Thursday, October 31, 2019

Barack Obama's Speech in Cairo Essay Example | Topics and Well Written Essays - 1250 words

Barack Obama's Speech in Cairo - Essay Example He is thus open to world publicity and criticism and thus his actions or speeches are subject to world scrutiny. Hence, when Cairo University, which is the source of Egypt's advancement and Al—Azhar, which is a beacon of Islamic learning, hosted him, the world was watching and listening. On his first visit to Egypt as the President of the United States of America, Barrack Obama addressed six issues, which included violent extremism, the Israel-Palestine situation, Iran nuclear weapons, world democracy, economic progress, and women’s rights (USA Today web). This paper will address the issue of the tension situation between Israelis, Palestinians, and the Arab world as elaborated by Obama on 6 April 2009. The issue of the conflict situation in Israel and Palestine is probably one of the issues that have great meaning not only to US, but also to the whole world. Israel is a staunch Christian nation with the Jews drawing their roots from this country. Palestine on the hand is a region occupied by both Muslims and Christians in significant numbers. However, both Israel and Palestine are Middle East countries just like Egypt. They possess very dangerous weapons such as nuclear bombs, which pose a great risk to human life. Again, Israel and America are long time allies based on their military superiority. Obama himself professes Muslim faith but his mother was a Christian and his true religion actually generates another debate. The conflict between Israel and Palestine has been there for ages with some analysts drawing this situation back to the holy books, Quran and the Bible. Hence, this issue somehow ties itself to the war of supremacy between Christianity and Islam though there are other underlying factors. Many countries including America have actually tried in vain to negotiate for a peaceful agreement between these nations. This issue considerably required a careful treading. Therefore, when Obama chose to discuss this issue, the world welcomed th e reprieve and waited for the new intervention on this longstanding conflict. Ironically, even when he was addressing the issue in Egypt, pressure was already building up in the Israel- Palestine border. Subject to these reasons, I find the issue very significant and the audience relevant. In fact, it was the second issue that he addressed on this day. In supporting his call for a permanent solution between Israel and Palestine, Obama accounted 10 points to this effect. He confirmed that America had strong relations with Israel based on cultural, historical ties, and articulation of diplomacy. This fact is widely known and analysts claim that this bond is hard to break because it relies on military supremacy. He also acknowledges the fact that this conflict has claimed many lives and muted unwarranted sufferings. In light of this, he claims that the Jewish people from Israel faced persecution for centuries, more than Six million Jews killed, many more enslaved and tortured, and that these are painful memories for the Israelis (USA Today web). On the other hand, Palestine have endured the pain of dislocation for 60 years, many Palestinians have lost their lives, endured humiliations, lacked security while many wait in refugee camps for aid. A situation he claims is now unbearable in both Israel and Palestine. He equally confirms that America is ready to help in finding a solution. He personally commits himself to pursue this cause with uttermost patience and dedication as the task dictates. In fact, he was to visit Israel the

Tuesday, October 29, 2019

Gender Issues Research Paper Example | Topics and Well Written Essays - 1250 words

Gender Issues - Research Paper Example of discrimination, gender, and roles among men and women as those that influence our day-to-day activities and what traits we pick to interact with other people. Gender is the state of being either male or female; hence, discrimination in gender refers to the prejudicial treatment of someone because of his or her gender. Gender discrimination, according to most researchers, is most likely to be experienced at place of work rather than anywhere else. Gender discrimination at work place includes in hiring, promotion, demotion, unequal pay or benefits, harassment, hostile work environment or firing. The New York Times relates to gender issue the fact that Hillary Clinton was not appointed the Vice President, but Joe Biden appointed. Her backers and supporters seemingly perceived this as gender discrimination. That remains largely arguable. Even so, some authors, such as Wollstonecraft, have argued that women are systematically degraded by receiving the trivial attentions, which men think it manly to pay to the sex, when, in fact, men are insultingly supporting their own superiority." Such feelings elaborate the masculine discrimination that cle verly elevates the stature of men in the society. Sex is commonly used by men degrade women and make them feel inferior to them while still making sure that they do not rise above them. Lesbians, Gay, Bisexual, Transgender, and Queer (LGBTQ) people have not yet been openly accepted by the society. Pew Research Center shows that, 92% of the LGBTQ persons say that today society has become more accommodating and more than half of them believe that by the end of the decade, more people will accept them. Recent legislation passed in different states in the country, allowing and legalizing these groups of people, is a sign that finally the society is embracing them. The church, which has been a strong advocate against them, is finally warming up to them. The recent appointment of a gay clergy has shown that the groups’ advocacy

Sunday, October 27, 2019

Triple Constraint of Project Management

Triple Constraint of Project Management What Is The Triple Constraint Of Project Management? A project can be described as a temporary endeavour that is geared towards accomplishing a unique and desired product, service and/or result. For the project to be successful in attaining its objectives, triple constraint management is imperative. The management involves schedule (time), scope (performance) and budget (cost) management (Marchewka, 2009, p. 15-18). Describe Each Of Triple Constraint Management Elements: Time: Project is a temporary endeavour; hence it must have a definite time frame, involving a definite beginning and estimated completion date. Some projects may have immovable date by which the project must be complete while others may be flexible. In time frame, there are some issues that will have specific deadlines. For example, be complete on or before 29th March 2010. Some will have more urgency, like â€Å"soonest possible,† while others will have lesser urgency like â€Å"take your time†. The phases that should be involved in project time frame include: when to define project goal, when to plan, when to execute the plan, when to close and finally when to evaluate the project (Marchewka, 2009, p. 15-18). Budget: Every project operates within a definite budget, which is also known as project cost management. The cost management provides an assurance that the budget of the project is developed as well as completed as approved. The budget should cater for equipment capital, consumable supplies, daily cash expenditure, personnel payment which include team allocated resources and the overhead cost. The budget should also have miscellaneous allocation for unexpected mishaps and requirements. The budget is limited to every item in the entire project (Meredith, 2009, p. 10, Marchewka, 2009, p. 24-26). Scope: Every project should have a total of all deliverables that are required for project completeness. Project scope includes the details of all the products, and services and the expected results. The scope details all the works that must be completed in order to achieve the goals of the project. The project scope explains what is to be done, why it going to be done, how its going to be done, the people who will be involved in doing it, the duration for doing it, the cost for doing it, what man go wrong and the response to it, and measures to evaluate the success of the project (Marchewka, 2009, p. 18-20). Why It Is Important To Manage Them Both Separately And Together Through The Life Of A Project? Its notable that projects have a very big percentage of resources directed to human resources. The labour cost makes the total budget increase immensely. Scope schedule and budget have to remain in a sort of equilibrium so as to support a specified project goal. Separate management on the other hand enables each element to offer its best, without hoping that the others will balance out the equation. For example time element will not hope that the scope will be adjusted to accommodate lateness and scope will not await adjustment of budget to allow for a divergent scope (Marchewka, 2009, p. 14-17). Why Is It Important To Align Projects With Business Strategy? A project is a temporary endeavour that is aimed at achieving some unique and desired product and/or services to accomplish the purpose of the project, while on the other hand a business strategy is the pattern or plan which integrates an organizations primary goals, policies as well as activities into a cohesive whole. Business strategy pulls together while giving meaning to all that an organization does. A business strategy that is well organized facilitates the organization of all resources to become a unique and viable force that is based on the competencies as well as the shortcomings of the business organization on projected changes activities by competitors and the environment (Marchewka, 2009, p. 3). Its imperative to align a project with the business strategy as accomplishment of many business or organizations objectives are being achieved through projects. There are many projects that fail to advance the overall vision of a business simply because they were not in line with the goals of the business. In other words they fall outside the business stated mission hence irrelevant to the business. Its therefore important for every project to start by analysing the overall objective of the organization so as to direct the project towards achieving the minor goals as well as the major goals that do not divert from the mission of the project (Meredith Mantel, 2009). Alignment of a project to a business strategy enables the project planners to evaluate the cost of the project versus the total business capability to host the project. Rationality is applied in tabling or arguments of the effect of such a cost in relation to the business strategy. In a situation where the budget of the project surpasses the business capital base, the imbalance may lead to debts to the business consequently destabilizing the balance of the business (Meredith Mantel, 2009). Alignment of a project to the business strategy facilitates lowering of the cost of learning the project. This is because there are many types of equipment that would be required in the project but they are readily available in the business. The establishment of project will therefore not start from scratch. There are some human resources that can also be drawn from the business; people with a bit of experience hence will not require too much training in running the affairs of the project (Cadle Yeates, 2004). When a project is aligned to a business strategy, it will be exempted of many challenges as compared to a project that is not aligned to any strategy. The argument is that many challenges that a project goes through in the initiation process are similar to challenges that were faced in launching of many businesses, so by the time a project is established within the business strategy, many hills of challenges will be levelled (Cadel Yeates 2004). What Criteria Would You Suggest For Ranking The Projects? Project selection can be defined as a process by which evaluation of proposed projects is done and then deciding to implement some set of the projects in order to achieve the overall objective of the organization. Evaluation selection technique is employable in any area that requires one to make choice between alternative choices. When my organization is faced with a challenge of so many projects that are tabled for its investment, its imperative to choose the projects that we will invest in from the list. Some of the criteria that have been tabled by Meredith and Mantel (2009, p 41) for project selection and ranking include: Realism, capability, flexibility, easy to use, cost effective, and easy to computerize. I would choose realism criterion. This module reflects an organizations reality is decision making, organizations resources, organizations limitations, cost, time and implementation factors. How Would You Ultimately Decide Which Projects To Select? The selection of the project to invest in will be based on Project Portfolio Process (PPP). The project that I would select must support multiple of the organizations goals while at the same time cross reinforcing other important projects. This means a project should not be solely geared towards achieving its objectives without giving a thought on the overall mission of the organization. I would evaluate all the projects to understand which projects are likely to incur the greatest cost to the organization. As argued by Meredith Mantel (2009, p. 72) such a project should be in a position to deliver equally high returns; otherwise the project should not be adopted. A project that I would propose for investment in must not bring about excessive baggage to the organization, those projects which are likely to incur excessive risk should be eliminated. Such projects include those that are likely to overload an organizations resources. Meredith Mantel (2009, p. 71-72) argued that a project to be selected should be in position to balance the resources to the needs. If a project requires too many resources than its ability to overcome the needs in the organization, it shall have to be rejected. At the same time the project should be in a position to balance the short term, medium term and long term returns, an imbalance would lead to rejection of the project. Olsen (2001, p. 34) pointed of the essence of doing a cost benefit analysis for whichever project is tabled for adoption. I would ensure that all the projects tabled are critically evaluated to assess whether they are worth investing the resources of the organization in. The project that I select must also be realistic as pointed out by Meredith Mantel (2009) on criteria for selecting the most viable project. A project must be based on an organizations limitations realities. The project should not surpass an organizations resources, or capabilities. For example if our organization is work a million dollars, its not realistic to invest in a multi-billion dollars project rest we drain the other projects. In other words a project that we select must be within our organizations policies. Meredith and Mantel (2009, p. 41) have argued that every viable project should be flexible. The project that we select should be flexible enough to allow for adjustments and modifications where necessary. The project should not be fixed such that even if something else crops up in the project cycle, it can not be changed to be aligned with the new cycle. I would therefore try to evaluate the project prior to its adoption to see all the loose ends and examine what are the possible effects to the overall aims of the organization. Computerization is a very essential component in this age (Meredith and Mantel (2009, p. 42); hence the project should be easy to computerize. Computerization allow for easy storage of data, retrieval and project evaluation. The data of the project stored in a computer can easily be managed and distributed to other stake holders consequently enhancing effectiveness in project management. 4a. briefly describe what happens in each of the five projects management process groups: Five process groups define the appropriate project management process by king of work that ought to be done. But the process groups overlap between and within the project phases as output of one process group turns to the input of the following phase. Initiation: At this stage, the process group signals the genesis or the start of project or a phase. A set of processes of project management defines how the project would be conducted and the way the first methodology phase will be initiated. Approval of business case takes place (Marchewka, 2009, p. 80-81). Planning: Planning of entire project (phase to phase) takes place; the planning involves scope, activity, and resources planning. It also includes cost estimation, procurement planning, and schedule estimation. The planning is in line with project size and complexity; necessary for every phase, though not demanding initial planning (Marchewka, 2009, p. 81). Executing: Involves integration of resources (human and material) in carrying out the planned project activities. Project management processes like risk management, quality assurance and team development perform a significant supporting role (Marchewka, 2009, p. 81). Monitoring and Controlling: This process group permits for measuring and managing progress to projects scope, budget, schedule, and quality objectives. The manager and the team keep an eye on variances between actual results and hoped for results. It also includes scope control, schedule control, change control, quality control and budget control (Marchewka, 2009, p. 81). Closing: closing process group avails a set of accepting the products or services of the project which brings the project to an orderly close. The stake holders ought to verify satisfactory completion of all deliverables before the project sponsors accepts contract closure. All the deliverable should be agreed upon and agree to the terms of project completion. Resources are free to be reassigned and all accounts settlement be done. Evaluation of the success or failure of project is done (Marchewka, 2009, p. 81). On Which Processes Should Team Members Spend The Most Time? The execution stage is the most important stage in a project management group. At this stage whatever was planned for is implemented so that the desired outcomes could be attained. At this stage the integration of people and other resources is very important as it leads to the end product. The success or the failure of a given project is highly dependent on the interaction between the two resources. It takes the longest period because it involves employing the plans from the initiation stage in turning a low material into a finished product. The absence of this stage means fiasco of the project (Marchewka, 2009, p. 81). What Are The Main Tasks Undertaken During Project Integration Management? Project integration coordinates all the other eight knowledge areas of a project hence its considered as the most important knowledge area. It involves putting all the pieces of a project together in a cohesive manner to get the project done in fewer resources hence cheaper and fast while meeting the set objectives. In involves project charter development, preliminary scope statement development, project management plan development, manage and direct execution of the project, monitoring and control of project work, integrate change control and closure of the project (Marchewka, 2009, p. 84). Development Of Project Charter: ItS The Backbone Of The Project; Project Can Not Be Started Without It. It Authorizes The Project. Preliminary scope statement development: it outlines project deliverables. It contains the details that will be used in project planning. Project plan development: it explains how the implementation of the project will be done. Its an imperative tool in day to day pursuit of the project goals and objectives. Direction and management of project execution: Integration of project process takes place. The completion of project scope is done. Control and monitoring of project work: resources are expended consequently facilitating accomplishment of project goals and objectives. Integrated change control: Needful for documentation, review, and decide upon of proposed changes as change is inevitable in a project cycle. Close the project: facilitates administrative and contract closure. Close project process is paramount for termination of every project (Marchewka, 2009, p. 84). References Marchewka, 2009, Project management process: developing the project charter and baseline project plan, John wily and sons, San Francisco. Meredith Mantel, 2009, Project management: A managerial Approach, 7th Edn, John wily and sons, San Francisco. Olsen, 2001, Introduction to IS Project Management, McGraw Hill, New York. Cadle Yeates, 2004, Project Management for Information, Systems, 4th edn, Prentice Hall, New Jersey.

Friday, October 25, 2019

A Web Page :: Essays Papers

A Web Page A web page is an electronic document written in a computer language called HTML, short for Hypertext Markup Language. Each web page has a unique address, called a URL, short for Uniform Resource Locator, which identifies its location on the network. A website has one or more related web pages, depending on how it's designed. Web pages on a website are linked together through a system of hyperlinks, so that you can jump between them by clicking on a link. On the Web, you navigate, popularly knowing as surfing, through pages of information based on what interests you at that particular moment. Home Page When you browse the World Wide Web you'll see the term home page quite a lot. Think of a home page as the starting point of a website. Like the table of contents of a book or magazine, the home page in most cases gives an overview of what you'll find at the website. A website can have one page, many pages or a few long ones, depending on how it's designed. If there isn't a lot of information, the home page may be the only page. But usually you will find at least a few other pages. Web pages vary wildly in their design and content, but most use a traditional magazine format. At the top of the page is a masthead or banner graphic. Then there's a list of items, such as articles, often with a brief description. The items in the list are usually hot, meaning that they are linked to other pages in the website or to other websites. Sometimes these links are highlighted words in the body of the text or are arranged in a list, just like an index. They can also be a combination of both. A web page can also have images that link to other content. Designing the structure of your Web site Designing your Web site begins with planning the purpose of the site, what the content will be, and how you want it to be structured. A well-designed Web site can make it easy for your audience to navigate and get the information you want them to receive. It can also make it easier for you to manage and update later on. Planning the purpose and content of the site

Thursday, October 24, 2019

Effects of Television on Modern Society Essay

Upon its introduction up until the dot com era television was the most popular medium. The ability for news and events to be televised and viewed instantly around the world has given our society the ability to connect with the world by the push of a button. Although TV has made information more assessable it has its weak points as well. Over the years violence on television has become more common and more acceptable. Until the recent push for TV ratings it was difficult for parents to ensure their children were viewing material they deemed appropriate and even so some may not agree with the rating system. I remember as a young child watching â€Å"Power Rangers† which was rated â€Å"TV-Y7†. That meant the youngest viewer watching should be at least seven years old. Kids mimic their heroes and act like they do. I don’t think it’s in the best interest of any seven year olds parents to allow for the child to take in such brutal shows. I am sure that within the next ten years television will either become much more liberal, or much more conservative, but not anywhere in between. Less and less people seem to care what is broadcast on cable TV, while the ones who do care seem to have a dying voice. The effect on our society is rather mixed and it will be a few decades before we see any real effects on our youth.

Wednesday, October 23, 2019

Effectiveness of Ra 8049 or Anti-Hazing Law Essay

Under the Anti-Hazing Law, hazing is defined as â€Å"an initiation rite or practice as a prerequisite for admission into membership in a fraternity, sorority or organization by placing the recruit, neophyte or applicant in some embarrassing or humiliating situations such as forcing him to do menial, silly, foolish and other similar tasks or activities or otherwise subjecting him to physical or psychological suffering or injury. The physical, mental and psychological testing and training procedure and practices to determine and enhance the physical, mental and psychological fitness of prospective regular members of the Armed Forces of the Philippines and the Philippine National Police as approved by the Secretary of National Defense and the National Police Commission duly recommended by the Chief of Staff, Armed Forces of the Philippines and the Director General of the Philippine National Police [are not] considered as hazing†. (Section 1) Requirements 1. No hazing or initiation rites in any form or manner by a fraternity, sorority or organization shall be allowed without prior written notice to the school authorities or head of organization 7 days before the conduct of such initiation. The written notice shall indicate: 1) the period of the initiation activities which shall not exceed 3 days, shall include 2) the names of those to be subjected to such activities, and shall further contain 3) an undertaking that no physical violence be employed by anybody during such initiation rites. (Section 2) 2. The head of the school or organization or their representatives must assign at least 2 representatives of the school or organization, as the case may be, to be present during the initiation. It is the duty of such representative to see to it that no physical harm of any kind shall be inflicted upon a recruit, neophyte or applicant. (Section 3) Liability for Hazing Section 4 of the Anti-Hazing Law defines those criminally liable as principals and accomplices. Criminal Liability 1. If the person subjected to hazing or other forms of initiation rites suffers any physical injury or dies as a result thereof, the officers and members of the fraternity, sorority or organization who actually participated in the infliction of physical harm shall be liable as principals. The person or persons who participated in the hazing shall suffer: 1) The penalty of reclusion perpetua (life imprisonment) if death, rape, sodomy or mutilation results there from. 2) The penalty of reclusion temporal in its maximum period (17 years, 4 months and 1 day to 20 years) if in consequence of the hazing the victim shall become insane, imbecile, impotent or blind. 3) The penalty of reclusion temporal in its medium period (14 years, 8 months and one day to 17 years and 4 months) if in consequence of the hazing the victim shall have lost the use of speech or the power to hear or to smell, or shall have lost an eye, a hand, a foot, an arm or a leg or shall have lost the use of any such member shall have become incapacitated for the activity or work in which he was habitually engaged. 4) The penalty of reclusion temporal in its minimum period (12 years and one day to 14 years and 8 months) if in consequence of the hazing the victim shall become deformed or shall have lost any other part of his body, or shall have lost the use thereof, or shall have been ill or incapacitated for the performance on the activity or work in which he was habitually engaged for more than 90 days. 5) The penalty of prison mayor in its maximum period (10 years and one day to 12 years) if in consequence of the hazing the victim shall have been ill or incapacitated for the performance on the activity or work in which he was habitually engaged for more than 30 days. 6) The penalty of prison mayor in its medium period (8 years and one day to 10 years) if in consequence of the hazing the victim shall have been ill or incapacitated for the performance on the activity or work in which he was habitually engaged for 10 days or more, or that the injury sustained shall require medical assistance for the same period. 7) The penalty of prison mayor in its minimum period (6 years and one day to 8 years) if in consequence of the hazing the victim shall have been ill or incapacitated for the performance on the activity or work in which he was habitually engaged from 1 to 9 days, or that the injury sustained shall require medical assistance for the same period. 8) The penalty of prison correccional in its maximum period (4 years, 2 months and one day to 6 years) if in consequence of the hazing the victim sustained physical injuries which do not prevent him from engaging in his habitual activity or work nor require medical attendance. 2. If the hazing is held in the home of one of the officers or members of the fraternity, group, or organization, the parents shall be held liable as principals when they have actual knowledge of the hazing conducted therein but failed to take any action to prevent the same from occurring. 3. The officers, former officers, or alumni of the organization, group, fraternity or sorority who actually planned the hazing although not present when the acts constituting the hazing were committed shall be liable as principals. A fraternity or sorority’s adviser who is present when the acts constituting the hazing were committed and failed to take action to prevent the same from occurring shall be liable as principal. The presence of any person during the hazing is prima facie evidence of participation therein as principal unless he prevented the commission of the acts punishable herein. Accomplices The school authorities including faculty members who consent to the hazing or who have actual knowledge thereof, but failed to take any action to prevent the same from occurring shall be punished as accomplices for the acts of hazing committed by the perpetrators. Liability of Owners of the Hazing venue The owner of the place where hazing is conducted shall be liable as an accomplice, when he has actual knowledge of the hazing conducted therein but failed to take any action to prevent the same from occurring. Administrative Liability The responsible officials of the school or of the police, military or citizen’s army training organization, may impose the appropriate administrative sanctions on the person or the persons charged under this provision even before their conviction. The maximum penalty herein provided shall be imposed in any of the following instances: 1. When the recruitment is accompanied by force, violence, threat, intimidation or deceit on the person of the recruit who refuses to join; 2. When the recruit, neophyte or applicant initially consents to join but upon learning that hazing will be committed on his person, is prevented from quitting; 3. When the recruit, neophyte or applicant having undergone hazing is prevented from reporting the unlawful act to his parents or guardians, to the proper school authorities, or to the police authorities, through force, violence, threat or intimidation; 4. When the hazing is committed outside of the school or institution; or 5. When the victim is below 12 years of age at the time of the hazing. The law states that it applies to the president, manager, director or other responsible officer of a corporation engaged in hazing as a requirement for employment in the manner above mentioned. Lastly, the law specifies that any person charged is not entitled to the mitigating circumstance that there was no intention to commit so grave a wrong. Had the Anti-Hazing been in place in 1991, those acquitted of causing Lenny Villa’s death may still be languishing in jail. (Although, perhaps, had our prosecutors been more diligent in their prosecution of all accused in the death of Lenny Villa, there would at least have been more than 5 convictions – even without the Anti-Hazing Law.) But why do hazing deaths continue to occur despite the law? It is significant to note that the Supreme Court decision on the hazing-death of Lenny Villa, as quoted above, recognizes that: the hazing â€Å"rituals were performed with Lenny’s consent† and â€Å"even after going through Aquila’s grueling traditional rituals during the first day, Lenny continued his participation and finished the second day of initiation.† The law cannot prohibit some people from wanting to belong and willing to tolerate certain rituals to be accepted as a member of a group, nor can the law prevent some people’s inclination to violence or abuse. So at all times, the willing neophyte’s welfare depends on being hazed by a group of non-violent handlers. But that is never guaranteed. Since the risk exists that the neophyte will be hazed by a group of people prone to violence by nature, by pressure or some substance, it may be all left to the individual (or the family rearing him/her) to eliminate that risk by declining the membership (or convincing said individual to decline) as early as possible. We must see hazing as much more than a legal issue, say, like drugs. It is not enough to stop drug production and trafficking. People must learn to just say â€Å"No.† Those inclined to join should be aware that certain activities benignly termed as rites of passage may very well lead to funeral rites, of their own. (Siesta,2012) Statement of the Problem The purpose of the study was to investigate the effectiveness of a Fraternity or Sorority in a specific area, the benefits that an individual get from joining it and how it should be observed. Specifically, it sought answers to the following questions: 1. How effective is Republic Act 8049: Anti-Hazing Law? 2. Are the rules and limitations on practicing initiation rites under RA 8049 properly observed? 3. What are the perceived solutions proposed by the respondents to resolve the lack of implementation of RA 8049? Conceptual Framework 1. Hazing – Section 1. Hazing, as used in this Act, is an initiation rite or practice as a prerequisite for admission into membership in a fraternity, sorority or organization by placing the recruit, neophyte or applicant in some embarrassing or humiliating situations such as forcing him to do menial, silly, foolish and other similar tasks or activities or otherwise subjecting him to physical or psychological suffering or injury. The term â€Å"organization† shall include any club or the Armed Forces of the Philippines, Philippine National Police, Philippine Military Academy, or officer and cadet corp of the Citizen’s Military Training and Citizen’s Army Training. The physical, mental and psychological testing and training procedure and practices to determine and enhance the physical, mental and psychological fitness of prospective regular members of the Armed Forces of the Philippines and the Philippine National Police as approved ny the Secretary of National Defense and the National Police Commission duly recommended by the Chief of Staff, Armed Forces of the Philippines and the Director General of the Philippine National Police shall not be considered as hazing for the purposes of this Act. 2. Rules and Limitation – Section 2. No hazing or initiation rites in any form or manner by a fraternity, sorority or organization shall be allowed without prior written notice to the school authorities or head of organization seven (7) days before the conduct of such initiation. The written notice shall indicate the period of the initiation activities which shall not exceed three (3) days, shall include the names of those to be subjected to such activities, and shall further contain an undertaking that no physical violence be employed by anybody during such initiation rites. Section 3. The head of the school or organization or their representatives must assign at least two (2) representatives of the school or organization, as the case may be, to be present during the initiation. It is the duty of such representative to see to it that no physical harm of any kind shall be inflicted upon a recruit, neophyte or applicant. 4. Problems due to hazing – Physical injury – Damage or harm done to or suffered by a person or thing:   humiliation- The state of being humiliated or disgraced; shame. depression- A psychiatric disorder characterized by an inability to concentrate, insomnia, loss of appetite, anhedonia, feelings of extreme sadness, guilt, helplessness and hopelessness, and thoughts of death. Also called clinical depression psychological disorder- a psychological disorder of thought or emotion; a more neutral term than mental illness death – a permanent cessation of all vital functions; the end of life. 4. Strict implementation of the R.A 8049 or the Anti-Hazing Law shall be observed by the government because sometimes the government forget about this Republic Act and set it aside. Significance of the Study T he researcher considered the following institutions that will sort benefit of the study. These are the following: Government for them to take action and lessen the crimes that were brought up by unlawful initiation process. Society gives awareness to what are the rules and limitations that should be observed in the initiation process. Neophyte gives them awareness and let them understand what the legal procedures in conducting initiation process are. Future Researchers results of this study maybe used as reference by future researchers. Scope and Delimitation of the Study The parameters of the study pertain to the effectiveness and implementation of Republic Act 8049 which is known to be the Anti-Hazing Law. The researcher studies about the perception of law-makers and individuals expert in the field of law. The researcher prepared interview questions that will be answered by 5 or more respondents which happen to be law-makers and individuals expert in the field of law. The set of questions prepared by the researchers are bound with the questions in the statement of the problem, for example how effective is Republic Act 8049: Anti-Hazing Law, are the rules and limitation in conducting initiation rites are properly observed. Definition of terms Accomplice refers to one who knowingly, voluntarily, or intentionally, and with common intent and criminal purpose shared with the principal offender, solicits or encourages another to commit a crime or assists or attempts to assist in its planning and execution. Brotherhood refers to an association of men, such as a fraternity or union, united for common purposes. Congeniality refers to having the same nature, disposition, or tastes. Connation refers to a commonly understood subjective cultural or emotional association that some word or phrase carries, in addition to the word’s or phrase’s explicit or literal meaning, which is its denotation. Conviviality refers to fond of feasting, drinking, and good company; sociable. Curriculum refers to all the courses of study offered by an educational institution. Disdained refers to regard or treat with haughty contempt; despise. Dissipation refers to wasteful expenditure or consumption Fraternity refers to a chiefly social organization of men students at a college or university, usually designated by Greek letters. Freemason refers to an international fraternal and charitable organization with secret rites and signs. Initiation refers to a ceremony, ritual, test, or period of instruction with which a new member is admitted to an organization or office or to knowledge. Insignia refers to a badge of office, rank, membership, or nationality; an emblem. Law refers to a rule of conduct or procedure established by custom, agreement, or authority. Masonry refers to a work done by a mason. Menial refers to a person who has a servile or low nature Neophyte refers to a novice or beginner Protection refers to the state of being protected. Solidarity refers to a union of interests, purposes, or sympathies among members of a group; fellowship of responsibilities and interests. Sorority refers to a chiefly social organization of women students at a college or university, usually designated by Greek letters.

Tuesday, October 22, 2019

Hamlet Vs. The Bacchae Essays - Characters In Hamlet, Free Essays

Hamlet Vs. The Bacchae Essays - Characters In Hamlet, Free Essays Hamlet Vs. The Bacchae Hamlet and The Bacchae have many similarities and differences, in this paper, I will discuss some of them, as well as the questions posed in class. Both of these plays are tragedies, ending with a great number of the featured characters dying, or meeting another terrible fate. First of all, I dont think that Hamlet took place in a godless universe. Of course, the god in Hamlet, vs. the gods in The Bacchae are very different gods. In Hamlet, God affects the decisions the characters make (e.g., Hamlet decides not to kill Claudius while hes praying, because he believes God will forgive Claudius for his sins, and not send him to hell), however he doesnt have a direct role. You have no proof of a god in Hamlet, while in The Bacchae, the gods are the main characters in the play, performing a good percentage of the action. Also, the presence of the ghost means that in the world of Hamlet, there is an afterlife, but since there are not more ghosts in the world, there must be some divine presence, affecting why the ghost is there. Continuing with the issue of the ghost, the presence of the ghost in the play has many implications. First of all, the presence of the ghost may be an attempt to satisfy the religious beliefs of both the Protestants and the Catholics, which both would have been watching the plays during Shakespeares time. The Protestants do not believe in purgatory, so the ghost may be a way to explain the afterlife, without offending either religion. The ghost also creates some confusion with heaven and hell, because if the soul is in a ghost, then it means that it went neither to heaven, nor hell. Yet, throughout the play, the characters often talk of both heaven and hell, and the presence of the ghost doesnt change their belief in any way. Another significant difference between the two plays, is the role of revenge, and how it varies between gods revenge (in the Bacchae) and mans revenge (in Hamlet). Hamlets revenge tended to have logic, and was fairer to those that werent the point of his revenge. However, in The Bacchae, Dionysus shows very little logic, simply punishing on his own whim. In some cases, Dionysus took out his revenge on people that he had no dispute with. He was simply in a bad mood, so his revenge was also taken out on them. Hamlets revenge showed a lot more reason and organization to it, as opposed to Dionysuss, who had no reasons for quite a few of his actions. Another difference between the two plays is the characters reasons for killing. Dionysus obviously kills out of passion, sometimes simply because hes bored, or in a bad mood. Hamlet does have reasons, although there are cases in which Hamlet kills out of passion. When Hamlet kills Polonius, its out of passion. Hes in a hurry to kill Claudius, and in his rage, kills Polonius instead. However, when he actually does kill Claudius at the end, its not really out of pure passion. Its much more a planned, logical murder. In summary, Hamlet and The Bacchae have various similarities and differences, which I hope Ive shown in this paper. Neither Hamlet, nor The Bacchae ends in a pleasant way, which is characteristic of a tragedy. However, the end of Hamlet basically kills off all the main characters, except one, who carries the story on. The Bacchae ends with those whom Dionysus thinks should be punished, are punished. Those who have done him no wrong, are not affected. Both plays end with the idea that the story should be told, either to keep Hamlets memory alive, or to prevent others from going against Dionysus. In Hamlet, when someone dies, theres usually a reason for it, while in The Bacchae, its simply because Dionysus wishes it so.

Monday, October 21, 2019

Police Brutality.

Police Brutality. Police brutality in the United States is almost an everyday part of life. In most major cities across the country, officers abuse their authority in the most flagrant ways. New York and Los Angeles are the most notorious cities for police brutality. In February of 1999, New York police burst into an apartment building in pursuit of Amandou Diallo. The police officers shot forty-one bullets at the unarmed African and hit him nineteen times. Reverend Al Sharpton started a protest movement against the killing. In a jury trial of their peers the police officers who shot and killed an unarmed man were acquited of all charges. Mayor Rudolph Giuliani responded to the verdict by stating "Probaly until the day I die, I will always give officers the benefit of the doubt." Two days after the verdict, Malcolm Ferguson, also unarmed was gunned down in the same Bronx neighborhood where Diallo was shot.Speaker Pelosi presented the first Lantos Human Ri...Police officers engage in unjustified shooti ngs, severe beatings, fatal choking, and unnecessarily rough physical treatment in cities throughout the United States, while their police superiors, city officials, and the Justice Department fail to act decisively to restrain or penalize such acts or even to record the full magnitude of the problem. Habitually brutal officers - usually a small percentage of officers on a force - may be the subject of repeated complaints but are usually protected by their fellow officers and by the shoddiness of internal police investigations. A victim seeking redress faces obstacles at every point in the process, ranging from overt intimidation to the reluctance of local and federal prosecutors to take on brutality cases. Severe abuses persist because overwhelming barriers to accountability make it all too likely that officers who commit human rights violations escape due punishment to continue their abusive conduct.Human Rights Watch recognizes that...

Sunday, October 20, 2019

Assignment # 2.2 Example | Topics and Well Written Essays - 750 words

# 2.2 - Assignment Example portant because patients data will be stored I better way and also activities in the health facility will be done quickly meaning it would be manual or paper work which will need all the information to be in paper form and taken to the next medical professional but will be reflected direct to the professionals computers thus lowering the cost of employment. My advice to Carla is that she should ignore the opening in the other medical facility as a medical assistant because in the future also the facility will endorse this new technology despite been assured by her friend she has not heard any information for her practice joining a network or switching to the EMRs. If Carla decides to stay she should prepare herself mentally so that she may understand the new system and she will be of great help to the practice because of her basic computer skills and also because she is young she will be able to master the new technology faster than her other workmates. If I were her could have remained in the facility. As a healthcare professional, though I will be employed I will always take the work seriously as the owner because this is my passion, my career and I would like to see it in the next level. I will invest my time and resources to help all those who will be in need of my service at all the time. I will always set standards and examples for my coworkers to follow. I will make all the efforts to see the health care improve. I will always be in the frontline when it comes to reforming the nation’s health care system. Government should be fully be involved in reforming of healthcare services for instances the government should ensure that each citizen who is living beyond the poverty line have free access healthcare, they should also construct more facilities to make easier for patients to access healthcare services. It important for people to have health insurance because it helps in case the patient cost of treatment is huge, it relieves the patients family the

Saturday, October 19, 2019

Aristotle on the Nature of the Greek Polis Essay

Aristotle on the Nature of the Greek Polis - Essay Example The title of the issue shows that this section of the book talks about classical world and phenomenon of polis in ancient Greek history1. This chapter helps us understand the importance of Greek polis, which lasts for only two centuries. Further, it is noticeable from this chapter that Greek poleis were politically established and philosophical implications had a long term effect on Greek cities and practices of the societal members2. Characterization of the cities reflects their nature such as political and philosophical influence on the cities showed their aristocratic nature. It is evident from the aristocratic touch that has been observed from the cities` festival, cultural practices, temples and energetic blood relationships. 3Further this section of the book highlights that family bonds were categorized in various categories depending upon their educational statuses and power distribution among the citizens. It helps us learn that ethically these sub-divisions are made correctl y because with respect to norms and cultural values of the societies, categorization should base upon the constitutional actions of the citizens within the community. The author of the chapter clearly stated, "The importance of polis is not cultural, but institutional. This statement shows that the Greek cities were not famous or important because of the people`s cultural rituals and practices, but mainly because of its organizational value. It means the manner in which the Poleis of the Greek were designed and established to maintain good standard of living4.Additionally; it is more because poleis of the Greek were more in political control rather than tribal influence. This source assist us insight the socio-political matters of the Greek cities and their fundamentals of sub-divisions in the societies. This source further informs about the influence of Hesiod, Plato and Aristotle and the way their role influenced both rich and poor people of the society. Additionally, it has notic ed that impact of Aristotle and Plato had modified the diplomatic matter of the regions such as Sparta and Athens. Mostly importantly this source helps us understand the reason behind downfall of Greek polis. The author has quoted "the pathos of the polis was the pathos of a dynamic participation of the people in a culture and originated in the aristocratic society. Further it has explained that because of aristocratic attributes citizens of the polis were unable to get chance of becoming true members of the state. This section of the book clearly reflect nature and characteristics of the Greek culture in which local institutions had a major role and they formed to keep poleis away from the big territories and unity of the societal members was not secured. Further, promises that were made to bring positive changes in the Greek societies and to improve standard of living of the people are clearly mentioned to help us understand the efforts made by the Greek people to maintain socio-c ultural practices of their communities5. However, despite such efforts there was no unity among the citizens and maintenance of the Greek Poleis was in danger and at last it came to an end6.This source has provided detailed information about Aristotle`s role and downfall the Greek cities. Undoubtedly, this source has explored historical

Friday, October 18, 2019

Health Care Incident Reported in the News Essay

Health Care Incident Reported in the News - Essay Example Courtois is a diabetic patient who was treated in Redding Hospital in 2010 did not consent to the decision of the hospital’s chief executive and medical officer in disclosing her treatment information. This followed allegations that the hospital was involved in overbilling Medicare. The officials of the hospital also failed to report the violations of the patient’s privacy as postulated by the HIPAA. Courtois daughter said that â€Å"we are appalled by the number of people they shared the information with" (Terhune, 2012). Among the journalists into whom the patient information was disclosed were those from the Times. It is reported within the news article that Prime Healthcare Inc. is to face up to $ 250 000 fines for these violations (Terhune, 2012). This essay is based on this story and aims at examining and evaluating how governance, organizational structure, culture and lack of social responsibility led to the violation of the patient’s privacy by the hospi tal. The essay also presents recommendations on resources and changes that would help to preventing future violations of patient privacy in relation to the ethics of patient care. The health care situation that is described within the Los Angeles Times is a case where the rights of patients for confidentiality and privacy of treatment information are violated by a health care system. ... It is in this regard that it is apparent that the hospital is obliged to take responsibility for its legal and ethical misconduct. Nonetheless it is important to note that the violation of HIPAA provisions for patient privacy is legally wrong regardless of the number of people with who patient information is disclosed (Moore, et al, 2009). Darlene Courtois’ case however received the attention of the media and the legal system because many health care providers and journalists got access to the patient’s treatment records without consent. The organizational structure at the Redding Hospital’s hospital is topped by the chief executive. This official is followed by the medical officer. Below these officials are the medical health records officers and other workers. The fact that private patient information was disclosed to the journalists by the chief executive and medical officer reflects that they had direct influence on the medical health officers from whom this information was obtained. This reveals an organizational culture where the top executives exercise roles beyond their lines of duty. Moreover, the health records officers were coerced to provide the patient information to the senior executives. This demonstrates that the health records officers failed to adhere to the ethical and legal requirements for confidentiality and privacy of all patient data. This case also reveals an organizational culture where workers fail to take legal responsibility by reporting medical misconduct in relation to patient data. This is revealed that the health care workers who were emailed the patient data failed to report the violation HIPAA provisions. This case came into light of the legal system because it was featured in

Anselm's ontological argument Essay Example | Topics and Well Written Essays - 1000 words

Anselm's ontological argument - Essay Example Whereas ancient Greek philosophers, such as Plato and Aristotle, hinted at the existence of a God, Anselm’s ontological argument offered one of the first expressly rational proofs for the Judeo-Christian God. In this paper, the author examines the ontological argument of St. Anselm by taking a look at the argument itself, and analyzing both the value and criticisms against it. Further, the discussion examines the influence of the ontological argument on modern thought, particularly Rene Descartes’ revival of the said proof. The ontological argument derives its name from â€Å"ontos†, meaning â€Å"being†. The term â€Å"ontological† signifies an emphasis on the â€Å"being† or â€Å"nature† of an entity. An ontological argument, therefore, derives its strength from the nature itself of what is argued for. In the case of the ontological argument of Anselm, it is referred to as such because it seeks to prove the existence of God by appealing to the nature of this Supreme Being, or perhaps more correctly, to the definition of the latter. He argues that to have an understanding of God as that than which nothing greater can be conceived, entails the acceptance of God’s existence since such a conception necessitates existence. He states: Therefore, if that than which nothing greater can be conceived, exists in the understanding alone, the very being than which nothing greater can be conceived, is one than which a greater can be conceived. But obviously, this is impossible. Hence, there is no doubt that there exists a being than which nothing greater can be conceived, and it exists both in the understanding and in reality (Fremantle 89). It can be seen that such a proposal allows for a proof that is â€Å"built in† the term, so to speak. For if God is such a being, then it is of necessity that he must exist, since not to exist would mean that there is another being that is greater still, namely, one that exists. Thus, Anselm quotes Psalm 14:1

Thursday, October 17, 2019

Literature Review - Increasing the retention and graduation rate of Essay

Literature Review - Increasing the retention and graduation rate of Latino college students - Essay Example This trend has conventionally flared up many issues of equity and race because of a resulting decrease in the economic prosperity and social status of Latino minority in America in comparison to the White majority. After a steady decline in college participation of Latino students between 1970s and early years of the decade from 1980 to 1990, the percentage of their college attendance has increased. However, this increase in college attendance of Latino students is accompanied with an increase in the stratification of institutions. According to Karen (1991 cited in Thomas, 1998, p.1), a vast majority of the Latino students joined the institutions which would generate least socioeconomic returns. After completion of high school studies, most Latino students seek admission in two-year colleges unlike their White peers, who go for a four-year enrollment in college. Lack of provision of high quality education to students from such minorities as Latinos ruins their future and they lag beh ind others financially (Lynch and Engle, 2010). The increase in population of Latino students in American colleges that has occurred in the recent years has exposed the university personnel to numerous types of challenges that revolve around the factors affecting the retention of these students. Within the Latino community, there exist a lot of differences in the ability to obtain education. According to Creighton (n.d.), these factors can be divided into four types. These four types are personal factors, involvement factors, environmental factors and the socio-cultural factors (Creighton, n.d.). These factors are discussed below: Personal factors include pre-college characteristics or background variables that vary from one student to another. Personal factors give explanation for the patterns of students’ adjustment in college. These factors include but are not limited to scores in tests, grade point average (GPA), the students’ academic self concept, availability of finances and support from the family. The traditional measurements of a student’s academic performance have long remained the criterion for admission into college. Such scales include the student’s GPA in high school studies and the score he/she gains in the college entry test. The level to which a student would be successful in the college is estimated on the basis of his/her performance in high school. According to Lesure-Lester (2003), â€Å"there is evidence that indicates test scores may not predict early college grades for Hispanic students as well as it does for White students† (Creighton, n.d.). The involvement of students in the campus community has a positive impact on their ability to learn. Involvement factors include the interaction of students with mentors, role of teachers, and their participation in the activities of students. The Environmental theory offers explanation for the association of a student with the environment in campus. Behavior of a student is heavily influenced by the environment of the institution. In a vast majority of cases, students tend to be discouraged because of the existence of oppressive factors in the environment. Such factors include racism, bullying, teasing and threatening. As Latino students form a minority in the US, they are prone to receiving racism by their peers

Cyber Worlds Essay Example | Topics and Well Written Essays - 1250 words

Cyber Worlds - Essay Example People have different arguments on this controversial issue some considering it as worthwhile while others viewing it as not safe and cost ineffective. Most people view prisoners as outcasts in the community and argue that they should not be treated well. Most countries do not allow inmates to have access to the internet arguing that it insecure and that they will not feel the pain of the sentence. They also say that access to internet may lead to them planning their way out since they can plan with people from outside. Denying inmates the chance to access the internet could also create more time for them to carry out other activities. Removing the family ties by no access to internet could also help them reform by feeling the pain that comes with being away from their families. Most prisons work under a tight budget and therefore removing the cost due to internet access could save much in the end. Prisons without internet access have been ranked top in terms of discipline in the prison and discipline of the prisoners in the outside world after the jail term is over. Internet tends to destroy morals of people in general and prisoners are not an exception. Therefore lack of access to internet reduces the chances of moral destruction .access to internet could also give inmates a chance to smuggle drugs by contacting the sellers of drugs. Access to the internet could also lead to the inmates keeping up with the criminal activities that are being incarcerated. Inmates have also been found taunting their victims through social media and lack of internet access could eliminate this. However, the disadvantages of denying internet access to inmates are very insignificant as compared to the advantages that it comes with. Inmates are human beings and they deserve to be treated like the rest of citizens (Bowden ,4).Prisons should be viewed as rehabilitation centers rather than centres of punishment. They should be

Wednesday, October 16, 2019

Crisis Management Essay Example | Topics and Well Written Essays - 1250 words

Crisis Management - Essay Example Reputation has now become a ticket to success because it is what earns revenue. A good reputation is built when the company conducts itself in a way it is expected to. Reputation is build and maintained through communication (Coombs, 1995). The accounting theory creates assumptions, methodologies and frameworks that businesses should use when applying the financial principles (Benoit, 2000). This aids in providing information that is objective, reliable, timely, clear, consistent and comparable. It is necessary to provide this information so that the stake holders, namely trade creditors, financial creditors, employees, shareholders, trade unions, the present and the current investors, can make decisions based on that information. The information released is not only used for outsiders, but it may also be used internally in order to correct the things and decisions that are wrong. In this sense, this accounting theory informs the discussion of this paper by emphasising on the importa nce of information and communication in decision making. A crisis is that unfortunate situation that has created a threat to an organisation and its clients, and the organisations' management has to respond to the ongoing threat (Hooghiemstra, 2000). Action has to be taken otherwise the problem was not a threat to be categorised as a crisis. The structural functional systems theory provides some insight into crisis management. It emphasises information flow in an organisation through patterns called networks. It implies that companies with rich communication channels that are clear are able to handle crises better than those who do not. The diffusion innovation theory informs the theoretical framework of this study by providing and describing that innovation is disseminated and communicated only through certain channels over a period of time making consistency of essence (Benoit, 1995). The Case Context This study will examine a case where there was a crisis and how well, or otherwi se, was it handled. The case chosen is that of Toyota crisis of 2010 involving faulty accelerators and braking systems. On 29th August 2009, a police patrol officer Mark Saylor was cruising down the highway at well over 100 kph when he realised that the breaks were not working and that the accelerator was stuck in. It finally ended up crashing on another car killing four people. This was the onset of this crisis as several other accidents followed in that month up to the end of the year before the Toyota Company decided to recall all the Toyota models that had been affected by that defect (McDonald, 2010). Data It is only after a hyped media reporting that Toyota came out publicly to admit that there was a problem. This was in January 2010, and 34 drivers had already lost their lives. It was clear that Toyota was in a crisis, and it owed it to its customers and the society at large to take action. It therefore, took the high road action of recalling more than 16 million vehicles wor ldwide with 10 million of those being in the US (Bensinger, 2010). At this time, the crisis was already at an advanced stage but Toyota being a market leader in Automobile manufacturers had its image, identity and reputation at stake. The only available measure was to hold a press release in which they were to admit that there were vehicles that were manufactured at a certain period of time and had unintended accelerators and faulty breaking system (McDonald, 2010). On February 1 2010, Jim Lentz, Toyota’s CEO in America held a press release meeting on behalf of Toyota’

Cyber Worlds Essay Example | Topics and Well Written Essays - 1250 words

Cyber Worlds - Essay Example People have different arguments on this controversial issue some considering it as worthwhile while others viewing it as not safe and cost ineffective. Most people view prisoners as outcasts in the community and argue that they should not be treated well. Most countries do not allow inmates to have access to the internet arguing that it insecure and that they will not feel the pain of the sentence. They also say that access to internet may lead to them planning their way out since they can plan with people from outside. Denying inmates the chance to access the internet could also create more time for them to carry out other activities. Removing the family ties by no access to internet could also help them reform by feeling the pain that comes with being away from their families. Most prisons work under a tight budget and therefore removing the cost due to internet access could save much in the end. Prisons without internet access have been ranked top in terms of discipline in the prison and discipline of the prisoners in the outside world after the jail term is over. Internet tends to destroy morals of people in general and prisoners are not an exception. Therefore lack of access to internet reduces the chances of moral destruction .access to internet could also give inmates a chance to smuggle drugs by contacting the sellers of drugs. Access to the internet could also lead to the inmates keeping up with the criminal activities that are being incarcerated. Inmates have also been found taunting their victims through social media and lack of internet access could eliminate this. However, the disadvantages of denying internet access to inmates are very insignificant as compared to the advantages that it comes with. Inmates are human beings and they deserve to be treated like the rest of citizens (Bowden ,4).Prisons should be viewed as rehabilitation centers rather than centres of punishment. They should be

Tuesday, October 15, 2019

Problem of unemployment Essay Example for Free

Problem of unemployment Essay Unemployment is a serious problem in our country, which leads to poverty. Many people are eager to find jobs SuPport themselves as well as their families but there are not enough jobs for everyone. As a result the problem of unemployment is seen at every level. Lack of job opportunities has brought depression and hopelessness among our youth. It has made them to go astray which creates many other problems like drug addiction, identity crises, etc. Let us first examine the causes of the problem of unemployment before discussing the various ways and means of solving this problem. There are many reasons for the problem of unemployment in our country. One of them is the slow growth of our economy, in relation to increase in the number of educated persons. When an economy is growing, there are plenty of jobs for everyone. Our economy has grown and there has been development but not enough to generate sufficient number of jobs. Another factor that has led to unemployment is the growth in population. Ours is a thickly populated country the population increasing by leaps and bounds. But jobs and gainful avenues cannot be generated in the proportion. The jobs are restricted in number but the people applying for them are many. So, a large section of people is left without job. The growth in education has resulted is larger number of people looking for white collar jobs, which are not available. Again, education is often not aimed at providing people with vocational skills. So their scope for employment remains limited. At the same time, the growth of mechanization and more sophisticated machinery is important for the development of industry. But this often means few people are required for specific jobs. As a result there is more unemployment. It is the responsibility of the government to provide jobs for all those who are able to work. It has started schemes like the Jawahar Rozgar Yojana, Swarnajayanti, Gram Swarozgar Yojna and other in rural areas. Loans are also given- to encourage self employment and small scale industries. Technical and vocational education should be stressed. When people get technical and vocational education, they will not hanker after services on completing their education. They will come out well prepared to stand on their own legs. They will choose a profession in accordance with their capability and aptitude. This will help in solving the problem unemployment. J M It is also necessary to check the rapid growth of our pulation. There must be laid on family planning in this regard. After population is controlled, we can easily overcome the problem of unemployment. Unless this problem is under control, all round development of our country can never be possible. Hence, it is necessary to bring awareness among the common mass.

Monday, October 14, 2019

The Impacts Of Invasive Alien Plants

The Impacts Of Invasive Alien Plants Chapter 1 Research on the impacts of invasive alien plants (IAP) on biodiversity, ecosystem services and processes have been well documented in the literature. Furthermore, the primary focus of this research was the negative impacts associated with IAPs when there are some benefits associated with these plants. Limited research has also addressed the issue of IAP impact on the livelihoods and well-being of local land-users. Seeing that limited resources are available to address the issue of IAP at large, quantification of stakeholder perception is needed to maximise IAP management. Through this thesis, an investigation into the spread and impacts of IAPs in the rural parts of the Agulhas Plain as well as the perceptions, uses, costs and benefits associated with IAPs and the importance of these plants to the livelihoods of the local communities was carried out. The purpose of this research is to provide a better understanding of the possible impacts of invasive plant species on the livelihoods of people. This local knowledge can aid researchers by providing context specific information about impacts, which can then be used for future conservation actions. Motivation The detrimental effects of IAPs on ecosystems and biodiversity, ecosystem goods and services the economy of human enterprises and human health have been well documented in the literature (e.g. Geesing et al. 2004, Nel et al. 2004, Shackleton et al. 2007). Invasion by alien species have been reported as a major threat to the biodiversity and functioning of sensitive ecosystems (Turpie et al. 2003, Richardson and Van Wilgen 2004, Van Wilgen et al. 2008). It has been shown that invasive species are very successful in competing for resources with native species and can modify fuel loads by changing the amount of litter fall (Behenna et al. 2008). Invasive alien plants are also capable of altering the natural nutrient fluxs by shifting the nitrogen content due to changes in the litter fall (Behenna et al. 2008). Dense stands of acacias along the rivers in the Western Cape replace and exclude native fynbos species (Blanchard and Holmes 2008). Invasive alien plants also pose one of the grea test immediate threats to floral diversity in the fynbos and have the ability capture vast amounts of water (Turpie et al. 2003). In contrast, research exploring the effects of IAPs on the livelihoods of local, rural communities has received little attention (McGarry et al. 2005, Shackleton et al. 2007). Not all of the impacts exerted by IAPs are negative as these plant species is a source of both costs and benefits (Bardsley and Edward-Jones 2006). Various plants have been introduced to South Africa for a variety of purposes (Van Wilgen et al. 2001). These include species intrudes for crop production, timber and firewood, garden ornamentals, for dune stabilisation and hedge plants (Van Wilgen et al. 2001). Several of these have become naturalized and some of the naturalized species are now invasive (Van Wilgen et al. 2001). Costs are experienced when these invasive species impede the functioning of social and ecological systems (Bardsley and Edward-Jones 2006). Benefits, on the other hand, are experienced when the same traits (such as hardiness and high fecundity) that lead to these species becoming invasives, contribute to their usefulness (Bardsley and Edward-Jones 2006). Rural communities are exposed to IAPs in different ways (Shackleton et al. 2007). The outcome is that that these communities have to weigh up the trade-offs between the possible positive benefits of IAPs as a natural resource and the negative impacts exercised by these species on ecosystem goods and services and in turn on human livelihood (Shackleton et al. 2007). It is generally accepted that the negative effects of IAPs on ecosystem goods and services are transferred directly to human well-being (Shackleton et al. 2007). This has been proven otherwise by researchers such as de Neergaard and others (2005), Shackleton and others (2007) and Kull and others (2011) who illustrated that IAPs can be integrated significantly by local communities in their lifestyles as either a source of tannins and timber, for firewood, building material, as well as for medicinal extractions and financial income by selling of firewood. Working for Water (WfW), an IAP eradication programme, was launced in 1995 with the aim of restoring natural capital by controlling invading species and enhance water security (Van Wilgen et al. 1998). Simultaneously, the programme aims to alleviate poverty by providing employment to underprivileged communities (Van Wilgen et al. 1998). To date, the WfW programme has developed into one of the biggest conservation projects in Africa with regard to manpower, costs and impact (Ndhlovu 2011). Immense sponsorships have contributed towards extensive areas being cleared and a large numbers of individuals being employed (Binns et al. 2001, Turpie et al. 2008). Conversely, the socio-economic benefits of the WfW programme have not been wholly assessed regardless of the programmes extensive activities and substantial sponsorships associated with it (Turpie et al. 2008). Additionally, the use of these plants by rural communities is not well understood and seldom integrated into eradication programmes as stated below: The lack of information on the socio-economic impacts of IAS has been singled out as a major barrier to the implementation of comprehensive national IAS management programmes and as one of the main reasons for the failure of IAS issues to feature prominently in the mainstream agenda of most countries (Peter, 2009). Quantification of stakeholder perception on the impacts of IAPs is essential in order authorize an argument for the control and management of invasive plant species (Peter, 2009). Though it is vital to understand anthropogenic impacts on landscapes and ecosystems through ecological knowledge of invasive species, an improved understanding of the social processes is also required to inform both species management and conservation policy (Peter 2009). There is a shortage of information regarding the socio-economic impact of alien species presently found in South Africa. Even in well studied areas such as the Cape Floristic Region, the range of the impact of invasive plants is poorly understood. Additionally, limited research has also been done with regard to the socio-economic impacts of alien eradication programmes in the Western Cape. Consequently, there is a need for comprehensive research that investigates the holistic impacts (both negative and positive) of IAPs on the livelihoods and well-being of local communities. Goals and Objectives Considering the above, the objective of this study was to assess the effects and impacts of IAP infestation on human well-being, with the focus on the effects of IAPs on the livelihoods of rural land users in the Western Cape, South Africa. The main research question that directs the study is as follow: What are the impacts of invasive alien plants on the livelihoods of rural land users? This research question was broken down into seven key questions. These key questions were adapted from the literature (see McGarry et al. 2005). Key Questions What is the significance of the natural environment to the community? What are peoples attitudes towards and perceptions of IAPs ? How important are IAPs for human well-being and livelihoods? Are the IAPs used for sustenance, for domestic requirements, etc.? Are IAPs sold to provide an income? Does the local community perceive IAPs as having a positive or negative impact on spirituality, culture and/or aesthetics? How do IAPs in the area affect the supply of (other) ecosystem goods and services which are important to peoples livelihoods? What are peoples attitudes towards IAP management? What are the impacts of IAP eradication programmes on livelihoods? What is the impact of IAP distribution on land-use practices? What are the long-term and short-term gains and losses for human well-being and livelihood as a result of IAP impact? The study site is highly dependent on areas where rural communities are still highly reliant on generating an income from the land. Additionally, the study site must also comply with the use of IAPs by the local community and in the same light IAPs must be potentially regarded as a problem by the local community. The Agulhas Plain, situated within the Cape Floristic Region (CFR), has been selected as the focus area for this study as it meets the above mentioned criteria. Study area The Agulhas Plain (AP) is located within the CFR which is internationally known as a global biodiversity hotspot (Turpie et al. 2003). The CFR, known for its Mediterranean type climate, is the most floristically rich of the seven diverse biomes allocated in South Africa with an estimated 9600 plant species of which 70% are endemic (Richardson and Sekhran 2009). The AP, comprising an area of 270 000 ha, is located at the southern-most tip of South Africa and is a species-rich area known for its fire-prone coastal lowland fynbos and infertile soils (Richardson and Sekhran 2009, Treurnicht 2010). It is internationally recognised as a centre for endemism (Treurnicht 2010). This area is however increasingly threatened by habitat transformation and alien plant invasion (Turpie et al. 2003), the latter being the focal point of this study. Fynbos wildflower farming and harvesting, particularly from natural vegetation, forms an integral part of this areas economic activity and contributes immensely to this regions agricultural sector (Treurnicht 2010). This has been shown Turpie and others (2003) who stated that natural fynbos vegetation are estimated to be accountable for 57.6% of the CFRs turnover, which were equal to R90.5 million in the year 2000. The Agulhas Plain is practically responsible for the largest part of this turnover (Turpie et al. 2003). Study limitations It was not possible to do a systematic and exhaustive research in all the areas on the Agulhas Plain were IAP infestation occurs due to the time limitation of this study. It was thus decided to do a detailed and comprehensive micro focus i.e. case study on the socio-economic impacts of invasive alien plants and to gather as much consistent information as possible by means of interviews. Elim and the surrounding farming communities were accordingly selected as the study group. Study site selection Elim and the surrounding farming communities were chosen as the best suitable study site according to the following reasons: It was established during the visits prior and during the pilot study that this rural settlement and its neighbouring farms still relies on woody IAPs as either a primary or a supplementary source of energy. It was noted during field visits that the areas surround the settlement as well as the neighbouring farms are invaded to a substantial degree. There has been active alien eradication programmes in the area since 1998 i.e. Working for Water as well as LandCare under the departments of Water Affairs and Agriculture respectively. Thesis outline Chapter 1 Introduction Chapter 2 Literature Review Chapter 3 Methods, Results and Discussion Chapter 4 Implications for management and policies

Sunday, October 13, 2019

Cloning and Mind Zombies :: Cloning Argumentative Persuasive Argument

Cloning and Mind Zombies Cloning, is it the thing of the future? Or is it a start of a new generation? To some, cloning could give back a life. A life of fun, happiness, and freedom. For others it could mean destruction, evil, or power. Throughout this paper, you the reader, should get a better concept of cloning, it's ethics, the pro's and con's, and the concerns it has brought up. You will hear the good of what cloning can do and the bad that comes with the good. Most of the information you will read about in this paper is what might become of the future. Even though the cloning of humans can not be accomplished. When it is the possibilities are endless. What is cloning? How did it get started? Well, it is like this. A clone is a genetic copy or a replica of an living organism. But, when you gear cloning doesn't a Si-Fi movie come to mind. Like when they take a nucleus, place it in a egg, put the egg in a incubator, and when it hatches it's an exact replica of the original being (Lawren). Though this has been done with frogs it has not yet been accomplished with mammals (Lawren). Another way to make a clone, as they do in the cattle buisness, is to split the cells of a early multi-celled embryo which will form two new embryos (Lawren). For it to get started into practice it took more than fifty years of questioning and testing. The first successful cloning experiment involved a leopard frog. It took place in, 1952 with group of scientist from the Institute for Cancer Research in Philadelphia (Lawren). To clone the frog they used an embryonic frog cell nucleus(Margery). 1962, John Gurdon of Cambridge University cloned a toad that survive threw adulthood and was able to reproduce. He was also the first to take a nucleus from a fully contrast tadpole intestinal cell and cloned toads(Robertson). As you can see we are getting close to the cloning of humans. 1981, Steen Willadsen was the first to clone a artificial chimera. He did this by mixing a sheep and a goat getting the result of a "geep" (Lawren). It had the body shape and the head of a goat, and a dappled coat which had large patches of sheep's wool. 1984, Willadsen cloned the first verifiable mammal, using embryonic nuclei transplant into an unfertilized sheep egg. Also in, 1986, when he worked for Texas bioengineering company (Lawren). By using the embryonic nuclei, he produces the first cloned calves from cattle.

Saturday, October 12, 2019

Working With Survivors of Trauma Essay -- Post-traumatic stress disord

Bio-psychosocial Assessment Presenting Issue Spartacus came to seek the help of a mental health specialist since he was experiencing a number of difficulties in his life after his service at the U.S. Army. He â€Å"felt different† on his return to home and found it exceedingly tough to blend in into the family life as he did before going to serve in the army. The emotional attachment he had with his family members such as the wife and the son had disappeared. Spartacus not attend to the son accordingly as a father should. Though he knew that this was not right, he could not bring himself to a solution and that is the reason why he sought specialized help. The problem had persisted for a while and Spartacus knew that the situation was getting worse. It was interfering with his day-to-day functioning. He wanted help so that he could revert back to his normal function just like in the period before living for the military. He could not sleep, he was constantly nervous, he felt less motivated and showed a general loss of ap petite. Demographic Information Spartacus is an African American male aged 25 years. He has served in the U.S. military for with multiple deployment to Iraq and Afghanistan. He had returned to his home in U.S having suffered many physical injuries during one of the combats. He was (and is still) married to Tamika and they have a son who is three years old. Current Living Situation Spartacus spent most of his time in solitude, away from the wife and son. He easily got irritated and found comfort in smoking cigarette. In his loneliness, Spartacus could spend many hours replaying the scenes from his combat experience. He always felt jumpy. Birth and Developmental History Having been born 25 years ago... ... useful evidence that helped in coming up with the right treatment for Spartacus. Bibliography Chang, Y., & Hsiao, S. (2006). Quality of Life: Scaling with Maslow‘s Need Hierarchy. Gerontology, 52(6), 376-376. Hofmann, S. G. (2007). Enhancing exposure-based therapy from a translational research perspective. Behavior Research and Therapy, 45(9), 1987-2001. Kennedy, J. E. (2007). Posttraumatic stress disorder and posttraumatic stress disorder-like symptoms and mild traumatic brain injury. The Journal of Rehabilitation Research and Development, 44(7), 895-920. Resick, P. A., & Miller, M. W. (2009). Posttraumatic stress disorder: Anxiety or traumatic stress disorder?. Journal of Traumatic Stress, 22(5), 384-390. Taylor, S. (2004). Understanding and treating health anxiety: A cognitive-behavioral approach. Cognitive and Behavioral Practice, 11(1), 112-123.

Friday, October 11, 2019

Applications of cryptography

Looking for the â€Å"best† websites in cryptology is a daunting, if not an impossible task. This is because, as I started searching the Web for interesting sites on cryptology, I found that there are just so many. The task is made even more difficult by the fact that cryptology is such a broad subject which encompasses several sub-subjects. Nevertheless, I have to choose three sites. Basically, I just set two criteria for choosing a site: it has to be interesting and it has to be easily understandable even when the content is technical.Being a history enthusiast, my search for fascinating contents led me to a website that features cryptology in the 16th and 17th centuries. It can be accessed via the link http://home. att. net/~tleary/cryptolo. htm and is written by Thomas (Penn) Leary. One of the reasons I was drawn to this site is the existence of an author for the site. With internet access and blogging accessible to almost everyone, I tend to get wary of websites whose aut hors are unknown for I feel that this lessens the reliability of the site and its contents, unless the site belongs to a company or organization whose reliability cannot be questioned.The content starts with a philosophical statement by Blaise de Vigenere, something which I found quite endearing. Being primarily a non-technical site, it avoids the use of cryptographic jargon and instead uses words easily understandable by almost any reader. Examples of the early kinds of cryptology such as the Elizabethan cryptology (uses numbers to encipher letters) were discussed in the site. Several paragraphs in the site are attributed to Johannes Trithemius, a German monk who is also considered the first theoretician in cryptography.Most of his schemes also include steganography, a close cousin to cryptography, which involves concealing the existence of the message itself. Aside from that, Trithemius contributed much to the existence of polyalphabeticity. His tableau, which he called his  "tabula recta†, uses the normal alphabet in various positions as the cipher alphabets. Giovanni Battista della Porta, another famous early cryptographer received a highlight in the site. Likewise, the use of acrostic, a cipher which involves using the first letters of a poem in order to form a word, was also given emphasis.Poets in the Italian Renaissance and during the Elizabethan period were reported to be quite fond in using acrostic. Although quite non-technical, this website appealed to me because I can look back and trace the early days of cryptology when there were no computers and other modern crypto graphing equipment. It is fascinating to note that the state-of-the-art cryptography used nowadays evolved from relatively simple ciphers such as Trithemius’ tableau and acrostic. In terms of information presentation, the website did quite well and the information was arranged in a clear and systematic manner.Furthermore, the author cited several works which I find commendable as most of the websites today obtain information from other sites, books and journals without acknowledging these sources. As for the technical side, I found David Wagner’s (1999) discussion of the Boomerang Attack quite interesting. His paper can be accessed by this link: lasecwww. epfl. ch/intranet/proceedings-iacr-98-03/papers/1636/16360156. pdf, although I believe it originally came from www. cs. berkeley. edu/~daw/papers/boomerang-fse99. ps. As you might have noticed I’m quite a stickler for the reliability of website contents.Apart from the topic being quite interesting, I chose this website because it came from an academic institution, which I believe screens articles and papers before posting it in their website. Even for non-technical readers, Wagner’s (1999) introduction to the concept of a boomerang attack is quite comprehensible. He started by describing differential cryptanalysis, a powerful cryptanalytic technique. Because of such power , differential analysis has been used to break many published ciphers. Block cipher designers therefore ensure that their design is secured from differential attacks.Algorithm designers usually compute an upper bound p on the probability of any differential characteristic on the cipher. The designer then invokes an often repeated â€Å"folk theorem† stating that any successful differential attack will require at least 1/p texts to break the cipher, thus making a conclusion that the cipher is safe from differential attacks. In order to prove this â€Å"folk theorem† false, Wagner (1999) exhibited an attack – in this case the boomerang attack – that allows an opponent to beat the 1/p bound in some cases.Let’s say the best characteristic for half of the rounds of the cipher has a probability of q, a successful boomerang attack will therefore need O (q-4) chosen texts. In some cases, q-4 > 1/p, in which case the boomerang attack will be able to beat th e folk theorem’s bound. Basically, a boomerang attack is still a differential-style attack but does not try to cover the whole cipher with a single pattern having a significantly large probability. Instead, the attacker tries to find two highly-probable patterns, though not necessarily related to each other, but when taken together can cover the whole cipher (Standaert, Piret, Quisquater, 2003).Wagner (1999) does not only discuss boomerang attack theoretically and only through probabilities, he showed how boomerang attack can be used to break COCONUT98, a cipher that rely on decorrelation techniques for its design. The breaking of COCONUT98 suggests that decorrelation design may fail to give enough security against advance differential attacks when caution is not taken. Therefore the use of decorrelation techniques is not a total guarantee of safety against differential-style attacks.Nevertheless, a decorrelation design still improves the cipher’s security such that in the absence of a decorrelation module, COCONUT98 will be more vulnerable to conventional differential-style attacks. Wagner (1999) also demonstrated the use of boomerang attacks on Khufu and FEAL, and included a description of â€Å"inside-out attack†, a dual to boomerang attack, with the boomerang attack working from the outside, while the â€Å"inside-out attack† works from the inside. In general, the site is very informative but I must admit, quite technical.One therefore does not approach it without having received a background on cryptology. Oliver Pell’s (nd) website, which he claims has won him a prize in a mathematics essay contest, is just as interesting. Accessed from http://www. ridex. co. uk/cryptology/#_Toc439908875, it presents a very useful overview of cryptology. Slightly technical, it comes in between the first two websites. Whereas the first is definitely non-technical while Wagner’s (1999) paper is definitely technical, Pell (nd) prese nts technical data in the simplest way possible.In fact, among the three sites, this one definitely stands out. The website content begins with the definition of commonly-used cryptographic terms, an indication that the paper is meant to be read by a wide range of audience including non-technical ones. The history of cryptography and cryptanalysis which followed the definition is quite fascinating and seems to me, well-researched. Ancient Egyptians, Hebrews and Assyrians already developed a crude form of cryptographic systems.Later on, the Greeks invented the first transposition cipher but it was the Arabs who were the first to have a clear grasp on the principles of cryptography and elucidated the beginning of cryptanalysis. In the more modern times, the uses of cryptography during the First and Second World War were also discussed. What follows is a detailed discussion on cryptography starting on how cryptographic systems are grouped: based on the mathematical operation that chang es the plain text into ciphertext using the encryption key, based on whether a block or stream cipher is produced, and based on the type of key used, whether single or two key.Substitution ciphers – ciphers wherein the units of the plaintext are replaced with symbols or group of symbols, transposition ciphers – rearranging of the letters of the plaintext without actually changing the letters themselves, block ciphers – symmetric-key encryption algorithms that changes a fixed length block of the plaintext into the same length of cipher text, and stream ciphers – also breaks plaintext into units but usually a single character are just some of the ciphers discussed in greater detail under the single key cryptography.A problem in cryptography – the key distribution problem – is also tackled. Such a problem usually occurs because both the sender and the receiver hold a copy of the key, but must also prevent others from getting access to the key. The solution to this problem, the two-key cryptography, is also discussed. Briefly, a two-key cryptography enables a user to possess two keys – one public and one private – with the public key used to encrypt the data to be sent, and the private key used to decrypt it.Some common applications of cryptography, such as protecting confidential company information and protecting a phone call just to name a few, are also presented. In general, the topic (Cryptography) is really well presented. At times when the topic gets a bit too technical (like algorithms), the author presents examples in order for the topic to be better understood. Such a well presented website content is quite uncommon and indeed deserves a prize. References Leary, T. (1996 July). Cryptology in the 16th and 17th Centuries.Retrieved September 27 from http://home. att. net/~tleary/cryptolo. htm Pell, O (nd). Cryptology. Retrieved September 27, 2007 from http://www. ridex. co. uk/ cryptology/#_Toc43990887 5. Standaert, F-X. , Pirret, G. & Quisquater, J-J. (2003). Cryptanalysis of Block Ciphers: A Survey. UCL Crypto Group Technical Report Series. Retrieved September 27, 2007 from http://www. di. ens. fr/~piret/publ/cg03-2. pdf Wagner, P. (1999). Boomerang Attack. Retrieved September 27, 2007 from lasecwww. epfl. ch/intranet/proceedings-iacr-98-03/papers/1636/16360156. pdf.

Thursday, October 10, 2019

Econ 256 Final

2. Why do economists generally regard median income as a better measure of a typical American's well-being than mean income? Dfiodifaje 3. Why do the United States, and many other counties, have antitrust laws on the books? What's so harmful about oligopoly that warrants an entire body of law? The United States and many other countries have antitrust laws on the books to protect their consumers in their different markets. Having the abilities to both raise and lower prices are the reasons that oligopolies are so harmful. . Two consumers go to the insurance company to purchase some life insurance. James is a smoker and a police officer who races motorcycles in his spare time. Kathy is a nonsmoker and a librarian who likes to make quilts in her spare time. The insurance company knows that both consumers are 40 years old, but the company has no information about occupations or hobbies. How does the private information in this situation create an adverse-selection problem? How could the insurance company lessen this problem? Without knowing the background information on the potential clients, insurance companies are without the ability to see that while James is risking his life as a police officer, he is also a smoker and racer. He’s putting his life on the line and still increasing the risk of injuries. The insurance should have a line on their application that asks for applicants for their occupation, whether they are smokers or if they drink, and lastly what they enjoy doing in their spare time. With having this information, the company can see what each of the individuals really needs insurance-wise. 6. Jane works part-time and earns $12,000 per year. Because she is below the poverty line, she also earns $4,000 in various welfare benefits. Suppose she is offered a new job that would pay her $15,000 and would bring her earnings high enough so that she no longer qualified for any welfare benefits. This is what is known as a â€Å"notch†. Explain what is happening with Jane and how could we modify the system to eliminate the notch.