Monday, September 30, 2019

The Global Flow of Silver

The flow of silver affected the world through the mid 16th & early 18th century in many ways. When countries had more silver, there was less bartering & more slavery. People traded less because they could just buy what they needed. Economically, more power was given to countries with more money which is called Mercantilism. Documents 3 & 5 are reflecting on social change and how silver altered the way the Chinese lived. In document 1, it talks about the frugal man will always have something left but the extravagant man never has enough, this is showing how wealth makes people greedy & the government trying to maintain order by putting limits on wedding expenses. The point of view of this document is of a county official during the Ming dynasty who is under the Confucius value of frugality, making the document biased because he was against the capitalistic values of the extravagant man. Document 3 talks about how the elders of a specific district explain why the price of food is cheap because the scarcity of silver because the national government isn’t distributing silver back to society, but makes it part of tax. I believe that this is biased because he was a court official and this relates to problems within his own community. Document 2 & 4 is about the effect of silver in Spain. Document 2 states that high prices of Asian goods ruined Spain economically, meaning Spain would need more silver to pay for them. Document 4 says that since Spain needed more silver, they traded their goods such as perfume, gold, porcelain and white silk to Japan. Document 7 is about how they usually trade good for good but with foreigners its good for silver because they would sell it for more than its actually worth. Document 7 was biased because He Qiaoyuan was a Ming Dynasty court official & he didn’t want to ban foreign trade, so he was defending it saying that they could make more from it. Documents 6 & 8 are about social effects. Document talks about how hard they have to work to excavate silver. Document 8 is about how they were replaced in the space trade by the Dutch and they had to trade dyed cotton cloth, silks, drugs, cotton yarn and wool. Document 6 is biased because Antonio Vazquez de Espinosa was a Spanish priest and he didn’t work in the fields to excavate silver, so he really didn’t have 1st hand knowledge of that. Silver changed countries socially and economically. It had major effects in Spain and because of mercantilism they had to trade goods for silver. Economically, they needed more silver and they had to cut down prices and get more goods to get more silver.

Sunday, September 29, 2019

Ethics in Economics and Finance Essay

Ethics is defined as a standard of human behavior that offers how to act in many situations with friends, family members, employees, business people, professionals, etc. It is necessary to mention that to make really ethical decision means to use trained sensitivity to ethical issues. In other words, ethics is associated with acceptable human behavior in this or that everyday or scientific field. Ethics incorporates norms of conventional morality to distinguish ‘wrong’ behavior from ‘right’ behavior. Generally, ethical norms suggest honesty, truthfulness, fairness, integrity, justice and respect for others. Ethics is applied to all aspects of life as, for example, medicine, psychology, business, finance and economics. Financial and economic ethics is considered subset of general ethics. (Frowen, 1995, p. 46) Ethics and Ethical Norms Researches argue that ethical norms and values play important role in maintaining harmony and stability in social life as ethics suggests proper ways of human-human interactions. Ethics recognizes human needs and aspirations, as well as cooperative efforts, fairness and truthfulness. Ethics contributes social stability and ensures balance in all spheres of life and business. Social evolution has developed instinct care in humans to take care of ourselves and of others. Ethical norms are necessary for guiding human behavior and it is refereed to when it is necessary to resolve conflicts between selfishness and selfishness, between conscience and material needs. In finance and economics ethical violations are associated with inconsistency in modern financial-economic theory. Violations are also attributed to inconsistencies in use if principal-agent model of relations in economic and financial transactions. It is noted that the financial-economic theory is based on the rational-maximizer paradigm which promotes capitalist system stressing that individuals are egoistic and they tend to behave rationally when looking for ways of maximizing their own interest. The problem is that modern financial-economic theory contradicts ethical norms of loyalty, fidelity, trustworthiness and stewardship. Moral values are the core of traditional concept of agency, but if humans are claimed to be rational maximizers, then traditional sense is impossible. (Frowen, 19995, p. 47-49) For example, Duska argues that â€Å"to do something for another in a system geared to maximize self-interest is foolish. Such an answer, though, points out an inconsistency at the heart of the system, for a system that has rules requiring agents to look out for others while encouraging individuals to look out only for themselves, destroys the practice of looking out for others†. (Duska, 1992, p. 61) Ethics in Finance Ethics in finance plays important role as it aims at ensuring fair deals and transactions. Moreover, ethics in finance addresses corporate governance, and agency relationships which should be purely contractual. In financial sphere, ethical behaviour should be based on carrot-and-stick approach. In corporate governance the conflict between stockholder and management is described as agency problem. To deal with this problem an agency theory was developed. It stresses that the principal and agent are both self-interested aiming at generating their gain. (Dobson, 1993, p. 7) Researchers say that we tend to entail our needs as, for example, management of retirement savings or stock and bond investing, to financial services as we may fail to carry them effectively. We are not as organized as financial managers, but we are not aware of agency problem. Lack of necessary information limits our ability to monitor managers’ behaviour. Therefore, modern world is characterized by selfish behaviour as people are willing to get their things done by others. Such paradoxical situation explains ethical problems in financial sphere stressing that declining in morality is observed. (Dobson, 1993, p. 8) Ethical violations in finance are rather frequent nowadays and that mainly associated with stakeholder interest, insider trading, investment management and camping financing. Loyalty and trust in public and private dealings are often violated. The most common occurrences are fraudulent financial dealings, corruption in government and public institutions, influence peddling, cheating customers about their trading profits, insider trading, unauthorized transactions, misuse of customer funds in order to obtain personal gain, larceny and corruption in banks, improper pricing of customer trades, etc. Most frequently, unethical behaviour is associated with insider trading which is defined as trading in securities of particular company or organization with an effort to take advantage of information about material side of the company. In such a way, trade is provided with unfair advantage over other competitors in the same security. (Dobson, 1993, p. 59) Therefore, ethical codes are very important in financial filed as they set standards of acceptable behaviour, fair dealing and honest relations with customers. Ethical codes in finance tends to replace egoistic paradigm and to create such system which would promote, honesty, altruism and virtuous traits. It is rather common to fid ethical codes in modern financial markets and financial corporation. In financial markets such ethical codes are established by official regulatory agencies which are trying to ensure ethical and responsible behaviour as important part of all operations and transactions. Furthermore, re-examining of the core principle of capitalist society helps to address ethical problems in both financial and economic fields. Financial ethics suggests that individual should be presented as honest and altruistic promoting honesty and fairness in public and private dealings. The primary purpose of ethic in financial sphere is to set standards of internal good. (Dobson, 1993, p. 60-61) Ethics in Economics Ethics is related with economic sphere in three ways: economists should follow ethical values trying to shape the way they are doing economics; economic actors have ethical values which shape their own behavioural standards; finally, ethical values are important for economic policies and institutions as they affect people differentially. However, from economic perspective ethics is defined as a matter of choice for everyone. Many economists argue that ethical values contribute positively economic welfare. However, there are ideas that economics is ethically neutral. Economists are interested in implication of Adam Smith’s idea that all human are driven by self-interest and egoism. Smith argued that self-interest led to the common good of nation. (Wilber, 1996, p. 135) However, he agreed that human should act in terms of internationalized moral law and police power of the state. Therefore, it is recognized that in economic sphere all figures should act on the basis of acknowledged ethical norms as economy of every country needs efficient ethical behaviour to improve country’s reputation at the world scene. In economics ethics suggests avoiding corruption in government and promoting fair decision-making. It is a matter of fact that ethics is not an easy task for economic system and business as there will be always interest groups which will challenge ethical standards and values. Therefore, economics should pay more attention to ethics and social responsibility, as well as to set ethical codes of behavior. For example, businesses are defined as important institutions in any economic structure. Therefore, they are expected to follow ethical norms when deciding how to organize the work and to produce necessary goods and service. Businesses reflect the overall economic system and unethical behavior may create unfavorable reputation. (Wilber, 1996, p. 139) Conclusion Ethics plays crucial role in all aspects of life, especially in financial and economic sphere. In financial field ethics is associated with fair transactions and dealings, honest buyer-customer relations and avoidance of corruption. In economic field ethics is associated with social responsibility, ethical decision-making as the whole nation depends on them, and, of course, with no corruption on national level. Ethics is necessary not only for maintaining balance and harmony, but also for improving reputation of company, organization, and even country. (Frowen, 1995, p. 68)

Saturday, September 28, 2019

Mazda Case Essay

1. Analyze the role of integrated marketing communications in the marketing of automobiles such as the Mazda Protegà © and MAZDA6. How is each IMC element used to market automobiles? IMC played a very important role in the marketing of automobiles. Using the new IMC program, Mazda had a new segmentation and selected a new target market. The advertising of Protegà © and MAZDA6 made a big difference, the Protegà © advertisement focused on the target audiences’ inner mind and presented the life-related scene to strike a sympathetic chord. But MAZDA6 advertisement focused more on the performance of the car and made a â€Å"mature† image, spent more budgets in advertisement on the magazines, even cooperated with ESPN to appeal to sport fans (the target audience). The Mazda used some direct marketing like sending mails and CD-ROM to the client. Also set the website for the model to attract more people, especially the Protegà ©. Mazda gave a major push to the Protà ©gà © on the Internet including several fun activities and games, this Internet marketing made a huge success. The slogan and advertisements gave the audience a impression of the sporty, fun-to-drive Mazda. The IMC program of Mazda gave the company a second birth. 2. Evaluate Mazda’s decision to drop the â€Å"Get In. Be moved† tagline for the Protà ©gà © and adopt the â€Å"Zoom-Zoom† theme for is advertising. â€Å"Get In. Be Moved† was a powerful slogan for Mazda developed by Doner, it created a brand promise to consumers that when you get in a Mazda car, the car can get you moved. It was a success since it can stand for all the models of Mazda. But the question is this tagline could not demonstrate the spirit and the distinguishing feature of Mazda. Instead, the â€Å"Zoom-Zoom† phrase created an environment of senses for the audience. The â€Å"Zoom-Zoom† sound stand for the sound of the engine and wake the inner child of the target audience. This new phrase not only perfectly describe the sporty theme of Mazda, but also more appeal†¦

Friday, September 27, 2019

Gloagburn Farm Shop And Coffee Shop Essay Example | Topics and Well Written Essays - 2500 words

Gloagburn Farm Shop And Coffee Shop - Essay Example The restaurant also offers take away and picnic arrangements. Though the firm had previously won several awards in various categories, with the rising competition its future doesn’t seem very promising (PKC government, 2012). A situational analysis has been conducted using SWOT and Porter’s five-force analysis to assess its present situation and its future progress. 1.SWOT ANALYSIS 1.1Strengths 1.1.1 Products Gloagburn has a nice breakfast and lunch offering with options like porridge, eggs, bacon brunch and various coffee options. For lunch they offer fresh soup, sandwiches, baked potatoes and fresh bread etc. they also have a wide dessert variety like fruit crumbles, pies, cakes scones and different tarts to name a few. Such an offering is appreciated by the customers as the products a farm fresh that make all the difference (Gloagburn, 2012). The restaurant has also won Scottish Food and Drink Excellence Award 2009 and many other awards in 2004 (PKC government, 2012) . 1.1.2.Restaurant environment The main strength of the coffee shop is its location and its environment of a farmhouse. Customers get a feel of the countryside, which is its main competitive edge. Away from the hustle of city life the serenity and the friendliness of the place is what attracts the customers (Gloagburn, 2012). ... 1.1.4 Ingredients The ingredients are another factor that give the SME its competitive edge over the competition. This is because not every restaurant can boast to have in-grown ingredients like turnips, potatoes, fresh meat etc. 1.1.5 Low cost of production 1. 2 Weakness 1.2.1 The service The services was commendable when the restaurant was smaller, however, with the expansion by increasing the seating area outdoors also, the service is not as sufficient as before. This is because every order is prepared from scratch, which is good however, the wait for meal to arrive is long and the customers have to wait for a long time. The restaurant was fine with a smaller setup however; there are issues especially in terms of services when the restaurant increased on the size. There were some complaints regarding the attitude of the waiters towards the customers, which could in turn be bad for the customer flow and ultimately have a bad impact on the restaurant reputation. 1.2.2. Self-supplier s This is though considered a strength but it is also a weakness. This is because the supplies quantity is limited and thus there is only a certain amount that the restaurant can produce. After this limit is exhausted, more supplies cannot be obtained and thus this limits the expansion of the restaurant. Moreover, if on a particular day, the customers’ demand exceeds the farm’s capacity to produce, the customers will be disappointed. On the other hand, if a commercial restaurant is considered that outsources its supplies, it may not face this problem as it may over stock or under stock depending on the demand predictability (Gloagburn, 2012). 1.2.3 Losses in terms of decayed products. The restaurant may also

Thursday, September 26, 2019

Report 'Holyhead to Cowes' Essay Example | Topics and Well Written Essays - 2000 words

Report 'Holyhead to Cowes' - Essay Example It is in line with this that the report was prepared to give stakeholders a very vivid idea of the final costing and planning of the event. The report focused on key aspects of the planning that has been done so far and how the event is hoped to be delivered on the due date. Key areas of planning that has been put in place so far include completed work structure, costing structure, health and safety preparations, risk management, and communication plans. Based on these preparations that have been completed, it has been concluded that the university is in a position to successfully start off its race on the planned date. 2.0 Event Management 2.1 Pre-planning The pre-planning focuses on answering the 5W questions (Brenke &Wagner 2006). On the question of why the event is important, it would be noted that this is an event that will serve as a platform for the union to be of relevance to its society through the raising of fund to support society welfare. On the question of what will be p resented at the event, a simple answer of a cycling race will be given. There will be detailed information on where the event will take place but this could be summarised as following a route from Holyhead to Cowes. The event is planned to take place on the 4th of May 2014, in the open lanes of the identified route from 6am to 5pm on each day; and this answers the question of when. Lastly, the question of who is answered by identifying the stakeholders of the event, who include executives of the union, event planners, cyclists and community members 2.4 Event overview Generally, this is an event of fund raising cycle ride that is to take place from Holyhead on Angelsey to Cowes. The event can therefore be said to be made up of two major broad goals, the first of which has to do with the need to have a cycling race in place for selected cyclists. As part of the cycling component of the event, event planners are expected to gather thirty (30) cyclists in good standing who will be engag ed in competitive cycling sport from Holyhead to Cowes. The second component of the event is the fund raising, which requires the event planners to be in a position to put in place structures that will ensure that philanthropists and other donors give to a good course, which is being championed by WUCC. The whole event is scheduled to take place on the 4th of May, 2014. 2.3 Work Structure The structure of the event is expected to have five (5) major divisions or parts, which will be made up of route management, hotel booking, registrations, operations and marketing. The structure is however expected to follow a multi level approach, meaning that each of the major components will have its own sub divisions. For example under the route management, there is expected to be the appointment of team leaders who will further map out the required areas for the race. Under the hotel booking, it is expected that search will also be made for bike

Look at each questions, and answer the questions Essay

Look at each questions, and answer the questions - Essay Example , increased production levels, efficiency and employment all together positively impact the economics of free trade country as it results in rising living standards and increased real incomes (Edge, n.d.). In case of global or regional economic recession, the country’s economy is more dependent on global economy and therefore it is less stable in terms of export incomes, GDP, and employment in export-oriented industries. In the developing countries free trade has a high risk of â€Å"eating† smaller national producers/companies by large international giants as competition between these two parties would not be equal. In case there are no measures undertaken by government in order to protect national producer/manufacturer there is a high risk of occupation of the market by foreign goods (Edge, n.d.). (b) Assume that two countries are competitors in the international trade markets. The two governments are thinking about whether it is profitable to adopt a free trade policy or not. The entries in the table below are showing (in millions of pounds) the gains of each policy. Find the Nash equilibrium. Analyse how you conclude to your answer. The table below illustrates, that when there are imposed restrictions (tariffs) for both countries, both A and B countries lose. If country A introduces free trade policy, then country B will be better off with imposed restrictions as it gets 70 million of pounds with restrictions and only 60 million with free trade. If country A imposes restrictions, then country B is better off with high tariffs, as it will get 20 million of pounds with free trade and 30 million with imposed restrictions. If country B introduces free trade, then country A is better off with free trade as it will get 60 million with free trade and 20 million with imposed restrictions. If country B imposes restrictions, then country A is better off with imposed restrictions, as it gets 30 million imposed restrictions and only 20 million from free trade. The

Wednesday, September 25, 2019

Cause and effects of going without sleep Essay Example | Topics and Well Written Essays - 250 words

Cause and effects of going without sleep - Essay Example The inability to cope with stress results in emotional disturbances (such as anxiety, fear, and worry), overthinking, and restlessness preventing an individual from sleeping. Besides stress, other psychological factors that cause insomnia include psychological disorders (both personality and clinical mental disorders) and traumatic experiences (such as rape, close encounter with death or the death of a loved one). Conversely, insomnia might result from physiological complications. The brain is ultimately responsible for controlling sleep in human beings. The pre-optic area of the hypothalamus (anterior part) is the part of the brain that controls sleep. Therefore, damage to this area of the brain from accidents might cause insomnia. Other physiological factors that might cause insomnia include coronary diseases, cancer or respiratory diseases among others. Some medications used to treat diseases might affect regular sleep patterns among individuals. Finally, social factors that might contribute to insomnia include dysfunctional social interactions. For example, physically or verbally abusive relationships are a major cause of stress, which in turn affects different aspects of an individual’s life including sleep. The recreational use of some drugs and substances also affects the sleeping pattern. For example, caffeine found in coffee and Khat all cause insomnia (Brodsky & Brodsky 67) . In conclusion, the effects of insomnia are also explicable using a bio-psycho-social approach. Insomnia impairs optimum mental functioning. Fatigued individuals are highly irritable, which puts a strain on their social interactions. For example, they are prone to emotional outbursts and fits of rage both at home and at the workplace. In addition, insomnia impeded speedy recovery of sick individuals (Brodsky & Brodsky

Tuesday, September 24, 2019

Leadership Essay Example | Topics and Well Written Essays - 250 words - 44

Leadership - Essay Example Innovation is the hallmark for success in today’s dynamic world and therefore, healthcare professional must exhibit innovative ways and means to develop better ways of patient care in modern times. Innovative ideas of patient care leads to faster patient recovery enabling early discharge resulting into a significant savings to patient, insurance provider and nation (Reflections on Nursing Leadership, 2013). With the Affordable Care Act of 2010 in force, nurses will also be taking on leadership roles in healthcare services (Reflections on Nursing Leadership, 2013). In the current world, timely and clear communication with colleagues, superiors, patients, and their family members is utmost necessary to enhance the patient outcomes. Effective and clear communication is one of the most essential requirements for any healthcare professional in the success of organization. Collaborative approach through team work can bring miraculous results. In this process, mutual cooperation is must among all team members because tasks can be accomplished smoothly and successfully through exchange of ideas and collaborative attitude among team members (Gokenbach,

Monday, September 23, 2019

Explain the current relationship status between the public and private Research Paper

Explain the current relationship status between the public and private sector. Include a discussion on the relationship between local law enforcement and private security departments - Research Paper Example me, the police themselves have become much more open to the assistance of private security firms, and have even begun to go so far as to provide valuable assistance and to open up line of communication to aid in the crime prevention process. While there most likely still exists an ‘us against them’ mentality, the reality is that both security sectors are beginning to realize that they have the same core objective and can both mutually benefit one another by forming partnerships rather than barriers. As with any large and populated area, the United States is in need of security. Long ago it became obvious that government agencies, as skilled as they were, could not be in all places simultaneously, so without the assistance of private security firms many individuals and organizations simply would not feel adequately protected. For quite some time, there has been an effort on the part of government law enforcement agencies to liaison with such private companies to provide security functions to broader society, but some would question the sincerity of this movement. Most definitions of such liaison programs revolve the ability to effectively communicate amongst various parties. In the case of security interests, these parties would involve public law enforcement entities, private security firms, and various business organizations. To properly liaison, however, a mutual feeling of respect and trust must be established in order to facilitate the information sharing process, and such sharing should be consistent and cooperative in nature (Alimahomed, 2014). Unfortunately, this mutual spirit of cooperation is often lacking between public and private security agencies, causing a breakdown in communication that can serve to threaten the very safety of the individuals that the groups are designed to protect and defend. Throughout history, it seems that private security and respective public policing agencies has not always agreed to maintain a cordial and working

Sunday, September 22, 2019

The unpredictable course of revenge In the play Essay Example for Free

The unpredictable course of revenge In the play Essay In the play, Hamlet, Shakespeare is depicting revenge as something that is inevitable and starts a chain of reaction that ends in self-destruction. In the process of revenge there are foreign agents that are also trapped as the revenge progresses. This is when the play is at its peak. The eventual result is death of everyone with the exception of minor character, which played key role in the main characters development. In this case it is Horatio, Hamlets life long friend. The one common thing in the play is that the eldest son in each of the three families is avenging the death of their father. see more:theme in hamlet When Hamlet was in the process to take revenge of his father another action occurred, the killing of Polonious by Hamlet who is Laertes father. This shows how one revenge leads to another. Throughout the play Hamlet is slowed by many choices he has to make. One example is when he gets the chance to kill Claudius while he was in prayer he did not act. He did this because he wanted more than revenge that is he wanted Claudius to suffer eternally in hell. As Hamlet says, Now might I do it pat, now he is praying; And now Ill dot. And so he goes to heaven; And so am I revenged. That would be scannd: A villain kills my father; and for that, I, his sole son, do this same villain send To heaven (Act 3, Scene 3) There are many motives behind Hamlets revenge against Claudius. Apparently it seems that Hamlet wants only to kill Claudius but as the quote below describes Hamlet is depressed on the surface but inside him there is more trouble, because of his love of Ophelia. How is it that the clouds still hang on you? Hamlet: Not so, my lord; I am too much Im the sun. (Act 1, Scene 3) Here he is trying to conceal the real reason and is feigning madness. Hamlet wants Claudius to think that he is depressed because of death of his father. Another reason for his slowness is that he has inner conflict that he is unstable about. He is asking himself should he just take what fate has for him or should he try to change it. As Hamlet says in his speech To be, or not to be: that is the question: Whether tis nobler in the mind to suffer The slings and arrows of outrageous fortune, Or to take arms against a sea of troubles, And by opposing end them? To die: to sleep (Act 3, Scene 1) This is where he is thinking about the reality of life and asking himself should he face it or not. Hamlet determination for the revenge is so intense that he is asking is life worth living. Hamlet says, What is a man, If his chief good and market of his time Is but to sleep and feed? A beast, no more. (Act 4, Scene 4) Here he is asking that man only sleeps and eats that is all he does in a nutshell. He wants to know if this is the kind of life worth living. This shows that to Hamlet life is more than sleep and feed. It should be combination of more than these two things. He seems to be balancing his act of revenge against life. To him it makes sense because at least he will do something in life that is worth it, that is take revenge against his fathers death. In those days people were very religious and they adhere to their religion in every aspect of their life. That is why Hamlet does not kill Claudius right away because he wants to do it justly according to the Christian religion. This leads Hamlet to first prove Claudius guilt by performing a mock play and telling his friend, Horatio, to observe Claudius reactions as if they are guilty or not. Hamlet gets a second chance to kill Claudius but he forfeits the opportunity. Laertes is silent in the sense of what he is doing. He is a very respected in the court of the King because before going to France he asks the King for permission. Laertes also has good morals because of the advice he gives to his sisters. But as time goes by he starts to change because he got trapped in the chain reaction of Hamlet. Laertes life changes dramatically after his father polonius is killed by Hamlet by accident as the quote says, How now! A rat? Dead, for a ducat, dead (Act 3, Scene 4). Hamlet kills Polonius by accident. In the aftermath Ophelia drowns herself. Laertes and polonious have a very good relationship because he gives a fatherly advise to his son Laertes. In a way polonious also cares about his son because he sends Reynaldo to spy on him. This might seemed like a bad idea but it was normal in those days. After the death of Polonius Laertes blames Claudius for his fathers killing but King Claudius tells him that it was Hamlet who was behind the killing. This is when the play takes another turn because Claudius makes a scheme to kill Hamlet by poisoning him. As Laertes puts it: It is here, Hamlet: Hamlet, thou art slain; No medicine in the world can do thee good (Act 5, Scene 2) This is when Laertes is talking to Hamlet and tells him that he will poison him with venom that no medicine will come to his rescue. This shows dramatic change in Laertes attitude, which lead him to the revenge mode. Shakespeares implied message is that revenge is something that has unpredictable course and inevitably leads to involvement of others that are not relevant to the revenge. Hamlet only wanted to take revenge against Claudius but in the process he ends up killing Polonius. He had not in mind to kill him but circumstances lead him to a path that changed his life. This in turn has the domino affect because Ophelia drowns herself because of esoteric reasons presumably because of her fathers death.

Saturday, September 21, 2019

Critical Reading Of James Joyce Ulysses English Literature Essay

Critical Reading Of James Joyce Ulysses English Literature Essay James Joyces Ulysses, is generally regarded as a modernist novel. At the time when Joyce was: à ¢Ã¢â€š ¬Ã‚ ¦writing Ulysses he had set himself the task of writing a book from eighteen different points of view and in as many styles  [1]  . Historically, modernism is frequently linked with the rise of industrialization. The basic conflict was that modern life was different than the life of the past. Peoples lives had become increasingly complex at the time, and they were forced to play a number of different societal roles, the result was that life came to be fragmented and disjointed. In the modern world, language was being stressed upon as people tried to identify with one another. This essay will determine the modernistic ideas that James Joyces Ulysses presents, and the relation of it with Homers Odyssey. The essay will focus on the literary devices Joyce uses in his writing, and the effect of them on the readers and characters within the stories. In Ulysses, Leopold Bloom corresponds to Odysseus, however it is not easy to just read the story as a re make of the Odyssey as Leopold Bloom also corresponds to Leopold Bloom. Ulysses is in fact a particularly realistic novel, and Joyce makes sure he does not let the storyline be forced upon by allegory. Joyce turns a normal day in a mans life into a heroic tale by opening and analyzing his inner thoughts in depth. He attempts to bring in the motion of the story beginning with the sphere of conflict, and swiftly moving to the sphere of the mentality. There are many differences than similarities in the two stories of Ulysses and The Odyssey. While Odysseus goes from place to place, Joyce goes from style to style  [2]  . In many ways, Telemachus is simply a less formed version of Odysseus. He is shown to be a tad misogynist, while Odysseus is in many ways more womanly. He possesses several traits which only Homers female characters share, and he identifies with women in a way that no one else can, mainly with Penelope. In the Odyssey, Telemachus, the son of the hero Odysseus, grows up in a world of greed and disregard; he is one of the most significant characters throughout the whole story. During Telemachus journey to search for the news of his father, he is shown going through the development of growing up as an adult. From the start of the text he is conveyed as a simple silhouette of his father, however towards the end he is shown to become more like his father in terms of compassion and initiative. Although he comes into his adolescence at the beginning of the book, growing up without a father still makes Telmachus to some extent wretched without initiative. Telemachus was evidently younger than Odysseus, and he had less patience. Odysseus however, being older, had a more knowledgeable outlook to most things therefore he knew he had time. Telemachus is the first to attack without a thought, whereas Odysseus thought hard through his attack, and was better at protecting himself. There are many similarities and differences between both characters. Ulysses is a book in which countless characters are brought out and developed through a number of disparate ways. The most momentous development that occurs in the story is the development of Telemachus. Joyce illustrates his character as an incredibly complex person, and continues to develop his personality from beginning to end int he story.  At the start of the text he is shown to be a mere shadow of his father whereas towards the end he is considered just as audacious as his father use to be. Many factors influence Telemachus as he grows into a man, his name signifies far from battle,  this name in many ways can be seen and revealed to be ironic in the book as T elemachus ends by taking part in two battles. Not having any fatherly figure in his life as a child persistently affects Telemachus character in the book.   He develops into an apprehensive, withdrawn and weak individual who is to the uppermost scale spoiled by his one and only mother.   A number of literary techniques are evidently used in Telemachus. It is shown to be a journey of manhood, which through the use of a various number of literal devices transmits the significance of a respective society. The story is a narrative poem which presents us the readers with a traditional journey that the character undergoes. Joyce uses the method of using the flashback technique in order to portray readers when there is a change in the setting or when there is a change in the time frame. This technique is widely used by authors in modern day society to illustrate a surprising yet easier to understand storyline. The imperative change on the chain of events that takes place in the text adds to the complexity of the story. When this method is used it gives us the readers the power of time travel, allowing us to view events out of their given time structure. Flashbacks in many ways can help to make the story more interesting and help draw the reader in. They are normally used to give us the readers a better view and understanding of the overall story. Important information about the protagonists and elements of the story are revealed to the reader through the use of flashbacks. Homer makes use of this device in The Odyssey when King Nestor repeats the story of the Trojan War. This flashback in particular allows readers to grasp and identify with the character of Odysseus. This method is also used to tell the story of Odysseuss adventures as he fought his way home through a various number obstacles. The structure of the story is a narrative poem; it presents the storyline in a style which proves to be very flexible. This type of literary constitution allows for a difficult or even a straight forward poem to be either long or short. Narrative poems are normally passed down to the next generation by the continuous retelling of stories. Children in todays society grow up hearing different stories as a tradition; they then pass those stories down to their own children. Joyce presents his, stylistic diversityà ¢Ã¢â€š ¬Ã‚ ¦towards the truthful depiction of reality  [3]  . The Odyssey on the other hand, is a story in structure of a classical journey, the male protagonist in the story is shown to be on a mission suffering from encounters with supernatural beings, consisting of monsters and gods. Repetition is also a technique which is used in Ulysses to emphasize the descriptions, dialogues, and verbal communications in the story. The fact that repetition is used allows the story to be much easier told. By only having one narrative in the story really cuts down on the amount of things that need to be remembered by the readers. It also provides itself as a benchmark style that helps the narrator act it out, or even improvise on the spot. The use of repetition helps add to the exhilarating effect of the story. Repeating certain things over and over again allows readers to be familiar with the repetition and what is going on. When this repetition is presented, our minds as the readers begin to wander leaving our thoughts and imaginations open for submission. The Odyssey is a text that makes use of similar passages; however the main repetition Homer uses is in the portrayals of the images presented in the text. For example, Pallas Athena is continuously referred to in relation t o her eyes. She is usually referred to as the beautiful eyed goddess. In this case reiteration is used in order to highlight a specific point that Homer tries to put across about her character. The Odyssey makes use of brutal imagery to convey the theme of reprisal. This staggering imagery in reality catches the readers interest and is a great means of expression for the theme of revenge. In conclusion Joyce uses different characters in order to bring out a more modernist meaning and feel to his story. It is clear to identify the differences and similarities both Ulysses and The Odyssey possess, Joyce tries to convey a new adaptation by altering and modifying his characters, whereas Homers Odyssey exists only in the past. Joyce evidently brings out a more modernistic experience and surrounding to the text in order to relate it to the modern world, this therefore allows readers to relate to it and allows it exist in a more contemporary world. The literary devices Joyce chooses to use create enigmatic and realistic settings to his story, he specifically uses for example techniques such as flashbacks, and repetition in order to bring across a captivating setting by leaving an attractive impression on the readers. Word: 1646

Friday, September 20, 2019

Porphyria’s Lover, My Last Duchess and The Laboratory Essay -- Robert

Porphyria’s Lover, My Last Duchess and The Laboratory In this essay I hope to prove that Robert Browning’s murder mystery poems are fulfilled with intrigue and excitement. I also hope to prove that in his poems he creates vivid characters and uses poetic techniques to expose a world of madness and wickedness. To show that the statements above are true I will be writing about the characters, the poetic features in each poem and the madness and wickedness in each poem. This essay will include three of Robert Browning’s poems; they are Porphyria’s Lover, My Last Duchess and The Laboratory. Robert Browning was born on the seventh of May in eighteen twelve in Camberwell a suburb of London. He was the first child of Robert and Sarah Anna Browning. His mother was an accomplished pianist and his Father was a clerk in the Bank of England. Robert Browning was largely self-taught. He was an extremely bright child and a voracious reader. By the time he was fourteen he had learned Latin, Greek, French and Italian. He attended the University of London in eighteen twenty eight but left in discontent to pursue his reading at his own pace. In eighteen forty six he married Elizabeth Barrett and moved to Florence, Italy. He moved back to London in eighteen sixty one but spent his final years with his only son back in Italy. He died in eighteen eighty nine and is buried in Poet’s Corner of Westminster Abbey. He wrote his first poem ‘Pauline’ in eighteen thirty three. Browning wrote during the romantic era in the nineteenth century. In this era romantic poets such as Robert Browning wrote about dramatic events in unusual ways, using different ideas and forms. All of Browning’s poems are dramatic monologues; he was the fir... ... the poison to be attractive so when it is horrible it is more of a shock. ‘The colour’s too grim. Why not soft phial’s, enticing, dim? Let it brighten her drink, let her turn it and stir, and try it and taste, ere she fix and prefer’. She also shows her wickedness again in the fact that she wants her lover’s mistress to die in pain with him watching her die. I enjoyed all three of the poems but I especially liked reading and studying The Laboratory because I thought it was interesting the way someone could have such a cold attitude to killing someone and actually be eager to do so. All three poems were written as dramatic monologues and they were all about a lover or husband killing their lover or wife because of stupid reasons. I enjoyed the way the poem was written because you felt like you were actually there and they were speaking to you. Porphyria’s Lover, My Last Duchess and The Laboratory Essay -- Robert Porphyria’s Lover, My Last Duchess and The Laboratory In this essay I hope to prove that Robert Browning’s murder mystery poems are fulfilled with intrigue and excitement. I also hope to prove that in his poems he creates vivid characters and uses poetic techniques to expose a world of madness and wickedness. To show that the statements above are true I will be writing about the characters, the poetic features in each poem and the madness and wickedness in each poem. This essay will include three of Robert Browning’s poems; they are Porphyria’s Lover, My Last Duchess and The Laboratory. Robert Browning was born on the seventh of May in eighteen twelve in Camberwell a suburb of London. He was the first child of Robert and Sarah Anna Browning. His mother was an accomplished pianist and his Father was a clerk in the Bank of England. Robert Browning was largely self-taught. He was an extremely bright child and a voracious reader. By the time he was fourteen he had learned Latin, Greek, French and Italian. He attended the University of London in eighteen twenty eight but left in discontent to pursue his reading at his own pace. In eighteen forty six he married Elizabeth Barrett and moved to Florence, Italy. He moved back to London in eighteen sixty one but spent his final years with his only son back in Italy. He died in eighteen eighty nine and is buried in Poet’s Corner of Westminster Abbey. He wrote his first poem ‘Pauline’ in eighteen thirty three. Browning wrote during the romantic era in the nineteenth century. In this era romantic poets such as Robert Browning wrote about dramatic events in unusual ways, using different ideas and forms. All of Browning’s poems are dramatic monologues; he was the fir... ... the poison to be attractive so when it is horrible it is more of a shock. ‘The colour’s too grim. Why not soft phial’s, enticing, dim? Let it brighten her drink, let her turn it and stir, and try it and taste, ere she fix and prefer’. She also shows her wickedness again in the fact that she wants her lover’s mistress to die in pain with him watching her die. I enjoyed all three of the poems but I especially liked reading and studying The Laboratory because I thought it was interesting the way someone could have such a cold attitude to killing someone and actually be eager to do so. All three poems were written as dramatic monologues and they were all about a lover or husband killing their lover or wife because of stupid reasons. I enjoyed the way the poem was written because you felt like you were actually there and they were speaking to you.

Thursday, September 19, 2019

Justice in Platos The Republic Essay -- Philosophy Religion Essays

Justice in Plato's Republic        Ã‚   In Plato’s The Republic, he unravels the definition of justice.   Plato believed that a ruler could not be wholly just unless one was in a society that was also just. Plato did not believe in democracy, because it was democracy that killed Socrates, his beloved teacher who was a just man and a philosopher.   He believed in Guardians, or philosophers/rulers that ruled the state.   One must examine what it means for a state to be just and what it means for a person to be just to truly understand the meaning of justice.   According to Socrates, â€Å"†¦if we first tried to observe justice in some larger thing that possessed it, this would make it easier to observe in a single individual. We agreed that this larger thing is a city†¦(Plato 96).†Ã‚   It is evident, therefore, that the state and the ruler described in The Republic by Plato are clearly parallel to one another.     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   There are three classes in the state and three parts of the mind in the ruler.   The three classes of the state are the rulers, the soldiers, and the craftsmen.   The three parts of the mind are the rational or reason part, the irrational appetitive part, and the spirited part.   The rational corresponds to the rulers, the appetitive corresponds to the craftsmen, and the spirited corresponds to the soldiers. Socrates then explains how the four virtues, wisdom, courage, moderation/self-control, and justice play the same roles in a person as in a state.   The rational part of the ruler is wise and therefore it should rule over the other parts of the mind.   Socrates questions, â€Å"†¦isn’t it appropriate for the rational part to rule, since it is really wise and exercises foresight on behalf of the whole soul†¦(Plato 98).†Ã‚   In th... ...l war between the three parts, a meddling and doing of another’s work, a rebellion by some part against the whole soul in order to rule it inappropriately (Plato 100).†Ã‚   Plato’s ideal ruler must have a good mind, always be truthful, have knowledge and discipline, and not be afraid of death.   In short, the ruler is a philosopher that satisfies the four virtues of wisdom, courage, moderation/self-control, and justice.   Plato, nonetheless neglects the fact that everyone sins and fails to mention it in the ideal state or ruler.   However, the state and ruler was made up mainly to better understand the meaning of justice and was not made up so that it might be practiced. Works Cited Marra, James L., Zelnick, Stephen C., and Mattson, Mark T.  Ã‚   IH 51 Source Book: Plato,   The Republic, pp. 77-106. Kendall/Hunt  Publishing Company, Dubuque, Iowa, 1998.      

Wednesday, September 18, 2019

In School Suspension :: Discipline Punishment Education Essays

In School Suspension On my first day at Dunn Middle School, I learned that I had the gifted and talented classes, and assumed that discipline would be no problem for me. There was minimal chatter and the students seemed eager to learn. When I walked in on the second day, my co-op handed me a sheet of paper with the suspensions listed. This floored me, the infractions included fighting and sexual harassment. Over the next few weeks I saw that both out of school and in school suspensions were given a lot. Students who are disruptive in class and refused to do their work were sent down to discipline where they received the consequences for their actions. More often than not, in school suspension was the end result. The concept of in school suspension was new to me because it was not something that I had seen when I was growing up. Discipline has always been an issue that has plagued education. Troublesome students have always been a source of disturbances and distractions. Many school have implemented an in school suspension (ISS) program to combat the disruptiveness of problem students. These programs aim to remove students from the classroom while keeping them in an educational setting. By keeping the students within the school they are still able to be monitored to ensure that they are still getting their work done and keeping up with the class. Also, by having them out of the class, the environment becomes more learning friendly to the students who do not cause trouble. According to Claiborne Winborne, a writer for Educational Leadership, â€Å"Keeping suspended students at school – but isolated from other students - makes more sense and is more effective than giving them a ‘vacation’ away from school.† (King William County, 466) By definition, in school suspension is â€Å"a program to which a student is assigned because of disruptive behavior for a specific amount of time.† (Effective Program, 156) Many schools that have in school suspension programs have a zero-tolerance policy. This deters bad behavior by having swift and serious consequences for breaking school rules.

Tuesday, September 17, 2019

Not-For-Profit Organizations Essay

Executive Summary Not-For-Profit organizations are fundamentally different than for-profit, private sector businesses in that they do not have shareholders, their mission statements are focused on furthering a cause rather than just increasing profitability and most Not-For-Profits earn the majority of their revenue through donor contributions. As a result, Not-For-Profit Organizations operate under different reporting requirements than for-profit businesses. In order to provide proper accounting for the numerous activities undertaken by a Not-For-Profit Organization in a given year, it is imperative that one understand the two financial accounting standards that affect Not-For-Profit organizations the most: Statements of Financial Accounting Standards (SFAS) 116 and 117 which provide guidance on donor contributions and the presentation of the financial statements. The objective of this summary is to provide a high-level overview of the standards and the effect they have on the financial statements of a Not-For-Profit organization. The Statement of Financial Accounting Standards No. 116 establishes the standards for accounting for contributions received and contributions made to all organizations with fiscal years beginning after December 15, 1994. Contributions are defined by SFAS No. 116 as voluntary transfers in which the donor does not receive any value in return. Donor contributions may include the following resources: Cash, Marketable securities Property and equipment Utilities and Supplies Intangible assets such as intellectual property Professional services SFAS 116 requires that all contributions and unconditional promises to donate in the future, known as pledges, are recognized as revenues at fair value in the period in which they are received. Pledges are recognized as soon as the requirements of a pledge are met and it is no longer contingent on a future event. Additionally, contributions made and received are also recognized at as expenses upon receipt at fair value. The Statement of Financial Accounting Standards No. 116 also requires organizations to identify those contributions that contain donor-imposed restrictions and the timeframe or requirements for meeting these donor-imposed restrictions. According to SFAS No. 116, organizations must classify contributions into one of the following categories based on the existence or absence of donor imposed stipulations: Permanently Restricted Net Assets Temporarily Restricted Net Assets Unrestricted Net Assets Those assets that are restricted by a donor imposed stipulation of time, a particular purpose or program, or the occurrence of a future event must be set aside and cannot be expended until the restriction has expired through the satisfaction of the donor stipulation. Statement of Financial Accounting Standards (SFAS) No. 117 is also important in accounting for Not-For-Profit Organizations in that it provides standards for the presentation of the financial statements for organizations with fiscal years beginning after December 15, 1994. Overall, this standard requires that the financial statements provide the necessary information for all of the users of Not-For-Profit financial statements. The standard requires that Not-For-Profit Organizations produce the following financial statements on an annual basis: A statement of financial position (balance sheet) A statement of activities (income statement) A statement of cash flows In the statement of financial position, SFAS No. 117 requires that the  Not-For-Profit organization provide amounts for the total assets, liabilities, and net assets at the end of the fiscal period. Additionally, the statement of financial position must classify the organizations net assets as temporarily restricted, permanently restricted, or unrestricted based on donor imposed stipulations. The statement of activities is required to report to the financial statement users the transactions which caused a change in net assets during the period and the statement of cash flows is must provide a reconciliation of activity between beginning and ending cash balances of the period as either operating activities, financing activities or investing activities. Additional schedules are also required by SFAS No. 117 for special organzations such a voluntary health and wellness organizations that provide unique services related to their cause. Overall, a thorough understanding and application of Statements of Financial Standards No. 116 and 117 allows Not-For-Profit organizations to properly account for their unique activities and provide their financial statement users with relevant, understandable and comparable information in order to assess the financial position of the Not-For-Profit organization over the past fiscal year and going forward into the future.

Monday, September 16, 2019

Frankenstein – the role of Safie in the novel

Written in 1816, when the writer M.Shelley was just nineteen her novel â€Å"Frankenstein†, a Sui Generis dramatized the potential of life begotten upon a laboratory table. M.Shelley merges many forms of writing- the memoir, the journal, the letter novel, the picaresque to produce themes as romantic myth making, the gothic project, contemprory history and politics and the discourse of gender. In the novel, one also witnesses two families working on opposite set of ideologies. On the one hand, where Frankenstein's family represents vision pattern of political inequality and injustice, the De Lacey family represents vision of a social group based on justice, equality and mutual affection. The structure of De lacey's family constitutes M.Shelley's ideal, an ideal derived from her mother's â€Å"A Vindication of the Rights of Woman†. Infact, it is the character of Safie, the beloved of Felix De Lacey which best exemplifies to it which shall be discussed in the following paragraphs. Safie, the daughter of the Turkish merchant is appalled by her father's betrayal of Felix and by the Islamic oppression of women he endorses. Therefore, she decides to escape from the clutches of her father and flees from Turkey to Switzerland, seeking Felix. This incidence gives a sense of M.shelley's oblique reference of looking at Turkey within the dimensions of the â€Å"east†. Moreover, when the readers are first introduced to Safie ,the description of her as a â€Å"lady dressed in a dark suit covered with a thick black veil† makes one aware of a culture very different from the west. It is for this that critic Kornisaruk goes to the extent of calling Safie as being â€Å"oriental†. Hence, echoing Edward Said's theory of the orientalism as now one witness's construction of Safie as the â€Å"Other†. M.shelley at the same time is quick to shift her stance of Turkey-the east, established in reader's mind as a place which culturally occupies a lower place in hierarchy. This is because she now portrays the product of east-Safie in a positive light. This is evidenced by frequent parallels of Safie with Eve of Paradise Lost who is chaste,pure. Also, the author consciously decides to choose the name Safie meaning â€Å"wisdom† which is symbolic in itself. Safie's desire to acquaint herself with the language which becomes a mean to break the cultural barrier justifies to her attribute of wisdom. It also reveals her as a person who is class conscience as she wishes to be merged within the upper strata of the society. Moreover, Safie emerges as the only independent well educated, self supported, wisdom imbibed woman in the novel. By doing so, the author not only questions the position of women in the 19th century but also brings into focus her rejection of east as a supposedly hierarchically inferior place as discussed earlier. It is because of her alternative role model identity that well renouned critic Rubinstein decides to call her â€Å"subtly androgynous† combining the standard feminine â€Å"angelic beauty† with a masculine energy. Yet, the author decides the disappearance of Safie and De Lacey's family giving them little involvement in the plot. Thus, establishing that such characters had no or little place in the harsh world of 19th century Europe experienced by M.Shelley. Therefore, justifying the novel as a realistic fiction. Finally, one can conclude, it is from her own mother that Safie learns â€Å"to aspire to higher powers of intellect and an independence of spirit†.So, flouting her father's â€Å"tyrannical mandate† against marrying Felix.Indeed, it's for this that critic A.K. Mellor notes Safie as â€Å"the incarnation of M.Wollstonecraft in the novel†.

Sunday, September 15, 2019

How Important Is the Study of Sociology Essay

The study of Sociology is important but the level of importance is debatable. Sociology is the study of the organisation human society and what problems come about within the society. It looks at who is affected and why they are affected. A prime example would be a married couple with children who then decide to divorce. Not only are the couple affected but so are the children. Why? The children would have to come to the harsh terms of their mother and father no longer living together, in some cases have to welcome a new family member or members, ‘the step parents or siblings’ They would have to adjust to new living conditions whether that be a new school or two different homes etc. Sociology questions why rules were put in place and why people choose to follow them. In some cases we look at what other people do and we ‘follow by example’. If there is a queue at the bus stop to wait for the bus, naturally we would go to the end of the queue and wait for the bus. Why? Some may say it’s out of respect, if the people were in the queue before me who am I to cut the queue. Another person may say that following simple rules has a positive effect on our living. If you’re able to follow simple rules then it may be easier for you to follow the bigger rules with strong consequences and this will enable you to teach others i.e. children. The term sociology was coined by French philosopher Auguste Comte in 1838, who for this reason is known as the â€Å"Father of Sociology.† He believed in the concept that the social world was based on scientific facts and with this people could build better future. For example, humans need food to survive and all the major supermarkets know this, therefore they come up ‘special offers’ and provide more organic options as ways to attract a larger audience. By studying sociology we are able to look the relationship between a man and society. A ‘celebrity or public figure’ is often highly scrutinized for their choices or lifestyle and this is because a lot is expected of them. This could be anything from the way they dress to even the way they walk/ talk and the mass media i.e. TV, Radio, Movies, Internet etc help us to form assumption of this person. As humans we are often cautious of the decisions we make as we don’t want to be the topic of discussion within the society. For example when we do something bad in school we may not want many people to know about it and that is because we are afraid of how we will be branded in society (the bad kids). But why should we be so afraid of something that we created ourselves. Realistically without us there would be no society as we are what form it. By studying sociology we are able to understand others cultures, customs, traditions etc within the society. This is very important to us as it helps us to gain insight into certain groups both minorities and majorities this prevents us from making assumptions about people and makes it easier for us to accept people. Often when controversial topics arise the media uses this as a way of branding a particular part of society very negatively and as humans we sometimes get sucked into this then we find it co-exist with one other. Many people fail to see the importance of sociology with the belief that it is simply common sense, this is false. Living in a society doesn’t necessarily mean you know everything about it. â€Å"People who like to avoid shocking discoveries, who prefer to believe that society is just what they were taught in Sunday School, who like the safety of the rules and maxims of what Alfred Schultz has called ‘the world-taken-for-granted’, should stay away from sociology† (Berger 1963, 24). Naturally when asked what we believe to the ideal structured society we would say something like ‘everyone would be employed’ ‘’everyone would have a home’ etc. But if someone were to say that crime played an essential part in this ideal structured society you may think this would be absurd. However sociologists have found that without the identification of crime and the punishments that go along with it then society really wouldn’t be structured. This is true because without both of those things mentioned then people wouldn’t know what type of behaviour is tolerable or intolerable. Therefore crime does play a part in an ideal structured society. Sociology appears to only look at groups and not individuals, this is not true. Sociologists believe that individuals can’t be understood without being aware of the society that they live in e.g. You walk down a dark alley late at night your pace will be faster than you walking down a high street in the middle of the day. This may be caused by a number of reasons, from a young age you’ve been taught that it’s dangerous to be out late at night. This is referred to as primary socialisation and is sourced by the family. It is our family. It is our family that shapes into the view of what we consider is ‘normal’. There are more witnesses on a high  street so you would feel a lot more confident and comfortable. Another continuously proven theory is that men and women have different roles and responsibilities. Men are shown to be in control of business’ and high in power i.e. the government. 52 out of the 53 Prime Ministers the UK has seen have all been male. In certain situations males behaviour may be said to be overlooked. Aggression and Loud behaviour is tolerated by the males. However females still assume the role as bringing up the children and caring for people. According to the Nursing Times only 1 in 10 nurses in the UK are male which would mean that women would dominate that role. This does support the theory that the differences between males and females are through socialisation and this helps boys to become men and girls to become women. Human culture has been enriched through the contribution of sociology. According to Lowie ‘most of us harbour the comfortable delusion that our way of doing things is the only sensible if not only possible one’. This means that Sociology has given us training to have rational approach to questions concerning oneself, one’s religion, customs, and morals. This gives us the confidence to be able to decide whether or not we choose to practice a religion or not. It has further taught us to be objective and critical. This means we are able to give constructive criticism to our peers. It enables man to have better understanding both of ourselves and of others. By comparative study of societies and groups other than his existence, our lives have more meaning. Sociology also impresses upon us the necessity of overcoming narrow personal prejudices, ambitions and class hatred. This allows us to accept others as equals. The fact that few Muslims have been found to be terrorists does not mean that all Muslims should be treated as beneath us and be subjected to ridicule. The study of sociology can help us to view things differently, things we view as negative we may begin to see the other side of. A prime example would be suicide which we would associate with somebody that has some psychological problems. Although, Durkheim revealed in sociological study into suicide that our surroundings play a part in us making that decision to commit suicide and this could be anything from our relationships with the church to the one with we have with our family. This to me means that society influences certain decisions we make without us even knowing. Also as Straus once said ‘Taking a sociological perspective requires that we look beyond our individual experiences to better understand everyday life’ (Straus 1994). This allows us to look beyond the ‘social expectations’ and we then begin to learn from our experiences. Sociology has played a big part in how the government makes decisions and how they form rules and regulations. In 2011, the government made the harsh decision to abolish Education Maintenance Allowance (EMA) this meant students from the age of 16-18 would no longer be receiving a weekly allowance from the government. This decision affected each class of people, higher middle and lower. For lower class this may have meant they couldn’t help out at home with any necessary bills etc. For the middle and higher class they lost that extra bit of cash weekly. Sociology can be used as good teaching skills as Teachers can test students knowledge by reversing situations where they may need to apply their everyday knowledge which is an important skill to have. Bibliography http://www.sociologyguide.com/introduction-to-sociology/importance-of-sociology.php https://www.gov.uk/government/news/plans-to-end-the-education-maintenance-allowance-ema-programme http://durkheim.uchicago.edu/Summaries/suicide.html

Saturday, September 14, 2019

Byzantine Christians Essay

Until the middle of the nineteenth century, historians and geographers in the European world held that history has a Locus. For them, pre-modern history began in the Bible Lands and it started moving westward and northward from western Asia into and across Western Europe. By 1492 the world scope of history was Eurasia. Only after 1492 did the world expand to include areas outside of Eurasia. For these historians, Africa, Oceania, the Americas, and part of Southeast Asia had no history until Europeans brought it to them in the sixteenth century and afterwards. These regions did not exist until discovered by Europeans. REVIEWING THE PAST: Pre-contact history of the Americas does not have the same level of conceptual reality of post-contact history. Only very few world historians seem to know o about the native traditions that existed in pre-Columbian America. The post-Columbian world is filled with abstract frameworks such as the ‘Slave Trade’, ‘Colonialism’ ’poverty’ , beginning with Mesopotamia, the Indus Valley, ancient China and Egypt, the Assyrians and Persians, and ending with the Greeks, Romans and Byzantine Christians. American Indian civilizations, primarily those of the Aztecs and Incas, only form a backdrop to the post-conquest European themes of contact, settlement, and expansion. COLONIALISM: Throughout the contemporary world native and aboriginal peoples face disputes regarding their human rights, political participation, and claims to their ancestral economic resources where historical globalization began in the fifteenth century. Since then, colonialism and neocolonialism emerged in the global system. Natives and aboriginals were subjected to the worst side of the globalization process. We still can witness the legacy of such a development in the form of shabby leftovers. ECONOMY AND SLAVERY: Precious metals, commodities, and slave labor from the New World and Africa spurred the development of mercantile capitalism, the rise of the bourgeoisie, and the maturation of European absolutist states. These, in conjunction with encounters with different peoples, gave birth to a synergy of political ideologies and philosophical tools that propelled Europe to world domination. The invention of America involved the simultaneous invention of Europe as the â€Å"West. † conclusion: â€Å"The third-class people of the world have risen up and there is nothing we can do about it. † By the third-class citizens of the world are people outside white Europe and the United States. In 57 years as well, global interconnectedness has made itself ever more minutely felt through the communications revolution, the globalization of trade and production, and massive new migrations. Modernization analysis in the late 1950s began to take on a distinctive shape of its own. An intellectual transformation , a political transformation and a social transformation that mobilized human resources in an efficient way and engaged them in the process of modernization and globalization.

Friday, September 13, 2019

Tort law Essay Example | Topics and Well Written Essays - 1750 words

Tort law - Essay Example However, contact is the basic element of battery. Since contact is an essential element of battery, there must be an absence of contact for an assault. In other words loosing battery comes under the ambit of an assault2. As per the law of UK both the offenses can be booked under criminal and law of tort. Therefore, anyone who found guilty under the offenses is liable for prosecution under the criminal and civil law. Under the criminal law assault is an attempt to commit a battery one some one’s body3. Intention or motive behind an offense is necessary. The defendant or the attacker must have intention or motive to harm someone bodily. Assault and battery have two motives a) one in retaliation and b) in self defense. The intention or motive involved in assault and battery should appear on the body of the aggrieved person. If there is no intention or motive of a person to bodily harm another person, legally cannot be considered guilty of offenses as mentioned hereinabove4. Conse nt In all civilized states, consent is used in defense of civil assault and battery by the offenders. However, combating with mutual consensus does not deprive anybody of his or her legal right to sue. However, there is difference of opinion amongst the jurists whether the criminal assault or battery can be used in defense of any person. ... Self-Defense A commonly used term wherein a person can use a certain degree of force to save himself from bodily injuries inflicted upon by another person. Now it is up to jury to determine whether the degree of force used in self defense is valid and permissible under the law. If a man by his or her own will initiate fight without justified reasons against another person cannot be treated such fight in self dense. Here, the intention and motive of a person does matter6. As far as the use of force against the offender with an object to save himself or herself in retaliation of an aggressor’s attempt is justifiable under the law. In all the countries around the globe, a defender can use deadly weapon to save his or her life provided his or her life is in danger. In majority states, law provides support to a person who may stand in front of an aggressor to defend himself although the chances of safe escape from the scene are there7. The court will examine the degree of force use d by the defender against the offender under the circumstances was justified or not. The following factors should be taken into account by the jury while deciding the matter a) age b) size and c) strength of participants8. Defense of Others Helping out others in their turmoil or in case of need treated valid defense provided the defender was not at fault. In case of defending others, the defender’s right to claim self defense of a protected person cannot be undermined. In few cases the defender reasonably believes that he or she was in need of help to come out of the worst scenario9. The law of tort treats the assault and battery an attack on the security and safety of a person life hence the wrong done to the victims attracts compensation for the damages. Under the civil law, the

Thursday, September 12, 2019

What is the difference in the international court of justice ICJs Essay

What is the difference in the international court of justice ICJs approach with respect to the law of maritime delimitations between the North Sea Continental - Essay Example Disputes are provided for through a separate optional protocol, parties to the Convention are obliged to exhaust the settlement procedure, preferably through direct talks between the parties. If direct negotiation fails, then the parties can submit the dispute to either the International Tribunal for the Law of the Sea, the International Court of Justice, binding international arbitration procedures or an expert arbitration tribunal. The decisions of the ICJ have spelt out the principle to be found in the Ad Hoc Committee Report, which states that there is â€Å"an area of the sea bed and the ocean floor underlying the high seas beyond the limits of national jurisdiction.†1 This falls under the Common Heritage of Mankind principle, adopted without dissent in the United Nations General Assembly and applied to the sea bed beyond the limits of national jurisdiction (Brown, 1994:262). Therefore, this has spelt out an important principle of maritime delimitation, whereby in some in stances it may not be possible for a coastal state to claim maritime territory, which may more appropriately fall within the scope of international jurisdiction and therefore unavailable to any State in particular. The emergence of the EEZ concept and further seaward extension of the outer limit of the continental shelf has focused attention on maritime boundary delimitation in contemporary international law. Equity now plays a greater role in interstate relations and the pragmatic issues of managing the delimitation of natural resources and boundaries. In so far as delimitation of the territorial sea is concerned, the UN Convention of the Sea states that when two countries are adjacent to or opposite to each other, neither one is entitled to â€Å"extend its territorial sea beyond the median line every point of which is equidistant from the nearest points on the baselines from

Wednesday, September 11, 2019

Assignment 7 Example | Topics and Well Written Essays - 250 words - 3

7 - Assignment Example There are some recommendations that I would make to rescue the unskilled workers. Before the period set by the President reaches, it is advisable to train the unskilled employees. (Becker, 1980). This will impart skills to them and hence can result in an increased productivity and subsequently competitive advantage over its competitors, and also reducing the cost of production while keeping the prices constant will create more revenues to cater for the extra cost of care act. Thirdly, is to reduce the number of the unskilled employees through outsourcing to other well performing companies and will be brought back when normalcy return in the affected company and this reduce the wage bill. Furthermore, agreement can be made with the government so that such adjustments can be made in phases after 2015. This will give time to the company to recollect and strategize on how to utilize the existing unskilled labor to generate money to meet the expected increase. In addition, collective barg aining can be conducted to agree on the increment so that it does not affect the entire company. A combination of all these factors will ensure that the company continues in the industry and without loss of employment to people (Becker, 1980). It is also advisable for this company to operate globally and diversify on production of goods and

Tuesday, September 10, 2019

The Civil Rights Movement in 1960 Essay Example | Topics and Well Written Essays - 1000 words

The Civil Rights Movement in 1960 - Essay Example (Encarta, 2008) With the formation of NAACP (National Association for the Advancement of Colored People) in 1909 an organized struggle for equality for blacks began. The event that triggered the eventual Civil Rights Movement was when a Black lady, Rosa Parks, refused to give her seat to a White person in a public bus. She was arrested for non-compliance and put in jail. The refusal to give up the seat led to an eight month strike of the bus system in Montgomery. During this time the black community organized their own carpools and deprived the government of the income that came from black riders. The eight-month strike put a severe financial burden on the city and thus the Supreme Court ruled that bus segregation was unconstitutional and ended the strike. (Mkmba, 2005) ("Origins of the Civil Rights Movement", 1994) The Civil Rights Movement that started in the 1950s was very important for the people of America as well as people of the whole world. In the US, there were increasing injustices towards the minorities, specially the Blacks. It created the right for all and established the condemnation of discrimination in any form. Because somebody thought to go against the norms and fight for their rights, the minorities realized that such injustices would longer be tolerated and at the same time they set an example for all oppressed people to fight for their rights. The open segregation and oppression ended segregation publicly and legally. The new America promoted independence for everybody no matter if a person was from a different race, creed or sex. African Americans finally got voting rights and it helped path the future for giving voting rights to women. (Roy, 2004) The Civil Rights Movement was also important for other countries apart from the United States. Since US is a superpower and is generally considered the land of freedom and righteousness, other countries look up at US for sense and direction. When equal rights were given to all people, other countries also followed up. Some countries in Europe and Asia that follows America's lead also changed their policies. Furthermore, the US set a good example for others to follow which made others realize that even the leaders of biggest powers of the world cannot hammer their authority on the minorities. What is the impact on the American society The impact of the Civil Rights Movement has time and again been seen from a positive and a negative perspective. The achievement of purpose of the Movement has been questioned and critics have been discussing this for a long time. On a positive front, changes have taken place in the social and legal context. These changes are not only for Blacks, but for all. The human race is imperfect. Everybody has some flaws within themselves which a nation cannot expect to correct. Civil Rights Movement was about making the majorities realize that the minorities existed and they wanted to have some rights. The goal wasn't to remove all racism. Such a happening could never workout since all humans are different and have different values and emotions. What the Civil Rights Movement did was to provide a /legal mean to the minorities to challenge the injustices committed against them. Anyone who feels that he/she is being discriminated,

Child Care Care for Babies Essay Example | Topics and Well Written Essays - 500 words

Child Care Care for Babies - Essay Example They are not comfortable with the idea of two caregivers having to attend a minimum of ten babies at the same time. Thinking of the direct relationship between the baby's mood swings and a caregiver's mood swings makes them forecast possibility of a caregiver's outburst of frustrations and inability to fulfill task. The scene just can't be concluded yet if all of the ten babies will cry at the same time. The couple needs to work and they are only able to do that when they are secure in their knowledge that their children are safe and in good hands. It will be unwise or unfair to expect a clone of the parent. However we can respond to the worries by convincing them that the caregiver is a decent and kind individual. To give them a good outlook of the care the center is providing they will be given an opportunity to interview the caregivers at a preset time to satisfy their parent's instincts. In this way the parents will be able to personally describe the routines of the baby and caring schemes for their child apart from what was listed in the enrolment form. The act will give them comfort that they have personally clarified in detail the baby's management and care in question.

Monday, September 9, 2019

Financial Health 2 Assignment Example | Topics and Well Written Essays - 750 words

Financial Health 2 - Assignment Example ost of care payment is similar to the comprehensive care model in which payment for the full range of health care is given by a specified group for a decided period of time. (Cromwell, J., & Research Triangle Institute. 2011) The false claim act is a statute which provides people who are not with the government to file action can on behalf of the government. It is a federal law also known as â€Å"whistle blowing† that allows people who are not government-affiliated to file claims of fraud against the government. It has been used to investigate many health providers from pharmaceutical companies to health care organizations, hospital, practices, agencies and equipment providers. Through the use of this fraud, government has come across many fraud settlements over the years and has paid big payments who had sued on behalf of the government. This law applies in situations like double billing by providers, refusing to provide medically necessary care etc. A number of federal and state statutes are dealt by the Government in regard to the Medicare fraudulent. The government provides the prosecutor with many options related to health care. Following is a list of possible criminal prosecution: A False Claims act is a government statute under which, any health care provider who presents a false claim or demand regarding any medical services can be held guilty. The prosecutor needs to prove that the provider intentionally false claimed. A False Statement Act imposes liability on a provider if in a communication submitted to the government had false writings or documents. In such a violation the government only needs to prove that the provider knowingly submitted the statement or documents knowing they were false. Anti-kickback act concerns individuals and entities that knowingly make false statements in applying for payments provided by the government and states regarding health care. It also prohibits individuals concealing information of events that claim their

Sunday, September 8, 2019

Religion is a double-edged sword, both supporting and undermining Essay

Religion is a double-edged sword, both supporting and undermining political authority and social elites - Essay Example It has brought positivity into the culture of the society when the politics of the nation has failed them. (Cauthen) Let us now look at religion as a support towards political authority and elites, and then we shall look at religion undermining political authority and elites. During the days of the crusades, Christianity as a religion took complete control over the Roman Empire. It entered the zone of politics and was extremely instrumental in taking control of the empire. Religion has for long contained the fervor of politics. Nowadays, in countries like the Saudi Arabia, the UAE, and the rest of the Middle East along with Pakistan and Afghanistan, religion takes the primary role in shaping the political and administrative identity of the nations. However, in countries like the USA, the European countries, religion has undermined the role of politics and has taken a step back in matters regarding politics and other important matters, which are crucial in the governance of the country. ("Politics & Elections") Religion has been a subdued way of living for the people in the Western countries since they are not concerned with the type of religion of the people, but are more concerned with the humanitarian nature of the people. This part of the paper shall study how religion undermines and supports the elites in different countries. In those countries where the influence of religion is very high the elites manage the affairs of the country through the use of religion. It is a very balanced state of affairs, which has an influence upon the way the functioning of the states, happens. It is imperative to note that states where the importance of religion is primary, the elites also don the hat of religious groups in order to settle with the people of the State. Through the ages the elites have supported the religious identities and

Saturday, September 7, 2019

Investment Advisors Small Business - Business Plan Essay

Investment Advisors Small Business - Business Plan - Essay Example Institutions, which would be discussed in this section, are Royal Bank of Canada, LBMC and FiduciaryVest. Royal Bank of Canada (RBC): Established back in the year 1869, RBC is Canada’s largest bank in terms of asset value and market capitalization. The institution consistently receives high credit ratings both from Moody’s Investor Services and Standard & Poor’s. This has helped the company to gain the trust of the prospective investors. The advisory service of RBC caters to the high net worth private clients and niche corporate and institutional clients across the globe. Other than investment advice, they offer complimentary financial plans and wealth consultations, guided by RBC experts (RBC, 2010, p.1-2). LBMC: LBC Investment Advisors, LLC, has been ranked among the top financial planning firms in US. The ranking was done by CPA Wealth Provider on the basis of assets under management. The financial institution has more than $ 300 million under its management and it has been experiencing sustainable and continual growth in the industry (LBMC, 2010). FiduciaryVest: FiduciaryVest is an employee owned independent investment advisory firm. They offer consulting service and advice which is in accordance to the interests of the clients. They assist their clients to analyze the assets, develop investment policy, goals and guidelines and design the investment portfolio by fulfilling the objectives of the investors only to optimize their profitability (FiduciaryVest, 2007). So, it seems that there are many institutions which are ready to challenge the new entrants in this industry. The new institution must possess some competitive advantage to sustain its existence in the long run. The company was established by three people, Carol Buckalew, Arnold Jones and Richard Small. Carol is a CFA with more than 15 years of

Friday, September 6, 2019

APA Help Center Analysis Essay Example for Free

APA Help Center Analysis Essay The website APA Help Center from the American Psychological Association (http://apahelpcenter. org/articles/topic. php? id=2) is all about articles and information focusing on family and relationship. It is demonstrated by a picture of a father and son on the upper right part of the webpage. In the center, the main heading â€Å"Family and Relationships† covers 49 subheadings that vary from disorders, parenting, stress to sexual orientation. The website is particularly useful and functional to me in a sense that it offers helpful advices with regards to certain family relationships such as parenting and psychological disorders such as mental health, emotional wellness and anger management. It also offers a number of tips on specific issue. If I want to have knowledge on how to help a friend who is suffering from chronic illnesses, the website is indeed of great help. It bestows me a realization that I, as a friend and loved one, need not be afraid because chronic illness is not contagious, instead, I must help my friend deal with it by offering support and care. The website itself is divided into seven parts namely about the APA Help Center, featured topics, articles and information, find a psychologist, request information, for reporters and home. However, I focus on the articles and information because of some reasons I have stated earlier. Moreover, the mentioned part of the website provides enormous information and knowledge. It serves as a virtual psychologist to me. There is no need for me to go and see a psychologist just to be informed on some things of utmost importance such as coping with stress, how to control anger, how to deal with back-to-school blues, and a lot more. Nevertheless, if I desire to talk to a psychologist, the website has already done a template on finding one nearest to my area. I greatly recommend the site to everyone I know because it is indeed useful. If there are issues with regards to particular things that are not on the list, a person can still find some useful information by using the search template on the uppermost right part of the page. Reference American Psychological Association. (2004). Family and Relationships. APA Help Center. Retrieved March 2, 2009 from http://apahelpcenter. org/articles/topic. php? id=2.

Thursday, September 5, 2019

Benefits of Network Management Tools

Benefits of Network Management Tools 1. Introduction These are the various network management tools used by network manager to verify network connection, monitor network packets, analyse captured packets, troubleshoot network connectively failure, diagnosing network slow performance and identify source of incident in order to make the network available 24 hours seven days a week. 1.1 Benefits of Network Management Tools Network manager benefits from network monitoring tools in so many ways as described below Easy migration from old legacy application to new technologies For example when network administrator is migrating form a legacy IOS based application to LWAPP using Airwave Management Platform software tool for wireless network management, net work administrator is provided with centralized control for Wi-Fi networks where roaming data and information as well as historical data are kept as airwave gives a common platform to manage the devices. This is beneficial to the network manager because it makes it easy for migration from old legacy applications to new technologies and makes it easy to monitor the network usage all the time Quick identification of network or server failure when the server of a portion of the network is down, before users get to notice the failure network administrator receives a warm and rectified the fault and providing the network manager with means of monitoring and providing network availability round-the-clock. Using network-monitoring tool like ipMonitoring with attributes such as such as reporting, user tracking, access point configuration management and rogue AP discovery, network administrator is able to monitor any networked device on the corporate intranet and TCP/IP LAN and receive alerts immediately depending the administrators configuration of receiving alerts; this can be received through alarm, e-mail, or third-party software when a connection fails. Diagnosis and troubleshooting, Network monitor can be used to diagnose why the server computer is not communicating with the clients computers on the network on a local area network, for example network administrator can configure network monitor to capture all the frames on the network, this includes source and destination address of the computer sending and receiving frames, protocols used as well as part of message sent. Net work administrator analyses this information to locate the source of problem on the network and troubleshoots it. Checking for connectivity of a computer online for example using ping command to check if a computer is online helps network manager for example when user calls and said they can logon to networked computer to troubleshoot and diagnose the network manager uses ping to find out if the computer in on the network or not. This is beneficial to the administrator because it helps him to identify where the problem is originating. 1.2 Structure of management information Structure of management information is a network component used in network management which is used in simple network management; its main role is to define set of module identity, object type and notification type. Structure of management information shows how related managed objects such as object names, types of data that can be stored in an object and how its transmission over the network for example action done to retrieve vale of an object with codes 2. Use Datagram Protocol User datagram protocol is a transport layer protocol that is used to send packets to computers in networked environments. User Data Protocol has the following advantages over Transport Control Protocol Connectionless When communicating with two computers on the network, user data protocol doesnt negotiate connection between the two client computers but just transfers data as its received No Connection State User data protocol doesnt maintain and doesnt keep track of any parameters such as buffers sent, congestion control and rate which data is transfer for example when used in server environment, user data protocol is able to support more active clients if a particular application is run over it because it doesnt acknowledge packets being sent or received. Small packet header over head User data protocol has got a smaller header of 8bytes of overhead making it faster in transferring data Unregulated send rate, user data protocol doesnt have congested control mechanism and data is sent at rate, which it has been generated by the application in use for example taking into account the CPU, clock rate at the source of data. 2.1 Applications layer protocol used by User data protocols as Transport layer protocol Domain Name Service Is a database like that converts the computers fully qualified domain name that are easy to be remembers such as www.yahoo.com into IP address such as 201.171.25.0. 6 that are then used by computers to connect/ communicate with each other Steaming multimedia This is the continuous transfer of video, voice and digital data that is received and showed/displayed in real time for example podcast and webcast Routing protocol Routing protocol is used to determine which path to be used to sent/ transmit data packets across a network. 2.2 Reasons why UDP is preferred over TCP Domain Name Service User data protocol is preferred over transport control protocol because its used by DNS for name queries and because the information exchange between UDP and DNS is small in size for example the packet size sent through UDP is not greater than 512 bytes. Streaming multimedia Streaming multimedia its used by UDP because it compresses audio files in to small packets of data that makes it easy to transmit and continuously streaming and transmitting audio files whenever their audio data drops. This doesnt break or cause delay on audio broadcast. The streamed data is sent by the server application to the client application stores the stream data the then displays the data received in real time or playing the voice streamed files as soon as its buffered. Routing protocol On routing protocol, User data protocol is preferred because routing table updates are sent periodically and some of the data is lost a long the way and updates need to be resent so its up to date on network layer which is impossible with transport control protocol 2.3 Controversial use of UPD in multimedia applications The use of user data protocol for streaming multiple media application is controversial because user data protocol doesnt have congestion control which is much needed to prevent the network from going into a state in which less or no work can be done, for example if a users sends high bit rate video are sent without using congestion control, user will be unable to see the video messages because of the packet overflow at the router. 2.4 Adaptive congestion control scheme One scheme that would force the use of adaptive congestion control is real time communication scheme which has building reliability into applications that will force the use of congestion control, for example in mobile application where congestion control is built though the application run over user data protocol, it acknowledges and retransmit packets that get loss during transmission Applications that perform congestion control user the network more efficiently for example with bits rates being controlled, the network will not go into a state where it can not be used 2.5 Advantage of Adaptive congestion scheme Better performance of the network for example in the case of video when small bit are sent and controlled, the performance improves as the bandwidth will be enough to support bit rates It ensures that all packets sent reach destination 3. Exchange between Dhcp Server and Client Computers DHCP Server and Client Computers See Appendix (i) For clients to receive IP addresses from dhcp servers TCP/IP need to be con figured to get IP addressed automatically on the TCP/IP properties dialogue box. Dhcp client computers that are configured to obtain IP address automatically request and receive IP configuration upon booting the client computer. Dhcp clients get IP addresses and other configuration each time the client computers are started and join the network. Dhcp server assigns IP address to a client from a predefines scope for a given duration of time and if that duration expires the IP address is released to the scope and can be assigned to another client but if the duration is longer than the lease time, the client requests for and extension before the lease expires. 3.1 Router and Components A router is a device that connects one or more computer to create a network environment for example a modem. A router has the following major components Input port Is the point is direct connection for physical link and it is the point at which incoming packets enters the port. Input port provides functions such as performing the data link layer encapsulation and encapsulation, a route lookup and sending packets to output port via switching fabric as well as proving quality of service guarantees input port classify the in a predefined service level Output port Output ports stores packets that are forward via the switching fabric and transmits or schedule packets for service on an output link performing both the reverse data link and physical link functionality as done in input port Switching Fabric This connects input ports and output ports Routing processor Executes routing protocols, creates and forward routing tables which is used in packet forwarding and performs management functions within the router. 3.2 Internet Protocol version 4 Internet protocol version 4 is the protocol that is widely in use in most corporate networks and it uses network layer protocol and its used as internetwork layer protocol on the internet 3.3 Internet protocol version 6 Internet protocol version 6 is the update version of internet protocol version 4 with much more address space. Its mostly used on the internet bone in Asian countries. Protocol Structure of an IPV4 header See Appendix (i) Protocol Structure of an IPV6 header See Appendix (iii) Due to the depletion of internet protocol version four and lager routing tables, internet version 4 has been updated to version 6 that provides better security, more address space. This has made internet version 6 more advantageous in some ways as discussed below. Internet protocol version 6 address space 3.4 Advantages of internet version 6 Internet protocol version 6 has got more address space as compared to internet version 6 for example version 6 has got 128-bit address space which allows for flexible creation of multilevel, hierarchical and routing infrastructure which is not that possible with internet protocol version 4 Internet protocol version 6 has got in built security which is standard and mandate, its offered in all implementation and has no changes the application, for example security features such as authentication on packet signing , data encryption and end-to end DHCP, DNS and IPv6 mobility is provided for in security model. 4. Wired Equivalent Privacy WEP is the short term for Wired Equivalent Privacy for a security protocol used in wireless local area network that operates at a data link layer and has a security that can be turned of and on again as defined in 802.11b standards. This standard has been set by the Institute of Electrical and Electronics Engineering The main aim of Wireless Equivalent Privacy was to provide security via 802.1wireless network where data is sent from one end point to another. For example Key security features of WEP was meant to offer the following Confidentiality Wireless Equivalent Privacy is used to prevent data transmitted on the network from being eavesdropped by some whom the information is not meant to be communicated. Unauthorised access to wireless network Wireless Equivalent Privacy used to prevent unauthorised access to the network Data integrity, to prevent the alteration of data being transmitted 4.1 Advantages of Wired Equivalent Privacy WEP uses a 2.4 gigahertz radio frequency which provides clear signal for its lower than other frequencies and can travel through wall without affecting frequency. WEP is relatively cost effective for example the cost of a router and Wi-Fi card is normally below  £55 which makes it cost effective for both big corporations, and home users 4.2 Disadvantages of Wireless Equivalent Privacy Static encryption key which is used by all the devices on the network make it very easy for packets to be intercepted and crack what the key is making it very vulnerable to hackers. For example when a router is set up on the network, the encryption used by the router is then used by almost all the device on the network Weak keys made it easier for it to guessed and cracked when used at the access point Initialisation vector in WEP is also ways reused, for example if a user who connects with WEP to access wireless network uses the same key over and over changes, this key can easily be cracked WEP has its algorithms sent in plaintext which makes it a lot easier for key streams to be determined 4.3 Difference between WEP and WPA Wireless Equivalent Privacy standard 802.11 and Wireless Fidelity Protected Access are different in so many ways for example WEP uses 128bit with 24 integrity value, while WPA used 128 bite with a 48 bit integrity value. WPA has features such as Temporarily Key Integrity Protocol which dynamically changes the keys used for encryption while Key in WEP are static and is shared by all device on the network. The combined used of 48bit integrity values and TKIP, AES makes WPA more security strong as compared to WEP. Weak keys made it easier for it to guessed and cracked when used at the access point. Initialisation vector in WEP is also ways reused for example if a user who connects with WEP to access wireless network uses the same key over and over changes, this key can easily be cracked. WEP has its algorithms sent in plaintext which makes it a lot easier for key streams to be determined These weaknesses among others called for a better standard to be adopted which will provide wireless network with better security and this led to the improvement of 802.1 to WPA. 4.4 Wireless Fidelity Protected Access WPA stands for Wireless Fidelity Protected Access for local area network base on the specification of 802.11. This standard was designed to improve on the security weakness of Wired Equivalent Privacy. 4.5 Advantages of WPA WPA provides added authentication features to basic WEP which provides for stronger encryption mechanisms. The added features includes Advanced Encryption standards protocol as used in WPA2, Temporary key Integrity Protocol as used in WPA. When use in windows 2003 environment, WPA provides the strongest wireless security. WPA has back ward compatibility for older applications that use WEP this doesnt call for upgrade. The use of 802.1x Radius servers provides administrators with means of auditing and logging incidents. 4.6 Disadvantages of WPA The set up of the pre-shared key is difficult and it not beneficially to home users with less technical knowledge. It has more over head as compared to WPE. Its incompatible with pre 1998 windows operating systems and doesnt support older firmware. Its major fall is the denial of service attacks which can leave the whole network shutdown due to constant different keys that are generated and interpreted by the network as some kind of attack. 4.7 Comparing WPA and WEP features WPA has enhanced featured that is based on WEP standard. The features in WAP include temporarily key integrity protocol and 802.1 x. This features provides dynamic key integrity and mutual authentication to most wireless local area networks 48-bit initialisation vectors Like Wireless Equivalent Protocol, Temporal Key Integrity Protocol uses the RC4 stream cipher provided by RSA security for frame body decryption and CRC for each frame before transmission but the difference here is that WPA has added feature Temporal Key Integrity Protocol that uses a 48bit initialisation vectors that has reduced the re-use of initialisation vectors. This has brought about data confidentiality. While WEP encryption is based on 128bit with 24 integrity value, which means the keys are of smaller size and integrity value making it easy for hackers to crack the keys as the initialisation vector seeds to WEP algorithm coded, this feature has been enhanced by the 48 bit integrity vector in WPA. Data Encryption When data packets are sent, it encrypted separately with RC4 cipher stream, generated by b4 bit RC4 key, the key consist 24 bit initialisation vector Pre-Packet key Construction and Distribution WPA generates a new encryption key automatically for each client, for example WPA uses unique and different key for each 802.11 frames and avoid the use of same key as in WEP. This automatic key generation makes it impossible for WPA keys to be cracked by hackers While in WEP the same key is shares by all the devices on the network is static which means due it its unchanging nature, its a lot easy for the shared key to be modified Message Integrity codes The use of Michael prevents against attacks and forgeries, WPA uses a secrete 648bite authentication key that will be shared only between the source and destination where during the process of authentication tagging function takes place and message integrity code. For forgeries to be identified, the destination receiver inputs source into verification predicate and creates another tag code and it this both matches then the message is considerers authentic is created to detect bit flipping and changes to the source and destination. Unlike WEP that uses 4 byte integrity check value to the standard payload. The receiving client calculates the integrity check value and if the values do match then there is a chance that frames were not tempered with and in case data Counter mode/ CBC-MAC This is a data confidentiality protocol used for packet authentication and data encryption. For confidentiality for example CCMP uses the advanced encryption standards in counter mode and for encryption and data integrity CCMP deals with Cipher Blocking Chaining Message Authentication Code making this standard more secure as compared to WEP which has got no encryption mode EAP encapsulation over LAN, this is the key standard use n key exchange that is not used in WEP for example this protocol allows for a four way key handshake as well as a group key handshake while in WEP there is only a two way key handshake. The IEEE802.1x as used in WPA2 provided a sure means of authenticating and controlling user traffic to secure networks 5. A Disaster Recovery Plan Is the process of restoring access to the main business applications, data, hardware and software that is required to start the system operational, Disaster Recovery Plan provides information on how to handle information that may be lost or corrupted during the disaster as well as proving team leaders with procedures of restoring information and data. 5.1 Major steps in disaster recovery process Notification procedure This is the action taken by disaster team members as soon as emergency occurs. In the notification stage, systems can be restored functions on a limited basis. For example in a data centre when database team leader receives alert on his/her computer that a file within the database is corrupt, this alert can be sent to the team assessment team either automatically by the system or mailed to the assessment team to analyse the damage Analyse the extent of the damage The analysis of the damaged cause should be done as soon as possible to determine the level of damage to the applications for example if it a power outrage has occurred in the data centre, the analysis should be able to detailed the applications affected, origin of the incident, work areas that have been affected and if there is another source of power to run the database the this can be powered on for example in case there is UPS backup while further investigation in the outrage is carried Activation of the plan Depending on the damage cause by disaster and the out come of analysis, the disaster recovery team can make a decision to activate the plan. For example in the case of data centre if the entire database server is down, the team looks at the possible way that the system can be restored with a minimal time, planning for team communication procedures, then the respective team leaders will notify staff members about and start working on their respective tasks to restore the system as agreed by the team members. Execution stage Recovery process at this stage can be looked at under Sequence of Recover activities and Recovery procedures and depending on what has been defined in the data recovery plan for example in case of ordering database, this can be done manually while recovery process is done Sequence of Recovery activities Recover process should be carried out according the priority of each disaster and level of disaster damage from the results got from the analysis. For example if the database sever is recovered and this is the main critical business system, then this should be restored first before other servers and all the disaster recovery team should carried out the restoration process as in the disaster recovery plan,. If the business has to be transferred to another site then the critical files associated with the service has to be transferred depending on the plan. For example a plan to transport IT equipment and important data files. Recovery process This includes having access to the damaged IT equipment in case of the data centre this could database servers, corrupt files, informing users of the applications, getting backup if its not in house, restoring critical systems such operating systems, SQL database, testing the system before if goes operational and connecting the system on the network and informing uses of the application of the success of the restoration. Rebuilding process Ones the recovery process has been usefully, the disaster team recovery embarks on the process of transferring all the data recovered back to the original system, or may be totally system that can best support the functionality of data service being offered. The disaster recovery team will continue to monitor for any reoccurrence of incidents, make the necessary network and infrastructure connections, bring down the contingency system upon which the application was running and when the all system is stable the data centre staff can be able to use the original system after full restoration of data Update the disaster recovery plan If new procedures are find out during the process of recovery, it‘s updated on the recovery plan documentation which will be used again in case the same disaster occurs again 5.2Business Continuity and Disaster Recovery Plan The IT business continuity and disaster recovery plan for the IT department that I currently work in seeks to deal with the how best to handle emergency in the event of disasters and how best to minimise risk of damage, provide emergency services and recover to normalcy of service operations The Business Continuity Institute defines business continuity planning as â€Å"A holistic management process that identifies potential impacts that threaten an organisation and provides a framework for building resilience with the capability for an effective response that safeguards the interests of its key stakeholders, reputation, brand and value creating activities† 5.3 Aims of Business Continuity Planning Preventing a disaster At the initial planning stage, the critical areas of service operation of Information Technology is identified, for example within the Information Technology department where I work, servers for crucial systems, hot sites and training of the disasters team leaders are laid down. This initial planning stage is carried out with the aim of minimising the impact of disasters on Information technology resources and services; this also ensures that the department is able to recover as fast as possible from a disaster. Continuity The procedure of running a Information services using minimum resources during a disaster, this prevents the organisation from being put out of services both internally and externally. For example running applications for only crucial systems to continue operation while recovery is on the process Recovery The procedures that are required to restore all systems and resources are identified. This helps in bring all the resources and system to full operation, for example backing up data from off site centre. 5.4 Contingency Plan activation The activation of the organisations IT service continuity plan can be started at any time. The decision of activating the plan will be the sole responsibility of Estates and Security department with the assistant of officer in charge and contingency plan can not be started without the instruction being issued by Estates and security department with assistance from the Officer in charge. In case emergency occurs during business working hours, members of disaster recovery team will be gathered and depending on the level and mature or damage the Information technology team will be contacted If the emergency occurs out of business working hours, security is required to call the head of security or his/her deputy who will get in touch with the disaster recovery team with the help of the officer in charge and then the decision to initiate the Information communication technology business continuity plan If the team leaders are not available in the event of the emergency the deputy will take the responsibility and in the event where both the team leader and deputy are not available, next person on the list takes responsibility. 5.5 Emergency Management Team Team leader: Head of information Technology department who is responsible for over seeing all the information system services Deputy team leader: Systems Manager Responsible for all the systems applications such as the servers, back up and liaison between the off sites third party centres Team member: Database Administrator Responsible for; Internal databases and well as internal sites Ensure that a domain account has been set up for the SQL services. The admin backup and standard jobs from SourceSafe InstallationSQL Server 2000 Customise the jobs to ensure that server names and paths are correct Team member: Information Technology Security officer Responsible for the security of the internal sites and well as blocking unsafe sites Team member: Network Engineer Responsible for network connectivity and test our network devices from within our network Run test network script using DOS command Test access to the web services -Use government secure intranet network PC or dial-up PC belonging to web team in OCPD to check connection to all websites -Use nslookup to connect to wb-dns1 internal to the organisation and check that website names can be resolved Test email -An email should be sent to [emailprotected] and echo. These should respond by sending an email back 5.6 Disaster Recovery Plan Is the process of restoring access to the important system data, hardware and software that is required to start the system operational, Disaster Recovery Plan provides information on how to handle information that may be lost or corrupted during the disaster as well as proving team leaders with procedures of restoring information and data. 5.7 The main Objectives of the Information Technology Recovery Team The Recovery Teams main duties/ task are to: Prevent damages to Information Communication Installations Decide the requirements of senior management for other Departmental Recovery Teams and work accordingly to meet the requirements. Carry out tasks that lead to the provision of restoring all Information Communication service to normality as started by the Recovery Team within the disaster constraints or limits. 5.8 Disaster Recovery Team Team leader: Head of Estates and Security Responsible for the safe of the building as well as staff and members of the public Deputy team leader: Site Contractor Responsible for building and central service Team member: Head of security Responsible for staff and public safety 5.9Recovery Site The recovery site will be informed by the Information Technology Departmental recovery team leader and the assistant by Disaster recovery Team in case the team leader is absent. The site is located about 3 miles a way from the organisation, In case of serious incidents, the site can be contacted by information recovery mobile phone. 6. Assumptions With regard to the following case scenarios below, the disaster recovery team can take actions base on case scenario that is relative to the real disaster. Its the organisations policy that when incidents occur, staffs are evacuated from the building and entry to the site is not permitted unless staff members are informed by head of Estates and Security. 6.1 Case Scenarios Building Non-disruptive These case scenarios may include: Disaster in the staff car park not affecting the building Gas licking the building basement Suspicious package found in the public lockers Building is partly destroyed Scenarios in this case may include: Flood affecting the whole building Apart of the sever room that supports site B of the building is partly destroyed A part of fame room in site A where frame cabinets E8a and E8b are located is partly destroyed. IT store room is also partly affected. Building is completely destroyed Scenario in this case is: Server Room on site A of the building including cabinets room E1 and E2 are completely destroyed. 6.2 Building Non-disruptive 6.3 Actions In these case scenarios, all the information technology equipment are not destroyed. The disruption did call for evacuation of staff for healthy and safe issues and as soon as the build is cleared safe, staff members will be allowed in and operations will resume. 6.4 Building is partly destroyed In these case scenarios, some IT equipment are affected partly, it may escalate to a major for example the part destruction of server room in site A and the cabinet room where E8a and E8a may cause staff on this site to loss access to network resources. Here nothing can be done till staff members are not allowed to enter the building. Ones members are allowed in the building, all the equipment in the area affected can the