talks about is what we can do to solve the problem of global warming. This article helped me by explaining the reasons of global warming and also by telling me ways that the global warming issue can be fixed. Another reason the article helped was by explaining the different causes of global warming.