Monday, September 30, 2019

Both Dr Faustus and the pardoner share an obsessive greed Essay

Both Dr Faustus and the pardoner share an obsessive greed. For Faustus we are fascinated by his greed to rival God in terms of power and knowledge, but repelled by his methods in which to pursue this, which leads him to sell his soul to the devil. Why would one go to such lengths to have his â€Å"most desires[†¦ ]of power, of honour, of omnipotence†, it is this fact that repels us from Faustus as his methods are immoral. But we are fascinated by the disastrous effects it has upon Faustus, inevitably leading him to Hell, moreover, within the 24 years that he had to fulfil his desires, he doesn’t do the extravagant things he claimed he was going to do such as to â€Å"fill the public schools with silk† or â€Å"ransack the ocean for orient pearl†, highlighting that pursuing greed inevitably leads to a person’s demise. The same can be said in the Pardoner’s tale, in which three peasants find an old man who they mistake for death in which he leads them to a true where they find gold. There obsession can be easily connected to human nature which undermines our fascination to their situation, because it could happen to anyone. It’s common to want to be superior in wealth to others, competition drives advancements, so in that respect, we are not fascinated by the Pardoner’s tale. Another viewpoint would be that we are fascinated by the Pardoner’s tale because we can easily connect to it, the same being for Faustus. Furthermore, the Pardoner himself is a fascinating character because of his blatant contradiction. He openly tells the pilgrims that he sells â€Å"relikes† made of â€Å"cloutes and of bones†, rags and bones in which he deceives people to buy them. But the message of the tale is that the obsession of money leads to death, however the pardoner openly admits his obsession of money. Faustus is obsessed with knowledge. He would stop at nothing to gain all the knowledge in the world which is why he becomes depressed when Mephastophilis only presents him with one book which has the answers to his questions, â€Å"O thou art deceived†. Because Faustus is so fixated on acquiring all the knowledge there is to know, he doesn’t expect it to be all in one book. This repels us from Faustus because to acquire this knowledge he goes to extreme lengths, in this instance, selling his soul to the devil for 24 years. When the story was first published in 1604, the audience would of definiately been repelled by this because selling ones soul to the devil would be of been a serious sin. Modern interpretations would be more liberal to the fact that Faustus sells his soul, but in a country where around 80% are Christian, a modern day audience would still be repelled and deem it immoral to go to such extreme lengths. What fascinates us about Faustus is his greed to rival that of God, not the methods he does to acquire this, but the fact that he has this desire. He openly challenges God, yet openly praises God and heaven, â€Å"when I behold the heavens, then I repent[.. ]thou hast deprived me of those joys†. There is a constant battle with Faustus between his obsession with power and his religious beliefs. He wants to â€Å"go forward† in terms of knowledge but to an extent where he becomes isolated from God because he is so driven by his obsession. Christopher Marlowe highlights that following greed will inevitably lead to downfall and Faustus’s downfall was being too obsessed with power and knowledge which lead him to sell his soul in desperation for this. Also, for the 24 years that he had before his soul would be taken he could have fulfilled his desires, instead performing petty illusions for the emperor calling him â€Å"my gracious lord†, highlighting that even with immense power he still follows the social rules of life. Which in effect show the limits of man, as with so much power, Faustus is still limited to the restrictions of his mind. Also, being obsessed with greed will lead ultimately lead to failure, Faustus is blinded by short term gains, not taking into account long term implications, â€Å"do give both body and soul to Lucifer†, he sells his soul to the devil which is for eternity, not realising this, only to please himself for 24 years. The same can be said in the Pardoner’s tale, in which the peasants become obsessed with money when â€Å"they founde of florins fine of gold†. Earlier in the Pardoner’s tale, the Pardoner states that â€Å"Radix malorum est Cupiditas† – Love of money is the root of all evil. Foreshadowing grave consequences for the peasants who find the gold, in which their obsession for the gold leads them to kill eachother off, even forgetting their oath of becoming brother, â€Å"and ech of us bicomen others brother†. When blinded by greed, the three peasants only think about themselves, which highlights the damaging effects of an obsession for wealth. It’s our basic instinct to want to be better than others and the peasants are exhibiting this behaviour. Because it’s common for people to want to be wealthier than others, the message is not unique which undermines our fascination with the story. However the person telling the story is fascinating because he openly contradicts himself, he proudly tells of his schemes to exploit poor people’s fears for money which evidently works as he makes â€Å"an hundred mark†. Why he tells of his exploitative ways is fascinating, because he openly tells the other pilgrims without fear, but as seen, the bartender finds his methods bitter, â€Å"thou woldest make me kisse thyn olde breech, and swere it were a relik of a seint†, the host points out that the Pardoner would sell his old underpants and claim it to be a relic which is why we’re repelled by the Pardoner because his methods of acquiring such wealth is deemed wrong, even as a modern interpretation.

Sunday, September 29, 2019

I am a leader Essay

I am naturally very friendly and enjoy talking to others, this will be beneficial during room check when girls are still awake and want to share things about their day. I am not shy and am not afraid to enforce the rules, especially the dress code, although I am a student. I am very creative and will enjoy decorating the hallway to make the girls feel welcome in my dorm. I am also and very organized and will be informative to the girls so that they will know about upcoming events each week such as dorm or campus devotionals and campus wide events. I will also remind them of certain events approaching such as clean sweep and saving energy week(s). I have been attending the Church of Christ since I was born. I now attend church at Crosswind Church of Christ while school is in session. I am extremely comfortable talking to students about their faith. I have spoken at girls devotional, been a prayer group leader at the three past retreats, was in charge of the Bible classes of Jr. Camp at MSYC last summer and will be this coming summer, and am currently the youth intern at Crosswinds COC and teach the High School girls Wednesday night class. This is an area that I feel very comfortable. I am a leader in many ways. I am holding leadership roles as officers in PKA and STEA and am a leader to the girls at my church, in my club and any one who sees my actions. I am constantly being a leader by representing the most Christ-like persona I am able to, at all times. Being in the positions that I am in make me a leader, but I try to be a positive leader regardless of what position I have.

Saturday, September 28, 2019

SALEM Manufacturing Essay Example | Topics and Well Written Essays - 250 words

SALEM Manufacturing - Essay Example Since Salem is expecting a minimum acceptable margin sale price of 1,500,000 dollars and if the expected exchange rate of $1.56 per British pound goes below $1.50 per British pound, this would end up in a loss on Salem’s side which is not desirable and moreover such a hedge can increase the tax burden too. The option of Money marketing hedge would also prove us wrong for the same reason as explained above. By locking the British pound transaction in dollars, the company can also suffer losses as dollar value goes down per British pound. The Options marketing hedge will do no better than the previous strategies when the results are considered. Offsetting the British pounds and waiting for the price to be favorable would be risky in this scenario. So the best option among those we have is to remain Unhedged. This is considered to be the best strategy as in this method Salem’s exposed amount of $1,500,000 is subjected to the movements of the relevant exchange rate. In seve ral cases of this kind, the unhedged strategy has worked better to the hedge strategies yielding safe results. The hedge strategies usually work with special cases that come with biased conditions.

Friday, September 27, 2019

The Student Motor Company Case Study Example | Topics and Well Written Essays - 1000 words

The Student Motor Company - Case Study Example Additionally, each and every individual’s personal moral principles and values also count. Social responsibility on the other hand is the obligation a business has as it aims at maximizing the positive impact of its activities and minimizing the negative impact its operation has on the society in general. Top level management in business today realize that ethical issues can no longer be applied in the context of administrative rules and regulations that must be adhered to and followed by everyone like in the past, it is indeed more than that. Ethics has transformed to become very crucial in determining the success of business with the heightened level of competition (Saviour, Nwachukwu, Faye & James 110). The ethical dilemma of The Student Motor Company The stakeholders of The Student Motor Company from the case study are the customers of the automobiles, the government regulators who come up with the numerous regulations managing the operations of the company and the industr y, various interest groups and the public in addition to each and every individual’s personal moral principles and values. ... Additionally, tests conducted on the automobile reveal that Zinger does not meet emission standards with a check on the EPA standards revealing that the need was to meet the requirements at the sale. Numerous studies further indicate that the customers were most likely to realize the fact that the Zinger pollutes beyond EPA standards after driving the automobile for a year or two. The tests results were forwarded to the highest level of the company management by Mr. Technical, a student motor company engineer. Tests conducted by student’s motor showed installation of the fuel tank above as opposed to behind the rear axle made the vehicle pass the 20-mile per hour rear impact test. Despite these concerns, and recommendations being made to the top management of the company, the company still went ahead to produce the Zinger informed by the fact that the automobile met all the applicable federal standards and compared on safety grounds to other similar cars being produced. Inform ed by this, I believe that the management of Student Motor Company is both morally and legally responsible for Mrs. Gray’s burn death. The responsibility of Student Motor Company for the emission standards for the Zinger My firm has both ethical and social responsibility to prevent known failure which may cause death. The firm is ethically responsible to the customers of Zinger, the government regulators and the numerous interest groups with interest on the firm like the shareholders, the suppliers and the employees. the firm are responsible for communicating to the customers any defects on the firms products that maybe detrimental to the health of the customers and

Thursday, September 26, 2019

Management Information Systems IT Project Essay Example | Topics and Well Written Essays - 500 words

Management Information Systems IT Project - Essay Example CRM greatly impacts the running and overall performance of a business. The most important effect of CRM is the reduction of costs. Effective management of customer relation has direct positive effects on the profits of the business and also increases customer loyalty. It also increases efficiency as the customer correspondence is channelized through technological means such as online services. Application of social business strategies may be used for enhancing the procedures of sales, services and other business aspects. The CRM users typically include the customers, the company employees who use it to communicate or collect information of customers and the general public who use it for general information purpose or potential customers. CRM facilitates each user with simplified and hassle-free solutions. A company employee finds it easy to categorize and classify the customers according to company parameters and priorities. This allows for better coordination and better accommodates the quality market (Anderson, Kristin & Kerr, pp. 18). The customer finds it comfortable to have a channel to communicate their concerns and issues to the company and a quick response usually translates into sales. For people in general, CRM provides the right tools for social analysis and allows for reaching the desired market in efficient manner and reduce redundancies. People also get attracted by the features provided by CRM and turn into potential future customers. The CRM strategy of implementing software and electronic communication means has eliminated the manual work to a bare minimum. The present day customer finds the web to be the easiest way of acquiring information. CRM caters for this tendency effectively. Features like customer services, helpdesk and online customer care representatives allow for more customers to be attracted to the business. The company also operates without fear of losing data as the use of cloud computing system allows for data backups to be

Wednesday, September 25, 2019

Soy Whipped Topping Business Plan Assignment Example | Topics and Well Written Essays - 1750 words

Soy Whipped Topping Business Plan - Assignment Example Soy foods and products include several whipped toppings that are basically made from rice, soy and even coconut. Both rice and soy whips in the market are either in spray cans or boxes. These products normally have a lifespan of a year and are supposed to be refrigerated. The soy whipped topping are good when used with cakes, fruits, desserts, pies, cappuccinos and even beverages such as chocolate tea. The most popular soy whipped toppings currently in the market belong to two brands; Soyatoo and Viana. Soyatoo soy whip brands include: blue-rice whip, brown-cocoa whip and the red-soy whip which are normally in boxes or spray cans of three hundred milliliters (ML). Despite the different colors the three products are made from similar inputs. Over the recent past, different individuals in United States and Europe have continued to develop interest in soy foods and products. This has further increased the demand of these products in the American market. This industry is basically made of various key players. Some of these players in this industry are developing while others have quite established their brands in different markets of the world. This is the reason why some consumers in America have in the past raised concerns regarding some existing soy whip products in the market and more specifically on issues of lactose presence as well as the functioning of the whip spray cans. As true entrepreneurs, we considered this as a good opportunity that required intervention and we decided to start a business of making soy whipped toppings and target lactose intolerant people in the market amongst other. Our soy whipped topping products will be in line with the respective customer’s needs and also of substantially high q uality. When starting a business, it is normally important for one to start by deciding on the particular form of business to operate since each form of business develops a different legal operating structure different from the others. In

Tuesday, September 24, 2019

Failure of the project Essay Example | Topics and Well Written Essays - 750 words

Failure of the project - Essay Example Without the help of each group in the company any effort geared to boost the performance of a firm is set to fail. Laying off the experienced staff members and replacing them with temps. This is one of the worst decisions that the company made. Though the company will eventually lay off its entire experienced staff member due to mechanization, the company should have done this gradually in order for the staff to be familiar with the new system. Replacing experienced staff with temps became detrimental as these do not have knowledge on the operations and were probably not given training. Extremely low bids for projects. The company felt very secure in their new technology that even though their decisions would eventually led to the accumulation of huge losses, they still push through because they are desperate for new clients and deals and at the same time hoping that that these losses will be recovered by the new system. Company's reluctance to hear about problems regarding SAP. As the management became confident that SAP will be the cure of their present problems, they were not able to come up with contingency plans to answer what if situations. This implies that the management was not able to know the possible pitfalls in the system which needed to be addressed. Overlooked customer. ... As the customers were not served properly with the new system, its performance and overall image in the community suffered. Aside from these managerial decision pitfalls, the company's external environment also contributed to its demise. The bankruptcy of its largest customer Phar Mor, Inc. also became a significant factor. 2. Who was responsible' For example, what role did FoxMeyer's information technology group play in the failure' As described above, the management team of FoxMeyer largely contributed to the fall of the company due to the decision it implemented. The information technology group can also be responsible as it appears that it had not thoroughly determined the feasibility of using SAP in the company. Also, as problems were not identified in the new system, possible solutions were not laid out in response to problems encountered in the implementation. It is also worth mentioning that the company became nearsighted and was not able to apply the new technology at the right time. The case exemplified that the whole company is not yet ready and was not made ready by the management in adopting a more advanced technology to aid it in its operation.

Monday, September 23, 2019

Restoration of the Parks Ecosystems Research Proposal

Restoration of the Parks Ecosystems - Research Proposal Example Ecological restoration involves a deliberate move that is initiated to reinstate the lost and existing components of an ecosystem. Restoration of an ecosystem may become necessary if it has been mutilated, altered or destroyed because of direct and indirect human activities or a result of other natural factors Wildfires, flash floods, turbulent storms and volcanic eruptions have destroyed natural habitats of organisms to the point that the natural balance in the system is no longer exist. Although the original state of an ecosystem might be impossible to achieve, restoration should focus on trying to get to that condition. It is very important to note there are several factors hampering restoration efforts to the initial level, these include current constraint and some other factors that may change the restoration path. The initial level of an ecosystem hugely affected by human activity and other factors may be difficult or impossible to determine with accuracy (Maltby, 2008). The be st mechanism to build restoration efforts is by embarking on building of sufficient knowledge of the ecosystem. About the High Park This is a valuable and certainly unique environment in the city of Toronto, as it a host to numerous interactions of different organisms. Besides these organisms, millions of people visit the park every year, some come do jog, walk their dogs, play soccer, cycle and other outdoor activities and others just come to marvel at this beauty (Egan, Hjerpe and Abrams, 2011).  ... Fourth, the park consist of a total of 99 existing significant plant species with 4 provincially rare, 9 regionally rare and 86 locally rare plant species. Fifth, there are 250 migratory bird species and a host of 48 breeding bird species, about 6 butterflies of conservation concern, 19 species of mammals and 8 species of amphibians and reptiles. The park was established in the year 1873, it is one the heartbeat of Toronto life as it is the key to the daily lives of the residents of the city. This is the reason that makes it important to develop sufficient proposal to restore the park to its initial setting for people to use continually and the organisms to be hosted unharmed. This is because human activities in the park have lead to some organisms to be endangered and the degradation of organisms and certain locations of the park such as the ponds, the wetlands, forests and meadows, wildlife and creeks. Therefore, to restore the park for the future generations to benefit from and ma rvel at, it is important that restoration efforts of the park to be taken seriously and further be compliment by proper management and maintenance. This proposal aims at determining strategies and mechanisms that can be effectively applied to restore High Park’s ecosystems. Image 1: An aerial view of High Park showing massive human activities Adopted from http://www.toronto.ca/trees/HP_OakWoodland_Resotration.htm Formation of the High Park The area occupied by the park currently was composed of glaciers in the Ice Age; it owes its topography and soil to this period. Researchers insist that as warming began, the melting glaciers started to move to the north of the country, resulting in the formation of a lake, which is very

Sunday, September 22, 2019

Critically discuss the extent to which HPWPs may be successfully Research Paper

Critically discuss the extent to which HPWPs may be successfully implemented - Research Paper Example Basically, it can be noted that there is no universally agreed definition of HPWP but there are three key characteristics that are shared by many advocates of this model. The key attributes of this model are as follows: HPWP seeks to generate performance through the utilisation of practices which secure mutual gains for both the employees and employers, employees are treated as valuable assets and this model involves bundling of practices which yield combined benefits that are greater than the sum of their individual parts (McDuffie 1995). In order to effectively implement HPWP in the workplace, Huselid (1995) identifies three practices that are key attributes and these include the following: comprehensive recruitment and selection procedures, incentive compensation as well as extensive employee involvement and training. Employees form the back bone of every organisation hence effective recruitment as well as improving their performance are the major factors that determine success of business during the contemporary period. In most cases, employee recruitment mainly depends on the available human resources tools and their ability to cope with the environment they will be operating in. Thus, recruitment of skilled and qualified employees is a vital strategy for an organisation to function successfully with regards to high performance work practices. For any organisation to run viably, there is need to recruit the best talent in the first place as these people would be capable of being developed to become valuable assets to the organisation. The success of an organisation operating in a competitive market is mainly determined by its ability to recruit skilled people and this is a process which requires careful consideration. Recruitment involves searching for and obtaining qualified job candidates and it gives the organisation the opportunity to select the most appropriate persons to fill its job needs (Carrell, R. et al 1995). Effective recruitment often attract s individuals to the organisation and also increases the chances of retaining the individuals once they have been hired. Recruitment efforts seek to satisfy the needs of job applicants as well as the needs of managers. Recruiting the right staff is key to implementing a performance related strategy which encompasses retention of those skilled employees. In most cases, such specialist and skilled workers may be in short supply and a company may find it difficult to replace the experienced workers and training of individual employees with more skills in particular jobs. As far as these measures are put in place, the performance of the employees is likely to improve greatly given that there will be more incentives to create a sense of belongingness to the organisation by the employees. In most cases, it can be noted that organisations are run on the basis of various decisions that are made within any particular organisation. In practice, decision

Saturday, September 21, 2019

MidTerm Study Guide Essay Example for Free

MidTerm Study Guide Essay The Midterm Exam is open book, open notes. The maximum time you can spend in the exam is 3 hours. If you have not clicked the Submit For Grade button by then, you will be automatically exited from the exam. In the Midterm Exam environment, the Windows clipboard is disabled, so you will not be able to copy exam questions or answers to or from other applications. 2. You should click the Save Answers button in the exam frequently. This helps prevent connection timeouts that might occur with certain Internet Service Providers, and also minimizes lost answers in the event of connection problems. If your Internet connection does break, when you reconnect, you will normally be able to get back into your Midterm Exam without any trouble. Remember, though, that the exam timer continues to run while students are disconnected, so students should try to re-login as quickly as possible. The Help Desk cannot grant any student additional time on the exam. 3. See the Syllabus Due Dates for Assignments Exams for due date information. 4. Reminders You will only be able to enter your online Midterm Exam one time. Click the Save Answers button often. If you lose your Internet connection during your Midterm Exam, logon again and try to access it. If you are unable to enter the Midterm Exam, first contact the Help Desk and then your instructor. You will always be able to see the time remaining in the Midterm Exam at the top right of the page. 5. Assessments with Multiple Pages Make sure you click the Save Answers button before advancing to the next page (we also suggest clicking on Save Answers while you are working). Complete all of the pages before submitting your Midterm Exam for instructor review. Do NOT use your browsers Back and Forward buttons during the Midterm Exam. Please use the provided links for navigation. 6. Submitting Your Midterm Exam When you are finished with the Midterm Exam, click on the Submit for Grade button. Please note: Once you click the Submit for Grade button, you will NOT be able to edit or change any of your answers. 7. Exam Questions There are 10 randomly selected multiple choice questions each worth 5 points for a total of 50 points. The Midterm Exam covers TCOs 1-4, 8, 11, and 12 and Weeks 1–5. The Midterm Exam contains two pages, which can be completed in any order. You may go back and forth between the pages. The Midterm Exam questions are pooled. This means that not everyone will have the same questions. Even if you do have some of the same questions, they may not be in the same order. These questions are distributed amongst the TCOs. The entire exam is worth 200 points. On the essay questions, your answers should be succinct, should fully address each part of the question, and should demonstrate your knowledge and understanding in a concise but complete answer. Most essay questions require answers that are a couple of paragraphs (not a couple of sentences) that directly speak to each part of the question. Some students opt to work on the essay questions first, due to their higher point value and the length of time needed to adequately address each question, but this is entirely your choice. Remember to always use proper citation when quoting other sources. This means that ANY borrowed material (even a short phrase) should be placed in quotation marks with the source (URL, author/date/page #) immediately following the end of the passage (the end quote). Changing a few words in a passage does NOT constitute putting it in your own words and proper citation is still required. Borrowed material should NOT dominate a student’s work, but should only be used sparingly to support your own thoughts, ideas, and examples. Heavy usage of borrowed material (even if properly cited) can jeopardize the points for that question. Uncited material can jeopardize a passing grade on the exam. As a part of our commitment to academic integrity, your work may be submitted to turnitin. An online plagiarism checking service. Please be VERY mindful of proper citation. 8. Some of the key study areas are below. Although these are key areas, remember that the exam is comprehensive for all of the assigned course content and that this study guide may not be all inclusive. TCO 1 Definitions of Technology and Science, the Three Technological Revolutions, Technological Systems, Week 1 Lecture, Week 1 Readings TCO 2 – Technology and Historical Change, the Industrial Revolution, Technologies in Different Cultural Contexts, Week 2 Lecture, Week 2 Readings TCO 3 – Technology and the Arts, Digital Technologies, Collaborative Technologies, Week 4 Lecture, Week 4 Reading TCO 4 – The Cultural Impact of Technologies (Computers, Cell Phones), Technologies as Artifacts and Ideas, the Social Shaping of Technology, Week 3 Lecture, Week 3 Readings TCO 8 The Industrial Revolution and the Steam Engine, Determinism and Its Critics, Week 2 Lecture, Week 2 Readings TCO 11 – Research Methods, Research Sources, Week 1 Tutorial TCO 12 Potential Impact of Emerging Technologies (GMOs, nanotechnology, robotics), Week 3 Lecture, Week 3 Readings 9. The readings from the first four weeks are emphasized in this exam. Please make sure that these are read and that you participate in the discussion of these readings. Areas that were discussed in the threads will be prime targets. 10. Assignments will also be prime targets for revi siting. 11. Reviewing the TCOs, which I have listed below for your convenience, will also be a great preparation for the Midterm Exam. 1 Given one or more examples of major technology development projects based on scientific theory, such as controlled heavier-than-air flight or the Manhattan Project or cloning, develop a definition of technology that includes a clarification of its relationship to science. 2 Given a historical turning point, such as the fall of the Roman Empire, the Crusades, the Protestant Reformation, the growth of cities, or the collapse of the Soviet Union, establish the role of technology in triggering the event and shaping its outcomes. Given an account of a stylistic trend in an art such as painting, music, literature, theater, or film, determine what technologies were involved and how they affected the evolution of the respective art. 4 Given examples of the widespread adoption of a technology that changes the culture of a society (e. g. , cars, computers, cell phones, etc. ), analyze the technology and the patterns of its adoption to identify the sources of the technologys influence. 8 Given a consequential technological invention, such as the printing press, the telephone, the automobile, the microchip, or the Internet, assess the cultural, economic, or social changes brought about by the invention. Given a process for defining and limiting a topic, participate in a research project as a member of a student team that investigates, formulates, and presents its analysis of (a) an issue associated with a technology, (b) the characteristics of the technologys development, (c) its present and likely future impact, and (d) the ethical or moral issues arising from the development or implementation of that technology. 12 Given an emerging technology, evaluate its future prospects by identifying the cultural and social factors that may prevent or promote its successful application. Finally, if you have any questions for me, please post them to our Q ; A Forum or e-mail me. Good luck on the exam!

Friday, September 20, 2019

Cultivation of Red Seaweed Kappaphycus Alvarezii (Doty)

Cultivation of Red Seaweed Kappaphycus Alvarezii (Doty) Cultivation of red seaweed Kappaphycus alvarezii (Doty) in deeper-seawater of South Sulawesi, Indonesia Petrus A. Wenno Abstract. The culture of red seaweed Kappaphycus alvarezii in shallow water is at present increased in accordance with the necessity to multiply biomass. This economic commodity is highly demand for its polysaccharide. However, an effort to expand the cultivation area is difficult to several places. This problem may be overcome by employing some hanging rafts at different depths. This research was carried out for 49 days under three different treatments, i.e., two morphological types (green and brown), three initial seedlings (50, 100 and 150g) and five different water depths (100, 250, 400, 550 and 700 cm). The result showed significant differences in growth and biomass among three treatments (P Keywords: Kappaphycus alvarezii, deeper water, daily growth rate, biomass, carrageenan Introduction. The culture of red seaweed Kappaphycus alvarezii has been conducted in almost around Indonesia waters recently since it was first introduced (Adnan and Porse 1987). Normally, the culture take place in shallow waters at a depth of about 10 meters, but not all waters can be utilized for culturing. Seaweed biomass obtained through longline technique in shallow waters can produce about 12 tons acre yr-1 (Dahuri 2012). The product can reach 48 tons acre yr-1 when vertical technique is deployed in deep water (Hurtado and Agbayani 2002). Deep water area can be used as a productive culture site when meet the requirements of seeds quality, the initial weight and water depth. The utilization of deep waters should be in agreement to the status of coral reefs around the location as an essential requirement for obtaining higher biomass production (Chandrasekaran et al. 2008). High biomass production achieves through deep water culture system (Hurtado-Ponce et al. 1996) suggest that the deep water can be used for large-scale cultivation. Sahoo et al. (2002) and Sahoo and Ohno (2003) suggest that water comes from deep column is very rich in nutrients and can be used alternatively as laboratory culture media and cultivation media for Kappaphycus and other types of seaweed. However, the use of deep water has several constrains related to physical and chemical characteristics, cultivation equipment and proper environment to make it usable. As an important commodity with high market demand, cultivation of K. alvarezii requires broader area in order to meet market demand (Nurdjana 2010). There are few studies related to growth and carrageenan content generating in shallow waters (Hurtado et al. 2008; Naguit et al. 2009). However, there were not many studies dealt with growth and the yield of carrageenan in deeper waters. This study was aimed to assess the growth of K. alvarezii in deeper waters based on different strains, initial weights and depths of the waters that affect growth, biomass and the yield of carrageenan. 2 Material and Method. Seedlings of green and brown strains of K. alvarezii were obtained directly from the cultivation area in the Takalar Regency of South Sulawesi. These seeds were used after three days acclimatization. Good seeds are the young plants with their tips still sharp and in conical shape (Neish 2005). The seeds were then put at hanging raft (Figure 1) and monitored for 49 days for growth, biomass and carrageenan yield. Hanging rafts (Wenno 2014) were designed to replace hanging rope techniques (Hurtado et al. 2001). Each raft consists of two PVC pipes (L = 200 cm, à ¸ = 5 cm) filled with a mixture of concrete cement which served as the weigh. Both PVC pipes connected by two pieces of wood (H x W x L: 5 x 7 x 400 cm) at the end to form a raft. The total area of raft is 8 m2 (W x L: 200 x 400 cm). Some nylon strings (à ¸ = 4 mm) with the length of 4 m were used to connect both PVC pipes and functioning as a binding place for seaweed seeds. The distance between the nearest two strings was 20 cm. The raft was hung in the water column with the help of the buoy ropes (à ¸ = 10 mm) and was placed at different depths (100, 250, 400, 550 and 700 cm). The buoy was made of Styrofoam (H x W x L: 40 x 50 x 50 cm). During operation, the first raft was connected to the second; the second raft was connected to the third and so on until the fifth at a maximum depth of 700 cm. The hanging rafts construction was t hen tied to the anchor ropes (à ¸ = 12 mm), meanwhile the anchor was made from flour sacks filled with sand (Figure 1). buoy water line nylon ropes hangring rafts PVC with concrete cement inside sandbags anchor raft, view from above Figure1. Hanging rafts construction, viewed from frontage (Source: Wenno 2014) Seaweed seeds were then tied to the span ropes according to tie-tie technique (Goes and Reis 2010). Seedlings from different initial weights (50, 100 and 150 g) were tied to the twin knot ropes (à ¸ 1 mm). The closest distance between two nodes was 20 cm. Seeds of different strains and different initial weight (250, 500, 750 g) were placed on different rafts at different depth. Samplings were carried out for seven consecutive weeks. Data were then used to calculate daily growth rate (DGR) which was determined weekly using the following formula of Dawes et al. (1993) in Hurtado et al. (2001) as follows: à °Ã‚ Ã‚ Ã‚ ·Ãƒ °Ã‚ Ã‚ Ã‚ ºÃƒ °Ã‚ Ã¢â‚¬ËœÃ¢â‚¬ ¦= à °Ã‚ Ã‚ Ã‚ ¿Ãƒ °Ã‚ Ã¢â‚¬ËœÃ¢â‚¬ º à °Ã‚ Ã¢â‚¬ËœÃ…  Ãƒ °Ã‚ Ã¢â‚¬ËœÃ‚ ¡Ãƒ °Ã‚ Ã¢â‚¬ËœÃ…  0 1à °Ã‚ Ã¢â‚¬ËœÃ‚ ¡ Ãâ€"100 Where : DGR = daily growth rate (%) à °Ã‚ Ã¢â‚¬ËœÃ…  Ãƒ °Ã‚ Ã¢â‚¬ËœÃ‚ ¡ = fresh weight at day t à °Ã‚ Ã¢â‚¬ËœÃ…  0 = initial fresh weight t = time interval of measurement (7 days) 3 Seaweed biomass was recorded at the end of experiment and expressed as fresh weight of seaweed per unit culture area (g.m-2), and computed with the following formula: à °Ã‚ Ã¢â‚¬ËœÃ…’= à °Ã‚ Ã¢â‚¬ËœÃ…  Ãƒ °Ã‚ Ã¢â‚¬ËœÃ‚ ¡Ã¢Ë†â€™Ãƒ °Ã‚ Ã¢â‚¬ËœÃ…  0 à °Ã‚ Ã‚ Ã‚ ´ Where: Y = biomass production à °Ã‚ Ã¢â‚¬ËœÃ…  Ãƒ °Ã‚ Ã¢â‚¬ËœÃ‚ ¡ = fresh weight atday t à °Ã‚ Ã¢â‚¬ËœÃ…  0 = initial fresh weight A = area of 1 m2 raft. The measurement of carrageenan contents (yield) following the formula suggested in Hayashi et al. (2007) and Hung et al. (2009): à °Ã‚ Ã¢â‚¬ËœÃ…’à °Ã‚ Ã‚ Ã‚ ¶= à °Ã‚ Ã¢â‚¬ËœÃ…  Ãƒ °Ã‚ Ã‚ Ã‚ ¶Ãƒ °Ã‚ Ã¢â‚¬ËœÃ…  Ãƒ °Ã‚ Ã¢â‚¬ËœÃ¢â‚¬ËœÃƒ °Ã‚ Ã¢â‚¬ËœÃ‚ ¤ Ãâ€"100 Where: YC = carrageenan content (%) à °Ã‚ Ã¢â‚¬ËœÃ…  Ãƒ °Ã‚ Ã‚ Ã‚ ¶ = weight of carrageenan extract (g) à °Ã‚ Ã¢â‚¬ËœÃ…  Ãƒ °Ã‚ Ã¢â‚¬ËœÃ¢â‚¬ËœÃƒ °Ã‚ Ã¢â‚¬ËœÃ‚ ¤ = dry weight of analysed thallus (g) Three factor analysis of variance according to Zar (1999) were used to analyse the experiment data and was performed with SPSS v 21 software. Subsequent analysis with Tukeys HSD test was computed when there were significant differences among treatments with level of significance (P Results and Discussions. Daily growth rate of Kappaphycus alvarezii shows the interaction between strain and initial weight, strain and depth, as well as the initial weight and depth which was highly significant (P0.05). Further test showed that the highest daily growth rate of green and brown strains was obtained at the initial weight of 100g, which tend to be the same (2.84%). It was related to the density of plant (Hurtado et al, 2008), leading to rapid growth in the initial weight. Daily growth rate at the initial weight of 100g was influenced by the interaction between solar radiation, temperature, nutrient and water movement (Santelices 1999), and causing absorption of nutrients faster than other initial weights. Absorption of nutrients was influenced by the density of plants (Azanza-Corrale et al. 1996). Daily growth rate of K. Alvarezii of green and brown strains tend to be the same. The highest similarity daily growth rate in green strain was achieved at the depths of 100 and 250 cm (2.55%), and the lowest one was at 700 cm depth (2.23%). The highest similarity daily growth rate in brown strain was also achieved at the depth of 100 and 250 cm (2.83%), and the lowest one was at a depth of 700 cm (2.57%). The highest daily growth rate of green and brown strains associated with the movement of water (Santelices 1999). The movement of the water at that depth was turbulent, consequently reduce the thickness of water that is not mixed in the boundary layer (Neish 2005), and the absorption of nutrients in this depth is faster. Glenn and Doty (1990) suggested that the absorption of nutrients during the fast flowing water between thalli is higher for ammonium at a lower depth than for nitrate at the higher depth. The absorption of ammonium by seaweed is more important than nitrate (Dy and Y ap 2001; Raikar and Wafar 2006). Similarly to daily growth rate, biomass production of K. alvarezii showed the interaction between strain and initial weight, strain and depth, as well as the initial weight and depth which was highly significant (P0.05). The highest biomass production of green strain was achieved for the initial weight of 100g (10,219 g.m-2), and the lowest with the initial weight of 50g (6,709 g.m-2). The highest biomass production of brown strain was found for the initial weight of 150 g (11,450 g.m-2), and the lowest one with the initial weight of 50g (7,479 g.m-2). The highest biomass production achieved was related to the density of K. alvarezii thalli (Hurtado et al. 2008) that affect the circulation of nutrients. With the initial weight of 100g the biomass production of green and brown strains gained was two times higher than the initial weight of 50g. The 4 biomass production of green strain with the initial weight of 100g was optimal and may not be increased above this initial weight whilst the biomass production of brown strain can be increased up to the initial weight of 150g. The highest biomass production of green strain can be obtained at a depth of 100 cm (9,172 g.m-2) and of brown strain at a depth of 250 cm (10,522 g.m-2). The similarity of the highest biomass production of both strains obtained at depths of 100 and 250 cm. The highest biomass production similarity of brown strain was achieved at 100 and 250 cm depth. This is related to the absorption of nutrients in the lower depths which is faster than that of the higher depth (Neish 2005). Turbulent water movement causes the thickness of the boundary layer between the water and thalli reduced and accelerated the diffusion of nutrients into thalli (Neish 2005). Biomass production of K. alvarezii was influenced by the interaction between nutrients and the movement of seawater among thalli (Santelices 1999). The yield of carrageenan in K. alvarezii shows the interaction between strain and initial weight, strain and depth, as well as the initial weight and depth and was highly significant (P0.05). The yield of carrageenan of green and brown strains was obtained with low initial weight. The yield of green strain obtained with the initial weight of 50g was higher (15.06%) than that of the brown strain (12.33%) of the same initial weight. The yield of green and brown strains was higher at the higher depths when compared to the lower depths. The highest yield of carrageenan in green strain was obtained at a depth of 550 cm (14.71%) and brown strain at the depth of 700 cm (12.18%). The highest yield of carrageenan is the result of the interaction between depth and the initial weight at a depth of 700 cm with the initial weight of 50g (14.70%), followed by the initial weight of 100 g (13.25%) and the initial weight of 150g (11.95%). The results showed that the yield of carrageenan in both strai ns was not in line with the daily growth rate. It was found that the yield of carrageenan in this study was contrarily with the finding of Hurtado et al. (2008) with a long line cultivation technique, which yields an increase in line with the daily growth rate. In this study, carrageenan yield of K. alvarezii green and brown strain increases with the depth and corresponding with the increasing level of carotenoid which obtained at the highest carotenoid level at a depth of 700 cm for both strains. Carotenoid acts as antenna pigments for absorbing light in the process of photosynthesis to produce carbohydrates. However, carrageenan yield in this study is lower than the findings of Hayashi et al. (2007) and Distantina et al. (2011). Conclusions. Daily growth rate of K. Alvarezii green and brown strains was influenced by the initial weight and tend to be reduced by an increasing of depth. Biomass production was also reduced by the increasing depth with the highest biomass of green strain obtained with lower initial weight, and brown strain with higher initial weight. The yield of carrageenan increased according to depth with the highest yield was observed at green strain compare to brown strain. To obtain higher biomass and carrageenan yield, cultivation should be done at a lower depth for green strain and at a rather lower to higher depth for brown strain. Acknowledgements. This study was supported by BPPS grant of DGHE from Ministry of Education and Culture Affair of Republic of Indonesia. The author would like to thanks Mr. Akrim Djusdil, Chairman and Mr. Mus Mulyadi, Analyst of PT. Bantimurung Indah in Maros Regency of South Sulawesi for their help; and thanks also to Daeng Bani the seawee

Thursday, September 19, 2019

Love vs. Lust in Andrew Marvells Poem, To His Coy Mistress Essay

I know that there is a unique difference between love and lust. In the Andrew Marvell poem â€Å"To His Coy Mistress,† I would argue over the issue of love versus lust. In this poem, we are introduced to a man who is infatuated with a young woman and wants to become intimate with her. He tries to pursue this young woman, but the woman is playfully hesitant. The man is trying to explain to the young woman if she keeps being resistant to him, they would never get a chance become intimate. Could it be that the man really does have true love for the young woman? Or is that he is just lusting for her gentle touch? In the first stanza of this poem, the man begins by expressing his feelings for the young woman. He starts off by trying to flatter the young woman. He does this by telling her that if he had all the time in the world, he would use it by telling her how beautiful she was. Since he knows that they do not have all the time in the world, he uses his charm and persuasion to try to get her to become intimate with him. In my opinion, at this point of the poem, it seems as if the man has...

Wednesday, September 18, 2019

Stained Glass Windows :: Art Architecture

Stained glass windows Stained glass windows used to be only referred to Cathedral windows but it has now moderated into a wide variety of different things. Many people think stained glass is just work on windows but it can also be three dimensional structures and sculptures. Stained glass is still widely used for different things. There was a time when stained glass was deceased but then it later got revived. Stained glass is sometimes difficult to make but if the artist is skilled enough they will produce beautiful designs. Origin of stained glass Colored glass is not something that started just recently. In fact history has it that there were colored windows around since ancient times. The Egyptians and the Romans both produced colored objects. The early Christians during the 4th and 5th century had wooden window frames that contained some omate patterns of alabaster that gave it a colored glass effect. These effects were also done by Muslim architects and others in southern Asia. Then later in the 8th century a Muslim alchemist scientifically describe 46 different colored glass. Destruction of stained glass In England many stained glass windows were being torn down and plain windows would replace them. All this happened during the dissolution of the monasteries under Henry the VIII. This caused thousands of windows to be destroyed since the dissolution of the monasteries gave Henry the right to confiscate the property of the monasteries, and to do whatever he wanted with it. Then later the traditional method of making stained glass was also destroyed and they would not be revived until early 19th century. Stained glass now Lots of stained glass windows were worked on, because there were many churches that had had their windows destroyed during World War II. The German artists were the once that set the tone to restart the restoration. Many artists have transformed stained glass into an art form. Artists now use slab glass and concrete as an innovation to the older era of stained glass. The United States also has a 100-year-old trade organization called the stain glass association of America.

Tuesday, September 17, 2019

Defining Roles through the Use of Language in Richard Wright’s Autobiography, Black Boy :: Richard Wright’s Black Boy

Defining Roles through the Use of Language in Richard Wright’s Autobiography, Black Boy In his autobiography, Black Boy, Richard Wright is constantly feeling alone and cast from society. He always knew he was different from his friends and the other kids; he knew that there was something separating himself from his peers- language. Throughout the novel Wright uses language to define roles, to define himself, and to define society. Wright’s use of language and rhetorical techniques allows his readers to know exactly which characters are filling which roles in the novel. For example, when Richard walks into his boss's office to explain that had been bitten by the man's dog, his boss's secretary uses short concise sentences. '"He isn't here now,' she said, and went back to her typing," explains the exact manner in which Richard was treated. the syntax exhibited here demonstrates that the secretary does not have -- nor does she want to have -- the time to listen to a black boy in pain. This clearly shows that this secretary is above Richard and has no desire to slip down to his level. Furthermore, Richard uses a different syntax when speaking back to the secretary. His sentences are longer while remaining simplistic. "His dog bit me, ma'am, and I'm afraid I might get an infection" demonstrates how the diction in Richard's sentences is much less offensive and accompanied by a certain sense of inferiority, sh owing his fear of this white secretary without actually saying it. Just from Wright's choice of wording (diction and syntax), the roles in this passage are clearly drawn and defined. Wright not only defines the roles of others in this passage but, with language, he defines himself. For example, when Richard says things like; "Can't I see the Boss?" "It's swelling, " and "sonofabitch"; they are not taken with a playful connotation. His frequent use of contractions and poorly structured sentences bring to the forefront, basically, exactly how uneducated he truly is. This use of diction in his dialogue easily shows his character and exactly who he is. Lastly, Wright's use of language defines society as a whole.

Monday, September 16, 2019

Importance of Ego

The Importance of Ego In the novella Anthem by Any Rand, the last two chapters play an important part in bringing together the text as a whole. The narrator transitions from third to first person narration after his escape from the dismal â€Å"utopian† society. Prometheus, the aforementioned narrator, recounts the history of man and his struggle to overcome oppression by greater forces and authoritarian figures. The author chooses to repeat symbols and words of individuality and the benefits of singular work.Any Rand uses her novella Anthem to promote the importance of individuality in all aspects of life. In her early life, the author, Any Rand, was exposed to brutal oppression and collectivist thinking. Any Rand, born â€Å"in SST. Petersburg, Russia in 1905† soon before the communist revolution occurred in 1917. Growing up she detested the institution she lived under, so she immigrated to America in 1926. Any Rand was educated in the USSR which gave her an upper han d that other American novelists didn't have. She had first-hand experience with communism which drove her to oppose It entirely.According to Rand, â€Å"no outside power has the right to demand† anything from an Individual or the work they can produce. In her lifetime, Rand wrote Atlas Shrugged, We the Living, the Fountainhead, and Anthem. Among other less popular works by the end of her writing career. These fictional books advocate Individualism and bravery in a despotic society. Any Rand died in New York City, NY in 1982, leaving behind her a legacy which fueled more complex and innovative thinking in future generations of readers and philosophers.The style of Any Rand's writing impacted the world of literature from the beginning. She â€Å"[defied] cultural and political trends† and â€Å"established a unique place† among fellow authors. According to Danna, â€Å"[Any Rand's] mind was utterly first handed† which proved to be very successful. Although at first she was misunderstood and deemed â€Å"immature† in a psychological sense, Any Rand became a reputable author through explanation of her philosophy: Objectivism. According to Stephen Cox, â€Å"Rand could not find a philosophy that reflected her beliefs† so she created a new philosophy entirely.The success of Objectivism was long lived by Any Rand thanks to her persistence and unconditional belief in the individual mind. Her â€Å"[works are] a protest to individual submission† and they â€Å"reject distinction† just as the Objectivism theory does. This is why in her works she focuses â€Å"inside the head† of the narrator rather than the importance of a solid plot. The psychological aspect of her philosophy is seen especially in Anthem where the mind of one man has been destroyed by the foundation which raised him.In Anthem there is no sense of religion, either, which was Any Rand's purpose In all of her novels. According personally to An y Rand, â€Å"religion Is nothing but a brutal attempt to subjugate the Individual mind† and individual goals each man should achieve. Objectivism Is solely a belief In one's own self. There Is no delve power or authoritarian force that can sway a person's decisions or thoughts to work for or against others. Individual power Is higher than corruption and collectivist ideology. Electives ideologists. In Anthem there is no distinct malevolent force, but citizens who have different hardwiring in their minds than Prometheus does. There is no villain, only â€Å"good against good-different† since villains are deemed irrelevant. For objectivism, it is more important to focus on the protagonist and their inner struggles ether than the community and how an antagonist may impair them. One of the most important aspects of Anthem is its connection to the younger audience.Prometheus is a young adult trying to find his place in a society where he does not fit. According to Karen Go uld ‘any young adult would benefit from Promethium's struggle with identity because it is so easily relatable to them. Anthem, being one of â€Å"Rand's simplest novels†, explains objectivism using â€Å"inner psychological states† which is a both practical and pleasing style of writing for any reader interested in studying Objectivism works. Effortlessly, Anthem brings together both a pleasing plot packed with Objectivism morals and ideas.The novel brings â€Å"the kind of intensity' a reader would think â€Å"could [change] the course of history': exactly what Any Rand imagined her work to do. The protagonists â€Å"never give up† their beliefs and â€Å"assert their†¦ Stubborn views† on their world. These morals are synonymous with the ideas of objectivism: to never give up an individual thought, or decision because of outside forces. Anthem promotes â€Å"outstanding moral character† and individuality simply and with intensity, not to bore young readers, but to draw them towards eating more complex objectivism works, such as the Fountainhead.Unlike many novels of the time, Any Rand chose to create an inner struggle for Prometheus to battle throughout the novel. The beginning shows his unwillingness to think other than â€Å"the individual cannot exist apart from the collective† society, regardless of his sinful thoughts. With each chapter a new part of individualism is revealed to Prometheus, but it is up to him to fit the pieces together. The â€Å"evil† that he is doing â€Å"does not bring him a†¦ Punishment† rather a â€Å"psychological reward† for thinking as a singular person.Closing out the book, Prometheus fully understands that â€Å"ego is†¦ A cause of splendor† for man. The last two chapters of the novel represent the anthem of people Just like Prometheus and Gaga. Each paragraph can be read as a hymn or chant of people who believe in the individual mind , the people of Objectivism. Prometheus reflects on the history of man being â€Å"enslaved by the gods† and â€Å"enslaved by other men† and how detrimental this was to the ego of man. In his lifetime, the authority oppressed his society, and completely erased any evidence of first person.The summary of the wow-chapter anthem is that the only freedom left for men is taken away only by other men' and each person has the ability to create the life they want, no superior being can control the fate of a person. Unlike the aforementioned critics, it can be speculated that Any Rand used religious symbols and illusions to make fun of religion as a whole. Ego is â€Å"[the] god that will grant [men] JOY' and Prometheus and Gaga are very similar to the biblical Adam and Eve. The use of gods and religious symbols in this book further supports Objectivism ideas. To worship the ‘Ego god' is to worship oneself.There is no god to worship but the power inside oneself. Many cr itics believe that because Any Rand was atheist, that the religious symbols in her books happened by mistake, or were In reality and in fiction, Any Rand was a strong believer in the individualist mind and the power of one. Compiling her complex background, the breakthrough philosophy of objectivism, and lack of religious beliefs, each of Rand's novels proclaim the values and ideas of objectivism starting with the most basic Anthem. Even after her death, Any Rand still makes a very large impact on modern society and advanced philosophy today.

Sunday, September 15, 2019

Current Topic in Ethics Essay

The article speaks about a recent incident that took place in Brazil, which brought in to light the ethical and moral values of humans. The story had a two sided approach the first one being from the church of Brazil and the second one from the government side. The incident is regarding a step father raping her 9 year old daughter. The girl confessed that she was under a sexual assault from her step father since the age of 6(Yahoo News, 2009). The man was also convicted of sexually abusing the girl’s 14 year old handicapped sister. Cardinal Giovanni Battista Re, head of the Catholic Church’s Congregation for Bishops said that the abortion carried out by the doctors under the decision of the girl’s mother was totally wrong and the twins that the girl carried had a right to live. On the other hand President Luiz Ignacio Lula da Silva had other views on the matter. He said that according to the law of Brazil where abortion is illegal and allowed only in case where the health of the child bearing women is endangered the Bishop is totally wrong. The girl had actually been brought to the hospital after several stomach cramps and it was found that she is pregnant and carrying twins. At the age of 9 doctors commented that it was impossible for the girl to bear the children and an abortion was the only viable option left. As the doctor involved in the abortion Rivaldo Albuquerque said that it was important for us to save the life of the girl(Yahoo News,2009). Ethical Issues The article raised several ethical issues regarding human rights and social rights. Firstly the rape case as the man had committed was illegal and should be punished according to the government law of the country. Secondly the issue of child abuse as an ethical issue is also being raised by this incident which is another offense of the law and needs to be punished. Third and the most important issue which has been raised by this incident are of abortion which according to the law of Brazil is illegal. The fourth issue has been raised to contradict the third one which is another face of the same law of abortion which is banned. Abortion is only allowed in case the health of the child bearing women is endangered. The fifth ethical issue is the sexual assault of the other handicapped girl sister of the girl which was actually sexually assaulted. All these ethical issues have come forward due to this incident and need to be taken care of by the Brazilian government. Ethical Theories There are many ethical theories and fields of ethics that are present but only some that are relevant would be applied to this case. We will consider each theory one by one and apply it on the case to deduct a result. Greek Philosophy Socrates emphasized that a person to be ethically correct needs to realize the importance of human life and existence. A person would act rightly and correctly if he or she is self aware and knows the importance of life. Bad deeds or evil deeds are a result of ignorance and if the person knows the consequences of doing wrong he or she would never commit that act (MacKinnon, 2008). According to the theory of Socrates the man who committed the assault was unaware of the consequences of the act to be specific he thought that he would get away with his actions but only the pregnancy of the girl brought up the matter. The case of abortion according to this Greek philosophy is a bit controversial as the importance of human life needs to be considered and in this case whether to save the girl or the twins she was carrying was a decision to be made. Normative Ethics This field of ethics focuses on the rightness and wrongness of actions to judge whether they are ethical or not. The theory says that actions were mainly judged by the intentions of a person as in whether they are right or wrong (Kagan, 1997). According to this theory the man in the case is found guilty of committing a crime and should be punished accordingly as his intention was truly wrong and hence his actions also become wrong. Then the abortion of the child was also morally ethical as the life of the girl was endangered by her pregnancy, hence according to this theory the decision of abortion is also ethically correct. Meta Ethics This approach of ethics is a bit different from other approaches as it looks at the reasons for the truth and decides up on the validity of the reasons as to whether the actions that led to the truth were ethical or non ethical (Miller, 2003). According to this theory the actions of the man were totally unethical as the man had committed an immoral act, which is the truth. The reason for this act was his uncontrollable desires, which were unethical. Abortion was performed because it was the only option through which the girl could be saved. The reason for the abortion was the fact that the doctors had to save the life of the girl and could take no risks, hence the act of abortion was morally ethical. Descriptive Ethics This is a newer field of ethics than normative ethics and focuses on the choices that were available to the person and the one he or she picked according to that his or her actions are judged to be ethical or not. According to this theory the man is still found to be guilty and should be punished as the choices he made were ethically incorrect and on the other hand the abortion done by the doctors was also morally ethical as they had limited choices and needed to save the girl. The doctors agreed on the fact that the girl who was only 9 years old could not carry the burden of pregnancy and hence had to be saved through abortion. Conclusion During this paper we looked up on different theories and fields of ethics. These fields and theories were applied on the case and the deduction of whether this ethical issue were correctly dealt or not was focused. The conclusion is not merely my own decision but the result of applying the ethical theories on the case. These theories when applied clearly highlight the fact that the man should be punished according to the law of Brazil and the decision of abortion made by the mother of the girl and carried out by the doctors was a correct one in the circumstances that were presented. References: Kagan S. (1997) Normative Ethics, Westview Press. MacKinnon B. (2008) Ethics: Theory and Contemporary Issues. Wadsworth Publishing. Miller A. (2003) An Introduction to Contemporary Metaethics, Polity. Yahoo News (March 8, 2009). Vatican defends Brazil excommunication. Retrived on March 10, 2009 from http://au. news. yahoo. com/a/-/world/5375029/vatican-defends-brazil-excommunication/

Digital Crime and Terrorism Essay

Abstract The use of the Internet for criminal purpose is one of the most critical challenges facing the FBI and law enforcement in general. Understanding and using the Internet to combat Internet Fraud is essential for law enforcement. The fraud being committed over the Internet is the same Type of white collar fraud the FBI has traditionally investigated but poses additional concerns And Challenges, because of the new environment in which it is located. The Internet is a perfect vehicle to locate victims and provide the environment where the victims Don’t see or speak to the fraudulent. The Internet environment often creates a false sense of Security among users leading them to check out opportunities found on the Internet less Thoroughly than they might otherwise. Computer crime poses a daunting task for law Enforcement agencies because they are highly Technical crimes. Law enforcement agencies must Have individuals trained in computer science or computer forensics in order to properly to Properly investigate computer crimes. Computer crime is defined as any person that violates any Of the provisions of the following; unauthorized access to a computer system, Theft of computer Services, Interruption of computer Services, Misuses of computer system information, and Destruction of computer equipment. The general heading of computer crime can potentially Cover an array of offense by examining several existing definitions of computer crime, as well as Elements suggested as essential, some Have defined computer crime as any offense that uses or Somehow involves a computer. Role of Internet and crime The growth of the Internet has improved our economy, medicine and technology. Unfortunately, it has brought new opportunities for criminal activity, as well. Often, people Think cyber-crime simply refers to hacking, viruses and other intrusion tactics. Cyber- crime, However, threatens more than our businesses, economy or national infrastructure. Cyber- crime Affects us individuals, as well. Reprehensible crimes, such as child pornography and cyber Stalking, terrorize our children and our families. At the first hearing in this series, on May 24th, the Texas Deputy Attorney General for Criminal Justice testified that, quote, †One of the biggest problems is that computer criminals are targeting The most vulnerable of our society, children.† He pointed out that, according to the Federal Bureau of Investigation, child pornography was virtually extinct prior to the advent of the Internet. Now it is a serious plague on our society that must be stopped. Adults also experience the dark side of the Internet revolution. Using computer technology, Criminal types steal life savings and even identities of unsuspecting individuals. These pose Serious threats to the lives and the livelihoods of many individuals. But in addressing these areas Of crime, law-enforcement officers face several challenges. Identifying a sophisticated criminal Can be difficult. Once they are identified, bringing a criminal to justice may be problematic for Jurisdictional reasons. The criminal may be in a different State or even another country, and then law enforcement Officials must deal with extradition issues. Also, retrieving the information stored on a computer And using it for prosecution may be difficult if it requires highly technical skills not normally Taught to investigators or prosecutors. As long as there is technology, cybercrime will exist, yet Cybercrime must be curtailed as much as possible so that technology can legitimately continue To enrich our lives and strengthen our economy. Congress understands that law-enforcement officials must have the appropriate training and Equipment to fight fire with fire, or computer technology with computer technology; but Law-enforcement must remain cognizant of the need to protect the law-abiding publics Privacy while protecting the public. The public must understand that law-enforcement does need To use technology to deal with this new emerging threat to our children, our economy and our National security. Under current law, law-enforcement authorities must apply for the identical order in multiple Jurisdictions, causing burdens and delays that benefit no one but criminals. Congress should look At the possibility of a single order that would cover these kinds of requests comprehensively. Over the last decade, use of computers and the Internet has grown exponentially. Indeed, for Many individuals it is an integral part of their daily lives. With little more than a click of a Mouse, people can communicate, transfer information, engage in commerce, and expand their Educational opportunities. Unfortunately, criminals exploit these same technologies to commit Crimes and harm the safety, security, and privacy of us all. Indeed, as more people go online, More criminals are realizing that online crime can be lucrative, especially given the amount of Valuable commercial and personal information now being stored electronically. So-called †cybercrime† can be divided into two categories. On the one hand, we are seeing the Migration of †traditional† crimes from the physical to the online world. These crimes include Threats, child pornography, fraud, gambling, extortion, and theft of intellectual property. Simply Put, criminals are migrating online because they can reach more victims quickly, can collaborate With other criminals, can disguise their identities, and can use the global nature of the Internet to Remain anonymous. On the other hand, the Internet has spawned an entirely new set of criminal Activity that targets computer networks them. Included in this category are such crimes as Hacking, releasing viruses, and shutting down computers by flooding them with unwanted Information (so-called †denial of service† attacks). Our vulnerability to—and the damages caused By—this type of crime are astonishingly high. For example, in May of last year, the †I Love You† Virus began to infect computers on the Internet. Within a short period of time, it had disrupted the communications of hundreds of Thousands of computers, causing losses estimated in the billions of dollars. Virus demonstrated a new capability: when it infected a computer, it accessed the users Computer passwords and sent them electronically to a computer in a foreign country. The Implications of this virus—and the many viruses that have followed it—are staggering. In March of this year, the FBI’s National Infrastructure Protection Center issued a warning that An organized group of hackers from Russia and Eastern Europe had committed a series of Intrusions into more than forty banks and e-commerce companies in the United States. The Hackers stole over 1,000,000 credit card numbers from the companies’ data bases. They then Embarked on extortion of many of the companies, threatening to disclose confidential Information or damage the victims’ computer systems. Evidence suggests that the hackers then Sold many of the credit card numbers to organized crime groups. This crime—the investigation into which the Treasury Department participated and which has to Date resulted in two arrests—has grave implications. Not only did it cause financial losses for The Companies, but it harmed the privacy and security of the ordinary citizens whose credit Cards numbers and personal data were stolen. Individuals victimized by these sorts of Rightfully Fear the ramifications of criminals’ gaining access to their private financial and Personal data. This type of crime strikes at the confidence of consumers, threatening the vital Growth of e-commerce. Network crimes not only affect the security of individuals and businesses, they can also threaten Our nation’s critical infrastructures. Our power and water supply systems, telecommunications Networks, financial sector, and critical government services, such as emergency and national Defense services, all rely on computer networks. Cyber terrorist, the same devastating result could be achieved by hacking into the control Network and commanding the computer to open the floodgates. This is not a purely hypothetical Scenario. Several years ago, a juvenile hacker gained unauthorized access to the computers Controlling the operations of the Roosevelt Dam in Arizona. Although there are as yet no definitive statistics on the scope of the problem, there is no doubt That the number of crimes involving computers and the Internet is rising dramatically. For Example, the CERT Coordination Center, which was created to warn about computer attacks and Viruses, received over 21,000 network crime incident reports last year. This is more than double The number of reports it received the year before. Similarly, a survey conducted by the FBI and The Computer Security Institute recently revealed substantial increases in computer crime. Over 85 percent of the companies and government agencies surveyed reported computer security Breaches within the preceding twelve months, up from 70 percent last year. Moreover, Researchers at the University of California at San Diego recently reported a methodology that Enabled them to count the numbers of denial of service attacks. Their research revealed that 4,000 attacks occur every week. Responding to these threats is a daunting challenge. From my perspective, as I begin my assessment of our cybercrime efforts and the direction they Should take in the future, at least three themes or elements seem to emerge as particularly? Important to success in confronting cybercrime: developing specialized expertise, building Teamwork and partnerships, and assuring we have legal authorities which are both effective and Appropriate in the unique and ever-evolving setting of computers and the Internet. DEVELOPING SPECIALIZED EXPERTISE Combating computer crime requires a team of professionals, including investigators, forensic Experts, and prosecutors, all of whom have technical expertise. In addition to traditional Investigative skills, cybercrime investigators must be well versed in the intricacies of technology To insure that evidence is not lost or overlooked. Forensic experts must know how to handle Electronic evidence to protect its integrity for later use at trial, as well as how to recover and Analyze digital evidence from computers with hard drives that store gigabytes of data. And Prosecutors must understand the jargon and complexities of high-technology crimes and be able To translate technical evidence into a form understandable to a judge and jury. United States law enforcement agencies have devoted significant resources to developing cadres Of investigators and forensic experts who have the specialized skills needed for cybercrime Investigations. The FBI and Secret Service, which have particularly important investigative Responsibilities with respect to Internet and computer-related crimes, have certainly been in the A particularly important aspect of developing, and then sharing expertise in the field is the Nationwide network of federal prosecutors called Computer and Telecommunications Coordinators (or †CTCs†)—at least one from each district—who serve as the district’s Prosecutorial expert on computer crime cases. The CTC initiative was started by CCIPS in 1995, And has been strongly supported by our U.S. Attorneys. CCIPS trains and supports these Coordinators specially, so that they, in turn, can serve as a resource for their offices and the law Enforcement authorities and concerned industry in their regions of the country. In the Criminal Division, specialized expertise in combating cybercrime is not confined to CCIPS. Other sections have developed this expertise as traditional forms of criminality have Moved onto the Internet. For example, the Department has seen dramatic growth in various types of fraudulent online Schemes, and the Criminal Division’s Fraud Section has played a critical role in the Justice Department’s response, including overseeing a Department-wide Internet Fraud Initiative begun In 1999. Its work to date has included (1) advising and supporting federal prosecutors throughout The country, including maintenance of an Internet fraud brief bank; (2) developing specialized Training on Internet fraud for courses at the Department’s National Advocacy Center; (3) Publishing extensive materials on the Department’s website, www.internetfraud.usdoj.gov, in Order to promote public understanding of Internet fraud schemes and how to deal with them; and (4) Supporting improvements in federal agencies’ investigative and analytical resources, Including the Internet Fraud Complaint Center, a joint project of the FBI and the National Collar Crime Center. The Department has also been involved in the related problem of identity Theft, in part by providing national coordination of governmental efforts through the Identity Theft Subcommittee of the Attorney General’s Council on White Collar Crime. Of course, one of the most disturbing facets of cybercrime is the exploitation and abuse of Children, whether through distribution of child pornography over the Internet or through the Horrific conduct of sexual predators that operate online. The FBI, the U.S. Attorneys’ Offices, And the Division’s Child Exploitation and Obscenity Section have developed special expertise In Investigating and prosecuting these crimes and currently devote significant resources to the Online aspects of child pornography and luring cases. Moreover, in this area and others, the Department’s Office of Legal Education, in conjunction with various components of the Criminal Division regularly sponsors classes regarding computer crime and electronic evidence. BUILDING PARTNERSHIPS As I noted at the beginning of my statement, the second element which seems particularly Important to our efforts against cybercrime is partnership building. Of course, from years as a Prosecutor, I know that teamwork is essential to any successful crime-fighting effort. But it Strikes me that in the area of cybercrime the need for effective partnerships, is not only Especially important but also requires partnerships well outside the traditional law enforcement Community. The complexity of cybercrime and the breadth, or potential breadth of its Impact, are part of the reason. However, another factor is the diversity of interests at play in the Cyber-world, and hence in our efforts to combat cybercrime. These include, among others, law Enforcement Interests, national security interests, privacy interests, and Commercial interests. Partnership, or at least dialogue, we will allow those interests to conflict and collide in ways Destructive of our efforts to combat cybercrime. VIRUSES AND MALICOUS CODE Viruses and malicious code are simply programs and like any other program, are designed for a Specific function. A virus or malicious code program is written for a variety of noncriminal Purposes including advertisements, jokes, and political messages, however, less humorous and More malicious intentions include destroying data, information, information acquisition, and Identity theft, surreptitious control of a remote machine, or the shutdown of a legitimate business Or website. The virus is executed by some type of payload trigger, which causes the virus or Malicious code to deliver its contents or execute its commands. The trigger can be something The user does, such as opening an email attachment or downloading a file, it can be triggered By some event such as date or condition on a computer, or it can self- execute based on code Written into the virus program. PHISHING The term phishing means the fraudulent attempt to get a person’s private information (i.e. Username, password, account number, etc.).   Phishers send an email pretending to be from a legitimate company and ‘bait’ you to provide your Private information. Typically the email will address you as a customer and will direct you to Click on a link to provide critical information to avoid a looming problem which they have Discovered. This link will be to a false website – not the website of the legitimate company. Basically, they are ‘fishing’ for people’s information to use illegally. Phishing is a very Sophisticated scam and many individuals and companies have been fooled, resulting in the theft ‘Of their sensitive information as well as millions of dollars every year. The email is usually designed to look like it is sent from a real company. The ‘bait’ for personal Information is often contained in the email’s subject line. The subject usually contains a sense of Urgency. For example, it will read in one’s inbox â€Å"Your account needs to be verified† or â€Å"Your Account is about to be suspended.† CONCLUSION It is important to note that computer security is always dependent on the weakest link in the Chain. Security on the Internet and exposure to a potential attack is contingent upon the security Or lack thereof, of other parts of the network. It is also important to note that there is an Increasing number of dedicated infrastructure attacks. The interdependency of systems connected To the Internet used to carry out day-to-day business is ever growing and increasingly being Relied upon by variety of businesses, governments, and a numerous of other operations. There are four categories DDoS, worms, attacks on the Internet Domain Name System (DNS) And attacks against or using routers. Any attacks describe from my research could lead to Denial Of Service, compromise of sensitive or personal information, misinformation, and an extreme Economic impact, largely from lost revenue and the time and resources necessary to recover. Reference Second Edition Digital Crime and Digital Terrorist (Robert W. Taylor, Eric J. Fritsch, John Liederbach, and Thomas J. Holt) www.pearsonhighered.com Grossman, M. (Feb. 1999) â€Å"Cyber terrorism† http://www.mgrossmanlaw.com/articles/1999.cyberterrorism.htm Computer Security Policy and Research Institute. http.//www.cpi.seas.gwu.edu/aboutus.html www.research.ibm.com/antivirus www.internetfraud.usdoj.gov

Saturday, September 14, 2019

Healthy Lifestyles

There are many components of having a healthy life. The most important of which, however, are physical activity, healthy eating habits, a good sleep schedule, and a good control of stress. A combination of these is a good start to a healthy lifestyle.Physical activity is massively important for having a healthy lifestyle. If a decent exercise schedule didn't exsist in someone's lifestyle, a multitude of health problems are at risk for that person. For starters, if instead of exercising someone wer to be watching television or sitting at the computer, along with poor eating habits, obesity will eventually settle in and bring more health problems with it. Chronic diseases such as heart disease, diabetes, and osteoporosis can all be contracted due to obesity. Being physically active is a way to prevent these things.A key foundation for any healthy lifestyle is moderation in the things someone eats. For most of us, moderation means eating less than we do now. More specifically, it means eating far less of the unhealthy things such as refined sugar and saturated fat and more of the healthy things such as fresh fruit and vegetables. Eating a certain amount of calories is also important. Calorie intake also translates into how much physical exercise you need a day.Keeping up with a good sleep schedule is another component to having a healthy life. the only sure-fire way to not be tired during the day is to sleep good enough and long enough. The recommended time spent asleep is around six to eight hours a night. It's also recommended that people shouldn't take short cat-naps during the day. The reason being is that the brain goes through different sleep cycles while resting.Usually, these cycles last about an hour and a half, and when someone wakes up at the very end of one of these cycles, they'll feel well rested. However if someone were to wake up in the middle of one of these cycles, they won't feel any better than from when they first went to sleep. This is also a reason why the snooze button doesn't help in the mornings. It's best to just go through with sleeping at night.Keeping stress in check is the final key to living a healthy lifestyle. One way to keep stress under control is to simply excersize. Excersizing is a great way to negate stress because it keeps the mind occupied on whatever it is you're working out with. Plus, it takes care of getting one's daily exercise in for the day.That's the jist of living a healthy life. If one were to get control over their physical exercise, eating habits, sleep schedule, and stress; they'd be living an incredibly healthy life.

Friday, September 13, 2019

Renewable and Solar Power in the UK Essay Example | Topics and Well Written Essays - 3000 words

Renewable and Solar Power in the UK - Essay Example The paper tells that the solar energy is an alternative for the more widespread fossil fuel based energy sources such as oil, gas and coal. The UK possesses 0.3% of global oil reserves. A peak for oil production in the UK occurred in 1999, and by 2010, this tailed off by 54%. There are indications however, that there could be an estimated 25 billion barrels of oil remaining in British waters. Tapping into these reserves however, would require a capital expenditure of around  £60 billion so it would be very costly. As of 2010, oil production in the UK was 63 million tonnes, estimated reserves stood at 751 million tonnes, which was a decrease of 18 million tonnes from the previous year. Gas production in the same year was 55 bcm and reserves stood at 253 bcm, which was 3 bcm less than the previous year. The situation for natural gas in the UK is therefore similar. There was a sharp decline in UK gas reserves from 0.74 trillion cubic meters in 2000 to 0.66 trillion cubic meters in 200 1 and by the year 2010, the gas reserves were as low as 0.25 trillion cubic meters. Also, as the production of gas in the UK is 57.1 billion cubic meters whereas the requirement is for 93.8 billion cubic meters, 39% of the UK's gas supply requirements is met by import. Oil reserves are also diminishing globally. The official OPEC's claim of an estimated 1.150 billion barrels is exaggerated and the actual reserves are believed to be between 850 billion and 1.35 billion barrels. (Telegraph, 2010). Moreover, it is believed that the demand could outstrip the supply by 2014. In fact, natural reserves are decreasing for both oil and gas while at the same time, there is a rising global demand for coal and oil. For the UK, Busby (2010) suggests greater use should be made of bio-diesel, landfill gas, and geophysical energy sources such as wind energy and hydropower. However, there is a problem in that deriving energy from the wind, rain and Sun is not as reliable as using pumped storage syst ems. Regardless, wind and solar powered technologies are promising. Wind energy for example, could meet up to 20% of the national energy requirements (Busby, 2010). As of July 2011, the UK government has now decided to promote the use of low-carbon forms of energy as part of its reformation strategy through providing incentives such as Fee-in-Tariffs for solar PV, Renewable Heating for wind and nuclear power and through establishing an emission performance standard (Envirolink, 2011). In its Energy White Paper 2011, the government set out its objectives (SSE, 2011). These included providing additional revenues to existing low carbon production efforts, making future investments in low carbon generation, and shutting down older less efficient plants. In its publication titled 'Carbon Footprint of Electricity Generation', the government recognised that increasing energy needs and controlling environmental impact are the two biggest challenges for the UK energy sector (POST, 2011). Sol ar power can meet the need for reducing the UK's carbon footprint because the environmental impact of its use is much less than of coal and other fossil fuels. In fact, all fossil fuelled technologies, such as oil, gas and coal, have the largest carbon footprints whereas non-fossil fuel based technologies such as solar, wind, tidal, hydro, biomass and nuclear are

Thursday, September 12, 2019

Apple Computers Essay Example | Topics and Well Written Essays - 1500 words

Apple Computers - Essay Example Yet, as we look forward to a happy ending, earnings taper off and it appears as though the saga may be over after all. However, a feeling of quiet confidence gradually takes over the observer, as both Apple Computers and Jobs negotiate through each downturn with aplomb. Must a company's journey through time be so turbulent This document tries to draw lessons from the Apple experience and to suggest stable ways for commercial firms to manage their planning and operational processes. There are two over reaching factors that seem to have influenced strategic change at Apple Computers. The first is the frenetic pace of technological change. No other industrial sector has witnessed the continuous and rapid improvements in processor speeds, storage capacity, transmission options and software development. This has been a source of strength and an opportunity for the entrepreneurial culture of Apple Computers, but it has proved to be a handful for people such as Sculley who labored so hard to bring a semblance of order and discipline to the highly individualistic style of functioning to which die-hard company employees have become accustomed. A second factor which has affected strategy in this company has been the tumultuous and disorderly change of guard at the top. There is no precedent for such a striking founder to leave his creation while remaining in the business. Even more unusual has been the return of Jobs as a mere consultant to the company which he once owned. These moves, and indeed the manner of Sculley's departure have posed special challenges for the company. Strategy Review Systematic and regular environmental scanning seems to be a lacuna in the planning process at Apple Computers. Every enterprise needs a deep understanding of the values that its products and services deliver in an environment of global competitiveness (Ohmae, 1991, 61-74). The success of Jobs to see the opportunity in the graphic user interface which Xerox apparently missed, did not repeat itself when the company invested resources in Newton. It leads one to suspect that iPod may have come about by chance more than by a designed set of steps to understand dynamic customer needs. Environment scanning is an important and integral part of formulating strategy. We do not know if Apple Computers made the effort to reach out across the world, as for example IBM has always done, to weave market realism and new trends in consumer needs in to they way it thinks and works as an organization. The genius of Jobs could have been a drag for the company he founded, for he is clearly a person who th inks way ahead of his time. The story of Apple's strategy could be seen in the light of essential differences between a University Research Department and the function in a pharmaceutical concern which creates solely for profit. Jobs seems to have erred in mixing business and more visionary roles in a manner that continued to haunt the company long after he had left. We do know from the case that Sculley tried hard to rectify matters, but perhaps his 'sugary water' background prevented him from managing the environmental scanning process with the technological orientation it deserved. This is reflected in IBM and even prime rival Microsoft making good business use of some key Apple innovations! Overall, every business needs sound and

Wednesday, September 11, 2019

Language Community Essay Example | Topics and Well Written Essays - 750 words

Language Community - Essay Example One needs to be disciplined in their life. It has been instilled in our minds, since the word go that discipline is an essential ingredient for a successful life. My family and friends also encourage a healthy balanced educated life. Education has always been given a priority in my family. Good grades, good educated life and eventually good careers have been central to my family’s values. My father believes that in the conquest to conquer the ones who read and who are the most educated of the lot outcast the rest. It is precisely due to their firm belief in such values that most members in my family and friends circle are well settled in their respective careers. My family and friends also values strong recourse and obligation to our religious and cultural values. Men and women of the family are encouraged to dress decently and revealing clothes are a strict no for girls. The dress code of the family female prompts them to be well covered. Small skimpy clothes are not allowed. Men on the other hand, are allowed to dress in both formal and informal jeans, tees, and corsets. On Fridays, they dress in traditionally because Friday prayers hold a lot of value in our family. Various other religious and cultural obligations are strictly adhered to by my family. This includes paying Zakat regularly, praying five times a day and fasting in the month of Ramadan. We also encourage good healthy friendly relations within neighborhood in our family. Alcohol and drugs are strongly prohibited. I live in an Arabic community; hence the language practiced in my community is strictly Arabic. The language holds a lot of importance not just in my part of the world but all over the Arab world because of its association with our holy book, The Holy Quran. It is the native language in my community so most of us converse in this language in all circles, be they friend circle or the family

Tuesday, September 10, 2019

Research foundations in criminal justice Term Paper

Research foundations in criminal justice - Term Paper Example Research foundations in criminal justice This paper explains my developed knowledge. Stages in conducting a research are one of the developed knowledge from the course. The research process involves presentation of a research proposal for approval and implementation of the proposal to generate data that is then analyzed and results and recommendations communicated. Doing a research involves identification of a problem to be investigated that may result from social concerns or personal interests in a field and culminates to research questions, based on background information. Review of literature on the topic of interest follows, leading to accurate identification of existing knowledge gap and potential approach to bridging the gap (Sampson, 2012). A problem statement, statement of purpose, and research hypotheses are then established before development of research methodology. When the research committee approves a proposal, the methodology is implemented and data analyzed, documented, and communication done to target audie nce (Scuth, 2010; King and Wincup, 2008). Literature review informs a researcher of previous developments such as investigated and developed theories together with involved methodologies, and findings. Identified consistency in applied research method, research design and data collection instruments, for example, communicates tradition in a research topic and unless a researcher can develop alternative strategies that better suits the research, such traditional practices informs a proposed research methodology.... dology such as data collection instruments and measures for ensuring ethical studies as other researchers have applied in conducting their researchers (Acton, 2013). Research by other people also helps in development of new theories or modification of existing theories because reviewing and comparing existing knowledge allows for identification of flows in existing theories that new research initiatives can remedy (Corrigan, 2013). Review of other researchers’ findings can inform the need for codification of scattered knowledge into a theory while a review of existing theories may induce problem statements into new research that adds to the existing theories or develops new and overruling theories (Dantzker and Hunter, 2011). The role of existing research as bases for informing future study is another derived knowledge from the course concepts. In addition to directions that a researcher develops from analysis of results from previous studies, a research may recommend further research to remedy its reliability and validity concerns or effects of its confounding factors in research (Bayens and Roberson, 2010). A researcher should therefore be critical to note potential challenges in a study and communicate the challenges together with possible remedies in future research by the researcher or other researchers (Maxfield and Babbie, 2011). Deployment of theory through identification and implementation of a theoretical framework is another area of knowledge that the course concepts have covered. In addition to the role of previous research in facilitating development of research problems and guiding methodologies, theoretical frameworks offer bases for identifying variables in a study and forecasting relationships among the variables. This further informs research

Monday, September 9, 2019

The Use of Hiring Systems,does it help or hurt the organization Research Paper

The Use of Hiring Systems,does it help or hurt the organization - Research Paper Example The internet has changed and transformed the process of hiring candidates to fill positions by human resource departments across the world (Searle, 2003; Hansen, 1998). There is however a lack of exhaustive body of literature that can be used to draw conclusions and possibly a theoretical basis for electronic hiring, largely due to the fact that electronic hiring systems are relatively new. A review of the literature also indicates that some of the findings are contradictory. For example, Brooke (1998) states that use of e-recruiting leads to an overwhelming number of applicants that can end up making the selection process a headache, while Galanaki (2002) argues that the internet is not the first option for many job seekers; both of these are discussed as disadvantages. Bartram (2000) is of the view that electronic recruiting is beneficial since it enables a company to access high quality employees, while Kaydo and Cohen (1999) argue that electronic recruiting brings about large numbers of unqualified candidates for the available employment opportunity. To add on top of these, Galaniki (2002) details the time saving impact of electronic hiring whi le Mitchel (1998) is of the view that the amount of time spent in screening through the numerous electronic applications forms makes it a time consuming method. This indicates that more research is needed in order to develop concrete facts about electronic hiring systems and provide a direction for future research. The research question in this case is whether electronic hiring systems are advantageous or detrimental to an organization. The aim of this research is to establish the advantages and disadvantages of electronic recruiting to an organization, and come up with a conclusion that will add to the much needed efforts to create a theoretical framework for electronic hiring. Studies have already been done to establish the efficacy, benefits and drawbacks to electronic hiring systems;