.

Saturday, August 31, 2019

Ways has gender expectation changed over generations

Gender expectation generally means sets of behavior that society decide how female or males should think, act or feel. Many people get confuse about thinking that sex and gender are the same; however, Ashley Grossman, sociologist, explains â€Å"sex is biologically assigned while gender is socially constructed, socially created†. (Grossman) Therefore, gender is influenced by cultural, family, environmental, religious, educational, socioeconomic and geographical setting; in other words, it Is more nurture than nature. Many theories have been written to describe the gender role, how It Is formed.For example, The Evolutionary Psychology Theory of Gender says that different roles in reproduction places different pressures on males and females, which creates gender roles as the man being the more competitive and violent figure, while the women being more involved in nurturing activities. The Social Role Theory of Gender says that gender roles are formed by psychological gender diff erences caused by contrasting social roles of women and men. The Social Cognitive Theory of gender states that children's gender development occurs through observation and imitation of gender behavior.While my conclusions will not be based on these theories, they do help explain the formation and change of gender roles across time. Let us have a jump in the past. For more than 7000 years of human history, since agriculture and early States emerged, men were dominating the society they lived in, from the micro-world of families to the public macro-world of education and work. They have been tasked to provide for their family, from hunting and bringing home food for survival, like In our earliest days, to go to work and earn a paycheck and bringing home the bacon, like in our recent times.On the contrary, women were not even considered legal entities, persons in the legal sense. Until the end of the 19th century, an educated woman that was actually able to read books and have her own opinion, was not considerable a desirable wife. That's how strong the Institutionalizing of differentiation between women and men within society was. Even today, In some society, women are the slaves of men, completely disemboweled and vulnerable; some they must cover their faces In public or forbidden to appear outside their home without the presence of their husband.Back o 18th Century, sex role were rigid, with women assigned to be caregiver, mother. â€Å"In classic German phase, women were expected to dedicate themselves to the four KS : Creche (Church), Chuck(Cooking) ,Kinder (Children), undo Killdeer (and cloths)†. (Tier-Anna 13) This is female expectation In the past, and If a woman tried to break out of these roles , she might risk getting server disapproval. Regarding the education of women, the intellect of woman was limited by an unjustifiable restriction: the education was not objectively given to women. They were excluded from the subjects which men were trained .In the case of few people, male or female, attaining some education beyond basic reading, writing, and little math, the higher education was reserved primarily for men. Moving on the political point of view, women were not allowed to get Involve In pollute: had no right to vote, had no chance to be a governor, been changed drastically, generation over generation, more in women than men: women have come a long way; they are getting married later in life, giving birth later and they are getting more opportunities in which in the past generation were not allowed to.Likewise, men have more responsibilities in many roles which in the past were expected from women. We can list the main differences from the past in family rules, education and work. In recent years there has been a redefinition of man and woman roles in the family. The man tends to spend more time with their children, taking advantage of a working woman. Statistically though, only the time spent with children has increased from the father side. The mother, despite working, still spends the same time with her children, which is still higher that the father. Eventually, the chores are done from a person they both hire.The role of father has changes so much that there has been a rise of men's groups which feel been disadvantaged in this society where the legal system and the family court (in matters relating to access, child care and associated financial costs) is definitely in favor of women. Glen Sack shares his idea regarding to being househusband or stayed home dad (SHAD) that â€Å"Men need not fear a loss of power when they become a SHAD. While Shads are sometimes stereotyped as being at the mercy of their stronger wives' commands, in reality, I have more power in the family now than I ever did hen I was the family breadwinner† ( Sacks 266).This example shows that staying home and taking care children, which is expected to be a woman Job, not only man can do, but also been accepted from soc iety. Coming to education, women have finally gained access to all kind of education, even if there is still a margin of higher paid salary among the male gender. While there is improvement, for the social status of women in education and work participation rates, women still are experiencing conflict and differences in power in the workplace. For centuries there has been a sexual division of Jobs' rates of pay were women were paid much lower than males.This difference was Justified by the idea that men had the responsibility to support their family, whereas women tent to work less because of family commitments, childbirth and child-bearing ; therefore, occupations dominated by men tend to be more lucrative. Today a woman has access to all kind of Jobs, but because not all women want to dedicate themselves to a career, many women prefer to work part- time or accept less demanding positions. But it is only a question of choice, a woman choice. It is important to notice that change fo r women in society has led to men re- evaluating their roles.In the 21st century, a group of fathers meets regularly. Their agenda is that divorce, family law and economic crisis are reducing many males to a marginalia role within society. They feel that their situation is very similar to women in the past. Many men feel that due to divorce, unemployment and shifting of social norms, they are in an inferior position. Coupled with females outperforming males in different areas, from school grades to Job performances, some males do not feel it is an advantage to be a male.Eventually, this historic conflict about social differences between men and women has come to a point where cooperation between the two could be helpful to both. The shifting of power from a man dominance world to woman dominance world means still inequality and discrimination. Maybe equality of opportunity and outcome can be better achieved difference. In the end, the competition of a Nation depends significantly on whether and how it educates its female and male talent to maximize its competitiveness and development potential; it means that each Country should strive for gender equality.

Not Only The Jews

The first research in the late 1940 s and early 1950s focused on the Jewishness of the Holocaust. Modern research has begun to deal with the suddering of other victims of the Nazi genocide. For example, homosexuals, Gypsies, prisoners of war, Russians, poles, Catholic priests, Jehovah s Witnesses and other were more or less systematically murdered as the Holocaust continued. By the end of the war, as many as 6 million of these people had been killed, along with between 5 to 6 million Jews. Roma (Gypsies) were among the groups singled out on racial grounds for persecution by the Nazi regime and most of its allies. The Nazis judged Roma to be â€Å"racially inferior,† and the fate of Roma in some ways paralleled that of the Jews. Roma were subjected to internment, forced labor, and massacre. They were also subject to deportation to extermination camps. Mobile killing units killed tens of thousands of Roma in the German-occupied eastern territories. Further, thousands were killed in the Auschwitz-Birkenau, Chelmno, Belzec, Sobibor, and Treblinka extermination camps. The Nazis also incarcerated thousands of Roma in the Bergen-Belsen, Sachsenhausen, Buchenwald, Dachau, Mauthausen, and Ravensbrueck concentration camps. There were nonetheless several deportations of Roma. About 2,500 Roma were deported to Poland in April and May 1940. Most of them were starved and worked to death. Those who fell sick or became crippled were shot. Another 5,000 Roma were deported to Lodz, where they were held in a separate area within the Lodz ghetto. Those who survived the horrible conditions in the Lodz ghetto were later deported from the ghetto to the Chelmno extermination camp, where they were killed in gas vans. Roma in Germany were deported to Auschwitz, where a special camp was designated for them in Auschwitz. Gypsy family camp. † Entire families were incarcerated together. Twins and dwarves, however, were separated out and subjected to medical experiments under SS Captain Dr. Josef Mengele. Nazi physicians also used Romani prisoners in medical experiments at the Ravensbrueck, Natzweiler-Struthof, and Sachsenhausen camps. In German-occupied areas of Europe, the fate of Roma varied from country to country, depending on local circumstances. The Nazis generally interned Roma and later transported them to Germany or Poland for use as forced laborers or to be killed. Many Roma from Poland, the Netherlands, Hungary, Italy, Yugoslavia, and Albania were shot or were deported to extermination camps and killed. In the Baltic states and the German-occupied areas of the Soviet Union, mobile killing units killed Roma at the same time that they killed Jews and Communist leaders. Thousands of Romani men, women, and children were killed in these actions. Many Roma were shot along with Jews at Babi Yar, near Kiev, for example. The â€Å"Gypsy family camp† at Auschwitz was riddled with epidemics–typhus, smallpox, and dysentery–which severely reduced the camp population. In May 1944, the Germans decided to liquidate the camp. As the SS surrounded the camp, they were met by Roma armed with iron pipes and the like. The Germans retreated and postponed the liquidation. Later that same month, the SS transferred about 1,500 Roma who were still capable of work out of the family camp. Almost 1,500 more were transferred in August. The remaining Roma, about 3,000, were killed. At least 19,000 of the 23,000 Roma sent to Auschwitz died there. It is not known precisely how many Roma were killed in the Holocaust. While exact figures or percentages cannot be ascertained, people estimate that the Germans and their allies killed between 25 and 50 percent of all European Roma. Of the approximately one million Roma living in Europe before the war, up to 220,000 were killed. After the war, discrimination against Roma continued as the Federal Republic of Germany decided that all measures taken against Roma before 1943 were legitimate policies of state and were not subject to restitution. Historians in Germany argue about how universal the historical character of national socialism was. One conservative faction would like to view the communist system as responsible for fascism. Because Marxism was victorious in Russia, the Fascist parties were able to win in Italy and Germany. This speculation claims that the destruction of social class distinctions by the Bolsheviks prepared the way for racial murders of the Nazis. The extermination of the Jews is presented as a distorted copy of a previous model, rather than as a unique occurrence. Other social scientists have protested against viewing Nazi crimes in such a relativistic way. They see an aura of normality being created and fear that the basic anti fascist consensus in the Federal republic might end. They are also apprehensive about the analogy to current politics and warn against a restoration by means of history. Extermination or Reeducation? The concentration camp was one weapon in the campaign to bring state and society into conformity with fascism. If physical extermination formed the most frightful instrument of that policy, it was not the only one. A range of attempts were made to isolate people and to use fear to inhibit â€Å"undesirable† behavior. Whatever the reasons for imprisonment, all ncarcerations were the result of Nazi ideology and posed a danger to the prisoner’s life. The categories of prisoners differed from one another in how they were selected and treated. Those groups whom the Nazis deemed inimical but not racially undesirable were not completely rounded up, but taken only in random samples They also fared differently within the camps. Homosexuals, political prisoners, and Jehovah’s Witnesses are among the groups who were sent to the concentration camps for reeducation. They were supposed to renounce their particular orientation. The very fact of their incarceration estrained their ideological comrades outside the camps from becoming active in the struggle against Nazism. Democratic freedom makes pluralism possible. In democracies, deviations from the norm concern not only criminality but also sexuality, ethnicity, religion, and attitudes toward work. The Nazi system was concerned with deviations in all these areas. It classified political, sexual, religious, and working-attitude deviations in separate categories. In all probability, the Hitler state required these definitions of the enemy and was, in its own terms, correct in its choice of these groups. Within a society, minority and separation groups represent a seedbed of possible revolt. Homosexuality has always and everywhere existed. Hitler considered homosexuality as a predisposition that could not be changed. It was assumed that a homosexual orientation could not be eliminated, that only its manifestations could be blocked. Thus, the pink triangle worn by the homosexual in the concentration camp represented the Nazis’ intention to reeducate him. No credence was placed in a simple change of opinion by homosexuals, such as was granted to Jehovah’s Witnesses, who were not taken entirely seriously, or even to political prisoners. Two categories were seen among homosexuals: the constitutionally hard-boiled homosexual and the occasional offender. Since in neither case was the Aryan status of the homosexual in doubt, all could remain alive. If necessary, homosexuals were to be castrated, but they were permitted to continue to work. As a matter of policy, extermination was therefore restrained. In practice there were other contrary impulses on the part of the SS, and those who wore the pink triangle met an unusually harsh fate. The social controls directed at homosexuals within the camp represented a continuation and an intensification of social controls imposed by society at large. A nation with many children can gain supremacy and mastery of the world. A pure race with few children already as one foot in the grave; in fifty or a hundred years it will be of no significance; in two hundred years it will be extinct. It is essential to realize that if we allow this infection to continue in Germany without being able to fight it, it will be the end of Germany, of the Germanic world. Unfortunately this is not the simple matter it was for our forefathers. For them, the few isolated cases were simply abnormalities; they drowned them in bogs. Those who found bodies in the mire did not know that in 90% of the cases they found themselves face to face with a homosexual who had been drowned with all his belongings. This was not punishment, more the simple elimination of this particular abnormality. It is vital we rid ourselves of them; like weed we must pull them up, throw them on the fire and burn them. This is not out of a spirit of vengeance, but of necessity; these creatures must be exterminated.

Friday, August 30, 2019

A Visit to the Seabeach on Puri

Free Sample The Goddess Within for by Gloria Star subrata Dutta November 13, 1957 01:44 AM Calcutta, India After my initial immersion into the study of astrology — when learning the basics was a fascinating challenge — I began to explore the multidimensional nature of astrology and metaphysics. It was quite clear that women and men experience and express the energetic qualities symbolized in their charts differently. Being a woman, I chose to delve into the gender-differences from a woman's point of view. That writing resulted in what you'll read in this report. I hope you enjoy this view of ‘you'! † – Gloria Star Projection of Your Real Self Sometimes showing the world who you really are is not easy, and sometimes the world may not respond as you had hoped! It's helpful to take a look at the differences and similarities between the attitudes, impressions and images you project and the person who resides at the core of your being. With your Sun in Scorpio your ego is driven by a need to be almost enigmatic. You're more comfortable when at least a little mystery surrounds you, and you can exude a strong level of sensual charm. You're rarely halfway about anything, and your intensity can be daunting to those who are uncomfortable with confrontation. Since your Sun speaks of â€Å"who you think you are,† you may think that you're more mysterious than you are in actuality! No bother – you're still a mystery to most, so you're safe! Your Ascendant is the face you present to the world, and shows how others see you. Your Ascendant, or rising sign, is Virgo. Through this influence, you may be somewhat the perfectionist in your appearance and may be most comfortable when you feel well-groomed. Others may view you as detail-oriented, which has its advantages if you know what you want. You may be extremely aware of your physical body, to the extent that you know when anything is not working properly. You'd better keep a nail file in your pocketbook, since you'll fiddle with that ragged nail all day if you don't have a chance to fix it! The energy associated with your Ascendant is Mercury. With Mercury in Sagittarius, you may be rather outspoken and direct in your manner. Your philosophical outlook definitely colors your personality, and you can be a great conversationalist. With your Moon in sextile aspect to your Ascendant you have the capability of becoming well-rounded by integrating your feelings about things with the way they are. You've probably learned that if you're not comfortable with something, you should probably look into it further or avoid it altogether. You may also be quite adept in relationship matters, since you can be aware of the way others are feeling or reacting in addition to staying in touch with your own feelings about what's going on. The  Goddess  Within Get Your Complete The Goddess Within Reading Now! Self knowledge is power! Learn how to reach inwards and discover your strengths, talents and potential to embrace and express your personal power in the best possible ways A must have reading for women everywhere. Get yours today! Only $24. 95 Or get it FREE Get your Complete Reading and Discover†¦. l l l Your basic strengths, talents and needs as portrayed in your birth chart How you project yourself to the outside world and is it the true you Understanding and getting in touch with your true feminine self Get your Complete Reading and Discover†¦. l l l l l l l Your basic strengths, talents and needs as portrayed in your birth chart How you project yourself to the outside world and is it the true you Understanding and getting in touch with your true feminine self Owning and making the most of you inner masculine self Improving your communications and intuition Your approach to relationships, sex, money and control And much, much more!

Thursday, August 29, 2019

Final Projects - PSY 2012 Essay Example | Topics and Well Written Essays - 750 words

Final Projects - PSY 2012 - Essay Example She is enrolled by her guidance counselor in an alternative educational program where Ms. Rain (Paula Patton), her literacy teacher, takes a special interest in Precious, as does Mrs. Weiss (Mariah Carey), her social worker. The film chronicles Precious' evolution from an obviously dissociative, uninvolved, inarticulate victim of domestic violence to an independent individual, able to communicate about herself and her life and hopeful about her own future prospects as well as those of her children. Precious stresses not only the critical need for intervention on behalf of victims of child sexual abuse, but also for continuing social and psychological support if interventions are to have any lasting positive effects. It is very difficult to say with any certainty just how many children in the US experience incestuous abuse due to extreme shame on the part of victims and the occult nature of the crime. Incest is usually defined as sexual contact between individuals too closely related to legally marry, but many critics have called that definition too broad, particularly where children are concerned. A more comprehensive definition says that â€Å"[Incest] is a violation of the child where he or she lives -- literally and metaphorically. A child molested by a stranger can run home for help and comfort. A victim of incest cannot." (Vanderbilt, 1992, p. 51) Though it is widely considered to be the most common form of child sexual abuse, it is also one of the most under-reported crimes against children. According to the Rape, Abuse & Incest National Network (RAINN) only 7% of children who were victims of substantiated sexual abuse reports were the victims of strangers (RAINN, 2009). It is estimated that up to 1/3 of all American children are sexually abused before they turn 18 (Bogorad, 1999). Sexual assault of children can be very difficult to detect because it occurs in private, and because perpetrators do not always leave any evidence of their attacks. Even in ca ses like that of Precious, who had two children and a sexually transmitted disease as evidence of the sexual abuse she endured at the hands of her father, most sexual abuse of children is not reported to police or dealt with in a criminal setting at all. The justice system is primarily involved in cases where children are attacked or abused by strangers, while poorly-equipped social service agencies handle intrafamilial violence. Although most social service workers are legally required to report cases of child abuse to the police, individuals who commit incest are unlikely to ever spend time in jail for their crimes, even if they do leave incontrovertible evidence of their crimes. Precious portrays incest and other forms of child abuse within the context of an extremely marginalized minority-- impoverished, urban African-Americans-- but in fact the sexual abuse of children is an act which spans socio-economic, racial and ethnic boundaries. Even the most severe abuse may occur in an y family regardless of race, color, creed or financial status. The statistics surrounding child sexual abuse are shocking and horrifying, particularly in light of the fact that most such abuse goes unreported and most perpetrators are never formally accused. Estimates of PTSD cases

Wednesday, August 28, 2019

Small Business Program and Source Selection Plans Essay

Small Business Program and Source Selection Plans - Essay Example ibed as a privately owned business that is not dominant in its field of operation, and that falls within the definition recognized by the Administrator of Small Business (Compton, 2009). The standards of evaluating the size of the business are determined by the number of workers, mean annual gross income, and relative size of other businesses in the same industry (Keyes & Feldman, 2011). Small business program is used for reviewing the capacity of the small businesses to compete effectively in particular industries. The amendment of Small Business Act in 1978 by the congress provided for the heads of agencies in collaboration with Small Business Administration (SBA) to set-aside the value of the "total contract and subcontracts to be awarded to small businesses every year" (Manuel & Lunder, 2012). In 1988, the congress made further amendment to establish a provision for the establishment of government-wide objectives of awarding proportion of the federal contracts and subcontracts dollars to small businesses in various categories (Cibinic et al., 2006). The provisions require a proportion of equal to or greater than 23% of the government contracts awarded to small business, 5% to business owned by people with disability, 5% to small businesses owned by women, 3% to small businesses owned by service-disabled and 3% to Historically Underutilized Business Zones (HUBZone) small businesses (Keyes & Feldman, 2011). However, if the total value of the contract is above $2,500 and not exceeding $100,000 the whole contract can be awarded to small businesses that have the capacity to deliver the requirement (Cibinic et al., 2006). Awarding of the contracts to small business by the agencies is of the essence to the government because it depicts the efficiency with which the congressional policy of empowering small business is being implemented (Compton, 2009). However, following the criticism that the government was not achieving its goals of empowering the small businesses

Tuesday, August 27, 2019

Ink Painting In China Essay Example | Topics and Well Written Essays - 1000 words

Ink Painting In China - Essay Example China is known for its rich history in paintings, as well as, the embraced art forms. There are numerous characteristics in Chinese ink paintings that were used in the traditional mode of painting. Ink paintings in China are based on genres and themes that were acceptable in the traditional Chinese cultures. However, western educated Chinese artists changed these aspects by introducing ink paintings after returning to China. Contrary to the traditional painting in China, ink painting focused more on bringing out more vivid aspects of nature. These artists changed a lot of things, and there is no discussion of modern Chinese art can be completed without discussing Xu Beihong’s work and its influence on ink painting. Xu Beihong (195-1953) had the skill to combine modern and ancient techniques in accomplishing his best work. His works amalgamated the impressionistic utilization of color and light coupled with keen adherence to shape and structure. Xu Beihong’s works will, therefore, assist in the critical understanding of Chines ink art and why or how the western educated Chinese adapted ink painting after returning to their country, as well as, the differences between these works and traditional ink art.

Monday, August 26, 2019

The Relationship between Revenue Management and Pricing Strategies in Research Paper

The Relationship between Revenue Management and Pricing Strategies in Airline Industries - Research Paper Example This essay discusses that Revenue Management (RM) falls under the dynamic pricing models. There are several terms used to describe revenue management. The most common on is yield management, or a combination of several terms such as Price and Revenue Management (PRM), or Perishable asset revenue management (PARM). It normally describes a pricing method where the cost of buying the product or service changes over time to take advantage of the variation in consumer willingness to pay a certain price for the product. Depending on the industry, the prices either increase or decrease with time. In the electronics market for instance, the price of a product is normally higher during the launch compared to the prices charged after some time. In the airline industry, prices typically increase towards the scheduled time of the flight. Pricing strategy refers to the framework that a producer uses to set the prices for a particular product. Pricing strategy is very crucial because it affects th e potential for success of a product. The most basic pricing model is unit cost pricing model, which assigns the price of an item based on the cost of production and the expected margin. Pricing is not normally a straightforward affair because forces of supply and demand affect it. The price of an item tends to be closer to what the market is willing to pay for than the simple arithmetic of cost of production and margin. Dynamic pricing models tend to seek to maximize revenue based on the prevailing demand. In some cases, dynamic pricing actually disregards the cost of production. ... In some cases, dynamic pricing actually disregards the cost of production. In the case of the airline industry, unit cost is an unstable way of organizing pricing because of the large upfront cost Revenue management is the most dominant pricing model in the airline industry because of its potential to boost profitability in that particular industry. It came about after the liberalization of the industry in the late seventies. Airline executives found themselves in a tight spot because of increasing competition in the fledgling industry. They sought to find ways of increasing the profitability of the airlines in the industry based on their existing carrying capacity. However, the airline industry is not the only industry that uses yield management. The hotel industry also uses it and other industries such as printing firms, bus companies, car hire firms and private lodges also use it to maximize revenue against a backdrop of fixed capacity and highly perishable products (Koenig & Meis sner 2011). The goal of this paper is to investigate the relationship between revenue management and pricing within the airline industry. In the first part, the discussion will seek to examine the important issues surrounding revenue management, followed by an analysis of how those factors affect pricing strategy in the second part. Literature Review The Concept of Revenue Management There is a wide variety of terms, concepts, and approaches to the study of revenue management. Some scholars use all the related terms interchangeable stressing the greater meaning of time sensitive pricing. Older researchers used yield management and revenue management to mean the same thing (Boella 2000; Bieger & Agosti 2005). Recent

Sunday, August 25, 2019

Fiber and health benefit of fiber Article Example | Topics and Well Written Essays - 500 words

Fiber and health benefit of fiber - Article Example Hence, additional benefits apart from maintaining health of the digestive track. Fiber comprises of two categories, which include soluble and insoluble where each has a specific role in the body (Vuksan, Rogovik, Jovanovski & Jenkins, 2009). The latter category increases stool’s bulkiness besides easing its passage out through the gut whereas the soluble fiber performs other diverse roles like reducing diseases’ risks. The objective and goal of this study entails highlighting fiber’s diverse and essential benefits in the body despite its â€Å"inertness† as contended by health and nutritional experts. Studies contend that fiber intake normally reduces cardiovascular disease risks by 40% especially among the high-fiber takers compared the low eaters (Anderson, Smith & Gustafson, 1994). This is because soluble fiber aids in excreting of the excess abnormal blood cholesterol found in the human intestines. Mainly, this entails shunning excessive absorption of cholesterol in an individual’s intestines via combining bile and dietary cholesterol, which eventually excretes after their reaction (Vuksan, Rogovik, Jovanovski & Jenkins, 2009). Hence, maintaining the necessary cholesterol or HDL levels in the body besides shunning risks that might yield to heart predicaments or reduce severe conditions among the chronic individuals (De Koning & Hu, 2011). Soluble fibers have also proved to be helpful among people experiencing both types of diabetes where they all emanate from legumes, pectin and vegetable roots like carrots. This is especially via regulating body sugar levels evident in the body after food intake. The process entails making a hindrance to the fast gastric emptying in the stomach coupled with slowing glucose entry into bloodstreams. Besides, it also lessens the rate of sugar rising, which occurs in every post-meal both in normal and diabetic people (Anderson, Baird,

Saturday, August 24, 2019

Select one country from the list below and evaluate the contribution Essay

Select one country from the list below and evaluate the contribution that remote sensing could make to measuring and monitoring - Essay Example Amongst the eight distinct MDGs, MDG 7 deals with environmental sustainability and is measured through a set of 10 indicators. The task of preserving the environment is extremely important for the achievement of other MDG goals such as education, economic development, equality and healthcare. For instance, Azmi (2010) notes that over a quarter of the epidemics and diseases reported worldwide result from environmental factors. Over 35% of all deaths in third world countries are caused from environmental disturbances. According to Hassan (2004), MDG 7 is sometimes misunderstood for its context and broader outlook and criticized for being disconnected from other issues such as farming and healthcare that seem to affect the poor. Bradford (2005) says that this is however not true since numerous studies have concluded that most of these problems are a direct result of environmental exploitation and the lack of sustainable practices and strategies to counter this decline. Researchers like Faure (2009) have carried out extensive studies on environmental impact and have concluded that most environmental disasters result from and are often accelerated by massive environmental degradation. For example, countries like Jordan are facing acute water shortage, energy deficiency and climate change due to rapid desertification of the countryside and global warming. Within the context of poverty reduction, environmental sustainability plays a pivotal role due to their widespread dependence on non-renewable sources of energy and unsustainable environmental practices. Wagstaff (2010) argues that the major obstacle to developing any environmental strategy is the measurement of the current trends in the local environment and cites the importance of technologies like remote sensing in monitoring any related initiatives. With over 65% of the population dependent on fisheries, agriculture and minerals, Jordan is a nation that is highly dependent on the environment for its economic gro wth (Mays, 2009). Thus, devising and tracking any environmental strategy for the country needs a holistic and wholesome approach and cannot rely on a person-to-person methodology. Remote sensing, the science of acquiring information on a geographical region from aerial satellites, encompasses numerous technologies that are capable of measuring anything from meteorology and terrain (minerals and other natural resources) to deforestation and desertification. This paper therefore describes the role of remote sensing in monitoring and measuring progress towards the MDG 7 in Jordan. Role of Remote Sensing The metrics and targets specified under MDG 7 help in determining the amount of conservation of a resource. In the case of Jordan, indicators 7.1 and 7.5 have been used to evaluate the total amount of land covered by forests and the percentage utilization of water resources available within the country (Joseph, 2010). While these indicators provide critical insights into a regionâ€℠¢s environmental stability, these resources are so widespread and diverse that it becomes to measure these metrics at the national level. Resources such as water and natural resources are also harnessed from underground sources and are highly difficult to estimate based on simple physical observation of the area. Moreover, ecosystems and inherent ecological processes are so intricate that it becomes difficult to use simple parameters to

Friday, August 23, 2019

Differences between the US and German Corporate Governance Systems Essay - 22

Differences between the US and German Corporate Governance Systems - Essay Example In contrast, German corporate governance code is the medium that determines the corporate issues in Germany. Â  Unlike US law the German corporate system emphasis on protecting the creditors, and gives freedom for accumulating indirect reserves. Another notable feature is that in the German system, accounts are calculated in monetary terms instead of book values. On the contrary, US government permits organizations to create shareholders and to exert their own management control. Moreover, in the US, Sarbanes Oxley Act emphasize on individual responsibilities of CEOs and CFOs; whereas, German corporate governance gives importance to collective responsibility. Â  Regardless of the dissimilar business environment, Law Daimler and Chrysler have rather collectively dealt with the common issues by designing policies to operate their business efficiently. They strategically evaluate the business concerns and formulate further plans to meet challenges that are associated with the variance in business cultures. Their formula emphasizes on the submission of DC balance sheet that the whole company has to be committed to. Individuals like the CEO, CFO, and Chairman also come under the ambit of certain obligations. Also, the company has applied cascade signing system in its business operations. Daimler and Chrysler have given more weight to collective and individual responsibility in management concerns. Â  Law Daimler and Chrysler could have initiated some researchers on the major corporate issues to identify the essential areas of strategic change. It should focus on other competitors for learning how they handle the issues related to organizational convergence. In addition, the company might have explored new potential regions for business expansion to overcome the legal barriers in their domestic market.

Animal studies Essay Example | Topics and Well Written Essays - 750 words

Animal studies - Essay Example The quality of a clinical trial is vital and thus the scientist should assign control and experimental subjects randomly. This reduces the occurrence of bias and favoritism. Blinding of participants and researchers is also of great importance as concerns the treatment being given. Single-blind studies involve the blinding of participants while double-blind involves the blinding of both participants and researchers. Epidemiological studies, on the other hand, involve the observation (Thompson & Melinda 33). They are important in the studying phenomena in large populations and the determination of the factors which may be of influence on the phenomena. They indicate the relationships inherent between these factors but do not give a suggestion for data linkage to cause and effect. When conducting a clinical trial, the scientist needs to consider several things. He needs to set up both experimental and control groups, in which the experimental group is administered with the intervention while the control group is not (Thompson & Melinda 34). After the experiment is complete, the two results are compared. In an ideal situation, the researcher should design an experiment where the participants in the study are assigned to either the control or experimental groups randomly. This randomization aids in avoiding the elimination of any errors that may result from participant favoritism, and to make sure that the two groups are similar for the characteristics and factors that are under study.... The experimental group is given the intervention under study while this is not the case with the control group. After experiments on both groups are done, their responses are compared. The quality of a clinical trial is vital and thus the scientist should assign control and experimental subjects randomly. This reduces the occurrence of bias and favouritism. Blinding of participants and researchers is also of great importance as concerns the treatment being given. Single blind studies involve the blinding of participants while double blind involves the blinding of both participants and researchers. Epidemiological studies, on the other hand, involve the observation (Thompson & Melinda 33). They are important in the studying phenomena in large populations and the determination of the factors which may be of influence on the phenomena. They indicate the relationships inherent between these factors but do not give a suggestion for data linkage to cause and effect (Thompson & Melinda 33). When conducting a clinical trial, the scientist needs to consider several things. He needs to set up both experimental and control groups, in which the experimental group is administered with the intervention while the control group is not (Thompson & Melinda 34). After the experiment is complete, the two results are compared. In an ideal situation, the researcher should design an experiment where the participants in the study are assigned to either the control or experimental groups randomly. This randomization aids in avoiding the elimination of any errors that may result from participant favouritism, and to make sure that the two groups are similar for the characteristics and factors that are under study. The

Thursday, August 22, 2019

A capitalist economy Essay Example for Free

A capitalist economy Essay A capitalist economy is fuelled by the needs and whims the consumer. Hence, understanding the customer’s buying behavior and needs is critical for a marketer to succeed in such an environment. Once a person’s basic survival needs such as food and shelter are satisfied, buying needs are influenced by the need for self-esteem. Consumers buy things to boost their sense of pride and society plays a crucial role in influencing this behavior, through media outlets such television and Internet. They not only inform consumers about a product but also psychologically tell them why they should purchase it, by affecting them on a subconscious level. Peer opinions and brand consciousness also impact consumer behavior since it influences their status among peers. Buyers approach a new purchase and repurchase quite differently. If they are satisfied with the previous purchase, almost no research goes into the repurchase. When it comes to a new purchase, a consumer’s buying behavior depends upon the amount of involvement in researching the product, before actually buying it. For instance, a car or house involves a lot of money, which is why a consumer naturally spends more time trying to learn about the various options available in the market. See more: My Writing Process Essay On the other hand, buying everyday products like soap, perfume and clothing involves lesser consumer research and requires lesser decision time. However, sometimes consumers also buy things on a whim without any prior research; it involves a miniscule decision time and is called impulsive buying. An individual buyer’s personality will also affect their buying behavior. For instance, a person who was raised in a poor family and having a conservative spending attitude would spend more time researching an item before buying it. The probability of such a person making an impulse buy or brand-conscious decision is also very less, since people with such a personality tend to make rational decisions based on their needs. Buying a common food item such as salad dressing involves very little decision time, since the product would be a repurchase for most people and the financial risk involved is very less. However, health-conscious buyers may spend additional time researching nutritional information before buying a specific brand. There are also quite a few varieties of salad dressing available in the market to choose from, which may increase the research time of buyers who have a fine appreciate for food. Three brands of salad dressing that would considered are as follows, 1) Wild Thymes 2) American Garden 3) Briannas Fine Salad Dressing Wild Thymes is basically a Gourmet Foods company that caters to people who have an appreciation for fine food. It offers an exclusive variety of salad dressings that come in various fruit flavors, which are not offered by mass market brands. Their products are also 100 percent natural, catering to health-conscious buyers. They are sold online on Amazon. com as well as in other retail outlets. The cost of a Wild Thymes salad dressing is priced at $6. 50 for a 11 oz bottle. Briannas Fine Salad Dressings is a specialty salad dressing company that exclusively focuses on salad dressing. It offers an exhaustive list of salad dressing variants such as Asiago Caesar, Blush Wine Vinaigrette and Zesty French. Its products are sold through its own online store it costs $6. 3 for two bottles of salad dressing, which is comparatively cheaper. This brand caters to professional chefs and cooking enthusiasts. American Garden is Fast Moving Consumer Goods (FMCG) brand that caters to the mass market. It offers Russian, creamy Ranch and Thousand Island salad dressings and is reasonably priced. It caters to mainly to families with children, as the website is filled with pictures of children and also offers various kids’ recipes. It primarily appeals to low-income and middle-income families owing to its price and widespread availability in retail stores.

Wednesday, August 21, 2019

How effective questioning contributes to learning

How effective questioning contributes to learning For the purpose of this essay I will look at effective questioning and how the use of effective questioning contributes to the learning process of pupils in a school or classroom setting. The essay will look at the varying Theorists that talk about questioning and how they believe that questioning was a positive part of the schooling day and delve into different methods of questioning and how best the answers support the learning of how to question. I will look in particular how effective questioning is useful in two subjects thought on the curriculum which are English Literature and Information and Communication Technology or ICT as it is known. To concentrate on these two subjects and to show how important I have found effective questioning I will look at how effective listening and speaking also contributes to effective questioning. The essay will look at different National Strategies and Frameworks and literature available that exist to support the guidelines and theories that ex ist to support effective questioning and evidence I have gathered during my experiences working with children in the class room to portray the practical evidence of this. Main The Primary National Strategy (2006) emphasises the need for the development and promotion of creativity across the curriculum. Speaking and Listening are to be developed in innovative and exiting ways through discussion and questioning. Children need to listen to their teacher and their peers and have the confidence to express their own thoughts, Sharing responses to Literature is one of the most meaningful ways in which good listening and good talking can be achieved.(Nicholson, C as site in Goodwin, 2005). This assignment will take a look into how effective questioning can contribute to pupils learning and will be backed up by examples that I have seen in my practice. Theorists have different beliefs as to how children learn. In my opinion, a mixture of their strategies is needed in schools and across the curriculum to achieve the best results possible. We learn that Bruner is more associated with questioning, problem and discussion in contrast to Vygotsky believed that adult talk plays a central role in developing a childs understanding. He saw all speech as primary social in function, the intellect being developed within social interaction (Goodwin, 2001). He believed in combining language with thought but more emphasis being placed on effective adult language and that through pupil talk, children would develop their reading and writing skills. Ofsted (2005), reported that when children talked through ideas firstly, they were there after better writers. Bruner introduced cognitive scaffolding, which aimed at extending pupil understanding through support of a social system. He highlighted the importance of language and communication with others- peers and others (Loveless, 2003). He didnt believe in giving pupils material in this final form. On placement I would introduce a problem to the children and support them with appropriate questioning. This in turn led to discussion and the utilisation of higher order thinking skills in scaffolding conversations learners can try out ideas make mistakes and adapt their thinking by listening to others as they work towards understanding (Goodwin, 2001). I consider a lot of classes as being too rigid and they are trying to adhere to a strict plan to reach goals and cover material. For example in literacy The National Curriculum and the Literacy Strategy (although this is not statutory) have a wide range of topics to be covered leaving I found teachers under pressure for time. I feel that time needs to be allocated for spontaneity where the teacher focuses and directs children through effective modelling questioning and discussion with educational goals in mind. The Ofstead English Report (2005) found that even though there is more discussion in primary schools at the moment unfortunately it is dominated by the teacher giving the pupils only limited opportunities to express their thoughts and listen to their peers. The report also found reading and writing getting more attention in schools. Excellent and Enjoyment (2003) described teaching in England as being too prescriptive which was impacting negatively on creativity. Another example of how effective questioning contributes to students learning in through the use of information and communication technology or ICT. The National Grid for learning was set up by the DfEE in 1997 to equip schools with computers and this in turn enabled both students and teachers to access materials that became available. This also enabled children to talk to others in the world and to interact globally. Schools therefore now have more resources, computers and packages to enhance ICT usage, some even have laptops. Before my six week placement, I had little knowledge of how to use the IWB as a teaching tool but, my class teacher taught me how to use it with confidence. I found it a useful resource for holding the childrens interest and attention. It enabled supporting use of exciting pictures to brighten up tasks. For example, in Literacy, we were doing a story from the Jungle Book called Rikki-Tikki-Tavi, I was able to search for and insert pictures of the characters fr om Google images to suit the theme. The children really enjoyed this as it brought the characters to life. Stories are important for a number of reasons. They link places to interesting themes, they aid spelling and they can increase knowledge about certain topics or facts. Stories are the fundamental way of organising human experience and understanding the world (Fisher, R., Williams, M. 2006). They can be linked to many different tasks, apart from reading to enhance literacy skills. The book I am basing my lessons on with regard to this assignment, is called Rose Blanche. The illustrations within it present a World War Two setting which gives a truly special historical insight into the suffering and pain endured by the characters as seen through the eyes of a child. Analysis of this picture book will evoke an emotional response to the Second World War through the implementation of effective questioning and discussion in the classroom. Such strategies are central in the new the Primary National Strategy (2006). As a teacher, it will be my role to ensure that the children apply creative/h igher order thinking to their reading through learning how to read between the lines, using inference, deduction and prediction and learning how to recreate and respond to the text. Effective questioning with regard to setting, character, plot, themes dialogue and point of view will extend childrens thinking about a story (Fisher, R., Williams, M. 2006). A mixture of both open ended and closed questions are necessary components of reflective reading where children will skim, scan and read in more detail to find answers. An essential aspect of questioning is allowing children enough time to think before pursuing a response. Towards the end of my placement, the children had an idea of the type of response I required by the length of thinking time I would give them. They knew that more thinking time required more than one word answers. It is crucial also that teachers pitch questions at appropriate levels to challenge the more able without loosing the interest of the less able through lack of understanding. EAL students and those with special educational needs may benefit from visual cues where possible. This is where Literacy through ICT becomes highly beneficial and effective. Interactive white boards are powerful tools for displaying images and texts which can be clearly seen by the whole class. Speaking and listening in the National Curriculum has a strong social focus. Children will learn to take turns, deal with opposing views politely, talk effectively, take different roles and help the group to move forward (DfEE, 1999). These aspects need to be enforced within each subject in order to achieve success where all voices are heard and spoken. Children need to become interactive listeners where they listen to other members of the group but also have the confidence to articulate ideas without fear of embarrassment or ridicule. This is also the view point of Jones, R., Wyse, D., 2004 who believe that in building pupils literacy skills, teachers should reward curiosity and exploration, build internal motivation, encourage risk taking, have high expectations of all pupils, give opportunities for choice and discovery and develop students self-management skills. Children need to know when it is ok for them to speak and when they should listen. For this reason, I always made the rules clear at the beginning of each class. The children then knew how they should request to voice their opinion i.e. put their hand up. An articulate classroom is a community of learners and teachers who share an understanding about the roles of talk in their learning(Goodwin, 2001). Speaking and listening can be enhanced through ICT with the use of tape recorders, digital cameras, recording to computers and much more. Some teachers prefer however, not to use classroom discussion because of fear of losing control through increased noise levels. Another issue with discussion is finding the time to allow learners to ask and seek their own answers. I personally found this difficult to resolve. I strongly believe that group work in Literacy is extremely beneficial to pupils. It certainly suits the shyer pupil who might not have the confidence to express an opinion within whole class interaction. It enables the perfect opportunity for teachers to develop scaffolding on a smaller scale which relates to Bruners theory. On my placement, guided reading was carried out every day after lunch which meant each group had one session each week. The National Literacy Strategy promotes this process where by one group works with the teacher and the other groups work independently (DfEE, 1998). The pupils were split into groups of similar ability which meant the less able children had more support at their level and the more able had more scope. Ofsted (2005) found guided group work to be a positive development in the classroom in terms of speaking and listening. Conclusion The new science of learning and thinning tells us that everybody has the capacity to become a better learner, and that there are conditions under which learning power develops (Pollard 2002). If children are having difficulty in understanding what you are teaching them, then you must reflect and ask yourself why? You as a teacher must reflect on lessons and ask yourself have I asked effective questions in my lesson? Questions can be used for a wide range of purposes and they can be seen as a vital tool for teaching and learning. It is a powerful way of scaffolding childrens understanding and raising their performance. The way in which teachers can use questions to improve the quality of childrens thinking and the extent of their participation (Pollard 2006). As stated above and trough out this essay I have looked at how questioning, effective questioning in particular contributes to a Childs learning through effective listening, speaking in particular through ICT and English. I have learnt in practice that these methods keep a child engaged, motivated and egger to learn. This not only applies to English and ICT but in all subjects on the National Curriculum. Reference List Adams, A., Brindley, S. (2002) Teaching Primary Literacy with ICT. Buckingham, Open University Press. Bennett, R. (2006) Learning ICT with English. Great Britain, David Fulton Publishers. Goodwin, P. (1999, 2005) 2nd edn. The Literate Classroom. Great Britain, David Fulton Publishers Ltd. DfES (2006) Primary National Strategy; Primary Framework for literacy and mathematics. London, DfES. Fisher, R., Williams, M. (2006) Unlocking Literacy. 2nd edn. Great Britain, David Fulton Publishers. Jones, R., Wyse, D. (2004) Creativity in the Primary Curriculum. Great Britain, David Fulton Publishers Ltd. Loveless, A. (2003) The Role of ICT. London, Continuum. Ofsted (2000, 2005) The Annual Report of Her Majestys Chief Inspector of Schools. HMSO, London. Rudd, A., Tyldesley, A. (2006) Literacy and ICT in the Primary School. Great Britain, David Fulton Publishers. Journal McFarlane, A. (2001) Perspectives on the relationships between ICT and assessment. Journal of Computer Assisted Learning 17 (227-234). Website www.kingston.ac.uk/booksalive/ www.ofsted.gov.uk

Tuesday, August 20, 2019

Importance of Smartphone Security in Business Environment

Importance of Smartphone Security in Business Environment 1.0 Introduction The purpose of this document is to expose a business problem from a technological viewpoint. The subject of the business problem I have selected is smartphone security. This subject will be analysed and critically evaluated, then expanded upon further to reflect the range of possible solutions and raise awareness of the risk and need of smartphone security. 1.1 Aims and objectives Aims Create an authoritative document with recommendations to raise awareness and inform businesses for the need of greater mobile security within the business environment. Use insight to establish a research gap. Main objectives Assess smart mobile devices currently used. Analyse security advantages and disadvantages of smart mobile devices. Establish what risks smart mobile devices are exposed to. Evaluate impact of risk exposed by unsecure mobile devices to businesses. Examine mobile security currently available. Investigate responsibility Evaluate current business policies and procedures for mobile devices and how these can be enforced. Construct smartphone security guide with recommendations for businesses. 1.2 Problem statement The problem is information and financial loss due to information theft or inaccessibility from malicious software, and the detrimental impact this has upon the business. A recent report from Gartner (reference report) indicates that sales of smartphones have grown exponentially and businesses are reaping the benefits gained from smartphones, however their use also creates security risks and opportunities for cybercriminals. There are many types of information that can be stored on smartphones for example, personally identifiable information in the form of identity credentials, email, SMS and MMS messages, GPS coordinates, passwords, company documents and connectivity access information to company servers as just some of the examples. Information security has gained significant value within the business domain over the past decade however this value remains subjective (why subjective? And value pertaining to what?). Users have been made aware of the risks posed by malicious software whilst using their personal computer on the internet, now assistive technology like smart mobile devices are becoming increasingly more powerful, functional and ubiquitous. Where personal computers have at least some security software in place as standard, smartphones commonly have no security software installed as a standard and are susceptible to (Malware, Viruses, trojans,etc-examples please ;)) the exact same threats as to personal computers. Businesses, professionals and personal users now have a greater awareness for the need of personal computer security. This has been provided by media coverage, enterprise training or through personal experience. When using a personal computer or laptop for example, it is common to find a firewall and antivirus software installed showing that internet safety has now become a social normalcy. â€Å"†¦Smartphones are more powerful than supercomputers were a few years ago, and we are putting them in the hands of people whove never had anything like it before. Google CEO Eric Schmidt As Schmidt states smartphones are pervasive devices, workers typically need training on these devices as they are multifunctional and unless people are aware of the threats these devices pose the consequences can be detrimental on the business. Todays organisations rely heavily upon information technology in order to allow their business to function (Khosrowpour, 2001). This is fundamentally due to how intricate information technology systems are embedded into organisations. Smartphones provide businesses with many new opportunities (sweeping statement-what opportunities and is this your opinion/referencing?) however these opportunities provided by smartphones exist not just for business and personal users as the opportunity extends to cybercriminals too. Malware is one of the most common sources of security failures within businesses currently (sweeping statement-most common according to who?), they have the same capabilities as personal computers and are used within business environments in the same manner, however they are typically unsecure and rely solely upon the standard out-of-the-box security features with no antivirus or firewall present. There are many different mobile operating systems for smart mobile devices requiring different security applications. The operating systems and the risks associated will be carefully analysed. The intentions of this paper are to investigate what impacts smart mobile devices can have on businesses, why these problems affect the organisation, and how they are overcome. Finally, insight will be gathered and recommendations made so that businesses can use to foresee and prevent future unnecessary costs and risk. 2.0 Literature review The focus of the subject proposed for this project is a very real-world business and information technology problem. Smartphone security is a recognisable potential problem for both individuals and businesses as most smartphone users including businesses and educational establishments do not have any specific policies in place to safeguard from smartphone security related issues. Because smartphone security is still in its infancy, it will be a challenge to source accurate and relevant information from authoritative sources such as ‘Emerald without resorting to web based research. However, the more this project advances smartphone security in the media is becoming omnipresent. For the project a survey will be proposed in order to gain knowledge for understanding how aware users are for the need of smartphone security. This survey will target as many participants as possible in order to gather appropriate primary evidence. Interviews will be conducted with professionals in the field of smartphones and security such as police personnel, security advisors and mobile phone shop staff to ascertain levels of security training, public security literature and knowledge. Authoritative information sources will be used to gain technical information directly from manufactures, websites and retail outlets such as Apple, Android, Research In Motion, Nokia and Microsoft for documentation on smartphones and smartphone platforms. Only technical information will be used from these sources as it is in manufacturers interests to sell their products Analysis of the survey will be done using statistical analysis tools including IBMs ‘SPSS, ‘SPSS Text Analysis software and more modern statistical analysis web-based techniques such as MarketSight. MarketSight is a hosted research data reporting environment accessible by the internet and only available through the internet browser Microsoft explorer whereas SPSS is software directly installed onto a computer. ‘Malware: the new legal risk the paper written by Verine Etsebeth in 2007 has invaluable source material for this project. Acquired from Emerald Insight, it is very suitable to this project as it highlights the threat of malware and risks posed to businesses. It is well written and authoritative however Emerald specified it was unique as no such document has been published previously. The majority of sources used by Etsebeth are from Harley, D; Slade, R and Gattiker, U. Etsebeth references Viruses Revealed (McGraw-Hill, New York, NY 2001) This source is recognised and trusted within the industry as a whole and is considered to be authoritative and well-documented on its own merit. This paper focuses on the legal and professional implications of malware on companies in South Africa Etsebeths home town. This paper is very suitable for this project as it is a very well written and authoritative document, the majority of sources used by Etsebeth are from Harley, D., Slade, R. and Gattiker, U. (2001) Viruses Revealed, McGraw-Hill, New York, NY. The source used by Etsebeth ‘Viruses Revealed as a well-documented authoritative document published by McGraw-Hill, a recognized trusted source. Etsebeth is a senior lecturer in the Faculty of law specialising in the areas of law and information security. Although Etsebeths paper ‘Malware: the new legal risk is highly suitable in terms of qualitative information, it lacks suitable geographic law for the scope of my project. I will use the information provided by Etsebeth for Malware, as this information is not geographically bound, and analyse the legal implications after comparing them to UK law. Etsebth highlights that companies are reluctant to report cybercrimes as it has negative implications on the companys reputation this correlates to my hypothesis. ‘Understanding the spreading patterns of mobile phone viruses by Pu Wang, Marta Gonzalez, Cesar Hidalgo and Albert-laszlo Barabasi is a technical journal based on mobile phone virus modelling and the understanding of spreading patterns. The journal was published in 2009 and investigates various mobile platforms relating to my assignment however the document is a highly technical report based on the mathematics of virus spreading patterns, I find this report to be highly enlightening however due to the technical awareness of the target reader of my assignment I believe this report to be too technical and out of scope. Authoritative information directly from manufactures websites and retail outlets will be used including Apple, Android, Research In Motion, Nokia and Microsoft for documentation on smartphones and smartphone platforms as this will allow me to access accurate and current reliable information directly. Secondary information sources will be avoided where possible such as blogs and review websites for direct smartphone technical information as these types of resources may facilitate in providing inaccurate facts. Local mobile phone retail outlets such as Orange, Vodaphone, Phones4u, The Carphone Warehouse, O2 and T-Mobile will provide me with valuable information on device security awareness. I will enquire on staff security training and in-house company security literature currently available to public and business consumers as this will affect the average smartphone users security awareness. After investigation smartphone security I established that some research in this area had been done already by Goode Intelligence a UK company based in London. ‘Goode Intelligence is a company that provide strategic research and analysis that specialises in information security. Founded in 2007, Goode Intelligence has provided clients globally with statistical information from evidence accumulated from surveys in the field of information security. Goode Intelligence is viewed as an authoritative market leader of information security consumer information. 2.3 How this project fits in with the literature review I had chosen the subject then chosen the literature review method, thus tailoring the literature review to fit the requirements of the project. The Survey will allow me access information on how smartphone users actually use their device, how important they view the information stored on the device and users perception of the need for security 3.0 Research methods 3.1 Hypothesis ‘Businesses are not aware that they are at risk of information and financial loss or theft due to malware infections on smartphone devices. Information Technology consultants have recognised the gap in security for mobile devices, however it was soon realised that the physical security of the device was not the real issue, as the need for smartphone security awareness within businesses was a far greater concern. Experience establishes that the best form of security is the awareness for the need of security and why by the individuals who use the technology. Smartphone malware is not seen as of great importance to IT professionals, business managers or general consumers. A majority of smartphone users use their devices for both business and personal use and a large share of smartphone users will be using their personal smartphone for work related activities. The assumption is based that most individuals would know what information they deemed as confidential, more specifically, what information would they not like others to access to include such things as calendar, contacts, photos, emails and files. IT professionals should be the most aware group of smartphone malware risk, as their experience and technological awareness should allow them to be more technologically security aware. Antivirus used on personal computers is well known to hinder system performance and conflict with some applications and other software, The hypothesis is that antivirus products will consume more system resources then current smartphones can afford to offer and require more power from the device ultimately reducing the battery life and impacting negatively on overall system performance, rendering the device unusable by the average user. The perception of products such as the iPhone are viewed as secure out-of-the-box along with Blackberry smartphones as they are mostly touted by mobile phone shop staff as business orientated secure devices. 3.2 Methodology The project will be implemented using a triangulated, positivistic methodological approach. The particular technique chosen this will provide a balanced view of the subject area. It will incorporate both quantitative and qualitative primary research methods as reffered to by Bryman as multi-strategy research (Bryman, 2006). The scope of this project will mostly be Quantitative based research as indicted in Fig 1 below. Bryman advises that quantitative data can be gathered by way of a survey and qualitative research collected from journals and interviews. The Initial research will be conducted using primary research in the form of a cross-sectional survey questionnaire with closed questioning, interviews with professionals in the field of smartphone related security such as police personnel, security advisors and mobile phone shop staff will also be conducted to gain knowledge of their awareness of smartphone security and what advice they provide. The survey will be available to respondents in paper form where needed however the survey respondents targeted will mostly be from the internet so it is required that the survey be electronically hosted. The web-based survey distribution method selected is ‘Survey Monkey. The main motivations for selecting ‘Survey Monkey are reputation, administration features, ease of access and user layout familiarity. The survey will be designed to be concise and simple to maximise the amount of respondents in order to gain quality information. The target survey population will represent business managers, IT professionals as well as individuals who use their smartphone for personal use to establish users who admit to using their smartphone for both business and personal as opposed to personal use only. This is suggested by Baxter as an important step in defining who should be included and excluded from participating in the survey (Baxter, L. Babbie, E, 2004). The users have been targeted as the project will establish not only the perception of smartphone security but also what smartphone policies and procedures are currently in place and how aware users are of these. Research indicates that an ideal resource for the proposed target users is through a popular internet based technological social news website named ‘Reddit. ‘Reddit has a daily turnover of over 850.000 unique users (Alexa, 2010). According to Alexa the average ‘Redditors are male between the age of 18 to 44, are well educated and browses ‘Reddit either from work or home, suggesting that the majority of ‘Redditors are working professionals in the technology field.This suggest that the average ‘Reddit user is technologically aware (Alexa, 2010), suggesting that ‘Reddit would suit the proposed target survey participant. The proposed project will be delivered using an analytical in-depth research structure. This project structure has been selected as it will primarily be research based on the current business problem as previously stated. The intentions are to analyse the problem, understand how aware people are of the issue and propose possible solutions, One method of analysis proposed is the conceptual method, as described by Beaney as a way of breaking down or analysing concepts into their constituent parts in order to gain knowledge (Beaney 2003). I have interpreted this to mean the compartmentalisation and analysis of data. Critical and creative thinking skills such as Edward.De Bono six thinking hats will be used to examine the problem domain. A review will be given on how the systems work and compare them to how they should work. I will then analyse the solution domain by examining which options are available to improve the system security along with optimal recommendation and the benefits this would provide. ‘SPSS is a well-established statistical analysis application first released in 1968. Randomised questions, Marketsight. Survey design 4.0 Results 4.1 Presentation and description of results Who took part? The survey was conducted to establish the awareness of information security and the need for smartphone security. Users were openly invited from technological backgrounds to partake in the survey and assured of anonymity. A total of 758 people responded to the online survey from a possible 854,998 potential participants (Fig. 2). The survey itself was open for one month during February and March 2011. The results indicated in Figure 2 that a majority share of survey participants, with 82 per cent being male and 18 per cent female confirms my survey target gender. When asked, both genders averaged at age 26 (Fig. 3) as denoted in Figure 3, again confirming my target survey demographic groups. When asked 53 per cent of respondents reported they had used their smartphone solely for personal use, opposed to 45 per cent of partakers that reported they used their smartphone for both business and personal use, with 2 per cent reporting to use a smartphone solely for business use only as shown in Fig. 4 combining a total of 47 per cent. 25 per cent of respondents had only been using smartphones for the past six months, 17 per cent were aware they had been using them for at least a year and a majority percentage of 59 per cent had been using smartphones for more than one year seen in Figure 5. Only 12 per cent of respondents opted to use the ‘pay as you go payment facilities as opposed to the greater majority of 88 per cent that have contracts shown in Figure 6 below. 87 per cent of participants reported that they did not use any form of smartphone security software such as antivirus as opposed to 13 per cent that did as highlighted in Figure 7. SMARTPHONE In answer to the question â€Å"What type of smartphone do you currently use?† 34 per cent of respondents said they used an Apple IPhone, 58 per cent reported to use Android smartphones, 13 per cent used Blackberries and 6 per cent of respondents had Symbian smartphones (Fig. 8). 87 per cent of respondents had used calendar functions, 94 per cent of respondents used email, 86 per cent of used games, 87 per cent of respondents used GPS features, 74 per cent of respondents used instant messaging, 52 per cent of respondents used internet banking facilities, 66 per cent of respondents used multimedia messaging service (MMS), 94 per cent of respondents used the short messaging service (SMS) feature and 78 per cent (Fig. 9) of respondents admitted to using social networking sites on their smartphone. 93 per cent of survey partakers used 3G for mobile data communication, 59 per cent of respondents used ‘Bluetooth technology, only 4 per cent of had used infrared line of sight technology, however 75 per cent of respondents admitted to connecting via universal serial bus (USB) and 94 per cent of participators had used wireless for mobile data communication shown in Figure 10. Total of 757 participators answered this question and 1 partaker chose to skip the question. From a total of 758 respondents, 63 per cent (476) valued the physical smartphone above the 37 per cent (282) whom valued the information more. Figure 12 shows 62 per cent of survey participants reported that they did not pay attention to licence agreements and permissions when installing applications on their smartphones 34 per cent reported they did read the licence agreements and permissions. 4 per cent of respondents believed that this question was not applicable to them for their smartphone use. The awareness for the need of personal computer security is apparent as 81 per cent of responders were aware for the need of security software for personal computers as opposed to the 19 per cent who were not aware. 94 per cent participants have connected their smartphone to a personal computer (PC), 6 per cent stated they had not ever connected to a PC. All 758 respondents answered this question. Figure (XXX) shows that survey respondents considered smartphone security as ‘beneficial but not essential as the majority answer with 64 per cent , 21 per cent (159) didnt not consider there to be a need currently for smartphone security software as opposed to 15 per cent (114) whom considered smartphone security software as absolutely essential. 95 per cent of respondents were aware of ‘Adware, 27 per cent had known about ‘Badware, 25 per cent of respondents were aware of ‘Crimeware, 69 per cent had previous knowledge of ‘Rootkits, ‘Trojans 95 per cent,, ‘Spyware 95 per cent, ‘and ‘Worm 90 per cent were the most commonly aware terms of malware from the malicious software list, the majority being ‘Virus with 97 per cent of respondents being aware of this type of malware. 731 respondents answered this question. 96 per cent of respondents stated that they owned the smartphone, only 4 per cent of respondents had employer owned smartphones. All partakers responded to this question. Out of the 758 respondents, 15 per cent were aware of policies within their place of business, with the majority of respondents 41 per cent unaware of any workplace policies or procedures particularly orientated toward smartphones. 44 per cent responded that the question was not applicable to them. All participants answered this question. It is interesting to find that only 15 per cent stated they were aware of specific workplace policies and procedures specifically for mobile phones and 40 per cent were aware there were no mobile phone policies and procedures. A majority of 92 per cent (699) had not been advised of any security methods to protect them or their information from fraud, theft or malicious software. 8 per cent (59) respondents agreed they had received adequate security advice. 4.2 Discussion and interpretation of survey results Analysing the results of the survey shows the majority of smartphone users to be Android users peaking in the 20 to 24 age bracket, this would indicate that an IT professionals choice of smartphone is Android as indicated in Figure 3 below. Smartphone survey contributors within the 20 to 24 age group were then further examined to indicate what purpose is intended when using the devices, examining the results shows clearly that a majority of survey respondents reported they viewed their smartphone use as personal use, however disturbingly over half the users in the same age group admitted to using their smartphone for both personal use and business use as shown in Figure 4. Female respondents preferred the features provided by iPhones however also as opposed to male smartphone users who clearly preferred the Android platform over all others as seen in Figure (XXX). Examining users perception for the need of smartphone security against those users whom did or did not have antivirus shows that the awareness for the need of security correlates to users whom did indeed have smartphone security measures in place with nearly half of users who responded ‘Absolutely essential to the question ‘How necessary do you see the need for smartphone security software as shown in Figure (XXX). However the overall amount of smartphone users with antivirus or other security is disturbingly low given the malware threats currently available. The results also show us that a large majority of IT professionals do view smartphone security as beneficial however not essential. Android users are the most security aware demographic as demonstrated in Figure (XXX) above. This indicates that users are not aware of the threats posed by malware and view the need for smartphone system performance greater than the need for security. Business users have been defined as respondents who confirmed they used their smartphone for business only and users who reported they used their smartphone devices for both business and personal use. Smartphones have many features of value to employees as shown in Figure (XXX) Below, Email, Calendar, GPS and SMS features were shown to be the most used features all of which are viewed to aid employee productivity. However features such as games and social networking which negatively affect employee productivity were also shown to be frequently used, suggesting that smartphones can have negative effects on employee productivity. Figure (XXX) also shows us that over half of business users reported to use internet banking facilities from their smartphones. After finding out what smartphone features business users were most interested in I studied how aware business users were of security permissions and licence agreements prompts when installing new applications on their smartphones. The pie chart below is a representation of business user survey respondents awareness of how essential smartphone application installation security prompts are in regards to new application installations. Figure (XXX) shows us that 60 per cent of all business users admitted that they did not pay attention to licence agreements and permission prompts when installing new applications. The distinction between smartphones and personal computers is becoming increasingly marginal. Personal computers for example do not have built in billing systems and unless connected to the internet are static devices accessible via a local area network or through direct contact. Smartphones have an integral billing system are completely mobile and have multiple connectivity methods. When business user survey partakers were asked if they used any security applications such as antivirus, an overwhelming majority responded that they did not use any security products. This confirms part of my hypothesis that business users do not perceive smartphone security as a real threat. Discovering that the majority of business users used internet banking facilities for either personal banking or business banking and 9 out of 10 business smartphones had no security products installed it was elementary to understand if business users were aware of smartphone malware threats. The line graph in Figure (XXX) indicates that over 90 per cent of business users are aware of malware threats such as Adware, Spyware, Trojans, Viruss and Worms however business users were all least aware of malware threats such as Crimeware as indicated in Figure (XXX) Survey respondents who reported they used their smartphone for personal use only were excluded from the following analysis.7 out of 10 business users confirmed they were not aware of any specific smartphone security policies at work (Figure (XXX) The awareness of security for iPhone smartphones is low as users perception of Apple and Mac OS is that it is impervious to malware infection. Research shows that iPhone users have the least amount of antivirus installed on devices. As discussed earlier, users are completely reliant on Apple to vet all applications for malicious code, whereas Android and Symbian applications are open source so users may inspect the contents for malware. secure smartphone model, least security aware group Android users are the most security aware demographic group as the typical android user is conscious that malicious software exists and the android community are able to vet applications themselves. Android users were also the highest security aware group with the highest percentage of antivirus products per smartphone. Virtual environments, least secure smartphone perception Blackberry smartphones were the most secure devices in regards to email, network connectivity however it was found that application signatures can be purchased by anyone for a small fee thus rendering the security of the device minimal. Very secure aspects, not as secure overall Symbian smartphones are found to be the most current common target for malware developers. Low security Windows phone 7 is the newest platform on the smartphone market and only time will tell how secure the device is. Awareness and concern 5.0 Smartphones Private and confidential data from lost or stolen mobile devices such as laptops, USB pen drives and computer storage drives has gained negative exposure within the media recently however one of the largest growing threats to corporate information comes from unsecure smartphones. To understand this statement it is important to appreciate the history of the smartphone to recognise why smartphones pose such a threat in todays business environment. A mobile phone is a portable electronic device used to make and receive telephone calls. The mobile phone was first revealed by Dr Martin Cooper from the company Motorola in 1973, it was not until ten years after Dr Coopers demonstration that Motorola released its flagship mobile phone the ‘DynaTAC, this was the worlds first commercially viable mobile phone (Motorola, 2009). Originally these devices were commercially targeted at businesses and upper class individuals as the cost of the device was very high and the actual usage was severely restricted, due to the technology limitations at this time of battery weight (Motorola, 2009) and because the battery duration was limited to last a maximum of 30 minutes thus making the device impractical and available only to businesses and professional consumers. ‘According to Moores Law, the number of transistors on a chip roughly doubles every two years. (Intel, 2005) As Moore stated over thirty five years ago, due to the advancement of processors, battery technologies and overall reduced power consumption, mobile phones have become lighter, smaller, more powerful and longer lasting (Intel, 2005). Due to these fundamental technological advancements mobile phones have been able to incorporate additional existing technologies such as camera units, sensors, speakers and often take advantage of JAVA based applications and features, thus coining the term ‘Feature phone. Feature phones are more advanced technologically than mobile phones however now Smartphones currently reside in the top tier of mobile communication technology. The term ‘smartphone is ambiguous and many experts fail to agree on a suitable definition. Most smartphone features are not exclusive to a particular category, this project does not intend to make that definition, however for the scope of this project I have listed combined definitions and compared current smartphone f

Monday, August 19, 2019

The Mask :: essays research papers

The Mask The mask is a form of deception or illusion. Sometimes, it can be worn as both. It hides the true emotions of slaves, keeping the slave master from knowing what is going on in their minds. The mask also allows the slave to have an identity without the master’s detection. The mask gives the illusion that the slave is exactly how the masters believe, ignorant, incapable of true emotion, and unable to think for themselves. A perfect depiction of the mask can be found in Charles Chestnutt’s The Passing of Grandison. Colonel, Grandison’s master, believed that he would never try to escape if allowed to go on a journey with his son, Dick. The colonel recommends to Dick that he bring Grandison along on his travels. â€Å"What’s the matter with Grandison?† suggested the colonel. â€Å" He’s handy enough, and I reckon we can trust him. He’s too fond of good eating to risk losing his regular meals; besides, he’s sweet on your mother’s maid, Betty†¦Ã¢â‚¬  ( 536) The colonel’s belief in Grandison as a faithful servant, proves that he was in fact deceived by the mask that Grandison was wearing. In another passage, colonel is discussing with Grandison if he feels better off than the free negroes that don’t have â€Å" no kind master to look after them and no mistress to give them medicine.† Grandison replies with an answer that reflecting his accomadation to colonel. â€Å" Well, I sh’d jes reckon I is better off, suh, dan dem low- down free niggers, suh! Ef anybody ax’em who dey B’long ter, dey has ter say nobody, er e’se lie erbout it. Anybody ax me who I B’longs ter, I ain’ got no ‘casion ter be shame ‘ter tell ‘em, no, suh, ‘deed I ain’, suh!† (536) By Grandison replying in this matter, he used the mask to deceive the colonel and fool him into thinking that he never thought about being free. He was able to make the colonel believe that he was indeed content. Not only was Grandison able to fool the colonel with the mask, but he was able to fool Dick as well. While they were up north, Dick warned Grandison about the abolitionists. He also tells him that it is his opportunity to see how the free negroes live. Dick asks Grandison if he met any of them. â€Å"Yas, suh, I’s seen some of ‘em. But I don’ keer nuffin fer ‘em, suh.

Sunday, August 18, 2019

Comparison Between “The Cask of Amontillado” and “The Tell-Tale Heart”

Edgar Allan Poe is known for some of the most horrifying stories ever written through out time. He worked with the natural world, animals, and weather to create chilling literature. Two most notable thrillers are â€Å"The Cask of Amontillado† and â€Å"The Tell-Tale Heart†. Poe was infatuated with death, disfigurement, and dark characteristics of the world. He could mix characters, setting, theme,and mood in a way that readers are automatically drawn into reading. Both of these short stories have the same major aspects in common. The narrators in both works prove to be similar in several ways. In â€Å"The Tell-Tale Heart† the story is told through a psycho narrator; both stories contain apparent psychological imbalances within their story tellers, â€Å" -his central character or narrator so psychologically obsessed with a mysterious phenomenon that everything in the story irresistibly revolves around it...†(May, Charles E.) There really is no motive for the murder of the old man; just his eye that he cannot stand. He repeats himself frequently, trying to assure the reader, and himself, that he is sane; leading to believe he may not be psychologically stable. In â€Å"The Cask of Amontillado† the narrator can also be considered a mad man by the way he plays games with his victim. Montressor says to Fortunato that they should go home because â€Å"his health is precious.† This conversation is ironic because Montressor does not really want to protect Fortunato's health, but to kill him in the catacombs. Both of the narrators are proud of their murders and brag about them within the stories. Not only are the narrators similar but the settings are alike once the murders take place, both locations of the victims are buried in a dark place with no escape. I... ...ted Baraban, Elena V. "The Motive for Murder in 'The Cask of Amontillado'." Rocky Mountain Review 58.2 (Fall 2004): 47-62. Rpt. in Short Story Criticism. Vol. 111. Detroit: Gale, 2008. Literature Resources from Gale. Web. 7 Dec. 2010. Benton, Richard P. "The Cask of Amontillado: Overview." Reference Guide to Short Fiction. Ed. Noelle Watson. Detroit: St. James Press, 1994. Literature Resources from Gale. Web. 3 Dec. 2010. Chua, John. "An overview of 'The Tell-Tale Heart,'." Gale Online Encyclopedia. Detroit: Gale, 2010. Literature Resources from Gale. Web. 7 Dec. 2010. May, Charles E. "The Tell-Tale Heart: Overview." Reference Guide to Short Fiction. Ed. Noelle Watson. Detroit: St. James Press, 1994. Literature Resources from Gale. Web. 7 Dec. 2010. Valiunas, Algis. "No to Poe." Commentary 127.1 (2009): 42+. Literature Resources from Gale. Web. 7 Dec. 2010.

Saturday, August 17, 2019

Policing Function

Policing Function University of Phoenix CJ/394 – Criminal Organizations SC11BCJ06 February 13th, 2013 Policing Law enforcement in the United States is a very unique component of the criminal justice system. Police Officers are thought to be the guardians of the gate; however, there are different levels of law enforcement that police cities, counties, and states. Law enforcement is broken down into different agencies. According to Grant and Terry (2008, p. 3-15) four levels of law enforcement exist in the United States; Most cities and counties have their own municipal and county law enforcement agencies which include city police and sheriff departments such as the Los Angeles Police Department and the Los Angeles Sheriff’s Department. Each state has its level of law enforcement as well; example of state law enforcement agencies include the California Highway Patrol and the California Department of Fish and Game (DFG) Warden.On the federal level agencies such as the Fede ral Bureau of Investigation (FBI), the Drug Enforcement Administration (DEA) and the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) are accountable for all federal jurisdiction. Briefly, this report will outline the various perspectives of policing as they apply to the various agencies of law enforcement in the United States. Since the inception of the United States common laws, rules, and regulations have been enacted to preserve society; this report will identify and outline possible changes in current laws.In addition, the impact of possible changes as they apply to policing will be underlined. Levels of Policing Municipal and County As mentioned earlier, law enforcement in the United States is broken up to different levels and categories. According to the Bureau of Justice Statistics (2013), United States local law enforcement makes up two-thirds of 18,000 law enforcement agencies. The first level of policing consist of the municipal and county law enforcement agencie s. The aforementioned level of law enforcement is the majority of policing in the United States.Local and county law enforcement officials are by far the most depended on agency in society throughout the United States. Municipal law enforcement agencies are often seen patrolling neighborhoods, responding to calls for service or enforcing traffic laws. According to Grant and Terry (2008, p. 13), â€Å"Large local law enforcement agencies often are responsible for investigating serious violent and property crimes in their jurisdictions, compared to half of state agencies (Bureau of Justice Statistics 2000). In addition to the many duties that are bestowed on to the police, local law enforcement is called upon for non-emergency and non-essential law enforcement needs. An example of the aforementioned is a call for service because a cat is stuck in a tree; again the call is non-emergency, however it is a call for service that officers respond to daily. County level policing usually con sists of the Sheriff’s Department; however, Grant and Terry (2008, p. 13) suggest some counties do have a larger police force that would account for the jurisdiction of a county.Grant and Terry (2008, p. 13) state, â€Å"in some jurisdictions this office is dissolved into a county police force that functions much the same as municipal police. † Typically the Sheriff’s Office assumes jurisdiction in larger unincorporated areas; the scope of their duties revolve around enforcing court orders, court summons, or working the county jails. In some counties, the Sheriff’s Department’s functioning purpose is to provide police services much like a regular police agency, Grant and Terry (2008, p. 13-14).Grant and Terry (2008, p. 14) states, â€Å"In some jurisdictions, the sheriff’s office is entirely law enforcement focused, with no other responsibilities. † State In addition to the local and county police, each state has its own category of l aw enforcement. In the state of California the following agencies serve as a component in law enforcement: the California Highway Patrol (CHP), the Department of Fish and Game (Warden), California Lottery Security and Law Enforcement. State Law enforcement agencies are capable of arresting and xecuting search warrants, Grant and Terry (2008, p. 14). Other functions of state level policing include state investigations, collaboration with local and county law enforcement agencies, highway traffic enforcement and investigations, and enforcing state laws. Essentially, law enforcement on the state level may conduct basic law enforcement duties; however, most state police agencies are specific such as the CHP or the California Lottery Security and Law Enforcement. Federal Federal law enforcement includes agencies such as the FBI, DEA, and the ATF.In general federal law enforcement agencies can only enforce federal laws, where as local and state law enforcement agencies have jurisdiction o ver local and states matters, per Tenth Amendment of the United States Constitution, Grant and Terry (2008, p. 15). In 2002, the Homeland Security Act was enacted; said act recognized multiple federal law enforcement agencies as part of the new Department of Homeland Security. Prior to the aforementioned act two major federal agencies were prevalent in law enforcement: the Department of Justice and the Department of Treasury, Grant and Terry (2008, p. 15).Some federal policing duties include the following: investigations, inspections, federal court, security, and protection. Changes Among the many changing laws in the United States, there are a few that could prove to be an immense impact on society, more so on policing. The recent proposal for tougher gun laws and the use of advanced technology to police society seem to be on the horizon for today’s society. On December 14th, 2012, Adam Lanza, the shooter in the Sandy Hook Elementary School shooting murdered twenty children and six adults; Lanza used an â€Å"assault rifle† and some other weapons to carry out the aforementioned crime.Since the Sandy Hook incident the push for tougher gun laws has been proposed, thus causing a split in society. Currently the proposal is for a ban on â€Å"assault rifles† and ammunition sales. Some of the issues revolve around identifying certain weapons as assault weapons and limiting the amount of bullets allowed in a magazine. The Second Amendment of the United States Constitution states, â€Å"A well regulated militia, being necessary to the security of a free state, the right of the people to keep and bear arms, shall not be infringed† Cornell University Law School (n. d. ).Historically, it has been proven that criminals don’t abide by the rules set forth in society. Should a tougher gun law or an assault weapons ban be imposed, the Second Amendment will be infringed on. Currently, society is split on wanting tougher gun laws; however, th e other half are supportive of their right to bear arms and weapons ownership. One may wonder how this may pose as a challenge in the future of policing. The fact of the matter is law enforcement is meeting that challenge in today’s society; they are being asked to comply with a movement of recovering weapons from the streets and from responsible owners.The positive outcome from the aforementioned action revolves around recovering unwanted and potentially dangerous weapons; however, contrary to making society a safer place, the aforementioned action also promotes an opportunity for criminals to capitalize on. One should consider the negative result of not being able to have more than eight bullets, much less not owning a gun for protection. Criminals do not abide by the rules and regulations that have been enacted, thus there lack of concern for others.Considering the aforementioned point, the rise is crime, specifically violent crimes such as robbery, assault with deadly wea pons, murder, and home invasions are all very possible. It is possible for the police to be understaffed while trying to combat the forecasted spike in crime. In addition, lots of innocent people could potentially be harmed or killed. Technology The recent proposal for using unmanned drones to assist police officers in the field is being met with mixed emotions as well. Many citizens feel as if their Constitutional rights are being violated; particularly the Fourth Amendment in the United States Constitution.Unmanned Drones also known as Unmanned Arial Vehicles (UAV) would assist the police departments in field operations as they fly around and provide vital real time information giving law enforcement the edge on crime fighting. The issue that arises centers around the government violating the Fourth Amendment; having the UAV fly around in a large city such as Los Angeles makes many citizens wonder if the police are using this for actual police work as opposed to randomly checking on them for non-policing monitoring. The Fourth Amendment of the United States Constitution suggests United States citizens should be secure in heir own person and home; in addition that Amendment also include their personal papers and effects shall be free of unreasonable search or seizure from the government, and no warrant issued without probable cause. With a UAV flying around the city it is safe to assume many citizens will feel violated. In the future this will most definitely be an asset to law enforcement; however, it will come at the cost of freedom, privacy, and trust in law enforcement. Conclusion In this report the author briefly outlined the different levels of law enforcement in the United States.Each level of policing has certain function within society, from the local and county level to the federal level. Though every level has different functions throughout law enforcement, they still seem to provide basic services in regards to policing; in addition, all levels co llaborate amongst themselves to help combat crime and provide solutions to preserve peace and a sense of security in society. Furthermore, two examples of current laws have been expanded on, giving a forecast of how they will change and impact law enforcement in the future.References Cornell University Law Shcool: Second Amendment. (n. d. ). Retrieved fromhttp://www. law. cornell. edu/constitution/second_amendment Cornell University Law Shcool: Fourth Amendment. (n. d. ). Retrieved fromhttp://www. law. cornell. edu/constitution/fourth_amendment Grant, H. B. , & Terry, K. J. (2008). Law Enforcement in the 21st Century (2nd ed. ). Retrievedfrom The University of Phoenix eBook Collection database. Bureau of Justice Statistics: Local Police. (2013). Retrieved fromhttp://bjs. ojp. usdoj. gov/index. cfm? ty=tp&tid=71