Monday, September 30, 2019
Brief History of Computer by Ajiboye Daud
LITERATURE REVIEW OF COMPUTER HARDWARE Computers have evolved from the fundamental principles of mathematical calculation and language processing. The computing systems of today are an outcome of the efforts and intellect of mathematicians, logicians, linguists and technologists from all over the world. Computer history comprises the evolutionary journey of computing systems, the timeline of operating systems as well as the history behind the development of a wide variety of computer software and hardware. Bellow is the computer history in brief and the evolution of computers. How did the different types of computers evolve? Here is a brief overview of the progress of computing technology from calculators of the 18th century right up to the modern-day digital portable computers. Year| Technology Used| Before 1801| Calculators were the earliest computing devices. They were the only computation tools for long years before the creation of computers. | 1801| The years that followed were dominated by the use of punched cards for computing. The users used to submit programming assignments to a computer centre using stacks of cards. The programs used to be queued for processing and execution. | 1930 ââ¬â 1960| Desktop mechanical calculators were built during the 1930s. During the 1950s and the '60s, electronic desktop calculators came up. Analog computational technologies predominated this period. | 1940 ââ¬â 1960| This span of time witnessed the emergence of the digital computing technology. Zuse Z3, ENIAC and EDSAC were some of the early digital computers. * First-generation computers were based on the von Neumann architecture. * The second generation computers were characterized by the replacement of vacuum tube by bipolar transistors. They were composed of printed circuit boards. | After 1960| These years witnessed the development of the third generation computers. They were based on integrated circuits. Computer systems of this period had large storage capacities and high processing powers. Multi-core CPUs became available in the 21st century. Laptops, palmtops, handheld PCs, notebook computers and tablet PCs are popular today. Computer development still continues. | Let us now look at the history and timeline of computing systems. Before moving ahead, it will be interesting to know when was the first computer made! Year| Event| 2400 BC| Abacus, the first known calculator was invented in Babylonia. It was a major step towards the era of computing that was to follow. 500 BC| Panini, an ancient Indian Sanskrit grammarian came up with the predecessor of the modern formal language theory. | 300 BC| Pingala invented the binary number system that serves as the foundation of computing systems the world over. | 1614| John Napier designed the system of movable rods, which used algorithms to perform the basic mathematical operations. | 1622| William Oug htred invented slide rules. | 1822| Charles Babbage devised the first mechanical computer. | 1937| John V. Atanasoff devised the first digital electronic computer| 1939| Atanasoff and Clifford Berry came up with the ABC prototype. 1941| The electromechanical Z machines by Konrad Zuse proved being an important step in the evolution of computers. | 1943| Colossus, which was able to decode German messages, was designed at Bletchley Park in Britain. | 1944| Harvard Mark I, a computer with lesser programmability was designed. | 1945| John von Neumann described a stored program architecture, for the first time ever. This architecture was the heart of the computer systems developed thereafter. This architecture, which came to be known as the von Neumann architecture is a part of every computer till today. 1946| The Ballistics Research Laboratory of the United States came up with the Electronic Numerical Integrator and Computer (ENIAC). It was the first general purpose electronic computer; but had an inflexible architecture. | 1950| The US National Bureau of Standards came up with the Standards Electronic/Eastern Automatic Computer (SEAC). It was the first computer using diodes for handling logic. | 1951| Lynos Electronic Office (LEO), the first business computer was developed by John Simmons and T. Raymond Thompson. UNIVAC I, the first commercial computer was designed in the United States by John Presper Eckert and John W. Mauchly. EDVAC, the electronic discrete variable automatic computer was introduced. | 1955| Bell Labs introduced its first transistor computer. Transistors made computers energy-efficient. | 1958| Advanced Research Projects Agency (ARPA) was formed. This year also witnessed the making of the first silicon chip by Jack Kilby and Robert Noyce. | 1968| DEC launched the first mini computer known as PDP-8| 1969| The US Department of Defense founded the Advanced Research Projects Agency Network (ARPANET). It was established with intent to develop a computer network and is the predecessor of the Internet. 1971| Microcomputers came up with microprocessors and Ted Hoff at Intel, introduced 4-bit 4004. | 1972| This year witnessed the creation of 8080 microprocessors by Intel. | 1973| A minicomputer that was called Xerox Alto was developed during this year. It was an important milestone in the development of personal computers. | 1974| Researchers at the Xerox Palo Alto Research Center came up with Alto, which was the first workstation with an inbuilt mouse. It had a fair amount of storage capacity and offered menus and icons. It could also connect to a network. 1975| Altair came up with the first portable computer. The foundation of the present-day relationship between portability and computing was laid way back in 1975! Tandem computers, the first computers with online transaction processing capacities were born during this period. | 1979| By 1979, more than half a million computers were in use in the United States. This number crossed 10 million by 1983. | 1981| The American National Standards Institute (ANSI) was founded. It was during the same year that the first 32-bit chip was introduced by Hewlett-Packard. | 1982| Intel announced the 80286 processor. 1983| In this year, the Time magazine nominated personal computer for the title ââ¬Ëmachine of the year'. | 1985| Intel introduced the 80386 processor that consists of a 16MHz processor. | 1990| The World Wide Web was born. Tim Berners-Lee, a researcher at CERN, developed HTML. He came up with specifications such as URL and HTTP. He based the World Wide Web on enquiry-based system that used hypertext and enabled people to collaborate over a network. His first web server and browser became available to the public. | Till date| The development of newer versions of computer systems continues. | An operating system is that software component of a computer system, which deals with the management of the different computer processes and the sharing of computer resources. It hosts computer applications and handles computer hardware. Take a look at the major events in the history of operating systems. Before going ahead, you might like to take a quick look at the different types of operating systems. Year| Event| 1954| MIT came up with their operating system for UNIVAC 1103. | 1964| Dartmouth timesharing operating system was developed. | 1965| Multics was announced. However, it was opened for paying customers in October 1969. 1966| DOS/360 of IBM came up. | 1969| This year witnessed the development of the Unix operating system by AT;T. | 1976| CP/M was developed during this year. | 1980| OS-9 came up in 1980. | 1981| This year can be considered fortunate to have witnessed the development of MS-DOS. IBM had hired Paul Allen and Bill Gates to create an operating system in 1980. The y used the operating system manufactured by the Seattle Computer Products as a template to develop DOS. | 1984| Macintosh operating system came up in this year. | 1987| It was during this year that MINIX, BSD2000 and OS/2 were developed. 1988| RISC iX, LynxOS and Macintosh OS (System 6) came up during this year. | 1989| This was the time when the RISC operating system was developed. | 1991| It was in 1991 that Linux came up. It is a Unix-like operating system, which is a free software. It was during this year that Minix 1. 5 was developed and Macintosh came up with System 7. | 1992| Solaris, the successor of Sun OS 4. X came up during this year. | 1993| Plan 9, FreeBSD, NetBSD and Windows NT 3. 1 came up during 1993. | 1995| OpenBSD and Microsoft Windows 95 came up during 1995 | 1996| Windows NT 4. 0 hit the computing market in 1996. | 998| 1998 witnessed the release of Windows 98 as well of Solaris 7. | 2000| Windows 2000, which hit the markets in 2000, was the first Windows server operating system to drop the ââ¬ËNT' suffixed to its name. Windows ME, which was sold during this year, was the last operating system in the Windows 9x line. Red Hat Linux 6. 2E also came up during 2000. | 2001| Windows XP was launched and soon gained a wide popularity. Windows XP 64-bit edition followed in 2002. | 2002| Windows XP Service Pack 1 was released in 2002. | 2003| 2003 witnessed the launch of the Windows 2003 Server as also the release of Red Hat Enterprise Linux 3. 2004| Windows XP Service Pack 2 was released in 2004. | 2006| Windows Vista hit the markets| 2008| Windows Vista Service Pack 1 and Windows Server 2008 came up in 2008. It was also during this very year that Windows XP Service Pack 3 was released. | Computers have always been the most efficient computational devices. They have high processing powers and are able to run and execute large programs. Programming languages serve as the means to write programs on computer systems. Thus, it is important to look at the timeline of the development of some of the major programming languages. Following is an overview of the important events in the history of computer languages. Year| Programming Language Developed| Before 1950| The ENIAC coding system was primarily used in computing| 1954-54| Fortran ââ¬Å"0â⬠was designed by a team at IBM. Fortran Implementation was developed by John Backus at IBM in 1957. | 1956-58| John McCarthy came up with the concept of LISP. | 1959| COBOL concept came up followed by its implementation that was developed by the Codasyl Committee in 1960. The LISP implementation was developed in 1959. LISP's successor, Common LISP, came up later in 1984. 1964| IBM came up with PL/I concept. PL/M followed years later in 1972. 1964 also saw the development of BASIC by Kemeny and Kurtz. | 1969| Ken Thompson developed the B language. | 1970| This was when Pascal was developed. | 1972| It was during 1972 that Smalltalk and Prolog were developed. One of the most important events in the history of computing was the development of C language. It was de veloped by Dennis Ritchie in 1972. | 1975| Scheme, the successor of LISP came up in 1975 as also Modula, the successor of Pascal. | 1978| SQL was developed at IBM in 1978. | 1979| REXX and AWK came up in 1979. 1980-83| C with classes was developed in 1980. Objective-C came up in 1982. 1983 witnessed the development of C++, one of the very popular languages till date. | 1985| PostScript and Object Pascal belong to 1985. | 1987| Perl that derives some of its features from C, as also from AWK, sed and sh evolved in 1987. | 1991| Van Rossum came up with Python. Visual Basic, developed by Alan Cooper, came up in the same year. | 1993| Ruby, which is considered a successor of Smalltalk and Perl, came up in 1993. | 1994| PHP was born in 1994. | 1995| ColdFusion belongs to 1995. It was during this year that James Gosling at Sun Microsystems came up with Java. | 1996| Javascript was born in this year. ECMAScript, its successor came up in 1997. | 1999| XSLT, a language based on XML by the W3C and the Game Maker Language by Mark Overmars were born in 1999. | 2000| The D language and C# came up in 2000. | 2006| The development of Windows PowerShell by Microsoft was one of the significant events in computing that took place in 2006. | Looking at the speedily advancing computing technology, we can surely say that the future of computers is going to be as glorious as their history.
Sunday, September 29, 2019
Child Labour Essay
Institute of Communication Studies Punjab University, Lahore Content 1: Introduction 2: Strategies/Plans 3: What can you Do? 4: Target Audience 5: Communication Mode 6: Conclusion 7: Bibliography Introduction Definition of child labour The Article 1 of the United Nations Convention on the Rights of the Child defines a child as anyone below the age of 18.ââ¬Å"Child labourâ⬠is often defined as work that deprives children of their childhood, their potential and their dignity, and that is harmful tophysical and mental development. It refers to work that: * interferes with their schooling by: depriving them of the * opportunity to attend school, obliging them to leave school * prematurely or requiring them to attempt to combine * school attendance with excessively long and heavy work. Forms of child labour Child labour exists in many forms. Sometimes it can be easily observed; sometimes it is hidden from your view. Here is a list of different forms of child labour that includes some of the most widespread forms and some of the worst forms. However, this is not a complete list of all existing forms. Domestic work: Very common and sometimes seen as acceptable, it happens in the family home or outside the home. When domestic work is outside the home, children ââ¬â almost always girls ââ¬â work very long hours, have no chance to go to school and are isolated from their family and friends. Agricultural work: A lot of working children are found in agriculture. They often work on the family farm or with the whole family, as a unit, for an employer. Work in industries: à This work can be regular or casual, legal or illegal, as part of the family or by the child on his own for an employer. It includes carpet weaving, gemstone polishing, making garments, chemicals, glassware, fireworks, matches or a range of other products. These tasks expose the children to hazardous chemicals that can lead to poisoning, respiratory and skin diseases, radiant heat, fire and explosions, eyesight and hearing damage cuts, burns and even death. Work in mines and quarries: Child labour is used in small scale mines in many countries. They work long hours without adequate protection and training. Child miners suffer from physical strain, fatigue and disorders of the muscular and skeletal systems. Slavery and forced labour: It is most commonly found in rural areas. It is also frequently linked to the oppression of ethnic minorities and indigenous peoples. Children are often also drawn into armed conflict, forced to be soldiers or to work for armed forces. Prostitution and child trafficking: It is one of the worst forms of child labour. The dangers faced by children are extreme and range from moral corruption to sexually transmitted diseases to death. Work in the informal economy: This includes a whole range of activities such as shoe cleaning, begging, pulling rickshaws, selling newspapers, or collecting rubbish. Some forms are very easily observed while others are hidden from public view. Activities often take place on the streets but also include domestic work. Strategies Participate in the World Day Against Child Labour In 2002, the International Labour Organization (ILO) launched the first World Day Against Child Labour, as a way to highlight the worldwide movement to eliminate child labour. The World Day Against Child Labour is celebrated every year, on 12th June. It provides an opportunity to gain the support of governments, employers and workersââ¬â¢ organisations, civil society and others for the campaign against child labour. 2008 activities will focus and raise awareness on ââ¬Å"Education: The Right Response to Child Labourâ⬠. The role of education is highlighted because access to free and compulsory education for poor children is crucial to reducing child labour. The most recent ILO Global Report noted that the establishment of universal schooling to the age of 14 or 15 has signaled the effective end of child labour in a number of countries. Contribute to the 12to12 Portal The 12to12 Community Portal is a networking platform for various groups working against child labour (workers, employers, youth, NGOs, schools, mediasâ⬠¦). The portal derives its name from June 12th, the World Day Against Child Labour. It aims to create a worldwide network of partners mobilized against child labour and to bring attention to the issue of child labour from June 12th to June 12th, until child labourers are finally given the chance to enjoy their rights as children and one day realize their full potential as the adults that they will become. Get involved in the Decent Work agenda The elimination of child labour is an important aspect of Decent Work. Child labour not only prevents children from acquiring the skills and education they need for a better future, it also perpetuates poverty and affects national economies. Withdrawing children from child labour, providing them with education and assisting their families with training and employment opportunities contribute directly to creating decent work for adults. Decent Work, Decent Life Campaign The Decent Work Alliance, which consists of the the ITUC, the European Trade Union Confederation (ETUC), Solidar, the Global Progressive Forum and Social Alert Intertnational, launched the campaign in January 2007 at the World Social Forum. The campaign aims to place Decent Work at the core of development, economic, trade, financial and social policies at the national, regional and international level. A specific Decent Work, Decent Life Campaign for Women was launched, on 8th March 2008, for the 100th anniversary of the International Womenââ¬â¢s Day. Spread the message and build partnerships Trade unions are well placed to influence the attitude of workers families, children and their parents. Raise awareness among your members and among adult workers through publicity, posters, campaigns, workshops or educational events. Develop child labour modules in your programmes, organise seminars or conference on child labour or use the mass media. You can also join forces and work with others, such as employersââ¬â¢ organisations, consumersââ¬â¢ organisations, NGOs, child labourersââ¬â¢ families, teachers and social workers. Monitor the development of child labour Trade unions are well placed to undertake information-gathering and to develop appropriate policies and effective plans to take actions against child labour. Trade unions need to gather detailed information. Collectingà local and national data will help to identify where the worst forms of child labour are to be found and will aid in the evaluation of programmes to combat these forms of child labour. You can for example: * Collect stories, pictures and other evidence of children engaged in labour. * Assess the working environment in which children are working. * Record where child labour is being used. * Organize or take part in surveys. Use the supervisory machinery of international institutions If your country has ratified the ILO conventions, your trade union can use the supervisory mechanisms to pressure your government to take adequate and effective measures: * Get the copies of reports submitted by your government to the ILO and feel free to send comments on them to the ILO. * If you think the law and/or practice does not conform to a convention adopted in your country, consider reporting to the ILO and discuss this with the national and/or international organization to which you are affiliated. Participate in tripartite dialogue Tripartite dialogue is central to social stability and to sustainable growth and development. Use the tripartite dialogue between trade unions, government and employers to improve the legislation and its enforcement, and to define policies and programmes to combat the worst forms of child labour and to monitor their implementation. Collective bargaining to combat child labour Collective bargaining is traditional trade union tool and a way for trade unions to interact with employers. It has served the trade union movement well in improving wages and working conditions, and it has proven to be effective in influencing what occurs in the workplace. Promote the international labour standards As explained earlier in this guide, where the international labour standards are respected, children are far more likely to be in school than at work. Promoting the universal respect of international labour standards is then another way to help tackle child labour not only in your country but also in other countries. Pressure your government for an ILO Convention on Domestic Workers Domestic work is one of the most common forms of child labour. The Governing Body of the International Labour Organisation (ILO) decided in March 2008 to include the item ââ¬Å"Decent Work for Domestic Workersâ⬠on the agenda of the 99th session (2010) of the International Labour Conference. If your country is represented at the ILO Governing Body, then with your national center, urge your government to support the proposal to draw up an international convention specifically designed to protect domestic workers. e-Campaigning Internet and new technologies are fast, easy and affordable ways to promote your actions as well as to broadcast your message to a wider audience. There are hundreds of ways to get your message known; the only requirements are to be creative and to reach people where they are online. If you have a camera, record videos of your actions and/or a documentary about child labour, put them on Youtube or similar websites. What can you do? Participate in the World Day for Decent Work On October 7 2008, the trade union movement is organizing a World Day for Decent Work (WDDW). This is an unparalleled opportunity for trade unions andà organizations interested in Decent Work all around the world to join a broad global mobilization involving a large number of people and a wide range of activities. There are three themes that you can connect your activities to on the World Day itself: * rights at work * solidarity * ending poverty and inequality Each of these themes can easily be linked with child labour and should fit into your existing child labour activities. Target Audience Help others to eradicate child labour Child labour may not be a big problem in your own country, but there is always the option of helping some other countries. Help your friends in India or in Democratic Republic of Congo or somewhere else to fight against child labour! Direct support to children When it is possible, trade unions and others can provide direct assistance to working children and their parents to help: * remove children from work; * rehabilitate child-labourers and get them into school; and * develop apprenticeships for former child labourers| Demonstrate Demonstrations, when wisely used, are a very good trade union tool. * Organize a march against child labour and finish it outside a politically strategic building. * Use and display banners, flags and other materials in symbolic or strategic places. Your banners can include slogans, signatures, handprints or drawings. * Organize a child labour information stand in the main shopping street of your city or in other busy public places. Get in touch with your regional or national Global March coordinator The Global March Against Child Labour has a presence in more than 140 countries. Coordinating your efforts with the Global March Communication Channels | 11 | | | | | Communication Mode The main communication channels are: 1- television 2-radio 3-newspaper 4-interactive theatre Television Television is one of the most effective media of our times. Several studies have shown the impact of television on everyday lives of the viewers. Television has proved extremely effective as a channel for conveying development messages. ITA can make use of television in two ways. (a): By liaising with the producers of the television programmes that often comment on economic and social issues and by making efforts to convince them to put child domestic labour on their agenda. (b): By working with local cable operators to ensure that telecast video animation prepared for the project. b) Radio Popularity of radio varies in the urban, suburban and rural areas. After losing its glory in the urban areas of the country, it is staging a comeback in the form of FM stations. However, Radio is a popular medium of information and entertainment in the rural areas. Radio provides an effective and cost effective way to reach the target audiences. Some programmes of Radio Lahore are particularly popular with the target audiences. An effort will be made to use these programmes to convey the message. For this purpose the project staff will meet and keep in touch with the presenters of these programmes. The government has issued licenses for FM radio stations all over the country. The communication staff of theà project will keep a close watch on such a development in the area and will try to make the best use of a communication opportunity if it appears in the form of an FM radio in the country. c) Newspapers Newspaper is an effective source of communication in urban centres. It has different categories like magazine or periodical containing public news, reports of events, and commentaries. The Project team will hold forums, seminars and workshop with media personnel to highlight the issue of child domestic labour. The project team will coordinate with editors of newspapers for an effective media campaign in the form of features, articles and dissemination of information. d) Interactive Theatre Street drama has been a popular folk art in the subcontinent for centuries. Traditionally street theatres were used to dramatise mythical and folk romances. Lately, this medium has been modified to address social issues. A strong case can be made for street theatres as a medium of communicating information about sensitive issues. Plays can be adopted to be culturally appropriate and context sensitive. Theatre provides a public and non-intrusive forum for communication. In addition, theatre is an ideal medium to reach target groups and facilitate immediate feedback. Pre-play entertainment can be used to gather the crowd, followed by a street play. The performance is followed by an interactive session in which audience engage in a discussion about the change in the situation portrayed in the play. Advertisement/ Pamphlet *Public Notice* Concluding Remarks The literature on child labor is an illustration of abundance and anarchy. Theoretical writings on the subject are relatively few though one finds theoretical insights in many unexpected papers and books which may be otherwise purely empirical or descriptive. The empirical writings on child labor are numerous but they are usually not founded on any theory. By bringing together68 the main theoretical ideas, this survey hopes to encourage not just further theoretical research but empirical work which is analytically better founded. Also evident from this survey is the fact that there is no unique prescription. Should child labor be banned outright? Should the WTO be given the responsibility of enforcing restrictions on child labor through the use of trade sanctions? Should there be a legal minimum wage for adults so as to make it unnecessary for parents to send their children to work? The answer depends on the context. It was argued in this paper that there is much that can and ought to be done, but the precise policy to be followed depends on the economic milieu for which the prescription is being sought. The main policy divide is between legal interventions and what may be called collaborative interventions, that is, public action which alters the economic environment such that parents of their own accord prefer to withdraw the children from the labor force. The availability of good schools, the provision of free meals, effort to bolster adult wages, are examples of collaborative interventions. We have discussed examples and given arguments to show that such interventions are, in general, a desirable way of curbing child labor. However, many of these actions may not be feasible. There may not be money enough in the governmentââ¬â¢s coffers to run better schools or to improve the infrastructure which would result in higher adult wages. In such circumstances, should government resort to legal action to restrict child labor? There seems to be some agreement, that some minimal restrictions, such as children being prevented from working in hazardous occupations or under bonded labor conditions, are worth enforcing legally. It is true that one can always think of some circumstance where even such a minimal law will work to the detriment of the child. Bibliography Link1: http://www.ilo.org/ipec/Campaignandadvocacy/wdacl/langââ¬âen/index.htm Link2: http://www.viewpointonline.net/the-solution.html Link3: http://www.goodweave.org/child_labor_campaign Link4: http://www.alliance2015.org/index.php?id=education Link6: http://stopchildlabor.org/?p=2528 Link7: http://www.globalmarch.org/
Saturday, September 28, 2019
A Report On Offender Profiling Psychology Essay
A Report On Offender Profiling Psychology Essay This definition is controversial as it has clear connotations of ââ¬Ëinformed guessworkââ¬â¢ that has angered those who advocate the view that offender profiling is a scientific and theoretically-informed technique. This disparity of views as to the validity of offender profiling is not limited to the academic and professional world. Unsuccessful attempts at profiling have attracted a high level of media attention and this has combined with the less-then-scientific approach of fictional profilers to create a fair degree of scepticism amongst the public regarding the validity of offender profiling. This essay will explore the psychological basis of offender profiling with a view to establishing whether or not it can be considered a valid psychological technique with an important role to play in criminal investigation. Although offender profiling is viewed as a relatively recent technique, gaining prominence in the 1980s and 1990s, the practices that underpin profiling are of fa r greater longevity. The research conducted by criminal anthropologists in the 1800s that sought to measure and record physical features of offenders in order to gain insight into the characteristics of the criminal personality provide the roots of offender profiling. This endeavour, commonly associated with Lombroso, was based upon the premise that criminal have distinctive characteristics that enable them to be differentiated from the non-criminal population (Garland, 1997). Lombrosoââ¬â¢s work in the identification and classification of criminal ââ¬Ëtypesââ¬â¢ was based on notions of biological determinism; certain individuals were naturally possessed of traits which predisposed them towards criminality. Not only did Lombroso believe that people were predestined either towards offending or law-abiding behaviour, he believed that criminals could be physically distinguished from each other according to the type of crime which they were biologically determined to commit. Th is early work into the classification of offenders seems far removed from the techniques deployed in modern offender profiling. However, Lombrosoââ¬â¢s basic theoretical premise that criminal behaviour could be predicted from studying the characteristics of individuals to determine whether they were predisposed to criminality and, if so, what type of offending behaviour they would display was instrumental in the evolution of numerous alternative theoretical perspectives aimed at predicting criminal behaviour. Subsequent studies moved beyond the categorisation of offenders on the basis of physical characteristics to taken into account social and psychological factors. One of the major influences on the progression was the work of Sir Francis Galton who studied heredity and human behaviour as a basis for the prediction of criminal behaviour. His conclusions concerning the existence of inheritable criminal tendencies were coupled with a realisation that a tendency towards criminalit y was the result of the accumulation of specific character traits that were not necessarily criminally-orientated. Galtonââ¬â¢s findings were particularly influential as they acknowledged the difficulty of isolating inherent characteristics without taking into account social and situational factors. In other words, although Galton was convinced that criminality was the result of inheritable personality traits, he recognised that these traits did not exist in isolation of the environment inhabited by the offender. This expansion of factors that were viewed as contributing to criminal behaviour led inexorably to a focus on the mind of the offender. Initially, psychological theories of offending tended to be reminiscent of the predestined actor of biological determinism in that they believed that criminal traits arose from factors outside the control of the offender and which had an indelible influence on their behaviour. Psychodynamic and behavioural learning theorists evolved expl anations for criminality that adhered to the central notion of psychological positivism that certain core patterns of behaviour and reasoning remain consistent within offenders irrespective of their social experiences and operational environment.
Friday, September 27, 2019
Network security infrastructure Essay Example | Topics and Well Written Essays - 500 words
Network security infrastructure - Essay Example On the other hand, Internet Security Infrastructure is the arrangement of components and tools, in a bid to offer the most effective internet protection. Before one settles on a particular plan to use, it is of the essence to clearly state the objectives of the plan. I, as a result, had to carefully select a plan that would enable me achieve the above goals at the lowest cost possible. My plan includes firewall, web contents, protection against web pharming, and phishing. A firewall is a choke-point garget that consists of a set of rules and instructions specifying the type of data to allow in or out of the system. It basically controls the flow of data into and out of the system. There several types of firewalls in the market. In this case, I chose on Zone-Alarm based on its outstanding features and performance. Zone-Alarm is a multi-purpose firewall. It is capable performing several functions simultaneously. Such functions include protecting the system against internet exposure, protecting the system against web pharming and phishing. The firewall is programmed so as to prevent any malicious emails from getting into the mail server. The use of this type is very economical, in that it forms several functions at ago, hence saves on cost. This is a server program that is responsible for handling the end-user requests to access the system. AAA server gives authorization, authorization, and accounting services. It is at this station where the users request to access the system is either accepted or rejected. Routers are referred to as traffic cops of a network system. Their function is to direct traffic into and out of the system. They also direct traffic within the network system. The process decision of a router is normally contained in a routing table. The routers are programmed so as to prevent the possible routing threats such as complete network chaos, dropped traffic, and traffic sent along invalid paths. The
Thursday, September 26, 2019
Tesco Essay Example | Topics and Well Written Essays - 1000 words - 1
Tesco - Essay Example If the global sales and domestic market share of the company is taken into account then it is found that the company is the largest British retailer by far. The profit of the company exceeded ?2 billion for the year 2008 and it is believed that the profit will be much higher in the year 2009. The company mainly focuses upon food and drink but it has also started dealing in clothes, financial services, internet services etc. ââ¬Å"Tesco started life in 1919 when Jack Cohen started selling surplus groceries from a stall in the East End of London. Mr. Cohen recorded a profit of ?1 from total sales of ?4 on his first day.â⬠(A History of Tesco) The brand Tesco first appeared in the year 1924 when Jack Cohen supposedly bought a tea shipment from Mr. T. E Stockwell. The year 1929 marked the opening of a store in North London and the company rapidly developed from there on. The head quarters of the company was first established in North London in the 1930s. In the year 1932 the compan y became a private limited company, another feather in the cap of Tesco. PESTLE PESTLE is an acronym for Political, economic, sociological, technological, legal and environmental factors. Let us examine how strong the organization is after conducting a PESTLE. SWOT analysis and PESTLE are conducted to assess the strengths and opportunities available to an organization. The current success of Tesco is largely because of the favorable political climate, Tesco has managed to penetrate into nations which were previously considered difficult to penetrate into and this is certainly paved the way for success. Politically the organization has helped in solving the unemployment problem in the UK, the credit crunch has taken a toll on the employment rate but Tesco has still managed to provide job opportunities hence bringing down the unemployment rate in the UK. The EU laws largely favor Tesco, the EU laws tend to favor organizations that have a large presence in a country, Tesco not only has a large presence in the UK but it has also expanded rapidly in other countries as well and this has certainly worked to the advantage of the organization. Tesco needs to be aware of the planning permission because it has plans of further expansion and things can go horribly wrong should an organization avoid planning permission. It is extremely important to pay attention to the marketing strategy of Tesco, the organization has put in a lot of efforts into marketing, and they have captured almost every opportunity to grow. The specialty of the organization was initially in drink and food business but the giants gradually decided to enter into consumer products like music players, CD players, computers and other products that sell like hot cakes. The competitive marketing plan of the organization is right up there with the best, each store is a different segment and steps are taken on every store to increase the sales and generate good profits. The SWOT is in favor of Tesco, the bigg est strength of the organization is its workforce, as mentioned earlier the employees are very affable and friendly. The customers feel good when they share their problems with the employees. Another strength of the organization is its global reach, the stores are spread across in several countries which is no ordinary achievement. Jack Cohen started on a very basic level and within no time the organization
Wireless Technology Impact on SCADA Research Paper
Wireless Technology Impact on SCADA - Research Paper Example This is the dawn of the new, sophisticated SCADA. Already, new, state-of-the-art SCADA alternatives or hybrids have emerged in the market. Expect the new SCADA to be more powerful, and more secured, as more cyber-proofing options are being developed in line with the governmentââ¬â¢s drive to protect the countryââ¬â¢s critical infrastructures. This paper will define the SCADA system, its evolution through time until todayââ¬â¢s present generation, with all the attendant threats and vulnerabilities that accompany the open architecture of the IT system, with suggestions/recommendations on how to overcome these threats/cyber risks. Sample project analyses aim to show how an upgraded SCADA system will enable ease of operation and control. Industry disasters and mishap should serve as lessons in history. Government initiatives and regulations plus the preponderance of summits and conferences show that governments, industries and business are aware of the constant threats and vulnerabilities, the downside in todayââ¬â¢s incredible, amazing computer and technological developments. 1. What is SCADA? SCADA (acronym for System Control and Data Acquisition) is the integrated, computerized industrial process control system used to collect real time algorithms in manufacturing plants and major pipeline industries like water and waste water facilities, electrical companies, oil and fuel transports, oil refineries, mass railways, nuclear power plants, and many more industries. ...
Wednesday, September 25, 2019
HULSE CHRISTMAS WAR LETTER ANALYSIS Assignment Example | Topics and Well Written Essays - 500 words - 3
HULSE CHRISTMAS WAR LETTER ANALYSIS - Assignment Example Edward Hulse was in the heart of the war, however these letters were not written to be published, and they were directed only to his mother. Hulse got a promotion in March 1915, but several days later his life ended at Neuve Chapelle where the newfound Captain was ready to help his Commanding Officer. The young soldier was waiting for the start of greater army activity, however soon he realized it does not contain any romantics. Hulse did not describe in his letters the most important plans, he even did not want to show if he was afraid or tired. During the following months he got the full impression of war: fire, dead friends, hospital. However the most surprising thing he saw fighting on the Western Front was so-called Christmas Truce. Sir Edward Hulse, being a lieutenant of the 2nd Scots Guards, described this occasion in the following words ââ¬Å"It was absolutely astounding, and if I had seen it on a cinematograph film I should have sworn that it was fakedâ⬠1. At this period the forces of the British Army were sure that the German`s desire is to destroy everything, which did not follow their expectations. This impression was ruined in the mud of Flanders, where the forces were placed during the winter. We feel he is tired, when he says how they walked miles to the trenches and got extra work, however he finds it amusing, that they ââ¬Å"are going to give the enemy every conceivable song in harmonyâ⬠2. It seems that he was busy; it seems that he was rushing, despite the detailed story, however it was able for him to found time for his mother. The Christmas Eve was not mentioned with fire and fighting like the previous December days. This day even heard the songs of the members of both trenches. The truce was agreed upon between the soldiers of German and British armies, and No-Manââ¬â¢s Land was chosen, our narrator says Christmas was celebrating in many areas of the Western Front. The letter from 28 December is full of different emotions ââ¬â from surprise
Tuesday, September 24, 2019
Sentencing in international law requires reasoned discrimination Essay
Sentencing in international law requires reasoned discrimination. Critically evaluate this statement with reference to role of international tribunals - Essay Example licies regarding the international criminal court (ICC).2 Various states recognised the role of ICC in a multilateral system aiming to put to end impunity and set up the rule of law in the declaration, which was adopted in the meeting. As per the declaration, it is right to say that the key role of ICC is the enforcement and inducement of compliance in regard to the specific norms of international law prohibit and prevent mass violence.3 Following the extensive perpetration of unspeakable atrocities which were the consequences of the Second World War, the international community passed an unparalleled call for justice.4 The community sought to end serious crimes via inter alia, which is adopting the convention of preventing and punishing all crime genocides, the four Geneva conventions and the principles of Nuremberg.5 Despite the fact that sentencing in domestic jurisdictionsââ¬â¢ importance has grown over time, it still remains part of international criminal law which is undergoing construction and is likely to be unregulated in various aspects. International sentencing law and practice has not yet been defined by proper specific norms and principles under which one should be prosecuted. International judges have continued receiving little guidance on matters concerning prosecution of individuals. Yugoslavia (ICTY) and Rwanda (ICTR) are the best examples of international sentencing which can comprehensively and coherently explain how the system works. Despite the lack of credible enforcement mechanisms, violating international humanitarian laws have continued over time with glowing impunity. The international community has responded promptly by taking a joint action that involves creating an interconnection system of international justice aiming at preventing impunity for the worst atrocities likely to happen to mankind.6 This vision came into reality in 1998 when states approved and adopted the multilateral treaty by the name Rome Statute of the International
Monday, September 23, 2019
Case study on abercrombie and fitch Example | Topics and Well Written Essays - 2250 words
On abercrombie and fitch - Case Study Example A marketing strategy in any business is a tool to a competitive advantage. It refers to setting the marketing plans, objectives and working towards market share. Marketing strategies are dynamic due to the different circumstances or environments companies do business. It is then necessary for a marketing manager to scan the environment before laying the most appropriate marketing strategy. The scan is conducted for both internal and external environments. In the internal environment, a marketing manager will have to consider the marketing mix, performance and any possible constraints that affect its implementation (Roederer, 2013). The most effective marketing strategy features market segmentation, targeting and then product differentiation or positioning. The first step is dividing the market into subsets of consumers with common needs. Consumer grouping is possible through the following segmenting the market. First, market can be segmented geographically, which gives precise features and common characteristics determining the needs of consumers in that particular region. Rainy regions will have high demand for raincoats and gumboots while hot regions will be in great need of summer clothing. Second, segment using variables like age, education and gender that is referred to demographic segmentation (Roederer, 2013). Third, there is behavioral segmentation whereby customers are grouped according to their usage rates and attitudes. The subset then gives the demand level. Fourth, cultural segmentation will consider putting together customer with same belief and moral values. The marketing manager will also be able to understand different culture preferences to provide only what is acceptable in a particular culture. Market segmentation gives some information about the potential customers. The data is useful in defining the target market. Using such data, the marketing manager can know what is needed
Sunday, September 22, 2019
An Unpredicted New kind Of Warfare Essay Example for Free
An Unpredicted New kind Of Warfare Essay World war one continued for four years across a vast and stretching from the English Channel to the northern Swiss border. In 1914 the prediction was that the war would be over by Christmas. At the beginning of the war, The Germans thought they could capture France before invading Russia therefore preventing a war on two fronts. But because of the failure of tactics they couldnt succeed, and this was one of the main reasons the war lasted for such a long period. It was no longer each side trying to capture the other in the war but stopping the enemies movements in trench warfare and using new technology to soften up enemy, if it didnt back fire. Defense was now the key to winning the war and was far superior than the offensive. The trenches were hard to capture by advancing troops because of increasing firepower from machine guns. Crossing no-mans land was committing suicide for the troops as machine guns could inflict enormous damage on advancing infantry. The realization of the advantage of defense resulted in the enhanced rate of advancing technology. This was one of the core reasons for stalemate upon the Western Front because technology was advancing at such a rapid rate and new inventions were being introduced in a hasty manner. Many of the new inventions were not sufficiently tested and many of the ideas were not thoroughly thought through which resulted in unnecessary delays. Aircraft at the start of the war was used primarily for reconnaissance work, spotting enemy trenches and movements before a possible attack. But this alerted the enemys attention and gave them time to prepare resulting in the attackers job being more costly and difficult to undertake. Barbed wire was massed produced on an industrial scale by both sides as barbed wire entanglements were unbreakable for troops, stopped cavalry in their tracks, and slowed troops down completely. Attempts were made to destroy barbed wire with shellfire but the barbed wire is just lifted and often ends up in a bigger mess than before. Chlorine gas was first introduced in April 1915 by the German army against the French army. Chlorine gas destroyed your respiratory organs and you had a long slow death. But poisonous gas was an extremely unreliable method of attack as the direction of the wind may change at any time and return the poison in the direction of the attacker killing your own troops. Also, as with many other weapons that were developed it can only be used once to an advantage, as their element of surprise is lost. Gas masks were quickly distributed to both sides and gas was not such a great fear as it was first thought Tanks were invented to be the technical solution to the major problem of both barbed wire and machine guns. They had an armour plate to protect troops whilst attacking and caterpillar traction to allow them to cross-hilly and muddy ground. But the first Mark I tank was a weak and variable weapon. It was used at the Somme in 1916 but neither their performance nor numbers could help win the battle. It was not until Cambrai in 1917 that tanks were used on a large scale. They crunched their way over the barbed wire and German trenches creating a huge hole in the German defenses. A General on horseback commanded his armies in battle up until 1914. After 1914 telephones were working. Battles could be safely won from far away behind a desk. But though this development in communications may seem a great success, but telephones in reality were useless in attack, because the commanders didnt have a good perspective of the war and didnt know everything as they would be if they were sitting on horse and overlooking the battle which led to troops often pulling back because of lack of communications and broad view of the battle. In 1914 neither the French nor the British armies were trained for trench warfare. They had to adapt which took them several years and accounted for several of their failures and delays. French generals felt infantry charges were a necessity to win the war despite the huge advances in technology. And Germen generals thought that with enough ammunition and man power and gradually wearing down the enemy they would win the war. Eventually in 1917 the French army refused to attack any more, only to defend because of the horrific numbers of casualties lost for only a few miles gained. A term to explain this was the cannon fodder. The battle of Somme in 1916 is a good example for a shocking case of awful miscalculations by the leadership of both sides; Britain lost around 419,000 men for only a strip of land about 25 km long and 6km wide. These huge loses were due to bad planning. The men were untrained and advanced towards the enemy walking and carrying heavy packs on their backs. These big pushes which was a belief shared by British Kitchener and Haig were mere execution of sides troops as they were walking straight into machine gun fire. The first World War was the first war between two vastly industrialized economies and factories on both sides mass-produced inconceivable amounts of artillery and ammunition. Industry was under an incredible amount of strain and it was not until 1917 that the munitions industry was able to produce adequate quantities of ammunitions. Railways played a major part in the transportation of troops form one area of the western front to the next along with food and other supplies. Both sides were also both able to keep going because of the huge numbers of men and supplies continuously brought by trains and trucks. Basically both the central powers and allies were never in a drought of resources. At the outbreak of war on the Western Front, the Allies and the Germans were relatively equal in their strengths and weaknesses. Bad leadership held up many of the British and French attacks resulting in unnecessary numbers of casualties. Germany spread its men out over many of the fronts not only in the eastern front, but also in the Western Front. One argument is that if perhaps they had concentrated on only one front they may have had a chance of success as opposed to spreading out the troops over a large area. The deadlock ended in 1918 when it was broken by eventual collapse of the central powers. It was ultimately attrition that proved the crucial decider but it was a series of events and inventions that had not happened before which gave way to the end result. The submarine campaign was important as it brought America into the war with fresh troops and much needed resources and resulted in a huge blow to the German morale. In conclusion, there was no one true reason for deadlock on the western front, but that it was due to several problems. Technology advanced too rapidly, generals were not adequately trained for trench warfare. As one quote would say The great war was fought with 20th century weapons and 19th century tactics. The war was able to be kept going due to the fact they were both vastly industrialized economies and neither side was able to eliminate the other since and the governments of both sides directed the industries towards mass production of uniforms, ammunitions, ships, explosives etc
Friday, September 20, 2019
Factors in the Ethical Codes in Research
Factors in the Ethical Codes in Research Second Draft of Training Materials Tiffany Stewart The Ethical Principles are part of the Ethics Code that psychologists follow when practicing. One area of psychology that will be discussed throughout this paper is counseling. The ethical principles will be defined as well as an example of an ethical dilemma that goes against each principle in counseling.There are five ethical principles that need to be followed when practicing professional psychology. These five ethical principles are beneficence and nonmaleficence, fidelity and responsibility, integrity, justice, and respect for peopleââ¬â¢s rights and dignity. Principle A: Beneficence and Nonmaleficence Beneficence and nonmaleficence can be described as doing good and avoiding harm (Fisher, 2013). Doing good in counseling can be providing services to clients/patients that will benefit them. These services can be treatments that will help the individual with a disorder or deal with problems that occur in their life. Avoiding harm to clients/patients in counseling can be making sure the individuals are being diagnosed accurately, and providing treatment that will benefit them for years to come. Principle A Ethical Dilemmas An ethical dilemma that would go against beneficence and nonmaleficence is a treatment program that will not provide positive side effects. The program might help the client/patient in the beginning but end up with negative side effects. An example of this is a client/patient is diagnosed with depression. The psychologist thinks it would be a good idea for the individual to talk to their doctor about getting on an antidepressant. The antidepressant is helping the individual to not be as depressed, but her sex drive drops. Now the client is feeling depressed again because, she does not have that particular bond with her spouse anymore. Another ethical dilemma is a client (Anna) that was seeing a counselor (Dr. Smith) for depression emails her two years later. Anna states that her partner has been going through depression and is having issues with other counselors. Since Anna could trust Dr. Smith, she thinks it would be a good idea for her partner to see this counselor. Dr. Smith is not certain if she should see her partner since Anna used to be a client (Fisher, 2013, p.358). Principle B: Fidelity and Responsibility The second principle fidelity and responsibility is defined as being loyal and making sure psychologists are keeping promises to their clients/patients (Brown Newman, 1992). This means that psychologists need to build a trust with their clients or their coworkers and keep trust by being professional. Principle B Ethical Dilemmas An ethical dilemma that goes against fidelity and responsibility is a psychologist not being confidential with client/patientââ¬â¢s information. An example of this is telling coworkers personal information about the client. Unless the client is harming themselves or another, the information being told to the psychologist needs to be confidential between the two. The trust is also broken between the psychologist and the client when information is told to others that can lead to major consequences like being sued or the psychologist losing their license. A second ethical dilemma that goes against Principle B would be a drug abuse counselor shares information with her colleagues about her sonââ¬â¢s drinking problem in college. She asks them for advice on occasion on what she should do about the problem (Fisher, 2013, p. 106). Principle C: Integrity The third ethical principle, integrity, helps psychologist to be honest, accurate and truthful in practicing psychology (Bodner, 2012). This can focus on a psychologistââ¬â¢s work in not cheating or stealing other peopleââ¬â¢s work and making it theirs. Psychologists also need to be aware of deception can be used in experiments. When deception is included in experiments, the researchers need to make sure that harm is avoided. Principle C Ethical Dilemmas An ethical dilemma that goes against integrity in counseling is a psychologist gives out information that is not accurate. This could be changing the title of their job on their business card or on their website even though that is not what they got their degree in. This gives false information to individuals that are looking for a particular counselor. In addition to the first ethical dilemma under this principle is a psychologist finds out his patient does not have insurance but her daughter does. He decides to help her out and bill the insurance company under the daughterââ¬â¢s policy (Fisher, 2013, p. 193). Principle D: Justice The fourth principle, justice, is to treat people fair and equal. This involves using the appropriate treatments that fit the needs of clients/patients (Fisher, 2013). Psychologists also need to remember that they cannot be biased when it comes to treating patients. Principle D Ethical Dilemmas An ethical dilemma that goes against justice could be that psychologist decides to provide a shorter treatment for a single mother that does not make a lot of money. The psychologist has never done this before but knows the mother cannot afford the cost of the normal treatment time. The second ethical dilemma that goes against Principle D is a school psychologist considered certain factors, including age and language to help determine where to place children in educational recommendations (Fisher, 2013, p. 92). Principle E: Respect for Peopleââ¬â¢s Rights and Dignity The fifth principle, respect for peopleââ¬â¢s rights and dignity, remind psychologists to give respect to the people that they work with as well as knowing that the people that they work with have rights (Lowman, 2005). These rights involve knowing their personal information is confidential and being informed of information to help them understand what is going on in the experiments they are involved in. Principle E Ethical Dilemmas An ethical dilemma that can bring problems with the fifth principle is if a psychologist has problems with a homosexual client/patient. The psychologist decides to work with a client that is homosexual. After a few sessions, the client states that he is starting to have feelings for the psychologists. The clinical psychologist no longer felt he could help the client and decides to send him to another psychologist without explanation (Lowman, 2005). Another ethical dilemma would be a counselor informing the parents that their child has attention deficient disorder on the first session. The psychologist would base this information by just observing the child instead of appropriately diagnosing the child (Fisher, 2013, p.268). These five ethical principles are defined to explain why counselors should follow them when practicing psychology. Two ethical dilemmas were provided for each principle to show what can happen when they are not being followed. It is important that counselors become familiar with the terms to avoid any possible consequences that can occur. References Bodner, K. E. (2012). Ethical Principles and Standards That Inform Educational Gatekeeping Practices in Psychology. Ethics Behavior, 22(1), 60-74. doi:10.1080/10508422.2012.638827 Brown, R. D., Newman, D. L. (1992). Ethical Principles and Evaluations Standards: Do They Match? Evolution Review, Vol. 16, No. 6, 650-663 Fisher, C. B. (2013). Decoding the ethics code: A practical guide for psychologists. Thousand Oaks, CA: Sage Publications. Lowman, R. L. (2005). Respect for Peoples Rights and Dignity. Journal Of Aggression, Maltreatment Trauma, 11(1/2), 71-77. doi:10.1300/J146v11n0106
Thursday, September 19, 2019
Essay --
Psychiatry Psychiatrists are physicians whose jobs focus on the prevention, diagnosis, and treatment of mental, addictive, and emotional disorders. With a few family members with mental and behavioral disorders, psychiatry stands out to me as a job I would really like to do. It has made me realize how scary these disorders can be and how important the right treatment is. My parents, my grandparents, and many aunts and uncles have professions in the medical field, ranging from pharmacists, family practitioners, to anesthesiologists, but no psychiatrists. Doing something in the medical field has always been both a dream for me and an expectation from my family. Psychiatry is something that I have always been interested in and would like to maybe pursue later on in life. What do psychiatrists do? Psychiatrists specialize in mental, emotional, and behavioral disorders. They can prevent, diagnose, and treat these disorders by helping patients and their families deal with things such as stress and crises, diagnostic tests, psychotherapy, and prescribing medication. Psychiatrists have ...
Essay --
Air pollution has become a major public health issues and it harms both human health and the environmental, over time in Europe air pollution have decrease greatly (EEA 2013), and this air pollutants include carbon monoxide (CO), ozone (O3), nitrogen dioxide (NO2), particulate matter (PM), sulfur dioxide (SO2) and also lead (pb) (WHO 2011), particulate matter and Ozone are now been identify as the two main pollutant that have most major effect on human health, long or short exposure to this pollutant can have both mild and severe impact on health such as impaired respiratory system, cardiovascular diseases or even death (EEA 2013), also exposure to particulate matter decreases life expectancy by an average of one year, indoor pollution as a result of the biological agents in the indoor air which is due to damp and mould also increase the risk of developing respiratory disease in children, there are two man type of pollutant which are the primary pollutant (WHO fact sheet 2011). Pollu tant can be classified into two namely primary pollutant and secondary pollutant; primary pollutants are the pollutants release directly into the atmosphere from the source while secondary pollutants are those type of pollutant forms when primary pollutants react with other chemical in the atmosphere, also type of pollutant and concentration can be indoor or outdoor pollutant, indoor pollutant include carbon monoxide, nitrogen oxide, volatile organic compounds and smoke, while outdoor pollutant are ozone, sulphur dioxide and particle. (COMEAP 2013) WHO define health as a state of complete physical, mental and social well-being and not merely the absence of disease or infirmity (WHO 1948) Environment generally affects human health directly or indirectly... ...ssion standards of generator plants, industries emission and car emissions. - Deforestation bush burning and also incinerator burning should be barn all around the country in other to improve the air quality. - Laws should be put in place to barn public smoking as its been done in United Kingdom. - Long chimneys should be compulsory for all industries making use of fossil fuels and also emitting smoke into the atmosphere to avoid pollutants and acid rain which also affect the health of the populace. CONCLUSION Good air quality is vital for human health, Air pollution expose human to ill-health and by reducing the level of pollutant emission in the atmosphere general risk of disease can be reduce worldwide; considerable reduction in the exposure to air pollution can be achieved through the decrease in the concentration of the pollutants in the atmosphere.
Wednesday, September 18, 2019
Essay --
Jerusalem is the beholder of a violent, yet religious, past. It is the holy center for three of the worldââ¬â¢s major religions: Christianity, Judaism, and Islam. It was the center for many battles and the motivation for the Crusades. The Crusades were the cause for much blood shed and marked the beginning of a long war between Islam and Christianity. However, most of the focus in history of this holy center begins with the Crusades and continues there after, so this is where the essay will be focused: the times and history of Jerusalem before the Crusades. The city of Jerusalem is located in modern day Israel and was established around 4000 BC. The early history of Jerusalem is up to debate between the records kept by the various texts and accounts left by early inhabitants. It was inhabited by the Jebusites for a long period before Abraham, or any other occurrences that gave Jerusalem its early background. It is said to have been ruled by an ally of Abraham, Melchizedek, until King David, around 1000 BC, took over the city and founded it as a homeland for the Jews. This began the first official reign of a religion over the city, for no religious significance nor reign had control over the city. Jerusalem became the capital of King Davidââ¬â¢s empire, and for a period of time, under his sonââ¬â¢s rule, it was a major trade city and was very significant among the surrounding peoples. After King David died in 970 BC, his son, Solomon, took over and fabricated the first Temple in this holy city run by the Jewish people and functioning upon their beliefs. This temple became known as the great temple as it was added upon over multiple years by varying skilled architects. Solomonââ¬â¢s rule brought the city success, but after his death Davidic ruler... ...hich triggered the Roman decision to rebuild Jerusalem as a non- Jewish Roman territory. It remained a regular territory with no religious rule until the Byzantines conquered it in 330 A.D. and instated it as a Christian city. The Jewish people werenââ¬â¢t allowed to live within the city. About 300 years later, the Persians took over the city from the Byzantines and it was ruled by these pre-Islamic rulers until 629 A.D. The Byzantines took back over, but only began to rebuild the once again Christian city when the Caliph Omar invaded Jerusalem and began occupying the city in 638 A.D. This was the beginning of the Crusades. Jerusalem has had a long and horrible history with many different political and religious occupations leading up to the Crusades and even after. Jerusalem is a very important city in human history amongst its various leaders and various occurrences.
Tuesday, September 17, 2019
Health prevention Essay
Health promotion according to World Health Organization, ââ¬Å"Is the process of enabling people to increase control over, and to improve their health. It moves beyond a focus on individual behavior towards a wide range of social and environmental interventions.â⬠In this assignment I have chosen three articles talking about the different health promotions. I will start with my article on teen suicide and primary prevention, then stroke article and secondary prevention and then depression and tertiary prevention. Primary Prevention My first article called, Preliminary Effectiveness of Surviving the Teens Suicide Prevention and Depression Awareness state, ââ¬Å"Currently, suicide ranks as the third leading cause of death among youth ages 15-24 years.â⬠This article talks about schools, since children are in school most of the day, using this time to talk about preventive ways to stop suicide. For this article health care prevention is defined as a way to teach students about increasing awareness and knowledge of suicide intervention, risk factors and warning signs of depression and suicide but to also teach problem solving and coping skills to our teenagers. (King, Strunk & Sorter, 2011) If we put all these together, school nurses and teachers can increase adolescent students to have better self-esteem, self-efficiency, and can increase their coping/problem solving skills and also, communication skills. We can teach the students about dealing with stressors and what good health behaviors are. This program called, ââ¬Å"The Surviving the Teens Suicide Prevention and Depression Awareness Program,â⬠is a school based program that helps with prevention of suicides and was developed by and registered nurse named Catherine Strunk. This school based program was offered by Cincinnati Childrenââ¬â¢s Hospital Medical Center in the Psychiatry Division. This programà is learned more towards kids in the high school setting. The classes are four days and 50 minutes per class. In this class a nurse can teach students and present them with factual information regarding depression, risk factors, suicide warning signs, suicide risk factors, and common myths associated with suicide. (King, Strunk & Sorter, 2011) The program covers so many areas and addresses different things. For instance, mental health, substance abuse, social and school stressors, trauma, grief and loss, just to mention a few. If states would adopt this program, I believe that students would benefit by implementing this program in high schools. It teaches children so many ways to cope in school and the outside world. This program teaches them the necessary skills to get through life and it helps them with self-esteem issues as well. School nurses and teaching staff can come together to help our children out so there will be less suicide attempts among children in this age group. To implement this once we got the program in our schools we would first have to get consent from the parents of our students. If we can teach our children about suicide and the risk factors along with reaching the skills and give them help with self-esteem we can prevent so many kids from attempting or succeeding at suicide. This program would be a major benefit in our school systems today. Secondary Prevention The second article chosen talks about secondary prevention in people who have already suffered one stroke. Emmie Malewezi, who wrote the article titles, Stroke policy and secondary prevention: how well are we adhering to these guidelines stated, ââ¬Å"Recurrent stroke is more likely to be fatal than the first stroke and survivors are more likely to be left with major disability.â⬠Strokes or Transient Ischemic Attracts or TIA for short, are very serious and after a patient has a TIA or major stroke is likely a recurrence of another one will happen within 90 days of the first stroke. (Malewezi, 2011) It is so important for a secondary prevention to start immediately and continue into their long term prevention. There are a few areas that are recommended for secondary prevention in stroke patients. First one is lifestyle modifications or changes. Patients who has had a stroke need to realize the importance of changing their lifestyle with exercise, diet, smoking if they were a smoker, weight, and alcoholà consumption. Nurses and family should be there to support the patient and nurses can help come up with a plan to help with modifying the patientââ¬â¢s lifestyle. ââ¬Å" By increasing physical activity, losing weight, reducing sodium and alcohol intake, people have been shown to reduce systolic blood pressure and thus reducing their risk of stroke,â⬠as stated by Emmie Malewezi. Another standard protocol for secondary prevention is an antiplatelet therapy. It has been shown research that if you use a combination of Aspirin with Dipyridamole will lower the risk of future vascular events then just taking Aspirin by itself. With patients who have Atrial Fibrillation, for example, should be on anticoagulant medication like Warfarin. The problem with Warfarin is the side effect of bleeding. This is why some physicians donââ¬â¢t necessarily want to prescribe it due to the risk of falling and then bleeding out. Lastly, a lipid medication is usually prescribed at discharge because high cholesterol or also called Hyperlipidemia can cause strokes as well. The nursing and Midwifery Council identifies health promotion as an important aspect of nursing practice. (Malewezi, 2011) Nurses are responsible for the role of secondary prevention by making sure they set aside time to sit with the patient and discuss and reinforce lifestyle modifications they are at such high risk for another stroke. In hospitals we now have stroke teams and patients are being seen quicker and discharged faster. This makes it impossible for the nurse to always go over all the secondary prevention needed for that patient. We need to get a plan established to make sure the patient can get all the information they need about their therapy and make sure the patient are aware of their medications, whether the medication is a new one or one they have already been on. Also, nurses need to make sure patients no how to take their medications. Sometimes problems like swallowing issues becomes a problem due to the stroke and we need to make sure the patient isnââ¬â¢t going to have a problems swallowing their medications. Secondary prevention is important for stroke patients and nurses need to understand their role they play so we can prevent another stroke in our patients. Tertiary Prevention Tertiary prevention in the third article talks about the promotion ofà recovery and prevention of relapse for depression. This article is called Prevention and Management of Depression in Primary Care and it states, ââ¬Å"Timey recognition of depression is essential to improve patientââ¬â¢s mental health in quality of life.â⬠Depression can happen for so many reasons and some of those reasons are physical illness, financial issues, or even post-partum after child birth. The problem is suicide is a big risk when people become depressed if they are not given the help they need. For the patients who have developed depression and are being treated for it are now at the level of tertiary prevention. Tertiary prevention helps the patients by reducing the effects of the mental health condition on patients function and quality of life. Nurses can do this by giving support and encouragement. It is crucial for the nurses to teach their patients to take their antidepressants daily and to not stop them so relapse of depression doesnââ¬â¢t occur. The other role of the nurse that is vital in tertiary prevention is to make sure they ask their patients if they are becoming hopeless or wishing to hurt themselves by suicide. This is necessary because family history or past attempts of suicide is a big risk factor. If a patient tells a nurse that they have suicidal thoughts the nurse needs to be responsible to see if they have any support like family and friends so they can be taught about watching the patientââ¬â¢s mood, increased negativity, hopelessness or suicidal intent. If family or friends see any of these changes they need to call and get help for the patient. If the patient is at immediate risk the nurse needs to refer them to a mental health facility. Levels of Prevention In closing primary prevention helps healthy patients stay healthy and prevent or develop disease. Secondary prevention are for patients who have already been diagnosed and now needs to be taught how to slow down or stop the progression of a particular disease. While tertiary prevention is about management of a disease like diabetes, stroke, depression, heart disease or even cancer. Nurses play a vital role in each level of prevention to ensure good, quality health to our patients. References Hardy, S. (2013). Prevention and management of depression in primary care. Nursing Standard, 27(26), 51-56. King, K. A., Strunk, C. M., & Sorter, M. T. (2011). Preliminary Effectiveness of Surviving the Teensà ® Suicide Prevention and Depression Awareness Program on Adolescentsââ¬â¢ Suicidality and Self-Efficacy in Performing Help-Seeking Behaviors. Journal Of School Health, 81(9), 581-590. doi:10.1111/j.1746-1561.2011.00630.x Malewezi, E. (2011). Stroke policy and secondary prevention: how well are we adhering to these guidelines?. British Journal Of Neuroscience Nursing, 7(6), 684-690. World health organization. (2013). Retrieved from http://www.who.int/topics/health_promotion/en/
Monday, September 16, 2019
Optical Illusion on Oedipus Rex and Othello
The theme of appearance and reality is such a dominant one in Oedipus Rex and Othello, and the obsession with appearance plays such an important part in bringing them closer to Oedipusââ¬â¢ and Othelloââ¬â¢s tragedy, that the plays can be termed a tragedies of appearance in human life, in which the opposite of appearance is truth or reality. But this theme of uncertain vision is presented through different thematic expression in bith tragedies. Sophocles takes an internal element of character into consideration whereas Shakespeare hold a mixture of internal and external elements responseble fior the optical illusions of Othello and other characters in the play. At first it is on behalf of appearance that we see a battle waged in Oedipus red. As this battle progresses we see appearance losing more and more ground. The first stage in it is the institution of the divinely-instructed enquiry into the death of Laius, which means that the appearance of it that it was the work of outland robbers-is not trusted. Quite early in the enquiry, Oedipus is led astray by an appearance-that the robbers who were alleged to have attacked Laius must have been associated with Thebes, and the suspicion that Creon must have at their back. `the question points to Creon. Creon gives the appearance of evading it. The suspicion, he says, that unavoidably arose could not be pursued after the deed. Why not? The sphinx cameâ⬠¦ for some time after this, to be sure, the suspicion seems to lie dormant. But the focus of attention is no longer on the scene of the crime, or the way it happened, but rather on those who were ultimately responsible, and Thebes. Then suddenly, after the quarrel with the hostile and apparently malevolent prophet, the suspicion is confirmed, the connection between Creon and Teiresias is established, and the existence of a whole web of enmity stands corroborated as fact. ââ¬â¢ Oedipus suspects that the robbers were bribed to play their part, and ultimately he thinks that both Creon and Teiresias were behind them. Thus the supposed existence of a plot to murder Laius is another appearance which leads Oedipus astray. So Oedipus is to become concerned with appearances which it becomes his lifeââ¬â¢s mission to investigate, so that he may get at the underlying truth or reality. Appearance and truth come into picture also in the discussion of faulty vision of Oedipus. Another manifestation of Oedipusââ¬â¢ obsession with appearance is his intellectual myopia. He has a limited vision and is unable to assess the situations in a right perspective. Robert L. Kane (1975) puts this preposition in this way; ââ¬Å"He[Oedipus] was the victim of an optical illusionâ⬠. (p. 196) The juxtaposition between ââ¬Å"outward magnificence and inward blindness of Oedipus and the outward blindness and inward sight of the prophetâ⬠(Kirkwood, p. 30) depicts two types of blindness i. e. physical and intellectual. One is related to physical sight whereas the other, the most pernicious type of blindness, pertains to insight. Teiresias is physically blind but whereas Oedipus is blind intellectually. This intellectual blindness of Oedipus also contributes greatly to his believe in appearance rather than truth and ultimately leads him to his tragic destination. Oedipus pos sesses faultless physical vision throughout play except in the end but he remains blind to the reality regarding himself. At one point in the play, he has the ability to see but he is not willing to do so. Additionally it is his faulty intellectual insight make him believe in the apearence of some unknown enemy and he pronounces on him the sentence of outlawry and also uttes a curse on him. The reality of it that it is on himself that he is passing both the sentences, is umknown to him. However, we may notice that the gradual and increasing loss of Oedipusââ¬â¢ detachment and the growing references to himself raise the suspicion that unconciously Oedipus know what reality lies hidden behind the appearance. Unlike Oedipus Rex, in Othello it is the machination of Iago that blurs the visiioon of Othello and deprives ââ¬Å"noble Moorâ⬠to distinguish between reality and apprearence. Othello, together with several other characters largely depend on their visual faculties that is distorted and warped by the skillfull trickery of Iago. These character along with Othello base their conclusion about realities what apears to them and do not delve deep into the reality of the things. But unlike Oedipus their optical allusion is not result of something inherent in their charcter. Othello is intelligent enough that he knows that looks can be decieving but Iago trciker blinds him. For example, Othello notices that Cassio walks off swiftly after having a conversation with Desdemona. Although Othello does not see incongruity in their meeting but Iago presents this meeting differently and sneakily. Iago murmurs to Othello, ââ¬Å"â⬠¦I cannot think it, that he would steal away so guilty like. â⬠(lll,iii,42) Here the machination makes the vision of Othello illusory and he concludes erreaneously as he says, ââ¬Å"â⬠¦I do believe ââ¬Ëtwas he. (lll,iii,44) But as a matter of fact, Cassio and Desdemona converse about getting Cassioââ¬â¢s job back as Desdemona says to Cassio: I knowââ¬â¢t. I thank you. You do love my lord; /You have known him long; and be you well assured He shall in strangeness stand no farther off Than in politic distance. (lll,iii,11) But Othello believes what he observed and percieved through the lenses of suspicion that iago sowed in his mind. This lead to a dilemma that becomes unfixanle later and ultimately leads to the tragedy of Othello. This is interesting to note that all characters in the play, except for Roderigo (to whom Iago sometimes shows his real face) have a high opinion of Iago and refer to him as ââ¬Å"honest Iagoâ⬠. The Mutual relationship between Iago and Othello is of trust and reliance on the part of Othello but it is conniving and devious on the part of Iago. Iago has same relationship with Cassio. Cassio is also deceived by the seeming virtue of Iago and actually believes that ensign is a kind-hearted man. But at the same time is a rival to Iago in the royal court. Unlike pride in Oedipus over his abilities, it is element of trust that deprives Othello of his vision and makes him believe in appeareance as ultimate reality. Although when Iago starts working on Othello, he suspects him and asks for evidence, yet from the beginning of the play, he seems to have put entire confidence in the honesty of Iago, who had not been his companions in arms. This confidence is misplaced but it is no sign of stupidity in Othello. He does not have a distinctive fear of him. We find this even before Iago has set a trap for him. Othello fears the monster ââ¬Å"too hideous to be shownâ⬠that he discerns about Iagoââ¬â¢s thoughts. This manifests a strange relationship based on paradoxical feelings. It is of confidence, trust and fear. But latter events show that Othelloââ¬â¢s trust in Iago overpowers the instinctive fear. This happens due to Othelloââ¬â¢s non-meditative nature. He does not contemplate over issues and does not weigh their motive and consequences. A. C. Bradley rightly says in this regard; The sources of danger in this character are revealed but too clearly by the story. In the first place, Othello's mind, for all its poetry, is very simple. He is not observant. His nature tends outward. He is quite free from introspection, and is not given to reflection. Emotion excites his imagination, but it confuses and dulls his intellect. (p. 217) Above-mentioned arguments and supporting textual and extra-textual evidence clearly suggest that in Oedipus Rex, it is something habitual and internal in the chracter of Oedipus himself who is unable to distinguish between what seems to be and what actually is whereas it is an external element (Iago) as well as an internal element (his thorough trust on Iago) in Othello that leads to the optical illusion.
Sunday, September 15, 2019
Coloplast company Essay
Executive Summary Coloplast, an international company that specializes in developing, manufacturing, and marketing medical devices, implemented an off-shoring strategy in order to stay viable, competitive and keep in focus the dynamic market needs. Implementing this strategy has brought some issues that were unexpected for Coloplast. One of the issues was with the organizational structure. Coloplastââ¬â¢s off shoring involved moving operations to Hungary. They would be operating with Danish and Hungarian production plants, where production processes were not the same. Misunderstandings and miscommunication arose amongst employees and created managerial and operational challenges. Another issue that arose was knowledge management and this became a problem since there was very limited documentation on inconsistencies in equipment operation as well as no proper standardization of systems in place. The solution to these problems is to implement company wide processes that help standardize both Hungarian and Danish plants. Employee motivation and communication is another issue and this is attributable to the resistance to change which many employees face. Coloplast didnââ¬â¢t look at these issues with offshoring as their costs were rising locally and they needed to mitigate that cost. Coloplast should expand to China where labour is even cheaper than Hungary. It is an offshoring move that must be looked at in order for Coloplast to maintain their economies of scale. The further reduction of costs with their experience from offshoring in Hungary allow Coloplast to enter the offshoring process to China with a greater understanding in all that it entails, and the possible pitfalls that can arise. Issue Identification One of the issues faced was that of the interdependent relationship between the Danish and the Hungarians. There were operational assumptions and activities. Nobody factored in how significant the language barrier would be. It proved to be a significant enough factor that it warranted unexpected time and money to rectify the problems Coloplast faced. There was a lack of knowledge transfer from the Danish operators to the Hungarianà operators and this resulted in operational inefficiencies. The other issue involved the human resource aspects such as limiting attrition rates, limiting social hardship, and transferring knowledge effectively. Environmental and Root Cause Analysis Certain trends shifted power towards the consumer in Coloplastââ¬â¢s industry. Although Coloplast saw the need to offshore or outsource, their decision was based on them trying to focus on their core business and to increase efficiency, the prime motive was to cut costs. They chose to offshore as this entailed lower cost and availability of skilling workers. They did not want to rely on third parties, and third parties lack the in house knowledge needed for Coloplastââ¬â¢s operation. Coloplast was seriously considering relocating to a low cost location for some time. They were in danger of certain factors such as reimbursement, policy changes, price pressures due to wholesaler concentration, and powerful insurance companies. They felt there were distinct advantages to off shoring as opposed to outsourcing as the competitive advantage of offshoring to Hungary as they developed a much better ecosystem for Coloplastââ¬â¢s business. This means there is better availability of ski lled human resources in that region for specific types of tasks. Their establishment in Hungary was due to the significant savings in production costs, which were 20 percent less than Danish levels. After they had factored in wage increases, Coloplast was convinced this offshore move would be financially advantageous in the long run. Building costs were 50% less in Hungary than Denmark. Cost considerations were an issue, but logistical considerations were weighed to be more important. The root cause factors lay in the rollout of the offshoring project. Large regional differences existed within Hungary in terms of wage and infrastructure. Coloplast was located on the attractive side of Hungary and other major companies were close by, which played a part in their decision to off shore. Although the relocation of operations involved mature product lines, the decentralized structure still made documenting planning and production systems difficult. The operations at the Danish site were not standardized, thus making it harder to offshore to Hungary, who had their own operations. The Danish factories felt that their organized production was unique to eachà of them and couldnââ¬â¢t be replicated. There were no product manuals and they had to be created proper production techniques and equipment operation. This would then have to be translated to Hungarian, and this processes impact was not properly assessed. The transfer of knowledge and training that required human interaction was not properly addressed beforehand either. Alternatives or Options Expand in Europe. Many locations were scouted before Hungary was implemented, and there are several Eastern Bloc countries with low wage, and production costs. However, there is more risk in operating in one of these countries as the geopolitical implications in these countries can cause cost savings to be eroded. They can also see the feasibility in many countries such as Poland, Ireland, and the Czech Republic. They have already offshored and Coloplast felt that it could further improve incentives to strengthen transfer of knowledge in their next venture. The regional attraction was there with Hungary, and the cost savings did occur for Coloplast, thus making offshoring to another European country a feasible option. Europe has already lowered its offshoring walls following a global trend, and this could be attractive for Coloplast if the geographical distance to China were a concern. Recommendation and Implementation Relocate to China. Now that Coloplast has realized its deficiencies in their process with the offshoring to Hungary, they can mitigate these for the future in their relocation to China. The whole initial decision to offshore in the first place was to reduce cost. Hungary was less costly than Denmark, and China is less costly than Hungary. It makes business sense to relocate to China production wise, as the wages are significantly lower than the Danish and Hungarians. There are organizational challenges in this implementation in that the geographical distance between Denmark and China can amplify many of the scenarios that arose from their offshoring to Hungary. Their knowledge transfer must be coordinated well in advance withà any offshore implementation. They must establish well-set corporate guidelines on how to relocate and manage production sites in advance of any physical offshoring move. Maintain a high level of information and communicate in a direct manner. Leave no interpr etation, and build relationships. They must learn from the mistakes identified with their previous project. They must also apply the best practices from Hungary and include the idiosyncrasies of the Chinese business environment. The environment is drastically different from the environment they operated in Denmark and Hungary. These differences must be identified, and transitioned, as to make the offshoring smooth and sufficient. They will need to start with having Danish representatives make a presence in China in their facilities. It is important in business relations in China to have a level of trust with their employers, and customers. Establish substantial resources while further fine-tuning internal decision making processes and procedures in order to integrate their production unit with headquarters and production in Denmark. Monitor and Control Representatives from Coloplast in Denmark can have all their operational efficiencies set and can ease the process of off shoring by starting out with some local Danish representatives ease in the process with their physical presence in China. Work in conjunction with the Chinese workers in order to have them gain their trust, and a more direct line of knowledge transfer. Having set guidelines and policies in procedures will leave out any room for misinterpretation, such as what occurred in Hungary. Key KPIââ¬â¢s can be set for the offshoring project such as Total Cost vs. Total Cost Savings. Monitoring the metrics of expenses and comparing those expenses to their current operations will be a good indicator of any cost savings. Human capital must be monitored, as human resources were an issue that was already identified in Hungary. Turnover, and training costs must be monitored, recorded and reported.
Saturday, September 14, 2019
Terrorism And Human Rights Abuses
Terrorism and Human Rights Abuses in the Balkans, Eastern Europe and the Persian Gulf The Balkans, despite being a relatively small area, is home to an expansive assortment of nationalities, cultures and religions (Popescu, 2008). Hence, it is inevitable that any changes in the balance between them will have important political, social and economic consequences that will affect the entire region (Popescu, 2008). Terrorist groups took advantage of the instability brought about by the distrust of Balkan societies in their respective governments (Popescu, 2008).As a result, they easily turned the region into a breeding ground for extremist and fundamentalist groups, as well as a ââ¬Å"transit corridorâ⬠for missions in third countries (Popescu, 2008). The war in Bosnia-Herzegovina in the 1990s, for instance, originated from the desire of the Bosniaks (Bosnian Muslims) to establish an Islamic state (Popescu, 2008). They used Islam as a ââ¬Å"nationalistic rhetoric,â⬠equating the survival of their country with the restoration of Muslim national identity (Popescu, 2008).The Bosniaks were supported by Islamic countries such as Saudi Arabia, Afghanistan, Kuwait, Libya and Iran, providing them with weapons and soldiers (Popescu, 2008). From 1992 to 1995, 6,000 ââ¬Å"Arab-Afghanâ⬠rebels came to the country to fight in the hostility (Popescu, 2008). After 9/11, majority of the charitable institutions in Bosnia-Herzegovina were investigated and closed down due to their alleged ties with terrorist organizations like the Al-Qaeda (Popescu, 2008). In March 2002, police raided the BosanskaIdealna Futura-BIF, a Sarajevo-based humanitarian organization (Popescu, 2008). They found military manuals, forged passports, weapons and personal correspondence between Osama bin Laden and BIF founder Enaam Mahmud Arnaout (Popescu, 2008). Human rights abuses by Persian Gulf nations (Saudi Arabia, Iraq, UAE, Kuwait, etc. ) and terrorist attacks against US interests were b oth intended to supress political opposition. Despite publicly denouncing ââ¬Å"American imperialism,â⬠the aforementioned countries are notorious for grossly violating the human rights of their citizens (Simbulan, 2002).Majority of political prisoners in the Persian gulf nations were detained for speaking out against corruption and totalitarianism in their respective countries (Simbulan, 2002). Prominent Omani playwright and human rights activist Abdullah Ryami was imprisoned on July 2005 for vocally criticizing the Omani government's arrest and trial of 31 Omanis belonging to the Ibadi sect for allegedly plotting a coup (Human Rights Watch, 2005). At the time of his incarceration, he had no contact with his family or a legal counsel (Human Rights Watch, 2005).He was also banned from writing in newspapers and producing plays for television (Human Rights Watch, 2005). On December 2007, activists in Bahrain staged a series of demonstrations to ââ¬Å"mark abuses by security for ces during political unrest in the 1990sâ⬠(Human Rights Watch, 2008). Dozens of people were arrested in the violent dispersals that ensued, including opposition political activists who protested the Bahraini government's repression of civil liberties (Human Rights Watch, 2008). In January 2008, detainees complained of being subjected to physical and sexual abuse by interrogators and jailers (Human Rights Watch, 2008).The prisoners' request for independent physicians to examine the extent of their injuries was also denied (Human Rights Watch, 2008). The collapse of the Soviet Union contributed to terrorist activities in Eastern Europe by making its newly-formed republics more vulnerable to American military intervention (Howstuffworks, 2008). After the Soviet bloc fell, the US emerged as the world's remaining superpower (Howstuffworks, 2008). The breakup of the Soviet Union granted the US easy access to its natural resources, particularly oil (Howstuffworks, 2008). The paragrap h below summarized the region's potential:Afghanistan occupies the central position in the U. S. strategy for the economic control of the oil and gas resources in the entire Middle East. The U. S. currently imports 51 per cent of its crude oil ââ¬â 19. 5 million barrels daily. The Energy Information Administration estimates that by 2020, the U. S. will import 64 per cent of its crude ââ¬â 25. 8 million barrels a day. Caspian region oil reserves might be the third largest in the world (after Western Siberia and the Persian Gulf) and, within the next 15 to 20 years, may be large enough to offset Persian Gulf oil.Caspian Sea oil and gas are not the only hydrocarbon deposits in the region. Turkmenistan's Karakum Desert holds the world's third largest gas reserves ââ¬â three trillion cubic meters ââ¬â and has six billion barrels of estimated oil reserves. Current estimates indicate that, in addition to huge gas deposits, the Caspian basin may hold as much as 200 billion b arrels of oil ââ¬â 33 times the estimated holdings of Alaska's North Slope and a current value of $4 trillion. It is enough to meet the U. S. ââ¬Ë energy needs for 30 years or more (Yechury, 2001).Hence, it was no longer surprising if the US declared war against the Taliban regime of Afghanistan. But majority of the extremist and terrorist groups in the former Soviet Bloc and in Eastern Europe are allied with the Taliban, as the Taliban provided them with weapons, training and manpower (Godoy, 2001). Therefore, the US will have to face a bigger threat of terrorism in Eastern Europe. References __________. (2002, October). The Oil Equation in the US Bid against Iraq. Education for Development, 1, 15-16. Capdevila, G. (2002, October).Outgoing UN Human Rights Chief Repeats Criticisms against US. Education for Development, 1, 30-31. Deen, T. (2002, October). UN Credibility at Stake over Iraq, Warn Diplomats. Education for Development, 1, 10-11. Godoy, J. (2001, November 15). US P olicy Towards Taliban Influenced by Oil ââ¬â Authors. Retrieved February 28, 2008 from http://www. commondreams. org/headlines01/1115-06. htm. Howstuffworks. (2008). The Fall of the Soviet Union and the Rise of Terrorism. Retrieved February 28, 2008 from http://history. howstuffworks. com/cold-war/the-cold-war-timeline4.htm. Human Rights Watch. (2005, July 18). Oman: Critics Subjected to Injustices They Had Exposed. Retrieved February 28, 2008 from http://hrw. org/english/docs/2005/07/18/oman11343. htm. Human Rights Watch. (2008, January 21). Bahrain: Investigate Alleged Torture of Activists. Retrieved February 28, 2008 from http://hrw. org/english/docs/2008/01/21/bahrai17838. htm. Human Rights Watch. (2008, February 16). Bahrain: New Allegations of Detainee Abuse. Retrieved February 28, 2008 from http://hrw. org/english/docs/2008/02/16/bahrai18083.htm. Lobe, J. (2002, October). US Vision of Might and Right. Education for Development, 1, 3-5. Popescu, Teodora. (2008). Tackling T errorism in the Balkans. PDF File. Retrieved February 28, 2008 from sparky. harvard. edu/kokkalis/GSW9/Popescu_paper. pdf. Simbulan, R. (2002, October). Why the UN Must Defend Iraq against the US War of Aggression. Education for Development, 1, 48-50. Yechury, Sitram. (2001). America, Oil and Afghanistan. Retrieved February 28, 2008 from http://www. hinduonnet. com/2001/10/13/stories/05132524. htm.
Subscribe to:
Posts (Atom)