Wednesday, November 27, 2019

Federalist Essays - United States, The Federalist Papers

Federalist The Constitution came out to a world full of criticism. To put to sleep many of the objections that the critics had to the Constitution a number of those in favor of it such as Hamilton, Madison and John Jay wrote the Federalist. While there were many arguments for the Constitution, there were two that played a major part in American life. The first major argument was that the powers of the government came directly or indirectly from the common people. The second argument stated that to keep the government in check there is a series of checks and balances that will not let one branch of government gain too much control. Hamilton, Madison, and Jay put forth many of the arguments in support of the Constitution, but these two stood out more than the rest. In more depth, the first argument states that the government is directly related to the common people. The powers of the government come from ordinary powers or the common people and these ordinary powers have the ability to make changes in the government. The Constitution was designed in a manner as to protect the people of the nation both at the time the Constitution was produced and up to a time that the government might be destroyed. The protection of the people and their ordinary powers is achieved by allowing the citizens under the constitution to alter the government that the Constitution set up. The House of Representatives for example derives its powers from the people of America - the House is set up in such a manner that the people of America have a direct part in the government. The involvement of the people in government was a crucial argument in support of the Constitution, for it stated that the government would for the most part move in a direction derived by the popu lous of America. The second argument put forth by Hamilton, Madison and Jay was that the Constitution set up a form of checks and balances to protect the people from the government. Under the Constitution, three major branches were created the legislative, the executive, and the judicial branch. The legislature creates laws, the executive executes the laws and the judicial branch interprets the laws. With each branch having different powers no one branch can be tainted and then abuse its governmental powers. The statement of the checks and balances answered the concern that the government would become too powerful. With checks and balances, the government can only become as powerful as the people will allow. This fundamental plan also creates safeguards against the event of a president becoming a dictator. The argument about the system of checks and balances proves to be a system designed to protect the people of America from the government. These arguments provide for the security of the government and the people under the Constitution. Hamilton, Madison and Jay under the Federalist were showing that the government is run for the people and that they are directly involved in the governmental process. They also answered the concern that the government may become too large as restriction occurs through the system of checks and balances. The idea of the Federalist pamphlet was to put to rest many of the Anti-federalist concerns with the Constitution. The two major arguments made showed that the Constitution was in support of the masses of America. A republican form of government uses representatives to represent the people of America in the government. The argument against a republican form of government stands on one key principle that the people of America are not capable of being run directly or indirectly by the common people. A firm believer in the Constitution and the form of government it creates, Hamilton would be for a republican form of government. James Madison who is often called the father of the Constitution counters the argument against the republican form of government. The argument against a republican form of government hit a major cord with many of the prominent citizens. Many were afraid to leave the government in the hands of people that they saw as uneducated. The idea that spread was that the average person was not qualified to vote. At the time the

Saturday, November 23, 2019

The President Makes Grammatical Errors Too! Tenet vs. Tenant and Obamas Tucson Speech

The President Makes Grammatical Errors Too! Tenet vs. Tenant and Obamas Tucson Speech I got an email from my friend Seth Nowak on January 13, 2011 reporting, â€Å"Obama said ‘tenent’ in his speech last night.   One term president.† The speech to which Seth was referring is the moving, poignant speech Obama delivered following the shooting rampage in Tucson.   Obviously Seth was joking to me, The Essay Expert, that a small error like mixing up â€Å"tenet† with â€Å"tenant† would affect (not effect) Obama’s approval rating. Just a few days before, I had corrected Seth when he said â€Å"tenent† (or â€Å"tenant† he was speaking not writing, so I can’t be sure) when he meant â€Å"tenet.†Ã‚   Thus he could not help but notice Obama’s slip of tongue. To clarify, â€Å"tenet† means â€Å"any opinion, principle, doctrine, dogma, etc., esp. one held as true by members of a profession, group, or movement.† A tenant, on the other hand, is a person, a group of persons, or an entity occupying a space, usually a rental space (my definition). â€Å"Tenent† is not a word in modern English, though in the interests of full disclosure, it is listed on dictionary.com as â€Å"Obs.† (Obsolete).   It does not appear anywhere in the dictionary on my shelf, Webster’s Ninth New Collegiate Dictionary (copyright 1987, the year I headed to college – and if that’s not obsolete, I don’t know what is). Obama’s spoken sentence was as follows: â€Å"They were fulfilling a central tenant[sic] of the democracy envisioned by our founders.† The transcriber was kind to our President.   The text â€Å"tenant[sic]† does not appear in the transcription; instead, the official version in The New York Times reads, â€Å"They were fulfilling a central tenet.† The day before Obama’s speech, I had put â€Å"tenant/tenet† on my list of Top 10 Grammatical Errors of 2011 (scheduled for publication in December 2011).   Why?   Because inside of one week in January, not including Obama’s speech, I heard â€Å"tenant† used incorrectly twice: once by Seth as reported above, and once in a draft of a law school application essay.   I won’t quote that essay here for reasons of confidentiality, but here’s an example of a sentence in a draft law school application essay I received a year ago: â€Å"The general tenants of my thesis was that developing a national childcare system would contribute to the economy and better the lives of all Canadians.† This sentence has two problems:   First, she meant â€Å"tenet†; and second, even if â€Å"tenants† were correct, the verb â€Å"was† is singular whereas â€Å"tenants† is plural.   This client was not accepted into any Canadian law schools, despite the fact that her errors were corrected.   She did get accepted in England. The moral of the story:   If you want to get into law school, or be elected for a second term, get straight about the difference between â€Å"tenet† and â€Å"tenant.†Ã‚   I understand that â€Å"n† sound just wants to come out somehow, but try to keep it in check. So what do you think?   One term or two?   Perhaps that’s really the important question here.

Thursday, November 21, 2019

Harvard Business Review Article Essay Example | Topics and Well Written Essays - 2500 words

Harvard Business Review Article - Essay Example Following seven key lessons will emphasize on the significant aspects of effective strategic leadership as learnt and comprehended by a student. Key Lesson 1: Maintaining Effective Communication Communication of the organization's purpose is one of the most vital aspects to be considered. A corporate organization's purpose of being is what it stands for and gives an overview of the main aims it wants to achieve. So, it is essential for effective strategic leadership of a corporate organization to state clearly its mission and vision. This can be explained lucidly by the mission statement of Google, which is to organize all the information in the world in a systematic manner so that it can be accessed and utilized universally. Moreover, the brand name of a company should be a direct reflection of its core values, so that the customers would be aware of the services being provided and being attracted to avail them at the same time. Richard Reed, Co-founder of Innocent, did an exceptional job at coming up with the brand name. Innocent; which is one of the most recognized and acclaimed brand in the UK, produces healthy fruit juices and food items only. The company's name, Innoce nt goes hand in hand with the word natural, which depicts the very nature of innocent products. Key Lesson 2: Sustaining Competitive Market Advantage Another important lesson is to sustain competitive advantage in the market over the passage of time. Skimming, price war, and predatory pricing etc. are some of the marketing techniques which could be utilized by the company to sustain the advantage or to drive their competitors out of the market completely. If this upper-hand advantage is not achieved and sustained, a company could face serious consequences, which reflect adversely on its strategic leadership policies. The downfall of PepsiCo is one of the examples of this scenario as Indra Nooyi, the current chairman and CEO of PepsiCo, is facing a loss of market shares and decreasing stock values due to failure at sustaining competitive advantage with rival beverage company Coca Cola. In an announcement made in February, 2012, it was revealed that due to its financial concerns, PepsiCo is cutting down 8,700 employees. The company is starting new lines of diet soda and sugar free products to increase the customer interest but this strategy has not been very successful due to the launch of similar product lines from rival companies. PepsiCo is trying to devise new product lines in order to obtain competitive market advantage so that it can be successful in the market again. Indra Noooyi is also feared to be terminated from her current position of the CEO of the company if the financial position of the company does not stabilize. Key Lesson 3: Effective Change Management Faslane Naval Base was run entirely by the Ministry of Defence of UK and the Royal Navy up until 2002. Afterwards, a contract was signed with Babcock Marine to reduce the cost and to improve operational efficiency. The staff had to work under a different managing authority with new aims and futuristic goals. John Howie, director of Babcock Marine, set forth the emphasis on delivering services to the Navy, eradicating the previous goals of focusing on building infrastructures. Effective strategic leadership could never be achieved without effic ient and timely change management in the organization. Faslane is an organization where the only assets are the people, so to implement change, the shackles which bound the workers, had to be eliminated. Starting with low level managerial changes, the company moved towards gaining efficiency by re-engineering fundamental processes to

Wednesday, November 20, 2019

Individual Review on poster presentation 1,500 words Essay

Individual Review on poster presentation 1,500 words - Essay Example Volkswagen has a long history in China and plays a vital role in the Chinese automotive industry. In 1985, the Company signed a deal with SAIC that was formed by the merger of several local car manufacturers of China. This was a strategic move in history for the Chinese auto industry as well as Volkswagen. The company, Volkswagen Automotive Company Ltd (SVW) first identified those market segments which can be easily served with the existing product portfolio. Hence, Audi 100 became the Government officials car and Jetta emerged as commonly used taxies. Such strategic monopoly of the company assisted it to acquire a secure market share in China. This was the first phase of market penetration for Volkswagen in China and soon the company started developing strategies to further penetrate the market and expand its market share (Ray, 2003). Volkswagen was the first western auto manufacturer that entered China. The company was smart enough to be used as taxi and government cars which helped it to gain economies of scales. This strategic move also had a marketing aspect. The cars running on the roads of Shanghai acted as company’s showroom and thus more and more people came to know about the brand portfolio of Volkswagen. With time, the taxi fleet in Shanghai underwent an up gradation and each time a new model from Volkswagen’s brand portfolio has replaced the old one. Eventually, the company entered joint venture with local companies to develop a stable and reliable supply chain in the market. However, with increasing market competition from the local as well as international players in the auto industry, market share of Volkswagen started declining in early 2000s and the company went into crisis (EBF, 2007, p.47). With its innovation and creative thinking, the company introduced changes in its products as well as business strategy and reoccupied its lost image and established itself as one of the most popular cars. With time the Chinese auto sector has

Sunday, November 17, 2019

Treasury Yield Curve Research Paper Example | Topics and Well Written Essays - 2000 words

Treasury Yield Curve - Research Paper Example The trailing 12-month U.S. speculative-grade corporate default rate tumbled to 1.7 percent a month ago, the most minimal smallest since March 2008, as per Standard & Poors. The rate, which declined from 2.1 percent in December, will most likely build through the following few months, said Diane Vazza, the leader of S&P's worldwide altered wage research, in an announcement from the credit rating agency why. There were no appraised what does this mean corporate U.S. high-yield defaults in January, making it the sixth month in 14 years without a default. There were 43 U.S. speculative evaluation defaults in the majority of we have full year data 2013 and 47 in 2012, New York-based S&P said.(Summers)you need footnotesThe U.S. default ratio what is the default ratio? declined to 5.2 percent in January from 5.3 percent in the early part of February, over its low since the money related emergency of 5.1 percent in May 2013 what does this mean, S&P said. Distressed bonds are those with yield s no less than 10 rate focuses more than comparable development Treasuries.High-yield, high-risk securities are appraised less than BBB-at S&P and beneath Baa3 by Moody's Investors Service no definitions.Since 2008, the movements of the Federal Reserve have put the U.S. on a way to economic disappointment. To stem the economic slide of the U.S. lodging crumple what is this that initially surfaced in 2005, the Federal Reserve divulged three diverse quantitative maneuvering (QE) exertions.

Friday, November 15, 2019

Motivation Theories: Maslows Hierarchy

Motivation Theories: Maslows Hierarchy It is interesting to learn more about motivation because it has a long way to grow a business. First of all, motivation can be explained in simple terms as desire or willingness to do something; enthusiasm: keep staff up to date and maintain interest and motivation (Oxford dictionaries online, 2012). Motivation can be defined as Motivation is a reflection of the reasons why people do things. All behavior is therefore based on choice-people choose to do things that they do (Richard, 2007, p553). Moreover, Cole states that Motivation is the term used to describe those processes, both instinctive and rational, by which people seek to satisfy the basic drives, perceived needs and personal goals, which trigger human behavior. (Cole, 1995, p119).The motivation is one of the employer needs which encourage him to be more loyal and work with more enthusiasm. Motivation theories Maslows Hierarchy Maslows theory relates motivation to a hierarchy of needs with basic needs at the bottom and higher needs at the top as in Figure 1. The first level is the physiological needs such as food, housing and clothingà ¢Ã¢â€š ¬Ã‚ ¦is it enough to allow you to enjoy life. The second level is safety needs it is needs for stable environment relatively free from threats and it is security that your job is safe and secure that your working condition are safe. The fourth level is love and belonging it is being recognized for doing your job well, for example a feeling of belonging with your colleagues they support you and communicate with you. The fifth level is self-actualisation it is being promoted and more responsibility also given the chance and the scope to develop new ideas. ( Richard,2007,p557, from class) Maslow argued that there was a relationship between the different classes, the needs at the bottom of the hierarchy are basic and they need to be satisfied before a person can move on to the next level. For example an individual has not eaten; he or she feels hungry and as a response he or she eats and diminishes feelings of hunger so he or she cannot work well before this need is satisfied. Maslows theory became an early useful framework for discussions about what people needs may experience ate work also the ways in which their motivation can help them to meet managers. One criticism of this theory is that systematic movement up the hierarchy does not seem to be a consistent form of behaviour for many people. Figure 1: Hierarchy of needs (GOOGLE) Taylors Scientific Taylors motivation theory is created in 1911 and this theory is called a scientific management theory, thats mean a relation between science and management at the organization of work. According to Taylors research motivation thinks that money is the first thing which motivates people to work. But give to the employers some promotion and time to think about them self can help them to improve and work more seriously. Taylor believed that monetary reward was an important motivating factor. This is known as piece work. He lined how much money a person earned to how much the produced in a day. Their output was linked to a piece rate if people worked hard and produced a lot that day they would earn a lot of money, if they didnt work hard and didnt produce much they would not earn a lot of money that day. (From class) There are some problems with Taylors approach. He treats people as machine rather than as humans. He assumes that people are only interested in getting money from work in fact people want other things from work, a service of achievement, friendships with colleagues and work fulfills more than just monetary needs. Elton Mayo Elton Mayo (1880-1949) participated in Human relations Movement. He contributed with the social research performed at the Hawthorne plant of the Western Electric Company in Chicago, USA, between 1927 and 1932, and named the Hawthorne Studies. Elton Mayo is considered as the founder of the human relations movement. He was working on some studies concerning fatigue; accidents and labor turnover at work when he was approached by executives of the Western Electric Company for advice. The studies were conducted over several years in a number of different stages, as follows: first stage (1924-1927). This was carried out by the companys own staff under the direction of Messrs Pennock and Dickson. This stage was performed with respect to the effects of lighting on output. One group, had a consistent level of lighting, the other group had its lighting varied. The experimental group productivity increase even when the lighting was reduced to a low level. Stage two (1927-1929) is to make more d etailed study of the effects of differing physical conditions on productivity. In this research the separated six women working in the relay assembly section from the rest and they give them rest pauses and lunch times different in timing and in length. The result was that their productivity increased in better and worse conditions. The women productivity increased because they were the center of attention.(Cole,2004,p33) Mayo suggested that motivation at work was promoted by such factors as: -a good communication with the employer -a good teamwork which the employer feel relaxed -showing interest in others -ask the other before to make a decision -ensuring the wellbeing of other -ensuring work is interesting and non-repetitive Mayo believe that motivation encourage employer to work more and to choose their position in the work. 1-4 Herzberg Herzberg concentrated on satisfaction and dissatisfaction at work. His theory is sometimes called the two-factor theory which divided into: -Motivators factors or satisfiers for example: work itself, responsibility, achievement. -Hygiene factors or dissatisfies for example salary, company policy, working conditions.(Cole,2004,p37) The factors of motivators are all related to the actual content of the work place and job responsibilities. The hygiene factors are good or adequate will not in themselves make the person satisfied, by ensuring that they are indeed adequate. In other part, where these aspects are bad, extreme dissatisfaction was reported by all respondents. The work of Herzberg has tended to encourage attention to such as factors as: Suitable supervision which encourages the labor force rather than restricts it. Job enlargement programs, job enrichment and job satisfaction which can often be increased through work restructuring. The setting and achieving of targets and objectives. In order to manage the two-factor approach to motivation effectively, attention in the following areas: -A management style, attitude and approach to staff, trust and honesty, limitations or technology concerned in the work itself. -General factors of status, believed in, given opportunities for change and development of the organization. -staff has a good relationship between each other that is facilities the successful of the activities within organization.(Pettinger,2007,p560) David McClelland McClelland (1961) and his colleagues have examined how people think and their work led them to identify three categories of human need which are: Need for affiliation: to develop and maintain interpersonal relationships. Need for achievement : to show successful task results and take personal responsibility Need for power: to be able to influence and control others and to shape events. (Boddy,2002,p399) McClelland secluded need for achievement as a main human motive, and one that is influenced strongly by personality and by environment. Humans with a high need of achievement seem to have characteristics such as: their need for achievement is consistent, they seek tasks in which they can exercise personal responsibility, they prefer tasks which present a challenge without being too difficult and which they see as within their mastery and they want feedback on their results. Also they are less concerned about their social or affiliation needs. McClelland realized that the need for achievement is affected by education, childhood experiences and culture background. Therefore designing helping programmes can help increase the achievement motive in employees at work place. Using motivation theories in business It is important when doing investigative work, especially about motivation, that we remember that the existing theories on human behavior are just that theories. Theories are there to be challenged. Over a period of time, theories come and go. Just because you read one theory does not mean to say it is exactly what happens or that is how humans behave. As time passes and we gain new knowledge, theories may become totally discredited. The identification of the fact that business organisations employ people because of the contribution they make to production. In return for that contribution, people receive money in the form of a wage or salary.The successful of business start from the motivation theory for example if a firm can motive its employees after that it can improve employee morale and increase productivity then the business will be enhance. (bized, 2012). Motivation within the institution is when leaders encourage their subordinates to accomplish their tasks and provide a sui table environment in which they feel able to work. Employees give of themselves to change the work environment, considering each as an employee in order to ensure the proper functioning of the company so that its resources are fully optimized. Ensure that the tasks well paid because employees are a Family Company that is why they are the first team success, in order to generate intense harmony between all members of the institution to create its own culture the company. This allows the institution to stand very well on the socio-economic and financial institution made à ¢Ã¢â€š ¬Ã¢â‚¬ ¹Ãƒ ¢Ã¢â€š ¬Ã¢â‚¬ ¹him guaranteed future periods, since everyone is projected to a plane that is the health of the firm as the short, medium and long term. (Memoire online, 2012) The successful of business start from the motivation theory for example if a firm can motive its employees after that it can improve employee morale and increase productivity then the business will be enhance as in figure2: Figure2 (Madura,2007) A firm may not be able to motivate some employees, regardless of its efforts or the methods used to motivate them. If not form of motivation is effective, the threat of being fired may serve as a last resort to motivate these employees. Firms can enhance job satisfaction and therefore motivate employees by providing: an adequate compensation program, which aligns compensation with performance; job security; employee involvement programs and a flexible work schedule. A firms decisions regarding the motivation concepts summarized here affect its performance, if a firm can motivate its employees, it can improve employee morale and increase productivity. While there are many motivation theories, the proper form of motivation varies with the firms characteristics and may even vary among employees.(Madura,2007) Example of company using a motivation theories Case study: Kelloggs Kelloggs created in 1898 from W.K. Kellogg, and his brother, Dr. John Harvey Kellogg and this company produced the delicious recipe for Kelloggs Corn Flakes. In 2006, The Kellogg Company celebrated its 100-year commitment to nutrition, health and quality. In this time e Kellogg Company is the worlds leading producer of breakfast cereals. Its products are manufactured in 18 countries and sold in more than 180 countries also it has been a leader in health and nutrition. The most important of success the company it return from adapt the motivation theory. Kelloggs culture supports its role as a good employer. Employees are encouraged to speak positively about each other when focusing on their strength. The creating of a great place to work for Kelloggs is supported by the motivation theory. First of all Kelloggs adapt the motivation theory of Maslow by every employee is motivated to work through each of 5 levels and its positive effects for each employee and the company for instance: In physiological needs: Kelloggs offers competitive salaries this helps people to acquire the basic needs for living. Also Kelloggs gives people a childcare vouchers, cash alternatives to company cars and discounted life assurance schemes. These things help workers to be motivated and to be loyal to the company. In safety needs: Kelloggs securities the safety of all employees. The company is responsible to give a safe and healthy work environment to prevent accidents. Kelloggs also offers employees a range of working patterns. For example some may want to work part-time others may want career breaks or undertake homeworking. This will be a variety of options for the employees in a healthy work-life balance. In social needs: Kelloggs operates weekly group huddles. These provide opportunities for employees to receive information on any part of the business, including sales data and company products. Kelloggs positively recognizes and rewards staff achievements. In self-actualization: Kelloggs supplies employees with the possibility to take stimulating responsibilities and on challenging. This is helpful to the employees to develop and improve. For example: Laura Bryant joined Kelloggs in 2002 after fished her university. She joined the Field Sales team initially that help her to visit five to ten supermarkets a day to develop relationships at a local level. After two years she was promoted to Customer Marketing Manager at Head Office. This helped to increase her profile as she wanted to move into marketing. By encouraging from her manager, Laura made the transition from Sales to Marketing as Assistant Brand Manager on Rice Krispies and Frosties. In 2009 she was promoted again to manage the marketing plan for Special K and she is now Brand Manager for Kelloggs Cornflakes. The company has helped motivate her to raise the hierarchy of needs and achieve her career ambitions. In the second part Kelloggs adapt the motivation of Taylor for example many employees are motivated by cash alternatives which include the opportunity to buy and sell their holiday days. Also Taylors theory breaks down jobs into specialist tasks through the division of labor and this is corresponds to large companies like Kelloggs. Also the staffs of the company are encouraged to be creative and use their imagination to contribute towards change. In the third part, Kelloggs apply the motivation theory of Mayo in keeps a two-way dialogue with employees through its communication programs. This is helpful to allow the workforce. Kelloggs has kind of dialogue recording for communication like this one: Here at Kelloggs listening is a central premise of the way we work. We believe that our employees have some of the best ideas and that a successful company is one that listens to the grass roots feedback and acts on it. Any employee can raise an issue or a suggestion via their rep who will raise it at one of their monthly meetings. (Sue Platt, HR Director) The Kelloggs suggestion box scheme helps to improve productivity and making business a great place to work. Also Kelloggs helps to generate ideas and has an initiative called Snap, Crackle and Save an employee suggestion scheme to save costs within the supply chain. For example a lot of ideas have been put forward over the last couple of years. One idea suggested that one thickness of cardboard could be used for packaging in all manufacturing plants in Europe. This saved around  £250,000 per year. Kelloggs helps personal development planning for employees which includes provisions such as study leave as part of staff development. This reinforces staff commitment and their sense of being treated well. In the fourth part, Kelloggs adapt the motivation theory of Herzberg by developed a number of motivating factors. For example this company has a Fit for Life program offering to the employees access to fitness centers, annual fitness assessments by healthcare specialists every spring and free health checks. It also provides a summer hours from May to September so if employees have worked a lot of hours they can adjust their working hours to balance their work against family or lifestyle commitments. This motivation is related to Herzberg because in the workplace he want to give individuals job satisfaction These include, for example, promotion or recognition for effort and performance also the level of responsibility of the job. . Herzberg believed that businesses needed to ensure hygiene factors were minimised in order to enable motivators to have their full effect, because hygiene factors make the employees in the work place feel unhappy. This motivation from Herzberg helps Kellogg s to build a business that delivers consistently strong results. For example: Home working, part-time working, flextime and job sharing. Subsidized access to local facilities or on-site gyms Parental leave, career breaks, time off for depends and paternity and maternity. This an example of employee works with Kelloggs: Claire Duckworth works in the Consumer Insight team at Kelloggs. She takes part in Latin American ballroom dancing competitively with her partner. They are ranked 7th in England in the over-35 category. Flexible working at Kelloggs enables her to travel to events and provides her with the opportunity to pursue her hobby at a serious level. This opportunity to adjust her working life to accommodate her personal ambitions makes Claire feel respected and supported. Also the Kelloggs sales team meets every Friday morning to share success stories of the week. Analyze This case study illustrates the range of different motivation measures in practice at Kelloggs. It demonstrates that highly motivated employees can improve efficiency, output and quality for a business. Kelloggs is able to make work a more profitable and competitive business also more exciting and interesting experience for employees whilst creating a more productive. Conclusion: The importance of Motivation Theory Motivation at work is the taste that the subject has to do, the extent to which it involves, perseverance, continuity of effort he agrees. Motivation resulting from the satisfaction, it is important to specify certain criteria which are:  · The work itself,  · The economic level it provides,  · Relations in which he bathes. Operation depends as much on human motivational balance and satisfaction of the tension on the search for new tensions, thus some form of imbalance, for example, when a project (cognitive or social) is the subject humans often developed another action project, he tries to carry and so on. Arguably enhancing cognitive and social activities is their own creation and not in an external object. Turning your dissertation into a 2:1 Turning your dissertation into a 2:1 Title: Dissertation Copy Writing. How to turn your dissertation from a 2:2 to a 2:1 When you are given your first piece of coursework as an undergraduate, you are also given (or should be) a copy of the marking criteria which will be applied when your work is assessed. Although by the time you reach the point of writing a dissertation you will be approaching the culmination of a course of study, the same basic judgements will be made. Of course, there is always a margin allowed for tutors and lecturers to apply their own judgement, it is never simply a ‘numbers game’, and the dissertation you present will always be marked by more than one person, but basically the same criteria will be applied at whatever level you are working. So, how do you raise your dissertation from the mediocrity which is represented by a 2:2, to the degree of excellence represented by a 2:1? Essentially, the difference in terms of actual marks is often minute: a 2:2 would normally be the result of a mark between 50% and 59%, whereas a 2:1 represents a mark between 60% and 69%. Look at the borders here, not the maximum of each: the difference between a 2:2 and a 2:1 could be as little as 2%. In reality, however, this is rarely the case. Your work will be marked interpretively and therefore in order to be sure of upping that grade, you need a comfortable difference not a borderline one. Approach this logically and you will see that you need to consider how your work can be improved in each of the applicable criteria in order to raise your grade and you should think about this from the outset. Before you begin your dissertation, look carefully at the marking criteria and note where the differences between a 2:2 and a 2:1 lie. You’ll notice that the criteria for either a 2:2 or 2:1, requires the following: Understanding of the question Identifying the major themes The ability to develop a well-structured argument The inclusion of supplementary evidence from primary texts, correctly referenced A strong conclusion A bibliography using the referencing style of your academic institution. Having probably been in academic life for some time before attempting a dissertation you should be thinking ‘this is all pretty standard’ and if you are not, then that 2:1 is just a dream because the way to turn a 2:2 into a 2:1 is down to your ability to recognise just where each of these basic requirements needs to be expanded. In general, the key differences between a 2:2 and a 2:1 exist in the depth of research and the quality of analysis. That being the case you should focus on your level of research and your analytical ability to improve your grade. Also, this ability to research and analyse must be linked seamlessly to your argument. To earn a 2:1 you must make your points cogently and show that you have expanded your reading beyond the merely required towards the comprehensive. A good way of doing this is to look at the bibliographies of a primary text because you will then be using a credible source to develop your research base. From here, you can begin to analyse, i.e. literally take apart and comment critically on the evidence so that it informs your dissertation argument and never at any point appears separate from the central themes. A 2:1 dissertation reflects a much deeper level of thought than a 2:2, which is why it is the minimum requirement of most respected universities in order to carry out post-graduate research. However, even within the 2:1 there are divisions of which you should be aware in order that you are sure of your 2:1, rather than hoping just to scrape through. In other words, you need to be aiming for a mark in the region of 65% to 69%. To achieve this, you need to demonstrate: that you can not only develop an argument but that you have anticipated some of the possible challenges to it that your reading goes beyond the basic in both collation and coherence that your analysis has added to your argument and developed your thinking that you have produced a conclusion that does more than just summarise your argument but also provides a genuine synthesis of wide-ranging yet focussed thought. Remember, that the award of a 2:1 grade reflects on the level of excellence of the academic institution to which you belong as much as you so it will not be given lightly but that, of course, is what makes it worth having, isn’t it? How to turn your dissertation from a 2:1 to a First Class In order to preserve their quality benchmark, most universities strictly limit the number of First Class degrees that they award and this is reflected in the assessment of a First Class dissertation. When you think about it, you wouldn’t really want it any other way because the expansion of the number would devalue the inherent status that achieving a First Class degree carries and the key to this is the ability to research and write a First Class dissertation. For this reason, if for no other, you need to work not only harder to achieve a First Class dissertation grade but also in a very specific way. Let’s examine precisely how by taking the structuring of a First Class dissertation step by step. You will have at your disposal a marking scheme with which by the stage in your academic career when you are required to write a dissertation, you should be very familiar. You need, now, to look at this more closely, even analytically, than you have ever done before, so that you isolate the features which separate the wider excellence of the 2:1 from the specific excellence of the First. Looking closely at the marking levels, you will instantly see that it would be theoretically possible to achieve a First Class dissertation grade by gaining a mark that is anything over 70%. In practice, however, you will more often than not be literally competing for a First against your fellow students because the university might often decide in abstract how many Firsts it ultimately intends to award and your dissertation is a crucial part of this. Therefore, you must ensure that your dissertation stands out from the rest and rather than just edging into the 70s reaches closer to 80%. The basics should not need to be stated if you are aiming at the highest level with your dissertation so let’s take it has read that you will write well, argue coherently, reference appropriately and correctly and provide a convincing conclusion; even to get a 2:2 you would need all of these to be present. Therefore, it is not on that you should focus for a First but on other factors, not called for in the lower levels, even the 2:1: this extra something is rooted in the demonstration of research abilities beyond the obvious and the ability to find the original in the familiar. In other words, a First Class dissertation will display not only wide reading but also an innovative approach to both the interpretation of the research and its application. Your thoughts need to be both critical and original and whilst the first of these may be familiar, the second will be less so because in all probability you will not have been required to display originality until now. Indeed, you m ay have been actively discouraged from allowing your own thoughts to enter into your work, as most academic work encourages you to take an objective view rather than a subjective one. You now need to forget that to some extent and begin to allow your personal perspective to enter your work. Of course, you still need to present a balanced argument, well supported by strong evidence in the form of wide and yet focussed reading, but you must now also add to this the evident ability to detect and develop a nuance so that it becomes a uniquely significant imperative in your work that separates it from the work of others. Above all, to obtain a First Class grade for your dissertation, you need to display a scholarly approach, together with an individualistic but grounded and viable methodology which includes evidence of innovation and independent thinking. This is of course a very difficult task, especially if you are working in a very familiar field. Most of the original lines of approach may appear to have been developed already but this will not be the case. There is not a single topic on which the last word has been said and if you can find and develop an original line of thought which you can support with a strong argument and comprehensive research, then that prized First Class dissertation is within your grasp, all you have to do is go for it! How to turn your dissertation from a First Class to an Upper First Class The one word with which you need to engage in order to achieve an Upper First Class dissertation is originality. Everything else that you need to accomplish should be second nature to you at this level and what you want now is to demonstrate how your thinking will add to the body of thought on the subject. Indeed, the development of a First Class dissertation to an Upper First Class dissertation may be said to rest if not exactly solely then certainly heavily upon this aspect of your work. One of the main reasons for this, is that the vast majority of Upper First Class dissertations are later developed into theses for post graduate research, may indeed already be part of it, and as the excellence of a university’s research, from its staff as well as students, is the way in which it is ultimately judged in the academic world, it is clear that this grade will not be freely awarded. Therefore, if you are hoping to achieve this level, you will need considerable intellectual insigh t combined with an innovative approach. Clearly, the fundamental basis of an Upper First Class dissertation is wide ranging research but you should approach this from the first with an eye to discovering a new approach, something that has not been explored before and that further research will help to develop into a significant contribution to the topic you are studying. This is both challenging and exciting as you have the chance to contribute to a topic for which your attraction has been demonstrated by your having chosen to study it in the first place and reached the level that you have. Also, as has already been mentioned, what you identify as areas of possible future research in this dissertation may well be the basis for further study and you should incorporate this into your dissertation as a fundamental part of its structure throughout, if you are going to achieve an Upper First Class grade, which in most cases will require you to gain over 80% as your final mark. As research is so vital at this level, it is worth taking a little time to explain how you should go about it when preparing your Upper First Class dissertation. As with the research for lower grades, you should, of course, first consult the primary sources. Every field has its experts and in your search for innovation, you should not overlook the established. However, whilst you are assembling evidence from what has been said, the Upper First Class dissertation student will be looking just as vitally for what has been omitted. Ask yourself the following as you read: What is this expert saying? Does this expert cover the topic comprehensively? Are there any areas of particular interest to me which are absent? Can my research develop this further? Has anyone else covered the thinking which I believe to be original? By breaking down your research into this critical approach, you are beginning to work in the way that is needed to obtain an Upper First Class grade for your dissertation. It should also be remarked that the level of fluid and cohesive argument that you will need to produce in order to achieve an Upper First Class grade for your dissertation must be beyond reproach. There must, of course, be no errors in either the presentation or the structure and careful proof-reading is essential. Also, you must in no way sacrifice the logical and reasoned coherence of your argument to the quest for originality. There is little point in exploring a nuance you have discovered if your basic argument is flawed. Therefore, before you expand your writing and research ensure that you have covered the basics of the topic. Remember that ultimately what is required to achieve an Upper First Class grade for your dissertation is innovative thought coupled with a well-argued central discussion. The conclusions you draw are also a fundamental part of an Upper First Class dissertation as is a comprehensive bibliography so don’t leave either your conclusion or your bibliogr aphy until the last minute. Give both the importance they deserve in your dissertation and you will leave your assessor with the desired impression: that they have read an Upper First Class piece of work which is, of course, precisely what you want and which, by following this brief guide, you will have every chance of achieving.

Tuesday, November 12, 2019

Humanistic and Psychodynamic Essay

Abraham Harold Maslow- Humanistic Approach Humanistic is the psychology study of how the human works as a whole. This studies the uniqueness of the person through their behaviour. Rather than just observing the humans behaviour, humanistic psychologists try to study the humans behaviour first person rather than just observing. Meaning they try to understand the situation and the emotional feelings the person is going through for them to have that specific type of behaviour, they try to understand the behaviour of the person by looking at it from their perspective. Humanistic is a way of thinking and is an ability to solve our own personal problems. This meaning to focus on our own perspectives, experiences, thoughts, self-image and feelings to understand an individual. People can be capable of self-development and their own self-improvement. We have our own choices on what we choose to do and how we chose to take out this option. We chose how we want to behave and whether it’s right or wrong i.e. breaking the law. An i ndividual chosen whether they want to break the law, knowing full well of the consequences. This is called free will; we have the right to choose what we want to do and how we want to behave. The court of law follows this principle because you know whether you have done right or wrong and there is no one to blame, except yourself, because you chose to behave that way. Abraham Harold Maslow was the first psychologist to create the ‘human hierarchy of needs’ which explains the different level that an individual has to move from throughout life. This hierarchy changes from one level to another and each level has its own specific needs. Most psychologist before Maslow had been concerned with the abnormal and the ill, he convinced and persuaded people to start acknowledging people’s basic needs before addressing them as having higher needs or being ill. Firstly on Maslow’s hierarchy he started with the basic needs of a person such as food, water, sleep etc. then lead to the physical needs of an individual. The highest needs of an individual are ‘self-actualization’ which is realising who you are as an individual and knowing your own moti vations. Not many people get to the self-actualization for many reasons, being that they didn’t get through the different levels of the hierarchy or because they think that they can skip the rest of the  levels, thinking that they know their own self-fulfilment etc. These hierarchies have five different levels of needs. Maslow’s level of human needs started with physiological which is basic survival, understanding the function of the living organism. Which is what an individual needs, their basic needs i.e. water, sleep, breathing and sex. Then safety which is basic need again and feeling secure. For example, freedom from danger, risks or injuries whether at employment, home or doing everyday activities. Love and belonging is the next need which is the emotional level/need. Meaning to understand what love is and what it feels like to belong, dependent on being part of a family or understanding what it is like to love through friendship or sexual relationships. Esteem is the fo urth need, which is respect and recognition. Understanding what your personal goals are in life and what you can achieve throughout life dependent on yourself respect and respect for one another. The final level is self-actualization which is what makes you who you are as an individual, realise your own potentials in life. Also, realising your own self-fulfilment and person growth from peak experiences. Everyone as an own personal desire to move up the hierarchy table towards self-actualization, although their progress is often disruptive by failing to meet the low level needs. As an example if someone doesn’t show love or feel loved then they won’t be able to succeed through the love and belonging section, if they’re brought up in an abusive home this would affect the low level safety so they would be decreasing in the levels. Only remarkable people are most likely to reach the highest level, self-actualization. Maslow’s theory was the best type of motivation for an individual, he proposed he hierar chy of needs in his paper â€Å"a theory of Human Motivation†. Hans J Eysenck and Otto Gross approach to Psychodynamic Hans is a psychologist famous for his work on intelligence and personality. Eysenck claims that Freudian theories can be falsified, also Gross claims that Freud’s theories are scientific but have been proven wrong so which he say is simply â€Å"bad science†. Psychoanalyst tends to only accept YAVIS patients for treatment, YAVIS means young, attractive, verbal, intelligent and successful. This is because YAVIS patients are more likely to recover rather than mentally unstable patients. When the criticism of frauds approach happened was because Gross and Freud were in a disagreement on the  subjects of repression, sublimation and perversion. The meaning of repression is to control and resist what you would want. Sublimation is doing things in an acceptable and respectful manner and perversion is far from normal for example being abnormal. They disagreed on Freud’s theory because they believe that the patients should be capable of feelings and having their freedom also they shouldn’t be forced to do something that they do not want to do. Both psychologists argued that Freud got too involved and attached with his patients because Freud was there 7 days a week. Sigmund Freud, Psychodynamic Approach to Psychology Freud was the founder of psychodynamic approach to psychology; this is because he created a new approach to understanding how the human works and the human individual personality. Freud’ theory was the conscious and unconscious mind, he believed that behaviour and personality derives from the constant and unique interaction of conflicting psychological forces that operate at three different levels of awareness. The three different levels are conscious mind, preconscious mind and unconscious mind. Conscious mind includes everything that we are aware, every single moment. Preconscious mind represents ordinary memory. Unconscious mind reservoirs our feelings, thoughts, urge and memories that are outside out conscious awareness. The theory of the conscious and unconscious mind is done to show our feelings, motives and decisions which are actually influenced by previous/past experiences, which are stored in the pre-conscious and instincts from the unconscious. Freud later made a structural model of the mind which was called ID, EGO and SUPEREGO. The ID, EGO and SUPEREGO link to the conscious, pre-conscious and unconscious mind. ID is the unconscious, EGO is the conscious and SUPEREGO is the pre-conscious and unconscious mind. Although these are not physical areas within the brain they’re the process of important mental functions. Explanation of each stage is; ID is driven by pleasure principles which strive us for immediate needs and desires, meaning that the person would be wanting things. Although the ID will try to resolve the tension created by pleasure. EGO and SUPEREGO, EGO is something that is developed through ID in the early stages of life, EGO is the component of your personality that deals with reality whereas SUPEREGO is developed a little later as it controls your guilt. For example, if someone wanted a  new pair of shoes ID would kick in because the desire to have them shoes would rise, whereas EGO would have to face reality and realise that you might not have the money to get the shoes then SUPEREGO controls the guilt so then you would start regretting buying the shoes if for instants a family relatives birthday was coming up and now you don’t have the money. EGO works on a reality principle meaning that it wants to please the ID but in a socially and realistic way, which some people deem as unacceptable. The reality principle contemplates the positive and negatives of an action depending on what it decides, it will either act upon the decision or completely abandon it. SUPEREGO is the basic rules and standards for good behaviour. The behaviours included would be those approved by parents and those in authority. The SUPEREGO goal is to improve and civilize our behaviour; it tries to supress all the unacceptable urges that come from the ID. Fraud’ theory claims that the key to a healthy personality is a balance between the ID, EGO and SUPEREGO. Carl Ransom Rogers, Self-Actualization Again, the humanistic approach is how we look at an individual as a whole observing their behaviour and personality. Rogers was a psychotherapist, which is someone who treats people with mental disorders through psychology rather than medical means. After years of work, Rogers compiled the Self-actualization theory which is the realisation of fulfilment of one’s talents and potentials. Rogers says that people have two basic needs which are positive regard and self-worth. Positive regard is a sense of acceptance from other people and self-worth is feeling adequate. Our feelings of self-worth are important both to psychological health and we can achieve goals and ambitions in life to achieve self-actualization. Rogers’s theory is that the individual is responsible for their own happiness and should not look towards others for it. He believed that a person is born with the desire to be and achieve the best they possibly can. Rogers’s overall theory is about feeling good and mentally healthy therefore meaning a person is cable of resolving their own problems without looking towards others. His therapy was ineffective to those who were unconfident, unhappy and had a lack of self-esteem. So he studied on clients opposite to this, clients who were confident, happy and have a high level of self-esteem. His theory was known as ‘Rogerian Counselling’ which was only effective on healthy minded  people which means it did not work on mental and physically damaged clients this only increased emotional problems such as depression, also the theory was more successful on children and young people. The theory key was communication, if the client wasn’t fully communicating with Rogers it would not work, this proved the therapy ineffective to people with phobias. In conclusion Rogers theory of self-actualization teaches people to become self-sufficient upon their own actions rather than seeking it from other people. This proved that people naturally desire to be accepted regardless of what they do, however the majority of people will only accept them dependent on whether or not they want to. Rogers self-actualization tries to help people understand their full potential and what they can achieve, also seek happiness for themselves without looking towards others for it. His theory helps people become more happier about themselves rather than looking for acceptance and happiness from others.

Sunday, November 10, 2019

Cybersecurity for Critical Infrastructure Protection Essay

Cybersecurity entails safeguarding of computer networks and the information that it carries from unauthorized access and malicious disruption or damage. This is because the use of networks has become common in businesses and government activities, and any tampering can cause serious consequences for the affected bodies. A question is what degree do the security bridge has to critical infrastructure. Analyses of unconventional and asymmetric attacks assume that potential opponents would use cyber weapons. Such opponents could employ the use of conventional nation state and â€Å"non-state actors† opponents. Initially, cyber weapons were considered better because of their asymmetric attacks because of the low cost, which results in damaging most vulnerable parts that are found in most of the computer networks – may be disastrous as kinetic or blast weapon. â€Å"Digital Pearl Harbor† a term that appeared in mid-1990s, when internet was commercialized and frequently used came to birth. The scenario in this picture is that the world would plunge into disaster due to the introduction of hackers. Some of the results that were predicted to be associated with the Digital Pearl Harbor include open floodgates, blackness, poison water supply and planes crashing. However, there is no cyber attack that has produced such disastrous results. Such talk arose due to lack of technological understanding, how software’s operate, and the operation of other complex system. To determine the extent of risk that is posed by computer networks and its vulnerabilities, it requires an estimation of probability that will damage critical infrastructure in certain ways that will affect the national interest. Hence, it means that there should be sequential or simultaneous events that must occur for a digital attack in the cyberspace to have physical effect. Computer networks are usually the vulnerable part, and not the critical infrastructure that these networks accommodate or support. Infrastructures are strong and resilient and are capable of absorbing damages that are associated to terrorism, natural disasters and climates. This means that the issue of cybersecurity in the field of terrorism is usually overestimated. By saying so, it does not mean that planning of critical infrastructure protection should not be in place. In planning for the measures that should be include in planning in the CIP, first as the computer networks increase, their vulnerabilities also increases. Secondly, another method that can be employed by the attackers is attacking the storage parts of the networks instead of the networks itself. The networks are penetrated, collect-required information and monitor changes without creating any suspicion and when they are suspected, the databases and networks that support important activities are disrupted. Political Context for Cyber security and CIP In the end of 1990s, cybersecurity policies were dominant and there were frequent discussions on the issue of critical infrastructure protection. Nevertheless, currently there is a minimal understanding by the Federal that the initial issues that were associated with the use of internet and network connectivity were overemphasized. This overemphasis was due to several factors that range from the introduction of Internet to the Y2K (Philemon 2005, pp. 70). Y2K was associated for previous programming errors which IT experts believed that world would plunge into chaos at the mid night of the New Year, thus brought most attention to the world of cyber security. American government as been associated with risk-averse policies since the 1970s. This is because there is a loss in terms of confidence of governing elites, decrease in public trust and a punitive and partisan political environment. Hence introduces plans, policies, and various strategies for critical infrastructure protection. This political change brings in better understanding of cybersecurity and critical infrastructure protection. Hence, planning for critical infrastructure protection requires an assessment of risks that are capable of damaging attack. An individual who is risk aversive may estimate the probability of damage attack to be higher when compared to a neutral individual (Davis 2003, pp. 33). Assessing Risks In determination of the significance of cybersecurity for critical infrastructure protection, it must begin with estimating the risk. This method so far has proved difficult to incorporate. The better method is neutrally analyzing previous attacks and gain better ways of knowing it causes and consequences that were associated. This will enable the estimation of likelihood that a potential attacker will concentrate on a particular target. In addition, it is able to predict the type of weapons that will be used. This involves understanding the motive of the attacker, strategic role, capabilities, preferences, goals and experience. This will weigh the capabilities and goals of the attacker against potential infrastructure vulnerabilities (Davis 2003, pp. 33 – 34). The definition of risk is how much of threats that a society or government could withstand and relies on the importance of the security. Homeland Security policy states that it is difficult to eliminate all risks, but requires priorities that will reduce the amount of risks that are associated with cybersecurity. Risks that are associated to cybersecurity can be grouped into three parts: risks that can cause injuries or death, affects the economy or reduce the capability of military. So far, there are no issues or threats that are associated with the different groups (Keith 2005, pp. 66). Critical Infrastructures and Computer Networks United States has a long list that identifies critical sectors and includes agriculture, health systems, banking and fiance, IT and telecommunication, energy, industries, and transportation. To the Federal government the issue of cybersecurity is not serious to them. An infrastructure is said to be critical since it is able to meet some standards of national interest. To meet these different standards, there is usually an implicit assumption that disruption of the infrastructure would reduce flow of services and goods creating hardship resulting to impeding of government economic operations. To understand the relation between cybersecurity contributions to the critical infrastructure protection, two additional concepts of location and time can be introduced (Keith 2005, pp. 66). Location and time helps in understanding that cybersecurity is not a concern to critical infrastructure. Those issues that takes time to show problems, usually gives time for the affected organization to identify solutions and organize and in marshaling resources to respond to the issue, hence, does not present a crisis. The capability of industries to respond to the problems through innovation and creating alternative technologies or solutions means that those infrastructures that had disruption and did not posses immediate danger, results in minimal effect to the economic, national security and life in general. National infrastructures are geographical distributed which means that they are not critical in nature. This means that larger infrastructure provides critical supports to key governmental functions and economic, and not the entire industries or networks. This means that there are few networks that are national in nature and at the same time are usually mutually dependent. Networks that are associated with telecommunications, finance and electrical power are most critical because of its interconnectedness, economic health and national scope. An example is the Fed wire that supports banking, if it is attached it may cripple the banking sector form sometime, but the Federal Reserve have developed means to harden the Fed Wire. Internet as a Critical Infrastructure With the help of cyber weapons, the Internet can to some point be attacked. However, the Internet is a shared network that if attacked will affected both the target and the attacker. An attacker can calculate that the US economy may be most affected and the attacker may use back ups of some sort, giving it a temporary advantage. Internet is robust and is able to operate even if the Soviet Union and United States exchange nuclear weapons. Its architecture and design enables it to survive and withstand all these problems. With packet switching, the Internet can redirect the messages and at the end of the day arrives or are directed to the required port. The capacities of the internet to operate is due to the addressing system which is multilayered, decentralized and has the possibility of operating even if it means it will take days to update the routing table. The core protocols that are employed by the internet are vulnerable to attack. An example is the Border Gateway Protocol –BGP that is responsible for routing traffic, has been tested and it is vulnerable to attacks but the attacker has to face the redundancy, which is associated with thousand of subsidiary networks in the Internet (Davis 2003 pp. 33 – 34). So far, there is only one case that has between witnessed, in 2002 there was an attack to the Distributed Denial of Service of eight out of the 13 important root servers, which govern the addresses of the Internet. The attack did not cause a lot disruption but it is believed that if it could have taken a longer time it would have degenerated the Internet. Since the 2002 incident the DNS system has been strengthened through dispersing the root servers to different places, using new software’s and employing routing techniques. Hence, the new redundancy that has been employed has drastically reduced the issue of shutting down the DNS. In addition, the complexity that is associated with estimating the actual cost makes planning for critical infrastructure protection difficult. Most estimates that are associated with cybersecurity are exaggerated or overestimated. To obtain the amount of damages that are caused by cybersecurity, a sample is estimated and then it is extrapolated to the affected population. Analysis of the impacts and effects of cybersecurity estimates should be analyzed by statistical analyses and economic losses should not be received in face value. Importance of the cybersecurity in protecting critical infrastructures other than electrical power, telecommunications or finance, rests on the believe that the critical infrastructures are dependent on the computer networks for them to be able to operate. In such perspective the computer network specifically are vulnerable but the infrastructure that they support are not vulnerable (Philemon 2005, pp. 70 – 75). An example of a distractive cyber attack was the Slammer worm. It effects affected automated teller machines (ATM) across the northwest making 13000 to be out of service. Many analysts belief that the Slammer was a damaging cyber attack, but in national perspective, it had small impact since other parts of the country operated normally. Furthermore, the Slammer Worm only affected one bank and its ATM services. In this case, the customers of the bank suffered some inconveniences; the bank lost revenue and spoilt their reputation giving an advantage to the cybersecurity conscious competitors. Potential opponents in terms of nation-states may employ the use of cyberspace. When they gathering intelligence information will prompt them to attack and penetrate the U. S. computer networks. When a conflict occurs between different states, information, skills and access to crucial infrastructure will be used to disrupt important information system. Risks that are associated with espionage and cyber crime are real for firms, agencies and individuals. References Davis, J. (2003). Information Technology Security Threats, New York: Barron’s Educational Series, pp. 30 – 34 Keith, J. (2005), Plans and Developments in Computer Networking, New Haven: Yale University Press, pp. 66 Macklin, M. (2007), Computer networking Implementation and Security, Jakarta: Cambridge University Press, pp. 45 – 49 Peter, K. (2001). Cyber Security and CIP, Australia: Fontana Books, pp. 120 – 121 Philemon, M. (2005), Development of Computer Systems and Terrorism Threats, Stanford: Stanford University Press, pp. 70 – 75 Rachael, L. (2003), Critical Infrastructure Protection, New York: New York Publishers, pp. 13 16 Richard, Z. (2005), Management and Information Technology, London: Oxford University Press, pp. 60 – 61

Friday, November 8, 2019

Free Essays on Silence

Shusaku Endo, Silence Silence is a book written as a book describing basic Christian beliefs and to discuss and show how a Christian priest traveled to Japan to spread the Christian beliefs. This book was not just any ordinary book of Christianity; it showed how one priest who had such strong beliefs struggled to stay alive everyday while he was in captivity in a Japanese prison. This book gives the reader a basic understanding of the Christian beliefs. This book starts off with describing how a well known priest, known for his strong Christian beliefs, was taken into custody by the Japanese. The author goes into detail describing how the priest apostatize his beliefs. Thus meaning he had given into the Japanese and told them that he would forget about his beliefs. The book soon continues and describes how four other priests set off on a voyage to Japan to follow this priest’s doings, in denial of what they were told about him apostatizing his Christianity. Consequently they did end up reaching Japan hoping they could spread the word and act as a missionary to the Japanese. The only problem was the fact that Japan had forbidden the Christian beliefs throughout the country. All in all the priest was taken captive because of his beliefs. He spent many days in many different jail cells. The only thing that kept him motivated along with the other Christian prisoners was there beliefs. After a while the guards were even feeling bad for the Christian followers, but could not fully say so due to the fact that they were descendants of the Buddhists belief and could only support that specific religion. In the end the Christian priest did apostatize and he remained in Nagasaki, Japan where he lost his Christian beliefs. A word that I would use to describe the religion and the people who supported this religion in the book would be loyalty. Loyalty is a word that is well respected and can describe the type of person one can be... Free Essays on Silence Free Essays on Silence Shusaku Endo, Silence Silence is a book written as a book describing basic Christian beliefs and to discuss and show how a Christian priest traveled to Japan to spread the Christian beliefs. This book was not just any ordinary book of Christianity; it showed how one priest who had such strong beliefs struggled to stay alive everyday while he was in captivity in a Japanese prison. This book gives the reader a basic understanding of the Christian beliefs. This book starts off with describing how a well known priest, known for his strong Christian beliefs, was taken into custody by the Japanese. The author goes into detail describing how the priest apostatize his beliefs. Thus meaning he had given into the Japanese and told them that he would forget about his beliefs. The book soon continues and describes how four other priests set off on a voyage to Japan to follow this priest’s doings, in denial of what they were told about him apostatizing his Christianity. Consequently they did end up reaching Japan hoping they could spread the word and act as a missionary to the Japanese. The only problem was the fact that Japan had forbidden the Christian beliefs throughout the country. All in all the priest was taken captive because of his beliefs. He spent many days in many different jail cells. The only thing that kept him motivated along with the other Christian prisoners was there beliefs. After a while the guards were even feeling bad for the Christian followers, but could not fully say so due to the fact that they were descendants of the Buddhists belief and could only support that specific religion. In the end the Christian priest did apostatize and he remained in Nagasaki, Japan where he lost his Christian beliefs. A word that I would use to describe the religion and the people who supported this religion in the book would be loyalty. Loyalty is a word that is well respected and can describe the type of person one can be...

Wednesday, November 6, 2019

Melting Point Lab Report Essays

Melting Point Lab Report Essays Melting Point Lab Report Paper Melting Point Lab Report Paper I did three mixed melting point trials that resulted in a melting point of 1 ICC to 1 ICC. The melting point range is small, which indicates a relatively pure substance. I did a mixed melting point trial to find out what substance I had. I used Benzene Acid and Ecumenicist because they were the two substances in my melting point range. Just by comparing the characteristics of the two substances to my unknown, I assumed it to be Benzene Acid. My unknown and Benzene Acid had a fine, powdery texture to it, while Ecumenicist looked like crystals. The two mixed melting point range trials infirmed this. Unknown number 18 is Benzene Acid. A possible alternative would be Ecumenicist, because of the close melting points. Another possible alternative is Fluorine, which melts at slightly lower temperatures than my unknown does. Benzene Acid is CHICHI. Its structure is: My percent recovery was 28. 26%. During the dissolving of my unknown, there was still undisclosed solid. This could have led to a smaller percent recovery. If you are not given the solubility data for your compound, then you must test for the solvent required. This is done by mixing the possible solvent and your solid gather and agitating it, heating it, then cooling it. It crystals form, you have your solvent. You dissolve your solid by using a hot solvent, and then cool it down to form crystals. The solution is heated so the solid can dissolve and the filtrate is cooled to lower the solubility, which causes the crystals to form.

Sunday, November 3, 2019

Discussion Topics Assignment Example | Topics and Well Written Essays - 500 words

Discussion Topics - Assignment Example If power is centralized, an abusive government can come into existence and misuse the state of security, to cause massive and unreasonable destruction to both the United States and other nations. Divisive power observes control and regulation in decision-making. The American constitutional structure has advantages such as the practice of pragmatism, which is very relevant and applicable to a country as large as the United States of America. The constitutional structure creates laboratories of democracy. There is experimentation of policies and state governments can learn from the successes and failures of other states. It helps set a state of political stability by separating national government from areas of contentious issues. Finally, the constitutional structure helps encourage pluralism i.e. by expanding to local, state and national levels. By separating powers, it prevents tyranny (Beard & William 87). The disadvantages of the constitutional structure include prevention of national policy. It lacks single policy on issues i.e. each state with its own and this causes confusion. It also leads to lack of accountability; the overlap of state and national boundaries makes it hard to assign blame on policies that have failed. To other democracies, the structure of the constitution depends on the geographical and political coverage. Small nations would function well with parliamentary systems, but to fully practice democracy, federalism would be the most effective. Members of the public should be adequately informed on the issues of governance and politics in order to fully practice democracy. This also helps in the monitoring of the activities of the people in authority. Ignorance would definitely reduce the effectiveness of a democratic nation. Most of the Americans, however, are not well equipped with this information to guide the policies of the

Friday, November 1, 2019

Sexual Harassment Law Research Paper Example | Topics and Well Written Essays - 1500 words

Sexual Harassment Law - Research Paper Example The alleged misconduct should be so severe and pervasive as to disturb emotional wellbeing and work performance of the victim which conditions are prima facie requirement for a conduct to be characterized as sexual harassment. The paper further lists out reasons for an organization to have sexual harassment policy statement along with the contents of the written policy as stated in the appendix. This research has also discussed the case law of Beth Ann Faragher, Petitioner V. City Of Boca Raton (1998). 1. Define sexual harassment as the term is used legally.   The legal definition of sexual harassment is: the illegal discrimination in employment based on sex. This definition is only a part of the behaviors that could constitute sexual harassment. The illegal employment discrimination behaviors and the experiences of sexual harassment often overlap. They are however not congruent. Some behaviors are readily identifiable as sexual harassment such as the supervisor’s demand on the employee to engage in sexual activity with him as a condition to continue in employment. Sexual harassment may not be overtly experienced by the victim but subjectively in a less defined contexts which may not be illegal (Gold, 2004). In Harris v Forklift Systems, Inc (1993), it was held by the Supreme Court that psychological injury cannot be claimed to prove sexual harassment under the constitutional law. ... Equal Employment Opportunities Commission (EEOC) has been entrusted with the responsibility to enforce the provisions of Civil Rights Act relating to discrimination (Gold, 2004). The EEOC’s definition of sexual harassment states â€Å" Unwelcome sexual advances, requests for sexual favors, and other verbal or physical conduct of a sexual nature constitutes sexual harassment when (1) submission to such conduct is made either explicitly or implicitly a term or condition of an individual’s employment, (2) submission to rejection or rejection of such conduct by an individual is used as the basis for employment decisions affecting such individual, or (3) such conduct has the purpose or the effect of unreasonably interfering with an individual’s work performance or creating an intimidating, hostile, or offensive working environment† (Gold, 2004, p. 20) The definition has evolved through case law. The EEOC guideline cannot be technically law though it is subject to the judicial review of the Supreme Court. Thus, review has resulted in two kinds of sexual harassment. One, Quid pro quo harassment which arises when an employee is forced to exchange sexual favors for the benefit of employment present or future or to avoid adverse employment action. Second one is Hostile environment harassment that results in â€Å"severe or pervasive ridicule, unwelcome intimidation or insult based on sex† (p 21) 2. Explain how sexual harassment differs from gender discrimination.   Gender discrimination is mainly based on an individual’s gender in a sub group of female or male. It is different from sexual harassment for want of sexual