Thursday, December 26, 2019

Essay about The Adventures of Huckleberry Finn Should NOT...

Many books around the world have been banned because they are offensive. One example is Mark Twain’s The Adventures of Huckleberry Finn, a novel about the journey of a thirteen-year-old boy named Huck, who fabricates his own death to run away with an escaped slave named Jim. The two voyage in a raft along the Mississippi River to gain their individual freedom. In addition, Huck gains a new understanding about humanity. Huck Finn has been creating great controversy on both sides of the argument: to ban or to keep in the school curriculum. Currently â€Å"much debate has surrounded Mark Twain’s Huck Finn since its publication in 1885, but none has been more pervasive, explosive, and divisive than that surrounding the issue on race†Ã¢â‚¬ ¦show more content†¦Negroes do not like it in any book or play whatsoever, be the book or play ever so sympathetic in its treatment of the basic problems of the race. Even [if] the book or play is written by a Negro, they stil l [would] not like it† (Henry). In addition, John Wallace believes that the word â€Å"nigger† is so offensive that he rewrote the novel without the word â€Å"nigger.† Not only did Twain overuse the word â€Å"nigger† throughout the book, he additionally portrays blacks badly through negative and insulting stereotypes. Student Doron Flake discusses stereotypes that African Americans have â€Å"chained† to them at all times when he says, â€Å"Blacks are murderers, the rapists the gang-bangers, where everything that is negative is [sic] society, why do I have to go to school and be Jim too? Because whenever I read about the slave who is gullible and stupid, that [stereotype] becomes a reflection of me, too† (qtd. in Chadwick-Joshua xi). Doron does not want his fellow classmates to judge him based on how Twain describes and displays African Americans. Twain portrays the dehumanization of blacks throughout his novel. An example of Twains dehumanizing attitude towards African Americans occurs when Huck and Aunt Sally discuss the steamboat incident that causes an explosion: Now I struck an idea, and fetched it out: â€Å"It warnâ €™t the grounding -- That didn’t keep us back but a little. We blowed out a cylinder-head.† â€Å"Good gracious! anybody hurt? â€Å"No’m. Killed aShow MoreRelatedwisdom,humor and faith19596 Words   |  79 Pagesus feel superior, amidst our own ethnic group, to any supposed inferior group. Humor is also sometimes an inappropriate response to an event. Hearing of evils like the killing of an innocent person, the demeaning of a child, or the rape of a woman should elicit not humor but sorrow. As the Bible’s book of Ecclesiastes says, there is â€Å"a time to weep, and a time to laugh; a time to mourn, and a time to dance.† Enlightening comments on the relationship of humor to wisdom were once made by Reinhold NiebuhrRead MoreLogical Reasoning189930 Words   |  760 Pagesorganization is sound and the author does a superior job of presenting the structure of arguments. David M. Adams, California State Polytechnic University These examples work quite well. Their diversity, literacy, ethnic sensitivity, and relevancy should attract readers. Stanley Baronett. Jr., University of Nevada Las Vegas Far too many authors of contemporary texts in informal logic – keeping an eye on the sorts of arguments found in books on formal logic – forget, or underplay, how much of

Wednesday, December 18, 2019

The Westward Expansion Of The United States - 960 Words

The Westward expansion began for the United States with the Louisiana Purchase in 1803. For $15 million dollars, President Thomas Jefferson purchased from France 828,000 square miles, including most of 14 current states, thus doubling the size of America. Jefferson now had the land, but how to populate it was another story. On a three year expedition, Lewis and Clark were sent by Jefferson to explore the lands to get a better understanding of the geography and resources of the West. During the 1830s to 1840s, to promote further territory expansion, the â€Å"manifest destiny† came into play – which was the idea that America was destined to expand across the entire country westward. Quickly, the nation expanded. After the Civil War, there was a†¦show more content†¦In order to survive, the entire family needed to work. Each day, the settlers would wake up with the sunlight and work until sundown. Farmers heavily dependent upon the weather; a drought could kill the crops and wipe out an entire year s worth of work. Wildfires could be even worse as they could destroy everything including the settler s crops, barn, and home. As if that wasn t enough, settlers had to worry about insects eating their crops and tornados destroying their homes. It wasn t an easy life. However, a few of the settler’s children attended a local one-room schoolhouse. Usually they had only one teacher that taught all of the grades. They learned the basics such as reading, writing, math, spelling, and history. When writing, they used slates instead of paper. Slates were like small chalkboards they could hold in their hands (Ducksters.com). The cattle kingdom out west had hit its peak in the 1880 s. A steer could be purchased in Texas for eight dollars. They could be sold in the east for up to sixty dollars. In the 1880 s the open range is coming to an end. The farmers are fed up with the cattle tromping through his crops. The sheepherders also took away from the cattle kingdom. The sheep killed the grass when they ate it, unlike cows. The farmer and cowboy hated each other, and they wereShow MoreRelatedThe Westward Expansion Of The United States1144 Words   |  5 Pagesbranching and expansion.† That quote, once said by Stephen Jay Gould, can represent the Westward Expansion of the United States. In the early 1800s, the United States started trying to expand west. The U.S. acquired Florida, Texas, the Gadsden Territory, the Mexican Cession, the Oregon Territory, and the Louisiana Territory. All of those acquisitions helped evolve the United States into what it is today. Almost all of the land we own is from the Westward Expansion. Unfortunately, the United States were greedyRead MoreWestward Expansion Of The United States1477 Words   |  6 PagesThe United States began its life as a small nation consisting of only thirteen states. Over time the leaders of this county recognized that in order to prosper the nation would need to expand beyond the current set borders. Westward Expansion was the only solution, to adopt such a large endeavor meant that the population had to have a reason to migrate west. Expansion had appeal to the Southern land owners for the fact that the Missouri Compromise did not affect territories that were not part ofRead MoreThe United States Westward Expansion919 Words   |  4 Pagesculture. The United States grew drastically and new land became available over time. This surge in population created the Manifest Destiny, the belief of expansion from sea to sea. The United States’ westward expansion was a wicked, but vital component during the 1800s that allo wed the nation to exercise its power and prosper economically at the price of unfair manipulation towards Native Americans as well as a cruel game of tug of war with the lives of slaves. In order to promote expansion, the federalRead MoreWestward Expansion Of The United States1017 Words   |  5 PagesWestward expansion seemed perfectly natural to Americans in the mid-nineteenth century. Many settlers even believed that America, as a nation, was destined−by God himself− to expand westward. This ideology became known as the Manifest Destiny. Although many Americans thought it to be a kindly movement driven by pride, it continuously proved to be aggressive, racist, and imperialistic. Enthusiasm over territorial expansion began in 1803 when Napoleon decided to offer the United States the entireRead MoreWestward Expansion Of The United States1054 Words   |  5 Pages Westward Expansion in the United States created controversy about the admission of new states into the union. The first provision of the Westward Expansion was the Compromise of 1850. This compromise was designed to settle disputes among the North and South states about slavery expansion. Senator Henry Clay proposed that California be admitted as a free slave in a trade-off for tougher fugitive slave laws for runaways. As a part of the compromise of 1950, Congress also passed the Fugitive LawRead MoreWestward Expansion Of The United States1060 Words   |  5 PagesWestward expansion changed into the preference of the US to govern the territories of western components of the United States that had been either unclaimed or occupied by using other international locations. It is pertinent to comprehend that the us history became inspired with the aid of England in diverse methods. Within the second 1/2 of 18th century, the railroad which that turned into invented in England introduced a main effect in the USA enlargement to the West. Railroads originated fromRead MoreThe Impact Of Westward Expansion On The United States1571 Words   |  7 Pagesopened the door to westward expansion. Thomas Jefferson purchased this extensive plot of land with the hopes of strengthening and expanding the Republic, unaware that it would have the opposite effect. Jefferson’s fateful decision to expand the United States nearly destroyed the Republic that Americans worked so hard to build. It triggered the rise of divisions amongst Americans. These small cracks continued to grow and tear at the seams of the nation. Although westward expansion between 1800 and 1848Read MoreWestward Expansion and the Effects on the United States Essay1050 Words   |  5 PagesRunning Head: WESTWARD EXPANSION Westward Expansion and the Effects On the United States October 3, 2007 Abstract The Louisiana Purchase was the largest land deal in our history. It doubled the size of the United States and gave us a strong face as an economic power. It brought immigrants from all over the world for the idea of owning land and making a living for themselves. We also had a second expansion with the Adams-Onis treaty in 1819 (Davidson, 2002, p.p. 246-247) where weRead MoreEssay On Manifest Destiny1551 Words   |  7 PagesManifest Destiny was a widely spread belief that settlers in the United States should expand across North America. It was the belief that fueled the westward expansion. The westward expansion led to many other events in and around the United States. Before Manifest Destiny and the westward expansion the French and Indian War and Revolutionary War took place which allowed America to declare independence. Manifest Destiny was a big influence on the evolution of transport and technology. Before weRead MoreManifest Destiny1555 Words   |  7 PagesThe Evolution Of Transportation Manifest Destiny was a widely spread belief that settlers in the United States should expand across North America. It was the belief that fueled the westward expansion. The westward expansion led to many other events in and around the United States. Before Manifest Destiny and the westward expansion the French and Indian War and Revolutionary War took place which allowed America to declare independence. Manifest Destiny was a big influence on the evolution of transport

Tuesday, December 10, 2019

Malaria World Health Organization

Question: Discuss about theMalaria for World Health Organization. Answer: Malaria is worldwide health menace. It is caused by a bite of infected anopheles mosquito. The disease is known to cause a substantial mortality and morbidity globally. According to world health organization (WHO) 2016, approximately 3.2 billion people are at risk of malaria internationally. Comparatively, sub-Saharan Africa has been heavily affected by malaria. For instance, in the year 2016, the region had 88% of the entire cases and 90% of deaths (WHO 2016). Countries in this region ought to propound stringent strategies and measures in order to curb and eliminate this epidemic. Kenya is one of the countries in this region. It is located at the equator. Its climate throughout the years fosters favorable conditions for vector breeding thus high transmissibility. However, the burden of malaria in Kenya is not evenly distributed. The most affected areas are the regions around Lake Victoria and on the coast. Children under five years and the pregnant women are the most vulnerable groups. Approximately, 70% of the Kenyan population reside in malaria risk regions. It has also been established that falciparum plasmodium is the major strain of mosquito that causes malaria infection (Leighton Foster 2013). Malaria has had dire consequences on the Kenyan population. The disease has inflicted substantial costs on both individuals and the government. The net effect of this imposition of costs is a poor economy that is witnessed in the country. First and foremost, individuals and families have spent a ransom in an attempt curb malaria (Fosu Marabu 2014). A lot of resources have been deployed in the purchase of drugs for malaria treatment and travel to medical facilities. Additionally, malaria has resulted in lost days of work thus loss of income. Furthermore, in an attempt by individuals and families to avert malaria infections, huge expenses have been incurred in the preventive measures. This includes push clearing, indoor spraying, purchase of insecticides and treated beds nets (WHO 2016).Moreover, significant costs have also been witnessed in the burial of those succumbs to malaria infections. On the other, the government has also incurred costs in the following areas. Huge resources h ave been injected in equipping and staffing health facilities. This entails training and hiring experts to conduct research related to malaria. In addition, the public health sector has spent a lot of resources in its preventive activities. These activities include insecticide spraying, distribution of insecticide-treated bed nets etc. These endeavors to eliminate malaria has overstretched the existing meager resources and this has led to the poor living conditions in the endemic areas.This phenomenon is in tandem with Nobel Laureate in medicine T.H. Weller who observed that the endemicity of malaria in a given community impoverishes that community (Marcus 2013). Apart from the aforementioned direct costs, malaria has had a number of indirect ramifications to the population. Malaria has resulted in a shift of behaviors that has led to the incurrence of robust social costs. This includes migration, demography, and saving. Furthermore, due endemicity of malaria in these areas and the nature of epidemics that can occur, it has impacted on tourism, international trade, and investments negatively (Leighton Foster 2013). Malaria has also been implicated as a cause of high population density experienced in malarious regions. According to the ministry of health (2015), malaria has been found the main cause of infant and child mortality. It has been deduced that, among other factors, infant and child mortality is the core determinant of household fertility. Due to high infant and child mortality, parents conspire to produce more children in order to replace those that die and also to have a specific number of surviving children. This situation has been found to cause population increase and this is mainly due to the measures that have substantially reduced infant and childhood mortality (Kreier 2012). In Kenya like around the globe, stringent strategies and measures have been put in place to reduce and eliminate malaria. The ministry of health in partnership with other stakeholders has instituted a number of evidence-based measures to curb malaria. Four key interventions have been put forth (Kenya Kenya National Bureau of Statistics 2015). The country has ensured that there are prompt diagnosis and effective treatment of malaria cases. The approved diagnostic criteria is with a parasitological test that entails either microscopy or malaria rapid diagnostic test (RDT).The recommended first-line treatment for uncomplicated malaria is artemether-lumefantrine (AL).For severe malaria, the treatment that has been recommended is parenteral artesunate ( WHO 2016). The government has enabled universal distribution of insecticide-treated bed nets (ITNS) among her population. This exercise has been majorly concentrated in the endemic regions. The country envisions to distribute a total of 13.6 million ITNS.This is strategy has been partly achieved as a number of counties within the endemic region have witnessed the sensitization and the distribution of the ITNS.This intervention has borne fruits.According to the ministry of health 2016, the diagnosed cases of malaria substantially reduced by 44% in the 23 counties where this exercise was executed (WHO 2016). The public health sector has also intensified indoor spraying. This is meant to control the vectors that cause malaria. This exercise targeted Lake Victoria and the coastal endemic areas. These areas have an estimated of 10.7million people. The exercise involved the use of pyrethroid insecticide (Fosu Marabu 2015). Malaria in pregnancy has been considered as a priority health menace in Kenya. This is because it is associated high mortality of both pregnant women and infants. The ministry of health has recommended the providence of intermittent preventative treatment for malaria in pregnancy (IPTP).This recommendation has seen women inhabiting in malaria endemic areas given sulfadoxine-pyrimethamine. This is services mainly meted out during antenatal care (ANC) visits. The recommended number of doses is three or more Generally, despite the numerous hurdles, malaria health in Kenya is well managed. The interventions that have been commissioned are in line with the recommendations that have been advocated by statutory organs such as World health organization (WHO) and have been found to be fruitful.This is achievement is depicted by a vast decline in both morbidity and mortality associated with malaria Despite the great strides that have been made by the government in the elimination of malaria, a lot ought to be done. The government should see that the healthcare providers and the technical expertise are strengthened and capacitated. This can be achieved through ongoing training and by providing comprehensive management guidelines. This capacitation will see that the staff is updated with new strategies thus ensuring effective management of malaria. In addition, community-based approaches ought to be instituted. The community should be sensitized on ways to curb this menace and then equipped to carry out the task. This will not only reduce the cost but also will increase the coverage of these measures. Finally, the government should endeavor to equip her research institution to come up with malaria vaccines and other appropriate interventions that will eliminate malaria in the country coming up with the appropriate vaccine will greatly reduce the mortality associated with malaria. For instance, the trial phase iii of PATH malaria vaccine initiative (MVI) has been found to reduce child mortality rate by 50% (WHO 2016). References Fosu, A. K., Marabu, G. M. (2014).Malaria poverty in Africa. Nairobi: University of Nairobi Press. Isle, M. (2015).Malaria. New York: Rosen Pub. Group. Kenya Kenya National Bureau of Statistics. (2016).2015 Kenya malaria indicator survey. Nairobi, Kenya: Division of Malaria Control, Ministry of Public Health and Sanitation. Kenya National Bureau of Statistics, ICF Macro (Firm), MEASURE DHS (Program). (2016).Kenya malaria indicator survey 2015. Kreier, J. P. (2012).Malaria. New York: Academic Press. Leighton, C., Foster, R., Abt Associates. (2013).Economic Impacts of Malaria in Kenya and Nigeria: Major Applied Research Paper No. 6. Cambridge, Mass: Abt Associates. Marcus, B. A. (2013).Malaria. Philadelphia: Chelsea House Publishers. World Health Organization. (2016).Management of severe malaria: A practical handbook. Geneva: World Health Organization. World Health Organization. (2016).World malaria report 2015. Geneva: World Health Organization.

Monday, December 2, 2019

Socio Cultural influences on sexuality free essay sample

When examining influences on sexuality one has to look at many different factors. One of those factors that has an influence on sexuality is the culture or society that person is from and their expectations of sexual behavior. Gender identity, their roles, and stereotypes associated with a person’s gender also play a part. Finally the psychological impacts of these expectations and how commercial sex influences expectations and perceptions of sexuality should be explored. Gender Identity and Gender Roles Gender identity is â€Å"one’s subjective sense of being a man (or boy) or a woman (or girl). This sense is usually acquired by the age of 3† (King, 2012). â€Å"As children move into the larger world of friends and school, many of their ideas and beliefs are reinforced by those around them. A further reinforcement of acceptable and appropriate behavior is shown to children through the media, in particular, television. Through all these socialization agents, children learn gender stereotyped behavior. We will write a custom essay sample on Socio Cultural influences on sexuality or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page As children develop, these stereotypes become firmly entrenched beliefs and thus, are a part of the childs self-concept† (Witt, 1997). However, where do those that may have a gender identity disorder fall. Those that have gender dysphoria are those that may feel they are trapped in the wrong anatomic body. This could be that little boy who is more comfortable wearing a dress or the little girl that prefers to play in the mud and wear overalls versus a dress. They could even be classified as having a gender identity disorder, of which there are two criteria. The criteria are they indicate that identify with the opposite gender and that they indicate discomfort with their own anatomy and gender role. Gender Stereotypes A gender stereotype is defined as â€Å"oversimplified, preconceived beliefs about the gender roles of men and women† (King, 2012). The beliefs can either be positive or negative. There are gender stereotypes in every culture in the world. However, when these ideas are developed and applied regardless of evidence to the contrary it helps to perpetuate these stereotypes. Examples of gender stereotyping would be: When thinking of the female stereotypical role, the idea is she puts her family’s welfare before her own, that she has a loving, nurturing, and caring spirit about her. Or when thinking of the male stereotypical role, he is the financial provider, he is assertive, the family protector, and independent. Children are taught stereotypical behaviors concerning gender stereotypes at an early age. Examples would be that girls are bought toys that foster nurturing and caring such as doll babies and kitchen sets. Whereas boys were given toys such as toy soldiers and cars that were more aggressive. However when these stereotypes are met it becomes dangerous and could potentially have a psychological impact on a person. Psychological Impacts The psychological impact that gender stereotyping has on an individual can be very dangerous. Stereotypes can affect the way that a person makes decisions, reacts in certain situations and have lifelong effects. As a result of gender stereotyping women face many challenges in the workplace. â€Å"The American Civil Liberties Union reports that a woman still earns only 77 cents for every dollar earned by a man. Women’s salaries are still often seen as a supplement to their husband, according to Catalyst, a nonprofit designed to build inclusive workplaces for women and business† (Career Thought). This is one such reason that women tend to become dependent on men and possibly even have low self esteem. Gender stereotyping in the media can also have a psychological impact on children. â€Å"Worrying about appearance or weight, crying or whining, and weakness are all things both girls and boys say they associate more with female characters on television than male characters. Playing sports and wanting to be kissed or have sex, on the other hand, are more often thought of in association with male characters than female† (University of Minnesota). As well, the media portrays women in such roles as prostitutes, or dependent on men and that leads young girls to think that is the way it should be. Conclusion When it comes to human sexuality there are a great number of factors and observations that should be taken into consideration and studied. Gender identity, gender roles, and gender stereotypes should all be taken into consideration when dealing with human sexuality. Many times society may not realize the things that people observe actually influence behaviors. However, these items can have a profound psychological impact.

Wednesday, November 27, 2019

Biography of Michelle Obama, U.S. First Lady

Biography of Michelle Obama, U.S. First Lady Michelle Obama  (born January 17, 1964) was the first African-American first lady and the wife of Barack Obama, the 44th president of the United States and the first African-American to serve as president. She is also a lawyer, the former vice president of community and external affairs at the University of Chicago Medical Center, and a philanthropist. Fast Facts: Michelle Obama Known For: First Lady of the United States, wife to 44th President Barack ObamaBorn: January 17, 1964 in Chicago, IllinoisParents:  Marian Shields and Fraser C. Robinson IIIEducation: Princeton University (BA in sociology), Harvard Law School (JD)Published Works: BecomingSpouse: Barack Obama (m. October 3, 1992)Children: Malia (born in 1998) and Natasha (known as Sasha, born in 2001) Early Life Michelle Obama (nee Michelle LaVaughn Robinson) was born on January 17, 1964, in Chicago, Illinois, the second of two children of Chicagoans Marian Shields and Fraser C. Robinson III. She describes her parents as important early role models in her life, whom she proudly identifies as working class. Her father, a city pump operator and Democratic precinct captain, worked and lived with multiple sclerosis; his limp and crutches did not affect his abilities as the family breadwinner. Michelles mother stayed home with her children until they reached high school. The family lived in a one-bedroom apartment on the top floor of a brick bungalow on Chicagos south side. The living room- converted with a divider down the middle- served as Michelles bedroom. Michelle and her older brother Craig, now an Ivy League basketball coach at Brown University, grew up hearing the story of their maternal grandfather. A carpenter who was denied union membership due to race, Craig was shut out of the citys top construction jobs. Yet the children were taught they could succeed despite any prejudices they might encounter over race and color. Both children were bright and skipped second grade. Michelle entered a gifted program in sixth grade. From their parents, who had never attended college, Michelle and her brother learned that achievement and hard work were key. Education Michelle attended Whitney M. Young Magnet High School in Chicagos West Loop, graduating in 1981. Although she was discouraged from applying to Princeton by high school advisors who felt her scores werent adequate, she was accepted and graduated from the college with honors and a bachelors degree in sociology and a minor in African-American studies. She was one of very few black students attending Princeton at the time, and the experience made her acutely aware of the issues of race. After graduation, she applied to Harvard Law School and once again faced bias as college counselors tried to talk her out of her decision. Despite their doubts, she matriculated and excelled, obtaining her J.D. in 1985. Professor David B. Wilkins remembers Michelle as forthright: She always stated her position clearly and decisively. Career in Corporate Law After graduating from Harvard Law School, Michelle joined the law firm of Sidley Austin as an associate specializing in marketing and intellectual property. In 1988, a summer intern who was two years older than she by the name of Barack Obama came to work at the firm, and Michelle was assigned as his mentor. They married in 1992 and later had two daughters, Malia (born in 1998) and Natasha, known as Sasha (born in 2001). In 1991, the death of her father from complications related to MS caused Michelle to re-evaluate her life; she subsequently decided to leave corporate law to work in the public sector. Career in Public Sector Michelle first served as assistant to Chicago Mayor Richard M. Daly; later she became assistant commissioner of planning and development. In 1993 she founded Public Allies Chicago, which provided young adults with leadership training for public service careers. As executive director, she headed up a nonprofit named by President Bill Clinton as a model AmeriCorps program. In 1996, she joined the University of Chicago as Associate Dean of Student Services and established its first community service program. In 2002, she was named the University of Chicago Hospitals executive director of community and external affairs. Balancing Career, Family, and Politics Following her husbands election to the U.S. Senate in November 2004, Michelle was appointed Vice President of Community and External Affairs at the University of Chicago Medical Center in May 2005. Despite Baracks dual roles in Washington, D.C., and Chicago, Michelle did not consider resigning from her position and moving to the nations capital. Only after Barack announced his presidential campaign did she adjust her work schedule; in May 2007 she cut her hours by 80 percent to accommodate the needs of the family during his candidacy. Although she resists the labels feminist and liberal, Michelle Obama is widely recognized as outspoken and strong-willed. She has juggled career and family as a working mother, and her positions indicate progressive ideas on the roles of women and men in society. First Lady Michelles husband Barack was elected U.S. president in November 2007. During her first term as first lady, Michelle spearheaded the Lets Move! program, a concerted effort intended to reduce childhood obesity. Although it has been difficult to gauge the success of the program overall, her efforts led to the passage of the Healthy, Hunger-Free Kids Act in 2010, which allowed the U.S. Department of Agriculture to set new nutritional standards for all food sold in schools for the first time in more than 30 years. During Barack Obamas second term, Michelle focused on the Reach Higher Initiative, which aimed to help students identify future careers and enable them to complete coursework past high school- whether its at a professional training program, a community college, or a four-year college or university.  That initiative continues, with a focus on school counselor training, raising awareness about college access tools, and social media outreach and flagship events such as College Signing Day. Post-White House Since the Obamas left the White House in January 2016, Michelle worked on and published her memoir Becoming, published in November 2018. She has also worked on the Global Girls Alliance, an education project intended to help provide tens of millions of adolescent girls worldwide who were not given a chance to finish high school; Global Girls is an outgrowth of Let Girls Learn, which she started in 2015 and left with the White House. She has actively supported the Chicago-based Obama Foundation charity, and been a spokesperson for When We All Vote, to increase voter registration. Sources: Obama, Michelle. 2018. Becoming. New York: Crown, 2018.Saulny, Susan. Michelle Obama Thrives in Campaign Trenches. New York Times, 14 February 2008.Bennetts, Leslie. First Lady in Waiting. VanityFair.com, 27 December 2007.Gewertz, Catherine. Michelle Obamas Reach Higher Initiative Merges With the Common Application. Education Week Blog High School Beyond, 27 September 2018.  Ross Johnson, Steven. Gauging the public health value of Michelle Obamas Lets Move campaign. Modern Healthcare, 23 August 2016.Rossi, Rosalind. The woman behind Obama. Chicago Sun-Times, 22 January 2008.Slevin, Peter. Michelle Obama: A Life. New York: Vintage Books, 2015.Michelle Obama’s vacation is over. Now she’s claiming her own spotlight. The Washington Post, 11 October 2018.

Saturday, November 23, 2019

Add These Trucker Blogs to Your Reading List

Add These Trucker Blogs to Your Reading List This is a bit of a meta-concept- The RJ Trucker Blog has a great bunch of recommendations for blogs by and for truckers you should be reading! Trucking Truth by driver Brett Aquila is a resource for aspiring and rookie drivers with an honest and informative take on how to become and succeed as a driver.Trucker Dump, authored by Todd McCann, is an insider’s look at the issues and opportunities for solo and team truckers alike.Real Truck Driver Blog, run by Robert Allen (one of the hosts of The RJ blog), has a specialized approach to blogging about trucking, sorting his posts by category and recommending headsets and software as well as advice and guidance for new and old drivers.AutoFleet Market Trends Blog, from writer and trucker Mike Antich, reflects the author’s 20 years of management and driving experience. If you’re interested in moving up the ladder into management, definitely check out his blog.One Girl Trucking is written by the semi-anonymous Bethany, an d I’m not even a little sheepish about declaring it my favorite- Bethany’s focus in empowering women behind the wheel (and raising awareness of her extremely cute dog, Poppy Rose).The Daily Rant  by driver Salena is an ongoing series of snapshots of life on the road as she drives all over the U.S. and Canada, documenting her experiences with great photos and entertaining posts.Ask the Trucker, written by Truck Driver Advocate Allen Smith (of TruthAboutTrucking.com), offers  information for drivers and students to raise the standards of the industry and help drivers connect with one another.Daniel S Bridger’s Trucking Blog  is run by a driver and trainer with more than 30 years of experience- he accepts guests posts and contributors, if you’re interested in joining the ranks of trucker-writers!Wheel Beauties is run by Laila, who channels her passion for trucking and big rigs (and toys, racing, photos and specialty vehicles) into this blog and welcome s all enthusiasts to share her excitement for these massive trucks, and support for those who drive them.I feel more informed already!

Thursday, November 21, 2019

Intercultural communication( this is the course I am studying, not the Assignment - 2

Intercultural communication( this is the course I am studying, not the topic) - Assignment Example One way to do it is to subsidize the foods in the canteen by giving employees food stamps and giving them free staple foods as part of their benefit like giving them a sack of rice or whatever their basic foods are. Response to classmate 1: This is a very sensible and heroic thing to do to instead spare the child from the danger of working in the street and instead take the danger to yourself. Then let the child work in the safe environment of the factory. But it would have been better if the two of you could work there because exposing yourself in an unsafe environment is very dangerous especially if the health center is far. Response to classmate 2: I agree with you to have a clinic rather than chose a street with potential violence but what if you have to make a choice and your choice is limited. Would you have your child work in the street

Tuesday, November 19, 2019

Corporate social responsibility - who engages in it and what do they Research Paper

Corporate social responsibility - who engages in it and what do they expect to achieve - Research Paper Example It is imperative to understand that companies have a lot of power in the community as well as the national economy (Anderson, 2008). They often control assets and in many cases they have billions in cash at their disposal of socially conscious investment programs. This paper is going to describe who engages in corporate social responsibility and what they often expect to achieve through the program. Companies are often the ones that involve themselves in corporate social responsibility. In fact, in the 21st century, more companies are being called upon by their share holders as well as other important stakeholders, not only to boost the bottom line but to address some of the country’s most challenging problems. This includes those that are concerned with economic developments as well as environment. It is imperative to understand that although opinions in many cases might differ on the how the responsibility should be allocated across the private and public sectors, the corporate stakeholders and other persons in the society (Coelho, 2003). For this reason, in recent years, companies have been increasingly working with stakeholders in order to understand the concerns as well as views of certain people when it comes to environmental, corporate, and social governance as well as economic issues and issues that are needed to be incorporated in order to address the views and the concerns that exist the company strategic decision making processes. Many companies often care about how effective their branding is and how they are perceived by their customers as well as the general public. It is of importance to note that with everything else in the market being equal, companies that often take an active role in the promotion of their corporate social responsibility programs are in many cases often viewed more favorably than those that do not possess highly visible programs. Therefore, companies often understand that having a

Sunday, November 17, 2019

End of Life Care Essay Example for Free

End of Life Care Essay When a loved one is dying, conversations about the end of life can be uncomfortable and difficult. Still, discussing end-of-life care is important. Depending on the circumstances, you might be able to help your loved one make important end-of-life decisions — such as whether to remain at home, move to a nursing home or other facility, or seek hospice care. Also, you can work with your loved ones health care team to make sure your loved one remains comfortable at the end of life. Pain, anxiety and other end-of-life symptoms can often be treated. Even at the end of life, you can continue to support and nurture your relationship with your loved one. Simply being there can be an important source of strength and comfort for everyone. Grief When a loved one dies, grief can feel like a dagger in your heart. Often, grief triggers raw, intense emotions. You might wonder how youll ever pick up the pieces and heal your wounds — yet not feel as if youre betraying your loved ones memory. There are no quick fixes for the grief and anguish that follow a loved ones death. As you face your grief, acknowledge the pain and know that its part of the healing process. Take good care of yourself, and seek support from friends and loved ones. Although your life will never be quite the same, the searing pain of grief will eventually become less intense. Accepting your new normal can help you reconcile your losses and move on with your life. Hospice Care Also called: End-of-life care Hospice care is end-of-life care provided by health professionals and volunteers. They give medical, psychological and spiritual support. The goal of the care is to help people who are dying have peace, comfort and dignity. The caregivers try to control pain and other symptoms so a person can remain as alert and comfortable as possible. Hospice programs also provide services to support a patients family. Usually, a hospice patient is expected to live 6 months or less. Hospice care can take place * At home * At a hospice center * In a hospital * In a skilled nursing facility - What is the role of the family? Family members often make sacrifices to care for relatives. Families provide care, pain management, and protect the patient. Although they may lack knowledge, caregivers gain satisfaction and pride from providing care, but are also at risk for depression and health problems related to caregiver stress (Haley Bailey, 1999: Haley et al., 2001; Weitzner, Haley, Chen, 2000). Some cultures may believe caring is the community’s duty and obligation. Caregivers benefit from social support, maintaining social activities and roles, and psychological interventions that teach coping skills. Most people want their family to be given choices about treatment and few wanted the physician to decide alone (Bradley, 1998). End of life: Caring for a dying loved one Whether you bring a dying loved one home or keep vigil at the hospital, you can take measures to provide comfort and relief at the end of life. Caring for a dying loved one isnt easy. Even when you know the end of life is approaching, you might not feel prepared. Understanding what to expect — and what you can do to increase your loved ones comfort — can help. * Choosing where to die Your loved one may have various choices for end-of-life care. Options may include: * Home care. Many people choose to die at home or in the home of a family member. You can assume the role of caregiver or hire home care services for support. Hospice care — services that help ensure the highest quality of life for whatever time remains — can be provided at home as well. * Inpatient care. Some people may prefer round-the-clock care at a nursing home, hospital or dedicated inpatient hospice facility. Hospice and palliative care — a holistic treatment approach intended to ease symptoms, relieve pain, and address spiritual and psychological concerns — can be provided in any of these environments. When you discuss the options with your loved one, consider his or her preferences as well as special physical, emotional and psychosocial needs. Evaluate how much support can be provided by family members and friends. For help determining the best option, talk with your loved ones health care team or a social worker. You might ask for a referral to palliative or hospice care specialists — health care providers trained in specific care for people nearing the end of life. * Spirituality at the end of life As your loved one approaches the end of life, he or she may talk about spirituality or the meaning of life. Dont force the subject — but if it comes up, encourage your loved one to explore and address his or her feelings. You might ask your loved one open-ended questions about his or her beliefs and experiences or most meaningful moments. You may want to invite a spiritual leader to visit your loved one as well. * Saying goodbye You can help your loved one communicate his or her final wishes for family and friends. Encourage your loved one to share his or her feelings, including thanks or forgiveness, and give others a chance to say goodbye. This may stimulate discussion about important, unsaid thoughts, which can be meaningful for everyone. Your loved one might also find it comforting to leave a legacy — such as creating a recording about his or her life or writing letters to loved ones, especially concerning important future events. * Recognizing when death is near Its difficult to predict exactly when someone will die. As death approaches, however, your loved one may show various signs and symptoms indicating that the end of life is near. Look for: * Restlessness and agitation. Your loved one may frequently change positions. * Withdrawal. Your loved one may no longer want to participate in social events or other favorite activities. * Drowsiness. Your loved one may spend most of his or her time asleep. * Loss of appetite. Your loved one may eat and drink less than usual. * Pauses or other changes in breathing. This may happen when your loved one is asleep or awake. Providing comfort The active phase of dying usually begins several days before death. Although you cant change whats happening to your loved one, you can help him or her feel as comfortable as possible — ideally with the support of palliative or hospice care specialists. Your loved one also may experience a brief, final surge of energy. Though it can be confusing to see your loved one with renewed vitality, remember that this is a normal part of dying. If it happens, take advantage of the opportunity to enjoy your loved one and say your final goodbyes. * Keeping vigil For many families, keeping vigil near a dying loved ones bed is a way to show support and love. If you decide to keep vigil, continue talking to your loved one. If you think your loved one would want to share this time with others, invite family members or close friends to show their support as well. Express your love, but also let your loved one know that its all right to let go. What is working? Mental health providers with palliative expertise can improve communication and resources. Mental health experts help providers understand the patient’s concerns and culture. They explain confusing medical terms and clarify CPR, pain management, and other treatments and encourage collaboration. Mental health providers also help relieve the common emotional distress and grief resulting from a terminal illness or care giving. COPING WITH BEREAVEMENT â€Å"IN OUR HEARTS, WE ALL KNOW THAT DEATH IS A PART OF LIFE. IN FACT, DEATH GIVES MEANING TO OUR EXISTENCE BECAUSE IT REMINDS US HOW PRECIOUS LIFE IS.† * Coping With Loss The loss of a loved one is life’s most stressful event and can cause a major emotional crisis. After the death of someone you love, you experience bereavement, which literally means â€Å"to be deprived by death.† Remember — It takes time to fully absorb the impact of a major loss. You never stop missing your loved one, but the pain eases after time and allows you to go on with your life. * Knowing What to Expect When a death takes place, you may experience a wide range of emotions, even when the death is expected. Many people report feeling an initial stage of numbness after first learning of a death, but there is no real order to the grieving process. Some emotions you may experience include: * Denial * Disbelief * Confusion * Shock * Sadness * Yearning * Anger * Humiliation * Despair * Guilt These feelings are normal and common reactions to loss. You may not be prepared for the intensity and duration of your emotions or how swiftly your moods may change. You may even begin to doubt the stability of your mental health. But be assured that these feelings are healthy and appropriate and will help you come to terms with your loss. * Mourning A Loved One It is not easy to cope after a loved one dies. You will mourn and grieve. Mourning is the natural process you go through to accept a major loss. Mourning may include religious traditions honoring the dead or gathering with friends and family to share your loss. Mourning is personal and may last months or years. Grieving is the outward expression of your loss. Your grief is likely to be expressed physically, emotionally, and psychologically. For instance, crying is a physical expression, while depression is a psychological expression. It is very important to allow yourself to express these feelings. Often, death is a subject that is avoided, ignored or denied. At first it may seem helpful to separate yourself from the pain, but you cannot avoid grieving forever. Someday those feelings will need to be resolved or they may cause physical or emotional illness. Many people report physical symptoms that accompany grief. Stomach pain, loss of appetite, intestinal upsets, sleep disturbances and loss of energy are all common symptoms of acute grief. Of all life’s stresses, mourning can seriously test your natural defense systems. Existing illnesses may worsen or new conditions may develop. Profound emotional reactions may occur. These reactions include anxiety attacks, chronic fatigue, depression and thoughts of suicide. An obsession with the deceased is also a common reaction to death. * Dealing with a Major Loss The death of a loved one is always difficult. Your reactions are influenced by the circumstances of a death, particularly when it is sudden or accidental. Your reactions are also influenced by your relationship with the person who died. A child’s death arouses an overwhelming sense of injustice — for lost potential, unfulfilled dreams and senseless suffering. Parents may feel responsible for the child’s death, no matter how irrational that may seem. Parents may also feel that they have lost a vital part of their own identity. A spouse’s death is very traumatic. In addition to the severe emotional shock, the death may cause a potential financial crisis if the spouse was the family’s main income source. The death may necessitate major social adjustments requiring the surviving spouse to parent alone, adjust to single life and maybe even return to work. Elderly people may be especially vulnerable when they lose a spouse because it means losing a lifetime of shared experiences. At this time, feelings of loneliness may be compounded by the death of close friends. A loss due to suicide can be among the most difficult losses to bear. They may leave the survivors with a tremendous burden of guilt, anger and shame. Survivors may even feel responsible for the death. Seeking counseling during the first weeks after the suicide is particularly beneficial and advisable. Living with Grief Coping with death is vital to your mental health. It is only natural to experience grief when a loved one dies. The best thing you can do is allow yourself to grieve. There are many ways to cope effectively with your pain. * Seek out caring people. Find relatives and friends who can understand your feelings of loss. Join support groups with others who are experiencing similar losses. * Express your feelings. Tell others how you are feeling; it will help you to work through the grieving process. * Take care of your health. Maintain regular contact with your family physician and be sure to eat well and get plenty of rest. Be aware of the danger of developing a dependence on medication or alcohol to deal with your grief. * Accept that life is for the living. It takes effort to begin to live again in the present and not dwell on the past. * Postpone major life changes. Try to hold off on making any major changes, such as moving, remarrying, changing jobs or having another child. You should give yourself time to adjust to your loss. * Be patient. It can take months or even years to absorb a major loss and accept your changed life. * Seek outside help when necessary. If your grief seems like it is too much to bear, seek professional assistance to help work through your grief. It’s a sign of strength, not weakness, to seek help.

Thursday, November 14, 2019

call centers :: essays research papers

Call Centers -- RP's Emerging Sunshine Industry The call center service has been dubbed the country's latest sunshine industry, expected to generate around 24,000 jobs in the next two years. When a door closes, a window opens. Even as the Philippines feels the fallout from the global IT crunch, it has benefited from the prevailing cost-cutting trend in an unexpected way -- an unprecedented boom in the call center business. Indeed, the call center service has been dubbed the country's latest sunshine industry, with the sector expected to generate around 24,000 jobs in the next two years, according to Toby Monsod, former assistant secretary of the Department of Trade and Industry (DTI). "It's a very promising industry. Everybody's growing and hiring," Benedict Hernandez, Contact Center Association of the Philippines (CCAP) chair, said in a recent interview. From 2000 to 2001, the segment reportedly grew by more than 200 percent, and local call center revenues are projected to increase from $173 million in 2002 to $864 million in 2004. Optimism runs high as an international research group forecasts the growth of ICT-enabled services to a $200-billion industry by the year 2010, with the call center segment's share at $42 billion. Reports say that in the United States alone, there are 1.5 million call center seats that could be outsourced, and so far the Philippines has less than 10,000 seats filled, indicating the domestic industry's huge potential. What are call centers? A call center is a central customer service operation where agents (often called customer care specialists or customer service representatives) handle telephone calls on behalf of a client. Clients include mail-order catalog houses, telemarketing companies, computer product help desks, banks, financial service and insurance groups, transportation and freight handling firms, hotels and IT companies. The size of an operation is described in terms of the number of "seats." A seat consists of a station with two or three people alternating in several shifts to provide 24-hour call center service. The industry's main target markets include the United States, Australia and the United Kingdom. Many factors contribute to the local industry's sizzling development pace. One is the rising cost of doing business in industrialized countries like the United States, forcing foreign companies to downsize and outsource peripheral e-services to developing countries like the Philippines to cut overheads. CCAP president Jose Ferreros also cites the better power and telecommunications infrastructure, competitive labor cost in terms of quality and value for money, and strong government support for ICT-related industries.

Tuesday, November 12, 2019

Equal Opportunities Approaches & Managing Diversity

Abstract The aim of this paper is to analyze the similarities and the differences between two popular approaches in today’s human resource management: equal opportunities approach and managing diversity approach. While the managing diversity approach focuses more on business efficiency, the equal opportunities approach concentrates on equal treatment of employees in a bureaucratic sense. The paper begins with definitions of both approaches; continues with explaining differences and similarities of both approaches comparatively.The relative superiority of the managing diversity approach for business organisations with respect to equal opportunities approach is gone through followed by a conclusive part. There have been considerable positive developments against discrimination of employees recently through legislation, while initiatives for equality and affirmative action programs were developed as well (Zafree, 2010). These steps have served to take unemployment levels and work place discrimination of the disadvantaged groups that are discriminated due to their races, ages, religions, gender, down.The equal opportunities approach, concentrates on equality and justice at workplaces (Zafree, 2010). The equal opportunities approach can be said to be a liberal school of thought usually supported by legally binding regulations, which influences actions and behaviours at workplace through legislation with formalised procedures and policies. Through policies applied through equal opportunities approach, employees and potential employees are able to exist and compete on equal terms with respect to race, gender, disability, religion etc.In other words, equal opportunities approach assumes that discrimination stems from unequal treatment of individuals. It can therefore be said that, the equal opportunities approach analyses employee and employer relationships directly from viewpoint of public, state and employees; while the focus is less for employers' situation. T he main idea behind equal opportunities approach is promoting rights of all members in the society (Torrington, Hall and Taylor, 2008, p. 576) regardless of their social, cultural, religious or ethnical backgrounds.As a result, this approach is less about the outcomes or results of working in a socially and culturally diverse environment, but on the opportunities that can prepare or lead to such an environment. From this point of view, equal opportunities approach is not directly interested in affecting employee satisfaction or product efficiency of an organisation. However, it concentrates on the equalising opportunities pertaining to positing within an organisation. There are several stereotypical characteristics in organizations that can lead to discrimination (Bekyan, 2010).With equal opportunities strategy, human resource managers are driven with an emphasis on positive action, or creating a more balanced mix of staff, permitted under all strands of the discrimination such as à ¢â‚¬Ëœstaff training', ‘flexibility of dress', ‘providing assistance with child care' and so forth. According to Equality Act (2010), age, disability, gender reassignment, marriage and civil partnership, race, religion or belief, sex and sexual orientation are the factors that are to be protected during employment process; which are directly aimed at through equal opportunities approach.On the other hand, managing diversity approach is a concept that was first applied in the United States in 1980s as a reply to the demographic modifications within the labour force, global competition, while it was also a reaction to the introduction of equality legislation and practices (Strachan, French & Burgess, 2009, p. 1). The managing diversity approach accepts that the workforce is composed of a diverse population, including diversity factors such as age, background, sex, disability, personality and work style (Kandola and Fullerton, 1998, p. ). Controlling and helping co-existenc e of these differences help creating a more productive workplace environment, where everybody would feel valued and their skills fully utilised, finally leading to achievement of organisational goals (Kandola and Fullerton, 1998, p. 8). The managing diversity approach concentrates on the positive action as the equal opportunities. This strategy goes beyond the law, focusing on the differences between people, who are considered as added value in an organization. Bartz et al. 1990) have found that the main issue of the managing diversity strategy is to understand that there could be diversities within the workforce; as well as these diversities, if correctly managed, lead to higher efficiency and effectiveness at workplace. There are examples of diversity factors such as race, culture, disability, gender, and so forth. Kandola and Fullerton (1998) have shown that within workforce there are different types of individuals with different characteristics through managing diversity approac h.The diversity consists of ‘visible' and ‘non-visible' differences such as gender, race, disability, etc. For every individual to feel valued, managers have to harness these diversities (Kandola and Fullerton, 1998, p. 19). However, in this way there will be dynamic and working environment, where all the different talents will be used and the goals of the company will be met. The ability to show empathy for the employers will in turn affect the workforce positively, where people are going to feel that they are not alienated.Then, it will be much easier to increase workforce efficiency for the managers using ‘managing diversity' approach. Managing diversity approach can be thought as a more sophisticated approach compared to the equal opportunities approach. On the other hand, it might not be right to think these approaches as completely different from each other, for managing diversity approach is probably a result of the development of equal opportunities thought of school. Nevertheless, there are some differences -rather than similarities- between the two schools of thought.Equity legislation – pertaining to the equal opportunities approach – concentrates on the crucial issues within disadvantaged groups of individuals in the labour market. However, managing diversity approach does not recognise groups overtly, but talks predominantly about individuals. From this point of view, equal opportunities approach is externally imposed, leaning mostly on legal, legitimate and legal concepts compared to the equal opportunities approach.As a result, application of equal opportunities approach is usually perceived as a cost for organisations (Foreman, n. d. ), which is not a directly profitable step for the organisation. On the other hand, managing diversity is usually an internally driven concept, aiming at helping the organisation realise its business goals (without legal coercion), as a result, this approach is a kind of investment t o the human resources of an organisation and therefore is not considered as a financial burden.So, given the two approaches, the managing diversity approach is more prone to be perceived as an efficient and effective methodology to enhance workforce satisfaction, which will affect productivity positively as a result. According to Strachan, French and Burgess (2009), managing diversity approach promotes individual differences, while they target practices in one company at particular groups of individuals, which is not directly the case for equal opportunities approach.This is due to the fact that equal opportunities approach is more legally binding, taking less notice of work environment efficiency comparatively. As a result, managing diversity approach enables strategic integration among employees, focusing on outcomes (of the working activities); while equal opportunities approach is operational and concerned with the process of the work, rather than its outcomes (Foreman, n. d. ). So, differences are problems to be solved in equal opportunities approach, where assimilation of these is promoted. However, differences are assets for organisations using managing diversity approach, for it helps boost organisation's production goals as a result of increased employee satisfaction. It can be said that, the equal opportunities approach does fail to recognise the real value that could be lying beneath differences (and diversities), while for managing diversity approach these are precious assets for the organisations.The main concept of managing diversity approach is the belief that organisations have to use benefits stemming from the multicultural environment. Therefore, it is in companies' interest to recognise and satisfy the needs of the workforce. On the contrary, the framework for equal opportunities within the working environment is built on a human rights point of view, which is obligatory rather than a desired process. However, when something is an obligation, it is not easy to assume or assimilate it as a useful feature for organisations.The main idea for equal opportunities regarding working environment is that individuals should not be discriminated, while the decisions in the institutions should not be founded upon individual characteristics. Even though issues related to human rights are universal, approaches for managing diversity differ among societies, sectors or countries depending on demographic, legal, social and economic parameters (Strachan, French and Burgess, 2009).On the other hand, for equal opportunities approach such relativity might not be possible, for the policies and tendencies for this approach are based more on bureaucratic and legal requirements rather than business and managerial needs. Focus of action for equal opportunities school of thought is on group activities aiming at development of groups – rather than individuals – within the workforce; which are usually legally required (Foreman, n. d. ). This can be a bit problematic, for ignoring individuality can lead some other problems within an organisation.On the other hand, managing diversity approach leans on universal initiatives focusing on the development of all individuals in theory. In addition, Strachan, French and Burgess (2009) have found that equal opportunities approach recognizes discrimination of people in a society, which happened in the past and is still continuing, implying a narrow view of positivist knowledge base. This could be discouraging to establish empathy among members of that society or the members of the workforce under focus.Equal opportunities approach looks for abolition of the discrimination as well as for protection for weak groups subject to discrimination. However, this can also lead to some subjective and biased policies for member of not weak groups as well. In contrast, managing diversity is not concentrated on historical and ongoing discrimination in the organisations or in the society , implying a wider and pluralist knowledge base comparatively (Foreman, n. d. ).Organisations that pursue managing diversity approach are able to synthesise equity principles with pragmatism, turning the requirements imposed by equal opportunities approach into an advantage – rather than a bureaucratic burden – for the organisation (Humphries and Grice, 1995). This is a positive feature, for both employees and employers will feel less burden stemming from bureaucracy, because with the managing diversity approach they will be making steps to improve the business and themselves, while this will not probably be the case for equal opportunities approach.While equal opportunities approach aims at forcing organisations to exert policies against discrimination, organisations that apply managing diversity approach are aware that they can get further benefits by extending the conditions required by equal opportunities approach, and increasing both employee satisfaction and prod uct efficiency of the organisation. So, forcing organisations will only result in more submission. However, this will not affect workforce peace and efficiency as desired.This is due to the fact that it will then be something that is imposed by legal institutions, rather than an outcome of a mutual demand of employees and employers. However, existing equal opportunities policies do not necessarily have to prevent managing diversity attempts. Organisations can make steps to transcend equal opportunities approach using developed and refined managing diversity policies. According to Thomas (1990), managing diversity approach and equal opportunities approach can co-exist within an organisation.Organisations that have adopted managing diversity approach do usually cover and adopt requirements of the equal opportunities approach. On the other hand, organisations that have adopted only equal opportunities approach might not be covering the requirements of the managing diversity approach. T his is a result of the fact that, equal opportunities approach is more focused on theoretical and formal necessities, while managing diversity is an outcome of real life business world needs and requirements.Organisations that apply equal opportunities approach and managing diversity approach are comparatively superior to organisations, which do not adopt these approaches (Kandola and Fullerton, 1998). It should also be added that organisations that adopt only equal opportunities approach are less superior to organisations that adopt managing diversity approach, for the latter approach is more related to and focused on contemporary problems of workforce.As a result of the points gone through in this research, it can be said that managing diversity approach is a more individual and business-oriented version of equal opportunities approach, for it is more strategic, internally driven and goal-oriented unlike the equal opportunities approach, which is externally driven and focuses on a narrower scope such as equality of opportunities, therefore functions on operational rather than strategic basis.Managing diversity approach can be developed and criticised by organisations, which is not the case for the equal opportunities approach imposed by governments and legislation. In addition, promotion of diversity by the managing diversity approach is another superior point, compared to the equal opportunities approach that aims at assimilation of diversities, which is not a promising concept for employees not belonging to mainstream social strata from ethnical, religious, social or cultural points of views.

Sunday, November 10, 2019

Jack Daniel’s Social Responsibility Essay

This essay presents some of the very key issues expressed over the time factor and global changes with implications on how society accepts the attitude of the corporation in term of its social responsibility to the demands and expectations. Each era has set new challenges to the Jack Daniel so as to act in accordance with its policy of being socially responsible to sell its products with publicizing of regional marketing trends by also keeping in line with the production and running costs. In this essay, the points that have been discussed are that how consumers are stimulated in buying Jack Daniel products from the social and moral values exemplified by the marketing campaigns in pure responsible way of letting people know their concern to appropriate drinking age and self-accountability. The market trends are shown in this essay to reflect the growth and market strategy exercised by Jack Daniel, a company of Brown-Forman Conglomerate. The essay covers the following areas: Outline 1. Introduction to Social Responsibility 2. Social Responsibility in Entity Form 3. Getting to know Jack Daniel 4. Historical Perspective in Social Responsibility 5. Historical Perspective in Social Responsibility 6. Society Expectations 7. Corporate Social Strategy 8. Closer Look on Jack Daniels’ Social Responsibility 9. Success in the Responsible Attitude 10. Conclusion Introduction to Social Responsibility Social Responsibility appears in the society with two different perspectives as interpreted by the people setting up the norms of that society. Firstly, we act in a positive sense about which we perceive is our social responsibility to do so. Secondly, we renounce from the kind of act that seems to affect negatively to the society that again shows our social responsibility by behaving in such a manner. The evaluation of our act whether in positive or negative is determined by what kind of society we live in and how it is based on some pre-defined values and common understanding among the habitants. So every person, being part of the society, determines how he or she would react to the cultural values of society in form of positive or negative social responsibility, if truly accepting the responsibility. Human psychology has developed in such a pure form of ethical grounds that every consumer of alcohol drink believes to have right of buying a whiskey that is sold on moral standards of a society. Social responsibility speaks itself in both the cases of consumer and the producer that it starts from the producer’s end of responsibility to the consumer’s end to survive in the society with respect and on good grounds. Social Responsibility in Entity Form However in practical aspect, different entities (in form of people or organizations) tend to set their responsibility area as whether the entity is responsible to act for a specific purpose in the society. We can take example of an entity that is socially responsible for child labour rights; or for minority rights protection, justifies its position in society in the form positive responsibility. This also involves some entities that are of corporate nature including organizations, which are responsible to provide better growth prospective and benefits in terms of ethical obligations. Apart from self responsibility captivation, entities socially entitle in concerns of the society having an impact on the welfare and incumbent environment. Here I will discuss the case of Jack Daniel fulfilling the social responsibility by surviving in the global drinking society. Jack Daniel is basically a whiskey distiller based in US, whose founder is known as Jasper Newton â€Å"Jack† Daniel, is an entity of Brown – Forman corporation. Getting to know Jack Daniel Firstly, the company of Jack Daniel earns money by selling alcohol that is legally bought by people who are all willing to pay prices of such intake with their sole responsibility. For that reason, it is beyond the scope of responsibility of Jack Daniel to justify against each individual’s self responsibility to act humane in the society. Secondly, from the existing scenario, the conflict also arises that this all income is dependent entirely on the detriment of the whole lot that happens as a consequence to its sole business operations. So the company takes in no moral, if not social, responsibility for the people to invest or utilize its services/products. What Jack Daniel has adopted now as a promotion campaign in lieu of its social responsibility characteristic and being the sponsor Richard Childress in NASCAR racing; is their slogan of: â€Å"Pace Yourself. Drink Responsibly† Historical Perspective in Social Responsibility By moving through a timeline, we can very easily distinguish as how Jack Daniel has coped with the growing responsibility of surviving in the global industry, and in markets full of social and moral values. In the early stages of organizational restructuring, the company greatly emphasized on enhancing its public picture with acquaints and precautions of use of alcohol as commonly understood meaning of having its whiskey consumable after effects. We can with mutual understanding call it the awareness campaign that taking whiskey while driving or presenting in the society they should be in a judicious competence. The awareness has now spread comprises definitely of the marketing gizmos that more importantly accentuated on having their product (whisky) is solely considered for adults, thereby understanding the fact that they completely agree to the post conditions of drinking, when not being moderate. Drinking dilemmas were discussed during this time to publicly broadcast the facts and figures in this regard. By looking the historical defences, Jack Daniel, as speaking in terms of its parent company Brown-Forman, bears a history of highly approving social responsibility. Society Expectations Now that the consumers around the world are getting more sophisticated on the dynamics influencing their life, Jack Daniel is looking for such corporate strategies that not only comply with the positive attitude to the social norms in their market region, but are also effective in long term basis. No matter how the consumer behaviour changes in terms of the revolutionary or cultural tends, companies tend to mould their attitude, both positive and negative, with the regional social norms in perspective. People now seek out the brands, talking in standpoint of alcohols now, that more naturally agree with the society’s welfare. Specific consumers to a brand, like Jack Daniel, have built expectations vis-a-vis to the manner of addressing social concerns very firmly connected to its products and mode of business rules and policies. The protection of environmental laws and public health awareness campaigns have made Jack Daniel consider on lines of establishing links with the major social outcomes from different regions and cultural civilizations. Corporate Social Strategy However, considering the drivers’ class, Jack Daniel is spreading its straight and particular message around the world to all the civilizations and societies is to drink responsibly enough to drive carefully, as also explained above in Getting to Know Jack Daniel. Both in terms of selling and promotional stratagem, the company responsibly brought out its products bearing a positive gratitude towards its consumers with distilled spirits products. Jack Daniel’s marketing approach is primarily based on the target audience thereby addressing only the adults and consumers of proper legal age to drink. From the current promotional campaigns, it looks obvious that the company is seriously concerned about presenting their image as a corporate that stands on social values of its very varied consumers. Growing amongst global trends in specialized market and branding, Jack Daniel has emerged as a guide to the other entities by selling its products in a very responsible manner. Closer Look on Jack Daniels’ Social Responsibility Taking a look in to the recognition of the company, it is also a founding member of the Distilled Spirits Council of the United States (DISCUS). Clint Bowyer, a racing driver on its website, highlights the DISCUS convention in terms of its code of conduct that comprises of a very essential stipulation, which affirms its social responsible approach that â€Å"alcohol advertisements will only appear in media reaching an audience of at least 70 percent above the legal drinking age† (Clint Bowyer, 2006). Apart from the marketing strategies, another key point in brand recognition is to present a picture of the corporate with the most logical way of social awareness, that is to say, is by educating the public rather than only the consumers about the impacts of alcoholism. This approach can be seen in the market designed programs of its parent company Brown-Forman which emphasizes a lot on encouraging the adults and the youth to determine how to likely deal with the implications of drinking thereby surviving in the society with a respectful living. It has been observed that a large amount of investment in terms of funding programs to publicize the message of responsible drinking and consuming the products with their sole responsibility in selling and proper usage of products. Success in the Responsible Attitude As the latest financial statements by Howard Riell, Jack Daniel has clutched a top position as top whiskey brand in America with its national sales to almost another 6. 5% growth and precise selling of more than 45 million 9-liter cases (Howard). Consumers have shown very upbeat response to the brand in terms of speaking about its history of maintaining a tie with social values that are backed by the traditions followed in the forthcoming products and in retail market. Normally young age consumers are seen to be most happy about the distilled products from Jack Daniel, whose most prominent strategy is their employee age history as of ranging from 21-29 years. Also, the key success factor seems to be the relations the company keeps with its distributors and the concerned media in very rightful manner in promoting its products. There always seem to be something common about top most globally selling brands; also speaking of Jack Daniel, the regional popularity of the brand also shows the impinge on consumer buying behaviour. Socially acknowledged brand reveals a marketing niche on the consumers’ attitude to get a drink that is less hard than the competing brands and has successful reputation in the region where it may only be the single available brand. Also considering the media-speak-out to public, people feel that Jack Daniel products seem to be complying with the moral norms of broadcasting. Jack Daniel whiskey ads on the media network are seen as appropriate to be publicized based on the quality criteria of drinks and the company’s shift to liquor with quite handy to be sold on stores selling beer or wine. Conclusion From the evolution of human society in different parts of the world, people have tend to seek the quality in the products that have an impact as stimulating factors on their mind. Drinking of alcohol is prohibited in some cultures or religions in some parts of the world however where people have taken it as a vital element in their lives among earning, living, eating etc. So the competition of whisky (being an alcoholic drink) has emerged to classify whiskey manufacturers in order of their priorities for selling their products to the drinkers having a sense of affects of its usage. Jack Daniel has in these terms has quite successfully managed to enlighten its organizational strengths by recognizing the social responsibilities that entail around the corporate success factor. We can see this success originating from the main factors of social responsibility, as from the statement of â€Å"People recognize that global companies wield extraordinary influence, both positive and negative, on society’s well-being. † (Douglas, John, Earl 2004, p4). This social recognition in terms of its own corporate strategies of brand marketing and consumer attitude toward Jack Daniel products is a very high example of business taking care of human welfare with the condition of accepting the usage responsibility. Bibliography Douglas, John, & Earl, ‘How Global Brands Compete’, Harvard Business Review, p4, Harvard Business School Publishing (2004), Retrieved on November 22, 2006 Clint Bowyer. Official website (2001) Retrieved November 22, 2006, from http://www.clintbowyer.com/

Friday, November 8, 2019

Helpful Discussion Questions for The Necklace

Helpful Discussion Questions for 'The Necklace' ​The Necklace is a favorite French short story by  Guy de Maupassant. A tragic piece about vanity, materiality, and pride, its definitely a humbling story that will get rid of any little girl or boys princess complex. Although short, Maupassant packs many themes, symbols, and even a surprise ending into The Necklace. Here are some discussion questions helpful for teachers or anyone looking to talk about the story.   Lets start from the very beginning with the title. By titling his work, The Necklace, Maupassant is immediately notifying readers to pay special attention to this object. What does the necklace symbolize? What theme does the necklace convey?  What other themes exist in the story?   Turning towards the setting, this story takes place in Paris.  Why did Maupassant decide to set this story in Paris? What was the social context of life in Paris at the time, and does it relate to The Necklace? Although Mathilde is at the center of the story, lets consider the other characters as well: Monsier Loisel and Madame Forestier. How do they advance Maupassants ideas? What role do they play in this story? Speaking of characters, do you find the characters likable, or detestable? Does your opinion of the characters change throughout the story? Finally, lets talk about the end. Maupassant is known for springing twist-endings on his readers. Did you think the ending to The Necklace was unexpected? If so, why?   Lets take this discussion beyond just analyzing the story; did you like The Necklace? Would you recommend it to your friends?

Tuesday, November 5, 2019

Germans in the American Revolution

Germans in the American Revolution As Britain fought its rebel American colonists during the American Revolutionary War, it struggled to provide troops for all the theaters it was engaged in. Pressures from France and Spain stretched the small and understrength British army, and as recruits took time to try, this forced the government to explore different sources of men. It was common in the eighteenth century for ‘auxiliary’ forces from one state to fight for another in return for payment, and the British had made heavy use of such arrangements in the past. After trying, but failing, to secure 20,000 Russian troops, an alternative option was using Germans. German Auxiliaries Britain had experience in using troops from the many different German states, especially in creating the Anglo-Hanoverian army during the Seven Years War. Initially, troops from Hanover- connected to Britain by the bloodline of their king- were placed on duty in the Mediterranean islands so their garrisons of regular troops could go to America. By the end of 1776, Britain had agreements in place with six German states to provide auxiliaries, and as most came from Hesse-Cassel, they were often referred to en masse as Hessians, although they were recruited from all across Germany. Nearly 30,000 Germans served in this way during the span of the war, which included both normal line regiments and the elite, and often in demand, Jgers. Between 33–37% of the British manpower in the US during the war was German. In his analysis of the military side of the war, Middlekauff described the possibility of Britain fighting the war without Germans as â€Å"unthinkable†. The German troops ranged greatly in effectiveness and ability. One British commander said the troops from Hesse-Hanau were basically unprepared for the war, while the Jgers were feared by the rebels and praised by the British. However, the actions of some Germans in plundering- allowing the rebels, who also plundered, a major propaganda coup which caused exaggeration for centuries- further reinforced the considerable numbers of Britons and Americans angry that mercenaries were being used. American anger at the British for bringing in mercenaries was reflected in Jefferson’s first draft of the Declaration of Independence: â€Å"At this very time too they are permitting their chief magistrate to send over not only soldiers of our common blood but Scotch and foreign mercenaries to invade and destroy us.† Despite this, rebels tried frequently to persuade the Germans to defect, even offering them land. The Germans at War The campaign of 1776, the year the Germans arrived, encapsulates the German experience: successful in battles around New York but made infamous as failures for their loss at the Battle of Trenton, when Washington won a victory vital for rebel morale after the German commander had neglected to build defenses. Indeed, the Germans fought in many places across the US during the war, although there was a tendency, later on, to sideline them as garrisons or just raiding troops. They are chiefly remembered, unfairly, for both Trenton and the assault on the fort at Redbank in 1777, which failed due to a mixture of ambition and faulty intelligence. Indeed, Atwood has identified Redwood as the point at which German enthusiasm for the war began to fade. Germans were present in the early campaigns at New York, and they were also present at the end in Yorktown. Intriguingly, at one point, Lord Barrington advised the British king to offer Prince Ferdinand of Brunswick, the commander of the Anglo-Hanoverian army of the Seven Years War, the post of commander in chief. This was tactfully rejected. Germans Among the Rebels There were Germans on the rebels side among many other nationalities. Some of these were foreign nationals who had volunteered as individuals or small groups. One notable figure was a buccaneering mercenary and Prussian drill master- Prussia was regarded as having one of the premier European armies- who worked with the continental forces. He was (American) Major-General von Steuben. In addition, the French army which landed under Rochambeau included a unit of Germans, the Royal Deux-Ponts Regiment, sent to try and attract deserters from the British mercenaries.   The American colonists included large numbers of Germans, many of whom had initially been encouraged by William Penn to settle Pennsylvania, as he deliberately tried to attract Europeans who felt persecuted. By 1775, at least 100,000 Germans had entered the colonies, making up a third of Pennsylvania. This stat is cited from Middlekauff, who believed in their abilities so much he called them â€Å"the best farmers in the colonies† However, many of the Germans tried to avoid service in the war - some even supported the loyalist caused – but Hibbert is able to refer to a unit of German immigrants who fought for the US forces at Trenton – while Atwood records that â€Å"the troops of Steuben and Muhlenberg in the American army† at Yorktown were German.Sources:  Kennett,  The French Forces in America, 1780–1783, p. 22-23Hibbert, Redcoats and Rebels, p. 148Atwood, the Hessians, p. 142Marston,  The American Revolution, p. 20Atwood,  The Hessians, p. 257Middlekauff,  The Glorious Cause, p. 62Middlekauff,  The Glorious Cause, p. 335Middlekauff, The Glorious Cause, p. 34-5

Sunday, November 3, 2019

Short Paper on Descartes Essay Example | Topics and Well Written Essays - 500 words

Short Paper on Descartes - Essay Example For instance, it is apparent that some people have had a dream associated with instillation of pain such as the stubbing of the stomach. In relation to this assertion, Descartes believes that the pain felt by some people when dreaming is likely the same pain they will feel when awake. It is as a result of this that people fail to distinguish between the dream world and the actual world (UA 1, 2011). This broad explanation proves the reason as to why Descartes will make his conclusion about the pinch test as the unreliable test for the awake of a person. Although Descartes explanation manages to relate the happenings in the dream land with those in the actual world, it is apparent his argument against the pinch test does not rule out the pinch test as the best test for the awake of a person. This is in connection with the processes associated with pinching oneself. It is evident that the mind takes part in the pinching act. In relation to this claim, it is impossible for a person who is asleep to pinch himself or herself in order to determine if they are awake. When one is asleep, he or she thinks of either the daily happening or fantasize on other things in life. Such thoughts will not give one room to ascertain if they are awake through use of the pinch test. The thinking processes associated with pinching oneself is by itself one of the reliable tests for one’s awake. In tandem with this assertion, one can affirm that the pain instilled through pinching makes one to realize that he or she is awake. This because the pain in sulted by the pinch is communicated by the nervous system to the brain which as a result ascertain that a person is awake. In conclusion, Descartes double standard argument for the pinch test is in relation to his association of the dream land incidents with the real incidents. It is because of the similarity in occurrence of things that Descartes claims that pinch test is

Friday, November 1, 2019

Google glasses Essay Example | Topics and Well Written Essays - 250 words

Google glasses - Essay Example This version is effective since it has a user practice that works easily under voice commands and touch. Based on the demand-pull inflation, Google glass has received a strong consumer demand due to its efficiency. The users are highly purchasing the Google glasses, and its sales have increased inevitably. This has improved the economy of Google glasses making it to have the attention of many users al over the world. In conclusion, according to the Ansoff strategy, the company has to undertake various steps to make sure that the consumers are aware of the product in the mark. When the Google glass products are introduced the market penetration is important since it captures the attention of customers from other products. This results to market development where different consumers are targeted for the Google glass products. When the products develop, the manufactures of Google glass have the advantage of producing new products since the consumers are aware. Through these strategies, the product will become diversified and the manufacturing firm is at a lower risk of losing market to its

Wednesday, October 30, 2019

Defining Pholosophy Essay Example | Topics and Well Written Essays - 750 words

Defining Pholosophy - Essay Example Bertrand Russell, a philosopher, states that philosophy â€Å"is something intermediate between theology and science. Like theology, it consists of speculations on matters as to which definite knowledge has, so far, been unascertainable; but like science, it appeals to human reason..." (What is philosophy?, n.d.) The four main branches of philosophy are logic, epistemology, metaphysics and ethics. These branches of philosophy are divided as to the nature of the questions asked in each area; however, these divisions cannot be rigidly separated. Logic pertains to the attempt to codify the rules of rational thought. This is one of the primary tools used by philosophers in their inquiries. Logicians explore the structure of arguments that preserve truth or allow the optimal extraction of knowledge from evidence. The second branch of philosophy is epistemology which is the study of knowledge itself. It deals with the nature, scope, and limits of human knowledge. Epistemologists ask quest ions such as what are the limits to our knowledge, does science give us knowledge at all or can our powers of reasoning give us knowledge. The third branch of philosophy is metaphysics which is the study of the nature of things. Metaphysicians ask what kinds of things exist, and what they are like. This is the area of philosophy which deals with the ultimate nature of reality. Metaphysicians reason about whether or not people have free will, in what sense abstract objects can be said to exist, and how it is that brains are able to generate minds. Examples of questions asked by metaphysicians are: Given that something exists, why that and not something else? Why that and not nothing? Why is there change? How can there also be permanence through change? Ethics is the fourth branch of philosophy which deals with the study of the rightness and wrongness of actions, the kinds of things which are good or desirable, and the blameworthy and praiseworthy actions. This area deals with how we conduct ourselves within the world. Moral philosophers may investigate questions such as, is it right for rape victims to abort their babies or is euthanasia the solution to a comatose patient? Philosophical questions are conceptual not factual. Generally speaking, philosophical questions are often a series of "why-questions." These are questions which cannot be fully answered with a simple â€Å"yes† or â€Å"no†. These questions come about when people reflect on their lives and their world. They are often questions about our concepts and the relation between our concepts and the world they represent. Russell states that philosophical questions â€Å"appeal to human reason† (What is philosophy?, n.d.). Some philosophical questions are practical while others are theoretical. Example of a practical question is, "Is divorce justifiable?" A theoretical question on the other hand, often arise through thinking about practical issues such as â€Å"What is the meaning and purpose of our existence?† According to Stroll and Popkin, philosophical questions have seven characteristics (1972). First, it is a reflection about and the things nothing in it. Example is if one has a pen in his hand and took it off, there is nothing in his hand. So, does that mean that everything exists in nothing? The second characteristic of a philosophical question is it is a conceptual rather than a practical activity. The third characteristic is the use of reason and argumentation to establish a point. Fourth, a philosophical question asks for an explanation of the puzzling features of things such as the mirror, whether it reverses up or down or left or right. A philosophical question also digs beyond the obvious like what is a fact? Is a computer a fact? Another characteristic of

Sunday, October 27, 2019

Transport Layer Network Layer Protocols Attack

Transport Layer Network Layer Protocols Attack Chapter 1: Introduction 1.1: Background Data Communication technologies and the underlying protocols in the twenty-first century is one of the critical elements that acts as the backbone for electronic commerce and use of the world-wide-web (Todd and Johnson, 2001[1]). The increase in the growth of electronic commerce as well as other forms of internet-based secure communication have increased not only the risks associated with networking related attacks that involve in the loss of personal information and possible financial loss to the victims. One of the major components in the Internet communication is the underlying protocol that governs the compilation and communication of the information from the source computer to the target and back (Nash et al, 2001[2]). The role of the protocols in the networking also has a key influence on its ability to securely deliver the information as part of the overall communication architecture. This makes it clear that the robustness of the protocol and the extent to which a given proto col architecture can resist intruder attacks through encryption efficiency etc dictates the security associated with the information transfer as argued by Todd and Johnson, (2001). In this report a critical overview on the transport layer and the network layer protocols of the TCP/IP protocol architecture is presented to the reader. The research aims to throw light on the possible security attacks on these protocols and the possible countermeasures in order to prevent such attacks. The attacks in these cases mainly concern with the infringement of the information through unauthorised access bypassing the security or breaking the encryption surrounding the information being transported. 1.2: Aim and Objectives The aim of this research is to investigate the possible attacks on the Transport layer Network layer protocols and present possible countermeasures on overcoming the threat of these attacks on the day-to-day Internet-based data communication. The above aim of the research is accomplished through embracing the research on the following objectives To conduct a literature review on the Transport and Network layers of the TCP/IP protocol architecture. To conduct a critical overview on the possible types of attacks on the Transport Layer and Network Layer protocols. To present a critical analysis on the possible countermeasures to prevent the attacks on the Transport layer protocols. 1.3: Research Methodology A qualitative approach is used to conduct the research. Since there are five layers to the TCP/IP model of which the research aims to investigate the protocols associated with the Transport and Network layer, a qualitative approach is deemed effective as the infrastructure required to simulate tests for conducting a quantitative research is limited for conducting the research. As it is also apparent that the analysis on the five layers of the TCP/IP model is beyond the scope of the research conducted in this report, the research conducted mainly focuses on the key threats and possible types of attacks on the protocols of the TCP/IP layers discussed. 1.4: Chapter Overview Chapter 1: Introduction This is the current chapter that presents the aim, objectives and brief overview on the research conducted to the reader. Chapter 2: Literature Review This chapter presents an overview on the layers of the TCP/IP model followed by a detailed overview on the key Transport layer and Network layer protocols. The chapter also presents a brief overview on the network attacks and the possible threats associated with the Internet data transfer. Chapter 3: Protocol Attacks This chapter presents a critical overview on the types of attacks on the Transport Layer and Network Layer protocols. The chapter presents a critical analysis on the methods used and the potential losses that may result due to the attacks. Chapter 4: Countermeasures This chapter presents a critical overview on the possible countermeasures that are implemented in order to prevent the attacks discussed in chapter 3. A comparative study on the countermeasures discussed is also presented in this chapter. Chapter 2: Literature Review 2.1: Internet Security in the twenty-first century The increase in the need for internet security from unauthorised access and malicious attacks is not only due to the need protecting personal/sensitive information of the users but also the service providers (Ganesh and Thorsteinson, 2003[3]). This is naturally because of the fact that the service providers can perform effectively only when the requests sent to the server are valid thus making justifiable use of the resources (Rayns et al, 2003[4]). The use of the resources in terms of the number of connections and the allocation of memory to cater for each connection established with the web server of the service provider is deemed to attribute to the extent to which a given website establishment performs effectively. This makes it clear that the need for internet security is not only a matter of protecting personal information but also effective utilisation of the computer resources dedicated for the purpose as argued by Rayns et al (2003). Walden (2007)[5] further argues that the security over the internet is mainly accomplished through implementing security measures on the connection-oriented and connection-less protocol used for transferring information from one end to another. It is interesting to note that the above focuses especially on the resource utilisation and protection of computer from malicious attacks through ensuring that the communication to and from the computer are not only secure but also valid. It is necessary to ensure both the validity and security of a given connection over the internet because of the former corresponds to the availability of the service whilst the later attribute to the reliability of the available service (Walden, 2007). It is also interesting to note that the prevention of unauthorised access to information systems connected to the Internet is deemed effective as opposed to implementing access control on each individual system as argued by Todd and Johnson (2001). This makes i t clear that the implementation of the security over the Internet is mainly through implementing the preventive measures against malicious attacks through strengthening the protocols used in the various layers of the TCP/IP model. As the TCP/IP model forms the basis for communication over the internet, it is apparent that the robustness of the protocols implemented in each layer of the TCP/IP stack dictates the effectiveness of the Internet security implemented (Walden, 2007). In the next section a critical overview of the TCP/IP model is presented to the reader. 2.2: TCP/IP Model ‘TCP/ IP is a set of rules that defines how two computers address each other and send data to each other’ as argued by Blank (2004) (p1)[6]. Naturally the above makes it clear that TCP/IP is merely a framework that governs the methods to be deployed in order to enable communication over the internet between two computing devices. As TCP/IP is platform independent in nature, it provides a communication framework that can be deployed across any given operating system on a computing device connected to the Internet or even a dedicated network as opposed to the World Wide Web. This further opens room for development of new protocols and communication standards/rules that can be implemented using the TCP/IP model on any one of its five layers as argued by Rayns et al (2003). Hence securing the information being transferred from one end to another over a given network or the Internet can be accomplished through implementing a combination of protocols to operate within the laye rs of the TCP/IP framework. The five layers of the TCP/IP model are Application Layer Transport Layer Network Layer Data Link Layer and Physical Layer. From the above it is evident that TCP/IP can be implemented in a given network using any number of protocols in each layer of the TCP/IP model depending upon the level of security required and the speed in data transfer. This is because of the fact that the increase in the number of protocols naturally increases the size of the data packet being transferred as part of the communication thus having a direct impact on the speed of communication as argued by Rayns et al (2003). It must also be noted that the protocols presented in each layer of the TCP/IP model shown in Fig 1 is merely a selection and not the exhaustive list of the protocol suite. From the model represented in Fig 1 one should also appreciate that the layers of the TCP/IP model are arranged in a logical fashion so that the protocols closer to the top at the layer 1 associate themselves with the computing applications that handle data encryption and security. The protocols to the bottom of the TCP/IP stack on layer 5 on the other hand associate themselves with the actual data transfer from one end to another through establishing connection and enabling communication between sender and receiver as argued by Blank (2004). As the research presented in this report focuses on the Transport and Network layers of the TCP/IP model a detailed overview on the five layers is beyond the scope of this report. A brief overview on each TCP/IP layer is presented below. Application Layer – This layer of the TCP/IP model comprises of the protocols that associate with the handling of data and the encryption of the information order to effectively transfer the information from one end to another. The application layer is also deemed as the layer of the TCP/IP model that communicates with the actual application that is handling the information prior to its transfer over the Internet. The protocols of the application layer enable the interaction between the computer and the actual web application that performs the business logic associated with the application prior to preparing the information for transfer over the Internet. This makes it clear that the application layer encryption is mainly associated with the segmentation of the data into packets and allocates the associated headers in order to enable their transfer over the Internet. This also makes it clear that the security associated with the information transfer is not implemented at the A pplication Layer of the TCP/IP model. This makes it clear that the application layer protocols are extensively used in case of client server applications where the data transfer between the client and the server is in the full-duplex mode (Feit, 1998[7]). Transport Layer – This is the actual layer that manages the connection between the two computers and the success or failure of the information being transferred as argued by Blank (2004). The purpose of the Transport layer protocol as the name suggests is to ensure the secure and successful transfer of information over the Internet between the communicating parties as argued by Ganesh and Thorsteinson (2003). The process of enabling end-to-end communication for successful data transfer is the major task that is accomplished using the Transport layer of the TCP/IP model. It is also interesting to not that the transport layer of the TCP/IP model provides the error tracking, flow control and data fragmentation capabilities independent of the underlying network as argued by Feit (1998). The transport layer of the TCP/IP model also performs the task of assigning the header to the data fragment off the overall information being transferred from one end to another. The transport layer of the TCP/IP model implements two forms of communication strategies. These are connection-oriented and connectionless implementation as discussed below. Connection-Oriented Implementation – The TCP (Transmission Control Protocol) protocol of the transport layer accomplishes the connection-oriented strategy of data communication. The connection-oriented approach o data communication corresponds to the process where a connection must be available between the communicating parties in conformance with the authentication and association rules prior to actually performing data transfer. This makes it clear that the data transfer in case of a connection-oriented approach depends on the extent to which the connection being established is live between the communicating computers. This makes it clear that the data transfer in a connection-oriented implementation can be accomplished only with the ability to maintain the connection between the computers thus making the data transfer reliable as argued by Feit (1998). This is naturally because of the fact that termination of the connection of loss of connection established during the cours e of the communication/data transfer would trigger a request to resend the information thus providing room for transferring all the information from one end to another. The session based communication strategies in terms of enabling the communication security is one of the key features of the connection-oriented implementation as prolonged inactivity or termination of the session will naturally terminate the connection established thus protecting the information transferred over the internet. Public Key Infrastructure (PKI) which will be discussed in the next section depends on the establishment of a connection-oriented communication strategy in order to ensure that the communication between the two computers using the connection oriented approach will help protect the information being transferred by the transport layer protocol. As discussed earlier, the transfer of information from one end to another in a communication channel is accomplished through segmenting the information in to equal sized segments of data called packets that are assigned a header containing the details of the packet as well as its sequence in the information being transfer. The connection-oriented implementation of the transport layer has following key features Sequential data transfer – This is method which follows the First-in First-out (FIFO) strategy. Thus the sequence in which the data packets are received is the same in which it is being sent from the source computer. This approach is deemed secure to ensure that the information being transferred is not tampered with and loss of one of the packets will enable the sender to resend the entire information again. However, the major disadvantage is that the increase in the size of the information will result in poor performance in terms of speed of data transfer. Higher level of error control –As the connection oriented approach ensures that the connection established is live between the sender and the receiver throughout the entire communication process, it is clear that the error control is accomplished successfully through enabling the sender to resend the packets that were not received in the initial transfer. The control in the loss of packets using the above resend strategy naturally minimizes the error associated with the data transfer. Duplication Control – The connection-oriented strategy also has the inherent ability to eliminate duplicate data packets transferred thus allowing the connection-oriented architecture to ensure consistency in the information being transferred. Congestion Control – The TCP protocol monitors the network traffic as part of the transport layer activities. This ensures that that the session established between the sender and the receiver can transfer the required information successfully prior to reaching the session time-out situation as argued by Feit (1998). The client-server communication over the internet is a classical example for the implementation of a connection oriented strategy in the Transport layer of the TCP/IP model. The use of the PKI in the communication is one of the key aspects of the connection-oriented implementation that makes the TCP protocol a key element in the secure data transfer strategies of the day. Connectionless Implementation – As the name suggests the connectionless implementation is the case where a dedicated connection is not required to complete the data transfer between the communicating computer as argued by Blank (2004). The User Datagram Protocol (UDP) is used in the case of connectionless implementation where the transfer of the data packets merely comprises the packet order and the source/target details alone. This makes it clear that the transfer of data can be achieved at a higher rate as the authentication and validation of the data transferred is not restricted to a time frame or the session that controls the communication. However, the major issue associated is the lack of security and inaccuracy of the data transferred. Alongside, the key issue with the UDP protocol and the connectionless implementation is the lack of traceability of the information thus resulting in a non-reliable communication channel as argued by Blank (2004). The UDP is thus deemed to be an insecure mode of communication over the internet due to the lack of security measures apart from authentication and identification of the communicative parties. It is further important to appreciate that implementing PKI using the connectionless approach would result the exposure of the information and the lack of effective acknowledgement of the authentication between the communicating computers thus affecting the information security providing room for network attacks that can directly affect the information being transferred through the connection. Network Layer – Blank (2004) argues that the network layer of the TCP/IP model performs the task of delivery of the data within the network one the data packet has reached the appropriate network subnet. This makes it clear that the network layer of the TCP/IP model plays a critical role in identifying the correct network target/destination in order to enable effective communication between the communicating parties as argued by Feit (1998). In case of the World Wide Web, the Network Layer plays the vital role of identifying the destination network and enabling the routing of the packets through the network in order to effectively reach the destination without the data being tampered by unauthorised users. The protocols that are widely used in the Network layer include the Internet Protocol (IP) and the Internet Control Message Protocol (ICMP). The Routing Information Protocol (RIP) of the information TCP/IP model which is predominantly used in the Application layer plays a vi tal role in the network layer for enabling routing of the information across the networks in order to effectively reach the target computer in the communication channel established over the Internet. It is further critical to appreciate the fact that the routing of the packets alone is not the task of the network layer protocols but also to enable the transport layer protocol to effectively enable the communication and data transfer between the communicating computers. This makes it clear that network attacks over the internet by hackers to affect the performance of the communicating computers in order to gain unauthorised access is accomplished through manipulating the communication strategies implemented by the protocols in the Transport and Network Layers of the TCP/IP model. The access to information and the actual infringement of the information which is deemed as the consequence of the hacking or network attack is related to the infringement of the information at the applicati on layer protocols that hold the actual information being transferred (Blank, 2004). However, the attacks themselves that facilitate the aforementioned are accomplished through manipulating the procedures associated with the Transport Layer and Network Layer protocols. The attacks typically include spoofing, overloading, flooding etc., which are discussed in detail at chapter 3 of this report. The Data Link Layer and the Physical Layer of the TCP/IP model involve the actual hardware based communication strategies that are beyond the scope of this research. Hence these two layers of the TCP/IP model are not discussed any further. It is important to appreciate the fact that the top three layers of the TCP/IP stack interact frequently in order to enable the secure communication and allocation of computing resources on the computing devices involved in the communication (Blank, 2004). 2.3: Public Key Infrastructure – an overview PKI implements a form of cryptography known as the asymmetric cryptography in order to enable secure communication between two computers over the Internet as argued by Todd and Johnson (2001). This process mainly involves the use of a public key and private key that are used for encrypting and decrypting the information at the client and server ends respectively (Blank, 2004). The process of encryption is beyond the scope of this research although its role in the secure communication and the extent to which a hacker can manipulate the authentication strategies for launching an attack is relevant to the research. Hence the discussion in this section mainly concerns with the handshake and the communication strategies deployed along with an overview of the players in the PKI. This will help in identifying the various attacks plausible and the level manipulation that can be implemented by the hacker over the protocols used in order to infringe the communication between the client and ser ver computers. It is deemed that the PKI is a reliable communication strategy to implement secure communication through the use of Trusted Third Party (TTP) authentication and approval of the overall communication process between the server and the client computers. The key components of the PKI infrastructure that enable successful and reliable communication over the internet are discussed below Certificate Authority (CA) – The CA is the issuer and control of the public key and the digital certificate associated with the authentication and transfer of secure information over the connection established using the TCP protocol. The primary role of the CA is to generate the public and the private keys simultaneously for a given server computer or service provider (Blank, 2004). The public key as the name suggests is made available over the public domain for encryption/decryption of the information at the client-end of the connection. The private key is not shared and stored at the server which is used for encryption/decryption of the information as applicable at the server end of the connection established for communication. From the above description it is evident that the role of the CA in the PKI is pivotal for the effective implementation of the PKI for secure communication free of network attacks. This is because, if the server hosting the CA application is attacked either using cross site scripting or flood attacks, the public keys stored as well as the associated certificates for verification are compromised thus resulting in the hacker gaining control over the communication channel without the knowledge of the server or the client as argued by Blank (2004). This makes it clear that the security at the CA computer is critical to establish a reliable TTP computer for implementing connection-oriented communication using TCP protocol of the TCP/IP model. Registering Authority (RA) – The RA as the name implies is the verifier of the digital certificate before it is issued to a requestor as argued by Todd and Johnson (2001). The role of the RA computer in the PKI implementation is to enable an independent authorisation of the digital certificates issued thus providing a secondary verification of the information prior to communicating to the server. This presence of an independent verifying program or computer as part of the communication makes the PKI a reliable communication strategy to implemented connection-oriented communication over the internet in a secure fashion. It is also deemed to the key weakness of the PKI strategy owing to the fact that the reliability of the RA as a TTP in the communication process dictates the effectiveness of the communication and the protection of the server from intruder attacks as argued by Todd and Johnson (2001). However, the reliability of the CA or RA is not the issue of debate in this re search but the potential attacks that threaten the stability of the computers hosting the CA and RA programs in order to enable secure connection oriented implementation across the Internet. The key area where the attacks can be accomplished by hackers to disable the RA or the CA computer eventually compromising the information held within is the use process of handshake where the RA or the CA computer is expected to receive an acknowledgement (ACK) from the requesting computer for each message successfully communicated. It is through manipulating these handshake communications a CA or RA can be compromised as the communication channel is expected to open for a specific time period to receive the ACK as well as allocate sufficient resources to complete the data transfer. Abuse of this feature is one of the major areas where the connection-oriented communication faces threat of attacks. These are discussed in chapter 3 elaborately. Directories – The directories are the locations on the public domain that host the public keys for enabling the encryption of the information. The keys are normally held in more than one location in order to enable easy/quick access to the information as well as a verification strategy to ensure that the key retrieved is indeed the valid one for data transfer between the client a given server computer. Certificate Management System (CMS) – This is the application that controls or monitors the certificates issued and facilitates the verification process. The CMS forms the core of the PKI infrastructure as the CA and RA computers in the given PKI implementation are expected to host a validated CMS program to enable the connection-oriented communication between the client and the server. The key issue associated with the case described above is the fact that the CMS program itself is an independent application and hence its reliability/robustness to prevent malicious attacks alone dictates the extent to which a given CA or RA is reliable over the Internet. The key security strategy in case of the PKI implementation is the sharing of the public key whilst retaining the private key at the server computer as argued by Burnett and Paine (2001) [8]. This strategy allows the server computer to effectively encrypt or decrypt the information without depending upon the public key and hence leading a two pronged attack as the information encrypted using private key can be deciphered using the public key and vice versa. Although the use of the two independent keys helps overcome the security threats to the information being transferred, the transfer process itself is not governed by the PKI. This is the major weakness of the PKI infrastructure that allows room for malicious attacks that can hamper the performance by the CA, Ra or the host server computers as argued by Burnett and Paine (2001). From the above discussion it is evident that the security established using the PKI is mainly dependant on the following key elements of the PKI infrastructure CA and RA – The validity and reliability of these computers play a vital role in the effective implementation of the PKI. Apart from the fact that the client computer sending the information depends upon these computers security of the information in its entirety, it is also clear that the availability of these computers and their responses in terms of session time control and preventing session time-out cases are critical to enable successful communication in a connection-oriented implementation using the TCP protocol. An attack on the hosting server for the CA or the RA mainly in terms of flooding or denial of Service will result in the failure of the PKI infrastructure in terms of lack of availability. This situation is one of the major elements that must be addressed as part of the security strategies to be implemented on the transport layer protocols. Encryption Algorithm – The encryption algorithm used for issuing the public and private keys is another element that influences the security and reliability of the PKI as argued by Burnett and Paine (2001). The effectiveness of the hashing algorithm used for the purpose is not only essential for ensuring the security of the information through encryption but also dictates the size of the information for transmission after encryption as well as the speed associated with the data transfer for a given encryption strategy. As the complexity of the encryption algorithm naturally increases the size of the data being transferred thus affecting the speed associated with the communication, it is critical to establish a balance between security and speed in order to enable effective communication over an established connection. It is also important to note that the use of encryption algorithm dictates the extent to which a hacker can hack into the information that is being transfer whil st launching a transport/network layer attack as argued by Burnett and Paine (2001). It is deemed that the hackers through launching malicious attacks at the transport layer or the network layer tend to utilise the time gap to decipher the information being transferred in order to use the data for personal benefits. This makes it clear that the code hacking at the protocol level mainly attribute to the speed with which a given payload data transferred over a connection can be decrypted prior to termination of the connection itself as argued by Burnett and Paine (2001). From the above arguments we can deduce that the encryption poses the threat of single point of failure to the PKI in terms either being weak to prevent infringement or highly strong affecting the communication speed as argued by Nash et al (2001). Advantages or benefits of PKI The major benefits of the PKI include the following The TTP presence enables higher level of security through verification by independent entities in the communication process. The CA and RA in the PKI play a vital role in achieving the aforementioned. The dedication of resources for developing stronger algorithms to generate reliable public and private keys is yet another advantage associated with the PKI implementation. This makes it clear that the transport layer protocol (TCP) of the network layer protocol (IP, ICMP) weaknesses in terms of the request for resend and other key elements of connection verification can be overcome through robust algorithms. The growth f the electronic commerce at an exponential rate is one of the key factors that attribute to the availability of resources dedicated to the development of the PKI security strategies (Nash et al, 2001). The security infrastructure behind the storage and retrieval of the public keys is yet another area where the reliability and effectiveness of the PKI is evident. The fact that in case of reliable CA and RA, the security is indeed robust and the information being transferred is secure as well as the communication process as argued by Nash et al (2001). Constraints, Weaknesses and threats TTP reliability and costs – As discussed before the major issue is the TTP reliability. The involvement of the TTP not only questions the