tag:blogger.com,1999:blog-40470967223106026582023-07-17T22:11:08.412-07:00Who writes essaysCustom Paper Writing Servicecheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.comBlogger26125tag:blogger.com,1999:blog-4047096722310602658.post-4847543888915985082020-09-03T00:30:00.001-07:002020-09-03T00:30:06.124-07:00Cross-cultural Training Essay Example | Topics and Well Written Essays - 3250 wordsCulturally diverse Training - Essay Example Re-appropriating represents various points of interest to alleged host nations as this gives openings for work to the neighborhood inhabitants. What's more thereto, the neighborhood governments additionally procure incomes on account of charges and exchange. Thus, re-appropriating is likewise represents various points of interest for the organization being referred to, in view of this procedure, another structure is accommodated these associations which empower them to chop down their efficiency costs. To guarantee greatest advantages related thereto, HR utilized by these worldwide nations must be prepared fittingly so as to adjust to the business needs, Doye (2002) talks about. Usually, when an organization is redistributed, a certified neighborhood occupant or an exile is authorized by the organization to direct the preparation and guarantee that the organization is appropriately set up in the host nations. As indicated by Wittingslow (n.d.), the nearby talent scouts must work connected at the hip with the organization so as to discover appropriate individuals to fill in the opportunities. This is considered of principal significance as the human asset officials are vital so as to guarantee that agreements and propositions for employment are assembled to stay serious in the current occupation advertise (Wittingslow n.d.). It is normally a result of the previously mentioned that redistributed organizations face issues regarding social assorted variety in the work environment. These worldwide organizations, during the time spent redistributing for the most part have a lot of human asset strategies that are set up. All things considered, these laws are generally custom-made so as to conform to the work laws of the host nations wherein they are set. Moreover thereto, the previously mentioned circumstance additionally results to major issues as respects the issue by which human asset the executives must be created so as to take into account this set up. Given this, the paper centers around the job of culturally diverse preparing. In this way, to guarantee a progressively broad conversation of the current point, this writing audit will be separated into the accompanying areas: (1) Introduction, (2) Human Resource Management in the Twenty First Century: HRM and Outsourcing; (3) Cultural Distance: An Overview ; lastly, (4) Barriers to the Workplace and Cross-Cultural Training. Human Resource Management in the Twenty First Century: HRM and Outsourcing Human Resource Management is regularly characterized as the way human ability is successfully and effectively utilized so as to accomplish the objectives of the association (Mathis and Jackson 2007). It is the basic craft of the procedure by which the association centers around the individuals who have a place with the last mentioned. Tayeb (2005) specifies that while the previously mentioned is generally the acknowledged meaning of human asset the board, the way the equivalent is completed varies starting with one nation then onto the next. The customary idea of human asset the executives has in any case, developed. With the redistributing of work Tayeb (2005) accepts that the human asset division assumes an a lot greater job. By and large, there are two cases by which the human resourc cheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.com0tag:blogger.com,1999:blog-4047096722310602658.post-50250885901903225432020-08-22T17:33:00.001-07:002020-08-22T17:33:30.761-07:00A Book Review of Philip Dicks Blade Runner free essay sampleThis paper breaks down the novel Blade Runner, through the creators purpose and history. This paper looks at the novel, 'Sharp edge Runner,' through two significant inquiries, what is the creators message and what is the verifiable significance of this novel? The paper gives a foundation to the sci-fi plot and the focal topic of the book, human character. It further spotlights on the focal character, Rick Deckard, and his job key to that subject. The work revolves around the subject of being human. San Francisco Police abundance tracker Rick Deckard finds maverick androids who have gotten away from state universes and resigns them. The catch is that these androids are so human-like in appearance that nobody can tell from taking a gander at them whether they are genuine (for example human) or not thus that Deckard needs to figure out what they are before he can know whether to execute them. We will compose a custom exposition test on A Book Review of Philip Dicks Blade Runner or then again any comparative subject explicitly for you Don't WasteYour Time Recruit WRITER Just 13.90/page He has, as such, to have the option to investigate their spirits, into their souls. cheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.com0tag:blogger.com,1999:blog-4047096722310602658.post-75026228035958679122020-08-21T15:15:00.001-07:002020-08-21T15:15:19.007-07:00Function of place in Mad Max 2 by Georgre Miller 1981 (film) Movie ReviewCapacity of spot in Mad Max 2 by Georgre Miller 1981 (film) - Movie Review Example The cinematography of Mad Max 2 utilizes insides however rather welcomes the crowd to an all the way open desert space, suggestive of the blue skies, red sand and rough gorge that were normal in conventional westerns. The characters in their dark calfskin or white canvas apparel move around this forsaken space, and the feeling that is given is purposely tense and brutal. The sun pummels on the settlersââ¬â¢ camp, and the bikers circle like raiding Indians, and the entirety of the people seem, by all accounts, to be in a boondocks among progress and a destructive wild. The manner in which the camera moves toward the activity is altogether different from the anticipated and safe western style, nonetheless. Vehicle pursues are recorded with the camera low to the ground, and the vehicles drawing nearer at speed and this draws the crowd directly into the threat. The fundamental character played by Mel Gibson, is a stray, neither one of the looters, nor one of the homesteaders with thei r plain pigs and chickens. This area doesn't represent the pioneers subduing the wild, yet rather the wild has the high ground and the pilgrims are especially at its kindness. This film utilizes area to underline the damaging tendency of industrialization and the instability of human survivors after a prophetically calamitous war. cheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.com0tag:blogger.com,1999:blog-4047096722310602658.post-15274058893536927372020-06-06T00:44:00.001-07:002020-06-06T00:44:02.505-07:00One Of The Most Important Elements - Free Essay Example In Greek Mythology, perhaps one of the most important elements are the Greek Gods and Goddesses. The ancient Greeks created the stories about the lives and journeys of the Greek Gods, known as myths, simply different information which were difficult to explain using modern science. These myths about the Gods were spread around the world by explorers and storytellers, and later merged with Greek culture. To this day, numerous myths survived through many writings. Each of these myths are very unique, and tells much about the Greek Gods. The Greek myths in particular show that Greek Gods and Goddesses looked and acted like humans, that they possessed powers, and that they interacted with humans mainly for personal purposes and sometimes to aid heroes. Firstly, Greek gods and goddesses were viewed as being to a great extent similar to men and women. To start, it is very interesting that the ancient Greeks created their Gods and Goddesses to have features which are exactly the same to a regular mortal. The proper term for this is called anthropomorphism, which means, in the form of a human. Yet the gods were visualized as more gallant in physique, exceptional in beauty and proportion, and much more authoritative than humans. An example of this comes from the fact that Athena, a statue from the Royal Ontario Museum, had a form of a regular mortal, and that she was envisioned as having a body of what most humans would desire. More intriguing however, is the fact that the ancient Greeks believed that the Gods created them. This comes from the myth of how Zeus gave the duty of populating the Earth to Epimetheus. Epimetheus therefore populated the world, but then created a useless creature that was to an image of the Gods, which explicates why Gods appear like humans. Additionally, it is even more fascinating that not only do Greek Gods act like humans but they also behave like humans and are able to love, marry, produce children, and so on. Therefore, whenever they act upon hatred, much of their acts were very bad and cruel. This being because there was such a large society of Gods, this meant that much of the Gods lives were surrounded in chaos and revenge. cheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.com0tag:blogger.com,1999:blog-4047096722310602658.post-36465524955681147862020-05-17T04:54:00.001-07:002020-05-17T04:54:05.484-07:00Persuasive Essay About Hunting - 1905 Words Anybody feel like voluntarily waking up at the crack of dawn just to sit in the middle of the woods in a blind and probably see nothing for hours on end? Wait, what if I add that itââ¬â¢ll be in the middle of winter so the temperature will not only be freezing, but youââ¬â¢ll also have a frost bite approved wind slapping at your face? No takers? I figured that would be the response. Youââ¬â¢d be surprised though, because when I was around five or six years old freezing temperatures and being stranded in the woods sounded like paradise, especially with my best friend, my Dad, was right there with me. Hunting is a normal, almost expected hobby of individuals from the South. Fathers will bring their sons, daughters, and wives along to a large plot ofâ⬠¦show more contentâ⬠¦The Hunt: Daddy and Daughter Time 5AM was about the time weââ¬â¢d wake up every morning before we went out. Being one of the 40% of Americans that hunted, he usually had plenty of resources and friends whose land we enjoyed and were allowed to use (Service). It was still dark out, and hunting season is usually within the duration of the colder months, so weââ¬â¢d bundle up in various camouflage clothing, mine always having a hint of pink because what young 5-6 year old girl doesnââ¬â¢t want pink in every aspect of her clothing. I would strap on my glitzy cowgirl boots and clumsily followed my Dad with an empty case that he gave me to feel like I was helping load up in some sort of way. Weââ¬â¢d hop in the topless rust-ridden Jeep around 5:45 and explore the world now enveloped in enchanting shades of violet and amber light, the engine being the only sound for miles. Iââ¬â¢d be in the passenger seat, just barely legally allowed to not need a car seat, and sit and talk to my Pops about everything under the sun. I was young, so as soon as you woke me up I was talking and awake, especially with my Dad who probably had no interest about the latest Blues Clues episode, but allowed me ramble about the present opening song and how I felt about the melodious tune and how the other animals and Steve all harmonized. Weââ¬â¢d laugh and talk and drive for many miles until we finally arrived at the hunting land.Show MoreRelatedPersuasive Essay About Hunting1923 Words à |à 8 Pagesââ¬Å"Hunting as a family is by no means a new tradition. In fact, it used to be one of several traditional American family values(Staff).â⬠Meals from Nature Anybody feel like voluntarily waking up at the crack of dawn just to sit in the middle of the woods in a blind and probably see nothing for hours on end? Wait, what if I add that itââ¬â¢ll be in the middle of winter so the temperature will not only be freezing, but youââ¬â¢ll also have a frost bite approved wind slapping at your face? No takers? I figuredRead More Organization is Crucial When Making a Sound Argument Essay example1114 Words à |à 5 PagesOrganization is Crucial When Making a Sound Argument The development of animal rights organizations in the past century has made hunting a heated topic for debate. Modernization has left the primitive form of hunting and gathering behind as an obsolete form of human survival. With this occurrence one would think that hunting would lose its popularity, but this statement couldnââ¬â¢t be farther from the truth. It has developed more as a sport and participation is still widespread throughoutRead MoreThe Lottery Essay870 Words à |à 4 PagesBelieving in a passion can be persuasive to others. If one has a passion for something, there is an uncontrollable emotion about it. Everyone in the world is different, if it was not that way, the world would not go around. Someone may have a passion for something that another person can not stand. In ââ¬Å"The Lottery,â⬠there was a negative passion for people getting stoned. The emotions of others that did not get stoned were horrific for the one getting stoned to death. The fathe r in ââ¬Å"Without TitleRead MorePersuasive Essay : Gun Control798 Words à |à 4 PagesPersuasive Essay Did you know that in the United States almost 100,000 people are shot or killed with a gun in one year? 10,527 people die a year in handgun related incidents in the United States. This number, by far, outweighs the number of gun related deaths in countries such as Sweden, Great Britain, and Japan, which number 13, 22, and 87, respectively. What is the reason for such drastic differences in numbers? Sweden, Great Britain, and Japan are all countries that have stricter gun controlRead MoreWilliam Golding s Lord Of The Flies937 Words à |à 4 Pagesto behave at home. Even after most of the boys, with jack in the lead, decided hunting and having fun was more important than anything, Ralph realized how important it was too sick by the rules he as chief had made. After Jack took a big group hunting and they let the fire go out Ralph tells them ââ¬Å"I was chief, and you were going to do what I said. You talk.â⬠ââ¬Å"But you canââ¬â¢t even build huts then you go off hunting and let the fire out-ââ¬Å", ââ¬Å"There was a ship that passed.â⬠(71) This shows Ralphs moralRead Moreââ¬Ëthe Absence of a Written Constitution ... Enables Constitutional Change to Be Brought About Within the United Kingdom with the Minimum of Constitutional Formality.ââ¬â¢885 Words à |à 4 PagesActivity 1 (essay plan re-done) ââ¬ËThe absence of a written constitution ... enables constitutional change to be brought about within the United Kingdom with the minimum of constitutional formality.ââ¬â¢ Consider the sources of the UK constitution and the methods by which it may be changed. Do you agree with Barnettââ¬â¢s views? The UKââ¬â¢s unwritten constitution, formed of Acts of Parliament [AoP], Royal Prerogative [RP], Constitutional Convention [CC] and Case Law [CL], prompts much debate about the easeRead MoreEssay about Shooting an Elephant by George Orwell1527 Words à |à 7 Pagessupervisors object these types of actions. The essay Shooting an Elephant relates to this situation. The author of this essay is George Orwell. The author talks about his work and personal experience that emphasizes the impact of imperialism at the sociological and psychological stage. This paper shall discuss the Orwells essay, how the artistic choices shape the facts in the essay, how the relationship between facts and artistry contributed to the essay, technique used, and how the tension betweenRead MoreThe Age Of Globalization Began In The 17Th Century When1295 Words à |à 6 Pagesit also gave rise to capitalism. The events leading up to globalization and in turn, capitalism, are interpreted differently by histo rians such as Timothy Brook, in his book Vermeerââ¬â¢s Hat and by Greg Grandin, in his book Empire of Necessity. This essay focuses on the interpretations of globalization and capitalism by these authors and discusses the impacts of capitalism between the 17th and 19th century. Brook argues that rise of global capitalism initiated through the movement and transculturationRead MoreThe Issue Of Gun Control903 Words à |à 4 Pagescontroversy surrounding the need for more gun control in the United States is a hot topic. Do we need more gun control? What about the 2nd Amendment? What about crime, protection, the mentally ill? There is a great amount of gun violence in this country and every time something happens, the argument starts up again. Maybe it is time to do more. Adam Gopnik wrote about this subject in his essay ââ¬Å"Shootingsâ⬠. His view is that there needs to be better gun control laws. Gopnik started his article with ringing cellRead MoreC112 Theorist Critique Assignment1913 Words à |à 8 Pages and summaries of the assigned readings, doctrinal references, or outside sources. You may use the C100 online lessons, readings, and references to help you prepare your assignment. Refer to ST 22-2 Leader Communication (June 2012) for guidance about citations and footnotes. You may also refer to A Manual for Writers of Research Papers, Theses, and Dissertations (7th edition). Besides your article, here are some additional resources to help you with your critique. This is not an exhaustive cheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.com0tag:blogger.com,1999:blog-4047096722310602658.post-75201656955924186632020-05-06T18:51:00.001-07:002020-05-06T18:51:08.011-07:00Kant Kant s Ethics - 1293 Words Khaled AlMarwani Philosophical Ethics PHL270 Dr. Elizabeth F. Cooke Question # 1: Kantââ¬â¢s Ethics According to my humble reading, Kant is considered the hardest to read, grasp and understand among the philosophers that we came across studying ethics. According to Kant, nothing could be called good without qualification except a good will. And the good will is the desire or the tendency to do your duty because it is your duty, not anything else. Thus, nothing can be gained out of an action. And only this motivation that gives moral worth to do an action; and only that shows you are a good moral person because when a person does his act based on doing just his duty, that action would pass the categorical imperative test (doing act is based on doing the duty (period) actually, not because passing the categorical imperative test for itself) (Kant, the Good Will). Also, it shows you are a good person if you have a good will and vice versa. Only the good will virtue is the virtue that had been accepted by Kant and not anything else. Because you might be courageous or intelligent but that does not mean you would be good moral man because you might be criminal or thief unless if you enhance your courage or intelligence with a good will. Even happiness, must have good will. For a broad example about good will, you do not cheat in exam because you do not cheat not because the professor is present at the room, or you don not steal from the grocery store because you doShow MoreRelatedKant And Kant s Philosophy On Ethics970 Words à |à 4 PagesEthics, What is it? many a man have asked the same question. A dictionary describes ethics as-moral principles that govern a person s or group s behavior. Is there a universal ethical behavior ? Are all countries ethical ? Theses very same questions many philosophers have tried to figure through time from Socrates to Immanuel kant (and to this very day for the matter!). While comparing two great eathist Plato and Immanuel Kant I, the writer argue that Kant s ideological views on ethic s were farRead MoreKant And Kant s Moral Ethics862 Words à |à 4 PagesAccording to Kant, We have these absolute duties to ourselves and these duties to oneself become the supreme principle of all duties. Therefore, these supreme self-duties are the reason why moral ethics exist, and without our duties to oneself there would be no other duties, nor would we, as a species, survive at all. However, these self-regarding duties can be very contradicting, but can help us understand the bigger picture of the categorical imperative. Kant believes that we must ââ¬Å"act only accordingRead MoreThe Basic Point Of Kant s Ethics Essay1316 Words à |à 6 PagesFirst of all, Kant s ethics is called formalism since it concentrates on the shape or structure of an ethical judgment (the way that every ethical mandate have the frame you should do X). The basic point of Kant s moral hypothesis is to decide how summon can be an ethical order with an especially committing or obligating character. In addition, as indicated by Kant, the major objective standard of good contention or thinking is the categorical imperative: you ought to act, paying little respectRead MoreKant s Philosophy : Kantian Ethics1290 Words à |à 6 PagesPhilosophy 201N April 26, 2015 Kantian Ethics Society, as we know it, is only possible through humans acting in accordance with a universal moral code. Because we as humans are rational beings and have free choice, we can make our own decisions, can hold ourselves to a standard that we ourselves set, and can act in accordance with our standards, as well as set standards for our own society. However, these standards must be held, otherwise they hold no meaning. Kant uses a black and white tactic, in orderRead MoreKant s View On Ethics Essay1362 Words à |à 6 Pagespoint in their life, everyone has been lied to. Everyone has experienced the feelings of betrayal and vulnerability brought about by having their trust in someone broken. Lying, any reasonable person would agree, is wrong. Famous philosopher Immanuel Kant argued that, in fact, we as humans have a perfect duty to never lie in any situation. While on its surface a theory that is easy to agree with, many challenged Kantââ¬â¢s firm stance by challenging it with theoret ical situations in which lying might beRead MoreKant s Philosophy On Ethics1213 Words à |à 5 PagesKant lived in an era where utilitarianism was becoming a widespread philosophical ideal, in which the group was valued greater than the individual. However, Kant argued that every individual has inherent value stating, ââ¬Å"a human being â⬠¦ exists as an end in itself, not merely as a means for the discretionary use for this or that will, but must in all its actionsâ⬠¦ always be considered at the same time as an endâ⬠(Groundwork 4:428). This claim that every individual possesses inherent value presupposesRead MoreThe Ethics Of Kant s Life845 Words à |à 4 Pages I will begin by saying that according to Kant, consequences doesnââ¬â¢t have any connection with our deeds: right or wrong. Morality requires us to do the right things in life: it is a command known as the imperative. This, indeed, forces me to follow what Kant said: doing the good deeds ignoring the thought of what will be the result. This ethics of Kant rather wants me to save the lives in the ship of my other nine cruise worker. This dilemma forced me to think about my morals in life of beingRead MoreKant s Impact On Ethics1389 Words à |à 6 PagesImmanuel Kant was an intelligent, well-known German philosopher during the Enlightenment era of the late 18th century. During this enthusiastic time period, there emerged a strong belief in the ability of human reason to help understand the world and solve its numerous problems- including ethical one s. Kantââ¬â¢s contribution to ethics has been very substantial, and although ethics is the field heââ¬â¢s had the most profound impact on, Kant also spent his time working in other areas, such as metaphysicsRead MoreThe Role Of Happiness On Kant s And Mill s Ethics1712 Words à |à 7 PagesThe Role of Happiness in Kant s and Mill s Ethics Corey Guitard (0241740) Introduction to Ethics November 18th, 2015 Philosophy 2701 Dr. Rupen Majithia Words: Immanuel Kant refers to happiness as contentment (Kant, ) whereas John Stuart Mill refers to it as the pursuit of pleasure and the absence of pain (Mill, p.7). Kant does not base his ethics on happiness. Instead, he argues that morality is based on our duty as a human (Kant, ). To do what is right for Kant is to do what is instinctuallyRead MoreKant s Deontology Theory And Ethics961 Words à |à 4 Pages Kantââ¬â¢s Deontology If a philosopher who follows Kantââ¬â¢s Deontology theory had to be one of the Jury member for a case in a court house that involves someone who the judge is considering to give the death penalty. The philosopher would agree that the individual should be put to death. For the reason that the individual broke the law and committed a crime that shouldnââ¬â¢t have been done be anyone who are govern under the law. Also the Philosopher would believe that the rules should be follow no matter cheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.com0tag:blogger.com,1999:blog-4047096722310602658.post-26161231811485097932020-05-06T00:07:00.001-07:002020-05-06T00:07:23.474-07:00Asedfds Essay Example For Students Asedfds Essay Josh Grodin410-37-8822Second Take Home Essay #1Early last year, shortly after the 2000 elections, the Distinguished Gentlemen, Lloyd Doggett announced that he would not seek reelection for his House seat in 2002. This revelation came as quite a shock to Doggett supporters, but it was a pleasant surprise to a well-known Texas Senator such as myself. Being a Democrat who is well liked and respected within the Texas Senate, it was a clear calling for me to throw in the towel and run for his position within the House of Representatives. Two months ago Texas held its primary for seats in the House, and after a long and hard fought battle, I procured the nomination of my party. The 2002 elections are sneaking up on us, and in order to be successful in them, my staff and I have devised a game plan, describing my strategy for the upcoming general election. In order to devise this plan, my staff and I had to answer four specific questions dealing with my campaign. These questions will be disc ussed throughout my essay. My wish is that other political hopefuls will be able to take this essay and learn from my successes as well as my mistakes. The first question I came upon before making my strategy was when and how do I want to spend my money. When would be the best time strategically to spend my money, and on what should I spend it on? Fortunately for our campaign we had done a great deal of fundraising prior to the primaries, and had to spend very little of it during the primaries because of our weak opposition. We therefore are anything but short of money, and can spend our money freely. But when would be the best time to spend it? History has proven to us that by spending your money early on in the race you increase your chance of success. The logistics of this are obvious for several reasons. First of all, it is essential to get your name out and known towards the beginning of the race. If people barely know you four or five months before the election, then you are t oo late. This kind of thinking is especially important in House races because of the little attention they are given. For example, Lloyd Doggett has served three terms in the House of Representatives and has built up a name for himself. An incumbent would be able to focus his money to different areas because of his already popular name recognition. However, a challenger or an open-seat candidate such as Josh Grodin needs to direct his money towards building a name for himself. Furthermore, this has to be done early on in the campaign. So this brings us to the question of how to spend our money. Besides on building name recognition, it is absolutely necessary to advertise. As much as possible, my staff and I would like to take advantage of the free media, but we all know how difficult this can be. So we need to direct our attention towards paid advertising. I am running for the House of Representatives, so I only need to reach a somewhat small number of people. I believe that the bes t way to do this will be with direct mail bios of my life, what I want to do, my goals, and my advantages over my opponent. I am a firm believer that grass-roots politics is the best way to go in a House race. Towards the homestretch of my campaign, it will be necessary to spend money on TV and radio advertisements. What these advertisements will contain brings us to our next question: positive or negative?Advertising will play a huge role in the success of my campaign for House of Representatives. In fact, it is obvious that advertising plays a major role in all campaigns for elected office. But something that has always been associated with advertising is whether or not it should be positive or negative. With my experience, I believe that this answer depends solely on whether or not you are an incumbent or a challenger. An incumbent such as Lloyd Doggett has no need to run negative campaigns. Why? First of all, he already has the name recognition with his constitutes as well as hi s peers. Second, he has the money to spend on numerous ads that could respond to attacks or emphasize his positives while in office. Finally, an incumbent more than likely has his political party on his side, backing him in any possible way. However, a challenger or open-seat candidate most likely does not have these assets. For example, I do not (or at least did not) have the name recognition, I certainly did not have the money, and I didnt have my partys support until after the primary. Therefore, I felt that I need to go negative when it comes to advertising. By running negative attack ads, I can use the results to my advantage. For example, if I run a negative ad and the media picks up on it, I will, in essence, be getting free advertising spots. This is important because the main goal of my campaign is to get my message out. This proves to be difficult considering I am not an incumbent. As an open-seat candidate, how do I get my message out?Probably the most challenging of the four questions my staff and I had to ask ourselves was how to get my message out to the voters. This question more or less answered itself as we considered where and how to spend our money. As previously stated, we decided that advertising was the best way to spend our money, whether it is TV, radio, or direct contact. At the same time this became clear, it became apparent that this is how we need to get our message out. The only way for voters to know who Josh Grodin is would be to tell them directly. Direct mail is definitely one option, as well as TV and radio advertising, but I believe that direct and personal contact with the voters is the best way to go about spreading my message. As we move into the general election, I want to hold public rallies, town halls, and live debates. I want to go door to door and meet the people who I will be representing in office. I want my name to become attributed to characteristics such as charming, warm, caring, and sincere instead of being ca lled a politician or a fake. The most effective way of achieving these goals is to have direct voter-candidate contact. I can therefore speak my message clearly and effectively, and be able to answer questions the voters may have regarding my issues and my stances on these issues. This brings me to our fourth and final question: what are my issues and my themes?As a Senator in Texas, I have always been a firm believer in accurately representing the general consensus of my constituents. When polled, the people of my region time and time again list education, healthcare, and taxes as their primary concerns. I feel it is my duty to fairly represent their opinions. In regards to education, I am worried at the current state of learning within Texas. TAAS scores are down and the dropout rate is up ever since the new governor took President Bushs place. Teachers salaries are ridiculously low for the kind of job that they have. As a member of the House of Representatives, I plan to focus on education reform within the state of Texas. Moreover, I believe that every single member of the population of Texas has a right to medical attention when needed. There are too many children and elderly that cannot receive medicine because lack of money. I plan to work changing that and guarantee all Texans medical services. Finally, I believe taxes need to be adjusted. I believe that the Republicans in this state have lowered taxes too much for the rich and not enough for the poor. This is just not right in a state such as Texas, and I plan on reforming tax cuts to where it will benefit people of all socio-economical levels. My issues and feelings towards them are strong and clear, and will soon become apparent to the common voter. As I begin down the homestretch of my campaign for the United States House of Representatives, I feel confident that we are ready to take on any challenges that may confront us. My staff and I have devised a simple, yet compact plan that will help direct us in the direction of victory. Our goals have been set, we are prepared for any detours that may encounter us, and we are ready to give to Texans what they strongly deserve. .ue07362cfcde63d7ecbdf3a3b45a28837 , .ue07362cfcde63d7ecbdf3a3b45a28837 .postImageUrl , .ue07362cfcde63d7ecbdf3a3b45a28837 .centered-text-area { min-height: 80px; position: relative; } .ue07362cfcde63d7ecbdf3a3b45a28837 , .ue07362cfcde63d7ecbdf3a3b45a28837:hover , .ue07362cfcde63d7ecbdf3a3b45a28837:visited , .ue07362cfcde63d7ecbdf3a3b45a28837:active { border:0!important; } .ue07362cfcde63d7ecbdf3a3b45a28837 .clearfix:after { content: ""; display: table; clear: both; } .ue07362cfcde63d7ecbdf3a3b45a28837 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .ue07362cfcde63d7ecbdf3a3b45a28837:active , .ue07362cfcde63d7ecbdf3a3b45a28837:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .ue07362cfcde63d7ecbdf3a3b45a28837 .centered-text-area { width: 100%; position: relative ; } .ue07362cfcde63d7ecbdf3a3b45a28837 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .ue07362cfcde63d7ecbdf3a3b45a28837 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .ue07362cfcde63d7ecbdf3a3b45a28837 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .ue07362cfcde63d7ecbdf3a3b45a28837:hover .ctaButton { background-color: #34495E!important; } .ue07362cfcde63d7ecbdf3a3b45a28837 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .ue07362cfcde63d7ecbdf3a3b45a28837 .ue07362cfcde63d7ecbdf3a3b45a28837-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .ue07362cfcde63d7ecbdf3a3b45a28837:after { content: ""; display: block; clear: both; } READ: Financing Elections Essay cheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.com0tag:blogger.com,1999:blog-4047096722310602658.post-1473453157562746792020-04-19T21:12:00.001-07:002020-04-19T21:12:03.454-07:00Market report for Dubal Introduction The US is renowned for its rich democratic space, strong consumer power, and business astuteness. However, its economic downturn and high cost of business may impede success there.Advertising We will write a custom research paper sample on Market report for Dubal specifically for you for only $16.05 $11/page Learn More A company needs to look into the external and internal factors that will affect it when it enters the international market. The purpose of the report is to determine whether Dubal, a UAE aluminium manufacturer, should enter the US market. Macro business environment ââ¬â political The Unites States of America is a federal state, in which the head of state is the president and the constitution is the supreme protector of citizensââ¬â¢ rights. It has a strong judiciary headed by the Supreme Court and is backed by an equally influential parliamentary system. Therefore, the three centres of power are the executive, the Judic iary and Congress. Two parties dominate the countryââ¬â¢s politics; that is, The Democratic Party and the Republican Party. The latter part depends on business donations for campaign funding while Democrats get it from organised labour. Consequently, parties in office may make policies that protect the interests of their funders. Dubalââ¬â¢s ability to safeguard its needs will depend on the ruling party and their affiliations. Nonetheless, the country is a strong democracy and has a stable political environment. It is unlikely that Dubal will experience cases of war or civil conflict in this nation. Trade restrictions and protectionism exist, albeit at low levels. Constraints exist regarding the legality of a business; Dubal will have to go through a long process before being recognised as a legal entity. Additionally, zoning restrictions exist on firms that can bring goods into the country. Copyright and patent laws are quite severe in this country. Dubal may find difficultie s in competing with older aluminium companies as they may possess patents over certain business processes.Advertising Looking for research paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Additionally, the country has several requirements on training workers, and licensing is a lengthy process for foreign businesses. Employers are obligated to pay for medical insurance as well other policies, so this may increase Dubalââ¬â¢s labour costs. The UAE and US do not have special trade agreements; however, substantial business still occurs between these two countries. As of 2011, the US had exported $15.8 billion worth of merchandise while the UAE imports about 2.4 billion worth of goods. Since the UAE is not in NAFTA or other trading groups with the US, then trade restrictions on products need to be expected. Minerals are not protected goods, so Dubal will need to pay a huge amount for its raw material-bauxite- if it chooses to produce in the US (US Department of Energy 13). Macro business environment-economic The US has the second largest economy in the world. As of 2011, its GDP stands at $ 14.82 trillion. This implies that Dubal will have a large consumer market to sell its products to. Additionally, the country recorded a 1.5% increase in the economy. Statistics also indicate that the US is the biggest importer of goods in the world. It allows approximately $2.314 trillion worth of merchandise into its borders. If Dubal opts to enter the market as an importer, then it will have a conducive environment for doing so. The most significant contributor to the economy is the managerial sector while manufacturing accounts for only 0.7%. Dubal will not be entering into a manufacturing zone, and this could prove to be quite useful to the organisation. The US economy is still underperforming thus implying that key product markets, such as the automobile industry, have diminished demand for aluminium products. The US has several resources such as oil deposits. However, it does not have bauxite, which is the primary raw material for production of Aluminium. Dubal may, however, save on costs by sourcing its supplies from the South American market. Some bauxite-rich nations in this region include Venezuela and Brazil (CRU International 54).Advertising We will write a custom research paper sample on Market report for Dubal specifically for you for only $16.05 $11/page Learn More Unemployment rates are at an alarmingly high rate for a country of such a level. It now stands at 9.1%, and is ranked 105th. This is still an all-time low for the nation. Consumers may be hesitant to buy new commodities like cars and houses, yet these items are made from aluminium. The USââ¬â¢ budget deficit is also at an all-time high; it now stands at $599.9 billion while its external debt to the world is $14.71 trillion. This makes it the second most indebted nation in the world. If Dubal plans on entering such a nation, it needs to prepare for constrained buying habits and rigid monetary restrictions as the government is trying to do as much as possible to cut down on expenditure. Even loan negotiations from banks might be challenging as financial institutions are dealing with the backlash for encouraging this over expenditure. Financial institutions have created high financial obligations and losses that must be paid by consumers. Failure to honour these responsibilities could cause the entire financial sector to go bankrupt. Transport, communication and other infrastructural facilities are already set up in the country. The level of development in the US implies that most of these needs will be easily catered for. Dubal, which depends on a steady supply of electricity, will not suffer from intermittent supplies. It will also not be necessary to invest in back-up generators as the nationââ¬â¢s electricity suppliers are dependable. Additionally, it is relatively easy to get credit in the nation as the country is ranked 4th in the world. Enforcement of contracts is taken seriously in the US, so Dubal will be protected from contract defaults by its business partners. Furthermore, the country does not have complex business networks such as the Chinese system of family ties. Therefore, Dubal can do business with organisations from the business directory. Minimal restrictions exist among the population concerning trade. Macro business environment-social The US is a culturally diverse country, and since the UAE also possesses this trait, then it will be easy to do business there. English is the US official language, and most residents of the UAE are now familiar with it. While individuals are religious, they tend to separate religion from business life. Additionally, most individuals do not pay attention to family ties when doing business, so this will favour Dubal.Advertising Looking for research paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Micro environment-competition Several aluminium producers already exist in the US, such as Alcoa, Century Aluminium, RUSAL, Alcan, and Chalco. Alcoa accounts for 54% of market share in the target market, and has a presence in other parts of the world. In fact, these dominant players will minimise Dubalââ¬â¢s capability to operate successfully in the market. RUSAL is one of the most formidable aluminium producers in the international aluminium industry, it controls 16% of the world market and has integrated various aluminium-based firms. Some of them are producers of bauxite while others manufacture aluminium (Aluminium Industry Association 15). Furthermore, some of them even produce packaging material and electricity products. Alcan is a Canadian firm, and has an advantage over other players owing to its high product volumes. Chalco on the other hand is a Chinese-owned firm that dominates is domestic market as well as a substantial portion of the US market. Foreign competitors fr om China are a force to reckon with. The entrance of Chinese players in the US market leads to market surplus hence price declines. The market for aluminium products is highly accessible. Companies need to choose the best strategies for entry, and they have a chance at succeeding. Most equipment and resources needed to manufacture the product are found in the country, but Dubal would be better of it imported these products from its cheapest markets. Nonetheless, it is likely that, in the long run, the growth potential for this company will be quite low since the US is saturated with aluminium smelters. Approximately 12 companies are responsible for performance in this industry. However, in the next five years, it is likely that domestic demand will grow if the economy improves. Projections indicate that the US aluminium industry will increase by 12% in 2013. Such changes will stem from better energy supply, government support, and cost efficient technologies. Furthermore, consumersà ¢â¬â¢ need for sustainable construction practices is likely to increase the demand for Dubalââ¬â¢s product (Green 46). Profitability in the aluminium industry has not been very promising. In 2009, some 6 aluminium smelters closed their businesses. The biggest problem for most organisations is high production expenditure. These organisations need to pay a lot of money to use electricity. Additionally, the US lacks bauxite resources, so many firms need to import their own resources and this costs them considerably. If Dubal opts to take production into the US, then its profitability could be substantially diminished. However, if it only treats the US as a market, then chances are that it will have a greater competitive edge. Consolidation is now a reality in the industry and could be used as a source of competitive advantage for Dubal. The most powerful player in the world-RUSAL ââ¬â is using this strategy to remain a market leader (Bloomberg 40). Likewise, Dubal ought to bor row and customise that approach. The firm can merge with large aluminium purchases in order to foster cost management. Vertically integrated firms in the global aluminium industry are generating their own electricity. Access and prices of power can substantially reduce if Dubal has control over them. In fact, this explains why many aluminium firms are choosing developing nations as new target locations. They can produce electricity cheaply and efficiently in those areas. If Dubal chooses to generate its own electricity, then it ought to do this in the UAE rather than in an expensive country like the US. The organisation can also instate strong governance structures that emphasise strong environmental performance, human rights, and community relations. Additionally, the firm may focus on low cost energy sources since these would cut costs and secure better prices for the product. It should also have a green innovation strategy. Dubal should consider importation as a strategy for entr ance into the US market. This will protect the organisation from the high production costs that stem from operating in the US. All processing should occur in the UAE, so that it can have a ready-product to bring into the US. The US has fewer import restrictions on aluminium than it does on bauxite. Microenvironment-customers The principal type of consumer in the US aluminium market is the manufacturer. Therefore, Dubal Aluminium should consider using B2B partnership models to do business. Some of the frequent buyers of aluminium include automobile manufactures, bicycle, motorcycle, railways and aircraft firms. Beverage manufacturers such as Pepsi and Coca Cola need to the product to make cans and foils. US consumers are generally known for their impulsiveness. However, because Dubal sells intermediary products, then the same psychology cannot be applied to their products. Many B2B approaches work by initiating a strong relationship with the targeted enterprise. Dubal needs to demons trate that its products are superior or that they come at a lower price with no compromise on quality. These factors will set them apart from other retailers. American firms focus on product quality more than affordability so Dubal would be better of if it focused on the first approach. In addition to these differences, it may be imperative for the company to sharpen its negotiation skills as American buyers are astute bargainers. Culture has a positive impact on business in this nation because most people are individualistic. They are highly competitive and always do due diligence before getting into a business arrangement. Furthermore, it is the most qualified person that wins a contract rather than the most affable one. As such, Dubal needs to focus on its tangible advantages and business numbers if it wants to get a market there. Conclusion The purpose of the report was to establish whether the US is a feasible target market for Dubal. It was found that the cost of production is too high, owing to absence of the main mineral ore and high electricity costs. Additionally, there is stiff competition from local players. However, the US ranks well in terms of ease of doing business. Dubal should produce in the UAE and consider exporting its finished products to the USA. Works Cited Aluminium Industry Association. The versatile metal. London: McMillan, 2005. Print. Bloomberg, Jerry. ââ¬Å"Short run demand and supply elasticities in the West European market for secondary aluminium.â⬠Resources Policy 26(2005): 39-50. Print. CRU International. Report in the aluminium and alumina industry. London: CRU International, 2008. Print. Green, Samuel. Aluminium recycling and processing for energy conservation and sustainability. NY: ASM International, 2007. Print. US Department of Energy. US energy requirements for aluminium production. Washington DC: DOE Press. Print This research paper on Market report for Dubal was written and submitted by user Marcus D. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here. cheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.com0tag:blogger.com,1999:blog-4047096722310602658.post-52063903950905048612020-03-15T06:56:00.001-07:002020-03-15T06:56:03.122-07:00Physician-Assisted Suicide Essays - Euthanasia, Medical EthicsPhysician-Assisted Suicide Essays - Euthanasia, Medical Ethics Physician-Assisted Suicide Kathleen M. Foley, author of Competent Care for the Dying Instead of Physician-Assisted Suicide, believes doctors should develop treatments for the physical and psychological problems of dying patients rather than helping them commit suicide. Available data suggests most physicians do not receive training in the care of dying patients. Dying patients experience physical symptoms such as pain, psychological problems such as anxiety and depression and existential distress (described as the experience of life without meaning.)(1) many of the physical and psychological problems can be treated. Furthermore, legalization of physician-assisted suicide may deter physicians from developing treatments that could enhance the dying patient's quality of life. Euthanasia by definition means "a gentle and easy death", "the good death of another" or "mercy killing."(2) There are two types of euthanasia currently recognized, active and passive euthanasia. Active euthanasia is the taking of one's own life, or being killed, for example, by lethal injection. Passive euthanasia is taking one's life with the assistance of another or just being allowed to die. In passive euthanasia we simply refrain from doing anything to keep the patient alive, for example, refusing to perform surgery, administer medication, give heart massage or use a respirator and let the patient die from whatever illness is already present. It is important to understand the difference, because many people believe that active euthanasia is immoral and passive euthanasia is morally all right. They believe that we should actually never kill patients, but sometimes it is all right to let them die. The main issue then is it morally permissible to kill or let someone die who is going to die soon anyway, at the person's own request, as an act of kindness? Throughout history, many people have thought that the distinction between active and passive euthanasia is morally important: and many of those who condemned active euthanasia raised no objection against passive euthanasia. Even by people who believed killing to be wrong, allowing people to die by not treating them was thought in some circumstances to be all right. Even before Christ, Socrates was quoted as saying, " ...bodies which disease had penetrated through and through he would not have attempted to cure...he did not want to lengthen out good-for-nothing lives."(3) In the centuries that followed, both the Christians and the Jews viewed allowing to die in circumstances of hopeless suffering, morally permissible. It was killing that they adamantly opposed. The Pope, stating the position of the Catholic Church, said "it is acceptable to allow the patient who is virtually already dead to pass away in peace."(4) In a statement published in 1982, the American Medical Association echoes the feeling of the Catholic Church saying, " we remain firm on our stand against mercy killing, but allowing patients to die (in some circumstances) is all right."(5) So it seems, there is widespread agreement that passive euthanasia is morally all right (in at least some cases), but active euthanasia is much more controversial. In essence what we seek is whether euthanasia active or passive is moral, or whether it is immoral. To discover the truth we must examine the arguments or reasons that are given for or against it. If the arguments in favor of euthanasia are persuasive and the arguments against it can be rejected, then it is morally acceptable. And likewise, if after careful analysis we find a strong case against euthanasia, we would have to conclude it to be immoral. I think this is true not only of euthanasia, but of any moral issue. The single most powerful argument in support of euthanasia is the argument of mercy. The main idea of this argument is simple. Terminal patients sometimes suffer pain far beyond our comprehension. This suffering can be so terrible that we cringe at the descriptions of such agony. The argument for mercy says: Euthanasia is justified because it puts an end to that. It is not important to give gory details of the suffering of the terminally ill, but it is important to keep these visions vividly imprinted in our minds so we can appreciate the full force of the argument for mercy. If a person prefers and even begs for death as the only alternative to cheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.com0tag:blogger.com,1999:blog-4047096722310602658.post-13576398879143568892020-02-27T21:20:00.001-08:002020-02-27T21:20:02.921-08:00Bachelor of Applied Science -Supervision and Management Program - How Essay - 1Bachelor of Applied Science -Supervision and Management Program - How This Program Will Enhance My Career - Essay Example As a mother of three [boys? Girls? ââ¬â insert something like ââ¬Å"three beautiful girlsâ⬠or ââ¬Å"three intelligent boysâ⬠ââ¬âyou can describe them here], I stay on the go. I juggle a busy schedule and face not only my own challenges, but also the challenge of motivating my children. I have developed routines and schedules to encourage development of good life habits, such as regular cleaning and timely completion of school work. Also, I believe in positive reinforcement, rewording my children for taking initiative to complete tasks on their own. In essence, I have developed a management style with my family that I believe can be applied on a larger scale to my career, making me an effective manager or supervisor. The Bachelor of Applied Science in Supervision and Management will allow me to use the motivational and management skills I have honed in a family environment. The program will allow me to take another step forward, moving my skills as a wife and mother into my career by allowing me to work closely with both respected instructors and my peers in order to become a more effective leader. During my childhood, one teacher comes to mind that motivated me to learn and become the person that I am. I believe that this teacher could reach me because he had learned effective motivational and leadership skills, and I hope to emulate this model and to inspire others to do the same. I have a natural talent for working with people, and it is my goal to interact with instructors and peers in this program to become an effective leader, a valuable skill which will improve my career. As a young womanââ¬âand like many young women in todayââ¬â¢s workforceââ¬âI often felt less secure than my more experienced and seasoned coworkers. One of the most valuable lessons that I have learned as I have grown older is that a personââ¬â¢s worth is not determined my age or intelligence, but by an individualââ¬â¢s desire and motivation to cheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.com0tag:blogger.com,1999:blog-4047096722310602658.post-69341810841431892802020-02-11T14:06:00.001-08:002020-02-11T14:06:03.389-08:00The role of the RN in the Rehabilitation Facility EssayThe role of the RN in the Rehabilitation Facility - Essay Example Rehabilitation is a complex process aimed towards the achievement of a quality life; thus, providers of care in the rehabilitation facilities (such as the nurse) must be knowledgeable, competent, and skillful in rendering rehabilitative care. Registered nurses play an important role in the rehabilitation facilities and are considered as important members of the rehabilitation team. Often, nurses in the rehabilitation team collaborate with the physicians, psychiatrists, physical therapists, occupational therapists, recreational therapists, speech-language therapists, psychologists, spiritual advisors, social workers, vocational councilors, orthotists or prosthetists, and sex councilors. With a number of professionals to which the nurse collaborates, a nurse in the rehabilitation facility must have excellent communication skills and knowledge of each scope of practice. In addition, nurses assume an equal role with other professionals in the rehabilitation process but usually take the m ost critical roles in the provision of rehabilitative care. Jester (2007) stated that the nursesââ¬â¢ roles in the rehabilitation facilities include three main components, among of which are: general maintenance, specialist, and carry-on role (p. 14-15). The nurseââ¬â¢s role in general maintenance includes overall ward management and maintenance of patientââ¬â¢s physical well-being such as nutrition, hygiene, and skin care. The nurse as a specialist in a rehabilitation facility has an inherent degree of expertise in specific areas of rehabilitation such as orthopedic rehabilitation, geriatric rehabilitation, or substance abuse rehabilitation. Lastly, nurses in the rehabilitation facilities also perform the carry-on-role or the role of the nurse to maintain the progress made by other professionals such as the physician (e.g., the nurse is responsible for monitoring the WBC levels of patients being prescribed with Clozapine). In addition to the performance of carry-on-role is the 24-hour-a-day/7-days-a-week role of the nurse in supervision and continuing practice of what the patients learned from other professionals (Squires & Hastings, 2002, 219). The main goal of rehabilitation is to return the individual to the highest level of independence by maximizing function and minimizing disabilities (Flanagan, Zaretsky & Moroz, 2011, 354). To achieve this goal, nurse rehabilitation professionals are commonly asked to evaluate and participate in the treatment of the patients. Thus, a nurseââ¬â¢s role in the rehabilitation facilities does not only centers on the provision of care but also on engaging to the planning and implementation of rehabilitation programs. The role of the nurse in the nurse in the rehabilitation settings is still underdeveloped and too general to identify by other professional groups, patients, and families. Nurses in the rehabilitation facilities are still struggling to make their roles specific and be recognized. Among the reasons de rived from literatures why nursesââ¬â¢ roles in rehabilitation facilities is underdeveloped include lack of specific educational programs for post-registration nurses, organizational difficulties and funding, professional tribalism and turf wars between nurses and therapists, and role confusion (Jester, 2007,16). Nurses have to be competent in order to render an effective rehabilitative care; likewise, the federal government and the organization to which nurses belong also have the responsibility of equipping the nurses with adequate knowledge and skills preparation in the form of cheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.com0tag:blogger.com,1999:blog-4047096722310602658.post-4362063772273825182020-01-31T09:24:00.001-08:002020-01-31T09:24:04.302-08:00An analysis of Information Security Governance in the Universities in Zimbabwe Essay Example for Free An analysis of Information Security Governance in the Universities in Zimbabwe Essay Abstract The complexity and criticality of information security and its governance demand that it be elevated to the highest organizational levels. Within a university setup, information assets include student and personnel records, health and financial information, research data, teaching and learning materials and all restricted and unrestricted electronic library materials. Security of these information assets is among the highest priorities in terms of risk and liabilities, business continuity, and protection of university reputations. As a critical resource, information must be treated like any other asset essential to the survival and success of the organization. In this paper the writer is going to discuss the need for implementing Information Security Governance within institutions of higher education. Further than that, a discussion on how to best practice Information Security governance within the universities in Zimbabwe followed by an assessment on how far the Zimbabwean universities have implemented Information Security Governance. A combination of questionnaires and interviews is going to be used as a tool to gather data and some recommendations are stated towards the end of the paper. Introduction Governance, as defined by the IT Governance Institute (2003), is the ââ¬Å"set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risks are managed appropriately and verifying that the enterpriseââ¬â¢s resources are used responsibly.â⬠Information security governance is the system by which an organization directs and controls information security (adapted from ISO 38500). It specifies the accountability framework and provides oversight to ensure that risks are adequately mitigated as well as ensuring that security strategies are aligned with business and consistent with regulations. To exercise effective enterprise and information security governance, boards and senior executives must have a clear understanding of what to expect from their enterpriseââ¬â¢s information security programme. They need to know how to directà the implementation of an information security programme, how to evaluate their own status with regard to an existing security programme and how to decide the strategy and objectives of an effective security programme (IT Governance Institute, 2006). Stakeholders are becoming more and more concerned about the information security as news of hacking, data theft and other attacks happen more frequently than ever dreamt of. Executive management has been showered with the responsibility of ensuring an organization provides users with secure information systems environment. Information security is not only a technical issue, but a business and governance challenge that involves adequate risk management, reporting and accountability. Effective security requires the active involvement of executives to assess emerging threats and the organizationââ¬â¢s response to them (Corporate Governance Task Force, 2004). Furthermore the organizations need to protect themselves against the risks inherent in the use of information systems while simultaneously recognizing the benefits that can accrue from having secure information systems. Peter Drucker (1993) stated: ââ¬Å"The diffusion of technology and the commodification of information transforms the role of information into a resource equal in importance to the traditionally important resources of land, labor and capital.â⬠Thus as dependence on information system increases, the criticality of information security brings with it the need for effective information security governance. Need for Information Security Governance within universities. A key goal of information security is to reduce adverse impacts on the organization to an acceptable level of risk. Information security protects information assets against the risk of loss, operational discontinuity, misuse, unauthorized disclosure, inaccessibility and damage. It also protects against the ever-increasing potential for civil or legal liability that organizations face as a result of information inaccuracy and loss, or the absence of due care in its protection. Information security covers all information processes, physical and electronic, regardless whether they involve people and technology or relationships with trading partners, customers and third parties. Information security addresses information protection, confidentiality, availability and integrity throughout the life cycle of the information and its use within the organization. John P. Pironti (2006) suggested that among many reasons for information securityà governance, the most important one is the one concerned with the legal liability, protection of the organizationââ¬â¢s reputation and regulatory compliance. With the university setup, all members of the university community are obligated to respect and, in many cases, to protect confidential data. Medical records, student records, certain employment-related records, library use records, attorney-client communications, and certain research and other intellectual property-related records are, subject to limited exceptions, confidential as a matter of law. Many other categories of records, including faculty and other personnel records, and records relating to the universitys business and finances are, as a matter of university policy, treated as confidential. Systems (hardware and software) designed primarily to store confidential records (such as the Financial Information System and Student Information System and all medical records systems) require enhanced security protections and are controlled (strategic) systems to which access is closely monitored. Networks provide connection to records, information, and other networks and also require security protections. The use of university information technology assets in other than a manner and for the purpose of which they were intended represents a misallocation of resources and, possibly, a violation of law. To achieve all this in todayââ¬â¢s complex, interconnected world, information security must be addressed at the highest levels of the organization, not regarded as a technical specialty relegated to the IT department. Information security is a top-down process requiring a comprehensive security strategy that is explicitly linked to the organizationââ¬â¢s business processes and strategy. Security must address entire organizationââ¬â¢s processes, both physical and technical, from end to end. Hence, Information security governance requires senior management commitment, a security-aware culture, promotion of good security practices and compliance with policy. It is easier to buy a solution than to change a culture, but even the most secure system will not achieve a significant degree of security if used by ill-informed, untrained, careless or indifferent personnel (IT Governance Institute, 2006). In an interview the executive director and information security expert on IT Governance and cyber security with the IT Governance and Cyber Security Institute of sub-Saharan Africa, Dr Richard Gwashy Young has this to say ââ¬Å"â⬠¦remember inà Zimbabwe security is regarded as an expense not an investmentâ⬠(Rutsito, 2012). Benefits of Information Security Governance Good information security governance generates significant benefits, including: The Board of directors taking full responsibility for Information security initiatives Increased predictability and reduced uncertainty of business operations by lowering information security-related risks to definable and acceptable levels Protection from the increasing potential for civil or legal liability as a result of information inaccuracy or the absence of due care. The structure and framework to optimize allocation of limited security resources Assurance of effective information security policy and policy compliance A firm foundation for efficient and effective risk management, process improvement, and rapid incident response related to securing information A level of assurance that critical decisions are not based on faulty information Accountability for safeguarding information during critical business activities. Compliances with local and international regulations will be easier Improved resource management, optimizing knowledge, information security and information technology infrastructure The benefits add significant value to the organization by: Improving trust in customer/client relationships Protecting the organizationââ¬â¢s reputation Decreasing likelihood of violations of privacy Providing greater confidence when interacting with trading partners Enabling new and better ways to process electronic transactions like publishing results online and online registration. Reducing operational costs by providing predictable outcomesââ¬âmitigating risk factors that may interrupt the process The benefits of good information security are not just a reduction in risk or a reduction in the impact should something go wrong. Good security can improve reputation, confidence and trust from others with whom business is conducted, and can even improve efficiency by avoiding wasted time and effort recovering from a security incident (IT Governance Institute, 2004). Information Security Governance Outcomes Five basic outcomes can be expected to result from developing an effective governance approach to information security: Strategic alignment of information security with institutional objectives Reduction of risk and potential business impacts to an acceptable level Value delivery through the optimization of security investments with institutional objectives Efficient utilization of security investments supporting organization objectives Performance measurement and monitoring to ensure that objectives are met Best practices The National Association of Corporate Directors (2001), recognizes the importance of information security and recommends four essential practices for boards of directors. The four practices, which are based on the practicalities of how boards operate, are: Place information security on the boardââ¬â¢s agenda. Identify information security leaders, hold them accountable and ensure support for them. Ensure the effectiveness of the corporationââ¬â¢s information security policy through review and approval. Assign information security to a key committee and ensure adequate support for that committee. It is critical that management ensure that adequate resources are allocated to support the overall enterprise information security strategy (IT Governance Institute, 2006). To achieve effective information security governance, management must establish and maintain a framework to guide the development and maintenance of a comprehensive information security programme. According to Horton, et al (2000), an information security governance framework generally consists of: An information security risk management methodology; A comprehensive security strategy explicitly linked with business and IT objectives; An effective security organizational structure; A security strategy that talks about the value of information both protected and delivered; Security policies that address each aspect of strategy, control and regulation; A complete set of security standards for each policy to ensure that procedures and guidelines comply with policy; Institutionalized monitoring processes to ensure compliance and provide feedback on effectiveness and mitigation of risk; A process to ensureà continued evaluation and update of security policies, standards, procedures and risks. This kind of framework, in turn, provides the basis for the development of a cost-effective information security program me that supports an organizationââ¬â¢s goals and provides an acceptable level of predictability for operations by limiting the impacts of adverse events. In his article Kaitano (2010), pointed some characteristics of good corporate governance coupled with good security governance. These include and not limited to: Information security being treated as and organization wide issue and leaders are accountable. Leads to viable Governance, Risk and Compliance(GRC) Milestones It is risk-based and focuses on all aspects of security Proper frameworks and programs have been implemented It is not treated as a cost but a way of doing business Roles, responsibilities and segregation of duties are defined It is addressed and enforced by policy Adequate resources are committed and Staff are aware and trained It is planned, managed, measurable and measured It is reviewed and audited The overall objective of the programme is to provide assurance that information assets are protected in accordance with their value or the risk their compromise poses to an organization. The framework generates a set of activities that supports fulfillment of this objective. Principles for information security within the University In their article titled Information Security Policy: Best Practice Document, Hostland et al (2010) pointed out some guiding principles for information security within a university setup. The following are some of the principles they mentioned: 1. Risk assessment and management The universitys approach to security should be based on risk assessments and should be continuously done and the need for protective measures evaluated. Measures must be evaluated based on the universitys role as an establishment for education and research and with regards to efficiency, cost and practical feasibility. An overall risk assessment of theà information systems should be performed annually. Risk assessments must identify, quantify and prioritize the risks according to relevant criteria for acceptable risks. Risk assessments should be carried out when implementing changes impacting information security. Some recognized methods of assessing risks like ISO/IEC 27005 should be employed. Risk management is to be carried out according to criteria approved by the management at University. Risk assessments must be approved by the management and if a risk assessment reveals unacceptable risks, measures must be implemented to reduce the risk to an acceptable level. 2. Information security policy The Vice Chancellor should ensure that the information security policy, as well as guidelines and standards, are utilized and acted upon. He must also ensure the availability of sufficient training and information material for all users, in order to enable the users to protect the universitys data and information systems. The security policy should be reviewed and updated annually or when necessary, in accordance with principles described in ISO/IEC 27001. However, all important changes to universitys activities, and other external changes related to the threat level, should result in a revision of the policy and the guidelines relevant to the information security. 3. Security organization The Vice Chancellor is responsible for all government contact. The university should appoint CSO (Chief Security Officer). Each department and section should also be responsible for implementing the units information security. The managers of each unit must appoint separate security administrators. The Registrar Academics has the primary responsibility for the information security in connection with the student registry and other student related information. The IT Director has executive responsibility for information security in connection with IT systems and infrastructure. The Operations manager has executive responsibility for information security in connection with structural infrastructure. He also has overall responsibility for quality work, while the operational responsibility is delegated according to the management structure. The Registrar Human Resources also has executive responsibility for information security according to the Personal Data Act and is the controller on a daily basis of the personal information of theà employees. The Registrar Academics and Research Administration have also executive responsibility for research related personal information. Universitys information security should be revised on a regular basis, through internal control and at need, with assistance from an external IT auditor. 4. Information security in connection with users of Universitys services Prior to employment security responsibility and roles for employees and contractors should be described. A background check is should also be carried out of all appointees to positions at the university according to relevant laws and regulations. A confidentiality agreement should be signed by employees, contractors or others who may gain access to sensitive and/or internal information. IT regulations should be accepted for all employment contracts and for system access for third parties. During employment, the IT regulations for the universitys information security requirements should be in place and the users responsibility for complying with these regulations is to be emphasized. The IT regulations should be reviewed regularly with all users and with all new hires. All employees and third party users should receive adequate training and updating regarding the Information security policy and procedures. Breaches of the Information security policy and accompanying guidelines will normally result in sanctions. Universitys information, information systems and other assets should only be utilized for their intended purpose. Necessary private usage is permitted. Private IT equipment in the universitys infrastructure may only be connected where explicitly permitted. All other use must be approved in advance by the IT department. On termination or change of employment, the responsibility for termination or change of employment should be clearly defined in a separate routine with relevant circulation forms. The universitys assets should be handed in at the conclusion of the need for the use of these assets. University should change or terminate access rights at termination or change of employment. A routine should be present for handling alumni relationships. Notification on employment termination or change should be carried out through the procedures defined in the personnel system. 5. Information security regarding physical conditions IT equipment and information that require protection should be placed in secure physical areas. Secure areas should have suitable access control toà ensure that only authorized personnel have access. All of the Universitys buildings should be secured according to their classification by using adequate security systems, including suitable tracking/logging. Security managers for the various areas of responsibility should ensure that work performed by third parties in secure zones is suitably monitored and documented. All external doors and windows must be closed and locked at the end of the work day. On securing equipment, IT equipment which is very essential for daily activities must be protected against environmental threats (fires, flooding, temperature variations). Information classified as sensitive must not be stored on portable computer equipment (e.g. laptops, cell phones, memory sticks). If it is necessary to store this information on portable equipment, the information must be password protected and encrypted in compliance with guidelines from the IT department. During travel, portable computer equipment should be treated as carry-on luggage. Fire drills should also be carried out on a regular basis. 6. IT communications and operations management Purchase and installation of IT equipment and software for IT equipment must be approved by the IT department. The IT department should ensure documentation of the IT systems according to universitys standards. Changes in IT systems should only be implemented if well-founded from a business and security standpoint. The IT department should have emergency procedures in order to minimize the effect of unsuccessful changes to the IT systems. Operational procedures should be documented and the documentation must be updated following all substantial changes. Before a new IT system is put in production, plans and risk assessments should be in place to avoid errors. Additionally, routines for monitoring and managing unforeseen problems should be in place. Duties and responsibilities should be separated in a manner reducing the possibility of unauthorized or unforeseen abuse of the universitys assets. Development, testing and maintenance should be separated from operations in order to reduce the risk of unauthorized access or changes, and in order to reduce the risk of error conditions. On system planning and acceptance, the requirements for information security must be taken into consideration when designing, testing, implementing and upgrading IT systems, as well as during system changes. Routines must be developed forà change management and system development/maintenance. IT systems must be dimensioned according to capacity requirements and the load should be monitored in order to apply upgrades and adjustments in a timely manner as it is especially important for business-critical systems. Written guidelines for access control and passwords based on business and security requirements should be in place. Guidelines should be re-evaluated on a regular basis and should contain password requirements (frequency of change, minimum length, character types which may/must be utilized) and regulate password storage. All users accessing systems must be authenticated according to guidelines and should have unique combinations of usernames and passwords. Users are responsible for any usage of their usernames and passwords. Data Gathering A structured questionnaire adapted and modified from previous questionnaires used by Corporate Governance Task Force, (2004) was used as the main instrument to gather data. Of the total 13 universities in Zimbabwe, 9 managed to participate in this research. The questionnaires were completed by the Executive Dean, IT Director, Operations Manager or Chairperson for the department. Section I: Organizational Reliance on IT The first section was designed to help in determining the institutionââ¬â¢s reliance on information technology for business continuity. Table 1: Characteristics of Organization Questions Scores/Frequency 0 1 2 3 4 Dependence on information technology systems and the Internet to conduct academic, research, and outreach programs and offer support services 9 Value of organizationââ¬â¢s intellectual property stored or transmitted in electronic form 2 7 The sensitivity of stakeholders (including but not limited to students, faculty, staff, alumni, governing boards, legislators, donors, and funding agencies) to privacy 2 3 4 Level of regulation regarding security (international, federal, state, or local regulations) 1 4 3 1 Does your organization have academic or research programs in a sensitive area that may make you a target of violent physical or cyber attack from any groups? 5 1 2 1 Total score 1 9 6 7 22 Scoring: Very Low = 0; Low = 1; Medium = 2; High = 3; Very High = 4 Section II: Risk Management: This section assesses the risk management process as it relates to creating an information security strategy and program. Table 2: Information Security Risk Assessment Questions Scores/Frequency 0 1 2 3 4 Does your organization have a documented information security program? 2 5 2 Has your organization conducted a risk assessment to identify the key objectives that need to be supported by your information security program? 2 4 3 Has your organization identified critical assets and the functions that rely on them? 2 2 5 Have the information security threats and vulnerabilities associated with each of the critical assets and functions been identified? 2 4 2 1 Has a cost been assigned to the loss of each critical asset or function? 1 3 3 2 Do you have a written information security strategy? 2 4 2 1 Does your written information security strategy include plans that seek to cost-effectively reduce the risks to an acceptable level, with minimal disruptions to operations? 4 2 2 1 Is the strategy reviewed and updated at least annually or more frequently when significant changes require it? 2 3 3 1 Do you have a process in place to monitor federal, state, or international legislation or regulations and determine their applicability to your organization? 2 2 3 2 1 Total 10 16 26 14 16 Scoring: Not Implemented = 0; Planning Stages = 1; Partially Implemented = 2; Close to Completion = 3; Fully Implemented = 4 Section III: People This section assesses the organizational aspects of the information security program. Table 3: Information Security Function/Organization Questions Scores/Frequency 0 1 2 3 4 Do you have a person that has information security as his primary duty, with responsibility for maintaining the security program and ensuring compliance? 4 3 1 1 Do the leaders and staff of your information security organization have the necessary experience and qualifications? 5 2 2 Is responsibility clearly assigned for all areas of the information security architecture, compliance, processes and audits? 3 4 1 1 Do you have an ongoing training program in place to build skills and competencies for information security for members of the information security function? 2 2 3 2 Does the information security function report regularly to institutional leaders and the governing board on the compliance of the institution to and the effectiveness of the information security program and policies? 2 3 3 1 Are the senior officers of the institution ultimately responsible and accountable for the information security program, including approval of information security policies? 3 4 2 Total 16 17 14 7 0 Scoring: Not Implemented = 0; Planning Stages = 1; Partially Implemented = 2; Close to Completion = 3; Fully Implemented = 4 Section IV: Processes This section assesses the processes that should be part of an information security program. Table IV: Security Technology Strategy Questions Scores/Frequency 0 1 2 3 4 Have you instituted processes and procedures for involving the security personnel in evaluating and addressing any security impacts before the purchase or introduction of new systems? 2 3 3 1 Do you have a process to appropriately evaluate and classify the information and information assets that support the operations and assets under your control, to indicate the appropriate levels of information security? 1 2 3 2 1 Are written information security policies consistent, easy to understand, and readily available to administrators, faculty, employees, students, contractors, and partners? 2 3 3 1 Are consequences for noncompliance with corporate policies clearly communicated and enforced? 1 3 2 3 1 Do your security policies effectively address the risks identified in your risk analysis/risk assessments? 2 3 4 Are information security issues considered in all important decisions within the organization? 3 2 3 1 Do you constantly monitor in real time your networks, systems and applications for unauthorized access and anomalous behavior such as viruses, malicious code insertion, or break-in attempts? 1 3 3 1 1 Is sensitive data encrypted and associated encryption keys properly protected? 2 3 2 1 1 Do you have an authorization system that enforces time limits and defaults to minimum privileges? 2 2 2 3 Do your systems and applications enforce session/user management practices including automatic timeouts, lock out on login failure, and revocation? 2 3 2 2 Based on your information security risk management strategy, do you have official written information security policies or procedures that address each of the following areas? Individual employee responsibilities for information security practices 4 3 1 1 Acceptable use of computers, e-mail, Internet, and intranet 2 3 2 2 Protection of organizational assets, including intellectual property 2 2 3 2 Access control, authentication, and authorization practices and requirements 1 2 3 1 2 Information sharing, including storing and transmitting institutional data on outside resources (ISPs, external networks, contractorsââ¬â¢ systems) 2 1 3 2 1 Disaster recovery contingency planning (business continuity planning) 1 1 3 4 Change management processes 2 3 2 2 Physical security and personnel clearances or background checks 1 3 3 2 Data backups and secure off-site storage 1 1 3 4 Secure disposal of data, old media, or printed materials that contains sensitive information 2 3 4 For your critical data centers, programming rooms, network operations centers, and other sensitive facilities or locations: 2 3 4 Are multiple physical security measures in place to restrict forced or unauthorized entry? 1 2 3 3 Is there a process for issuing keys, codes, and/or cards that require proper authorization and background checks for access to these sensitive facilities? 2 1 3 3 Is your critical hardware and wiring protected from power loss, tampering, failure, and environmental threats? 1 4 4 Total 17 45 58 50 47 Scoring: Not Implemented = 0; Planning Stages = 1; Partially Implemented = 2; Close to Completion = 3; Fully Implemented = 4 Discussion As shown by the total scores on Table 1, a majority of the university has a very high reliance on the IT in their services. This is depicted by the structure and characteristics of the university. Information risk assessment and management leaves a lot to be desired by the universities. Most the universities have partially implemented such programs. A large number of employees in the IT departments of most universities do no have sufficient skills to implement good information security governance. Most universities lack the leaders who have the rightful know how on the subject. In additionà to that, there is no a representative in the council who will be an IT expert, hence most leaders lack interest and initiatives on information security. Due to lack of full responsibility of information security by the leaders, to implement processes for information security might also be a challenge especially to the IT department as normally is the department given the responsibility. Conclusion There is a need for institutions to start focusing on proper information security governance. For a start organization such as the Government, the Computer Society of Zimbabwe, Zim Law Society, POTRAZ, ICAZ, IIAZ, Zimbabwe Institute of Management and other industry governing bodies should put their heads together and define the appropriate legislations that mandates information security governance either by referring to existing international frameworks (PCI-DSS, SOX, COSO, ITIL, SABSA, Cobit FIPS, NIST, ISO 27002/5, CMM, ITG Governance Framework) or by consulting local information security and business professionals to come up with an information security governance framework. As the Zimbabwean economy is slowly sprouting, the art of information security governance in the universities should also take a leap. The adoption information security governance will ensure that security will become a part of any university and thus customers confidence will be boosted. References Drucker, P. ââ¬ËManagement Challenges for the 21st Centuryââ¬â¢, Harpers Business , 1993. Corporate Governance Task Force, Information Security Governance: Call to Action, USA, 2004. IT Governance Institute, Board Briefing on IT Governance, 2nd Edition, USA, 2003, www.itgi.org. IT Governance Institute, Information Security Governance: Guidance for Boards of Directors and Executive Management, 2nd Edition, USA, 2006. ISO/IEC 38500: Corporate Governance of Information Technology, 2008. IT Governance Institute, COBIT 4.0, USA, 2005, www.itgi.org IT Governance Institute, COBITà ® Security Baseline, USA, 2004, www.itgi.org National Association of Corporate Directors, ââ¬ËInformation Security Oversight: Essential Board Practicesââ¬â¢, USA, 2001 John P. Pironti,à ââ¬Å"Information Security Governance: Motivations, Benefits and Outcomes,â⬠Information Systems Control Journal, vol. 4 (2006): 45ââ¬â8. 21. Rutsito, T. (2005) ââ¬ËIT governance, security define new eraââ¬â¢ The Herald, 07 November. Kaitano, F. (2010) ââ¬ËInformation Security Governance: Missing Link In Corporate Governanceââ¬â¢ TechZim. http://www.techzim.co.zw/2010/05/information-security-governance-missing-link-in-corporate-governance [accessed 02 May 2013]. Horton, T.R., Le Grand, C.H., Murray, W.H., Ozier, W.J. Parker, D.B. (2000). Information Security Management and Assurance: A Call to Action for Corporate Governance. United States of America: The Institute of Internal Auditors. Hostland, K, Enstad, A. P, Eilertsen, O, Boe, G. (2010). Information Security Policy: Best Practice Document. Corporate Governance Task Force, (2004). Information Security Governance: Call to Action, USA cheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.com0tag:blogger.com,1999:blog-4047096722310602658.post-69513356347425384362020-01-23T05:47:00.001-08:002020-01-23T05:47:03.695-08:00WalMart :: essays research papers Wal-Martââ¬â¢s philosophy has always been to provide everyday low prices and superior customer service. But this philosophy might have stared potential customers away from Wal-Mart. Many people, including myself, have the misconception that Wal-Mart only sells necessities that the average working class family can afford. An extreme eye opener for me was a recent television commercial by Wal-Mart. I saw that they also sold flat panel televisions, which is considered a luxury item for any social class. After going to their website to see what other luxury items Wal-Mart sold I was amazed at the number of items I found that were not the necessities which I stereotyped them selling. Wal-Mart has to change the publicââ¬â¢s opinion of the items that they sell and the types of people that it has in mind of serving. Sam Walton was the shrewd businessman behind the world's largest retailer. After working his way through the University of Missouri as a newspaper delivery boy, he got a job in Des Moines, Iowa as a management trainee for J.C. Penny at a salary of $75 a month. Walton borrowed some money from his father-in-law and opened a variety store after serving as an Army captain in World War II. A chain of drugstores followed. He went into business with his brother Bud, and by 1960, the Waltons' 15 stores were taking in $1.4 million a year. But Walton soon saw a challenging new competitor arise in the discount store. The Walton brothers opened their first Wal-Mart in 1962 in Rogers, Arkansas. Specializing in name brands at low prices, the chain of Wal-Mart stores sprang up across rural America. Wal-Martââ¬â¢s sales grew to $26 billion by 1989, compared to $1 billion in 1980. By 1990, Wal-Mart was the largest U.S. cheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.com0tag:blogger.com,1999:blog-4047096722310602658.post-12905381041770194392020-01-15T02:11:00.001-08:002020-01-15T02:11:04.201-08:00PostmodernismFirst of all, it is important to be aware of the differences between postmodernism and modernism. While modernism always tries to find a new way to express something, postmodernism has no such concern. Modernism itself is representational, normative, original and Universalism. It has a linear progress. Postmodernism has no concern about being original. Moreover postmodernism claims that there is not possible way to create something brand new anymore. So, contrary to modernism's originality, postmodernism is quotation based. It is simulation and relativistic.While it is common to encounter alienated self in postmodernism, there is a decanter self in postmodernism. It will be useful to adopt the major characteristics of postmodernism into the postmodern movies. In postmodern films, we usually do see barcaroles. Those barcaroles are inspired mostly from the past. It is possible to say that the postmodern films have a mission of recycling the past. Moreover, since the high and low cultur e got stuck in the modern times, it is not possible to come across a separated culture in postmodern films. Postmodern films bring them together and melt them in a pot.They do not have one specific genre. Genre-cross over is commonly recognized in postmodern movies. A postmodern movie can be attached to several genres at the same time. One of the major characteristics of postmodernism, quotation shows itself as intellectuality. It can also be engaged to non-linearity in some examples. Postmodern movies mostly contain references to other movies. That's a major element of intellectuality. While it is common to recognize reference to other movies it is also possible for a postmodern movie to reflect upon its own process.Parodies and pastiches have also a major part in postmodern movies. We usually do see the parodies of horror movies. A postmodern film also bends the time and creates confusions over the time and space. By the time it also blurs the lines between dream and reality. Espe cially the hyper reality blurs the lines by creating a simulation of reality. Also the element, metrification is used in postmodern films. For instance if a character speaks directly to the audience, it can be said that one of the elements of metrification is used. Metrification breaks the spell of the movie. cheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.com0tag:blogger.com,1999:blog-4047096722310602658.post-49479641761808738282020-01-06T22:33:00.001-08:002020-01-06T22:33:03.796-08:00Comparison and Contrast Essay Between Two Poems of Emily... Comparison and Contrast Essay between two Poems of Emily Dickinson and Mary Oliver Emily Elizabeth Dickinson, or called Emily Dickinson for short (1830 ââ¬â 1886) and Mary Oliver (1935), are the two poets who contributed great works of art to American society during the late nineteenth and early twentieth century. In spite of several characteristics that can be found in both Emily Dickinson and Mary Oliver poems, there are undeniably things that distinguish them from one another, although outside both are very famous poets of the poems that they wrote at that time, but actually inside, every poem that they bring the reader has a different meaning and quite deep in reader hearts. For example, as we read the poem ââ¬Å"Alligator Poemâ⬠by Maryâ⬠¦show more contentâ⬠¦(Write something about Famous Works of Emily Dickinson). In the poem ââ¬Å"Aligator Poemâ⬠in ââ¬Å"New and Selected Poems ââ¬â Volumne Oneâ⬠of Mary Oliver, personification method is a main method that she used the most to write this poem. As you read the whole poem, you can clearly see the bird that she wants to talk about is standing in the tops of the trees, whistling any warning, crashing toward to her, its tail failing, slashing the grass, its cradle - shaped mouth gaping, then rimming with teeth,... these actions are not the actions of a bird, these are human actions, she used personification to pretend the bird is a person, or a friend, she pretended that she was walking on the street and saw the bird, but she thought that bird is not a normal bird because she could see its eye was trying to tell her something. And of course she couldnt understand bird language, or the bird couldnt tell her what is going on with her in human language. So the only way that the bird could do is action, I do agree that human cannot un derstand the birds language, but I do surely agree that human can understand the bird action. Then finally she did understand what the bird was trying to tell her, she understood that something is really bad will happen to her in the future. And yes, she fell, but thanks to cheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.com0tag:blogger.com,1999:blog-4047096722310602658.post-3560619831032911022019-12-29T18:58:00.001-08:002019-12-29T18:58:02.669-08:00The Link Between British Colonization Of Sub Saharan... Society misrepresents Africa as disease ridden, uncivilized, overpopulated and poor. It is generalized as one united nation rather than fifty-four individual states, and is conceived as an inferior nation. European nations deployed a mission of colonization to bring the continent civilization. This paper interprets the link between British colonization of Sub-Saharan Africa and lasting economic problems evident today. The argument of British underdevelopment in Africa draws on studies collected on individual African states as well as the continent as whole, regarding economic growth statistics from before, during and post-colonization. Britain failed to develop African nations, leaving them plagued with social issues following independence. This paper expands on the link between Africaââ¬â¢s colonial roots and international interventionââ¬â¢s impact on contemporary Africa today. Britainââ¬â¢s lack of development, rooted in colonization, is to blame for Africaââ¬â¢s crumbl ing economy. Africa is the worldââ¬â¢s poorest inhabited continent, with more than one third of its residents living on less than a comparative US dollar per day. Africa is stereotyped as poor, overpopulated, and uncivilized. Historians refer to Africa as one united land mass rather than multiple independent nations. Africaââ¬â¢s limited use of technology, agricultural based economy, and independent self-government prior to independence has made gathering data on the continent difficult. Africa as a whole has little dataShow MoreRelatedAfrican Countries And The Quality Of Governance1731 Words à |à 7 Pagesbiggest problems facing most African countries and impeding their development is the quality of governance. In most cases, the quality of governance is considered as ââ¬Å"poorâ⬠or ââ¬Å"badâ⬠. How bad or how poor? Perhaps following conclusions from the aggregation of scores and percentiles for different governance indicators set by organizations such as the World Bank (Ka ufmann Mastruzzi, 2011), Transparency International and Mo Ibrahim Foundation. It is not ideal to hear of good governance in Sub-SaharanRead More Libyaââ¬â¢s Reconciliation with the West Essay4998 Words à |à 20 Pagesonly its own regional affairs but in major global politics, as well as the opportunity for greater economic growth and development and the establishment of integrated multilateral trade. But the country in question is not Iraq or Iran or any of the other familiar members of the Persian Gulf- it is Libya, one of the most isolated and overlooked states in the politically vital Middle East and North Africa. But Libya may not play such a trivial role for long, as recent events have demonstrated a significantRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words à |à 656 Pagessocioeconomic circumstances and dynamics rather than standard but arbitrary chronological break points. In the decades that followed the Great War, the victorious European powers appeared to have restored, even expanded, their global political and economic preeminence only to see it eclipsed by the emergence of the Soviet and U.S. superpowers on their periphery and a second round of even more devastating global conflict. The bifurcated international system that resulted from the cold war standoffRead MoreArchaeology Notes19985 Words à |à 80 PagesHomininesâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦39 African Pre- Historic Artâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.49 Definition of Terms Angular torus a thickened bony ridge on the back of the parietal Biostratigraphy the use of biological organisms found in rocks to correlate ages between sites. Bipedalism refers to locomotion e.g., walking, jogging, running, etc., on two legs. Geology, is the study of the earth, which allows us to understand the preservation, age, and environment in which fossils are found. Gracile means slender cheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.com0tag:blogger.com,1999:blog-4047096722310602658.post-80334982982858140852019-12-21T14:46:00.001-08:002019-12-21T14:46:02.981-08:00The Effects Of Video Games On Children - 1393 Words While video games have received much criticism for their lack of teaching qualities, there are many positive aspects to them. Video games are an excellent way for children to meet, interact with and socialize with new people from across the country and even the globe. Although video games are drawing kids inside more, and thus giving them a reason to not be as active as they once were; they are giving children a new space to express themselves and to grow their creativity to new levels as many of the activities performed are either dangerous or nearly impossible to do in real life. In her essay, Games and the Media: The Acquisition of Social Structure and Social Rules, Maria Heller argues that the violence experienced in video games has a negative impact on children, however from research I have conducted from other sources, video games, especially Minecraft, have a great enough positive impact to outweigh the negatives. Children collaborate online and share their ideas while also p laying in the same ââ¬Å"lobbiesâ⬠to jointly work on different projects and to easily give their inputs to their friends. Heller generally argues that video games have a negative impact on society. While she states, ââ¬Å"The use of new ICTs, digital network communication and access to multimedia information, culture and entertainment can contribute to making peopleââ¬â¢s lives richer and more comfortable,â⬠she continues with, ââ¬Å"The increase of violence and violent entertainment, the disturbed time-balance ofShow MoreRelatedThe Effects Of Video Games On Children Essay1279 Words à |à 6 PagesIntroduction Video games have always been a controversial type of entertainment, that may come from how relatively new video games are compared to other mediums of entertainment[1]. Maybe because of that when a violent crime occurs and the culprit has played a lot of games the media is quick to point at violent games as the reason for the crime, but is that true or are the media just biased or looking for quick views, this report aims to answer that question. Do games affect our way of thinkingRead MoreEffects Of Video Games On Children Essay1357 Words à |à 6 PagesScreening to a halt: Are parents in New Zealand able to identify signs of dependency or addiction in their children due to over use of screen-time from the recreational use of video games? Digital technology and the vast amount of video games have increased the amount of screen time consumption in contemporary New Zealand society. The saturation of smart phones, ipadââ¬â¢s, tablets, computers, game consoles and the Internet are devices with the means of connection to gaming. Many New Zealand families integrateRead MoreThe Effects of Video Games on Children1288 Words à |à 6 PagesThe Effects of Video Games on Children Technology today has progressed rapidly from generation to generation. Children and young adults are both into video games and the latest gadgets out there. Video games have been available to customers for the last 30 years. They are a unique way to entertain individuals because they encourage players to become a part of the games script. Victor Strasburger an author of ââ¬Å"Children, Adolescents, and the mediaâ⬠stated ââ¬Å"The rising popularity of video games hasRead MoreThe Effects Of Video Games On Children1548 Words à |à 7 PagesVideo Games Introduction Today video games are a staple in most households. It is pretty amazing to know that the first creation of games date all the way back to the 1900s. They were not originally invented to make a profit, but to give patients something to do while waiting in the lobby of an office. One inventor had a simple idea of using the monitor not just as a television set, but as a way to play games. College students were just playing around with equipment and happened upon something greatRead MoreThe Effects of Video and Video Games on Children2043 Words à |à 8 Pagesaction, usually in a cartoon, movie, or video game. For many of us, Disney is where we refer back to early forms of animation with the idea of using thousands of consecutive drawings; through Disney, we can now see how far this idea of breathing life into static objects has advanced. Today, animation is becoming more and more realistic. With highly advanced technology and computer programs, it has become easier for simple cartoons to develop into what children see as real life. These animated cartoonsRead MoreVideo Games And Its Effects On Children927 Words à |à 4 PagesVideo games are a more interesting form of entertainment for the simple reason that players may become part of the gameââ¬â¢s plot. Video games were invented for many years now. However, the current variety of games raised concerns about how they affect the children s behavior due to the fact that the games are becoming more sophisticated. Children spend most of their free time playing video games. Sometimes children refrain from completing important duties and dedicate all of their time playing videoRead MoreVideo Games And Its Effects On Children940 Words à |à 4 Pageswas bored they went outside to play, they created new games, or they played with friends. But, for the past three decades, video games and other digital media have been persuading many adolescents and children to spend the majority of their time playing them. Video games seem to satisfy childrenââ¬â¢s natural need to interact socially, however more often than not, they lead to social isolation. Overexposure to digital media, such as video games is detrimental to the health and function of a childââ¬â¢sRead MoreVideo Games And Its Effects On Children1519 Words à |à 7 PagesVideo games in the 21st century have transformed from friendly competing into guns, explosions, and major violence. Video games are getting away with more violence every year and the games are becoming more extreme. The consistence and severity of violence is at an all-time high leading the most popular games in the gaming community to have a ââ¬Ëmatureââ¬â¢ rating due to the considerable amount of violence involved. For example, one of the highest selling video games of all time grossing one billion itsRead MoreThe Effects of Video Games on Children1656 Words à |à 7 PagesIntroduction For more than 30 years, video gaming has been a popular activity amongst many of Americaââ¬â¢s children. With over $63 billion (Reuters, reuters.com) worth sold each year, video games are here to stay. While much controversy has arisen over the subject, video games have benefited the United States of America and its citizens to a great degree. For example, the military and CIA use gaming to train soldiers (Davidson, www.ehow.com), and classrooms use video games to teach students. The potentialRead MoreThe Effects Of Video Games On Children Essay1736 Words à |à 7 PagesEffects of Video Games We see it everywhere we go, video games. Kids and adults are being captivated over the new video games that are coming out. Call of Duty, Battlefield,Uncharted; these are the games that people are enjoying and becoming fascinated with. What do all of those things have in common? There is only one answer and that is violence. Fighting, shooting, killing, these are the things that video games bring to the table and stimulate people s minds. We should ask ourselves whether cheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.com0tag:blogger.com,1999:blog-4047096722310602658.post-50980579440855115492019-12-13T11:16:00.001-08:002019-12-13T11:16:05.227-08:00Nuclear Disarmament Free Essays string(128) " us of how the world has reacted against a nation harnessing nuclear weapons and testing these weapons right at their backyard\." Nuclear technology has been widely used in the past, especially among nations seeking to dominate or to at least secure their positions as a country able to defend itself against its enemies or launch a military offensive. It is no hidden fact that nuclear weapons pose a great amount of threat to the security of human and animal lives in many ways. There may be other purposes for nuclear technology other than harnessing a sizeable amount of military weaponry, such as for generating power which will be distributed to households and infrastructures. We will write a custom essay sample on Nuclear Disarmament or any similar topic only for you Order Now à Yet the apparent threat to the lives of humanity remains an utmost concern in the international community. More recently, many nations have already acquired nuclear facilities in creating nuclear weapons such as India, the United States of America, Russia and North Korea just to name a few. The availability of these weapons of mass destruction has prompted many concerned individuals and groups to raise their opposition and seek a nuclear disarmament internationally, regardless of national status. There are also those who barely limit their calls for nuclear disarmament to nations which they perceive as threat to the international community such as North Korea. One of the many arguments behind the call for nuclear disarmament is the idea that the very presence of nuclear weapons creates not only tension among nations which have them like USSR and America in the past. It also creates fear among nations and citizens, especially those which do not have the capability to produce nuclear weapons and make their presence felt as a nation capable of defending itself. Moreover, there is also the fear towards the health risks posed by nuclear weapons. Among the risks, perhaps the most known is that of nuclear fallout caused by the testing of nuclear weapons. Nuclear explosions during these tests create residual radiation hazards or radioactive dust which can largely affect the health of people in many ways. On the other hand, the manufacture of nuclear weapons can also pose dangers when accidents occur. For the most part, the Chernobyl nuclear reactor accident gives us a rough impression on the drastic consequences which can be brought about by nuclear accidents. In essence, there should be nuclear disarmament precisely because the availability of nuclear weapons is enough reason to believe that sooner or later these weapons will be used. The very fact that there are nations creating nuclear weapons is enough to presume that there is a purpose or motive behind the manufacture of these weapons. It would be irrational to presume that these nations will manufacture nuclear weaponsââ¬âweapons that cost huge financing and environmental and health risksââ¬âwithout having the thought of using the weapons at some point in time. Indeed, if there is at least one essential reason why these weapons are being built, it would have to be the reason that these weapons are most likely to be used. In the first place, one can pose the question as to whether there is an apparent and high need for nuclear weapons. Given the contemporary global situation, there are parts in the world where there are unrest like Tibet and there are regions in the world where there is a tension among nations like that of Israel and its neighboring countries just to name a few. These events in the world indeed require efforts of mitigation and resolution. To say that the amassing of nuclear weapons is one key to putting a stop to these global concerns is to say that efforts to propagate weapons of destruction can curb destruction altogether. Yet there is strong reason to believe that the opposite is more likely to be true. Significant historical events from around the world teaches us quite a number of things, one of which is that nuclear disarmament should be met in order to halt further damage from being done. Tensions across the world should be basically addressed not with another move which will further cause tension but with a real solution that will limit and eventually dissolve these tensions. The past two world wars literally obliterated the lives of thousands, and the further proliferation of nuclear weapons will create a similar scenario in the years to come if more and more nations will make use of nuclear weapons to further strengthen their military capabilities and if several nations will continue to harness nuclear weapons as we speak. Another point that deserves attention is that if we have many nations manufacturing and keeping nuclear weapons, there may come a time when these nations engage themselves in a nuclear warfare. The most likely result will be that of a mutually assured destruction where even the non-participating nations will be greatly affected especially the nations which are incapable of defending themselves against nuclear weaponries. It should be noted that even when there is no actual nuclear warfare, there remains the impending threat of its actual use, causing nations to panic to a certain extent and resort to measures to thwart off these threats temporarily. Although not exactly a crisis which involves nuclear weapons, the case of the Cuban missile crisis spawned fear from the United States of America. This was during the time of the Cold War between the former USSR and America, a time when both nations were stockpiling nuclear weapons, racing against one another in the desire to outnumber the quantities of nuclear weapons of one over the other. As Samuel Walker puts it, ââ¬Å"the first two decades of the Cold War era, most scholars, like most Americans, regarded postwar tensions as a result of Soviet expansion and aggression (Walker, 1995, p. 1653).â⬠The Cuban missile crisis was a crisis which did not strictly involve nuclear weapons. Then again, the fear and tension it created was overwhelming, which makes us think what more if the crisis had involved nuclear weapons. Apparently, the case of North Korea in more recent times reminds us of how the world has reacted against a nation harnessing nuclear weapons and testing these weapons right at their backyard. You read "Nuclear Disarmament" in category "Essay examples" The presence of nuclear weapons does not essentially nor significantly assure peace. Nor does it promote peace in one way or another. Rather, what it does is to heighten the political and military tension among countries, pushing these nations to increase the pressure on the nation wielding nuclear weapons or engaging such nation into military intervention some time in the future. The cases of Hiroshima and Nagasaki are perhaps the most suitable and compelling examples to illustrate the point that nuclear weapons can indeed wipe-out an entire civilization and event the entire humanity. The bombing of both Hiroshima and Nagasaki in Japan is claimed to be the last nail during the Second World War. Apart from being the last nail, the bombings were also destructive in nature, destroying two key cities in less than a minute with destructive effects lasting even up to this very day. These only show that the dangers posed by nuclear weapons are very real and can bring havoc to an entire nation. Nuclear disarmament requires nations with nuclear weapons to dismantle such weapons, such as the case of the several treaties that paved the way for the United States, the Soviet Union and many other countries to make certain prohibitions. Some of these treaties include but is not limited to: the Partial Test Ban Treaty in 1963 which sought to prohibit all forms of nuclear testing except when done underground, the Interim Agreement on Offensive Arms or SALT 1 which was agreed into by America and the Soviet Union way back in 1972 in order to freeze the actual units of intercontinental ballistic missiles as well as submarine-launched ballistic missiles that may be released or deployed by either of the two nations, and the Strategic Offensive Reductions Treaty or SORT which was signed in 2002 and enforced a year later which aimed to reduce the strategic nuclear warheads of the United States and Russia. However, even though there have already been numerous treaties designed to control the proliferation of nuclear weapons among nations, the achievement of the goal of a total nuclear disarmament remains to be seen. Ken Rigby, Jacques Metzer and Biruta Dietz (1990) point out that ââ¬Å"the attitude of world-mindedness has emerged asâ⬠¦related to both attitudinal and action tendencies to promote nuclear disarmament (p. 328).â⬠Thus, it can be asserted that the efforts to finally achieve a total nuclear disarmament may rest on a world-minded attitude. That it, the concerns of each individual aiming at a total nuclear disarmament should be parallel to a mental framework which is global. There should be no exclusions as to who can still be permitted to keep nuclear weapons even after treaties of nuclear disarmament have taken shape. On a larger sense, history tells us that the proliferation of nuclear weapons in the past and even more so to this very day has resulted to the further realization of the dangers largely attributed to nuclear weapons either resorting from accidents or deliberate use of these weapons. Nevertheless even if these dangers have already been realized, several nations still seem cannot find an easy way out of the complexity of the nuclear issues which beset them. It appears that while there are treaties being engaged into by nations with nuclear capabilities they, too, have remained unable to fully submit themselves to a total nuclear disarmament. One can argue that perhaps one of the reasons why there is the failure for several nations to engage in a full nuclear disarmament is the idea that there are persisting threats to the sovereignty of these nations and that one way to curb these dangers is by wielding nuclear weaponry. Despite the underlying drawbacks that go along with the possession of nuclear weapons, it appears that the United States, Russia, North Korea and many others remain oblivious to the call for full nuclear disarmament perhaps because the purposes of having nuclear weapons outweigh the odds of falling on their drawbacks. One indubitable purpose of the possession of nuclear weapons is the attribution of power and respect that goes with it. However, even if these nations can be able to project an image of power and hegemonic dominance, history teaches us that ââ¬Å"public concern over the dangers of nuclear war has increased dramatically in both Western Europe and the United States (Boutwell, 2002, p. 12).â⬠Ironically, these increases in public concerns come from the citizens who live in the nations who have the capabilities to launch nuclear warheads. This goes to show that, to a certain extent, nations with nuclear warheads also have a corresponding concerned body of the public sector well-aware of the dangers of nuclear weapons at the least and a nuclear war at the most. There is a strong reason to presume that the public sector raises its concern over the issue of nuclear weapons precisely because that sector is able to see and understand the harsh implications it brings with it. Further, the concerned public sector has strong basis for their claims, substantiating their claims on the experiences of the nation in terms of history. Nuclear disarmament requires more than just disarming nuclear weapons for the moment. The crucial part is that such measures of disarmament should be sustained and should be kept as a lasting solution. It is admitted that there have been previous efforts from various nations and the international community to lessen nuclear arms and eventually entirely abolish these weapons of mass destruction. But up to this day, it remains a fact that several nations are still harboring nuclear weapons and that some are even continuing production of these weapons. A contemporary example to such a situation is North Korea which has recently gained much criticism from the international community in its recent testing of nuclear weapons, one of which is the Taepodong-2 ballistic missile. It is also a fact that at some point in time certain nuclear missile tests would have to be made in testing the feasibility of the weapon. It has been the case that the United States has tested some of its nuclear weapons in its own soil while North Korea and India have tested their missiles at sea. These tests may only last for a few minutes or so, yet the impact it leaves behind to the marine life in the cases of India and North Korea are long lasting. As with the case of the Hiroshima and Nagasaki bombings years ago, physical deformities were not only felt by those who were directly exposed to the radioactive substances present after the nuclear explosions. These physical deformities caused by alterations in the bodyââ¬â¢s genes persisted down to the third generation from those who were directly affected by the nuclear bombings. Nuclear disarmament is one big step in realizing the goal of dissolving the current tensions created in the past and should not be taken as a long-term goal, for the longer it takes for nations to disarm themselves with nuclear weapons, it may be the case that more and more nations may resort to the creation of nuclear weapons for themselves. Indeed, if nations are truly serious with their desire to preempt a nuclear war and bring mutually assured destruction to these ââ¬Ënuclearââ¬â¢ states and the rest of the world, it should be the case that efforts of nuclear disarmament should be realized as soon as possible. The world cannot afford a third world war from happening and destroying the welfare of the nations and the development of a larger part of the world. Indeed, nuclear disarmament should be the only option and that such an option should be taken and enacted the soonest possible time, if not now. The dangers of nuclear weapons are real and that history has taught us of the insurmountable destruction it brings with more than anything else in the world. References Boutwell, J. (2002). The Many-Sided Nuclear Arms Debate. Bulletin of the American Academy of Arts and Sciences, 36(1), 12. Rigby, K., Metzer, J., Dietz, B. (1990). Factors Predisposing Individuals to Support Nuclear Disarmament: An International Perspective Journal of Peace Research, 27(3), 328. Walker, S. (1995). The Origins of the Cold War in United States History Textbooks. The Journal of American History, 81(4), 1653. à à à How to cite Nuclear Disarmament, Essay examples cheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.com0tag:blogger.com,1999:blog-4047096722310602658.post-15093430665358746582019-12-05T07:34:00.001-08:002019-12-05T07:34:04.266-08:00Police Encounters with Suspects and Evidence free essay sample Analysis and application: police encounters with suspects and evidence| CJ227-08 Criminal procedure| Unit 2: analysis and application: police encounters with suspects and evidence| 1. Did officer Smith have reasonable suspicion to make the initial stop of this vehicle?Officer Smith had reasonable suspicion which is based on the totality of the circumstances as understood by those versed in the field of law enforcement; it is commonly described as something more than a hunch but less than probable cause. (quiz law) The answer is yes, Officer Smith did have reasonable suspicion to make the initial stop of the vehicle. Because the taillight appeared to be broken which is a traffic law violation.Also officer Smith remembered a vehicle that matched the general description of the car that he stopped. This car fit the description of the vehicle that was suspected in a recent roadside killing of another police officer. 2. Was the ââ¬Å"pat-downâ⬠of the driver legal? An officer may order a motorist out of a car to ensure the officerââ¬â¢s safety. We will write a custom essay sample on Police Encounters with Suspects and Evidence or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page (quiz law) The police officer may conduct a pat-down search to ensure there are no weapons. quiz law) The ââ¬Å"pat-downâ⬠is a quick search of a personââ¬â¢s being in order to determine if any weapons are present. Officer Smithââ¬â¢s pat-down was legal because it was necessary to ensure his safety. Instead of providing her license and registration, the driver speeds away which resulted in a high speed chase. This is a circumstance that would cause a reasonable person to believe that entry (or other relevant prompt action) was necessary to prevent physical harm to the officers or other persons. (The lectric law library,1995-2011) This situation does fall under exigent circumstance because there is imminent danger, destruction, and the suspect is trying to escape. (quiz law) 4. Was the gun in ââ¬Å"plain viewâ⬠and legally obtained?Plain-view doctrine the rule permitting a police officerââ¬â¢s warrantless seizure and use as evidence of an item observed in plain view from a lawful position or during a legal search when the item is evidence of a crime. To determine if the plain view doctrine applies, police must consider a number of validations one is due to exigent circumstances, which Officer Smithââ¬â¢s finding the gun falls under. (quiz law) Plain view did apply to Officer Smith finding the gun in the open glove compartment and is lawful.The gun was discovered inadvertently, Officer Smith had lawful access to the place from which the gun could be plainly seen. Inadvertent discovery a law-enforcement officerââ¬â¢s unexpected finding of incriminating evidence in plain view. 5. Will the marijuana baggie be admissible evidence? When a person is unable to give consent due to unconsciousness, the officer can search the purse or wallet of the suspect to get their I. D. , itââ¬â¢s called implied consent.The woman gave Officer Smith probable cause to conduct a full search when she fled from Officer Smith when he pulled her over for the taillight. Officer Smith will be able to use the marijuana baggie as evidence. While looking for the unconscious womanââ¬â¢s I. D. , Officer Smith found a baggie of marijuana in her purse. Since the woman fled and wrecked the car Officer Smith has probable cause and the marijuana baggie can used as evidence. cheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.com0tag:blogger.com,1999:blog-4047096722310602658.post-71359662537231445992019-11-28T12:27:00.001-08:002019-11-28T12:27:05.140-08:00Sylvan Island Essays - Moline, Illinois, Rock Island, Illinois Sylvan Island Kevin Danforth/ David Zemke Professor Tweet College Writing 101-15 16 Nov. 2000 The Sylvan Island Dream Jumping into the water from a dam, running around through the trees, and fishing from the shore were some of the many exciting activities experienced by a young little boy on Sylvan Island during the 1930's. Although these times were plentiful, they would soon diminish over the years. Republic steal which provided many jobs for members of the community went out of business and left no one to maintain proper care for this child's playground. This island that once supported trails for people to walk and ride bikes, open land for family picnics, and a peaceful atmosphere for one to relax was now full of pollution and brush that made it impossible for one to enjoy. Nothing was really made of the island until the 1960's when Professor Norm Moline from the geography department at Augustana College decided to take a class over for fieldwork. At the time the only intention was to provide labs and experimentation for the students. As the class continued, the student's focus started to involve the island's history and possible changes that could be made to the island in the future. What originally started out as a class project now turned out to be a starting point in returning childhood memories to many who spent time making this island their home. Many students and faculty had long and short-term ideas of what could be done to restore the island back into what it used to be. Eventually many volunteered hours of hard work would be spent restoring the island. The project would not however be completed by professor Moline and his students. It would become a starting point in which a once young boy named Jesse Perez who experienced and grew up with the beauty of the island, would take over and continue the quest in making Sylvan Island a home for many to experience the islands pleasures for years to come. History of the Island Sylvan Island was created in 1865 because the U.S. government needed more power in order to make a weapon store for the arsenal in Rock Island. The government and Moline Water Power Co. decided to make a dam that would provide power for the arsenal as well as the water company. The government would supply for all the expenses but the water company would supply the land needed. Plans for the dam were concluded in 1869 and stated that the dam would be connected to the mainland at 6th Street. The dam would continue along the island until it crossed the channel into Rock Island. By 1871, all creations of the dam were completed and both Moline Water and the arsenal received the power needed. Between 1941 and 1942 Mid American Energy moved the dam to the eastern part of the island. Since then, no changes have been made. In 1894 Sylvan Island was leased to Sylvan Steel Company which would take over the island. The mill would on average produce 25,000 tons of steel every year. This amount was so high because in 1898 a 5-ton furnace was purchased, and could produce refined iron, hard and soft steel, agricultural iron, merchant bar steel, and steel shapes. There were also coal and gas-fired furnaces along with four mills ranging from eight to sixteen inches. That same year Sylvan Steel and Republic Iron and Steel Company of Chicago would merge and become Republic Steel. There would be a total of 150 employees. When the two companies joined, the manufacturing of steel would now be from used rail steel. Many different agricultural tools and supplies were now produced due to the merger. The most prosperous year came in 1931 when 38,605 tons of steel was produced. Republic Steel would be in business until 1956. Many different conclusions have been made as to why the plant shut down. If you were one of the l aborers, you would probably say the reason was because the steel being produced was too thick and unable to be cut easily, so large companies such as John Deer would no longer purchase from the plant. Owners of Republic Steel said the reason for the company's depletion is because cheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.com0tag:blogger.com,1999:blog-4047096722310602658.post-63106020714006031852019-11-24T20:01:00.001-08:002019-11-24T20:01:04.985-08:00Music and the Healing Wings Essay ExampleMusic and the Healing Wings Essay Example Music and the Healing Wings Paper Music and the Healing Wings Paper Essay Topic: The Healers Music has a great advantage; without mentioning anything, it can say everything (Ehrenberg). This statement gives, in a nutshell, what this essay contains. The elements of music; its power, influence and affects on both the modern world and the past one alike. Music is a combination of rhetoric and emotion. Just as the ââ¬Å"I have A Dreamâ⬠speech by Martin Luther King, Jr. empowered a people to envision positive days ahead music inspires the moment in an unforgettable way. This essay explores the different facets of music and its use with special focus given to its healing and wellness qualities. Dr. Alice Cash has a masterââ¬â¢s degree in Social Work and combines that with a PhD in Musicology and has devoted her life to helping people through the avenue of healing music. An accomplished musician herself, she is wonderfully skilled in both the demonstration and application of the most current musicology and music therapy concepts and principles. Her warm and dynamic nature helps make her workshops informative, timely and enjoyable for participants at large (healingmusicenterprises.com). In order for the understanding to accept something like this can actually be done, it helps to know the qualities of music and the many uses for it. From the dawn of time some form of music has existed. Whether it is the beating of the drums in the deep jungles of a tropical nation, or the melodic memories of the music you grew up with, music has always had a significant role to play. When thinking about the uses of music it behooves the scholar to understand the message that particular types of music hold within themselves. It is commonplace to see people jogging down the street with iPodââ¬â¢s strapped to their arms listening to what has to be understood as ââ¬Ërunning music.ââ¬â¢ When the exercise programs on the television start their shows they usually begin with some slow music to aid the athlete in a proper stretching exercise before beginning the rigorous exercise that will leave them breathless, yet feeling great.à In an interview by a female classmate with a twenty-three year old heavy truck salesman she learned: Music is just a part of life. You live with it all the time so itââ¬â¢s tough to judge what it means to you. For some people itââ¬â¢s a deep emotional thing, for some people itââ¬â¢s casual. I turn on the radio and itââ¬â¢s there in the morning; itââ¬â¢s there when I drive in; itââ¬â¢s there when I drive out (Crafts, 109). Reasons for listening to music has as many variances as there are genres of it, but one thing is clear: it is rhetorical in nature and it has a message. There are certain recognizable melodies that hold special meaning to different people, but then there are those melodies that have the same meaning to a very large group of people like states or even nations. This fact alone is enough to explore the hidden qualities of music and see what might be possible with the directed use of it for a specific purpose. For example, when your football team scores a touchdown, the band is not going to play a waltz, they are going to play something upbeat and exciting. Just as this is true, it is also true that music has wellness properties to it. The first one to explore is rhythm. A very simple, but effective illustration of this is the song we learn as small children. Read the following lyrics and see how it makes you feel: ââ¬ËIf youââ¬â¢re happy and you know it clap your hands.ââ¬â¢ This is usually followed by two claps of the hands and gets children excited. In more sophisticated terms: it activates their minds and causes them to move around. My point is this: without the use of any musical instrument, the song will still get children excited. Why? Rhythm. You put your right foot in, you take your right foot out, you put your right foot in and you shake it all about. These words also activate the energy in the little children. It is healthy for them to be active and if the songs make them move about they are getting exercise and thus the rhythm of the music is used for wellness. People are currently using in-the-moment music-making with rhythm instruments for the following types of events: à ·Ã à à à à à à ChildbirthBirthdaysWeddingsFunerals and Memorials à ·Ã à à à à à à Private Parties FundraisersCorporate Trainings à ·Ã à à à à à à Childrens Day CampsYouth-at-Risk Programs à ·Ã à à à à à à School University ProgramsProfessional Conferences à ·Ã à à à à à à Wellness FairsHealing CirclesMens and Womens Retreats à ·Ã à à à à à à Well-Elderly ProgramsAssisted Living Centers à ·Ã à à à à à à Retirement CommunitiesSenior Community Centers à ·Ã à à à à à à Spiritual Gatherings CelebrationsMeditation Services à ·Ã à à à à à à à Community Festivals of all types (circles4drumming.com). Musical traditions were founded upon the principles of rhythm and have added many ââ¬Ëflavorsââ¬â¢ to the music tradition. Funk is one of those flavors. This is a good example because a term used by Mayor Nagin of New Orleans to encourage its people to get back to what the city was known for before Katrina, namely a particular type of music called ââ¬ËFunk.â⬠With most listeners not knowing the reference he gave to the music genre, he found himself apologizing to those who took it as a racial remark. The term he used was ââ¬â¢Chocolate City.ââ¬â¢ This is actually a song performed by a band called Parliament. It was purely a genre of music that was popular in the seventies and found a home away from home in New Orleans (amazon.com). The American Music Therapy Association, founded in 1998, boasts of 3800 memberships to present date. Their sole purpose for existing is the development of the therapeutic use of music in rehabilitation, special education, and community settings (AMA website). When study is devoted to this unique quality of music, scholars are finding many different ways to use it to help medicine in its fight against fatigue, stress, and even muscle tension. The media has played on the subject of music and what it means to people in everyday life, but in their action movies you expect some sort of high-powered music to enthrall you into their entertainment. Love songs are called love songs because of the interpretation of love in direct correlation to the song. It can be the lyrics, but it doe not have to be; it can simply be the basic rhythm that soothes or pumps the individual up. John A. Carpente, MA, NRMT, CMT at the Rebecca Center for Music Therapy published a case study involving a boy with multiple impairments and how he was able to help him communicate through music therapy. Music played a key role in rehabilitating this boy into a person who could communicate on a level that previously was impossible. The testimony of his mother: à â⬠¦ His father and I were always looking for a key to tap into Mikeys abilities. And with music therapy, I think we found a way to approach my sons abilities. It is actually one of the few therapies that we think reaches Mikey. He started working with John last September. Mikey recognizes John and plays musical games with him. That is a big step since he does not acknowledge many people. The naked eye may not see any changes in Mikey, but his Dad and I do. Instead of spinning around in circles, he actually dances to music. And just the other day, he took a can and played with it as a drum. It was so typical, just like other kids. All I could do was cry because instead of seeing a temper tantrum or a bizarre play skill, I saw a typical kidmy typical kid. Music therapy is one of the things that create an equal playing field forMikey, and for that I am very grateful (therebeccacenter.org/ library/casestudy1.html). Music is an art, so this brings a new gambit of thoughts concerning art in general. People have been known to stand in front of a painting or sculpture for hours. Could they be contemplating lifeââ¬â¢s ordeals, meditating, allowing some power the art has on them to do what is needed while they are there? Was there a real medicinal property to Shakespeareââ¬â¢s comedies? The only thing that will ascertain these answers, and quite possibly create more, is to get involved in the study of some particular art that affects you. It is quite possible that the true depth of healing in the arts is just beginning to be realized by more than just a crazy few. What is just as interesting is the level we understand other aspects of life and how far we have missed the medicinal properties of the arts in general. People tend to behave strangely when they are deriving some medicinal answers through the medium of art. For example, chick flicks is a genre of movies that helps to build relationships simply because the male partner in a relationship is more likely to watch one with his partner. While experiencing the ups and downs of the movie the relationships on screen get compared and contrasted to the real relationship of the couple watching the movie. One reason that nightclubs fair well on the weekend is because relationships are in need of a place to let off the stress of a busy week in the office and this is really a constructive way to do it. This is not to say that nightclubs will solve all relational problems, but they do offer the dancer a way to release pent-up emotions. Just as people find themselves hooked on drugs or alcohol and need to replenish what the body craves, so does the body crave natural ways to relieve the pressures of life. Think about the elements involved. Music, this means rhythms are going to be bouncing around the room and that will be accompanied by musical notes to add to the flavor, and before one realizes what is happening their bodies are in the process of ââ¬Ëletting go.ââ¬â¢ This is healthy; especially for the couple realizing the benefits of ââ¬Ëclubbing.ââ¬â¢ This is just one aspect of the arts doing something constructive in society. Human interaction is becoming more difficult in America as our nation becomes more intercultural. This can be viewed as a problem or an opportunity. Because it is impossible to separate the man and his native culture, America now has many cultures within its own culture. For example, Asians that have moved here have a dream of a better life or education or have some personal reason for moving to America, and they recognize their limitations caused by the lack of understanding English as opposed to their native language, but they come anyway. They come because of the benefits we, as Americans, can offer them. However, they also offer some benefits to us. One of these is music. The use of sound as a healing tool dates back thousands of years. Now, the field of sound healing is gaining considerable attention, as sound pioneers promote the healing benefits of music, tones and instruments. Jonathan Goldman, director of the Sound Healers Association, is one of the leading experts in the field (Dykeman). It is no secret that music can soothe, excite, incite, and even assist in hypnosis, so to say that music can be used as a healing tool is not as far a jump as one would think. Given the right atmosphere, almost always provided by music, you can move people to do things they would not do otherwise.If eno ugh thought is given to the subject and how it plays in our everyday lives we discover that we use it to announce a birth, to celebrate a birthday, New Year, Christmas, and almost every other holiday that can be thought of; we use it in church, at weddings, and funerals and of course, lest we forget, graduation. To think of life without it would be like going into the forest and not hearing the birds singing or the wind blowing through the trees. We are so inundated with music that trying to view life without it is nearly impossible. To ask what life would be like without music would be to try to describe a bird without a chirp. When Goldman was asked by Dykeman to describe sound healing he explained something that was a unique description of life. First, let me point out that modern science is now in agreement with what the ancient mystics have told us- that everything is in a state of vibration, from the electrons moving around the nucleus of an atom, to planets and distant galaxies moving around stars. As theyââ¬â¢re creating movement, they are creating vibration, and this vibration can be perceived of as sound. So everything is creating a sound, including the sofa that weââ¬â¢re sitting on, or this table, or our bodies. Every organ, every bone, every tissue, every system of the body is creating a sound. When we are in a state of health, weââ¬â¢re like an extraordinary orchestra thatââ¬â¢s playing a wonderful symphony of the self. But what happens if the second violin player loses her sheet music? She begins to play out of tune, and pretty soon the entire string section sounds bad. Pretty soon, in fact, the entire orchestra is off. This is a metaphor for disease (Dykeman). If this is true, and from all scientific proof it is, then healing can take a much less invasive approach to the process. Obviously, there are medical procedures that cannot be replaced by sound, or music healing, but the recovery process can be a lot less stressful and painful if applied properly. It should be stated that music can and is being used in a negative sense, as the interview with Goldman reveals, and since that has been proven to be true, all that is left is for people in the medical field to tap into the resources they have at their disposal and prove the opposite can also be true of music. Some surgeons like to have music played while their in surgery for various reasons, so in a directly connected way, music is already playing a bit-part in the healing process of the human body. From a purely medicinal viewpoint, nurses in hospitals are the more authoritative voice. Many of them will tell you that the healing process is the hardest facet to having surgery. The doctors did their part, but as far as the patient is concerned, the nurses that tend to them while healing are the ones who should really get applause. The doctor had a captive audience; the nurses have to interact with us while we are in pain for what the doctor did to us in the operating room. Many patients, when telling of their hospital experience, will invariably say something about the nurses who tended to their needs while healing. Florence Nightingale described the major responsibility of nursing as that of putting the patient in the best place for nature to work upon him or her for healing (Nightingale.1859/1946, p. 6). Music can be used to positively manipulate the hospital environment to foster spiritual, psychological and physical healing. Sound is an integral part of any environment and may have an impact on health and well being. Florence Nightingale provided music as part of the healing process for injured soldiers in the Crimea, and described how her nurses used voice and flute melodies to provide a beneficial effect on soldiers in pain (McCaffery). The nurse, who is the really the unsung hero in the healing process, should be the focus of energy to the development of every possible avenue that can be placed at their disposal to help alleviate some of the inevitable tension that will be felt as there are usually too few nurses available in ratio to the patients as they come to recover in a hospital room. Everybody listens to music. The argument could be made that what is music to one could be nothing more than noise to someone else, given all we know about the arts; the time that every college student has to endure in fine arts classes as general education classes needed to obtain any type of degree; given the fact that colleges pay fine art teachers real money to teach something that is most thought of as ââ¬Å"a class I have to take,â⬠music should be given way more attention than it has from the medical field in the past. The argument holds merit only as the teachers, doctors and nurses allow. People may not understand languages because they are separated by large bodies of water, but music can cause them to have common ground. Just because the language is different there does not have to be a barrier with music. Again, facing ambivalence from the skeptic, the nurse has to be the one who walks into the patientââ¬â¢s room when they are cranky due to the pain of healing. Why not make their job easier by providing some training, as part of the regular curriculum, in music and its various uses in the field of medicine. With all they face, this could cause the barrier to be removed. Maybe it is not the universal language, but it is ranks right up there with the top ones. Music is the wind beneath the nurseââ¬â¢s wings that leaves the patientââ¬â¢s room filled with healing sounds. References Ehrenberg, Ilya. (1943). A comment on the premiere of Shostakovichââ¬â¢s Eighth Symphony. Music as Propaganda, 1985. inside cover. Cash, Alice Dr. (2007). About Dr. Alice Cash. Healing Music Enterprises. Retrieved 24 April 2007 from, http://healingmusicenterprises.com/Alice_Cash.html Crafts, Susan D., Cavicchi, Daniel, Keil, Charles. (1993). Music is Just Part of Life, Like Air. My Music. Middletown, CT: Weselyan University Press. Vivian, Giselle Felicia. (2007). One Heartbeat Rhythm Circles. Project Heartbeat. Retrieved 24 April 2007 from, circles4drumming.com/ Parliament. (2003). Chocolate City. Parliament. 24 April 2007 from, amazon.com/Chocolate-City-Parliament/dp/B00008RV18 AMTA Website. (1999). Music Therapy Makes a Difference. American Music Therapy Association. Retrieved 24 April 2007 from, musictherapy.org/about_ind.html Carpente, John, A. (n.d.). Creative Music Therapy With a Boy With Multiple Impairments: Stepping Out of Isolation into new Experiences. Retrieved 24 April 2007 from, therebeccacenter.org/ library/casestudy1.html Dykeman, Ravi. (2007). The Sound of Healing: an Interview with Jonathan Goldman. Jonathan Goldmanââ¬â¢s Healing Sound. Retrieved 24 April 2007 from, healingsounds.com/articles/nexus.asp McCaffery, Ruth, Dr. (September 2001). The Healing Environment and Music. Nurse to Nurse. Retrieved on 24 April 2007 from, msnnurse.com/templateSubmit.asp?SEC=NurseToNurseDetailsId=12 cheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.com0tag:blogger.com,1999:blog-4047096722310602658.post-12072280625176430372019-11-21T08:08:00.001-08:002019-11-21T08:08:14.356-08:00What are the ethical issues (internal and External)facing organisation EssayWhat are the ethical issues (internal and External)facing organisation in xxx sector and how are they being addressed - Essay Example eport highlights ethical factors arising from both internal and external factors based on PESTLE analysis while also including recommendations that might respond to the ethical concerns noted in the report. The UK clothing sector is also characterised by dominant multiple store retailers who sale up to 70 percent of their finished products to markets in Western Europe and 85% percent in the United States (Allwood, Laursen, de Rodriguez and Bocken, 2006). The UK clothing and textile sector has recorded a significant decline since the turn of the 19th century. However, the 1990s were period of greater change for the industry as major players such as Marks and Spencer ended demand for supply from UK clothing and textile manufacturers shifting to importing over 70 percent of supplies from developing countries (Tait, 2000; Gereffi and Memedovic, 2003). The consequence of such changes is that the UK clothing sector has shifted focus from manufacturing to designing. However, the declining production has provided ground for development of innovative aspects of the sector as entrepreneurs and retailers seek to take advantage of niche or high quality products (Allwood, Laursen, de Rodriguez and Bocken, 2006). The decline in manufacturing has also had minimal negative impact on the sector as businesses, especially those operating from the end of supply chain, continues recording high profits. Retailers are now taking advantage of increased demand for innovative products to increase their profits in a sector where retailing and marketing generates higher returns than sourcing, manufacturing, assembly, finishing, packaging, and distribution. Ethical issues in social aspect of the sector revolve around labour practices mostly on the side of suppliers. Majority of the retailers in the clothing industry have adopted outsourcing of raw materials from different suppliers, especially in Asia, in order to establish competitive advantage over other players in the industry (Kumar and cheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.com0tag:blogger.com,1999:blog-4047096722310602658.post-50120156417823174462019-11-20T10:56:00.001-08:002019-11-20T10:56:03.875-08:00The 3 A's of Awesome Essay Example | Topics and Well Written Essays - 500 wordsThe 3 A's of Awesome - Essay Example An awesome life is considered to be one that contains three key aspects, that each person must seek to have if at all life is to be as enjoyable as the speaker, Neil Pasricha, terms it to be. An enjoyable life is one that focuses on attitude, awareness and authenticity as the central to come up with an awesome life. Attitude, being the first point on which the speaker supports his thesis states that with the right attitude, one can do anything. The key part is that ââ¬Å"we are all gonna get lumps, and we are all gonna get bumpsâ⬠, and from this, the outlook that one has on life depends on the attitude that he or she applies to the situation (Pasricha). This is because the future is highly unpredictable with only one predictable aspect, which is largely the fact that the future rarely goes as per our plans if at all it does. This is all factual and life is largely unpredictable meaning that whatever one decides to do, the perception to life and the situation as a whole is suppo sed to dictate how life proceeds or rather recedes in quality. cheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.com0tag:blogger.com,1999:blog-4047096722310602658.post-52580353805932835462019-11-18T04:11:00.001-08:002019-11-18T04:11:03.453-08:00Roads and Transport Authority Coursework Example | Topics and Well Written Essays - 1000 wordsRoads and Transport Authority - Coursework Example In this regard, the report for indicate information on the following: (1) a list of the main products and services; (2) an identification of the main customers; (3) the purpose and goals of RTA; (4) an analysis of a minimum of 4 external factors and their impact on the business activities of RTA; (5) The structure and at least 4 functions of RTA; (6) an explanation of how these different functions work together within the organisation to optimise performance; and (7) an identification of the culture of the organisation and at least 2 ways this affects operations. The official website of the RTA (2011) revealed that the organization is ââ¬Å"responsible for planning and providing the requirements of transport, roads & traffic in the Emirate of Dubai, and between Dubai and other Emirates of the UAE, neighboring countries in order to provide an effective & an integrated transport system capable of achieving Dubai's vision & serving the vital interests of the Emirateâ⬠(RTA, par. 2 ). Since it is a service and governmental organization, its product is the service of providing crucial functions of road safety and effective management for the transport system of Dubai. Its main customers are all commuters and drivers of buses, taxis, inter-city transport, marine, rail, and those affected by traffic and road management and safety. Its mission is to ââ¬Å"prepare legislation and develop integrated solutions of road systems and land/marine transportation networks that are safe and in line with Dubaiââ¬â¢s economic development plans and the highest international standardsâ⬠(RTA: mission, par. 1) with the goal of ensuring safety and smooth transport to all commuters at all times. Since the organization is focused on road safety, the external factors that impact their operations are: (1) environmental (weather conditions and disturbances); (2) political factors (changes in laws and policies); (3) economic conditions (taxes paid by the public, purchasing powe r, rate of infrastructure development); and (4) technological factor (updates on the IT used in systems and procedures in RTA due to external advancement; the condition and status of the vehicles). The official portal of the RTA indicated that ââ¬Å"it is responsible for planning and executing transport and traffic projects in Dubai, preparing legislation and strategic plans, planning and constructing the Dubai Metro, developing other integrated solutions of road systems and marine networks that are safe and in line with the cityââ¬â¢s economic development plans and the highest international standardsâ⬠(RTA: profile, par. 1). The functions of planning, organizing, directing and controlling relevant legislations, rules and policies on road safety and management are crucial to ensure that there is a smooth transition and governance of transport administration. Since the RTA is a governmental organization, the culture, values, beliefs and practices of the Saudi people are man ifested. The flag, king, borders, regions, population, currency, landmarks (Kingdom Center) and food have shaped the lives of this nation. The cultural traditions, values and beliefs helped them stand out as one of the largest and richest countries in the Middle East. Therefore, any celebration of the rich cultural tradition impacts the administration of traffic and road safety in terms of determining the number and route of commuters and vehicles that could possible converge in commercial districts or religious institutions, as the situation warrants. Activity B Given the scenario that oneââ¬â¢s Executive Directors are proposing to reduce the size of the HR section, or even close the function completely. One is therefore tasked to write a short report to the Board that supports the retention of the HR cheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.com0tag:blogger.com,1999:blog-4047096722310602658.post-72679015478011652872019-11-15T16:42:00.001-08:002019-11-15T16:42:07.344-08:00European Security and Defence Policy: An AnalysisEuropean Security and Defence Policy: An Analysis Introduction Faced with the challenges and risks arising in the process of economic globalization and world order, Europe is trying to respond adequately to it, namely, creating a general political unity, and forming a European identity. Within the EU there is ramified mechanism of economic, political and legal organs and institutions, carried out the interaction of the member-states of integration associations virtually in all directions. The political formation of the EU has gained a new powerful impetus after its inclusion of legal and institutional framework in the founding document of the EU in the Maastricht Treaty, the so-called second pillar of the European Union, entitled Common Foreign and Security Policy (CFSP). At the present stage of EU development the issue about effectiveness of the CFSP and ESDP in particular is staying very acute, that is the question of the effectiveness of the overall approach and collective action in addressing foreign policy issues. This question is urgent in light of events relating to the settlement of a conflict in the Balkans after the collapse of the Yugoslav state in the beginning and end of the 90s., with the campaign against terrorism after September 11, 2001 in New York and Washington, Madrid in 2004, and London in 2005 and the reconstruction of Afghanistan as well as the situation around Iraq. Recent Russias invasion of Georgia on Aug. 7 of 2008 showed that the threat of traditional military confrontation has not disappeared. Therefore, Europe must restructure their armed forces in such a way as to carry out military operations in both security contexts, determining what threats it will face and how best to counter them. It has been 10 years since the emergence of ESDP. During this time the EU has faced many challenges associated with the implementation of this policy, ranging from lack of resources, institutional weakness, ending with the influence of the world players. Although, it is still early to drew a definite conclusions regarding the effectiveness of ESDP. However, we can talk about some appropriateness of the process that has been established in this trend. Therefore the aim of this individual research paper is an attempt to analyze the main problems faced by the EU towards the effective implementation of ESDP, and what the possibilities opened up for Europe within the framework of ESDP after the signing of the Treaty of Lisbon. This work is an analysis of the lessons learned in order to integrate them into future development of this institution or any other organizations. In accordance with the purpose of this work, it is structured into 3 chapters. First chapter will provide an opportunity to explicate how internal and external factors have pushed the EU to establish ESDP, as well as the role played by EU 3 (France, Germany and Great Britain) in the creation of this policy. Furthermore, it will explore concern about attitude of the US towards the creation and development of this policy. Second chapter scrutinized an existence of ESDP and highlight the main challenges which has been identified by the analyst for the past 10 years as regards to civil, military and financial resources. I have chosen the entire period of ESDP existence, as this policy is still very young for the definitively assess its ultimate effectiveness and feasibility. In other words, this is analysis of lessons learned. Third chapter will focus on the possibilities of ESDP. It will examine what changes can be expected in the near future in relation to this policy, in regards to the improvements towards increasing of military and civilian capacities. Furthermore it will underline the main changes and opportunities which brings newly approved Lisbon Treaty. The work is carried out by argumentative essay method. This study paper will not analyze all conducted and ongoing missions of ESDP, also it will not touch upon history of ESDP development, as this paper will focus only on problems that interfere with this policy to exist independently and efficacy, and the hidden possibilities of this policy that are not yet fully appreciated. Also, the question concerning relationship between the Greece, Turkey and Cyprus that brings some difficulties in cooperation between NATO and ESDP are not present in this essay. Political context as an obstacle for the development of effective ESDP on the contemporary stage Preconditions for the creation of ESDP In order to understand the marrow of ESDP it makes sense to consider the internal and external preconditions that led to the creation of this policy. Among the external preconditions are dominated by the end of the Cold War and the events of 9/11 in the U.S. At one time the confrontation with Warsaw Pact had impeding the creation of a truly European system of security, shifting the balance of influence in favor of NATO and the United States. However, in late 1980 the situation began to transform rapidly. The basis and purpose of the transatlantic relationship had changed. Change of the geostrategic situation in the continent, associated with the collapse of the Soviet Union, and, accordingly, the bipolar system of international relations has opened up to Western European countries, opportunities to become more attractive center of power in the sphere of security. In turn, increasing economic role of the EU gave rise to the desire of European leaders to complement its overall diplomatic and military instruments, without which the influence of the EU in international affairs would remain marginal. Throughout the 1990s the EU was looking for such tools. However, early results have been mediocre a common foreign policy and security policy has not become a really common and was incapable to avoid a tragedy in the Balkans.[1] Therefore, the emerging sense of security vacuum in Europe made closer positions of the Member States (EU MS), which led to the materialization of ESDP. Conventional military forces, which are used to build in Europe, did not meet the challenges and threats inherent in post-bipolar world, it was the necessity to build up forces with flexible structure capable of performing non-traditional military functions. To maintain the security framework at the present level were required expensive systems. And the resolution of crisis situations required the presence of highly mobile units, equipped with the latest weapons and communication systems. The military budgets of the most nation-states have been unable to meet the requirements of the military sector developments. As a result, Europe has left two options: to continue to rely on the United States or attempt to integrate into the military sphere and create own forces. After a while a new stimulus for the development of an independent ESDP had appeared, such as disagreement with U.S. unilateralism and U.S. domination of NATO. The differences in the positions of the U.S. and Europe emerged during the conflicts in the Balkans and, most clearly during the Iraqi crisis. European alertness has been provoked by the actual transformation of NATO in the conductor of the American global strategy. Therefore, the European states felt that they can not rely entirely on the U.S. as a guarantor of security in the region, and doubted that Washingtons policy towards Europe would be consistent with their preferences and priorities. Consequently, it became clear that if the EU seeks to influence global policy agenda, rather than follow in the wake of the United States, it will ultimately require the readiness and ability to use harsh means to ensure security. Thus, the creation of ESDP was the most appropriate mechanism through which urgent problems would be solved. The EU 3 (Britain, France and Germany) and their role in development of ESDP The real breakthrough in the European cooperation in security sphere were the agreements reached at the Franco-British summit in Saint-Malo (December 1998). In the summit declaration had been mentioned about the need to provide opportunities for EU autonomous military operations, so that the EU would be able to take decisions and conduct military action in cases where the [Atlantic] Alliance is not involved [in the resolution of the crisis].[2] The negotiations, initiated by the British side, were not limited by the declarations and the European Council in 1999 and 2000s had been taken a number of decisions in order to strengthen the CFSP and create ESDP. At the Cologne summit institutional framework of ESDP has been fixed, and afterwards at the Helsinki summit stated the main goal, later transformed into catalog of forces. This goal was about creation by the year of 2003 such capabilities that would allow operational deployment of forces with the strengths of 50-60 thousands of troo ps (quick reaction force) that could sustain themselves at least one year, the final regulations were finally found in the Treaty of Nice, signed in February 2001. Up till now, there is a disagreement among the EU 3, about how the EU can become a more effective and influential actor in the world and what relations it must build with the US. These differences are associated with different approaches to the European integration in general. It will be considered, the role have been playing by Britain, France and Germany in ESDP, and what the major differences of their visions towards the implementation and essence of this policy. The first point which is noteworthy to point out is the question What ESDP is for? and we could find distinctively different approaches from the Three, where the British believe in a transatlantic Europe, the French espouse the concept of Europe as a power, whilst the Germans are deeply committed to the idea of Europe as an agent for peace.[3] Further it will expose these approaches more deeply. For a long time, Britain remained a staunch ally of the US, and did not felt the necessity to create anything out of the NATO military structure. But, after the events in Bosnia and Kosovo, the situation has radically changed in the opposite direction. The interests of the US and Britain during these conflicts were differed because the methods of solving such problems did not coincide.[4] All this led to the fact that Britain began to support and develop the idea of the EU military independence from the NATO and the United States. This approach has been similar to France; however on the other hand in the matters concerning their long-term visions these ideas werent match. The reason for this was that both countries with one hand would like to make the Europe as a power, which would be able to influence and respond to the world events, but on the other, each of them had their own idea of what role the EU should play in security and defense in long term period. Britain is keen to devel op strong Europes security actor, which would be able to significantly contribute to the NATO capabilities and will not duplicate it, from the France perspective which is partly similar to the British, but on the other hand would like to build up separate security institution Europe as a power ultimately capable for the common defence. However, Frances point of view is that the Europe and the US would not compete in any manner, only interact and complement each other as regional powers. Then, Germanys position has always remained under restraint, which was dictated by the lessons of the past. Compared with Britain and France, Germanys spending on defense sector was very small. And the idea of establishing ESDP, which gave them an opportunity to increase its military power, has found support in political circles very fast. Although, its opinion concerning ESDP functions was different from the others. The EU has been represented by the Germany, as an agent for peace, and methods of peaceful resolution of the conflict were the key point in its policy. The second difference of the Three is how they perceive ESDP: as military or civilian power, regional or global organization. For example, France feel despondent about the fact that most of the operations conducted under the framework of ESDP are civilian. The fact remains, the majority of military operations are carried out by the NATO, not by ESDP, and those that are conducted using NATO resources (Berlin Plus agreement). But despite that, France is trying to be involved in all the missions with the military character, because they believe the EU would be perceived as the security actor only under condition that they could project military power, not only civilian. Germanys vision is characterized as a counterbalance to the French position and does not distinguish military power as main tool for the strengthening of the EU position as a security actor; its remain opinion that military force in dealing with non-military security issues will not be successful. Although, at the same t ime not very much opposing building of the EU as a military power. Finally, Britain is quite pleased with the current balance of military and civil elements of ESDP.[5] They see ESDP as a very unique tool which is able to integrate civil aspects in military operations; moreover it is not duplicating or hindering NATO operations, even quite the contrary. But unlike Germany, they perceive military power as a robust tool in international arena and additional method of the influence in foreign policy. Finally, it is true the idea of the creation of ESDP has born because of the conflicts in the Europes backyard (i.e., Balkans); however after a decade the EU has been broaden their span of the operations quite significantly. The global role of the EU is formulated in the ESS in ethical terms of defending human rights and promoting democracy and solidarity (Petersburg tasks). Nonetheless, despite the general vision of the Three towards the global role of ESDP, some specifications ought to be made. Firstly, it is noteworthy to underline that the visions of France and Britain are getting to the same direction concerning mentioned issue, because it is relatively dictated by the permanent seats on the UN Security Council, as well as former colonial majesty of these countries. Moreover, one can clearly recognize that both countries paid special attention to the Africa. On contrary, Germany has usually not perceived the EU as a global actor, as it is dictated by the troublesome history. In the beginning they saw ESDP as a solution to the threats within the EU, but later they began to agitate the questions of the Caucasus, especially in Georgia. This could mean that Germany is reviewing its role as both the EUs role in the light of globalization. Therefore we may conclude that lack of unity in outlook of these countries, is a certain barrier for further development of ESDP. At the beginning of ESDP creation it was foreseen to become a common policy, but in reality decision-making process is based on intergovernmental cooperation which raises some additional obstacles during this process. Certainly it doesnt mean that each country should change its opinion, but still general model for solving different situations and questions, as well as common vision of ESDP essence should be established. Nonetheless, despite all mentioned above ESDP working and developing, that is the fact that EU 3 can find compromises. Thus, these difficulties can be resolved, if compliance of the Three will be greater. US attitude toward ESDP No less important factor is the U.S. attitude to ESDP. American view towards European security concept is resemblance to an opponent who does not agree with the arguments put forward, but believes that the honest expression of negative attitudes towards them will look clearly in unethical manner. One of the key factors influencing the U.S. position on the European security concept is its interaction with the structure of the North Atlantic Alliance. On this account quite explicitly suggested U.S. Secretary of Defense Donald Rumsfeld, explained: Our position is very clear we support ESDP, which is friendly to NATO[6]. On the other hand, Principal Analyst for European Union Affairs, US Dept. of State, David Armitage highlighted other US arguments against the existence of ESDP as follow: there would be competition for scarce financial resources; it could lead to a potential mismatch in doctrine, standards, and requirements, which would make interoperability (a perennial NATO problem) even harder to achieve; erecting new institutional structures would confuse and complicate procedures and policies that already existed within NATO. [7] U.S. attitude to ESDP depends on U.S. policy, which is based on U.S. global leadership by deterring the emergence of rival powers.[8] As a result, the U.S. tries to keep ESDP within NATO. It is true that NATO-EU relations are based on agreements of Berlin Plus, which were signed in December 2002 and entered into force in March 2003. So, its easy to see why Washington seemed that Berlin Plus gives it some advantages. EU guaranteed access to opportunities and resources of NATO planning for the implementation of EU operations for crisis management, and in return the United States expects from the EU a greater commitment to modernize its military capabilities. Main premises of Berlin Plus was that ESDP would reinforce NATO, not undermine it, and would ensure the advancement of the American position of three principles: there is no uncoupling of NATO, no duplication of resources and no discrimination against non EU members of NATO[9]. Besides, U.S Congress and administration were also encouraged by the fact that a close friend of the United States, United Kingdom, endorsed the project. However, European countries have not agreed to increase their military commitments in terms of defense spending and personnel. As noted in the U.S. Congressional Research Service, French officials long time argued that the EU should strive to become a counterweight to the United States on the international stage, and consider ESDP as a means of enhancing the political credibility of the EU[10]. Therefore, the United States has every reason to revise the terms of the treaty of à ¢Ã¢â ¬ÃÅ"Berlin-Plus. Moreover, US worry that stronger ESDP would create European caucus inside NATO. Videlicet, NATO MS that are not EU members could be faced with unified front on the part of EU members in discussions within NATO. EU enlargement, however, has diminished the prospect of such a caucus emerging. Nevertheless, recently the US attitude to ESDP has been changed towards more positive direction. Firstly, US understood that EU posses stronger base to tackle with the civil questions. Secondly, in 2005 US political elite with the G. Bush in a lead announced that they actually support more powerful and unified Europe. Over and above, 9/11 that was an example of new security challenges brought to acknowledgement of necessity to gather all efforts together in order to solve these problems.[11] Therefore, powerful Europe is in the area of the US interest. As seen from the above relationship between U.S. and EU is quite complex. In the words of F. Stephen Larrabee, there are several steps that could persuade United States that ESDP strengthens rather than weakens the transatlantic relationship. First, due to the fact that the EU and the US interests on some security issues are different, especially concerning participation on some recent conflicts. The US should agree that EU should be able to plan and act as an autonomous organization outside of Alliance. Therefore, EU should develop their capabilities if they want to play on their own in the conflicts of EU interest. The main intent is to assure development of EU security capabilities in an apparent manner which further would strengthen the ability of US and EU to efficiently deal with potential security threats. Second, establishment of common strategies concerning transformation process of the defence issues of both players, the EU and the US. In the other words common treat perceptions and military doctrines, or at least well-matched, would be a great advantage in the future relationship between these parties. Third, it is necessary for NATO and the EU to build up system that would enhance quick and comprehensive response in crises time. Primarily it consists of planning mechanisms, force generation and ameliorate political consultation. As a final point, US should accept that the EU is becoming an ever more important political and security actor.[12] To conclude this chapter, I would emphasize that ESDP has been created during the hard time for the Europe, when it has faced such challenge, as remain under the NATO security umbrella, which showed that it will not always work in compliance with the Europe security issues, or make a real breakthrough towards the role of an independent actor in the World arena. Eventually step forward has been made, so at present the Europe has demonstrated itself competent at all areas, not only economical questions, but also in the defence and security sphere. Significant part of ESDP establishment has been made by the EU 3, however the Three showed not only progress in the history of the Europe, but to some degree doom ESDP to future problems, because of the different visions on future of this policy. Then, the relationship with the US as well as its partial influence on the Europe should not be forgotten. In other words, political context of ESDP is tangibly hampers the effectives of its develop ment for the reason of inability of the EU 3 to get to the common point of view, also because of the indirect influence of the US through the NATO, which for a long time has been a strong guarantor for the European defence and still remain to be such. In the next chapter will be analyzed two main problems which hamper development of ESDP, namely resource and institutional difficulties. Great role in the resolving of these problems plays ability of states to find compromises, and primarily in concern of the MS. Obstacles which hampers development of the effective ESDP Institutional pathologies of ESDP This subsection will address the main shortcomings of the institutional architecture of ESDP. Taking into account the main question of this work, the explanation about all institutions and their functions would be skipped. Thus, emphasis will be placed only on these problematic points that hinder ESDP effective existence. Since the inception of ESDP it was envisaged that the EU would largely pay attention to civil elements of security, but unfortunately the creators of the institutional architecture missed this important point, and suggested such basis for the institutional structure where military part has playing predominant role. Firstly, its necessary to stress that many of experts argue that the EU build up ESDP taken as an example the NATO institutional structure. The main institutions in ESDP are the Political Security Committee, a political body that controls the institution, and the EU Military Committee with the EU Military Staff. This corresponds to NATOs North Atlantic Council (NAC), the Military Committee (MC) and the International Military Staff. The British official was fast to point out that the architects of ESDP were aware that NATOs institutional design, in which the NAC and the MC are often not well coordinated, was not optimal, but they did not discuss the issue of trying to redress this set up.[13] As a result one can observe quite complicated cooperative actions between these bodies of ESDP, during the preparation phase and realization of their plans. The actual EU military crises response planning process at political and strategic level could be seen at Annex 2. Secondly, taking into consideration the treats what nowadays facing ESDP during its operations one can clearly identify the need for close cooperation between military and civilian in their coherence discussion. Some speakers argued that institutional coherence between the Council and the Commission had improved greatly in recent years, for instance in Georgia. But some processes are very slow the Commission, for instance, cannot easily re-direct aid spending to a country where there is an ESDP operation (i.e. Chad). Plus the Commission, in particular ECHO (its humanitarian aid agency), must remain neutral in conflicts and avoid becoming politicized.[14] Expert commentator on peacebuilding and security issues Rory Keane insist that the Union had constructed some crisis management capability and a foreign policy, but suffered from poor coordination between the two. The Lisbon treaty seeks more coherence between the Council and the Commission.[15] From these arguments one might conclu de that ESDP doesnt have practical useful chain of command and possesses significant internal difficulties. Thirdly, after analyze of the development of institutional architecture of ESDP throughout the last few years, I can clearly see two problematic issues related to this policy. The first and main problem is that the structure of EU crisis management at the political, strategic and operational level remains weak. I could even say that this structure does not meet the ambitions of the EU on carrying out a large number of operations. In fact, notably on the civilian side, it is already stretched to the limit. On the military side, in the absence of EU operational headquarters, the Union remains a non-autonomous actor and the availability of national HQs to plan and run ESDP operations has proven intermittent. [16] Besides, at present time an important area of concern remains to be improved which is experience and expertise of the staff in Brussels-based bodies that can ensure proper planning and conduct of operations, both civilian and military ones. Despite of everything mentioned above the MS diligently working on closing of these institutional gaps. Enormous role in improvement of the institutional shortages will be played by the Lisbon Treaty, which is already a fact that MS trying to find compromises. The essence of the resource problems of ESDP at the present time Financing ESDP The first aspect to point out is the fact that the EU does not have its own defense budget. On the other words, each country decides itself how much it needs to spend on defense sphere. Therefore, the EU itself cannot change it, because it is not within its authority. In general, all EU member countries spend over 200 billion Euros on defense, ranking second place in the world after the U.S.[17] Which seems to confirm the idea that such amount of money would be enough for the effective existence of ESDP, if there were a common budget. Thus, it is worth to start with question how ESDP missions financed? The answer is that in compliance of the Treaty of European Union operating expenditure incurred in implementing CFSP and ESDP decisions is charged to the budget of European Communities (European budget), except for the operations that have military character.[18] In other word, EU have a common budget they have to allocate money for definitive period of time, with a special procedures which is not very clear and fast, which should be the first aspect of the financing system for the crises response operations in order to win the time for the preparation of the mission. Then, it should be noted that there is a difference in the budgeting between military and civilian operations in the framework of ESDP. Thus, civilian operations are financing by the EU and related to the CFSP budget (EU Budget, Heading 4: EU as a global player).[19] If we analyze all the costs of the section Ãâà «EU as a global playerÃâà », we can see that it is only 3% of the entire section. Moreover, after analyzing the specific data in Annex 1 you can see a decrease of CFSP budget on 14% compared with last year, which is in my opinion not enough if we look back at the problems with the financing in ongoing missions and take into account that EU should be ready for the new threats which the World possess nowadays. Furthermore, the decision-making process of the allocation of money from my perspective is not very consistent and it is as follows, following a proposal from the Commission, the Council of Ministers and the European Parliament the two branches of the EU budgetary authority agree the exact size of the CFSP budget. The dialogue between the Council and the Parliament is crucial in this context, and it has not always been smooth. This is perhaps inherent to a policy area such as CFSP where, by Treaty, the EP has the last word on the budget but limited say on substantial political decisions.[20] Thus after analyzing the decision-making process of the European budget, I came out to the solution that it is obvious picture of bureaucratic system, what is in my point of view unavoidable situation in any intergovernmental organization. However, in case of preparatory actions for the preparation of the crises response missions has been made significant changes between 2006 and 2007, such as enabling the Commission to fund preparatory measures from CFSP budget. Moreover in 2008, the Commission adopted a framework decision specifying what costs the preparatory measures for ESDP operations can cover the procedure to finance them. The specificity of these measures is that they can make funds available before the relevant legal act is adopted.[21] Therefore, the first step towards activation of mission and preparation for it could be partly supported from the first day. Conversely, it is still lack of financing for ESDP missions as one could witness in the Financial Framework 2007-2013, where the CFSP budget for is à ¢Ã¢â¬Å¡Ã ¬1.98 billon.[22] The budget is expected to cover crisis management operations (civilian ESDP missions only), conflict prevention, conflict resolution and stabilisation, non-proliferation and disarmament measures and EU Special Representatives. Besides, two problems had been directly associated with the 2007-2013 EU budgets in the word of the researcher from German Institute for International and Security Affairs, Annegret Bendiek: lack of democratic control over common defence policy activities and the related spending; MS have provided insufficient resources to fund the EUs ambitions become a fully-fledged actor in its foreign and security policy, meaning that additional money has to be diverted from sources outside the budget.[23] It is important to add that ESDP military operations are financing through separate inter-governmental arrangements the so called Athena mechanism, which is covering preparatory phase of the operations. All the MS (except Denmark) contribute to certain expenditure, strictly defined, according to a fixed coefficient depending on their GDP scale.[24] However, this funding only covers 10 % of total operation costs. In other words, the biggest burden for the operation covers by contributing nation. The ATHENA budget (financed by 24 MS) in 2005 it was approximately 60 million Euros, for 2006, the budget was about 68 million Euros[25] Overall, there is ongoing work concerning increasing the budget for Athena mechanism by the MS, but yet no consensus has been found between them. Military capabilities The first issue is that the EU does not have its own Armed Forces, as well as its own defence budget. Therefore, each MS maintain autonomy of their Armies, and can decide about contribution to every particular mission. Regardless of significant EU expenditure on defence sector, MS did not change completely their Armed Forces posture after Cold War toward nowadays global security challenges. In Annex 3 we can see the progress of ESDP military capabilities by comparing MS equipments in 1999 and 2009. Besides, it is ongoing transformation of the Armed Forces of the MS from the previously Cold War doctrine; therefore, in 2008 the 27 EU governments had reduced their armed forces to 2 million personnel, and j Power Line Communication: a Green Computing Power Line Communication: a Green Computing Varsha Mohite Tejas Kandgaonkar ABSTRACT After evolution of wireless technology, classical Public Switched Telephone Network (PSTN) suffered through the drastic change. As a result of it, approximate 80-90% wired telephone networks are replaced by wireless network. But due to wireless network humans are nowadays facing various problems such as sleep disturbances, heart palpitations, migraines, and general poor health due to electromagnetic radiations. So there is need to switchover towards some existing wired network for communication. This leads to a new approach of green computing by using the existing power lines for the communication. This paper covers the working mechanism of power line communication, its modulation techniques and its applications. This paper will also give the general idea about the components for PLC based network elements. KEYWORDS Green Computing, PLC, Power Line Communication, Power Line Networking, Green Networking INTRODUCTION TO POWER LINE COMMUNICATION Power Line Communication (PLC) is a technology for the communication which provides the facility to send and receive data over existing wired network of power lines [1]. It is sometimes called as Internet over Power Line (IPL). Fig 1 Power Line Communication Power Line Communication is now became a need of todayââ¬â¢s modern digital era due to following reasons: Slackening of telecommunication. Deregulation of electricity utilities. Increasing growth of digitization in every premise. Power grid control. PCL categorized into two categories as Narrowband PLC and Broadband PLC as follows [2], Narrowband PLC Narrowband PLC works at very low frequency range of 3-500 KHz with data rates from few 100s of kbps to several kilometers. Due to the application of narrowband PLC in smart grid technology, nowadays it is area of interest of many researchers. Broadband PLC Broadband PLC is last-mile solution for internet and networking through power lines. It has very high data rate and no any additional wiring is required for it, as it uses existing wired network. Thus this technology is serving as effective technology for Home Area Network (HAN). This way of communication through existing wired network of power lines provides following features: Lower cost for construction as it is using existing wired communication media. Provides high speed, high capacity, and long distance communication. It cannot be affected by electric fields or magnetic fields. It can be used for protection, system control and equipment automation. DEVELOPMENT PHASES The leading company in the field of power line communication based devices and services KEPKO KDN [5] has given the brief business record as below: Power line communication (PLC) trial service (Nov. 2004 ~ Jul. 2005, Remote metering, transformer monitoring, and internet service for 1,500 households in Daegu and Daejeon regions) Energy saving system construction using PLC technology (Feb. 2005 ~ May. 2005, Constructed street lights and in-building lights control system for Korea South-East Power and Bundang Combines Cycle Thermal Plant) Constructed integrated metering network based on power line communication (PLC) technology (Oct. 2005 ~ Dec. 2005, Electricity and gas remote metering system for 190 households in Gyeongnam region) PLC lighting control system for Younghung Thermal Power Plant (Dec. 2005 ~ present, Constructed lighting control (street light, turbine building, and high pressure building) system for Korea South-East Power Co Younghung Thermal Plant) Established industry-university online education infrastructure based on PLC technology (Dec. 2006 ~ Dec. 2007 Constructed and PLC home network for Korea Polytechnics education infra, and provided education and training support) Power line communication (PLC) based second remote metering trial service (Aug. 2007 ~ Dec. 2007, Constructed PLC based remote metering system for 5,000 household in Uijeongbu and three other regions) Constructed Power line communication (PLC) based integrated remote metering system (Aug. 2007 ~ Sept. 2007 Electricity, water, and gas metering system for 100 households in the South Seoul Business Unit (Mokdong) Lighting energy saving system expansion construction using power line communication (Sept. 2007 ~ Dec. 2007 Constructed expansion system in Busan Combined Cycle Thermal Plan of Nambu Power Plant (main control building, chemical building, CWP building, material building) PLC long distance transmission equipment supply (Apr. 2007 ~ Sept. 2007, Delivered couplers for long distance communication using high voltage lines for six business premises including KEPCO Jeju branches) PROBLEMS WITH PLC AND PROPOSED SOLUTION The current power lie networks are not designed for communication. PLC has the impairments like high attenuation, significant potential interference and the noise which is generated by all loads connected to the grid. With the application of OFDM modulation scheme these problems can be minimized. Encoding technique should be applied to achieve high data rates. PLC NETWORK ELEMENTS PLC Modem PLC modem is used to connect you communication device with the power line as a transmission medium. It performs the similar functionalities of the general modem. PLC Base Station A PLC base station is used to connect PLC to its backbone network. Other than this PLC gateways, repaters and coupling are also essential. OPERATING MECHANISM Like normal communication process, in Power Line Communication also sender modulates data and sends towards the receiver through the transmission media. At the receiving end receiver demodulates the received signal to read it. But only change is that the communication medium is the power line. PLC does not require any kind of extra cabling mechanism. By using PLC virtually all power-plugged devices can be controlled or monitored. From the network oriented point of view, 7-layered OSI reference model consideration is essential. Some PLC chips serves as only physical layer. It can be also used as Digital Signal Processor (DSP) with a clean software consciousness of the Medium Access Control sub layer and Physical Layer. MODULATION TECHNIQUES Various modulation techniques can be used in PLC such as Orthogonal Frequency Shift Keying, Binary Frequency Shift Keying, Frequency Shift Keying and Spread Frequency Shift Keying. In the table below these modulation techniques are compared by using two important parameters, complexity and bandwidth. OFDM gives highest data rates and FSK offers lowest complexity. Thus current trend is to move towards the combination of OFDM and FSK. APPLICATIONS Earlier, we saw that PLC is widely used in the Smart Grid and in micro-inverters. PLC can be used in other applications like lighting (e.g. traffic light control, LED dimming), industrial (e.g. UPS communicating to a network device, irrigation control), machine-to-machine (e.g. vending machines, a hotelââ¬â¢s reception-to-room communication), telemetry (e.g. offshore oil rigs), transport (e.g. Electronics in cars, trains and airplanes) and indeed, applications of PLC are only limited by oneââ¬â¢s creativity. The major applications of power line communication [5] include: High-speed internet and Home Network High-speed internet Home network VoIP Integrated metering (electric, water, gas, hot water, heating) Security, alarm Power IT Remote metering Distribution automation Street light control Unmanned substation surveillance Underground utility conduit monitoring SCADA Air conditioner control Energy saving lights control for power plant Misc Applications Traffic signal control Road monitoring Emergency phone Forest fire monitoring Elevator control SUMMARY AND CONCLUSION REFERENCES [1] DOSTERT, K. Powerline Communications. Prentice-Hall PTR, 2001, ISBN 0-13-029342-3. [2] AHOLA, J. Applicability of power-line communicationsto data transfer of on-line condition monitoring ofelectrical drives. Thesis for the degree of Doctor ofScience (Technology). Lappeenranta University ofTechnology, Lappeenranta 2003, ISBN 951-764-783-2,ISSN 1456-4491. [3] KOSONEN, A. Power line communication in motorcables of variable-speed electric drives âËâ analysis andimplementation. Thesis for the degree of Doctor ofScience (Technology). Lappeenranta University of Technology, Lappeenranta 2008, ISBN 978-952-214-641-0, ISBN 978-952-214-642-7 (PDF), ISSN 1456-4491, 2008. [4] HRASNICA, H., HAIDINE, A., LEHNERT, R.Broadband Powerline Communications Networks.England: Wiley, 2004. 275 pp. ISBN 0-470-85741-2. [5] https://www.kdn.com/home3/we/gs/WEGS_0106.jsp?toMenuNum=510 cheripalmer19http://www.blogger.com/profile/02536511016691811259noreply@blogger.com0