Monday, September 30, 2019

Explore the Theme of Kingship and Ruling in Sophocles’ Antigone.

In Sophocles’ Antigone, the audience experiences a catharsis wherein sympathy and fear is evoked for Creon, a tragic hero whose Kingship was spoilt by corruption, human fallibility and pride. Throughout the play, Creon has demonstrated how even rulers with a strong moral stance can still fail in their attempts to do good, unfortunately due to exceeding the limits of their humanity. To begin, the tragedy that befalls Creon as a man devoted to his country and to his religion seems to feel undeserved.Creon declares â€Å"whoever places a friend above the good of his own country, he is nothing† as an expression of his loyalty to his State; the dramatic element is accentuated through the term â€Å"nothing† which reverberates off the script in an echo that demands the viewer’s reverence and attention. In this way, Creon’s stance on leadership is magnanimous because Creon no longer works on the order of his family’s needs but on the order of the Go ds and his state.To highlight this, we see the chorus exclaim: â€Å"the king of the realm is coming†¦ whatever the gods are sending now†¦ / what new plan will he launch† The significance of this â€Å"realm† is interpreted as something divine yet disconnected from humanity, so as to highlight Creon as merely a servant to the Gods. In this sense, Creon is a character that is empathized with for his respect towards the Gods, thus his actions can be attributed to the will of the Gods. â€Å"Exactly when did you last see the gods celebrating traitors? Inconceivable! exclaims Creon, whose actions are characterised by a morality modeled after their will. A modern audience will interpret the duty of the King to come as a direct order from the Gods, therefore whatever law Creon enacts, and whatever cause he chooses to pursue, would have been the Gods’ law. The question thus arises: was Creon’s tragedy truly of his own doing? The authority of the King diminishes when put into perspective with the Gods, and the audience can view how even a man of superior rank can still be thwarted by the almighty powers of God.This, as a result, can reinforce a feeling of fear, or caution for those watching. However, one question seems to question the purity of his intentions: â€Å"Am I to rule this land for others—or myself? † Although, contextually speaking, this question was meant to demonstrate his loyalty to the state, it does include dark, subtle undertones that could reveal Creon’s hidden intention. The hyphen in the ending of the question â€Å"—or myself? † seems to delay the response and give a slight hesitance to Creon’s speech.The question stands: does Creon make decision because he believes it is best for his country? Or does he rule because the influence of power has enabled him to act upon his own bias? Creon’s kingship creates an extension of itself with Haemon, whose â€Å"flesh and blood† describes how profoundly connected Haemon is to his father. The tie between Creon and Haemon explores how kingship challenges both the emotional and human relationship between father and son. Perhaps he invests so much of himself into the idea of â€Å"father and son, the same blood† that a part of him equally dies with his son.Haemon has been included into Creon’s life as an indispensable structure, a piece inseparable piece from the framework of Creon himself. In fact, Creon cries to the â€Å"harbor of Death† asking â€Å"why me? why are you killing me? †, thereby portraying how the blood link that connects both father and son is interwoven in their lives so that one life is married to the other. Creon describes himself as a â€Å"shattered† man after the death of his son, thereby illuminating his vulnerability as a flawed human being.As such, the audience, witnessing his fall, can experience a heightened catharsis knowing a man of such supremacy can crumple so easily and in such a wretched fashion. It is implied that Creon himself has the power to shape Haemon’s destiny and his duty as a person by â€Å"produc[ing] good sons—a household full of them, dutiful and attentive†. Creon describes his son to be â€Å"bred and reared† for a specific purpose. Both terms â€Å"produce† and â€Å"bred† create the effect of a human fabricated at certain specifications.This puts Creon in a state of authority not only over the mores his son must live by, but the way his son is formed as a human being, which is eerily reminiscent of the divine authorities and the power of the fates to write out a person’s destiny. In a sense, Creon compares the greatness of his sovereignty to that of the Gods, thus portraying how his power is a prerequisite to his hubris. Moreover, Creon establishes dominance over other men using his title as King, naturally elevating him beyond the rank o f mortal men.To demonstrate his frightening autocracy, Antigone claims that â€Å"[the chorus] would praise me too/ if their lips weren’t locked in fear†. This fear of Creon is further bolstered by powerful oratory, which Creon uses as a tool in commanding his people’s patriotism and emotions. The expressive visual imagery characterized of Creon’s speech can turn a traitor into a fiend who â€Å"thirsted to drink his kinsmen’s blood. † The impact of the words â€Å"thirsted† and â€Å"blood† stress this graphic image of death and blight, which Creon manipulates to kindle hate and passion in his people against Creon’s enemies.Although a ruler is meant to serve the state and protect it, Creon uses his rhetoric to advance his own beliefs—a decision characterized by greed. What is debatable about where Creon’s sense of leadership is whether he is doing this as an act of greed or an act of what he believes is co rrect for the state. Leading on from power, the audience understands that Creon’s arrogance comes from the notion that his power ennobles him beyond the ranks of mere humanity. They see him gain much more authority as a saint, savior or being closely linked to God.His sentries all address him as â€Å"My lord† and Creon is able to issue death sentences to reinforce his superiority. Creon uses terms that are definitive of a person’s fate, despite the fact that he has no control over their fate in any substantial way: â€Å"Not a word of hope—your doom is sealed. † The precise diction of â€Å"doom† recalls the notion of a terrible fate that stretches beyond the mere human life, and forwards into the dark murkiness of afterlife. To pronounce it as â€Å"sealed† is to imply it is fixed; Creon uses this to strike fear in the heart of Antigone, yet it also presupposes that our fates, once written, are unchangeable.The dramatic irony that c omes with Creon proclaiming this as his fate is being written heightens the tragic ending of the play—the Katastasis. Creon’s arrogance could be seen as a shift in character from what the audience knows of Creon in Sophocles’ Oedipus the King. Creon once proclaimed, â€Å"if you think crude, mindless stubbornness such a gift, you’ve lost your sense of balance† as a display of humility and rationality. Before his reign as King of Thebes, Creon understood the natural traits found in a good leader involved a sense of poise and understanding of one’s own limits.Yet, once he had possessed â€Å"the throne and all its powers†, there was a change in character. â€Å"All its powers† incorporates the idea of excess and abundance, which is characterised as hubris, therefore the audience might feel a sense of fear for the upcoming and inevitable demise that may come for Creon. Naturally, when this power is questioned, Creon’s insec urities begin to appear and after some time, become more pronounced and irrational. Creon expresses his shame and his exasperation of Antigone’s defiance through the terms â€Å"laughing, / mocking us to our face with what she’d done†.These words hint to a sense of stigma that comes with a woman defying the rules set out for her by the authorities that govern her. Drawing from the cultural context of Sophocles’ play, women were mainly viewed as inferior beings—often they were weak or even dangerous, which makes the defiance against the state and Creon’s edict more grave and scandalous. Creon portrays his fear of being diminished by a woman through his cry: â€Å"I am not the man, not now: she is the man / if this victory goes to her and she goes free. / Never! † because essentially, her freedom would mean his defeat, which in the end would blemish, or even completely fracture, his stature as an omnipotent ruler. Moreover, Creon become s erratic as he is faced with his flaws as a human being. When he is first notified of his errors by a sentry: â€Å"Oh it’s terrible when the one who does the judging / judges things all wrong†, he retaliates in a unnecessarily cruel manner: â€Å"you just be clever about your judgments— / †¦ you’ll swear your dirty money brought you pain. Personally, his cruelty can be interpreted as a defensive insult inflicted to shield himself from the truth of his humanity. This interpretation is supported by the way Creon storms off by â€Å"turning sharply†, as his actions seem to portray a sense of flinching (characterized by â€Å"sharply†) annoyance. This same effect is particularly seen in Creon’s dialogue with Tiresias after he is told of his fate. Creon’s language becomes more infused with anger and insecurity, making him appear weaker: â€Å"you shoot your arrows at my head like archers at the target—† He seem s to refute his own guilt, and justify imself as a person of superiority: â€Å"are you aware you’re speaking to the king? †, which makes him appear untouchable. Creon’s spite is felt through his sharp intonation of â€Å"Spit it out! † and â€Å"lust for injustice! † His reaction to his fate up until his concession is characterized by defensiveness and verbal insults, which can highlight how much of his power and glory he is afraid of losing, Creon becomes frightened by the prospect wherein he would have to concede to his hamartia and undeniable fallibility as a human.The main purpose of these effects is to illuminate Creon’s very human flaws: his insecurities, his paranoia of being thwarted by a woman of lesser importance, and his irritable temper. These flaws consequently form the nature of his demise and conclude the circle of his journey as the Tragic Hero. Essentially, his kingship has brought upon him his downfall because power is ins eparable from vanity, and vanity became the hamartia of the Creon’s character.

Sunday, September 29, 2019

Ediment grain size and mineralogy distribution Essay

The study was done in the Mpenjati estuary. It was found more briefly if sediment grain size and mineralogy distribution change across a beach profile changes and how it change. 4 zoneS of a beach profile were sampled. Quartz is the most stable sediment composition in the surface of the earth, compared to heavy minerals and feldspar (Marshak, 2008). INTRODUCTION The aim of the study was to find out how does the sediment grain size and mineralogy distribution change across a beach profile. Mineral is a homogenous, naturally occurring solid inorganic substance with a definable chemical composition (Marshak, 2005). The impacts of the depositional environment, transport and climate on the morphology of minerals oceans are the focus of discussion during the present study of grain morphology (Shaffer,2006). It goes without saying that morphology and texture as well as the intergrowths among ocean minerals are also of utmost importance for the and industrial use of placer minerals (Pipkin, 2007) and by this oceans profiles must not be protected from pollution and disasters. The Mpenjati Estuary has been subjected to extensive sand and stone mining for approximately 40 years and the mining operations affected sediment patterns (matthias et al,2012). Although geologists tend to classify estuaries according to their geomorphology, physiography, sedimentation or tidal patterns but an estuary is an enclosed coastal body of water which is periodically or permanently open to the sea (Whitfield, 2010). The study was done by the University Of KwaZulu-Natal students of BIOL 231 (Marine environments) together with their demonstrators and Lecturer. The study was done in the Mpenjati estuary on the third of August 2013 which is the winter season while the estuary was closed at the mouth. The Mpenjati estuary is an open/ closed estuary located at 30 Í ¦ 58’15† and approximately 165km southwest of Durban Kwazulu-Natal south coast FIGURE 1: Locality map showing Mpenjati estuary (Whitfied, 2003) FIGURE 2: beach profile showing different zones (Schwarts, 2008) MATERIALS AND METHODS Sampling was done when mouth of the estuary was closed. Four different zones of the beach profile were sampled which is Swash zone 1 which was closer to the sea followed by swash zone 2, and back beach 1 which is closer to the estuary followed by back beach 2. In each zone 2 clear plastic bags were filled with half way with sand using our own hands and were sealed with sell tape for later processing at the Lab. The plastic bags which had sand were named according to their zones collected from. The collected sediments were then taken to the soil laboratory at the Geological science Department (UKZN) for drying for 3 days. In the laboratory the sieve trays ware weighed using balanced scales after weighing. Sand which came out from drying was crushed and grinded and stirred on to the bowls using a thick pin as if cooking. Sieve trays were stacked together and then placed in a sieve machine where the dry grinded sand was stirred more on the machine for 2 minutes. After the 2 minutes the sand or sediments were poured on to the sieve trays which have different sizes of open holes measured in  µM, the top sieve tray had the biggest porosity and the bottom one had the smallest and was consisting of finest sand. When sieving was done the sieve trays were weighed again in order to obtain the mass of the sediment grains collected on the estuary. From the masses of the dishes the value of Phi (Ø) was calculated:Phi (Ø) = -log2 (d) d = Mass of a sieve /1000 The calculated phi was then used as a dependent variable in plotting graphs for distribution and the cumulative frequency that are displayed in the results. Phi ranged from -1 – 3.47 then the base.This was done for each zone I the four zones which were sampled. A small portion of sediments was collected In each zone of sampling was then placed into a petri dish and was examined by a light microscope for analyzing different types of minerals which were in each set of sediment zone by looking at their grain size, texture, and the mineral composition of the sand. This was done for each zone. The field observations are also confirmed by the graphs that in figure 4 the mass content, sediment mean size goes from high to low from swash zone 1 to back beach 1 showing that as one goes closer to the sea the sediment grain size of the sand and mass increases. Table 1 tells us that the back beach has more quarts e.g The back beach has the highest quarts. DISCUSSION It has been found out from figure 2 that the beach profile is divided into different zones, 4 zones were sampled at the mpenjati estuary namely swash zone 1, swash zone 2, back beach 1 and back beach 2. It was also found in figure 3, figure 4 and table 1 that the 4 zones have different mineralogical distributions and grain size. It was found that the soil colour and texture of the sand changed from zone to zone. The sand was damp with and had shells, little fragments, oysters afflicted by waves and washed to the sand by wave deposit. The ripples indicated wind direction and the wavelength of ripple was 6.5 cm. The deeper side of the ripples is gentle and shorter on the side of the ripples; this is due to north east blow of the wind (Marshak, 2005)) The swash zone is a zone of constant deposition from the beach characterised by moderately to poorly sorted sediments as sediments of first deposition are sub angular with a grain shape of low sphericity compared to other zones in the beac h (table 1). The long shore drift which passes across the beach water body creating wave action energy is insufficient to carry these types of sediments (Shaffer, 2006). The reason why small sediments in size are mostly found at the back beach (figure 3 and 4) is because the wave action slows down its energy in the swash zone so only small sediments in size can be carried towards the back beach leading to well sorted sediments with mature texture as high transportation of  sediments leads to re-deposition and re-transportation (Pipkin, 2007)). Closer to the sea were larger stones and burrows (figure 4) swash zone 1 had the highest mass content followed by swash zone 2 and the reason for this is because closer to the sea there is more wind action (Shaffer, 2006). Crabs adapted to the environment with burrows. Quartz is the most stable sediment composition in the surface of the earth, compared to heavy minerals and feldspar (Marshak, 2008). Quartz and feldspar are dominant in all beach zones (Table 1) this is because they are primary rock minerals, they are found in parent rock e.g. granite which contains these two minerals (Schwarts, 2005). Since so il is the deposited by the chemical weathering of rocks, the minerals also are as a result that deposition. Feldspar makes about 60% of the earth’s crust (Marshak, 2005). Mineral sands contain suites of minerals with high specific gravity known as ‘heavy minerals’. They were found mostly on the back beach 2 (Table 1) and the swash zone 2 because the wind current was not strong enough to transport them away. Those that are found on the back beach 2 are probably deposited by the river inflow and that on swash zone 2 is deposited by the ocean current and cannot be transported further because they are resistant to wave action (Pipkin, 2001). The swash zone was found to have more shells (Table 1) and some broken up and there were smooth, dishaped stones (cables) because of wave action on tide and also pedals. Lithic fragments were found mostly the back beach (Table 1) and only one on swash zone 1 because they are light and easily transported by wave and wind action. In conclusion as the profile is divided into zones it was found that mineralogical distribution and grain size change across the zones of a beach profile. As one go closer to the sea the gran size becomes larger and there was found to be more mineralogical diversity to zones closer to th e sea compare to zones closer to the estuary. Heavy minerals were found in zones closer to the sea and light minerals were found to zones far from the sea, this is all due to processes like wind and wave action. REFERENCES Marshak S.S., (2005). Earth: Portrait of the planet 2nd eds. W.W. Norton & Company, Incl., New York, London Marshak S.S, (2008). Earth: Portrait of the planet 3rd eds. W.W. Norton & Company, Incl., New York, London Matthias (2012) et al, KOTLIK School, AK 9960. P.O BOX 20129, 8 JUNE 2012, The Nushagak Estuary: Its Salmon resource, Potential Threat and proposed management plan. Pipkin B.W., et.al, 2001. Labaratory exercise in Oceanography, 3rd edition. USA Ron Uken 2011, UKZN WESTVILLE CAMPUS BIOL 231 PRACTICAL MANUAL (GEOLOGICAL COMPONENT) Schwartz M.L., 2005. Encyclopedia of coastal Sciences. Published by springer 16 June 2005 Shaffer,R., (2006). The Time of Sands: Quartz-rich Sand Deposits as a renewable Resource. Electronic Green Journal, 1(24):1-35 Whitfield A.K, J.L.B Smith institute of Ichyology, Private Bag 1015 Grahamstown, 6140, South Africa published online: 08 November 2010, 18: 1-2, 89-103, DOL Whitfield A.K Maps and Locations of South African Estuaries Index, Generated by resource quality service 2003-08-08, 14:25:28, S.A INDEX for aquatic Biodiversity.

Saturday, September 28, 2019

Bioethics and Health Care

Introduction: The controversy over water fluoridation in the community arises from moral, ethical, political and security issues related to water fluoridation. As early as 1930 there was an inverse relationship between the fluoride concentration in drinking water and the presence of caries. The use of public water for transporting drugs such as fluorination violates medical ethics. Ethical issues related to water fluoridation include the balance of risks and benefits, the presence of other interventions with the same consequences, and the role of consent. For more than a decade, bioethics and health care professionals have struggled to determine the exact meaning of being medically ineffective. The word waste comes from the Latin futilis. In other words, it is easy to melt. It is a common usage developed from the Greek legend that the daughter of King Arnaus of Argos killed her husband and as a punishment they were forced to gather water permanently in a bucket that leaked water. To reach the empty bucket destination, when the goal is water, provide useless definitions as less or invalid. With the rapid development of medical technology, the work of medical staff is to investigate the resulting ethical dilemma. This is where bioethics works. By applying ethical principles to the medical field, bioethics aims to research and study ways to make decisions on health management. It is a core element to ensure that medical practices and procedures will benefit society as a whole. I explained that the term bioethics was originally introduced in 1971 to refer to a combination of biology, biological science and human knowledge. However, its uses such as clinical decisions, controversial new research, the impact of new technologies, global concerns, public policy, etc. are more widespread today. In fact, bioethics has played a central role in affecting policy changes and laws in recent years. Detailed discussion on current bioethical issues affecting the provision of med ical services. Exploring ethical theory and related principles as a basis for occupational decision making and public policy decision. The course focuses on ethics research process and modern health practices, the relationship between research and education. The historical and comparative analysis of the Western, non-Western, indigenous and indigenous American philosophy includes the essential, aesthetic and utility value of nature and land. We will study modern environmental ethics in detail, such as deep ecology, land ethics, eco feminism, animal rights theory.

Friday, September 27, 2019

Information Technology & Communication Coursework

Information Technology & Communication - Coursework Example Be it Americans or Asians, White or Black, human nature almost responds to the same way. For instance, if one receives an uninvited ad(s) on his/her mobile, most probably it would cause not only irritation but also discourage him/her to pay attention to other valuable messages/information. Let me clarify the situation by giving my own example. I keep on receiving Call/SMS package offers from the Cellular Company but I never bother to read such messages and delete them right away. Why? Because I am not interested in. Thus, in my case I would term it as a failed marketing. So I am trying to convey is that mobile marketing can surely drive better results provided if it is going to be a â€Å"Permission-Based Advertising† – i.e. with user’s prior permission to receive such ads. Lih-Bin Oh and Heng Xu (2003) stated, â€Å"Advertising researchers have devoted much attention to the study of irritation arising from advertisements such as TV commercials and Web pop-up ad vertisements. For the case of permission-based location-aware advertisements, the level of irritation should be rather low since messages are delivered with the receiver’s prior consent†.

Thursday, September 26, 2019

The Various Behavioral Approaches to Leadership Essay - 33

The Various Behavioral Approaches to Leadership - Essay Example In fact, he arrives remarkably early than many of the workers. The various behavioral approaches to leadership show that people oriented and task oriented behaviors are two principal aspects of leadership. Mr. Winston has concern for the people and hence does his work responsibly. He is production-oriented and hence ensures that he meets his duties adequately. Mr. Winston has characterized himself as a leader since he had pleasant experiences since his birth. He witnessed the whites leave Los Angeles, and the blacks becoming a majority and also experienced riots in the city. He ensured that bitter times did not let him down. He feels that living long lets a person experience everything. He feels that he has gathered a lot of information and hence an experienced man. A leader must possess the self-esteem to be successful. One needs to be strong and not be affected by the experiences in the outside world. A leader should also learn for the experiences that one encounters on a daily bas is just like Winston. A leader should also walk with upright dignity just like Winston and be confident in themselves and their views. Winston considers himself a leader since he has lived for long and distinguished accomplishments like confronting racism that he experienced as a black. Where Los Angeles Transit has identified Mr. Winston as a leader, the best leadership theory that would describe Winston’s leadership style is authentic leadership (Northouse 22). In this leadership style, the leaders have a quality of being self-aware. They are not afraid of acting in the way they act and also posses’ high levels of personal integrity. This leadership style fits Mr. Winston since he possesses a high level of personal integrity and acts in accordance to his principles that he acquired from his father. He does not mind what people will think of him but ensures that he follows his own way of life.  

Business Project Essay Example | Topics and Well Written Essays - 3750 words

Business Project - Essay Example For this the Generations Clothing aimed to produce good quality products. In addition to the quality of the product they give importance to the simplicity and smart looking to the product. From the market surveys conducted by the business as a part of their business planning it is found that a major part of the customers are always like these types of products. From the market research, it is found that Sydney is a best market for the casual clothing. There are various market advantages that are available in Sydney market such as lower government regulations, low rate of taxes etc. By establishing stores in Sydney the Generations Clothing can The ultimate goal of the company is to create a brand image of high quality product of low price. A brand image of high quality at low price is always helpful to capture the market in the competitive market. The products should also be imaged as simply designed product. This type of brand image is helpful to attract the customers. By adopting strict cost control techniques in all levels of production and marketing process the company aimed to produce quality products at low cost. 5. Once mature create a unique sub brand to prevent risks: the mature and declining products must be replaced by new ones. In the present market environment most of the branded products are facing decline in growth rate and profit rate after they attain the maturity stage. The reason behind this phenomenon is the lack of further improvement in product quality and design. The Generations Clothing Company forecast this crucial risk and to overcome this risk they take care and prepare to present a unique sub-brand at the maturing stage of the existing product. This will be helpful for avoiding the risks related to the existing branded product. The proposed sub brand must be unique and entirely different from existing product of the company. The logo of this product should be

Wednesday, September 25, 2019

Managemnt strategy Essay Example | Topics and Well Written Essays - 3250 words

Managemnt strategy - Essay Example It will begin by examining the core objectives and plans of both companies. The paper will then examine the leadership structure as well as the products, industrial matters and core competitive strengths of both companies. Vision & Mission The mission statement of a company defines the main reason behind the formation and maintenance of a business (Johnson et al 42). It justifies the reason why the firm exists and describes what it was set up to achieve. On the other hand, the vision of a company involves an outline of the things that a firm seeks to achieve in the foreseeable future (Johnson et al 42). In the case of KFC, the mission statement identifies that it was set up to provide the best chicken meals to customers. The mission is to provide different chicken dishes to customers and improve their core competency in doing this (KFC Website para 2). MacDonalds' mission is to become the customer's favorite place to eat and provide an experience that is unrivaled to the customers (M acDonalds Website para 1). In doing this, the spell out their vision which interlocks with the mission. MacDonalds identifies that their vision is to provide the best services to customers, employees, suppliers, investors and the community at large (MacDonalds Website para 4). ... In comparison, KFC is specialized and focused on chicken and related brands. MacDonalds seeks to provide a good eating experience in a general atmosphere. They both seek to promote their activities through enhancing customer experience and satisfaction. Internationalization and globalization are at the heart of their visions. Additionally, they hope to seek continuous improvement and development of their systems and structures. SWOT Analysis SWOT Analysis involves an examination of the strengths, weaknesses, opportunities and threats of a company. This provides a view of how they are faring and provides an overview of how they can reshape things to meet the competition that will come up in the future. SWOT Analysis of KFC Strengths Brand Equity: Everyone knows about KFC Large international presence Strong cashflow position, only second to MacDonalds in revenue. Variety Specialized and focused Weaknesses Legal issues with International Expansion Lack of focus on Research & Development Weak marketing systems Poor customer relations Opportunities Attach and improve delivery service. Potential to expand further internationally to developing countries. Meet demand for quick meals Diversify into providing healthy foods Threats The promotion of healthy eating which emphasizes that KFC is not so healthy The presence of many competitors. The growth of supermarket food joints. Source: Nick's Business Blog SWOT Analysis of MacDonalds Strengths Strong brand name Large partnership with suppliers Socially responsible Provides health facts Loyal employees and management Culturally sensitive Focused on children Weaknesses High employee turnover Too focused on children to the neglect of other sections of the population. Although they provide

Tuesday, September 24, 2019

Application of Pricing Strategies in Marketing Activities Assignment

Application of Pricing Strategies in Marketing Activities - Assignment Example In the second situation, a new company is manufacturing a dishwater detergent similar with other competitor’s detergent.   Mainly, for such a company, their objective would be to make sales in a highly competitive environment. Due to the increased cost of manufacturing the detergent, the company also intends to generate enough money to recover this cost as fast as possible. With such a case scenario, marketers may decide to use full cost pricing. With this strategy, the company intends to recover all cost of production, both valuable and fixed cost. Marketers only determine cost of goods and services after calculation of all the cost, hence may not mind so much on the generated profits. Another strategy relevant for this case would be penetration pricing strategy.   With strategy the company reduces prices for their products with the intention to penetrate a competitive market, where companies may be selling similar products for the same markets.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In the third case scenario, determining how much to sell for a new product in area where competitors are likely to sell the same product requires proper decisions by marketers. In this case, as new business in a competitive environment, the company must firstly be in a position to get valuable market share.   In order to have this company make sales for the new iPhones, marketers may decide to use promotional pricing. In this strategy, companies set prices lower than the normal price list temporarily in order to attract new customers.

Sunday, September 22, 2019

Impact of cigarette packages warning labels on Saudi Arabian people Research Proposal

Impact of cigarette packages warning labels on Saudi Arabian people and to what extent - Research Proposal Example In 2012, six Gulf States enforced a law to use graphic warnings which will be printed in all cigarette boxes. Some of the images are of ill people, skeletons, black teeth, and other pictures that are discouraging smokers to quit their behavior. Furthermore, the images are accompanied by warning phrases. However, a study that was conducted in Saudi Arabia indicates that these measures have done very little in deterring smokers from going on with their behaviors. With Saudi Arabia being the 23rd country with the largest number of smokers despite having a small population of approximately 25 million people, the measures are yet to yield any fruits. Many of the smokers in the country have stated that they are more aware of the consequences of their behavior than before (Fischhoff, Brewer, Downs, & United States, 2011). Have the graphic images have not dampened their desire to smoke. Many state that whenever they come across the graphic warnings, they become more aware that smoking is hazardous to their health. Nevertheless, the addition empowers these cautions and the desire to quit the vice. Labeling of cigarette packages with warnings has a major impact on deterring new smokers from starting this behavior. Many of the young people feel that the graphic images make them to think of the repercussions of starting this behavior. However, those who were already affected by addition find it very hard to stop it (La, 2013). Therefore, the number of people who are joining the list of smokers has reduced in Saudi Arabia. However, the number of those who are quitting is very minimal. This is an indication that the warnings are more effective in deterring non-smokers not to engage in smoking behavior rather than encouraging the smokers to quit this vice. Therefore, the government should implement other more effective measures such as imposing stricter law on public smoking and stiff penalties to those who

Saturday, September 21, 2019

Works Cited Accomando Essay Example for Free

Works Cited Accomando Essay The antislavery campaign in the United States resulted in the emergence of the middle-class feminist movement. However, the latter did not include African-American women or white women of lower economic classes. The objectives of middle-class feminists were suffrage and social recognition for upper-class white women. Black women, on the other hand, first sought to be recognized as women. Already equal to African-American men socially within the slave community and in terms of the oppression they both suffered, African-American women challenged the institution of slavery and resisted sexual assaults of white men (Scott, n. pag. ). The lives of black female slaves proved to be harder than those of their male counterparts. Black female slaves were exploited for both their reproductive and productive capacities. Apart from performing strenuous manual labor and enduring abject living conditions, they were expected to replenish the slave population through pregnancy and childbirth. Furthermore, black female slaves experienced sexism and sexual abuse from their masters (Mankiller, 543). But the worst form of mistreatment that female African-American slaves received from their owners was probably the stereotype of the promiscuous black woman. In slavery-era America, white women were regarded as the models of self-control, self-respect, sexual purity and modesty. Black women, meanwhile, were often dismissed as innately licentious and desired sexual relations with white men. This misconception was used as a justification for the rape of female African-American slaves by their owners (Mankiller, 543). The labeling of black women as immoral has partial historical basis. Slaves were sold naked in order to show that they were healthy, capable of reproduction and docile (as seen through their whipping scars). Slaves likewise worked wearing scant clothing – black female slaves often worked with their dresses lifted up around their hips to prevent the hems from being stained with the water, dirt and mud in which they worked. In sharp contrast, whites, especially white women, were dressed in layers of clothing (Mankiller, 543). As a result, black women were initially excluded from the nineteenth-century women’s rights movement. Feminists during this era believed that black women should not be considered as women because they did not conform to the prevailing images of feminine virtue. Most black abolitionist women interpreted this philosophy as a means for feminists to have more time to pursue their cause. A feminist, after all, will no longer have the time to rail about gender inequality if she has to cook, clean her house or tend to her family’s farm – chores that are traditionally assigned to female African-American slaves (Dixon, 50). Sojourner Truth, an illiterate former slave, was one of those who insisted that black women have rights as well. An abolitionist and a champion of women’s rights in the nineteenth century, she opposed the nineteenth-century’s assumptions about womanhood. For Truth, women’s rights must apply to all women regardless of race. In her speech Aren’t I a Woman (1851), she used her body to further elaborate on these points. By detailing the difficult tasks that she performed unassisted as a slave, as well as the grief that she encountered when all of her 13 children were sold off to slavery, she argued that black women are also women. They are also oppressed like white women, but only on a worse level (Ritchie and Ronald, 144). Truth also challenged the traditional but overly-simplistic feminist analogies between marriage and slavery and between white wife and black slave. Truth argued that black and white women must use motherhood as a unifying factor in their struggle for gender equality. They will produce another generation of marginalized and exploited women if they allow race to prevent them from joining forces in order to attain their common goal (Accomando, 67). Black women are also women. The only reason they were not considered as such was because of the institution of slavery, which considered them as culturally stunted and morally loose. Thus, black women are entitled to the same rights that white women enjoy. Both of them suffered immensely in a patriarchal society. In fact, black women suffered more. Works Cited Accomando, Christina. â€Å"Demanding a Voice among the Pettifoggers: Sojourner Truth as Legal Actor. † MELUS 2003: 28. JSTOR. University of Arizona Library. 20 September 2008 http://www. jstor. org/stable/3595246. Dixon, Chris. Perfecting the Family: Antislavery Marriages in Nineteenth-Century America. Amherst: University of Massachusetts Press, 1997. Mankiller, Wilma Pearl. ed. The Reader’s Companion to US Women’s History. New York: Houghton Mifflin Books, 1999. Ritchie, Joy S. and Kate Ronald. Available Means: An Anthology of Women’s Rhetoric. Pittsburgh: University of Pittsburgh Press, 2001. Scott, Eryn. â€Å"Differences and Intersections between Feminism in Africa and Feminism in the United States. † 18 November 1997. Columbia University. 20 September 2008 http://www. columbia. edu/cu/sister/Differences. html.

Friday, September 20, 2019

The Process of Literary Translation

The Process of Literary Translation 2.1 Literary Translation Translation process is an artistic communication between the author, the translator and the reader and the words used by the translator constitutes the major part in the process of communicating ideas or feelings of the author. Literature is both the condition and the place of artistic communication between senders and addressees or the public (Basnett,2002) The translator is the first one who must comprehend, read and interpret the source text then to render it in a different medium. Literary translation includes fiction,poetry, drama and the language arts must be taken into consideration by the translator. The purposes of the translator are to transfer the information but also to create an equivalent form of art. The beauty of the translators work is that they bring a great contribution to the creative process being recognized as part of the literary world. The literary translator must therefore possess a great knowledge of both the TL culture and language and the SL culture being able to command tone, style to glean meaning for ambiguity and to identify with the authors style and imagination. Literary texts are characterized by rhetorical and aesthetic value. There is a strong connection between form and content within literary text while the non literary text the content is separated from the structure. Translation problems and solutions 2.1.1 Basic concepts First of all it is clear that every book is different and it presents its own problems.For this reason the translator of literary fiction is the one who makes most of the critical decisions when it comes to produce the best translation.It is thought that sometimes it is more important to create a translation that can evoque the spirit and particular energy of the original rather than making a translation faithful to the original. Usually this is the main concern of a translator because one may think that taking these liberties may be seen as unprofessional.The new work, the new translation is actually an interpretation of the original therefore it is not mandatory to preserve literal words and phrases in order to be faithfull to the ST.On contrary,, translators are encouraged to use their creative abilities to adapt the original text. Translators maust take risks when it comes to render a good translation in order for the readers to understand the writer s message.This could not be achieved by following word for word translation because it would not stimulate the interest of the readership. A literary translator must have the skills to transmit feelings, culture, nuances, humour and other elements of the masterpiece. According to Sachin Ketkar in the field of Literary Translation, the central problem is to find the TL equivalence for features of the original as style, genre, figurative language and historical stylistic dimensions, polyvalence, connotations as well as denotations,cultural items and culture specific concepts and values 2.1.2 Titles Title of a book, an article, or a newspaper is the element which captures the attention of the public. The title is nowadays a commercial decision and sometimes a complete change is required in a translators activity in order to attract the world of consumers, readers. The decision of changing or adapting a title must be made tough based on the content of the specific text. One of the cases where the title was kept in the translated text as original is the case of Sandra Smith-the one who translated the book la suite Francaise- who decided to keep the title in French despite the fact that she was skeptical about the acceptance of her translation in the American narket.However the book was a great success in UK AND US.in 2007. The Italian Levi Primo did not agree to change the title of his books. The title of one of his books If this is a man was an integral part of the book, but it was changed in the American edition into Escape from Auschwitz a title which he considered inappropriate and vulgar. La chiave a stella another book of the Italian writer was published in US under a new title The Monkeys wrench which was not suitable because the title refered to a certain shape and the apostrophe changed its sense. Gill Paul in his book states that relying on a literal translation for a title is a common mistake because the translator may select a misleading title which may affect the readers reaction. Literary translators should be creative when it comes to decide for the best title when translating a book. 2.1.3 Stylized language Translating a text can be a real challenge when the specific text was written in a particular style a long time ago.Even contemporary writers may have a style which can pe problematic for a translator.The problem is if the translator decides to update the text in order to make it accessible, thereby may loose distinctive use of vocabulary and other characteristics of the original text. Nobody would expect to read Shakespeare in Modern English because it would loose its beauty. Gill Paul suggests some advice in order to render a proper translation.He states that if the author of a book is still alive, it would be wise to actually get in touch with the artist in order to obtain a better understanding of its masterpiece.Unfortunately this option is not always available, therefore translators must become in other words the artists who can recreate a new style but to have the same effect that can be percepted by the readership. Translators must often become their own critics in order to obtain the correct mood, tone and style with the original. Sometimes, certain feelings can influence the style of a text which it would be a negative part of a translator;s work.For this reason, translators should always keep an objective attitude towards their work, sometimes changing the direct speech into indirect speech or sometimes they can leave the passage out. Something will have been lost but the important thing is that translation should not call attention to itself because it can ruin the readers experience of the book (Gill Paul) Strong language I personally find bad language very difficult to translate as literal translation.Translators tend to ignore the strong language because they are not comfortable with it.In some cultures, swearing is a more common activity than any other thing.In English-speaking countries, bad language is considered less acceptable. The main problem is that sometimes there is no equivalent which can match the other culture, language to be translated. Robert Chandler had encountered bad language when translating the Russian text The Railways Curses and swearwords present a particular problem for translatorsà ¢Ã¢â€š ¬Ã‚ ¦our lexicon of abusive language is oddly limited and the more flared curses still common in Russian tend to sound laughable if translated at all literally He suggests simplifying the words by having our own perception of the essence of the bad words in the other culture. Swear words function as vehicles of self expression. There are three ways to translate the strong language. The most effective method which cannot always be used is to find the words equivalent in the TL, but swearwords are sometimes culturally derived and they have no perfect equivalence or perfect translation. Another way to translate the bad language is to rephrase the term, which means avoiding the word in question, not always faithful to the original text. Translating word by word is another way to translate the bad language but it does not always match the meaning of the word itself. Translators must deal with censorship and must choose between translating the text as it is worded or adjusting it to reflect the speech patterns of the TL. Translators agree that is not professional to omit specific words based only on ethical or moral grounds.The text itself is not targeted towards them therefore they should not take it as offence and it is in their best interest to provide a faithful translation. Colloquialisms In this area the, the most important issue with slang is the selection of the appropriate terms. G.Paull states that in this area it can be a question of getting exactly the right translator for the job .He also describes the profile of the suitable translator for colloquialism: Translators with a good working knowledge of colloquialism, dialect and slang in the native country, who can get across the meaning and help to come up with equivalents that are appropriate, do not jar with the reader and most importantly, do not date. Translators must be sensitive to the culture and colloquial differences of different countries.

Thursday, September 19, 2019

college athletes :: essays research papers

College athletes are manipulated every day. Student athletes are working day in and day out to meet academic standards and to keep their level of play competitive. These athletes need to be rewarded and credited for their achievements. Not only are these athletes not being rewarded but they are also living with no money. Because the athletes are living off of no money they are very vulnerable to taking money from boosters and others that are willing to help them out. The problem with this is that the athletes are not only getting themselves in trouble but their athletic departments as well.   Ã‚  Ã‚  Ã‚  Ã‚  Recently college athletes have been granted permission to work, from the NCAA. Even with this permission, their jobs are still regulated. One regulation to the athletes working is that they cannot work for alumni of the school. The NCAA has this rule because they feel if athletes work for people with close ties to the school then they will be receiving special benefits while working. These special benefits include, (but are not limited to), athletes being paid while not at work and higher salaries then other workers doing the same job (Anstine 4).   Ã‚  Ã‚  Ã‚  Ã‚  Another restraint to college athletes working is a time restraint. College athletes have very busy schedules they follow and when finished with their schedules they are left with very little free time. Student athletes are required to take a minimum of twelve credit hours to start the semester and required to pass at least nine credit hours by the end of the semester. With this standard having to be met, the athletes are spending hours studying and attending class. Besides from studying and attending class the athletes then have to go to practice. Going to practice and participating takes up about four to seven hours of the athlete’s day. After all of this is completed, the athletes are left with only a couple of hours for them to enjoy time with their friends or even to just relax and watch a movie. But, because these athletes are college students and do not receive any money for their commitments they are supposed to squeeze time in for work in. If athlet es apply for a job they are limited to only a couple of hours a day to work. Also a large number of jobs request their employees to be available on the weekends.

Wednesday, September 18, 2019

the yellow wallpaper -- essays research papers fc

Tyer 1 Drew Tyer  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Jennifer McCune ENGL 1312 24 February 2005 No Work and No Play Makes Jane a Dull Girl   Ã‚  Ã‚  Ã‚  Ã‚  Jane in Charlotte Perkins Gilman’s â€Å"The Yellow Wallpaper† was â€Å"touched† as some say long before she was prescribed, and administered the â€Å"rest cure† by her husband for her then unknown ailment now called postpartum depression. The boredom and isolation of this cure only allowed her mind to venture farther down a dark and winding corridor of insanity.   Ã‚  Ã‚  Ã‚  Ã‚  Jane has recently had a child and is experiencing what we know today as postpartum depression. Back in the 1800's doctors had no understanding of these symptoms, so they chalked it all up to a temporary nervous depression. This was cured by a treatment called the â€Å"rest cure† popularized by Dr. S. Weir Mitchell. This remedy consisted mainly of isolation and bed rest. We now know that this does nothing to promote a healthy mind or body. But, at the time this was the best-known cure.   Ã‚  Ã‚  Ã‚  Ã‚  As a child Jane had hallucinations, â€Å"I used to lie awake as a child and get more entertainment and terror out of blank walls and plain furniture than most children could find in a toy-store.†(Gilman 593). This sort of behavior is more than just your average child’s rampant imagination. This is truly the sound of someone who is delusional and needs some form of psychological counseling.   Ã‚  Ã‚  Ã‚  Ã‚  This overly active quasi delusional behavior followed Jane to adulthood, and was noticed but dismissed as pure silliness by her husband even before the baby came about, â€Å"... he says that Tyer 2 with my imaginative power and habit of story-making, a nervous weakness like mine is sure to lead to all manner of excited fancies...†(Gilman 592) Anytime Jane acted a little bit weird he would just say it was her hyperactive imagination at work again. Little did he know the depths of her problems that were to become evident over the next three months.   Ã‚  Ã‚  Ã‚  Ã‚  The demons in her mind first began to attack her psyche about ... ...traits of a mentally unstable individual. The â€Å"rest cure† coupled with the postpartum depression   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Tyer 4 she was experiencing merely accelerated the mental flaws she had, and brought about the inevitable. The cure had taken an already frangible mind and thrown it into complete and total disarray.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Tyer 5 Works Cited Gilman, Charlotte Perkins. â€Å"The Yellow Wallpaper.† Literature: An Introduction to Reading And Writing. 7th ed. Edgar V. Roberts and Henry E. Jacobs. Upper Saddle River: Prentice Hall. 2004. 590-600.

Mother and Daughter Similarities in Amy Tan’s The Joy Luck Club Essay

Mother and Daughter Similarities in Amy Tan’s The Joy Luck Club â€Å"Here is how I came to love my mother.   How I saw her my own true nature.   What was beneath my skin.   Inside my bones.† (Tan 40)   Ã‚  Ã‚   The complexitities of any mother-daughter relationship go much deeper then just their physical features that resemble one another.   In Amy Tan’s novel The Joy Luck Club, the stories of eight Chinese women are told.   Together this group of women forms four sets of mother and daughter pairs. The trials and triumphs, similarities and differences, of each relationship with their daughter are described, exposing the inner makings of four perfectly matched pairs.   Three generations of the Hsu family illustrate how both characteristics and values get passed on through generations, even with the obstacles of different cultures and language.   Ã‚  Ã‚   The Joy Luck Club was formed while the four mothers were in Builica   during the time of war.   â€Å"Each week we could forget past wrongs done to us.   We weren’t allowed to think a bad thought.   We feasted, we laughed, we played games, lost and won, and we told the best stories.   And each week, we could hope to be lucky.   That hope was our only joy.   And that’s how we came to call our little parties Joy Luck.† (Tan 12)   These small gatherings consisted only of the same four women, one for each corner of the mah jong table.   While bombs were going off outside, these women would keep their happiness alive with this blissful get together once a week.   Later, when these women moved with their husbands to America, they naturally continued the tradition.   Ã‚  Ã‚   Each mother had high expectations for their lives as they came towards America, and especially their daughter’s lives.   â€Å"In America I will have... ...bowen/314fall/novels/lit.html)   Each in their own way has learned a lot from their mothers and can see over the gap that divides them.   In the Hsu family especially there is a strong sense of loyalty that is based on through each generation. â€Å"You must peel off your skin, and that of your mother, and her mother before her.   Until there is nothing.   No scar, no skin, no flesh.†Ã‚   (Tan41)   It is most important in Chinese culture to remember who you are and where you came from. Work Cited * Tan, Amy.   The Joy Luck Club. New York. Ivy Books. 1989. * Tavernise, Peter.   â€Å"Fasting of the Heart: Mother-Tradition and Sacred Systems in Amy Tan’s The Joy Luck Club.† 23 March 2000. * Amanda Matthews.   â€Å"Structural Analysis†¦Thanks to Amanda Matthews† 1995.

Tuesday, September 17, 2019

Hinduism and Buddhism Essay

In recent years, numerous Eastern philosophical thoughts have influenced the contemporary world in more ways than one. Eastern philosophy serves as the foundation of discipline and way of life for most Asians and even several individuals from the west . The significance of eastern influences not only incline on the purpose of commemoration of historical people but on the scrutiny of principles and doctrines that contribute to growth as well. In a strict sense, eastern philosophies have connections in one way or another and such connections are often found in the beliefs and practices of such schools of thought. Hinduism and Buddhism for instance are regarded as two of the oldest systems of discipline both in doctrine and practice (Moore & Bruder, 2005). These philosophies are two of the oldest in the Dharmic tradition, hence it is plausible for Buddhism and Hinduism to be the subject of comparison. Hinduism is the oldest major religion still practiced today, it traces its roots from unrecorded history. The doctrines of Hinduism are as diverse as its number of interpretations, as such, Hinduism per se is more of a spiritual attitude that spawns an array of religious and philosophicl beliefs and traditions (Moore & Bruder, 2005). The diversities come in different forms such as worship of elements in the form of any living entities up to cultured metaphysical theories (Moore & Bruder, 2005). The diversities of hinduism, conversely, are bound by the Vedic scriptures’ authority, these scriptures are the basis of understanding for the discreet natural state of things (Moore & Bruder, 2005). Buddhism on the other hand is a system of beliefs, originally from Siddhartha Gautama (Buddha), that responds to the supposed predicaments brought about by suffering which extends its arm to the feelings of sorrow, dissapointment, frustration, discontent, disaffection, pessimism and unfulfillment (Moore & Bruder, 2005). Buddha narrows the resolution to suffering in the context of his four noble truths: There is Suffering, Suffering has its causes, suffering has an end and there is a way to end suffering in the eight-fold path (Moore & Bruder, 2005). Hinduism and Buddhism both believe in the cause and effect principles of Karma. Karma’s is encompassed on the idea that intentions are the measuring factors of a person’s deeds. In Karma, these deeds will be carried over for several lifespans through an individual’s incarnations depending if a deed is morally good or morally bad (Moore & Bruder, 2005). Another element similar to Buddhism and Hinduism as the principles is Nirvana, though defferences are evident in the ways and means, the two are both directed to the attainment of the latter. Nirvana is a sanskrit word that literally means extinction and is applied in Buddhism and Hinduism as freedom from the cycle of life, death and reincarnation (Moore & Bruder, 2005). Personally, I concur to the system of beliefs suggested by Buddhism, primarily because it provides an easy, step-by-step guide to the achievement of the goal, nirvana. Gautama’s teachings, though hard and require discipline is the perfect path to enlightenment given that he primarily insinuates worldly desires and other emotions that hinder an individual from discovering the true self. Moreover, Buddha implies simplicity of Buddhist practices in the sense that he himself noted that anyone can achieve the insights that he had via focus, sincere meditation, continuous elimination of worldly desires and freedom from egoistic thoughts, fear and anxiety.

Monday, September 16, 2019

Describe the challenge faced by John Proctor Essay

Describe a challenge faced by a character in the text. Explain how the character dealt with the challenge.  In ‘The Crucible’ by Arthur Millar, many of the characters faced challenges. One character who was faced with challenge was the protagonist John Proctor. He faced the challenge of trying to keep his reputation intact in the face of a judgemental Puritanical community ruled by superstition and religious intolerance. The fact that he had an illicit affair with a young woman named Abigail was a major obstacle to clearing his ‘good name’ along with the fact that his wife Elizabeth lied under oath in court to try to protect him. John Proctor was faced with the decision between life and death to deal with the challenge of trying to clear this ‘good name’ John Proctor, the protagonist, had the major challenge of trying to deal with his adulterous affair with Abigail, the key anatagonist in the play. Abigail envied John’s current wife Elizabeth and she wanted to take her place. When Abigail had the chance to accuse people of being witches, Elizabeth was her first victim. Proctor however had to ruin his good name in order to accuse Abigail of faking her claims. To do this though was a challenge he faced as he was a man with high morals and didn’t want to ruin his name. A further challenge that John Proctor faced was when his wife Elizabeth was accused of witchcraft and had to testify to clear his name. When his wife Elizabeth was arrested after she was accused by Abigail of being a witch, Proctor knew he could have stopped this trial from continuing. He had the option of telling the court that the trial is a sham because he had an affair with Abigail and that she was out for revenge after Elizabeth kicked her out of the Proctor household and also because Proctor firmly rejected her saying â€Å"I will cut off my hand before I reach for you again†. The problem was if Proctor admitted his affair with Abigail, his reputation will be ruined. Eventually he finally admitted his affair saying â€Å"God help me, I lusted† implying that he regrets having an affair, but it was too little too late as the trials were no longer in his hands and was controlled by the court. The reason why it was difficult for John Proctor to clear his name Religious intolerance was rife in the Puritannical town of Salem and the court system was based on Biblical law. and you were either with or against God and like Danforth said â€Å"you are either with or against the courts†, you can only support one side. It is hard for Proctor to keep his reputation clean because of this reason. When he testified against Abigail, he put his reputation at stake. Eventually he is betrayed by Mary Warren and his final words â€Å" it is a whores vengeance† states that the court is based on myths not facts and Abigail is only doing this for revenge in Proctor’s final attempt to turn the courts. In the end, the final challenge that Proctor faced was whether to live or die to clear his name. When he was declared a witch by the religious court, he had the option of either signing a confession admitting to this or going to the gallows. Initially, he signed the confession but then ripped it up when he realised it would ruin his reputation and he felt guilt over the others who had been falsely accused. after his plea â€Å"give me my name, I have given you my soul† is rejected. At this point Hale the witch-hunter feels guilty about his actions and pleads to Elizabeth to make him confess; all she did was say â€Å" he’ll have his goodness now, god forbid I take it from him† stating that it was his choice and she can’t take it from him.  Therefore, through the circumstances that Proctor had, he dealt with the situations with courage and dignity. He managed to redeem himself from his earlier sins and keeping his reputation clean by choosing to hang rather than living in shame and having nothing to live for. In this way Proctor has ended his life full of pride and having his reputation clean.

Sunday, September 15, 2019

Current Health Care Issues

Current Health Care Issues HCS/545 Camille Fuller University of Phoenix The health care industry exist to provide preventative measures, diagnose health conditions, repair, and provide services to improve the quality of life. The cost of health care continues to rise each year. Health care fraud is a factor that continues to plague the health care industry. The affect health care fraud has on hospitals, is the increasing cost of medical services. The following research will examine and evaluate how organizational structure and governance, culture and the lack of focus on social responsibility affects on health care fraud. The following research will also include recommendations for prevention of health care fraud, recommendations for change of structure, governance, and culture. The following research will include prevention measure for future situations involving health care fraud. Health care fraud is a preventable situation in hospitals across the nation. Hospitals spend thousands of dollars on quality assurance and patient safety and still health care fraud continues to occur. Individuals across the nation make a living through health care fraud. Honest, hard working citizens of this country are financing health care fraud recipients, not by choice. Insurance companies, Medicare, and Medicaid are being schemed by fraudulent businesses. Channel 11 news in Colorado a scheme called, â€Å"Medical Provider Identity Theft† has been uncovered. Perpetrators stol the identity of a physician in Pueblo, Colorado. The perpetrators set up an office in Denver, Colorado called, â€Å"A Plus Billing. † The office and address was used to receive mail and phone calls. The physician’s name and medical identification number was used to bill Medicare for test and procedures that were not preformed. This type of scheme is running rampant across the United States. Dr. Cabiling did not know that his identity had been stolen until he received a phone call from Medicare. Medicare asked Dr. Cabiling if he practiced in Denver and Dr. Cabiling said, â€Å"No. † Medicare then notified Dr. Cabililng that they had received bills from an office in Denver with his name and medical identification number for payment of services rendered. Dr. Cabiling only practices in Pueblo and not in Denver. Further investigation uncovered more than $1. 8 million dollars had been paid out to the A Plus Billing Company. â€Å"Court documents show the address A Plus Billing used was 600 17th Street in Denver, room 2800. The company submitted bills for numerous things including MRI’s and EKG testing, claiming they had medical offices at that address. But instead, 11 News discovered it was home to a company hired to receive mail and answer the phone for $150 a month. And, according to records, the lady who was suppose to pay that bill, Aliya Valeeva, is no longer in the country. Medicare sent the money to an account at a BBVA/Compass Bank in Denver, under the name of A Plus Billing. Now the FBI has moved to seize nearly $800,000 of it (Potter, 2011). † Dr. Cabiling inadvertently received checks from Cigna, leading the physician to believe that the ghost company had targeted other insurance companies other than Medicare. Prior to President Obama’s health care reform, insurance companies were required to submit payment for services rendered within 15 days of receipt of the claim. Since President Obama's health care reform act the timeline for payment of services rendered gives agencies more time to make payments, review and investigate claims. Fraudulent claims are easier to detect with the new health care reform in affect. Fraudulent claims are nothing new to insurance companies. Perpetrators have targeted insurance companies for a long time. Medicare and Medicaid are the two type of insurance companies targeted. Medicare and Medicaid staff is inundated with claims. There are more claims to be processed then there are staff and time. New timelines and guidances to follow, allow the staff to follow up on suspicious claims. Since the Affordable Health Care Act was passed and implemented â€Å"Medicare officials say with their new tools for fighting fraud, they have reclaimed $4 billion last year alone (Potter, 2011)†. The previous organizational structure for payment of services rendered did not allow officials enough time to investigate claims to ensure the claims were legitimate. Perpetrators study the law and use the knowledge to fraud insurance and government agencies. The governance of rules, regulations and laws was not stringent enough to stop perpetrators from frauding the system. New guidelines allow agencies more time to detect suspicious claims, investigate and save the insurance companies millions of dollars. Society does not concentrate on proactive actions to prevent fraud, instead society deals with the problem after the fact. Consumer watch groups do not have tools in place to prevent fraud. Perpetrators rely on the oversites of insurance companies in order to target and fraud insurance companies. Insurance companies and the federal government should pool resources using a percentage of profits to finance a task force to arrestively fight fraud. The penalty for fraud should be more stringent which will cause perpetrators to think twice before formulating a plan to commit fraud. The Affordable Health Care Act is the beginning of many programs established to fight against fraud. Health care fraud is a growing problem and should be taken more seriously by citizens of the United States. Physicians, health care workers, and patients are responsible for proactively protecting personal information to prevent identity theft. The case of Dr. Cabiling could not have occured if his medical identity had not been stolen. A closer watch of personal information to prevent identity theft is the beginning to prevent health care fraud. The federal government should have in place the ability to prosecute offenders to the fullest extent. Harsh punishment may deter offenders from comiting the offence. Ethical issues concerning medical fraud is as simple as knowing what is right and what is wrong. Society should take responsibility of his or her own personal information. Identity theft is no secret, therefore society should be more proactive. Do not leave an open door for offenders to walk in and take what does not belong them. The laws for offenders should be more stringent. The current structure of physicans medical information is too easy to obtain. The structure of physicains medical information should be in encripted messages making the degree of difficulty high enough to ward off offenders. There are some offenders that will stop at nothing until they have gotten the information he or she is wishes to obtain. Stricter rules and guidelines can ward off these offenders. Governance over the guidelines for payment for services rendered should include the following; varification of physician’s medical information making sure the physican is aware of the charges being submitted to insurance companies. The time line for payments to be released to physicians or billing companies are lenghtened to allow incurance companies time to investigate suspecious claims. The culture of one waiting for another to do what is right is an occurance needing change. The culture can be changed through leading by example. Educating society through public service announcement is a start. Public service announcements reach more people than emails, newspaper articles, and phoone calls. An aggressive campaign to stamp out medical fraud through prosecuting identity theft offenders is an additional way to combat medical fraud. Through public service announcements society is informed of his or her responsibility to protect personal information to prevent identity theft and medical fraud. Fighting identiy theft and medical fraud cost less than the billions of dollars paid out to offenders. Remind society they the communities in which he or she live in are the one that ultimately pay the price through higher health care premiums, higher prices for health care services, and through higher taxes. In conclusion health care fraud is now being done through identity theft. Identity theft can be combatted through public awareness and the public taking responsibility to protect his or her own persoanl information. Dr. Cabiling through no fault of his own was a victim of identity theft. Dr. Cabiling did not know that his medical identity had been stolen until he received a phone call from Medicare. Dr. Cabiling can now contact the different insurance companies to alert them of the fraudulant activities concerning his medical information. The insurance companies can contact Dr. Cabiling prior to making payments on calims. The insurance companies making phone calls to Dr. Cabiling may take more time, but will save the companies money in the long run. Combatting medical fraud and identity theft is everyone’s responsibility. References Cohen, G. (2010, March/April). Medical tourism: The view from ten thousand feet. Hastings Center Report, 40(2), 11. Health care reform to have impact on ethics. (2010, May). Medical Ethics Advisor, 26(5), 54. K. Potter, 2011. Medicare Fraud Scheme Takes Nearly $2 Million, Pueblo Doctor’s Identity Stolen; http://www. kktv. com/home/headlines/Medicare_Fraud_Scheme_Steals_Millions_131567818. html

Saturday, September 14, 2019

Essay Football vs Rugby

Ricardo Pardey ID 596397911 Second Essay February 15, 2013 Football Vs. Rugby When I was a senior in high school, I played on my school’s rugby team. It was really excite and funny while I played almost all weekend even though it is not popular in Colombia. But then when I came to the United States, it catch my attention that everybody likes and watches Football and it made me contrast these two aggressive sports Rugby and Football. These two sports are almost the same, for example the object of both games is score points by carrying the ball beyond the possessive touchline and the ball has a prolonged spheroid shape.Even though they are similar in some aspects, the first big difference is related with the source. Rugby proceeds from England and Football from the USA. Because of their foundation, many small differences have been created that show the importance of the characteristics of the society and their impact on sports. First started with Football, this sport was created in the United State, which impacted the characteristics of the game. The major league of this sport is called the National Football League (NFL), and the major tournament is the Super Bowl.The rules of the game are; the game is formed by four 15-minute quarters with a half-time intermission, which shows that in the American mindset, it is better a lot of short times than a few very long halves. The field must had 120 yards long by 53. 3 yards wide, based on the measuring system used there. The ball is a prolonged spheroid, which is about 11 inches long and 22 inches in circumference and it, weight around 0. 875 lbs, to make the balloon aerodynamic so that it can travel longs distances. Each competitor must use helmets and padding during the game.The name of the things change, for example when you made a goal in Rugby it is called Try and in Football, touch down. Showing that the team can make unlimited substitution in each game but always having 11 players on the field, showing tha t in America the people believe that when anything stop working a hundred percent, it must be replaced by new ones One of the huge differences between Rugby and Football is that the number of substitutions that can be done by the coach in each game thanks to English cultural influence is 7.The other high-contact sport is Rugby, which was created in England. The major Tournament is the World Cup (Rugby Union) and the most known League is the Super 15; but there are a lot of leagues all over the world, among them are Aviva Prem, top 14, and in an international level NSW suburb rugby; Showing that the people play this sport all over the world not like Football, which is played only in a part of North America. The rules of this sport state that the ball must have the international 5 size, that means 27 cm long and 60 cm in circumference with a weigh around 1lb.The fields have 120 meters long by 70 meters wide according to the metric system. On the field there must be situated only 15 pl ayers. They play two halves of 40 minutes with a ten-minute half time. The additional difference is the size of the player, as they don’t use helmets or any other equipment except a mouth guard. They have wider backs, being the thinnest player just 81kg and the heaviest 201. 7kg. The name of a goal is Trying and after made a point one player kicks the ball between the goal posts to win more points.After seeing the specific characteristic of both sport and the reason why they have these differences, to summarize, Rugby and American Football are two sports with intense physical aggression and the same goal: carrying the ball beyond the opponents touch line and kicking the ball between the goal post after they make the point. Even though they are parallel in some aspects; there are differences based on the source, such as the size of the ball, the field and the players, the length of the game and the number of substitutions permitted per team.In my personal experience, the place where the sport is created has a huge relation with the characteristics of the game. Because for example as football was created in the US the people over there like it because it is according to their characteristics; however, in the opposite side if a sport was created in a different country and the people want to play it, they will face some things can be consider whether not loved and strange, since recreation with Rugby in Colombia is not popular.

Friday, September 13, 2019

Diversity Plan PowerPoint Presentation Example | Topics and Well Written Essays - 250 words

Diversity Plan - PowerPoint Presentation Example en looking for players or the sports leaders the sports management board should cast their nets wider in order to recruit people from different ethnic and cultural groups (Cunningham, 2011). The management board should also establish mean of encouraging the underrepresented groups to participate in sports. A campaign should be established to encourage all students to participate in different sports. Those who join the sports should not be discouraged. They should be trained and offered with moral support in order to like the games (Cunningham, 2011). The sports management team in the college should also create a sports culture that enables all students to be involved fully. The culture will enable each person to enjoy sports and join the games of their interest. In the college, there should be an environment that gives everybody an opportunity to compete, officiate, play, coach and volunteer in sports. Inter-ethnic competition should also be burned, and all students should play as a team regardless of the race (Cunningham,

Thursday, September 12, 2019

Developing Management Capability Speech or Presentation

Developing Management Capability - Speech or Presentation Example Your first lines, therefore, should be creative, exciting and interesting. b) 'These next lines are good, and they can be effective if said with passion that will show the listeners how significant a small percentage (like 2 per cent) can be when considered in context of the base amount which, in this case, is 1.2 billion in euro. Assuming that these figures are all well-researched and accurate, this part should serve to be when the you - the speaker - convince the listeners that what you are presenting is worth looking into. The presentation slides used to highlight these lines should show pictures of the market that the listeners would want to tap. Without such critical slides, the important point relayed by this part of the presentation - the market you want them to target - will just be missed by the listeners. c) These lines should never be said, "What sort of things do I mean by informational-educational This is not the best example, but it will help to illustrate the idea: Sotheby's has produced a video guide to eighteenth-century French furniture." They are ineffective points that will only ruin your presentation. These lines give your listeners the feeling that your presentation is not the best that you can give or do. Citing examples to make things clear would be effective only if the examples used for the purpose are the best and the most fitting. It is one big blunder to use second-best examples to illustrate a point; and it is another equally big blunder to actually tell the listeners that the example you are about to name is actually not the best. To be persuasive and convincing, your listeners should be made to feel that you took pains to put together for them a great presentation that contains accurate data and intelligent choices of words, examples, and lay-out of the slides. d) "Now I'd like to talk about where I see the opportunities in this market. I see them at the high end - the affluent - I think it's a defined target, it has a lot of discretionary income, and its interests lie in the areas I want to market into." These lines are ineffectively worded. There are better ways to put the points therein to words. Instead of those lines that rather sound dragging, you should instead use a slide or two to show the listeners a diagram of the entire DVD-renting population and then to specifically point out the specific part of it that represents the market niche that you want to capture. Attaining such goal should be doable if your listeners will be fired up and become enthusiastic and passionate believers of what you yourself believe in. e) "The project would investigate the viability of starting a production and distribution outfit in Europe; it would investigate the potential product portfolio in the market, and would essentially turn an idea into a business proposition that can be put to a bank to raise capital." These lines would dampen the excitement roused by your earlier lines. These are ineffective points, unless they are rephrased and discussed with more optimistic and energy. The financing concerns are to be dealt with by the finance people, and maybe the conservative and serious words are the ones to use when talking with them. But when talking to a group for the purpose of

Wednesday, September 11, 2019

CLOCKS Assignment Example | Topics and Well Written Essays - 500 words

CLOCKS - Assignment Example Quartz crystals can be set vibrating with an electric current with crystal vibrations ranging from 2.5 to 5 million times a second. This means that vibrations in quartz clocks allow them to get time measurement to an accuracy down to a millionth of a second. The present day quartz clock developed in the early 1900s, clock needs certain basic requirements for it to work. First, it must have a power source that will allow it to create motion. Second, the clock must have a time base which provides a periodic oscillation dictating the measurement of time. The time base is essentially the device that controls clock signals. Lastly, it must have a way to convey the information generated by the time base and be able to display this information to actually tell time. During the 19th century until the middle of the 20th century, the pendulum clock was the standard time teller. The principle of the pendulum at work is such that its swing is independent of the amplitude, or size, of the swing. In effect, the only factors affecting the amplitude are the length of the pendulum and the force of gravity. Each swing of the pendulum releases a spring-loaded ratchet in the clock mechanism, which drives the hands. If the pendulum is left alone, frictional forces would act upon it and so it will eventually stop. Thus, a pendulum clock must contain a weight-driven or electrically operated mechanism that periodically pushes the pendulum to keep it swinging. Pendulum clocks and earlier versions of watches known as chronometers are quite cumbersome because their movement stops when they are not wound. In addition, pendulum clocks are highly dependent on external forces such as the force of gravity and temperature. Thus, quartz clocks and watches are the more popular options today. Quartz clocks are battery powered with gears regulated by a tiny crystal of quartz. When the battery sends electricity to the quartz crystal through an electronic circuit, the quartz crystal oscillates at

Tuesday, September 10, 2019

Popular Culture Race and Ethnicity in the Movie King Kong Review

Popular Culture Race and Ethnicity in the King Kong - Movie Review Example Accordingly, the representation of blacks and minorities, or indigenous populations in film, has become an issue of social concern. The objection which several critics expressed towards King Kong (2005) and their denouncement of it as a racist film needs to be understood within the context of the larger social issues at stake and should not be dismissed as exaggerated reactions to innocent entertainment, as some have done. Indeed, King Kong is founded upon racial stereotypes and cements racial prejudices in its portrayal of indigenous populations as savages, its suggestion that blacks are wild beasts, such as is King Kong, who can only be tamed by the civilised Caucasian. Critical reactions to King Kong (2005) have tended towards its denouncement as a racist film, on the one hand, to its defence as innocent entertainment, on the other. Espousing the former view, McCarthy (2006) maintains that the storyline and plot revolve around three of the oldest and most persistent of the known anti-black stereotypes. These are that all non-Caucasians are savages and that members of the black race are hardly distinguishable from wild beasts (McCarthy, 2006). In this film, the non-Caucasians are represented in the hardly human, unmistakably savage and completely unwashed figure of the Skull island natives and blacks in the form of the gigantic and uncontrollable savage figure of the ape. The third stereotype upon which this film is founded and which its storyline propagates and legitimizes is that of the civilized Caucasians who, by the very nature of their appearance and the culture and civility which they symbolize, are able to tame, control and potentially even civilize the savage and the wild. King Kong (2005) promotes these stereotypes and should, accordingly, be classified as a racist film. For multicultural societies which are struggling to create a culture of racial tolerance and acceptance to replace the culture of racism, films such as this can have a potentially detrimental effect. Pon (2000) highlights this potential consequence by arguing that racist messages legitimize an audience's possibly racist sentiments and justifies their perception of minority races and groups as inferior. When these messages are conveyed in a multicultural society, they immediately conflict with multiculturalism's message and, accordingly, can contribute to racial tensions (Pon, 2000). In direct reference to Canadian society, popularly regarded as a successful experiment in multiculturalism, the message conveyed by King Kong (2005) does not simply conflict with official messages regarding racial tolerance and understanding but it touches upon the underlying racial tensions which exist beyond the surface. Studies have indicated that increasing numbers of racial minority groups and indigenous populations feel marginalized and discriminated against. The number of blacks and natives feeling out of place in society is on the rise. In 2002, 35% of blacks and 20% of natives in Canada reported unfair discriminatory treatment 'sometimes' or 'often' (Statcan, 2002). Therefore, films which wrongfully portray the true nature of blacks and native/indigenous populations, have the potential to enhance the mentioned feelings of marginalization and to deepen the racism which many Canadian minority groups feel they are subjected to. The fact that King Kong

Monday, September 9, 2019

Continuous improvement on the free-throw line Coursework

Continuous improvement on the free-throw line - Coursework Example and recording the current process and identification of the causes of variation from the ideal and the current situation is conducted through analysis of a cause and effect diagram. Understanding the causes of variation allowed Timothy to seek alternatives for his son including standing at centre of the free-throw line, bouncing the ball four times, focussing on the middle part of the ring and aiming for a perfect shot, and shoot. Developing an action plan incorporating the alternatives forms the second phase of the cycle. Implementing the alternatives in a real time situation and making comparison with expected results is the last part of the cycle, which in the case involve the improvement of Andrew’s free-throw percentage to 69% from 42% in 1994 season and 71% in 1995 season and an average of 60% in-game practice. Changing the technique resulted in a fall of the throws for the 1996 season with a shooting percentage fall to 50% and reinstallation seeing an increase to 70% in gamer practice and 75% in 1996 and 1997 seasons. Benefits from the (PSDA) include improved results in practice and games, augmented confidence, and profound knowledge of the determination of changes in shooting technique resulting in

Sunday, September 8, 2019

Gas Turbine Engine Compressors - Comparison Essay

Gas Turbine Engine Compressors - Comparison - Essay Example Its working fluid is air. The compressor then utilizes the mechanical energy that is imparted from outside so as to enhance static pressure head. In its configuration, it has four basic components: an inlet, impeller, a diffuser and a collector. The impeller increases the velocity of the fluid (Kerrebrock, 1992). In its working, the impeller rotates with a shaft and the casing which encloses the impeller. Due to this rotation, fluid is forced into the inlet as a result of the upstream pressure. As the impeller rotates, fluid moves to the discharge side. Movement of fluid to the discharge side creates a void. This implies that there is reduced pressure at the inlet of the impeller. There is pressure development in the compressor casing inlet. This provides additional air (fluid) into the impeller so as to fill the void (Carl, 2002). On reaching the impeller, the entering fluid flows along the impeller vanes. The fluid velocity increases as it progresses. Fluid at the impeller tip outlet is at maximum velocity. Fluid then enters the casing and expansion of the cross section area occurs. Diffusion occurs in the diffuser as fluid velocity reduces. The diffuser converts the high velocity (kinetic energy) of the fluid into pressure by increasingly diffusing the velocity of the gas. All these lead to the increase in the pressure of fluid (static pressure/ potential energy). This follows the Bernoulli’s principle (Carl, 2002). The final component of the centrifugal compressor is the collector. This is the chamber where diffuser discharges. Axial compressors are aerofoil based compressors utilizing rotatory movement. In the axial compressors, the working fluid flows in a parallel direction to the rotation axis. Axial flow compressors are capable of generating high pressure ratio on a single shaft. Several axial flow stages are combined so as to lead to high pressure ratios. Therefore, the axial flow compressor

Rewright this paper Essay Example | Topics and Well Written Essays - 500 words - 1

Rewright this paper - Essay Example For instance, in general, young ones are much more respectful to elders than they are to peers. This, I believe, is not so much a part of their intrinsic personality than something that is expected from them in social environment. I disagree with Goffman’s argument on the differentiation of roles and identities. I do not think these need to be differentiated since both – the person one really is, and the person he aims to be perceived as – are fundamentally derived from the person’s original identity. Human identity is a complex entity and is made up of a variety of things like one’s history, experiences, character, interests, etc. People may not just have two sides to them- one with a mask and one without. I believe that people have several different characteristics in them, and in an attempt to relate to others and not feel isolated, they bring out different sides of themselves in different social situations. Impression management is essential as it aids people in gaining a sense of respect and familiarity in foreign surroundings. On the whole, it provides society with order and structure. Though self-expression individualism and important qualities, I believe that these need to be kept under control in certain environments, especially those which require professionalism from a person. Even if it is an interaction with one’s parents or close friends, a certain socially acceptable behaviour is required of everyone. Impression management is a technique that is always at work, except for the times when a person is completely by himself. A common example of conscious impression management in a social environment is boarding school. When every year, a small group of new students enter the school, they interact with seniors who have already formed a closed community amongst themselves. In order to be accepted to this closed community, the freshmen change their mentalities and

Saturday, September 7, 2019

Organizational Behavior Essay Example for Free

Organizational Behavior Essay There are basically 2 types of organizational structures commonly found in every organization. Namely these two are the vertical organization or the horizontal organization. (Deal, Kennedy, Deal Kennedy, 2000). I myself have worked in both scenarios and personally favor the horizontal approach as the proposition for success is to work in teams, and cross functional teams. If a company follows a vertical approach then supervision of work becomes a much more difficult task and communication gaps arise which have been termed as the major component of project and process failures. In a horizontal organization hierarchal levels are divided in such a way that management of work becomes easier and people of different departments can share their expertise and knowledge when working together. An organization’s bottom line consists of 2 aspects, which are sales and costs. It is the major objective of any organization to maximize its sales and decrease its costs to the minimum in order to extract maximum revenues and hence increase profits and growth (Belker Topchik,2005). Costs can be reduced when a horizontal structure is being followed as the number of channels through which information flows till it reaches its destination is reduced but opposite is in the case of a vertical approach where any information needs to cross through many channels before it reaches its destination. his results in the altering of the original message which negatively affects business plus due to the number of channels costs also increase (Porter, 1998). In the same way cross functional teams in a horizontal approach can lead to better and efficient performance as each member of the team is representing his or her department and wants to prove his or her abilities, hence this results in more efficient business processes (Singer, 2004). On the other hand a vertical approach makes it difficult for the company to work because no department is ready to share his or her data with other departments and it is difficult to manage the circulation of information throughout the organization, which results in slow business processes and inefficiency.

Friday, September 6, 2019

Network Security Analysis Essay Example for Free

Network Security Analysis Essay This article is concerned about network security. It mentions about the present situation of network security and an analysis of the reason that lead to unsafe network environment. Then the article introduces two frequently used protocols in network security: HTTP (Hypertext Transport Protocol) and HTTPS (Hypertext Transfer Protocol over Secure Socket Layer), then compare them and give a brief conclusion. On the other side, the article introduces how firewall protects network security in hardware aspects. Keywords: Network; Security; Analysis; Countermeasures 1. Introduction As technology develops, network is getting more and more mature. It is known to all that security is the second step after that a successful network has been deployed. 1.1 Situation of Computer Network Security With the rapid development of the Internet and the widespread application, the number of computer viruses, Trojan horses is explosive growth. According to Jinshan drug gangsters cloud security center monitoring statistics show that in 2008, Jinshan drug gangsters were intercepted more and more new viruses, Trojans, which grew up 40% compared with 2007. The center statistics also show that 90% of the virus infected users, this attachment web pages that humans are enjoying the network information with the great wealth and convenient at the same time, also be the severe beset by problems of network information security. The lure of wealth that hackers attack is no longer a kind of personal interest, but more and more become an organized, interest driven career crime. Its main means has: online professor viruses, Trojan horses production technology and various network attack technology; Online exchange, trafficking and rental viruses, Trojan horses, zombie network; Online customized viruses, Trojan horses; Internet theft behavior (account Numbers game, bank accounts, QQ number, etc.), sell the trumpets; Internet fraud and extortion; Through the network business platform money laundering profit, etc. Attackers need technical level gradually decrease, means more flexible, joint attacks increase rapidly. Trojan viruses, Trojan virus writers, professional hack personnel, sales channels, professional players have been formed complete gray industrial chain. 1.2 Threats to Computer Network Security The threat to computer network security includes attacks by hackers and computer virus. It mostly presents in the following aspects. Firstly, send fake E-mails to users. It is a common way to cheat the account and password by posing as legitimate websites. Secondly, damage caused by viruses is also a common phenomenon. For e.g. when virus gets into computer, it will cover our hard disk with useless data. Thirdly, it’s about unauthorized accessing. This mainly refers to the normal use or oversteps their authority to use the network equipment and information resources. Fourthly, damage the integrity of the database. Fifthly, interfere with the normal running of the systems. Finally, communication lines are tapped and people are not familiar about safety of network security. The first situation doesn’t occur in common. However, awareness of maintain computer network security is really important. In the article, it mainly analyzes several common situations and introduces what the threat is and how it works. 1.3 Countermeasures of Network Security As network security has a lot of loopholes, people create a lot of methods to protect network. On the side of hardware, people begin to use firewall to protect network. On the side of software, a lot of tools and technologies have been used in this area, such as router filtering. The article introduces how firewall works and two similar protocols: HTTP and HTTPS. By comparing these two protocols, we will find the development of technology. 1.4 Importance of the Study of Network Security It’s important for securing ones computer, keeping important data and profile information protected. Careful web surfing habits may keep you from being a victim of virus attacks and malware, however this is an intensely risky activity and very often people may end up with an infected computer. Some good anti-virus programs will help to keep your computer protected and safe, but users must remember to keep this updated regularly for better protection over new viruses. 2. Related Work 2.1 Network Security Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and over seeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password. 2.2 ISO/OSI model The International Standards Organization (ISO) Open Systems Interconnect (OSI) Reference Model defines seven layers of communications types, and the interfaces among them. (See Figure 1.) Each layer depends on the services provided by the layer below it, all the way down to the physical network hardware, such as the computers network interface card, and the wires that connect the cards together. People develop a lot of protocols to each layer. Such as PPTP/L2TP to linked layer, IPSEC to network layer, TLS/SSL to transfer layer. Each protocol includes security information that helps network transfer safer and safer. 2.3 IPV4 protocol The protocol contains a couple aspects which caused problems with its use. These problems do not all relate to security. They are mentioned to gain a comprehensive understanding of the internet protocol and its shortcomings. The causes of problems with the protocol are: 1. Address Space 2. Routing 3. Configuration 4. Security 5. Quality of Service The lack of embedded security within the IPv4 protocol has led to the many attacks seen today. Mechanisms to secure IPv4 do exist, but there are no requirements for their use. IPsec is a specific mechanism used to secure the protocol. IPsec secures the packet payloads by means of cryptography. IPsec provides the services of confidentiality, integrity, and authentication. This form of protection does not account for the skilled hacker who may be able to break the encryption method and obtain the key. 2.4 Types and Sources of Network Threats Denial-of-Service, unauthorized access, executing commands illicitly, confidentiality breaches and destructive behavior are common type of threats to network security. The sources of network threats include 3 aspects. Firstly, the invasion of bad information and pollution. Network is open, even borderless space information network of people in the rich cultural life, but also to the illegal dissemination of information or indecent information provided soil British Middlebury Seck Griffith University, Professor Di Mulai study found that in non-academic information on the Internet, 47% of pornography on These content without restriction for people feel free to browse, not only seriously jeopardize the health of young people, and poison the social atmosphere and hinder the building of a harmonious society in China. In addition, the networks openness and freedom are often some criminals use, or dissemination of endangering national security, to subvert the government, disrupting social order and security of information, or information network organizing rallies and other anti-social activities. Secondly, Internet hackers and computer crime. Hacker wanton rampage information networks, technology and the consequences of its invasion of escalating their use of technical means, or attacks on government sites or military organizations Web site and endanger national security interests, undermine government image; or steal business, financial institutions, business information to profit illegally, endangering the economic order; or steal personal confidential information, violation of privacy or stolen cash. These acts seriously impede the normal operation of information networks. In addition to outside hackers the use of the Internet, the rampant crime and tort. The use of computer information network system to implement theft, fraud or corruption, embezzlement and other crimes than the traditional criminal methods and tools more subtle complexity, and violation of trade secrets with the network, electronic communications freedoms, civil Privacy and damage the reputation of others and other events are also frequent. Online pyramid schemes, online fraud, etc. These crimes have been on the network posed a serious threat to network security. Thirdly, the existence of their own network security vulnerabilities and risks. Freedom to share and open spirit of the Internet, but also the charm of the Internet The Internet is based on TCP / IP protocol, network devices, operating systems with networking capabilities and openness about the existence inherent vulnerability In addition, the software in the design, it is inevitable there are some defects or flaws, which has become a prime target for hackers, while software programmers deliberately left the back door has become a major network security risks network These weaknesses of their own existence, to bring the work of anti-hacker considerable difficulty: on the one hand difficult for scientists to develop a common and effective network security for the protection of technical means on the other hand the lack of implementation of these measures sufficient to protect the social environment. 3. Methods 3.1 Analysis of Network Security System and network technology is a key technology for a wide variety of applications. Security is crucial to networks and applications. Although, network security is a critical requirement in emerging networks, there is a significant lack of security methods that can be easily implemented. There exists a â€Å"communication gap† between the developers of security technology and developers of networks. Network design is a well-developed process that is based on the Open Systems Interface (OSI) model. The OSI model has several advantages when designing networks. It offers modularity, flexibility, ease-of-use, and standardization of protocols. The protocols of different layers can be easily combined to create stacks which allow modular development. The implementation of individual layers can be changed later without making other adjustments, allowing flexibility in development. In contrast to network design, secure network design is not a well-developed process. There isn’t a methodology to manage the complexity of security requirements. Secure network design does not contain the same advantages as network design. When considering network security, it must be emphasized that the whole network is secure. Network security does not only concern the security in the computers at each end of the communication chain. When transmitting data the communication channel should not be vulnerable to attack. A possible hacker could target the communication channel, obtain the data, decrypt it and re-insert a false message. Securing the network is just as important as securing the computers and encrypting the message. When developing a secure network, the following need to be considered: 1. Access – authorized users are provided the means to communicate to and from a particular network. 2. Confidentiality – Information in the network remains private. 3. Authentication – Ensure the users of the network are who they say they are 4. Integrity – Ensure the message has not been modified in transit 5. Non-repudiation – Ensure the user does not refute that he used the network Here we mainly discuss fake websites. Fake websites means phishing. Phishing is attempting to acquire information (and sometimes, indirectly, money) such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures. Once a victim visits the phishing website, the deception is not over. Some phishing scams use JavaScript commands in order to alter the address bar. This is done either by placing a picture of a legitimate URL over the address bar, or by closing the original address bar and opening a new one with the legitimate URL. An attacker can even use flaws in a trusted websites own scripts against the victim. These types of attacks (known as cross-site scripting) are particularly problematic, because they direct the user to sign in at their bank or services own web page, where everything from the web address to the security certificates appears correct. In reality, the link to the website is crafted to carry out the attack, making it very difficult to spot without specialist knowledge. Just such a flaw was used in 2006 against PayPal. A Universal Man-in-the-middle (MITM) Phishing Kit, discovered in 2007, provides a simple-to-use interface that allows a phisher to convincingly reproduce websites and capture log-in details entered at the fake site. To avoid anti-phishing techniques that scan websites for phishing-related text, phishers have begun to use Flash-based websites. These look much like the real website, but hide the text in a multimedia object. 3.2 Firewall’s Protection A firewall can either be software-based or hardware-based and is used to help keep a network secure. Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. A networks firewall builds a brigade between an internal network that is assumed to be secure and trusted, and another network, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted. In general, some functions that can be done by the firewall are: 1. Doing a packet filter firewall can make the decision whether to accept or reject the incoming data packets. 2. Hiding Network Address (NAT) IP addresses can be used on the internet is a public IP. So to create a client that uses private IP can be translated into public IP. These functions are performed by a firewall, known as NAT. 3. Monitoring and Logging to improve network security and logging on the terms monitoring by a firewall. 3.3 Protocols of Network Security Network security protocols are used to protect computer data and communication in transit. The primary tool used to protect information as it travels across a network is cryptography. Cryptography uses algorithms to encrypt data so that it is not readable by unauthorized users. Generally, cryptography works with a set of procedures or protocols that manage the exchange of data between devices and networks. Together, these cryptographic protocols enhance secure data transfer. Without cryptographic network security protocols, Internet functions such as e-commerce would not be possible. Secure communication is necessary because attackers try to eavesdrop on communications, modify messages in transit, and hijack exchanges between systems. Some of the tasks networks security protocols are commonly used to protect are file transfers, Web communication, and Virtual Private Networks (VPN). The most common method of transferring files is using File Transfer Protocol (FTP). A problem with FTP is that the files are sent in clear text, meaning that they are sent unencrypted and therefore able to be compromised. For example, many webmasters update their sites using FTP; an attacker using a packet sniffer and the website’s IP address can intercept all communications between the webmaster and the site’s server. Here we mainly discuss two similar protocols: HTTP and HTTPS. The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. Hypertext is a multi-linear set of objects, building a network by using logical links (the so called hyperlinks) between the nodes (e.g. text or words). HTTP is the protocol to exchange or transfer hypertext. The standards development of HTTP was coordinated by the Internet Engineering Task Force (IETF) and the World Wide Web Consortium (W3C), culminating in the publication of a series of Requests for Comments (RFCs), most notably RFC 2616 (June 1999), which defines HTTP/1.1, the version of HTTP in common use. Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol (HTTP) with the SSL/TLS protocol. It provides encrypted communication to prevent eavesdropping and to securely identify the web server with which you are actually communicating. Historically, HTTPS connections were primarily used for payment transactions on the World Wide Web, e-mail and for sensitive transactions in corporate information systems. In the late 2000s and early 2010s, HTTPS began to see widespread use for protecting page authenticity on all types of websites, securing accounts and keeping user communications, identity and browsing history private.