Friday, December 27, 2019

Man s Inhumanity Of Man - 2301 Words

Humans face good and evil on a daily basis but cannot conclude who belongs to each category unless we observe an action to judge them off of. The dictionary definition for inhumanity means â€Å"extremely cruel or brutal behavior† (â€Å"inhumanity† Oxford Dictionary). While humanity means â€Å"the human race; humans being collectively† (â€Å"humanity† Oxford Dictionary). In the world we live in today, the rightful thing to do is to be humane to one another. As we all know, one of the most inhumane events in history was the Holocaust. Close to six million Jewish men and women lost their lives because of the German Nazi regime. Many innocent lives were lost including one and a half million children. Throughout the film, man’s inhumanity to man is shown†¦show more content†¦The black and white enforces the man’s inhumanity to another man because if the film were in color, the message of brutality would not be as effective. Shortly af ter the candlelight scene, the movie portrays a part where all the Jews are demanded to register their families and relocate to another city, also known as Krakow. To force someone out of one’s home is not only cruel but an act of injustice. The Nazi soldiers forced the families to gather their valuables, clothes, photographs, and anything else they wished to bring. Unfortunately, the Jews were deceived because their belongings did not make it to their new located city. Sadly, all of the Jews belongings were taken out of the bags and burned. All the valuables were kept by the Nazi regime and the Jews had no say in this horrific act. Another scene that shows the concept of man’s inhumanity to man is when a group of Nazi soldiers had one Jewish man surrounded. The poor Jewish man was tossed around and made fun of. The worst part about this scene was that the Nazi soldiers even cut off the Jewish man’s payot. A payot was the side curls that most young men and boys kept. It signified their culture and was followed in the Orthodox Jewish community. If a poor Jewish man was keeping his payot to show pride for his religion, it is no man’s right cut the payot and insult him in that manner. After this malice act by the Nazi men, the Jewish man had no say in it, but had to stand there in

Wednesday, December 18, 2019

Julius Caesars Responsibility for His Own Death in...

Julius Caesars Responsibility for His Own Death in William Shakespeares Play William Shakespeares Julius Caesar is a tale of a very ambitious roman who is betrayed by his nearest and dearest, not to mention most trusted, friends. Caesar, a famous military general had great hopes of one day becoming sole ruler of Rome,- but was prevented from doing so by his own death . Caesar was a great man,- brave and noble,- having all the virtues of a hero,- but most terrible in his ambitiousness. Ultimately,- it is his great ambition that leads to his downfall. Caesars death was a most tragic event indeed, for he would have made a great roman monarch. However, there were many unheeded warnings and†¦show more content†¦Calpurnia feels sure that these astonishing but bizarre events are all warnings or omens of some kind. She fears that her husband is in great danger and begs him to stay home that day,- but Caesar pays no heed to her pleas. He feels that these warnings are not directed at him specifically. =========================================================== =========== A servant informs them that a calf, which had been cut open for a sacrifice, was found to have no heart. This worries Calpurnia even more, but Caesar, so foolish in his arrogance, claims to be unafraid. He says that he is not afraid because he is not a coward,- he feels that if he were to stay at home in fear of these things, he would be a beast without a heart. He says that he is not afraid of danger because he is brave and courageous, and claims to be more terrible and powerful than danger itself. In this way, Caesar lets his common sense be consumed by his arrogance and overconfidence. ======================================================================= Calpurnia has a strange vision or nightmare in which she sees the statue of Caesar spout blood like a fountain, around which many smiling lusty Romans crowded to bathe their hands in his blood. This convinced Calpurnia further of the danger Caesar was in and she pleaded with him to stay at home. At first Caesar agrees,- but then DeciusShow MoreRelatedEssay on Power of Jealousy in William Shakespeare’s Julius Caesar963 Words   |  4 PagesPower of Jealousy in William Shakespeare’s Julius Caesar Brutus, the noblest Roman of them all (Julius Caesar,5.5.68) is the only innocent conspirator, according to Marcus Antonius. This tragedy presents the epitome of jealousy, along with envy, greed, and avarice. It is a true story based on Plutarchs Life of Julius Caesar. Several of the major players are struck by jealousy and greed -- certainly Cassius, who begins this evil conspiracy to assassinate Caesar out of personal jealousyRead More A Comparison of the Character of Brutus in Julius Caesar and Hamlet in Hamlet2791 Words   |  12 PagesThe Characters of   Brutus and Hamlet in Hamlet and Julius Caesar  Ã‚        Ã‚  Ã‚  Ã‚  Ã‚   Written one year apart from the other, one cannot fail to recognize the parallels between William Shakespeares tragedies Julius Caesar and Hamlet. To begin, they are both stories of assassinations gone horribly wrong. Although the details of the plays are different, the two assassins (Brutus and Hamlet) provide interesting comparison. Through these two killers, Shakespeare reveals the different levels of justice; one’sRead MoreThe Story of Julius Caesar1213 Words   |  5 PagesWilliam Shakespeares epic and tragic telling of the story of Julius Caesar, provides an interesting and helpful way of examining history in a dramatic context. The concept of violence is evident throughout the entire play. The interpretative quality of violence, and the relative effectiveness of its usage, provides a useful lens for understanding this work. For this essay, I intend to examine the three characters of Brutus, Cassius and Marc Anthony using this particular focus. I wi ll demonstrateRead MoreA Raisin in the Sun vs. Julius Caesar2295 Words   |  10 PagesDrama In William Shakespeare’s Julius Caesar and Lorraine Hansberry’s A Raisin in the Sun themes, symbols, and characters can be compared. Both A Raisin in the Sun and Julius Caesar were written for the stage; therefore their characters become more obvious and more thoroughly portrayed than in a book, for example. Even though, these works were written by far different authors and in different centuries their similarities and differences are evident. In both A Raisin in the Sun and Julius Caesar themesRead More Analysis of Shakespeares Antony and Cleopatra Essay5083 Words   |  21 PagesAnalysis of Shakespeares Antony and Cleopatra The most influential writer in all of English literature, William Shakespeare was born in 1564 to a successful middle-class glove maker in Stratford-upon-Avon, England. Shakespeare attended grammar school, but his formal education proceeded no further. In 1582 he married an older woman, Anne Hathaway, and had three children with her. Around 1590 he left his family behind and traveled to London to work as an actor and playwright. Public and criticalRead More Female Power, Maternity and Genderbending in Shakespeares Antony and Cleopatra3164 Words   |  13 PagesFemale Power, Maternity and Genderbending in Shakespeares Antony and Cleopatra The 19th century essayist and literary critic William Hazlitt wrote of Cleopatra, She is voluptuous, ostentatious, conscious, boastful of her charms, haughty, tyrannical, [and] fickle, which are great and unpardonable faults (Hazlitt 2-3). Much of the criticism of Antony and Cleopatra has recycled this judgement, depicting Cleopatra as a villainess uses her eroticism and sexuality to motivate Antony toRead MoreComparing the Dramatic Presentation of Act 3 Scene 2 in the 1953 Film Version with Shakespeares Text2357 Words   |  10 PagesAct 3 Scene 2 in the 1953 Film Version with Shakespeares Text Julius Caesar was written in 1599 by William Shakespeare (1564-1616). The play is both a history and tragedy. It was based on Sir Thomas Norths translation of Plutarchs lives. Julius Caesar has the tell-tale features of a history and tragedy, such as it being very much based on one leader figure (Julius Caesar) and having rousing speeches, similar to Shakespeares Henry V (St. Crsipins Day speech). ItRead MoreThe Manipulation of the Roman Masses by the Roman Politicians During 100 Bc to 44 Bc4472 Words   |  18 Pagesrights, including the right to vote. Thus, even if Rome had elections, was it a democracy? During Caesar’s time of reign (100 BC to 44 BC), this was how the government and the Roman society behaved. In William Shakespeare’s Julius Caesar, the similar intense affect or the change on the ordinary citizens can be witnessed due to the manipulation of these citizens by the upper class citizens such as Julius Caesar, Marcus Brutus, Cassius, and Marc Antony. The Roman emperors, patricians and the equestriansRead MoreWilliam Shakespeare s Julius Caesar Essay2387 Words   |  10 Pagesconstant wooing. In William Shakespeare’s Julius Caesar, the battle for power is always in a state of flux, constantly changing hands. Though the players in this play sometimes use physical force to obtain power, it is persuasion and manipulatio n that have the strong hold on her. Through close examination of this text, the use of persuasion and manipulation in obtaining and maintaining power will be explored. When the play first opens there is a celebration in the streets because Julius Caesar has proven

Tuesday, December 10, 2019

Euthanasia Healthcare Sectors

Question: Discuss about the Euthanasiafor Healthcare Sectors. Answer: Euthanasia is mainly defined as the concept that includes the killing of an individual in order to relive her from the pain or the chronic illness from which the patient is suffering. This concept is not accepted by a large number of nations but there are some other nations like Netherlands, Belgium and others who have legalized it. In most of the nation, where Euthanasia is not legalized, there have been evidences that most of the healthcare professionals face ethical dilemma when cases of euthanasia arises in their practice. The statement provided by the author should be supported by the government and hence the healthcare sectors. The life of an individual depends entirely upon the persons own rights and therefore he holds the extreme position of himself to decide what he wants to do with his life. Medical science and its advancements in the field of healthcare often holds their victory above the wishes of patients and cannot accept the fact that chronic disorder which has different alternative methods to be treated are rejected by novice patients who are unaware of the inventions (Gammondi et al., 2014). They believe that the concept of euthanasia is undermining their success or they believe that the patients are not being able to emphasize the vastness and the strength of medical science. However, present medical science is not considering the very basis of healthcare service which is providing a quality life to patient and achieves patient satisfaction. The primary aim of healthcare professional is t o satisfy the patient needs and provide care to her in a way that would benefit her and make her life beautiful. Maintaining the autonomy and dignity of the patient is an important principle that needs to be followed by every healthcare professional (Subba et al., 2016). It is extremely important for the healthcare staff to respect the patient and fulfill his wishes and demands. A person who had reached a stage of life where he is unable to take the pain of a long term disease and is unable to maintain an independent better quality life should be given enough chance to decide on behalf of himself what he wants to do with his life. This comes within the fundamental rights of a citizen to decide about his own life that does not involve any harm to anyone elses right. Therefore it often becomes a difficult decision for the healthcare staff as codes of ethics and codes of professional conduct published by the Nursing and Midwifery Board of Australia suggest the importance of ethics in m aintaining dignity and autonomy of a person (Murphy, 2016). On the other hand, acceptance of euthanasia may lead the healthcare professional into legal complication as euthanasia is not legalized by Australia. The theory of deontology that revolves around providing patients the best care to make them relive from pain and develop the quality of life cannot always be accepted. A patient suffering terribly with a disease often loses expectation from life, loses individuality, and lives on assistance of others, unable to move freely and others (Gammondi et al., 2014). Autonomy of a person involves his right to choose his interventions and his right to choose a good death. Often in most of cases, it has been noted end of life care or palliative care fails revive back better quality life of the patients and as a result depression, loneliness and feeling of hopelessness engulfs (Parmar, Rathod Parikh, 2016). Besides, often aggressive medical care and even palliative care results in huge loss of resources which do not guarantee better quality life. Therefore, supporting an individuals wishes in her healthcare should be the primary aim of a healthcare staff. Overcoming a persons dignity and autonomy to save a patients life with care that is not wanted, will in turn be not fruitful. A care where patients satisfaction is not met should be considered unethical and will be rejected. Hence legalization of euthanasia should be accepted. References: Gamondi, C., Borasio, G. D., Limoni, C., Preston, N., Payne, S. (2014). Legalisation of assisted suicide: a safeguard to euthanasia.Lancet,384(127), 61154-5. Murphy, S. T. (2016). Supreme Court of Canada Orders Legalization of Physician Assisted Suicide and Euthanasia Carter v. Canada (Attorney General) 2015 SCC 5. Parmar, P., Rathod, S., Parikh, A. (2016). Perceptions of patients towards euthanasiaA medico-legal perspective.Age (Years),20(12), 21-30. Subba, S. H., Khullar, V., Latafat, Y., Chawla, K., Nirmal, A., Chaudhary, T. (2016). Doctors Attitude Towards Euthanasia: A Cross-sectional Study.Journal of The Association of Physicians of India,64, 44.

Tuesday, December 3, 2019

Under Milk Wood by Dylan Thomas Essay Example For Students

Under Milk Wood by Dylan Thomas Essay Dylan Thomas further explores the depiction of society in the people of Llareggub through Captain Cat, the very controversial central character of Under Milk Wood. Cats can allegedly see in the dark and thus Captain Cat, though blind, serves (along with the First Voice and Second Voice) as a narrator whereby the audience, too, is able to see a different world as Captain Cat sees it. Captain Cat is an elderly sea captain who towards the end of the play confesses that he has never, in fact, been a sailor: Ill tell you no lies. /The only sea I saw/Was the seesaw sea/With you riding on it. We will write a custom essay on Under Milk Wood by Dylan Thomas specifically for you for only $16.38 $13.9/page Order now (p. 16) This extremely unexpected admission, although it comes as a surprise to the audience, is not an exceptionally shocking or appalling one. The audience does, of course, feel pity towards Captain Cat. However, we may also feel compassion towards the character and identify with his situation. This is because many of us have probably already lied about some part of our lives or ourselves and perhaps even, as a result of keeping that lie over a longer period of time, after a while been unable to separate the truth from the untruth, thus perhaps believing the lie to be real. Therefore, Dylan Thomas may be condemning this very human part of us, as the memory of what is true appears in Under Milk Wood to destroy Captain Cat. In the midst of gossip, Fourth Woman, a relatively unimportant character with few lines states: Theres a nasty lot live here when you come to think. (p. 11) Although this line is delivered in a sort of offhand way, the meaning of the line itself may reveal much about the implication of Under Milk Wood and Dylan Thomas intentionsi. One may be of the opinion that by this line Dylan Thomas meant to make the audience consider the storys various characters and their flaws. After all, despite their sins, Thomas characters are evidently quite alike (in at least some way) to most individuals of the audience. Although Thomas is, therefore, critical of our faults, he does not wish to attack them. Thomas appears to be of the opinion that one should be forgiven for ones faults and thus accepted and loved for them, as is the case with Polly Garter, whom we find ourselves considering with a degree of pity, tenderness and affection. In conclusion, the play Under Milk Wood may, indeed, be considered an indictment of society. However, one must consider that, although Dylan Thomas criticizes his characters throughout, the play as a whole recognizes that it is important to forgive one of ones flaws. The audience may therefore be inclined to believe that Under Milk Wood is simply a depiction of reality and thus displays the flaws and wonders of Llareggubs townspeople; both of which are celebrated by the play overall. Word Count: 1,129 Bibliography Footnotes: i a concept further explored Jonathen Hamels and Danny O Snows commentary of Under Milk Wood on www. arch. org/milkwood. htm Books: Thomas, Dylan (1991) Under Milk Wood, J. M. Dent Sons Ltd Websites: http://www. arch. org/milkwood. htm 25/10/2003 Â  http://jade. ccccd. edu/grooms/geirn1/htm 25/10/2003 Samantha Sutherland Under Milk Wood Dylan Thomas A1 English HL.

Wednesday, November 27, 2019

The History of Pi Essay Example

The History of Pi Essay Example The History of Pi Essay The History of Pi Essay Before I talk about the history of Pi I want to explain what Pi is. Websters Collegiate Dictionary defines Pi as 1: the 16th letter of the Greek alphabet 2 a: the symbol pi denoting the ratio of the circumference of a circle to its diameter b: the ratio itself: a transcendental number having a value to eight decimal places of 3. 14159265 A number can be placed into several categories based on its properties. Is it prime or composite? Is it imaginary or real? Is it transcendental or algebraic? These questions help define a numbers behavior in different situations. In order to understand where Pi fits in to the world of mathematics, one must understand several of its properties pi is irrational and pi is transcendental. A rational number is one that can be expressed as the fraction of two integers. Rational numbers converted into decimal notation always repeat themselves somewhere in their digits. For example, 3 is a rational number as it can be written as 3/1 and in decimal notation it is expressed with an infinite amount of zeros to the right of the decimal point. 1/7 is also a rational number. Its decimal notation is 0. 142857142857†¦, a repetition of six digits. However, the square root of 2 cannot be written as the fraction of two integers and is therefore irrational. For many centuries prior to the actual proof, mathematicians had thought that pi was an irrational number. The first attempt at a proof was by Johaan Heinrich Lambert in 1761. Through a complex method he proved that if x is rational, tan(x) must be irrational. It follows that if tan(x) is rational, x must be irrational. Since tan(pi/4)=1, pi/4 must be irrational; therefore, pi must be irrational. Many people saw Lamberts proof as too simplified an answer for such a complex and long-lived problem. In 1794, however, A. M. Legendre found another proof which backed Lambert up. This new proof also went as far as to prove that Pi^2 was also irrational. In the long history of the number Pi, there have been many twists and turns, many inconsistencies that reflect the condition of the human race as a whole. Through each major period of world history and in each regional area, the state of intellectual thought, the state of mathematics, and hence the state of Pi, has been dictated by the same socio-economic and geographic forces as every other aspect of civilization. The following is a brief history, organized by period and region, of the development of our understanding of the number Pi. A transcendental number is one that cannot be expressed as a solution of ax^n+bx^(n-1)+ +cx^0=0 where all coefficients are integers and n is finite. For example, x=sqrt(2), which is irrational, can be expressed as x^2-2=0. This shows that the square root of 2 is nontranscendental, or algebraic. It is very easy to prove that a number is not transcendental, but it is extremely difficult to prove that it is transcendental. This feat was finally accomplished for Pi by Ferdinand von Lindemann in 1882. He based his proof on the works of two other mathematicians: Charles Hermite and Euler. In 1873, Hermite proved that the constant e was transcendental. Combining this with Eulers famous equation e^(i*Pi)+1=0, Lindemann proved that since e^x+1=0, x is required to be transcendental. Since it was accepted that i was algebraic, Pi had to be transcendental in order to make i*Pi transcendental. Now that I have explained what Pi is and several of its properties, lets look at its history. In ancient times, Pi was discovered independently by the first civilizations to begin agriculture. Their new sedentary life style first freed up time for mathematical pondering, and the need for permanent shelter necessitated the development of basic engineering skills, which in many instances required a knowledge of the relationship between the square and the circle (usually satisfied by finding a reasonable approximation of Pi). Although there are no surviving records of individual mathematicians from this period, historians today know the values used by some ancient cultures. Here is a sampling of some cultures and the values that they used: Babylonians 3 1/8, Egyptians (16/9)^2, Chinese 3, Hebrews 3 (implied in the Bible, I Kings vii, 23). The first record of an individual mathematician taking on the problem of Pi (often called squaring the circle, and involving the search for a way to cleanly relate either the area or the circumference of a circle to that of a square) occurred in ancient Greece in the 400s B. C. (this attempt was made by Anaxagoras). Based on this fact, it is not surprising that the Greek culture was the first to truly delve into the possibilities of abstract mathematics. The part of the Greek culture centered in Athens made great leaps in the area of geometry, the first branch of mathematics to be thoroughly explored. Antiphon, an Athenian philosopher, first stated the principle of exhaustion (click on Antiphon for more info). Hippias of Elis created a curve called the quadratrix, which actually allowed the theoretical squaring of the circle, though it was not practical. In the late Greek period (300s-200s B. C. ), after Alexander the Great had spread Greek culture from the western borders of India to the Nile Valley of Egypt, Alexandria, Egypt became the intellectual center of the world. Among the many scholars who worked at the University there, by far the most influential to the history of Pi was Euclid. Through the publishing of Elements, he provided countless future mathematicians with the tools with which to attack the Pi problem. The other great thinker of this time, Archimedes, studied in Alexandria but lived his life on the island of Sicily. It was Archimedes who approximated his value of Pi to about 22/7, which is still a common value today. Archimedes was killed in 212 B. C. in the Roman conquest of Syracuse. In the years after his death, the Roman Empire gradually gained control of the known world. Despite their other achievements, the Romans are not known for their mathematical achievements. The dark period after the fall of Rome was even worse for Pi. Little new was discovered about Pi until well into the decline of the Middle Ages, more than a thousand years after Archimedes death.

Saturday, November 23, 2019

St. Lawrence University Admissions and Acceptance Rate

St. Lawrence University Admissions and Acceptance Rate St. Lawrence University in Canton, New York is a somewhat selective school. Less than half of applicants are accepted each year. Students with strong grades and an impressive application, however, have a decent chance of being admitted. Applicants are not required to submit SAT or ACT scores. They will need to send in high school transcripts, a personal essay, and several letters of recommendation. For help with the application process, feel free to contact the admissions office at St. Lawrence. Calculate your chances of getting in with this free tool from Cappex. Admissions Data (2016) St. Lawrence University Acceptance Rate: 43  percentSt. Lawrence University is test-optionalGPA, SAT and ACT graph for St. LawrenceWhat these SAT numbers meanWhat these ACT numbers mean St. Lawrence University Description St. Lawrence University can boast that it has been coeducational with a progressive teaching philosophy since its founding in 1856. The schools name comes from the nearby St. Lawrence river, the site of both crew practice and academic research. The university is located in Canton, New York, a town not far from Potsdam. Explore the campus with the  St. Lawrence University Photo Tour. The university has a graduate program in education, but SLUs primary focus is at the undergraduate level. With an 12 to 1  student/faculty ratio, students are sure to get a lot of interaction with the faculty. Study abroad, community service, and sustainability are all important parts of St. Lawrences identity, and starting in the fall of 2012, some first-year students got the opportunity to spend their first college semester in London, and the university has had a second-semester program in France for several years. On the athletic front, the St. Lawrence Saints compete in the NCAA Division III Liberty League for most sports. The university has 32 intercollegiate teams and made my list of  top equestrian colleges. Enrollment (2016) Total Enrollment: 2,464  (2,377 undergraduates)Gender Breakdown: 45 percent male; 55 percent female99 percent full-time Costs (2016-17) Tuition and Fees: $51,200Books: $750 (why so much?)Room and Board: $13,190Other Expenses: $900Total Cost: $66,040 St. Lawrence University Financial Aid (2015 -16) Percentage of New Students Receiving Aid: 100  percentPercentage of New Students Receiving Types of AidGrants: 100 percentLoans: 55 percentAverage Amount of AidGrants: $32,191Loans: $7,775 Academic Programs Most Popular Majors:  Art, Biology, Economics, English, Fine Arts, History, Mathematics, Political Science, Psychology, Social Science, Sociology What major is right for you?  Sign up to take the free My Careers and Majors Quiz at Cappex. Graduation and Retention Rates First Year Student Retention (full-time students): 90  percentTransfer-out Rate: 13 percent4-Year Graduation Rate: 81  percent6-Year Graduation Rate: 84  percent Intercollegiate Athletic Programs Mens Sports:  Skiing, Football, Golf, Ice Hockey, Riding, Rowing, Lacrosse, Basketball, Baseball, Cross CountryWomens Sports:  Skiing, Riding, Soccer, Softball, Basketball, Field Hockey, Ice Hockey, Cross Country If You Like St. Lawrence University, You May Also Like These Schools Ithaca College: Profile | GPA-SAT-ACT GraphUniversity of Vermont: Profile | GPA-SAT-ACT GraphSkidmore College: Profile | GPA-SAT-ACT GraphSyracuse University: Profile | GPA-SAT-ACT GraphTrinity College: Profile | GPA-SAT-ACT GraphUniversity of Rochester: Profile | GPA-SAT-ACT GraphAlfred University: Profile | GPA-SAT-ACT GraphBoston University: Profile | GPA-SAT-ACT GraphCornell University: Profile | GPA-SAT-ACT GraphBowdoin College: Profile | GPA-SAT-ACT GraphBates College: Profile | GPA-SAT-ACT GraphHobart William Smith Colleges: Profile | GPA-SAT-ACT Graph Data Source: National Center for Educational Statistics

Thursday, November 21, 2019

Factionalism in American Politics Essay Example | Topics and Well Written Essays - 500 words

Factionalism in American Politics - Essay Example Madison underscores the importance of breaking or controlling the factions and the ‘factious spirit’ that make public administration a complex affair. Factions exist in the American politics and continue to pose a problem especially in the development of public policies. The factions are mainly caused by the inequality that exists in the distribution of wealth and property.   The passing of The Healthcare Reform Bill brought to the fore the various factions at the various stages of the passing of the bill. The healthcare bill while designed for the benefit of the majority of the Americans faced major hurdles during the legislative process. The factions that opposed the bills include those who were opposed to the Stupak-Pitts Amendment provision in the bill. The pro-choice faction in the house argued that the Stupak-Pitts Amendment imposes restrictions on the right of women to access reproductive health services. Women should be guaranteed these rights by law. The other faction in the healthcare debate is those that were in support of the Stupak-Pitts Amendment. This faction argues that abortion should be restricted, and proposes a further restriction on funding on abortion. In the process of enacting the legislation there was a faction that was against the passing of the healthcare reform bill as they had some concerns about impact that the bill will have on the illegal immigrants’ attempts to access healthcare services (‘Obama Hails Vote on Health Care as Answering ‘the Call of History’).The factions that were at play in the development of the healthcare reform bills have brought about a situation in which the proponents, as well as the opponents of healthcare reforms policies, give different explanations to their positions on healthcare reform.

Wednesday, November 20, 2019

Abuse of the Elderly Research Paper Example | Topics and Well Written Essays - 1500 words

Abuse of the Elderly - Research Paper Example Abuse and neglect are too often visited upon older individuals who have lost some degree of their independence, and many areas do not have the programs necessary to effectively counter this threat on the community level. There is even abuse and neglect that goes on with healthcare facilities, nursing homes, and home environments, and this is perhaps the most insidious sort of abuse. In some cultures, the elderly are prized and honored above all other citizens and groups, but unfortunately this is not the case in the present culture. Elder abuse can happen in healthcare or nursing home situations, or it could happen at the hands of the elder’s own family and support system. In the US today, older individuals are more likely to be seen as being in the way of the young than as role models who should be exalted because of their aged wisdom. Presently, however, many individuals are treated harshly by healthcare facilities and even their own kin, making elder abuse a significant pro blem in society. Also, in terms of economic scales, older individuals who are of a lower socio-economic class are more likely to be abused or mistreated. These people may lack a stable caregiver. There are those who say the aged should be used as models who should be exalted because of their aged wisdom. Presently, however, many individuals are treated harshly by healthcare facilities and even, as the proposed report will show, their own families and support systems, making elder abuse a significant problem in society.

Sunday, November 17, 2019

The film of Step Mom by Gigi Levangie Essay Example for Free

The film of Step Mom by Gigi Levangie Essay A Comparison between my improvisation of Generation gap by us and the film of Step Mom by Gigi Levangie The two pieces of improvisation are good for a comparison because our improvisation is about two single parents one who lives with their mother moving in and how the children react to each other. Step mom is however slightly different as it is about parents who have just got divorced and are introducing the fathers new girlfriend in to the childrens lifes too. So our play is about the reaction towards the children and the film is about the reaction between the step mom. It is also very good from comparison as the family with the Grandmother in Generation gap previous relationship ended by death and in Step mom it ends with a death by the mother of the children dying from cancer. They are similar, as they are both sets in present day and shows how people react when introducing new members in to their lives. They may react snappy or just miserable around them and whether it is possible for them to change their feelings as in step mom the girl Anna was snappy and miserable at different times but by the end of the play she was able to accept the step mom. In our improvisation the teenager had similar symptoms but in each others presence they just argued and the younger boy would just wind the older sister but was upset as the sister was able to be mean to. So in this play the relations seem to worsen between the characters and it even affected the way the parents felt towards each other to some aspects as there children are more important to them and are likely to take their childs side and end up arguing. This also happened in the movie, as the mother would get annoyed when the step mom arrived late or did things wrong as she hasnt as much experience as her in being a mother. They both showed signs that the children meant more to them as they stick up for their child always and end up in argument in our play In Step Mom The father talks to the children and says relationships can change. The way he acts around his girlfriend suggests that it would be hard to make a choice as he loves both his girlfriend and children but you see that he would probably put his children first but this isnt certain. But they could be equal you dont know whether he means this or whether hes mocking the child in saying its impossible to stop loving your child. This is similar in both plays showing children is most important in keeping familys together.

Friday, November 15, 2019

Sakis Stories and the Impression they Create about Adult-Child Relatio

Saki's Stories and the Impression they Create about Adult-Child Relationships In order to answer this question I am going to be focusing on three of Saki?s stories; the story-teller, the lumber room and the open window. Children at the time Hector Munro (Saki) was writing these stories would have had very vivid imagination; this is shown in Saki's story 'The Open Window' when the niece makes up the saga of Mr Sappleton's death, illustrates how imaginative children can be, and that adults are very easily fooled. Fooling adults is a key theme in Saki's stories; another time when it occurs is in the story 'The Lumber Room' when Nicholas dupes his aunt into believing that he is somehow trying to get into the gooseberry garden, but instead has no intention of doing so but does sn...

Tuesday, November 12, 2019

Between 1820 and 1860 there were a few fundamental differences between the economies of the North and South Essay

?Between 1820 and 1860 there were a few fundamental differences between the economies of the North and South. How far do you agree? Between 1820 and 1860 there were problems in America that resulted in the civil war in 1861, the economy affected the North and South during the civil war, and some major differences helped win the civil war. However this does not mean that the economy had many fundamental differences. For example the methods of earning money were different, but overall both earned roughly the same amount of money. Firstly, the main difference was that the North relied much more on money from industry and manufacturing, as they had more connections with foreign countries, and more factories were built. In the North in 1860 there were 74,000 factories producing two thirds, of goods for America. Whereas in the South there were only 2 major factors: Textiles factory in South Carolina and an Iron works in Virginia set up in 1840. Although they had fewer factories, the Iron works was vital, as it supplied the North with weaponry during the Civil war. In 1850 the South only produced 10% of the nations manufactured output. However the South did lack the industrialisation because their agricultural methods were so effective they had no need for change. The South was also very traditional and disliked change, whereas seven out of eight immigrants had chosen to settle in the North, and they had seen new ideas in other places in Europe so were welcome to change. This is shown by the South’s labour force being reduced from 82% to 81% over 60 years, on the other hand, the North’s labour force was reduced from 68% to 40% over the 60 years. This is however not a reflection on the North rapidly reducing agriculturally, because they still relied on agriculture, and a lot of the North was still rural. Around the urban areas, the population was increasing as towns and cities were developing swiftly. As the North had smaller but still prosperous farmers known as yeomen, they did not earn as much money through agriculture, because they did not have many or any slaves at all, so they could not produce the high quantities that the south did. Farmers that had lots of land were called plantation owners; there were many more plantations in the south, and when the cotton gin was created in 1793, there was a boom in cotton, and the benefit of having slaves increased. This made Southern plantation owners invest their capital in the Slaves, because they produced so much cotton, which was very lucrative. 55% of slaves worked in cotton which shows how much money was made out of it. The South needed to transport their goods to the North so that it could be transported abroad, but there was a lack of transport in South, as they only had 35% of the train tracks, which affected them in the Civil war. This meant it was fairly expensive to transport the cotton, but they still received a good amount of money if they lived near a train track. When the cotton arrived in the North the Lowell factory system meant the manufacturing of it was very cheap, which meant the North earnt a large margin on it. Although the danger of the South investing all their money in Slaves was that when slavery got banned, they lost a lot of money, which was partly why they were so keen to keep slavery. However only one quarter of the population owned a slave, as they were expensive (in 1860 they were $1800 which was double the price in 1820). The North’s economy was based on free labour whereas the South’s was based on slave labour, which meant that the North’s economy was more stimulated by the presence of workers with money who could buy products, which would make money for the company, which in turn would increase wages or hire more workers. The South’s economy was largely devoid of this benefit. Essentially, the economy in the South was weaker and only based on a few important exports (cotton, tobacco, and sugar). This made the South less diversified, as they focused their sales on cotton. Another difference is tariffs; in 1828 congress passes a controversial high protective tax. This majorly benefitted the North as they were the main distributors. However the South were very worried about this because they believed that if they stopped buying the expensive foreign goods, then foreign countries would stop buying their goods, as they would have tax on them too. This affected the economy until the tax was promised to be reduced after the law in 1833. In contrast the North and South didn’t have many fundamental differences. They both created a lot of money, and were not lacking at all, the only difference was the method in which was used to make the money. The economic diversification was similar too, as 10% of Northerners owned 68% of the wealth, and the wealth was dominated by the plantation owners, called oligarchies, as there were few free-soilers. 12% of the plantation owners owned half the slaves. This shows that there were few farmers, but the big plantations owned many slaves. Even though the North seems to be more industrial, the South also made efforts to modernise industrially, but they just lacked because of the closed opinions of the southerners. Also not many people in the North and the South owned slaves, it was more of a rare thing, and the main owners, owned a large amount of slaves. However there was a larger need for slaves in the South, because there was cheap labour force from Europe settling in the North which meant slaves were more expensive so were not deemed as important. Overall I think there were many differences between the North and South between 1820 and 1860. Some affected the outcome of the Civil war such as the transport boom, and the industrialisation in the North, but a fundamental point is that numerically they have equal amounts of income; there were just different methods to earning the money. However the differences were major; the amount of industrialisation, and amount of agriculture, the manufactured output, and the need for slaves, was all very different for the North and South. The main similarity was the economic diversification.

Sunday, November 10, 2019

Research Paper: Marjane Satrapi Essay

Beset with the unthinkable, the Islamic Revolution defines turbulent times for many Iranians (Tehran). Numerous females including Satrapi were robbed of their social rights due to westernizing and secular efforts (Tehran). In turn, the Islamic Revolution undermined the younger Satrapi’s ability to come to terms with her own identity; nevertheless, she now writes to share her experience with oppression and her later journey towards cultural integration. It is a historical dispute that woman did not have their share of say in the revolutionaries’ political agenda (Mouri). In the months following the Revolution, obligatory hijabs were decreed (Mouri). Girls of every age rank were forced to wear a veil. Several active Iranian female revolutionists discharged into the street protesting what soon became the law of the land. Their male comrades did not offer support believing that the time was not appropriate. Instead, they simply encouraged solidarity with the new government in order to display a united front before their international enemies (Kar). Consequently, wearing hijab became mandatory, and the lack of it was disciplinary (Kar). Satrapi was 10 at the time, experiencing her first instances of Iran’s social and political transformations. (Kutschera). The compulsory hijab eventually assumed a government-sponsored and aggressive position (Kar). Various female and liberal minded organizations were marginalized and strip ped of their supremacy. The regime suppressed these crowds through methods such as coercion, enticements, deportation, and brutal force. Years later, Satrapi was spared the oppression of an Islamic regime at the peak of its worst (Leith). Her lack of unwavering obedience and expressive nature would have caused her immense trouble with government. Thus, afraid she’d be a victim of the regime’s repression and prejudice, her parents sent her to Vienna (Kutschera). Unfortunately, she was challenged with preconceived notions held by Europeans (Leith). While attending a boarding school ran by nuns, Marjane was expelled for calling the chief mother a prostitute when she claimed that Iranians were â€Å"uneducated† (Hattenstone). Marjane’s life eventually plummeted leading her to homelessness, bronchitis, and drug abuse (Hattenstone). Defeated, she escaped the havoc by returning home, ultimately surrendering herself to the lifestyle she once rejected (Hattenstone). Unfortunately, the hijab and restricted style options weren’t Satrapi’s mere concern. Upon her arrival home, Satrapi dealt with more prejudice than she had originally anticipated. She was known as the Western Iranian, which made her cultural transition in Iran especially difficult. Her later diagnosis with depression fostered even more mayhem within her life resulting in suicidal attempts. Her early 20’s were indeed tempestuous times as she struggled to establish and integrate herself into foreign customs. The end of the Islamic Revolution didn’t necessarily mean that the essence of corruption and repression were eradicated. In fact, the bitterness lingered for another 30 years shaping a void for many Iranian women. The marriage age for females was lowered to nine, and they lacked the rights to obtain divorce. Meanwhile, their male counterparts were able to assume full custody of their children, obtain unilateral divorce, and have as many wives as they desired. In all, females received a lot of harsh treatment if they failed abide by the restrictive nature of Islamic rule. For a female foreigner like Satrapi, simply bearing a different style of clothing or thought was enough to galvanize unwanted attention. It was remarkably problematic having to assimilate into a culture she had to escape from in the first place. In the end, Satrapi realized that although Iran is her home, the social oppression outweighed that one factor. She eventually returned to Europe to pursue an art degree and take on the next chapter of her life, Persepolis. Persepolis was written in efforts to share her experience regarding the Islamic regime. It is often a misconception that Iranians were religious fanatics versus being traditional, and for that, Satrapi wrote to bring light and understanding into the situation. She wanted to clarify that what people saw in the news didn’t bear the whole picture. Her other renowned writing projects such as Chickens and Plums and Persepolis II also entail political elements along with personal experiences. It is ultimately her way of preserving an evolutionary truth that could have succumbed had she not taken the time to share. Consequently, Satrapi’s story is now one of the most popular books known for embodying a realistic coming of age story during the Islamic Revolution. She undertakes a realistic portrayal of how private life and public life can be drastically assailed by political upheaval.

Friday, November 8, 2019

Nmap Essay Example

Nmap Essay Example Nmap Paper Nmap Paper Title:- Network Scanning using NMAP in Windows Exp. No:-1 Aim:- To study NMAP Software and demonstrate using various websites. Theory:- Nmap (â€Å"Network Mapper†) is an open source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. While Nmap is commonly used for security audits, many systems and network administrators find it useful for routine tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. The output from Nmap is a list of scanned targets, with supplemental information on each depending on the options used. Key among that information is the â€Å"interesting ports table†. That table lists the port number and protocol, service name, and state. The state is either open, filtered, closed, or unfiltered. Open means that an application on the target machine is listening for connections/packets on that port. Filtered means that a firewall, filter, or other network obstacle is blocking the port so that Nmap cannot tell whether it is open or closed. Closed ports have no application listening on them, though they could open up at any time. Ports are classified as unfiltered when they are responsive to Nmaps probes, but Nmap cannot determine whether they are open or closed. Nmap reports the state combinations open|filtered and closed|filtered when it cannot determine which of the two states describe a port. The port table may also include software version details when version detection has been requested. When an IP protocol scan is requested (-sO), Nmap provides information on supported IP protocols rather than listening ports. The topology view uses many symbols and color conventions. This section explains what they mean. | | | | | | Each regular host in the network is represented by a little circle. The color and size of the circle is determined by the number of open ports on the host. The more open ports, the larger the circle. A white circle represents an intermediate host in a network path that was not port scanned. If a host has fewer than three open ports, it will be green; between three and six open ports, yellow; more than six open ports, red. | | | | | If a host is a router, switch, or wireless access point, it is drawn with a square rather than a circle. | | Network distance is shown as concentric gray rings. Each additional ring signifies one more network hop from the center host. | | Connections between hosts are shown with colored lines. Primary traceroute connections are shown with blue lines. Alternate paths (paths between two hosts where a different path already exists) are drawn in orange. Which path is primary and which paths are alternates is arbitrary and controlled by the order in which paths were recorded. The thickness of a line is proportional to its round of NMAP software using wikipedia website Topology of Wikipedia website. Conclusion:- Hence we have studied NMAP Software with various websites.

Tuesday, November 5, 2019

Twitter and the hardships of life

Twitter and the hardships of life The development of technology has drastically changed the world. As people are unable to calculate the rates of progress, it is impossible to determine what changes will be brought about with an even greater increase in technological advancements. The use of social networks has added to the hardships of life, as people endanger their personalities and reputations by their postings to the public. Twitter shows that sometimes, people make mistakes in their messages and are unable to control the outcome.Advertising We will write a custom essay sample on Twitter and the hardships of life specifically for you for only $16.05 $11/page Learn More The biggest question is that sometimes the problems overtake the benefits of technology. This closely relates to the social media and all the resulting problems. Primarily, there is the safety concern, as the information used in the social networks can be used by the advertisement websites. Even though there are safeguards that try to prevent personal information from being shared with other institutions and sites, there are still some was that information gets out. â€Å"Twitter† has been one of the sited networks that is widely used by people. People add their posts as soon as they can. Another issue is that people who share information online cannot really control who can access their web page and browse their personal information. Many have compromised themselves in the workplace and home. This leads to many concerns, but people are still not aware of the security issues. The unfortunate part is that people do not pay attention to the growing problem and continue using the social networks. It has become so popular that individuals feel to be required to upgrade their social status and produce information that can be acknowledged by others. An aticle titled â€Å"How To: Recover from a Social Media PR Disaster† talks about people worrying about theit status and posts they have made. One of the poits made is that â€Å"Its hard to tell the whole story in a post and its hard to talk to your entire audience in just one tweet† (Sniderman, 2011). This is very true, as people are unable to respond properly to posts and might not get the whole picture. Very often, people will succumb to the pressure and join the majority, as no one wants to be outside the circle and be seen as an outsider. This will result in unwanted comments. Even though there are several layers of security and people are warned about the harms of personal information leaking, organizations are the ones that are using the private information to own advantage.Advertising Looking for essay on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More The development of social networks and the use of internet have made communication between people a form of social status. People focus on the way their â€Å"Twitter† page looks , they pay great attention to the amount of pictures they post, number of responses that they receive to certain posts and comments about their status. The need to go out and do things became not needed. The interaction between people has come down to words on web pages and comments in relation to behavior of others. It is also cheaper and more practical to live in the word of computers, where there is no need to go out, spend money in bars, different attractions and games that involve physical participation of the person and others. Also, it is very time consuming, so people simply have no time to go out and enjoy nature and the company of others. The constant checking for the replies and posts of others, especially if there is an extreme amount of friends, takes up a lot of time. Very often people add individuals to the category of â€Å"friends† through other people. They do not really know the person or are familiar with their individual personality. The only way they â⠂¬Å"know† them, is by pictures on their page and comments on their â€Å"wall†. The social networks have put a major dent into the society. The private information and the communication itself has become a public occurrence where people put their lives out on the public viewing without any concern for security or privacy. Even though technology has helped people in a lot of ways, a person must realize its drawbacks and balance the use of technology with the physical interaction with others. The balance must be kept for technology to be helpful instead of detrimental. It is important to keep in mind that technology is not always error proof, thus reliability is a relative concept. There are many examples that show how technology has proven to be a negative influence on society, but people still continue its use. A major concern can be observed through the posts and the type pf shared information. This might endanger the security of the personal information and is one of the most important things that a person has. People must become aware of the growing problem and use as much care as possible to protect their well being and individuality. A person’s reputation is very hard to deserve but is rather easy to mar by a simple comment on the â€Å"wall†. Reference Sniderman, Z. (2011). How To: Recover from a Social Media PR Disaster.Advertising We will write a custom essay sample on Twitter and the hardships of life specifically for you for only $16.05 $11/page Learn More

Sunday, November 3, 2019

Judicial review Essay Example | Topics and Well Written Essays - 1500 words - 1

Judicial review - Essay Example In England and Wales the Civil Procedure Rules requires that any claim form in respect of an application for judicial review must be filed within three months from the time that the grounds to make the claim first arose1. Judicial review permits people with sufficient interest in a decision or action by a public body to seek judicial review in respect of the legality of an enactment or a decision and action or failure to act in relation to the exercise of a public function2. Judicial review can be resorted to whenever right of appeal is absent or if all avenues of appeal have been exhausted. In such cases the court may insist upon both the defendant and the claimant to provide evidence for the existence of alternative means of resolving their dispute and as such the court will view such litigation as a last resort and will not issue any premature claims. In Morbaine Limited v First Secretary of State3, the Secretary of State granted planning permission for a large mixed-use development. A petition was filed under the Town and Country Planning Act, in the court to quash that decision4. This means of challenge is available to any person who is aggrieved by such decisions. However Blackburne J dismissed the application holding that the petitioners had no grounds of challenge as it lacks sufficient standing for the purposes of section 288. This decision makes it amply clear that petitioner must have a real or genuine interest in obtaining the relief sought. In R v Enfield London Borough Council5, the council accorded permission for Grade II listed building to be used as offices and for the construction of a nursing home in the premises. The conservation advisory group consented to these proposals. The claimant contended that these decisions were invalid due to the bias inherent among the conservation advisory group members. Richards J accepted this and quashed the

Friday, November 1, 2019

Visa Inc Research Paper Example | Topics and Well Written Essays - 3750 words

Visa Inc - Research Paper Example Visa Inc. (2011) is a company that was founded from the simple idea of digital currency, but had managed to connect millions of businesses, consumers, financial institutions, and even governments to each other in the short while that it has been operating. It allows its customers, in over 200 countries (Visa Inc, 2011) and areas to replace their cash and check transactions to digital transactions. It has a separate network named VisaNet (Visa Inc, 2011) for financial institution clients. VisaNet is a central and modular payments network that offers three important services of â€Å"risk management services, information services and transaction processing services† (Visa Inc, 2011) all together in one package. Furthermore, VisaNet (Visa Inc, 2011) is constantly working on ways to improve their service, so that people can utilize the method of electronic payments for several more purposes and in more places, because of the network size and payment expertise. This enterprise also provides financial institutions with recognized payment products, which they use to provide â€Å"cash-access, prepaid, debit and credit programs to customers of all types† (Visa Inc, 2011), people as well as state owned and private businesses. This company is the owner of the Visa brand, with their customers crossing several millions and with 1.8 million ATMs distributed worldwide amongst several countries and regions (Visa Inc, 2011). This company remains a frontrunner amongst all electronic transaction companies since the start of its operations. It initialized with credit cards and moved on to offer mobile payments and neural networks, being one of the first companies worldwide to offer such services, thus always remaining updated and developed in an already rapidly changing industry. Considering the large contribution of Visa’s payment platforms to global commerce, its support to all its customers seems invaluable. Visa Inc. (2011) itself does not deal directly with customers in terms of issuing cards or

Wednesday, October 30, 2019

Tall tales Essay Example | Topics and Well Written Essays - 4000 words

Tall tales - Essay Example cted that there will be similar increase in the demands for the implementation of healthy and natural environment, that is based on green and healthy environment. To maintain equilibrium between the two dominant factors i.e. to mange the concentration of population, and at parallel to cater for their environmental needs the Japanese construction company Takenaka has evolved a design proposal for constructing Sky City 1000, ‘a super high-rise, huge multilevel city with a height of a kilometer’. The design concept of Sky City 1000was introduced in 1989, and the concept has gained worldwide popularity, and many urban developers and planners are looking forward towards the success of the plan, ‘lot of expectations are around, planners are highly optimistic about the success’. As the 21st century is in progress, there are increasing expectations for the implementation and execution of the plan. Sky City 1000 is based on total floor area of 2000 acres, and has an elevation of 1,000 meters, the structure of the Sky City 1000 comprises of 14 concave dish-shaped, aerial bases called Space Plateaus piled one upon the other, and viewed as perfect super high-rise city. The structure has been conceptualized to adjust and support residences, offices, commercial facilities, schools, theaters. The tower has the capacity to offer accommodation to 35000 people, and more than hundred thousand people as employees will perform their respective task. Different systems have been employed by the construction authority to ensure the safety and protection of the city, and in this regard latest security focused technologies have been used to maintain the comfortable state of the city, and offer maximum possible cover to residents. The technology employed by Takenaka has attracted many investors and commercial giants. The concept of Sky City 1000 was launched by Takenaka with the cooperation of Shizuo Harada of ESCO Co Ltd. The Sky City 100 is innovative and modernized version of

Monday, October 28, 2019

Coffea arabica Essay Example for Free

Coffea arabica Essay I. A. About the Industry Coffee is a brewed beverage with a distinct aroma and flavor, prepared from the roasted seeds of the Coffea plant. A coffee plant is usually a bush or small tree that grows to 10-12 feet (although it can grow up to 32 feet) and can produce coffee beans for decades. It can live for between 60 and 70 years. It can take up to four years for a coffee tree to reach maturity and bear fruit. The English word coffee originates from the Arabic word ‘kaweh’ meaning strength or vigor. The seeds are found in coffee cherries, which grow on trees cultivated in over 70 countries, primarily in equatorial Latin America, Southeast Asia, South Asia and Africa. Green (unroasted) coffee is one of the most traded agricultural commodities in the world. Coffee is slightly acidic (pH 5. 0–5. 1) and can have a stimulating effect on humans because of its caffeine content. Commercial coffee is grown in an area between the Tropics of Cancer and Capricorn affectionately known as the â€Å"bean belt†. In order for the coffee plant to thrive, it needs moderate sunshine and rain, porous soil and constant temperatures between 65 and 75? F. Before the coffee bean can be used to make coffee, it has to be roasted. The roasting process changes the color of the green coffee beans. First they turn yellow and then brown. The longer they roast the darker they become. The strongest roasts result in black beans. At the same time, the heat causes changes in the taste and smell of the beans. Aromatic oils are released that bring out the flavor of coffee. In the nineteenth century, people roasted their coffee at home on their stoves or over open fires. Nowadays, the commercial coffee roasters use enormous ovens to roast the coffee. Temperature and time are carefully controlled, sometimes by computers, because just a few seconds can dramatically change the final flavor of the coffee. The roasting can be done in just a minute. In general, a light roast gives a mild taste, a medium roast produces a well–rounded, rich flavor and aroma and a high roast gives a strong, distinctive flavor. Coffee is one of the most consumed drinks after water. Coffee is one of the most traded commodities in the world after oil. Over 1400 million cups of coffee are drunk around the world each day. The majority of coffee is consumed at breakfast. Coffee berries, which contain the coffee seeds, are produced by several species of small evergreen bush of the genus Coffea. The two most commonly grown are also the most highly regarded Coffea arabica, and the robusta form of the hardier Coffea canephora. The latter is resistant to the devastating coffee leaf rust (Hemileia vastatrix). Once ripe, coffee berries are picked, processed, and dried. The seeds are then roasted to varying degrees, depending on the desired flavor, before being ground and brewed to create coffee. Coffee can be prepared and presented in a variety of ways. An important export commodity, coffee was the top agricultural export for twelve countries in 2004, and it was the worlds seventh-largest legal agricultural export by value in 2005. Some controversy is associated with coffee cultivation and its impact on the environment. Consequently, organic coffee is an expanding market. The top 10 coffee-producing countries are: Brazil, Ethiopia, Colombia, India, Indonesia, Guatemala , Vietnam, Cote d’Ivoire, Mexico and Uganda. The emotional and physical benefits of coffee are numerous. Not only does coffee taste good, it can stimulate, relax and refresh the body. Coffee stimulates the senses through its caffeine content which stimulates metabolism and supports mental alertness and concentration. The body absorbs it within 30 minutes, and its positive effects may last 2-5 hours. Coffee relaxes the body because it hydrates it. Because water is the main ingredient in a cup of coffee, it helps the body work towards its daily water needs and is practically free of calories. Coffee also refreshes the body with its wealth of polyphenols. Polyphenols are nutrients that help maintain the body in good health over time. They are also found in green tea, fruits and cocoa. B. Brief History of Coffee The history of coffee goes at least as far back as the thirteenth century. The story of Kaldi, the 9th-century Ethiopian goat herder who discovered coffee while searching for his goats, did not appear in writing until 1671 and is probably apocryphal. From Ethiopia, coffee was said to have spread to Egypt and Yemen. The earliest credible evidence of either coffee drinking or knowledge of the coffee tree appears in the middle of the fifteenth century, in the Sufi monasteries of Yemen. By the 16th century, it had reached the rest of the Middle East, Persia, Turkey, and Northern Africa. Coffee then spread to Balkans, Italy, and to the rest of Europe, to Indonesia, Asia and then to America. Wild coffees energizing effect was likely first discovered in the northeast region of Ethiopia. Coffee cultivation first took place in southern Arabia; the earliest credible evidence of coffee-drinking appears in the middle of the 15th century in the Sufi shrines of Yemen. In East Africa and Yemen, coffee was used in native religious ceremonies that were in competition with the Christian Church. As a result, the Ethiopian Church banned its secular consumption until the reign of Emperor Menelik II of Ethiopia. The beverage was also banned in Ottoman Turkey during the 17th century for political reasons and was associated with rebellious political activities in Europe In the Philippines, coffee has a history as rich as its flavor,† says the National Coffee Development Board (NCDB), whose main objective is to develop and promote the Philippine coffee industry through technical assistance and credit programs for coffee farms and through marketing and promotions of coffee for domestic and export markets. History records show that the first coffee tree was introduced in Lipa, Batangas in 1740 by a Spanish Franciscan monk. From there, coffee growing spread to other parts of Batangas like Ibaan, Lemery, San Jose, Taal, and Tanauan. Batangas owed much of its wealth to the coffee plantations in these areas and Lipa eventually became the coffee capital of the Philippines. â€Å"By the 1860s, Batangas was exporting coffee to America through San Francisco,† the NCDB- records. â€Å"When the Suez Canal was opened, a new market started in Europe as well. Seeing the success of the Batangenos, Cavite followed suit by growing the first coffee seedlings in 1876 in Amadeo. In spite of this, Lipa still reigned as the center for coffee production in the Philippines and Batangas barako was commanding five times the price of other Asian coffee beans. † In 1880, the Philippines was the fourth largest exporter of coffee beans, and. when the coffee rust hit Brazil, Africa and Java (Indonesia), it became the only source of coffee beans around the world. The coffee rust disease almost wiped it out during the last quarter of the 19th century. Coffee registered a total production of 123, 934 metric tons valued at P6818, 18 million in 1995. Today, however, the Philippines produces only . 012% of the worlds coffee supply. Efforts are being undertaken to revive the industry however, with the majority of coffee produced in the mountain areas of Batangas, Bukidnon, Benguet, Cavite, Kalinga, Apayao, Davao, and Claveria.

Saturday, October 26, 2019

Patton :: essays research papers

LEADERSHIP STUDIES ON GENERAL GEORGE SMITH PATTON JR â€Å"We shall attack and attack until we’re exhausted†¦.. and then we shall attack again†- General George Smith Patton Jr Introduction 1.  Ã‚  Ã‚  Ã‚  Ã‚  The two great wars in the past century was featured by a number of military leaders revered for their qualities and contributions. If we ever make an attempt to rank these leaders, the name of General George Smith Patton Junior would surely find its way within the top few. Military historians of contemporary times consider General Patton a leader who can be studied for drawing important lessons on leadership attributes. His contributions in both the World Wars place him in an undisputed position of honour. 2.  Ã‚  Ã‚  Ã‚  Ã‚  General Patton was a soldier in its truest sense. Born in a military family, he had a conducive environment to culture soldiering. He followed his father and grandfather in the same military institution for acquiring lessons on the military profession. Patton was a lover of military history. He had such an affinity towards the warfare of the past that he believed in his reincarnation throughout the ages as great military leaders. 3.  Ã‚  Ã‚  Ã‚  Ã‚  Although an average student in the military academy, General Patton was a champion cavalryman, a gallant swordsman, a precise shooter, a renowned athlete, a sword designer, a God-believer, a famed poet and a loving father and husband. He always maintained an immaculate attire and enforced the same in his subordinates. Patton always respected his rivals both from his friends and foes. All these attributes made him an aggressive leader with a deep affection for the men he led. The other side of Patton portrays him as a short-tempered, too outspoken and often ruthless executor with disregard to details. Profanity in expression was a darker side of Patton but it also made him extremely popular specially when he used it in describing the enemy. 4.  Ã‚  Ã‚  Ã‚  Ã‚  Patton had a clear vision of leadership. His maxims matching with the actions in the battlefield proved him as a master of leadership art.

Thursday, October 24, 2019

Security and Privacy in Workplace

1. 0 Introduction Whalen and Gates (2010), define monitoring differently in their article. They define it as a method and procedure of examining the workers in an organization and study their constant events intended to guarantee that together the protection of employees and requirements of the employer are met. Nearly all companies nowadays take videos of their employees, they read their emails and monitor their Web surfing. This can be done surreptitiously and some organizations are honest about it Chan et al. (2005). Privacy is one of the most important things that are immensely fitting to be something of the past.In general companies are permitted to observe employee activities by the courts. Private companies have been setting rules in situations when employees are taken into service for instance contracts that affirm that they will be monitoring employees’ use of the Internet or any company tools (Chieh and Kleiner, 2003). Efforts have been made in arrangement for laws t hat protect business and the employees, regrettably most current court cases have been deceiving evidence in the eyes of the magistrates thus confidentiality or privacy laws have been unsuccessful for employees.It has been recommended that government, big firms and industries and health care systems should have the capability to tape and study workers activities as it is a benefit to research and development for several years. Most legislation is the same opinion that laws should be set in place even though the breach of human rights forbid them from approaching the issue to a law level (Welebir and Kleiner, 2005). Sadly, comprehensible defenses of privacy opposed to security may never be evident from the view point of the law.Employers’ main apprehension is the decrease in productivity, virus attacks/ damaged equipment (i. e. computers), legal charges and loss of classifies data. Employees’ major worry is incursion of their privacy, mistreatment of control and precisi on in their work. A survey conducted in the year 2000, is that sixty two percent of the employees use Internet resources once a day for their private reasons and twenty percent of them use it for at least ten times.This is why employer is at unease because a large number of workers are using company property for their own use and not for the business purposes. According to Watson (2002) sopports the idea that productivity is what most companies are concerned about such that if employees use them for their own private uses it will negatively affect productivity. It is compulsory for them to put regulations and policies that will help them monitor employees and their activities during working hours.Some of the main things that companies use are telephone monitoring particularly when personal calls are made, electronic surveillance, drug testing and verification of emails sent externally for private reasons. Reasons why companies make use of policies is for the reason of a decrease in productivity , sensitive material which arise from unpleasant email usage, workplace accidents caused by prohibited drug use, employees bitterness over monitoring of computers and sexual harassment complaints prompted by dating among workmates. 2. 0 Research Objectives R01.To identify if security and privacy actions affect things like productivity in the workplace/organization R02. To state some of the security and privacy actions that some companies are implementing in the workplace R03. To analyze whether organizations nowadays are focusing more on prioritizing their security initiatives thus undermining their employees and their personal lives R04. To evaluate if companies are using the right tools, technologies and methods to maintain good quality security and privacy within their organization 3. 0 Research QuestionsRQ1. What do organizations hope to achieve by implementing security in their companies? RQ2. What effect does security and privacy actions have on productivity in th e organization? RQ3. Do organizations of nowadays focus more on prioritizing their security initiatives hence undermining their employees and their personal lives? RQ4. Do companies use the right methods, technology and tools when they choose security and privacy as a priority? 4. 0 Hypothesis H1. Security and privacy actions increase things like productivity in the workplace. H2.Telephone and email monitoring, monitored computer web use and surveillance cameras are some of the security actions that some organizations are implementing to their workers. H3. Organizations nowadays are more focused on prioritizing their security initiatives thus undermining their employees’ personal lives. H4. For a company to maintain good quality security and privacy within their organization they have to own the right tools, technologies and methods. Theoretical Framework Workplace performance Security and Privacy in the workplace Priorities of the company such as productivity and protectionT he independent variable is security and privacy implementation in companies and workplace performance is the dependent variable. Priorities of companies such as productivity and protection are the controlling variables to the results. 5. 0 Achievements gained From Implementing Security and Privacy in the Workplace Organizations hope to achieve a better performance from their employees when they implement security in the workplace. Most companies today in most parts of the world do observe their workers because they have reasonable reasons for doing so.Since employers are accountable for their employees they have to provide them with a safe and a secure workplace. By monitoring or surveilling employees, employers hope to achieve several things such as employee or customer satisfaction, protection of the company’s confidential information and prevent trade secrets from leaking out, non-offensive material from emails and the internet, high performance from the network and the sy stems and to boost employee productivity (Vorvoreanu and Botan, 2001). 5. Non-offensive material from emails and the Internet According to Lee and Kleiner (2003), employees are responsible for all their workers during employment hours such that even any of the workers happens to send offensive information/materials and they happen to offend the receiver, the employers are the ones who will be liable to this course of action. If the material that would have been sent is found offensive for certain then the company can be sued which can affect the companies’ reputation to a greater extent.To prevent such cases most companies have seen it fit to take the initiative of monitoring each and every email and web use by the employees. 5. 2 Prevention of trade secrets from leaking out According to Paciniet al. (2008), there are several physical actions that employees consider when doing an internal control to safeguard trade secrets of the company. Such actions include a restriction on accessing certain premises (use of key cards), locks for all file cabinets, surveillance equipment to see all movements and passwords for accessing computers.Monitoring employees especially when it comes to trade secrets boosts productivity because employees who have intentions to harm the organization are quickly detected and those who are loyal to the company will work to their maximum potential because they know that they are safe. 5. 3 High Performance from Network and the systems of the Company Companies do not only monitor their employees just to check if they are doing work properly. They also monitor them in order to know if the network and system performance is not being taken advantage of by being used for personal use hence a decrease in productivity.If a computer network is efficient it is of a great advantage because it increases productivity in the workplace. If a computer system is poor it can be a great loss to the firm because productivity can decrease which result s in loss of customers and profits. Most employers really consider the network bandwidth traffic; this is related to employees using the network for personal use . These activities include downloads which decreases network and systems performance, also sharing and use of large audio and video files, surfing the internet and personal emails which are of high volume.All these actions by employees can cause the network/system be attacked by viruses which may cause it to be disabled (Trim, 2005). Secondly, if the bandwidth is used for purposes that are not work-related somehow it would be an expense that could have been avoided and to make matters worse the expenses that are incurred do not contribute to the wellness of the firm (Strategic Direction, 2009). For example nowadays most organizations are seeking to adopt the Web 2. 0 technologies for the sake of privacy and security of their companies.This type of technology according to Almeida (2012), it enables the employers to prevent d ata loss which would have been caused by inappropriate use of social media applications such as YouTube, Skype during working hours will definitely increase productivity in the workplace. According to Doshi (2009), employer does believe in monitoring their employees because it is a fast and easy method of getting the job done. Productivity and profits increase because the employees will work efficiently and at ease hence a lot of work is done in a short period of time.When workers work efficiently the employees themselves is satisfied hence customers are satisfied as well (Chan et al. 2005). According to The Gazette (2008), Internet abuse is a rising problem that is costing Canadian businesses beyond sixteen billion dollars yearly in lost productivity and the amount is predicted to be eighty billion dollars in the United States. 6. 0 Security Actions That Most Organizations Are Implementing 6. 1 Drug Testing Most organizations do drug testing for security reasons.For companies that are doing drug test, they test mainly for alcohol and drugs separately and others test for both. Employees who come to do their job under the influence of drugs/alcohol may be a threat to other work-mates. Secondly, drug testing has increased because of a rise in health cost and an increase in the danger imposed by lawsuits which come from worker disease. Many companies are involved with drug testing their employees because it is one of the best ways for solving medical and economic problems (Jardine-Tweedie and Wright, 1998) .According to Lu and Kleiner (2004), if the drug testing by the employer is legal and correctly does things according to the law of that particular state then the company will have to look forward to higher profits. High profits are obtained because the employee will be more productive, higher level of morale, a low rate of absenteeism, low health care and fewer injuries are encountered during working periods. 6. 2 Electronic Surveillance Computers are changing rapidly nowadays especially in the workplaces such that monitoring employees by electric equipment is more common.Surveillance cameras/ CCTV is another means used by employers to monitor their employees, they are always aware of all the activities that take place in the organization and surrounding areas. According to Chen and Park (2005), monitoring employees regularly would reduce cases of spies in the organization getting away with their actions. Such cases are few because these â€Å"spies† are aware that they are being watched thereby lose interest to do any illegal actions that will jeopardize their identity (Lu and Kleiner, 2004).Next, management’s main objective is to increase productivity and gain more profit hence they believe monitoring employees’ will improve their productivity levels for the better and an assurance of service of high quality. Chieh and Kleiner (2003) states that employers can use information they get from the cameras to find out th ings that are going wrong in the workplace or find out reasons why productivity is decreasing. For example, an employer can discipline workers who may have been wasting their working hours on their own interest based from the information obtained from monitoring.From this employees are bound to focus more on their assigned duties rather than waste time during working hours. Surveilling employees also motivates them to work even harder than they have been doing (Lee and Kleiner, 2003). Managers can somehow conduct a performance evaluation of their employees whereby they will be able to give a feedback to the employees’ and explain which parts needs correction. From monitoring they are able to dictate the type of employees who are hard-working and those who need help.Employers are also able to detect mistakes the employees are making and from this it will be easy to assist them and correct them. 6. 3 Emails, Voicemails/Telephone calls, Files and Web/Internet use monitoring Many companies monitor employees’ emails, files, voicemails and internet use for various reasons. The number of companies who practice this type of monitoring has increased over the past years (Cox et al, 2005). Employers proclaim that by monitoring employees email, voicemails/telephone calls that way they can be certain that they do not contain any materials that can offend the receiver.Email monitoring is when employers monitor all emails that are going in and out for security purposes to make sure that employees are not disclosing employment or business confidential information. They may monitor as well to check if employees are not harassing other coworkers. Telephone monitoring is a system of managing calls and observing service by the employees. This type of surveillance is used to monitor employees when they make or receive calls and they can gather information on how the employees are performing.Internet use monitoring is when managers take the initiative to observe all t he steps of their employee’s online tracks. Sixty percent of the firms in the United States of America gain from the complex technology and they opt to monitor the workers activities on the Internet (Ciocchetti, 2010). In cases that they are in such situations whereby a worker sends offensive material employees are able to deal with the accused accordingly based on the proof of recorded conversations/videos.For example, Xerox Company fired forty employees who were caught viewing Pornography sites on the internet during working hours (The Register, 2000). Employers have been monitoring all its employees all over the world (ninety-two thousand in total) by taking records of every web site opened. The main reasons why they were fired is because they spent most of their working hours on issues that were not related to their company and also viewing pornographic sites may have been offending material to coworkers.Companies have installed different types of technologies just to mon itor their employees’ activities. Examples include software that filters specific content of information to prevent it from leaving the firm which may lead to the disposal of company secrets. Other types of software used by companies are those that can monitor log-on and off times so that employers can see if workers are wasting time on issues that are not company related.Monitoring of emails, voicemails, files and Web use is believed to be another way that makes it certain that employees will work efficiently and possess productive work habits. Productive work habits boosts efficiency which increases productivity thus perfecting customer service. According to Welebir and Kleiner (2005), the worry for organizations is to keep up with the aspect of having power over production and encouraging utilization of the Internet as a priceless resource.A survey conducted by IntelliQuest Information group revealed that there was an increase in private use of the Internet at work. The re sults signified that the use of had grown from 6. 9 hours to 9. 8 hours for every week prior to the last year and about fifty seven million workers access Internet from their workplace for private use. Further information provided by the study was that the number of workers seemingly receiving classified information from competitors has increased from 9. 2 percent to 24. percent within a year. Moreover workers are getting emails with attachments, roughly one fifth of the workers have reported receiving insulting email from an inner source and only a third to confess spending more time on the Internet for personal use. States do not have the same policies for monitoring and governing websites viewed by the residents. States like China, Vietnam and Singapore does not only block sites for pornography they also ban access to linguistic and political issues (Hechanova and Alampay, 2010). 7. Prioritizing Security and Privacy Ignores Employees’ Personal Lives Opponents of implementi ng security and privacy in the organization state that organization nowadays are too concerned with their own company interests and its prosperity thus forgetting that their employees do have personal lives. Installing electronic cameras that will be watching their activities all day when they are at work, monitoring emails and phone calls is making companies seem as if they are forgetting that their employees have a life to live (Dubbeld, 2004).This side of the coin feels that staff is at liberty to confidentiality when they are using the Internet. Employees argue that as they are allowed to breaks, lunch hours or other selectedperiods where they are not liable to any duties but still in the building they should have the freedom to do things like checking their e-mail, do their banking or shopping and maybe just browse the Internet on free time. Everyone is entitled to some privacy no matter where they are so they argue that they should be able to do this during their free time wit hout anyone monitoring all their movements.Secondly, employees do not consider it as monitoring productivity when companies even observe staff in the toilet or relaxing areas of the office. Some employees consider it as an intrusion and they have lawful hope that they can maintain their personal lives private. Undermining workers privileges to confidentiality by surveillance and monitoring is not the only problem that employees face. It also generates high levels of stress and nervousness which to higher chances may lead to poor health of workers and a reduction in performance.Examples of physical wellbeing problems which may be caused by monitoring are repetitive Strain Injury and Carpal Tunnel Syndrome from performance monitoring by the company for instance keyboard strikes. To add on, employees believe thatthey are individuals who can make their own decisions hence it is their right to be treated as proficient andindependentpeople. Guaranteeing their individual development and pe rformance that can be valued is what they believe they can achieve if they are treated as independent people thus they consider surveillance as violating their privacy (Ahmed, 2007).Workers argue that as long as individual e-mail does not hinder or conflict with business life, it should be permitted. Employees also argue that phone calls take more time than writing an e-mail and also that they should be given time to do individual matters because it can reduce the rate of absenteeism. Most employees have suggested that as long as there is a realistic limit on this practice of monitoring emails, there is no reason for fear but in situations where someone does something unusual then they will have to be dealt with (Kierkegaard, 2005).Even if employees are informed that they are being monitored and in agreement that they are using company property they still feel that their employers’ are not respecting the fact that besides working for tem they also have personal lives which st ill go on whether they are working or not. 8. 0 Better results can be achieved by using the right tools, technologies and methods For a company to maintain good quality security and privacy within their organization they have to own the right tools, technologies and methods.A company cannot just instill a rule/wake up one morning with intentions of monitoring all the activities of their employees and expect high productivity. Companies have to follows certain regulations to install such things as software that monitors an employees’ Internet use and all phone calls, drug testing and electronic surveillance. A cautiously worded policy that informs employees concerning the necessity of surveillance in the company will be the most probable way that it can gain acceptance or support for workplace monitoring from them (Watson, 2002).According to Mei-ShaChieh and Kleiner (2003), as regards to other forms of monitoring, it is vital that all forms of surveillance should not be unreas onably intrusive. The methods that employer’s use when they consider monitoring employees should be practical because if they are not deemed like that then the company can encounter problems such as rebellious employees; which may cause a decrease in performance. Arnesen and Weis (2007) critically supports the idea that Employers must know that it would not be irrationally intrusive to observe what an employee does in public; however it might be intrusive to observe the employee’s behavior hen they are in private places such as the toilet. For example, it may be practical to take pictures of employees when they are at work to observe productivity. However, it may unreasonable to put transparent panels in the ceiling of an employee lavatory. Moreover, if convincing conditions state the use of cameras in locker rooms or other private areas, they are supposed to have signs warning employees they are there. Next, Kierkegaard (2005) states the some of the international regu lations and codes that organizations should take note of when they decide to prioritize security and some form of privacy in their workplace.The International Labor Office (ILO) has issued a Code of Practice on the Protection of worker’s personal data† and it is anticipated to give assistance on the safeguard of workers’ private data. The most important requirements of the Code include issues like using individual data legally and justly only for reasons that are directly applicable to the employment of the staff and for the reasons which they were gathered for in the first place. Employers should by all means necessary not keep insightful private information of employees and all employees should be well-informed before such events take place in the organization.They should be informed of any kind of monitoring that especially the ones that involve personal data collection. However, the information obtained from monitoring them should not be the only issues when doing a performance appraisal. Companies have a duty to safeguard private documents against any kind of a loss, unapproved access, usage, changes or exposure. Employees must have admission to their entire personal information and all rights to scrutinize and get a copy of all the archives.Revealing an Internet supervising policy is an essential element in an organization. Workers ought to be up to date with the type of activities that would be supervised, the regularity monitoring and how the management will be informed of the activity. If the organization verifies how the employees use their Internet then they must be informed and if the company retains deleted information for reasons like security when they should be informed about it (Welebir and Kleiner, 2005). The staff should not have beliefs that their actions on the Internet are confidential.Even though companies do not want to present the idea that they are monitoring each word they key in and mouse clicks on the Internet, it is compulsory to tell employees that they do not own any personal confidential rights when they are using the company Internet. 9. 0 Research Design and Methodology The impact of implementing security and privacy in the workplace and the effect it has on performance in the firm is an ontological study which takes a subjectivism view because security and privacy is created from the perception that workplace performance might be positively or negatively affected.The research is more of an explanatory studywhich is a deductive approach where Saunders et al. (2006), defines deductive astestinga concept in which the researcher cultivates the concept and assumption and design a research plan to test the assumption. The research strategy that is suitable for this study is survey because according to Saunders et al. (2006), it is usually related to a deductive approach and since we are using companies it is a tactic commonly used in businesses.I believe the research choice suitable for t he study is a multi-method qualitative study whereby semi-structured interviews and questionnaires can be used for data collecting. Time horizon that can be used is a longitudinal study where according to Saunders (2006), the researcher embarks on a study at numerous facts in time in order to answer a research question. For reliability and validity sake to how security and privacy affect workplace performance several times of embarking on such a question will provide accurate results. Physical access is the one suitable for my study since I am an external researcher.Access would be granted from the management of all the companies that are to be used for the study and gaining an informal access from all the employees for accurate results. One of strategies that can be used to gain this access is that the project will benefit the company in one way or the other. Research ethics that should be maintained during data collection stage are confidentiality and anonymity. Furthermore, the s ampling method technique I used is probability specifically cluster sampling is what I would consider because there are specific types of jobs that make use of surveillance cameras, computers (with internet) and telephones. . 1 Possible Results Based on the literature analysis, H1 can be accepted because by implementing security in the workplace it can work in two ways. Firstly, protects the business from competitors and can be used when evaluating employees. H2 can also be accepted because not only American companies use Surveillance cameras, do telephone and Internet monitoring, companies in Europe and in countries like China, Vietnam, Philippine, Australia also do the same. H4 is acceptable because for the policy of applying security and privacy to work companies have to follow proper procedures.However H3 will remain debatable in the sense that in every topic that arises there is always going to be a group of people who will rebut the idea. It is acceptable only when the company does not communicate the use and the reasons behind the monitoring. 10. Conclusion Based on the evidence and facts from the literature review which provided various perspectives about security and privacy it can be concluded that monitoring employees can result in something noble or something unscrupulous.For example, emails and surfing the Internet can be a disruption but at the same time the feeling of being watched regularly can also be a disruption. Law of privacy has to balance employee interest against those of the employers and more prominently it must center on the important concepts of human self-esteem. Information technology has assisted firms to enlarge their productivity and efficiency but the misuse of the Internet has steered firms to monitor all communications operated electronically to guard their companies and limit legal responsibilities.Nowadays two major developments to be concerned about in regards to electronic surveillance is the great concern for employee p rivacy and the increased cases of employers being caught accountable for workers’ misbehaviors of electronic communication. Although the courts are in support of employers they must be alert about the workers’ rights though shielding the firms’ interests. Words 4 282 References Ahmed, S. ( 2007). Analysis of Workplace Surveillance In a Quest for an Ethical Stance. Journal of Business Systems, Governance and Ethics, Vol 2,No. 4. Almeida, F. 2012). Web 2. 0 Technologies and Social Networking Security Fears in Enterprises’’, International Journal of Advanced Computer Science and Applications,Vol. 3, No. 2, Amicus Guide. (2005). Amicus Guide to Privacy at Work. Privacy at Work. [Online]. Retrieved on 19 March 2012 from: http://www. amicustheunion. org/pdf/PrivacyatWork. pdf Arnesen, D. W and Weis, W. L. (2007). Developing an Effective Company Policy For Employee Internet And E-Mail Use. Journal of Organizational Culture, Communications and Conflict, Vo lume 11, No. 2,pp. 53-65. Chen, J. V and Park, Y. 2005) â€Å"The role of control and other factors in the electronic surveillance workplace†, Journal of Information, Communication and Ethics in Society, Vol. 3 Iss: 2, pp. 79 – 90. Ciocchetti, C. A. (2010). The Eavesdropping Employer: A Twenty-First Century Framework for Employee Monitoring. [Online]. Retrieved on 19 March 2012 from: http://www. futureofprivacy. org/wpcontent/uploads/2010/07/The_Eavesdropping_Employer_%20A_Twenty-First_Century_Framework. pdf Cox, S; Goette, T. and Young, D. (2005). Workplace Surveillance and Employee Privacy: Implementing an Effective Computer Use Policy, Volume 5 Issue 2. Dubbeld, L. 2004) â€Å"Limits on surveillance: Frictions, fragilities and failures in the operation of camera surveillance†, Journal of Information, Communication and Ethics in Society, Vol. 2 Iss: 1, pp. 9 – 19. Guha, M. (2008). â€Å"The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets without Compromising Employee Privacy or Trust†, Library Review, Vol. 57 Iss: 9, pp. 746 – 747 Hechanova, R. M. and Alampay, E. A. (2010). Monitoring Employee Use of the Internet in Philippine Organizations’’, The Electronic Journal on Information Systems in Developing Countries, Volume 40 Issue: 5, pp. -20. Kierkegaard, S. (2005). Privacy in Electronic Communication. Watch your e-mail: your boss is snooping. Computer Law & Security Report,†Vol. 21 Iss: 3, pp. 226-236. Lee, S. and Kleiner, B. H. (2003). â€Å"Electronic surveillance in the workplace†, Management Research News, Vol. 26 Iss: 2/3/4, pp. 72 – 81. Mei-ShaChieh, C. and Kleiner, B. H. (2003),†How organisations manage the issue of employee privacytoday†, Management Research News, Vol. 26 Iss: 2 pp. 82 – 88. Petrovic-Lazarevic, S. and Sohal, A. S. (2004). â€Å"Nature of e-business ethical dilemmas†, Information Management & Computer Security, Vol. 2 Iss: 2, pp. 167 – 177. Rustad, M. L. and Paulsson, S. R. (2005). Monitoring Employee e-mail and Internet Usage: Avoiding the Omniscient. Electronic Sweatshop: Insights from Europe. U. Pa. Journal of LaborAnd Employment Law, Vol. 7:4. Saunders, M. , Lewis, P, and Thornhill A. (2006) Research Methods for Business students. 4th edition . UK: Prentice Hall. Strategic Direction. (2009) â€Å"Social networking and the workplace: Making the most of web 2. 0 technologies†,Vol. 25 Iss: 8, pp. 20 – 23. The Gazette (2008). ‘Stealing’ time at work on Net.One of the new trends to watch in labor law is how companies and labor tribunals handle cyberslacking- a term coined to describe people who spend an excess of time on the Internet at work. [Online]. Retrieved on 31 March 2012 from: http://www. canada. com/montrealgazette/news/business/story. html? id=32125d78-a479-497a-ae19-4f461ea18060 The Register. (2000). Xerox fires 40 in porn si te clampdown. Document Company staffs get caught shuffling more than just paper. Trim, P. R. J. (2005). â€Å"Managing computer security issues: preventing and limiting future threats and disasters†, Disaster Prevention and Management, Vol. 4 Iss: 4, pp. 493 – 505 Vorvoreanu,M. and Botan, C. H. (2001). Examining Electronic Surveillance In the Workplace: A Review of Theoretical Perspectives and Research Findings. [Online]. Retrieved on 16 March 2012 from: http://www. cerias. purdue. edu/assets/pdf/bibtex_archive/2001-32. pdf Warren, A. (2002) â€Å"Right to privacy? The protection of personal data in UK public organisations†, New Library World, Vol. 103 Iss: 11/12, pp. 446 – 456. Warren, M. J. (2002). â€Å"Security practice: survey evidence from three countries†, Logistics Information Management, Vol. 15 Iss: 5/6, pp. 347 – 35. Watson, G. (2002). E-mail surveillance in the UK workplace-a management consulting case study†, Aslib Proceed ings, Vol. 54 Iss: 1 pp. 23 – 40. Welebir, B. and Kleiner,B. H. (2005),†How to write a proper Internet usage policy†, Journal of Management ResearchNews, Vol. 28 Iss: 2 pp. 80 – 87. Whalen, T. and Gates, C. (2010),†Watching the watchers: â€Å"voluntary monitoring† of infosec employees†, Journal of Information Management & Computer Security, Vol. 18 Iss: 1 pp. 14 – 25. Moghe, V. (2003) â€Å"Privacy management – a new era in the Australian business environment†, Journal of Information Management & Computer Security, Vol. 1 Iss: 2, pp. 60 – 66 Ying-Tzu Lu, Brian H. Kleiner, (2004),†Drug testing in the workplace†, Journal of Management Research News, Vol. 27 Iss: 4 pp. 46 – 53 Jardine-Tweedie, L. and Phillip C. Wright, (1998) â€Å"Workplace drug testing: avoiding the testing addiction†, Journal of Managerial Psychology, Vol. 13 Iss: 8, pp. 534 – 543 Chan, M; Woon, I. and Kanakanh alli, A. (2005). â€Å"Perceptions of Information Security in the workplace : Linking Information Security climate to Compliant Behavior†, Journal of Information Privacy and Security, Volume 1 Issue: 3, pp. 8-41 Chieh, C. M. and Kleiner, B. H. (2003), â€Å"How organisations manage the issue of employee privacy today†, Journal of Management Research News, Vol. 26 Iss: 2 pp. 82 – 88 Bibliography Gritzalis, S. (2004). â€Å"Enhancing Web privacy and anonymity in the digital era†, Journal of Information Management & Computer Security, Vol. 12 Iss: 3, pp. 255 – 287. Griffiths, M. (2010),†Internet abuse and internet addiction in the workplace†, Journal of Workplace Learning, Vol. 22 Iss: 7 pp. 463 – 472 Morgan, C. (1999).Employer Monitoring Of the Employee Electronic Mail And Internet Use. McGill Law Journal, Vol. 44 pp. 850-902. Jardine-Tweedie, L. and Phillip C. Wright, (1998) â€Å"Workplace drug testing: avoiding the testing addi ction†, Journal of Managerial Psychology, Vol. 13 Iss: 8, pp. 534 – 543 Appendices Appendix 1: Evaluation of Sources In order to do my literature review I made use of secondary data which consisted of journals, books and web publications (which included newspapers). From these sources I could get dependable information because they are reliable sources.I did not manage to get a lot of recent journals for the current year and for the previous year but I did manage to get publications which were within the ten years. These sources really helped me understand more facts about my research topic. Most of the journals that I found were useful to explain my topic and write more facts because they had information that I wanted to use. Most of the journals that I found discussed reasons why organizations were implementing security and privacy in their organizations and the proper procedures that were supposed to be taken for such policies.However it was not easy to get journals that rebuttal those ideas and supported that somehow it affected employees. Secondly, I was able to find journals that explained security and privacy from companies in different countries. The issue of security and privacy in the workplace was more crucial beginning 1996 which shows that it’s an issue that that was brought about technology advancements. I found most of my journals on emerald insight and to top it up I found more from scholar web publications. I took my time to paraphrase all the necessary information from the journals that I found to support all my assumptions.I used twenty- three journals to support my ideas, except for one journal all of them the author name was given, dates, journal article headings and all the information needed to do the referencing. The impact of implementing security and privacy and its effect on workplace performance Appendix 2: Mind Map Week 1 Received topics to research on Week 2 Search for relevant journals mainly from Emerald Insi ght. com Week 2 Research Objectives Research Questions Hypothesis Week 2 Chose the research topic Week 3 Theoretical Framework Introduction & Search for more JournalsWeek 4 Non-offensive material from emails and the Internet High performance from company networks &systems Week 4 Protection of company confidential information Prevention of trade secrets from leaking out Week 4 Positive effects of security and privacy mainly on productivity, employee &customer satisfaction Week 5 Security & Privacy actions that companies are using Week 6 Facts raised by opponents of Security and privacy e. g. electronic surveillance Week 7 Owning the right tools, technologies and methods Week 9 Research Design and Methodology Possible Results