Wednesday, October 30, 2019
Events that lead to the atomic bombings in Japan during the world war Research Paper
Events that lead to the atomic bombings in Japan during the world war II - Research Paper Example For most of the people then and now, the full account of the events, the number of casualties as well as the internal decisions of all people involved in the Second World War were and still are vague. This paper aims to provide some information regarding several figures and concepts related to the atomic bombings in Hiroshima and Nagasaki, as well as to connect the said figures and concepts on these events in chronological order. Niels Bohr and the Development of the Nuclear Bomb While the whole development of the Nuclear Bomb canââ¬â¢t be solely attributed to Niels Bohr, he was an instrument for scientists in America to understand the processes by which nuclear energy from radioactive elements can be harnessed to produce a weapon stronger than the prevailing bomb formulations at that time. Bohr was working on particle bombardment, and initially he believed that the chances of being able to use nuclear particles in a controlled setting may be far from happening anytime soon (Gosli ng 2). However, upon learning about the results of Otto Hahn and Fritz Strassmann about the splitting of the uranium atom into two lighter elements as well as the release of a large amount of energy and highly-reactive neutrons, which would trigger the repeat of the same process on other uranium atoms, and so on. This process became known as nuclear fission, and became the core concept of the process of harnessing nuclear energy (Gosling 3). Bohr presented Hahn and Strassmannââ¬â¢ results in a conference around 1939, as well as having them published in that same year which enlightened many scientists, most especially those belonging to the Manhattan project (Rose 83). Bohr eventually assisted in the testing of the bombs at Los Alamos in 1944, a year before the Hiroshima and Nagasaki bombings. He recognized the fact that if the allies were not able to produce an atomic bomb, the Germans might beat them to it, causing even more destruction (Rose 30). Through these efforts, the firs t nuclear bomb was finished and was used to bomb Hiroshima in August 6, 1945. The Formation of the Interim Committee Before the bombings in Hiroshima and Nagasaki ensued, President Harry S. Truman formed the Interim Committee, an advisory group in charge of making recommendations on the use of atomic weapons during wartime as well as making a position for the U.S. on postwar atomic policy (Gosling 45). The group was consisted of members from different government groups: Secretary of War, Henry Stimson; George L. Harrison, Deputy Secretary of War; Vannevar Bush, Director of the Office of Scientific Research and Development; Karl T. Compton, from the Manhattan project; Navy Undersecretary Ralph Bard; Secretary of State Will Clayton; and James Byrnes (Brune 606). The committee also had a scientific advisory team consisting of: Robert Oppenheimer, the Scientific Director of the Manhattan Project; Enrico Fermi, a Nobel Laureate for physics; Arthur Compton of the University of Chicago; an d Ernest Lawrence, a well-known physicist, with General George C. Marshall as their military representative (Gosling 45). During the meeting of the Interim Committee on May 31, 1945 they have concluded that the atomic bomb must be used against Japan in order for them to surrender as early as possible, and by doing so would send them the message that further resistance is futile (Brune 606). This conclusion was sent as a report on June 16 of the same year, as well as the additional advice that Japan must
Monday, October 28, 2019
Mongol Brutality Essay Example for Free
Mongol Brutality Essay Although the Christian and Muslim warriors were of extreme cruelty, the Mongols brutality and carelessness was far greater because of their battle tactics, physiological warfare, and weaponry. These ââ¬Ëbarbariansââ¬â¢ captured a surplus amount of land in a stunning amount of time with questionable war tactics. Despite the brutality of the Mongols, Christian and Muslin warriors began to become more and more merciless. All three of these groups of warriors prove to be dangerous and cruel, but the Mongols seem to have the perfect mix of terror and destruction to make them the most brutal. The Mongols warfare tactics, although quite cruel, proved effective. When the Mongols wanted a village or town to expand their empire, they attacked with full force. The devastating thing about these attacks though, was the ââ¬Ëno mercyââ¬â¢ kind of mindset they showed. These warriors were known to kill everything to get what they wanted, men, women, and children alike. The Muslim and Christian warriors were thought to have slaughtered whole towns before, but unlike the Mongols, it was not a tactic they were known for. The Mongol people were feared everywhere they went as word spread about these ruthless attacks. The fear these warriors inflicted on some people was enough to surrender attacks and turn over cities before a battle even began. Although whenever the Muslim or Christian warriors approached a battle, it was fought. This proves just how cruel yet skilled these Mongol warriors must have been. However, in most cases, just surrendering seemed to be the better idea, because in the case you didnââ¬â¢t, your city may have been looted and burned with all your people slaughtered. The Mongols success and expansion is largely due not only to their war tactics but also to their advanced weaponry. The Mongols were expert horsemen and masters of the bow and arrow, therefore adding to their success. These warriors used special ââ¬Ëlong bowsââ¬â ¢ to have more powerful and precise a weapon; they also used horses to charge into villages and slaughter those inside. Worst of all, the Mongols were thought to have catapulted dead bodies infected with the plague over city walls to kill all of the residents through biological warfare. The Christian and Muslim warriors, although with good weapons, could not match the expertise, power, and experience the Mongols had with their weapons. Their weaponry was simply more advanced and powerful adding to the brutality of these cruel Mongols. The Mongols were extremely powerful warriors, with disturbingly merciless attacks. These warriorsââ¬â¢ slaughtered entire towns,à looted cities, and then burned them to the ground. The Christian and Muslim ways of warfare could in some aspects be similar to that of the Mongols, but not nearly to the extent of the Mongols. These warriors who made cities surrender before an attack even began and who had advanced weaponry matched with expert and experienced weapon holders were practically unstoppable. These cruel slaughteringââ¬â¢s, feared attacks, and powerful weap ons used with no mercy outweigh any opposition in the argument of why the Mongols were more brutal than Christian and Muslim warriors.
Saturday, October 26, 2019
Impact of Mass Media on Individuals, Society, and Culture Essay
Impact of Mass Media on Individuals, Society, and Culture Mass media, over the years, has had a profound effect on American society, on its culture, and on the individuals exposed to the media. Mass media is a form of socialization, having a long-term effect on each member of American society. While mass media targets the individual in short-term intervals, the overall influence on them has been established as the consumer moves from one impressionable age category to another. The long or short- term effects of mass media are separate and distinct when its role in America is evaluated. Mass media effects people differently because of varied amounts of exposure and formats. Mass media has a socialization function in American society, in the culture, and on individuals. Mass media has played a role of socialization in our society over the years: Socialization is a long-term process that every human being undergoes as he or she becomes a functioning member of society. Socialization refers to the internalizing of all of the lessons from many sources concerning ways of behaving that are approved or expected by society, as individuals mature through every stage in the life cycle (DeFleur and Dennis, 582). Mass media educates its customers on how to think and to act, as they are conditioned to what the media portrays as suitable responses and behavior to experiences in American life. This long- term process is established over the years as media influences the impressionable age groups, as they are gradually exposed to distinct messages of mass media. These distinct age consumer groups are targeted by mass media, and while the effects of mass media are short-term, the subtle impression is long-term. The effect on American s... ...mmunity and friends have become more concerned of their own pursuits of happiness and security. Most people perceive mass media as quite negative, cynical, and unimportant for everyday lifeââ¬â¢s survival. The media reveals the degradation of society, our government, our politicians, and our celebrities. American culture is now filled with images of drugs, violence, and sex. Works Cited Anderson, Charles. Personal Interview. 3 November 1996. DeFleur, Melvin L. and Everette E. Dennis. Understanding Mass Communication. Boston: Houghton Mifflin Company, 1996. Denger, Stuart. Personal Interview. 3 November 1996. Hummon, David. Geographical Reviews: Commonplaces: Community Ideology and Identity in American Culture. Geographical Review. July 1991: 363-365. Swidler, Ann. ââ¬Å"Inequality and American Cultureâ⬠American Behavioral Scientist March 1992: 606- 629. Impact of Mass Media on Individuals, Society, and Culture Essay Impact of Mass Media on Individuals, Society, and Culture Mass media, over the years, has had a profound effect on American society, on its culture, and on the individuals exposed to the media. Mass media is a form of socialization, having a long-term effect on each member of American society. While mass media targets the individual in short-term intervals, the overall influence on them has been established as the consumer moves from one impressionable age category to another. The long or short- term effects of mass media are separate and distinct when its role in America is evaluated. Mass media effects people differently because of varied amounts of exposure and formats. Mass media has a socialization function in American society, in the culture, and on individuals. Mass media has played a role of socialization in our society over the years: Socialization is a long-term process that every human being undergoes as he or she becomes a functioning member of society. Socialization refers to the internalizing of all of the lessons from many sources concerning ways of behaving that are approved or expected by society, as individuals mature through every stage in the life cycle (DeFleur and Dennis, 582). Mass media educates its customers on how to think and to act, as they are conditioned to what the media portrays as suitable responses and behavior to experiences in American life. This long- term process is established over the years as media influences the impressionable age groups, as they are gradually exposed to distinct messages of mass media. These distinct age consumer groups are targeted by mass media, and while the effects of mass media are short-term, the subtle impression is long-term. The effect on American s... ...mmunity and friends have become more concerned of their own pursuits of happiness and security. Most people perceive mass media as quite negative, cynical, and unimportant for everyday lifeââ¬â¢s survival. The media reveals the degradation of society, our government, our politicians, and our celebrities. American culture is now filled with images of drugs, violence, and sex. Works Cited Anderson, Charles. Personal Interview. 3 November 1996. DeFleur, Melvin L. and Everette E. Dennis. Understanding Mass Communication. Boston: Houghton Mifflin Company, 1996. Denger, Stuart. Personal Interview. 3 November 1996. Hummon, David. Geographical Reviews: Commonplaces: Community Ideology and Identity in American Culture. Geographical Review. July 1991: 363-365. Swidler, Ann. ââ¬Å"Inequality and American Cultureâ⬠American Behavioral Scientist March 1992: 606- 629.
Thursday, October 24, 2019
Existentialism Essay -- essays research papers
Jean-Paul Sartre says "man is nothing else but what he makes of himself" (762). This existentialist view depicts the idea that one is not based on the essence of a soul, but rather, based on decisions made throughout life. Sartre also believes that every man is responsible for all men. One may choose his marriage partner, however, in choosing to marry, one chooses monogamy. Decisions that individuals make will collectively create a set of principles and beliefs for all of man. Many people believe that a personââ¬â¢s decisions are a reflection of his soul and personality. However, it is more likely that the conclusion a person reaches is due to the influence of different ideas, as well as the circumstances surrounding the choices. One does not have an innate "essence", but instead, the choices that a person makes constantly shape his character, which in turn creates his essence. Decision-making is based on many different conditions and controlling factors that exist at the time of conflict. People take into consideration the thoughts and opinions of others, hindering the idea of an individualââ¬â¢s essence. If an essence really existed, another personââ¬â¢s thoughts would not affect someone elseââ¬â¢s. Instead, a person makes choices from birth and the different decisions that one chooses form a pattern and creates oneââ¬â¢s character. Sartre also says, "Man is nothing else than his plan; he exists only to the extent that he fulfills himself; he is therefore nothing ...
Wednesday, October 23, 2019
Rhetorical Analysis of the Declaration of Independence
The Declaration of Independence Rhetorical Analysis Christian Johnson / P6 PART I The Declaration of Independence is considered by many to be the finest piece of political prose ever written. It can be seen as a document in five parts:à the introduction, the preamble, the denunciation of George III, the denunciation of the British people, and the conclusion. We are going to closely examine the first three as a way to understand how Jefferson's rhetorical strategies serves the political aims of the young colonies. The introduction consists of the first paragraph, which is a single long sentence (periodic sentence for those who will do well in May). Read the first paragraph and come up with two reasons why Jefferson would frame the introduction in the way he did. Reason ISeen within its original context, however, it is a model of subtlety, nuance, and implication that works on several levels of meaning and allusion to orient readers toward a favorable view of America and to prepare them for the rest of the Declaration. Textual SupportFrom its opening phrase, which sets the American Revolution within the whole ââ¬Å"course of human events,â⬠to its assertion that ââ¬Å"the Laws of Nature and of Nature's Godâ⬠entitle America to a ââ¬Å"separate and equal station among the powers of the earth,â⬠to its quest for sanction from ââ¬Å"the opinions of mankind,â⬠the introduction elevates the quarrel with England from a petty political dispute to a major event in the grand sweep of history. It dignifies the Revolution as a contest of principle and implies that the American cause has a special claim to moral legitimacyââ¬âall without mentioning England or America by name. Reason IILabeling the Americans ââ¬Å"one peopleâ⬠and the British ââ¬Å"anotherâ⬠was also laden with implication and performed several important strategic functions within the Declaration. First, because two alien peoples cannot be made one, it reinforced the notion that breaking the ââ¬Å"political bandsâ⬠with England was a necessary step in the course of human events. America and England were already separated by the more basic fact that they had become two different peoples. The gulf between them was much more than political; it was intellectual, social, moral, cultural and, according to the principles of nature, could no more be repaired, as Thomas Paine said, than one could ââ¬Å"restore to us the time that is pastâ⬠or ââ¬Å"give to prostitution its former innocence. â⬠To try to perpetuate a purely political connection would be ââ¬Å"forced and unnatural,â⬠ââ¬Å"repugnant to reason, to the universal order of things. ââ¬Å" If you had to argue that the most important word in the first paragraph is necessary, how would you make that case? To say an act was necessary during the 18th century implied that it was impelled by fate or determined by the operation of inextricable natural laws and was beyond the control of human agents. Characterizing the Revolution as necessary suggested that it resulted from constraints that operated with law like force throughout the material universe and within the sphere of human action. The Revolution was not merely preferable, defensible, or justifiable. It was as inescapable, as inevitable, as unavoidable within the course of human events as the motions of the tides or the changing of the seasons within the course of natural events Take a look at the second paragraph[1] in which Jefferson sets forth a series of propositions (five in all) that have been called the clearest, most direct statements of political philosophy in the history of writing. Identify the five basic propositions that constitute Jefferson's philosophy of government. Proposition I:à à à à à à All men are created equal. Proposition II:à à à à They are endowed by their creator with certain unalienable rights Proposition III:à à Among these are life, liberty, and the pursuit of happiness Proposition IV:à à à To secure these rights governments are instituted among men Proposition V:à à à à Whenever any form of government becomes destructive of these ends, it is the right of the people to alter or to abolish it. Now take a look at the predicate of each one of Jefferson's propositions and compare it to the subject of the following proposition. What has Jefferson done here? Chart out how the follow if ideas throughout this paragraph is controlled by the subjects and predicates (use a T-chart). Subject |Predicate | |they |all men, from proposition one | |these |man's unalienable rights, from proposition two | |these |man's unalienable rights, from propositions two and three | |these |securing man's unalienable rights, from propositions two, three and | | |four | PART II 1. Read the second paragraph and note how the rhythm (a rise and fall of the voice produced by the alternation of stressed and unstressed syllables in language) of the sentence is constructed to highlight certain concepts. List the words that rhythm highlights and analyze the effect on the paragraph caused by the pattern of stressed words. 2. The Declaration of Independence can be reduced to a relatively syllogism: |Majorà premise: |[p|When government deliberately seeks to reduce the people under absolute despotism, the people have a right, indeed a| | |ic|duty, to alter or abolish that form of government and to create new guards for their future security. | |] | | |Minorà premise: |à |The government of Great Britain has deliberately sought to reduce the American people under absolute despotism. | |Conclusion: |à |Therefore the American people have a right, indeed a duty, to abolish their present form of government and to | | | |create new guards for their future security. | The key premise is the minor premise, which explains why Jefferson spends two-thirds of his time establishing the validity of it. Take a look at the sentence(s) that introduce(s) the section that attacks King George III. The history of the present Kind of Great Britain is a history of repeated injuries and usurpations, all having in direct object the establishment of an absolute Tyranny over these states. â⬠Why would Jefferson repeat the word history twice in this sentence? What are a couple of ways that this repetition is effective? ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â [1] The preamble is presented as a logical demonstration, with one proposition leading to another proposition. From the first proposition (that all men are created equal), a chain of logic is produced that leads to the right and responsibility of revolution when a government becomes destructive of the people's rights.
Tuesday, October 22, 2019
Top 3 Awesome Resources for Administrative Assistants
Top 3 Awesome Resources for Administrative Assistants Being an administrative assistant can be a tough job. Itââ¬â¢s often considered an entry-level position, but itââ¬â¢s a role that requires a large number of skills to perform effectively and support your manager. So how do you gain those skills? And once youââ¬â¢re in the assistant role, what kind of support is there for the supporter?These three online resources are great places to help admin assistants expand and improve skills.1. The American Society of Administrative Professionals (ASAP)ASAP is an organization created specifically to support professionals like you. Here, you can find career development opportunities like online training courses and webinars, articles on industry trends and business skill development, and a certificate program (Professional Administrative Certificate of Excellence, or PACE) if youà want to be certified as an administrative professional. Access to these benefits is part of a free membership, and with 50,000 members nationwide, you get th e support of an entire field- youââ¬â¢re not alone!2. LinkedInLinkedIn is a great resource for job hunters- but did you know that it can be a useful tool once youââ¬â¢ve been hired, too? Groups like the Administrative Assistant Office Professional Network (149,000+ members) and Administrative Assistant Office Professionals (All Levels) (189,000+ members) offer discussion and networking opportunities for all sorts of admin assistants and professionals. You can also find specialized groups relevant to your role or industry: for example, medical assistants, executive assistants, receptionists, etc. Want to connect with other assistants in your area? You can search for groups specific to your city or region, as well.3. Lynda.comThere arenââ¬â¢t many sites out there that can teach you everything from basic software use to advanced coding- and thatââ¬â¢s what makes Lynda.com so special. This site offers online video tutorials for professionals in all industries and at all leve ls and features some great seminars for administrative assistants- whether itââ¬â¢s application training (Excel, Office, Word) or general business skills (marketing, leadership, project management).This site can also be excellent for bumping your skills to the next level, or helping you adapt to different office environments. For example, if youââ¬â¢ve always used a PC but your new office is all Mac, Lynda can give you tips on how to perform your daily tasks in iOS. Itââ¬â¢s like having an expert mentor in your pocket at all times.If youââ¬â¢d like to build skills or just find others who can relate to the realities of being an administrative assistant, these resources can be a big help.
Monday, October 21, 2019
Health Policy in Chad
Health Policy in Chad People make decisions regarding health every day so they need principal rules that will guide the decisions to produce a rational outcome. These sets of rules are called health policies. In Chad, immunization policies are needed in order to increase the turn outs so that people can prevent polio, measles, meningitis and cholera. Advertising We will write a custom essay sample on Health Policy in Chad specifically for you for only $16.05 $11/page Learn More To expand immunization rate, this policies must handle the problems of secure refrigeration of vaccines in remote areas, inefficiency of trained healthcare workers, and community resistance to vaccination among other reasons. These policies should also encourage participation by donors and the government. The effect of government exception in this process is that there would be no one to safeguard the interest of the people. Donors also provide monitory support since Chad is a country with low income leve ls. Failure to include them would mean no support. Third world countries need to do more on health and education. Report from World Bank in 1993 proved that developing countries are prone to crippling diseases than developed countries. It is estimated that 12 million children under the age of 5 die of diseases that could be prevented because of poverty every year. Investments in various countries are good sources of income to the members. Due to the fact that economic isolation has become impossible, a nation that cannot impact on the global market assures its citizen of a decline in economic growth. A healthy nation holds the promise of improved economic status. Education policies can be of great importance in peopleââ¬â¢s effort to expand immunization rate. Chad has an adult literacy rate of 34%. People should be educated on the importance of immunization and so this would create awareness across the country. While politics is playing a big role in allocation of schools in var ious places, the life of the young generation is compromised. If the program is launched to improve the results in the remote areas then the schools should as well be improved. Learning should be supervised and the curriculum given room for immunization studies so that people can consider it important and stop the kind of resistance created. Education campaigns, therefore, become very important and every individual should support it in order to meet the targeted health security.Advertising Looking for essay on health medicine? Let's see if we can help you! Get your first paper with 15% OFF Learn More Volunteer programs should be carried out. Those who are willing should be invited to conduct training to the health care staff. Additionally, the volunteers can also help in immunization and creation of awareness to the communities that live in the remote areas where low turn outs are recorded. The donors can come in and provide support to the volunteers by of fering funds to cover their transport fee to and from home so as to encourage them to keep doing the work. The World Health Organization also has a duty to ensure that all vaccines are safely stored so that they are of good quality. The National Regulatory Authority, though independent, should also work together with the United Nations to ensure the laboratories used to store the vaccines are in good state. Conclusion The hope that oil revenue will help improve the situation in Chad may not be a reality if the same culture of resisting immunization continues. Education, especially in the remote areas, should take a center stage in this war because it is the only weapon at the disposal of Chadians. The government should, therefore, improve the education system in this country.
Sunday, October 20, 2019
Essay on ReligionsEssay Writing Service
Essay on ReligionsEssay Writing Service Essay on Religions Essay on ReligionsReligion comprises an integral part of the social life. However, in spite of the diversity of religions, there are certain similarities, which make all religions looks alike. The similarity of religions is driven by objective factors, such as their common origin and evolution. On the other hand, religions remain different but the difference between religions is determined by local specificities mainly, which have determined the specific religious teaching. In this regard, it is possible to refer to the worldââ¬â¢s major religions, such as Christianity, Islam and Buddhism, which seem to be absolutely different and even hostile to each other, at first glance, but, in their essence they remain the same and similar to each other. Therefore, religions are similar because they emerge and evolve on the ground of the same principles, while differences are determined by local cultural specificities mainly.à à à à à à à à à à à In fact, proponents of the difference between religions make their judgments about religions on the ground of their superficial observations of the current development of various religious movements. In other words, they make their judgments about religions on the ground of their current experience judging by ends rather than causes and major drivers of religions. This is why proponents of the difference between religions can hardly give any plausible explanation why religions belonging to absolutely different cultures have substantial similarities. For instance, Islam and Christianity even have the same prophets, like Jesus Christ known in Islam as Isa. Moreover, even norms and beliefs are similar. In this respect, it is possible to refer to the gender discrimination, which can be traced in Christianity, Islam and Buddhism. Proponents of the difference between religions cannot give a plausible explanation to all of these issues as well as many others, which imply the common origin and similarity of reli gions.à à à à à à à à à à à However, the common origin and similarity of religions do not mean that they all originate from one time and place. Instead, the similarity of religions is the result of the common principles which contributed to the emergence of religions and their development and evolution in the course of time. To put it more precisely, all religions emerged under the impact of the natural environment of people. To understand the reason for the similarity of religions worldwide, it is important to trace the origin of the religious worldview and evolution of the major religions in the course of time.à à à à à à à à à à à In the distant past, people lived in the hostile natural environment, which phenomena they could not reasonably explain. Naturally, thunder and lightning triggered the horror of people in face of the power of nature. They could not explain it reasonably and their imagination helped them to explain those natu ral phenomena in the unnatural way. In other words, they attempted to give some supernatural explanation to natural phenomena, which they witnessed in their regular life. However, as human knowledge was extremely limited and narrowed down to the life of their own community. This is why often people interpreted natural phenomena, which became the main source of their early religious views, from their human standpoint (Flood 114). They could not explain the change of night and day, the change of seasons, birth and death and many other phenomena. This is why they attempted to explain natural phenomena by extrapolating human relations on them. For example, they attributed the change of life and day or the change of season by the change of life and death, which was particularly evident in the interpretation of the fertility of land, which people compared to the fertility of women. In such a way, they attributed features of humans or living beings to unanimated objects and phenomena. Thus , animism emerged. In this regard, explanations people gave to various phenomena were different but they were similar in their nature, in their attempt to explain the surrounding world from the human perspective. This is why, animism as the early form of religion had the common ground, the attempt of humans to explain the surrounding world by extrapolating human relations on the surrounding world.à à à à à à à à à à à Steadily, human religious views and beliefs changed and evolved. In the course of time fetishism emerged as the way of the association of inanimate or non-human objects like trees, rocks or animals with a spirit of deceased ancestors of people (Warraq 139). They worshipped those fetishes because they associated them with their ancestors. And again, even though fetishes were different but they had the common ground: people associated their fetishes with their ancestors, whom they could communicate with by means of those fetishes. Similarly modern religions have different concepts/fetishes but they serve to the common purpose of the communication between humans and God/deity.à à à à à à à à à à à Complicating human social relations and the first rise of scientific knowledge contributed to the growing complexity of religious views leading to the emergence of polytheism, when people believed in different gods, which were actually transformation of various fetishes, which were united into one religion as human society became more complex because former tribes were united in more complex unities as first states emerged.à à à à à à à à à à à Eventually, monotheism emerged, which became the ground for modern world religions. To put it more precisely, monotheism was the attempt to unite people in their belief to one god. Such a shift toward one god only contributed to the unification of people and prevented numerous internal conflicts in ancient and later medieval states. In such a way, religion, as it is now, became a powerful tool of the ideological control over large masses of people. They used different context but they were the same in principle. They had one God that normally encouraged the support of the existing social order and acceptance of oneââ¬â¢s social standing as it was (Vidal 153). As a result, religion, either Christianity, or Islam, or Buddhism promoted the idea of the existence of one God and respect to the existing social order that was and still is the major reason why religions were and some are still supported by some governments. The close integration of religion into the public consciousness made people believe in their specific religion only, but believers became incapable to identify their religion with other religions.à à à à à à à à à à à Thus, religions, in spite of their seeming difference, are all the same. They have the common origin and use similar principles. This is why either Christianity, or Islam, or Buddhism, or any other religion have, in their essence, similar principles, which help people to find balance in their life, to accept their life and themselves, to take their life for granted and enjoy it without trying to rebel or change the existing social order.
Saturday, October 19, 2019
Networking Essay Example | Topics and Well Written Essays - 2000 words
Networking - Essay Example Chief among those rules is this: Build applications that harness network effects to get better the more people use themâ⬠(Pang 2009). Unfortunately, there is still no exact definition available for this technology. In order to understand the concept of Web 2.0, one needs to be an information technology expert. The innovative web 2.0 has aid users to explore Internet in different ways. Similarly, this comes with the idea of collaboration and communication with users, people and organizations of analogous interest (Wang, Ching-Huang Wang et al. 2010). Moreover, many people discuss Web 2.0 by indicating YouTube, face book, twitter etc. These websites support features of Web2.0, as is composed of Rich Internet Application (RIA), Ajax, flash, web services, Service Oriented Architecture (SOA), iterative language and social web. The technologies associated with RIA are AJAX, Java FX, Microsoft Silverlight and Flex.The idea is to integrate desktop computing experience to the browser by integrating more than one application on the web browser. On the other hand another key component called as SOA provides a flexible platform for organizations to add services. As organizations expand businesses, SOA provides room to include innovative services and products. The primary objective of SOA is to add services as the business expands. Furthermore, Web 2.0 has introduced new social networking websites including improved interactions with employees, customers, suppliers etc. Issues Internet has blossomed vast opportunities for developers, programmers, businesses to operate a business. On the other hand, new threats keep on effecting Internet and services associated with it. Organizations are extremely cautious regarding the Internet security because Web 2.0 allows the involvement of core systems directly from the web sites. Moreover, almost everyone bank is now offering ââ¬Ëonline bankingââ¬â¢ services, which needs security with strict compliance. Most of the issues related to Internet, fallââ¬â¢s in the domain of operational problems. Web users tend to give correct personal information online to websites and a forum, which is, unsafe. Likewise, when the user access websites, chat with friends, and download software for various purposes, a hidden file known as Trojans creates a hidden remote connection, providing all the information to the hacker. For instance, if a web user conducts an online transaction via a credit card, the Trojan will extract the credit card number as the user types it from the keyboard, and sends it to the hacker. Consequently, the hacker may use credit card, resulting in financial loss. In corporate business environments, the impact is even more as compared to the home user. Hackers may breach in databases, file servers, and data warehouses, to extract classified information related to future-plans, milestones etc. and denting the organization with substantial business loss. Pornography on the web is another debatable issue, when considering children. As numerous pornographic websites are providing high quality pictures and videos, that can be accessed easily. Pornographic statistics from ââ¬Ë
Friday, October 18, 2019
Genetically Modified Foods Research Paper Example | Topics and Well Written Essays - 4750 words
Genetically Modified Foods - Research Paper Example h, environmental and genetic effects especially among long-term consumers. I. Introduction This paper highlighted some of the major effects that have been identified from the use of genetically modified foods such as roundup soybean, BT cotton among other animal feeds II. ... On this premise, these groups have been at the forefront of resisting any move by the government and regulatory bodies to legalize the use of genetically modified foods III. Methodology To provide a critical evaluation of the topic, different case studies have been highlighted to demonstrate the studied effects of genetically modified foods The Pustzai case study demonstrated how use of genetically modified potatoes increases the development of cancer cells in the body Monsanto developed soybean has been associated with a number of allergic reactions due to the nature of the proteins that results into immunoglobulin E initiated reactions The case study on the presence of gene transfer between genetically modified organisms and gut microorganisms has also been associated with the development of antibiotic resistance IV. Results From the case studies presented and the literature reviews done on this topic, the use of genetically modified foods have wide range impacts on the health of t he consumers and on the environment However, a number of positive attributes have also been identified through scientific research that makes the technology worth trying and doing more studies on V. Conclusions Genetically modified foods hold a great potential in the elimination of the current food crisis in the country However, the use of this technology must be strictly regulated and all safety issues taken care of to eliminate all the health concerns raised by different research findings The technology also presents significant implications on the environment which must be effectively handled and all GMFs evaluated to provide the link between their effects on the environment Abstract The current surge in the world population has resulted into
Hackney Homes - A Strategic Report Essay Example | Topics and Well Written Essays - 3250 words
Hackney Homes - A Strategic Report - Essay Example Many recommendations are made for improvement of the organization in this report. Table of Contents Content Page Number Introduction 4 The Company 4 Competitor Analysis 5 External Environment Analysis 8 Overall Environment 12 Conclusion and Recommendations 14 References 16 Hackney Homes-A Strategic Report 1. Introduction Hackney Homes is one of the most famous organizations in UK which manages the council homes there. In this report, a strategic analysis of Hackney Homes is done using relevant academic models. Based on the definition by Waal (2007), the success of an organization needs to be evaluated based on its targets as well as the strengths and weaknesses .The targets are examined by mission and vision statements and the strengths and weaknesses are evaluated through internal and external analysis. The various positive (opportunities) and negative (threats) external factors influencing the performance of an organization are evaluated through external analysis. This analysis is very relevant for assessing a companyââ¬â¢s present situation in order to develop new strategies or change existing strategies by making use of the opportunities and threats to the company. In this report, the services offered by Hackney Homes, its targets and strengths and weaknesses are examined through different academic models. The report has six sections. Section two discusses the targets and services offered by Hackney Homes. Section three discusses the competitive environment of the company. Section four analyses the external environment of the company .Section five examines the overall environment of the company. Section six concludes the report and makes recommendations. 2. The Company The main services offered by the company include management of council homes, rent collection as well as repair and maintenance of these homes (Hackney Homes, 2011a).Community service is the main aim of this organization. According to Collins and Porras (1996), the mission statement of a c ompany gives its important ideology and visionary components. The three major components of the mission statement are generally identified as the committed core values, core purpose and the visionary goals to be followed by the firm to fulfil its mission. The mission of the organization is to ensure the delivery of homes to people which are excellent, accessible and high quality homes (Hackney Homes, 2011b).It works as an agent which manages the Hackney Council. It was formed in 2006 as a subsidiary of Hackney Council and is formed as an Arms Length Management Organization called ALMO (Hackney Homes, 2011b). Based on the mission statement, the main objectives of the company include provision of services which are excellent and accessible, delivery of modern homes, sound management of homes and neighbourhood improvement. The main values of the organization include service, honesty, achievement, respect and pride (Hackney Homes, 2011b). In the next sections, the competitive position a nd the general and specific environment of the company are examined using relevant academic tools. 3. Competitive Analysis According to Coulter (2005), there are both specific environment, like customers, competitors, suppliers etc which influence directly the companyââ¬â¢s strategic decision and general environment like political, economic, social and technological sectors that indirectly
Thursday, October 17, 2019
Financial Management case study 1 Essay Example | Topics and Well Written Essays - 500 words
Financial Management case study 1 - Essay Example The inflation component preserves the purchasing power of money (Ross, Westerfield, & Jaffe, 2005). Based on economic reports, a 2.5% inflation rate over the next 5 years would sufficiently account for inflation. The second component of the interest rate is the credit risk. The interest rate offered to customers with poor credit worthiness is higher to compensate for the higher risk of lending to them (Weston, Besley, & Brigham, 1996). Based on the credit rate range established by the credit department, the best customer would be assigned a 1% credit rate. The last component of the interest rate is the profit component. This component is the profit from financing activities of XYZ. Since Shanghai Winters is one of the best customers, this component is not applicable to it. Notice that this interest rate is higher than the 8.0% going rate on a $70,000 five-year note receivable. The higher rate is to compensate for the credit risk of extending credit to such a customer. Also built inside the 8.0% is the profit component, which has not been charged to the best customers.
Legal and Ethical Issues in Columbus Hospital Corporation Essay
Legal and Ethical Issues in Columbus Hospital Corporation - Essay Example There are several federal laws that protect the rights of individuals who are interviewing for a job. Being federal, of course, means that they apply across all the states. The first law to be discussed is the Civil Rights act 1991 and the Age Discrimination in Employment act of 1967. Both of these are crucial to the secure the individual rights of the interviewees. The Civil Rights Act, 1991 prohibits employment discrimination on the grounds of race, color, religion, sex or nationality. The United States is a melting pot and so this law is crucial. The Age Discrimination in Employment Act, on the other hand, seeks to protect individuals who are 40 years old and above. Employers must give them an equal opportunity just like their younger colleagues. Passing the NCLEX exams is the launching pad to a successful career as a registered nurse or RN. The most important practices that lead to malpractice lawsuits are not strictly adhering to standards of care and failure to communicate (Guido, 2001). Failure to follow standards of care ranges from routine tasks like wearing antithrombotic stockings to more serious ones like using medical equipment for a purpose other than that it is intended for. Either way, if misuse or negligence harms the patient, the nurse is in legal jeopardy. Failure to communicate or poor communication is also important. This might be between a nurse and a physician, a nurse and other caregivers to whom she has delegated responsibilities e.t.c This can be difficult to trace in the case of injury and so it should be followed to the letter (Guido, 2001). Several ethical principles are key in nursing. However, non-maleficence is top of this pile. It states that nurses take a medical oath. The import of that oath is that they do everything in the best interests of the patient (Guido, 2001). Many important lessons have been acquired that shall be an influence on me as a PN.Ã
Wednesday, October 16, 2019
Financial Management case study 1 Essay Example | Topics and Well Written Essays - 500 words
Financial Management case study 1 - Essay Example The inflation component preserves the purchasing power of money (Ross, Westerfield, & Jaffe, 2005). Based on economic reports, a 2.5% inflation rate over the next 5 years would sufficiently account for inflation. The second component of the interest rate is the credit risk. The interest rate offered to customers with poor credit worthiness is higher to compensate for the higher risk of lending to them (Weston, Besley, & Brigham, 1996). Based on the credit rate range established by the credit department, the best customer would be assigned a 1% credit rate. The last component of the interest rate is the profit component. This component is the profit from financing activities of XYZ. Since Shanghai Winters is one of the best customers, this component is not applicable to it. Notice that this interest rate is higher than the 8.0% going rate on a $70,000 five-year note receivable. The higher rate is to compensate for the credit risk of extending credit to such a customer. Also built inside the 8.0% is the profit component, which has not been charged to the best customers.
Tuesday, October 15, 2019
Sweden, Barzil and vietnam Research Paper Example | Topics and Well Written Essays - 1000 words
Sweden, Barzil and vietnam - Research Paper Example Sweden has an outlook which leans mostly on the exports and it has a well modernized system of distribution, highly developed communications systems both externally and internally and a highly skilled workforce. It economy is based on iron ore, hydro-power and timber. The country has a highly intensified international trade outlook. Its economy is boosted by a higher standard of engineering which ensures that the country is a leading force in technological innovations in various fronts. These include telecommunications, pharmaceuticals and automotive industry. The economy is also helped by a well developed agricultural industry and this accounts for two percent of the gross domestic product and also the employment of the country. In this respect Sweden is ranked eighth richest country in the world. The country have taken the policies of non-aligned and neutrality for over a century has ensured that it has one of the most enviable economy of the world. This means that the country is o ne of the richest countries in the world being ranked the eight richest country in the world. This has been ensured by a continued political stability for a period of time and the country being endowed with an enviable resource base. The government has played a very important role in ensuring that the economy of the country has been growing from strength to strength (Torsten , 129). The leadership style o... However, the central aspect of conservatism is the leadership outright support of the status quo and the status quo ante. A conservative party in Sweden is the Moderate Party which is the leading party in a coalition government which was formed in the 2006 general elections of the country. Most of the country's policies especially in relation to leadership and economy tends to lean towards the conservative policies. This can be witnessed by the fact that many of the country's leadership have been following the conservative nature of leadership. The country also advocates for free market, privatization, tax incentives and personal freedom. The Moderate party supports the social benefits that had been introduced in the country in the 1930s (Richard, 129). The conservative policies of the country have contributed very much in the economy of the country. One of the policy is that there is freedom from internal control and this have helped very much in ensuring that the the investors can indulge in any form of business they feel is more profitable to them. The economy of the country has also been aided by the fact that there is freedom of speech and a fair way of governance. The country have also stuck to one currency and has defied the influence of the European Union currency. This has helped very much in stabilizing the economy (Einhorn, 36). Comparison of Brazil and Sweden Brazil is a highly liberal country unlike and has been opposed to conservatism since its establishment and it continued in this trend after attaining independence from Portugal. In economical terms Brazil and Sweden have almost similar policies. Both countries have emphasized the need for a free market. Both countries also command a heavy presence in the world market and hence they have
The Chimney Sweeper Essay Example for Free
The Chimney Sweeper Essay William Blake wrote two versions of his poem ââ¬Å"The Chimney Sweeperâ⬠, firstly in 1789 and secondly in 1794. They both describe the lives of children as chimney sweeps. Three poetic techniques carefully explored by Blake are imagery, tone and diction to bring a sense of sympathy to his audience. Though these poetic techniques are handled in both poems, they are shown through different perspectives. In both versions of the poem, images of death are depicted similarly using the color black. In the 1789 version, the speaker says that chimney sweeps are ââ¬Å"lockââ¬â¢d up in coffins of blackâ⬠and in the 1794 version, the speaker mentions that there is a ââ¬Å"little black thing among the snow. â⬠This outlines the blackness of the soot on the children, depicting the daily turmoil the children have to endure. Furthermore, illustrating the chimneys as ââ¬Ëcoffinsââ¬â¢ describes their conditions: chimneys, like coffins, are claustrophobic and terrifying. Also noted in the 1794 edition, the speaker says ââ¬Å"They clothà ©d me in the clothes of death.â⬠This conveys the image that chimney sweeps live in fear, and that their work is that of death. Their clothes are black, like mourning, which once again illustrates death in both versions. Another type of imager is that of Heaven and God. The person who takes the children out of their work daily is referred to as an ââ¬ËAngelââ¬â¢, ââ¬Å"And by came an Angel who had a bright key/And he openââ¬â¢d the coffins set them free.â⬠He is mentioned as an Angel because he is the one who literally ââ¬Ëfreesââ¬â¢ them from their work. However, the tones of the two poems contrast; with one having a positive view on life and God, the other with a negative view. In the 1789 version, the speaker does not give out a personal opinion and listens to what he is told. God is seen as someone good, giving hope to people, ââ¬Å"And the Angel told Tom, if heââ¬â¢d be a good boy/Heââ¬â¢d have God for his father never want joy.â⬠The tone of this poem is hopeful and prospective, the speaker looks forward to the future, saying that if the work is done, nothing will go wrong, ââ¬Å"So if all do their duty, they need not fear harm.â⬠On the other hand, the speaker of the 1794 poem is bitter; he blames his parents for having to work as a chimney sweeper, and looks on with detest, ââ¬Å"They think they have done me no injury.â⬠The speaker of this version is outspoken and, unlike the speaker of the 1789 version, is accusatory of God, ââ¬Å"â⬠¦God his Priest King/who make up a heaven of our misery.â⬠God, like the childââ¬â¢s parents, is being blamed for the anxiety the chimney sweeps have to suffer. Diction is also an important element in both versions of the ââ¬Å"The Chimney Sweeper.â⬠In the 19 version of the poem, William Blake uses the word ââ¬Ëwhiteââ¬â¢ to raise feelings of both purity and innocence. In line 8, the speaker says ââ¬Å"You know what that the soot cannot spoil your white hairâ⬠and in line 17, ââ¬Å"Then naked white, all their bags left behind.â⬠This also is a reminder of childlike innocence; how the children want freedom from their work. Other words mentioned in this version of the poem that invoke a similar tone are ââ¬Ëbrightââ¬â¢ and ââ¬Ëshine.ââ¬â¢ In the fourth stanza of the poem, the speaker says, ââ¬Å"Then down a green plain, leaping, laughing they run, and wash in a river and shine in the Sun.â⬠The phrase ââ¬Ëwash in a riverââ¬â¢ gives the thought of baptism, the children are being cleansed. This furthers the tone of innocence in the poem. The 1789 version is dominated by words of despair, such as ââ¬Ëwoeââ¬â¢, ââ¬Ëblackââ¬â¢ and ââ¬Ëmisery.ââ¬â¢ It begins from the first line of the poem, which says ââ¬Å"A little black thing among the snow.â⬠This exaggerates the blackness of the soot upon the child. In line 8, the speaker refers to saying ââ¬Ësweepââ¬â¢ as ââ¬Å"the notes of woeâ⬠and in line 12 calls his and other chimney sweeperââ¬â¢s lives as ââ¬Ëmisery.ââ¬â¢ This choice of diction conveys a more serious tone to this version of the poem and helps to arouse more irritation at the fact that young children were being forced to work.
Monday, October 14, 2019
The Characteristics Of Bluetooth Technology Computer Science Essay
The Characteristics Of Bluetooth Technology Computer Science Essay It is a short range communication technology to connect to devices using short-range radio frequency(RF) which is intended to replace communication that uses cabling. It is used mainly to establish wireless personal area networks (WPAN),commonly referred to as AD-HOC or peer-to-peer (P2P) networks. This technology now a days are integrated into many types of business and consumers devices such as mobile phones, PDA, laptops, headsets, vehicles, printers. This technology is globally accepted and any devices which are bluetooth enabled can communicate with other bluetooth enabled device located in proximity to one another almost everywhere in the world. Bluetooth is a low cost, low power technology which provides small wireless networks. The devices with this technology connect each other through short range,ad hoc networks known as piconets. Every time a bluetooth enabled device enter or leave radio proximity the piconets gets established automatically and dynamically. Also each device in the piconets offers a simultaneous connection up to seven other devices and that piconet can also belong to several other piconets allowing a limitless connection. This technology also has the ability to simultaneously handle data and voice transmission which provides users with a variety of uses such as printing ,synchronization with PC and laptops, accepting voice calls through hands-free headsets etc. Some of the advantages of this technology includes: Replacements for cable: this technology replaces the use of different types of cabling required to establish a connection between 2 or more different or similar devices e.g mouse, headsets, keyboard, printers etc. Wireless synchronization: It automatically synchronize with bluetooth enabled devices such as laptops via wireless connection. e.g synchronization of address book contained in laptops,cellular phones etc. Internet connectivity: any bluetooth enabled device having internet connectivity can share the internet access with other bluetooth enabled device. One acts as a modem. e.g a laptop can use a internet via a bluetooth enabled cellular phone by establishing a dialup connection through the cellular phone. Bluetooth Technology Characteristics: Bluetooth operates in the unlicensed 2.4 GHz to 2.4835 GHz Industrial, Scientific and Medical (ISM) frequency band. Many technology such as IEEE 802.11 b/g WLAN standard operate in this band. It employs frequency hoping spread spectrum (FHSS) for every transmissions, also FHSS helps to minimize the interference and transmission errors as well as provides a limited level of transmission security. This is done by the technology which detects the devices under the spectrum and avoids the frequency used by the other bluetooth enabled device. Also the communication between the devices uses 79 different radio channels by hoping frequencies at 1 MHz interval giving a high degree of interference immunity and allowing better transmission within the spectrum. This hoping provides greater performance even when other technologies are being used simultaneously with bluetooth technology. Range: the operating range depends upon the device class which include the following: Class 3 radios : supports up to 1m or 3ft. Class 2 radios : found in mobile devices-ranges from 10m or 33 ft. Class 1 radios: used in industrial sector having a vast range of 100m or 300 ft. Bluetooth low energy technology has a range of up to 200m or 600ft. Power Consumption: class 2 device uses 2.5 mW of power. The generic alternate mac/phy in version 3.0 HS enables the discovery of remote AMPs for high speed device and turns on the radio only when needed for data transfer giving a power optimization benefit as well as aiding in the security of the radios. Bluetooth low energy technology, optimizd for devices requiring maximum battery life instead of a high data transfer rate, consumes between Ãâà ½ and 1/100 the power of classic bluetooth technology. Data rate bluetooth low energy technology provides a speed of 1 Mbps of data transmission. For version 1.2 and 2.0 EDR the data rate includes 1Mbps and 3 Mbps respectivley. For version 3.0 HS up to 24 Mbps is supported. Security Aspects: bluetooth technology and associated devices are susceptible to general wireless networking threats, such as DOS attacks, eavesdropping, man-in-the-middle-attacks, message modification, and resource misappropriation. Generally the security are classified into three categories: non-secure: in this type any bluetooth device do not initiate any security measures. Service level enforced security: in this security mode two bluetooth device establish a nonsecure Asynchronous Connection-Less (ACL) link. Link level enforced security: in this mode authentication, authorization and optional enryption are initiated when a request of L2CAP(logical Link Control and Adaptation Protocol )connection-oriented or connectionless channel is made. This security mode is established before the connection is made between the devices. Vulnerabilities: Bluejacking: this is a threat which involves a sending of unsolicited messages or business card to bluetooth enabled devices. For this threat to work the sending and receiving device must be within the range of of 8-10m from each other. This is a method usually used for promotional purposes intent rather than with any malicious intention. This method can be quite annoying due to repetitive messages. Also this method does leave a door open for variety of social engineering attacks. In order to prevent this type of attack the device must be set into non-discoverable mode in unsecured areas. Bluesnarfing: this hacking method is done in bluetooth enabled cellular phones and what this attack does is it copies the entire contact book, calender or anything that is stored in the cellular phones memory. This threat can be minimised by setting the device in non-discoverable mode in an un-secured zone. How-ever many software are available in web which can steal information from blue-tooth enabled devices. the back door attack: this attack starts of after being in connection with bluetooth device; through pairing mechanism and if the owner does not observe their device after connection than they are unlikely to notice anything after the device are paired; allowing attacker to use any resources that a trusted relationship with that device grants access to. This means the attacker can not only retrieve data but also use features such as GPRS WAT, internet, modems etc. without the owner being notified. The cabir worm: it is a malicious software that uses the bluetooth technology to look for available bluetooth devices and send itself to them. This worm currently only effects mobile phone which uses symbian series 60 user interface platform. But this threat can be avoided by the user since the user itself has to manually accept the worm and install in order for this attack to be in effect. GPRS it is a non-voice value added service which allows Mobile Phones to be used for sending and receiving data over and internet protocol(IP) based network. It stands for General Packet Radio Services. It is a packet based radio service which is delivered as a network overlay for GSM, CDMA and TDMA networks which enables à ¢Ã¢â ¬Ã
âalways onà ¢Ã¢â ¬Ã connections. This eliminates the repetitive and time consuming dial up connection. It also reserves radio resources only when there is a certain data to be sent ensuring the maximum utilization of radio resources. This service enables users to use many multimedia application through mobile internet. Along with it it provides user the internet from anywhere and anytime. GPRS handles data in a series of packets which can be routed over several paths through the GSM network. The data is segmented and stored as packets before being transmitted and reassembled at the receiving end. GPRS users get the benefit of instantaneous connection setup and continuous connection to the internet after being logged-in to an APN (Access Point Name) until the user log off and the user only have to pay the data which is actually transmitted. Since this is a wireless technology so and end-to-end connection is not required because network resources and bandwidth are only used when data is actually transferred. This allows efficient use of available radio bandwidth. This reduces the cost compared to circuit switched services since communication channels gets shared and are on a as-packets-are-needed basis. GPRS data speeds ranges from 14.4 kbit/s (using one radio time-slot) to 115kbit/s (by amalgamating time slots). The average data transfer speed is at about 56 kbit/s. The improvement in the data rate allows users to take part in video conference and interact with various websites and similar application using mobile handheld devices as well as from notebook computers. GPRS is based on GSM communication and will complement existing services like SMS. It also complement blue-tooth. Advantages of GPRS: Operators offer new and improved data services to residential and business markets. Uplift the revenues from data services. Opportunity to increase the number of network users. Provides an upgrade path and baseline for UMTS End Users: high speed internet cost effective since charge is carried out only when data is transmitted and not for the duration of connection constant connectivity simultaneous use of voice and data communication Applications of GPRS include: Chat web browsing internet email file transfer file sharing Security: Security threat depend the type of traffic and data service for specific threat. The Gp interface is the logical connection between PLMNs that is used to support roaming data users. The following traffic falls under Gp : GTP : this provides a logical connection between the SGSN and GGSN of roaming partners. BGP : this provides the routing information between the operator and the GRX and/or roaming partners DNS: provides resolution for subscribers Access Point Name (APN) THREAT ON Gp includes Availability Border Gateway Bandwidth saturation : in this type of threat a malicious operator connects to the same GRX which may have the ability to generate a sufficient amount of traffic which gets directed at users border gateway such that required traffice is starved for bandwidth in or out of user PLMN. Finally denying roaming acess to and from the network. DNS flooding: in this threat the DNS server gets flooded with correct or malformed DNS queries denying subscribers to locate GGSN to use an external gateway. GTP flooding: in this threat SGSNs and GGSNs may be flooded with GTP traffic that cause them to spend their CPU cycles processing illegitimate data preventing subscribers to roam or send data out to an external network Authentication and Authorization Spoofed create PDP context Request: Spoofed update PDP context request Integrity and Confidentiality Capturing a subscribers data session WAP WAP stands for Wireless Application Protocol. It is an application environment and a set of communication protocol for witless devices which is designed to allow manufacturer, vendor and technology independent access to the internet and advanced telephony services. Basically it serves as a bridge between the mobile world and the internet as well as intranets offering the ability to deliver an unlimited range of mobile value added services to the users regardless of their network, bearer and terminal. This also enables subscriber to access the same amount of information from a pocket sized devices as they can from the desktop. The WAP specification defines a set of protocols in layers like application , session, transaction, security, and transport enabling operators and manufactures to meet the challenges in advanced wireless service differentiation and fast/flexible service creation. WAP utilizes binary transmission for greater compression of data and is optimized for long latency and low bandwidth. The light weight WAP protocol block is designed to minimize the required bandwidth and maximize the number of wireless network types that can deliver WAP content. Since WAP is based on a scalable layered architecture, each layer can develop independently of the others making it possible to introduce new bearers or to use new transport protocols without having to make any alteration in other layers. Versions of WAP WAP 1.X- WAP 1.0 was introduced way back in April 1998 which described a stack of softwares for internet access through mobile. WAP 1.1 was then introduced a year later after WAP 1.0 in 1999. WAP 1.2 which was the final update of the WAP 1.X series was introduced in June 2000 and the significant update of this was the introduction of WAP push. WAP Push: This version allows WAP content to be pushed to the mobile device with minimum user intervention since this includes a specially encoded message that includes a link to wap address. It can be used over any device which supports WDP like GPRS and SMS. This push version enables users the option to automatically access the WAP content with WAP 1.2 WAP 2.0: This version re-engineered WAP which was introduced in the year 2002 and was a simple version of HTML which is called XHTML. The XHTML helps reduce the bandwidth of internet pages helping user to use the saved bandwidth for other purpose. Benefits: Operators chance to increase the subscriber by improving services such as interface to voice mail and prepaid systems introduction of new application without the need for additional infrastructure or modification to the phone. Enabling the provision of end-to-end turnkey solution which create a lasting competitive advantage. Content Providers; enable content and application developers to grasp eh tag based WML(wireless Markup Language) allowing services to be written and executed within an operators network quickly and easily End Users easy and secured access to relevant internet information and services such as unified messaging and entertainment through their mobile devices. Can access the information from corporate databases. Significant freedom of choice when selecting mobile terminals and application they support allows users to receive and request information in controlled fast and low-cost environment . Applications of WAP: advertising the product directly through the mobile devices allowing the shoppers directly the link to order entry page. Establishment of virtual lan enabling users to play or share information within the grous. Downloading files. Infotainment feature: customer care and provisioning, message notification and call management, email, mapping and location service, weather and traffic alerts, sports and financial services, address book and directory services and corporate intranet application. Security concern over WAP WAP Gateway : this is the most important threat associated with WAP. In this threat WAP devices communicate to web servers through WAP gateway meaning WAP contains unencrypted data for a short period of time which can be highly confidential. In order to avoid this the WAP device must switch to a trusted and secured gateway instead of using the default WAP gateway. Also another solution includes upgrading all wap gateways such that they can work in pass-through mode. When WAP gateway works in this mode it just let pass all the encrypted traffic from mobile phone to server without being decrypted and the gateway would be just a relay for the data stream. Weak encryption algorithms: the encryption protocol encrypts data during the handshake phase which has a possibility to choose the 40bit DES encryption method. In this method, a 5 byte key is used containing 5 parity bits leaving only 35 effective key bits in the DES key. This DES key can be easily hacked through brute force potential for virus attacks: wap contains a scripting language(WMLScript) which makes easier for viruses to affect mobile phone. GSM It stands for Global System for Mobile Communication which is a globally accepted standard for digital cellular communication and most globally used mobile phone system . It is an open digital cellular technology which is used to transmit mobile voice and data services. This design was the first digital design to follow the analog period to enhance the security from analog counterparts in mobile communication. This technology supports voice calls and data transfer rate up-to 9.6kbit/s, along with the transmission of SMS. This operates in the 900MHz and 1.8 GHz bands in Europe and 1.9 GHz and 850MHz bands in the US , Australia, Canada and many south American countries. The users can access the same service when traveling abroad through GSM international roaming capability which is done after harmonizing spectrum across most part of the earth. This gives users to connect seamlessly and same number connectivity in more than 218 countries even if they have different network service provi der. Application of GSM includes: accessing the internet with GPRS being enabled.. Used in E-commerce for services like mobile banking, e-ticketing etc. Advantage of Gsm include: the consumer benefits from the ability to roam and switch carriers without replacing phones and SIM and also to network operators. High voice clarity due to the efficient use of radio frequencies which allows the system to tolerate intercell disturbances. The encryption of speech allows user information to be secured. Also pioneered low cost implementation of the short message service known as text messaging. Introduction of worldwide emergency telephone number feature. Introduction of value added feature such as GPRS EDGE. Threat includes the following: there are mainly two motivation for attackers of mobile phone systems which are: Theft Of service: cloning: In this type of attack, the attacker steals the identifying information from a legitimate phone and loads it to another phone allowing attacker to masquerade as the legitimate phone. What this does is it causes charges to be assessed against the account holder of the legitimate phone. Call Decryption: this threat is based on the encryption method of the GSM network. The attacker had found to decrypt a call with greater speed within 30 seconds with just a laptop and specific radio device back in 2007 and 2008. data Interception: in this type of attack the attacker can easily listen to the transmission of the phone using relatively unsophisticated tools in a effort to eavesdrop on the voice and data transmission occurring. To solve this problem encryption of the data in the air should be maintained.
Sunday, October 13, 2019
The Importance of the Title of Stone Angel :: Stone Angel Essays
The Importance of the Title of Stone Angel Margaret Laurence's The Stone Angel is the story of Hagar Shipley's life, told entirely by Hagar through her memories and thoughts. Though she remembers her past with vivid detail, she has trouble with the happenings of the present. Hagar at ninety is a proud and strong woman suffering from the unjustness of old age. Once proud and independent, she now needs to be taken care of by her son Marvin, who she never loved. As the book begins, the readerÕs first glimpse is of that of the stone angel. "She was not the only angel in the Manawaka cemetery, but she was the first, the largest, and certainly the costliest." A unsuitable memorial of her mother for she was thought of as a "feeble ghost." It seems rather to represent Mr. Currie and Hager, both strong and full of pride. It was there for his needs, to "proclaim his dynasty." As the story progresses, the reader becomes more aware as why the book is titled The Stone Angel. Through important events in her life: the death of Dan, her marriage, her two sons, and Mr. TroyÕs singing; Hagar shows her inability to show tenderness and love and how her stone heart melts always and she is finally able to speak the words which both she and Marvin need to hear. The Stone Angel serves as a double meaning: The large marble stone angel in the cemetery and Hagar. Like the stone angel, Hagar displays no emotion. Even when her brother Dan is dying, her proud strengths leads her to be unable to comfort Dan. "But all I could think of was the meek woman IÕd never seen, the woman Dan was said to resemble so much and from whom he inherited a frailty I could not help but detest, however part of me wanted to sympathize. To play at being her Ð it was beyond me." When her favorite son John dies, she sheds not one tear; although she loves him very much. Her inability to communicate her emotions to others leads her to appear as a cold and grumpy woman. Her pride and strength causes her to do what she needs to do, but also she is blinded like the stone angel because she is unable to do what others need from her.
Saturday, October 12, 2019
Does The Government Control Our Rights? :: essays research papers fc
How many rights do you have? You should check, because it might not be as many as you think. Some people are not concerned that the police can execute a search warrant without knocking, set up roadblocks, and interrogate innocent citizens. Nor are they concerned when a drug dealer receives a life sentence for selling a quarter gram of cocaine for $20 (Bailey). When you combine current events with the widespread need of people to fit into society, we should all be concerned. The Bill of Rights, when written, established and protected our personal freedoms from government interference. For centuries, governments have tried to regulate information thought to be inappropriate or offensive. Todayââ¬â¢s technology has given the government an excuse to interfere with free speech. By claiming that radio frequencies are a limited resource, the government tells broadcasters what to say and what not to say. The FCC (Federal Communications Commission) carefully monitors news, public, and local programming for what they consider obscenity (Hyland). As in speech, technology has provided another excuse for government intrusion in the press. The Secret Service can confiscate computers, printers, hard disks, and mail from electronic services they do not consider a press. Entire stores of books and videotapes are seized because of sexually explicit material. The Bill of Rights and the First Amendment exists to protect speech and press that is unpopular. ââ¬Å"Everyone has the right to freedom of opinion and expression (Steele).â⬠If unpopular ideas did not exist, we would not need the First Amendment. The right to bear arms is so commonly challenged that it has its own name: gun control. Banning weapons not for ââ¬Å"legitimateâ⬠sporting purposes is a misuse of the right to bear arms amendment. ââ¬Å"If the need for defense arises, it will not be herds of deer that threaten our security, but humans (Steele).â⬠It is an unfortunate fact that the guns we need for defense are guns that attack people not animals. The right to be secure in your home goes hand in hand with the right to bear arms. A law that went into effect in 1991 allows the tax assessor to enter your home and list your personal property for tax purposes. Being required to tell the state everything you own and submitting to an invasion by the taxman is not being secure in your home. Maybe that is why the government controls guns.
Friday, October 11, 2019
Halo and Devil Affect
Halo and Devil Effect Paper We live day to day knowing we live in a superficial society, from the way we look and dress and up to the way we present ourselves; we are always being judged in some form or fashion. Whether this is how you are treated by your social circle or in your employment seeking experience, its pretty sad that physical appearance can have and effect on so many things including the hiring process.In this essay I will be discussing two key concepts that are directly related to workplace discrimination based off of a persons physical appearance and characteristics. In the process of this I will view the film ââ¬Å"The Devil Wears Pradaâ⬠and discuss two scenes that illustrate my findings. The halo effect is the overall tendency to judge someone and favor him or her based on the bias of his or her positive characteristics or physical appearance without knowing the overall full package.The opposite affect of this concept is called the devil effect which is the te ndency to judge someone who could potentially have all of the qualifications for a position but wont be hired based off of his or her negative characteristics or physical appearance. While reading the article ââ¬Å"Why looks are the last bastion of discriminationâ⬠this article definitely highlights on the halo and devil effect and discussed how weight came into play when determined if the interviewee should be hired or not.The job title was a school bus driver and it was determined without any concrete evidence that she could not evacuate a school bus in the event of an emergency situation, I find this completely bias on the companies behalf. Personally being a passenger on a school bus for many years during grade school, many of the school bus drivers where obese and not in the best of shape but, when any emergency situation arose mainly on and emergency school bus drills, they where able to perform the task of evacuating the bus in a safe and timely manner.This article also highlights other aspects of a study and how looks can play a major role in how people perceive a good looking or attractive person being viewed as intelligent, good and likable. Documented in this study obese individuals were rated to have a disadvantage in work, school and more. Among other findings in years of research, people who where unattractive where less likely to be hired and promoted and had lower salaries, even in fields where looks were not even of relevance. Another aspect of physical ttractiveness bias in hiring comes from the article ââ¬Å"beauty is beastlyâ⬠. There has been evidence suggesting that jobs traditionally filled my men, the opposite of the traditional bias happens to female applicants, attractive females are evaluated less favorably than unattractive females. This suggests that a more rugged female possibly comes across as being manlier or tomboyish making her easy to relate to traditional male positions such as a construction worker, firefighter, mechanic etc.I chose to watch the film ââ¬Å"The devil wears pradaâ⬠there was an obvious halo affect that was present; the job title was a personal assistant at Runway which is a very popular fashion magazine. When the applicant went into the office for her interview she was basically judged based on her since of fashion on weather she had the abilities to do that particular job even though she was college educated and had the qualifications to perform this job.I think the only reason why she was called back in and hired was because she asserted herself after the interview stating that she was not skinny, glamorous ect, but she was smart and a fast learner which are the important things. We know when going to an interview that we should dress in casual or business attire but you shouldnââ¬â¢t have to be dressed like a supermodel in order to get any job unless you are actually the model.The devil effect was depicted in this film when Andrea was out with a new found friend o ne night and he learned that she was working as Miranda Priestleyââ¬â¢s assistant, he comment that she would never survive Miranda because she seems nice and smart and that she couldnââ¬â¢t do that job. I think many people think thatââ¬â¢s just because someone comes off as being nice or relaxed cant handle aggressive or mean people but this definitely isnââ¬â¢t always true but with her being smart and educated can sometimes deem you over qualified for positions and not work in your favor but in this situation it was not the case.My personal connection to the halo effect was while in the military, being in the military you learn from basic training that looking sharp in your uniform can show how much pride you have in the service. There are also many awards that you can obtain depending on how sharp your uniform looks, how well you perform your job duties and on up to having outstanding military bearing. In order to win awards you have to compete with a number of your pee rs and who ever has the most recognition win.I had been nominated for several awards while in the military and most of the time I won because they always told me I was always sharp with my uniform pressed and creased and always respectful. The halo and devil effect is constantly seen in our society, this will be an on going issue that will probably never change because we live with a judgmental state of mind that constantly makes snap judgments on individuals, so the next time you are in a situation remember try not to judge someone based on there positive or negative characteristics try getting to know them first.
Thursday, October 10, 2019
Law Social Engineering
LAW AS A TOOL FOR SOCIAL ENGINEERING IN INDIA KARANDEEP MAKKAR1 Roscoe Pound introduced the doctrine of ââ¬Å"Social Engineeringâ⬠which aims at building an efficient structure of society which would result in the satisfaction of maximum of wants with the minimum of friction and waste. It involved the rebalancing of competing interests. This article analyses the role of legislations, constitutional provisions and court judgements in the process of social engineering in India.Introduction India, known around the world as a ââ¬Å"cradle of civilizationsâ⬠has always been a queer mixture of various faiths, religions, a place where the cultures of the world meet, constituting an environment of composite culture. It was for this reason that Pandit Jawaharlal Nehru called India the ââ¬Å"the museum of world religionsâ⬠. Indeed, the very paradigmatic setting of India has been pluralist all along. Even today the land mass called India, spread over 3. 8 million sq km of area inhabited by a thousand million plus population, with every imaginable kind of a weather pattern from minus 40 degree Celsius in greater Himalayan region to 50 degree Celsius temperature in the deserts of Rajasthan and temperate weather of coastal regions, 20 official languages written in 16 different scripts, around 2000 dialects, 16 well demarcated agro-climatic zones2 and almost all religions of the world well and adequately represented, presents a mind boggling variety and plurality.And all this has a bearing on Indiaââ¬â¢s liberal, secular, republican, politico-legal system. Under these conditions, it becomes very necessary to have a mechanism for balancing the interests of the individuals, society and the state. India, after independence, adopted the ideal of a socialistic pattern of society and has formulated programmes of social welfare in various spheres. The aim is to establish a social order which would eradicate exploitation, secure equal opportunities for all citize ns, ensure that they share just obligations and enjoy social security.The means adopted in achieving these ideals these ideals are peaceful and democratic. The goal is sought to be achieved mainly through the enactment of suitable laws. It is generally recognised that legislation does create healthy conditions for such changes. It is in these circumstances that law comes into play to act as an agency balancing conflicting interests and becomes a tool for social engineering. This article analyses the 1 2 Student, 3rd Year, B. A. LL. B (Hons. ), Hidayatullah National Law University, Raipur. Data teken from http://en. ikipedia. org/wiki/India accessed on 31-03-2010 role of legislations, constitutional provisions and court judgements in the process of social engineering in India. The Concept of Social Engineering Roscoe Pound was one of the greatest leaders of sociological school of jurisprudence. He introduced the doctrine of ââ¬Å"Social Engineeringâ⬠which aims at building an e fficient structure of society which would result in the satisfaction of maximum of wants with the minimum of friction and waste. It involved the rebalancing of competing interests.Roscoe Pound defined the legal order by reference to the end of law: ââ¬Å"It [the legal order] may well be thought of as a task or as a great series of tasks of social en-gineering; as an elimination of friction and precluding of waste, so far as possible, in the sa-tisfaction of infinite human desires out of a relatively finite store of the material goods of ex-istence. ââ¬Å"3 Interestsâ⬠, ââ¬Å"desiresâ⬠, ââ¬Å"claimsâ⬠, ââ¬Å"wantsâ⬠ââ¬â for the most part the words are used interchangeably in Pound's writings, although ââ¬Å"interestsâ⬠sometimes serves as the inclusive term. He writes, ââ¬Å"For the purpose of understanding the law of today I am content with a picture of satisfying as much of the whole body of human wants as we may with the least sacrifice. I am c ontent to think of law as a social institution to satisfy social wantsââ¬âthe claims and demands involved in the existence of civilized societyââ¬âby giving effect to as much as we may with the least sacrifice, so far as such wants may be satisfied or such claims given effect by an ordering of human conduct through politically organized society.For present purposes I am content to see in legal history the record of a continually wider recognizing and satisfying of human wants or claims or desires through social control; a more embracing and more effective securing of social interests; a continually more complete and effective elimination of waste and precluding of friction in human enjoyment of the goods of existenceââ¬â in short, a continually more efficacious social engineering. â⬠5 Like the engineer, the jurist constructs, creates ââ¬â but not out of thin air.Like the engineer, he must work with resistive materials, without which, however, he could not build at all; and always there are adverse conditions imposed upon his activity. Friction and waste, represented by a sacrifice of interests which might be secured, must be overcome. The task is one for human activity: though requiring methodical care, there is nevertheless nothing static about it. Technique and materials may be improved. Jurist 3 4 5 Pound, Roscoe, ââ¬Å"Interpretations of Legal Historyâ⬠, Harvard University Press, 1946, At P. 160. Pound, Roscoe, ââ¬Å"The Spirit of the Common Lawâ⬠, Transaction Publishers, 1999, At P. 96. Pound, Roscoe, ââ¬Å"An Introduction To The Philosophy Of Lawâ⬠, Transaction Publishers, 1999, at p. 20. must work on, must create an ever greater, ever more serviceable structure. The engineering analogy stands out as both graphic and timely. 6 According to Roscoe Pound, law is an instrument of social engineering. The task of jurists is to find out those factors which would help in the development of culture conducive to the maximisa tion of satisfaction of wants. These factors are principles as Jural Postulates. 7 Technique of Social Engineering:Pound advocated the technique of Social Engineering for the purpose of balancing the conflicting interest of the society, in order to achieve maximum satisfaction of maximum want of the individuals. He advocated that the study of law should be supplemented by social aspects so that it may become more attractive and useful. Spencer and Bentham also in a way directly and indirectly applied law to men in society. Judicial Application: Pound suggested that judicial application of law should take into account the following factors: (a) The factual study of social effects of the administration of law. b) Social investigations as preliminaries to legislation. (c) The means by which the law can be made more effective should be devised. (d) A study of legal and philosophical aspect of judicial method. (e) Sociological study of Legal History. (f) The achievement of the purpose of law. (g) Possibilities of jurisprudence of interests and reasonable solution of the individual case. SOCIAL LEGISLATION AS TOOL FOR SOCIAL ENGINEERING When unequal distribution of wealth exists in a society or when social justice is denied to certain sections of the people, laws are enacted to bring about equilibrium.These laws may be designated under ââ¬Å"social legislationâ⬠. Social legislation tries to remove inequalities and to benefit the whole community rather than a few individuals. It adjusts 6 7 Douglas, Some Functional Aspects of Bankruptcy (1932) 41 YALE L. J. 329, 331. Dr. Laxmikanth, ââ¬Å"Law and social transformationâ⬠, at pg. 6 supplements and sometime replaces the existing legal system. In other words, in addition to ameliorating the social conditions of people, it bridges the gulf that exists between the existing law at the requirements of the society at a given time. Social legislation, in this sense has a special significance. It is different from o rdinary types of legislation in as much as it reflects, the legislative policy of establishing social justice on humanistic and egalitarian principles. The primary functions of social legislations are summed up by Hogan and Inni in following words: (1) To provide for the orderly regulation of social relationship. (2) To provide for the welfare and security of all individuals in the social unit. 9 Social legislation, therefore, aims at establishing social equality in society.The needs of society are adjusted and those who are responsible for creating imbalances or inequalities in society are prevented from doing so. It is however, necessary that all social legislation must be accompanied by ââ¬Å"social preparednessâ⬠ââ¬â by effective propaganda to educate the people about its objects and to convince them of the ultimate utility of a particular legislative measure aimed at promoting the common good and fostering the common welfare. It is only then that the law can give dir ection, form and continuity to social change. The effectiveness of social legislation also depends on attitude of judiciary.Under the traditional approach, the judges usually paid greater heed to the letter of the law and the mischief that was to be removed by the law. Social conditions and economic trend were not supposed to influence him in arriving at a certain decision. But this attitude appears to have changed in recent times. The judge appears to be conscious of the felt necessities of the time. He feels that his duty is not only to point out mistakes of legislature or remove unjustifiable hardships caused by law but also to assist in the social and economic progress of our times. 10 LEGISLATIONS ENACTED FOR THE PURPOSE OF SOCIAL ENGINEERING 9 10 Balbir Sahay Sinha, Law and social change in India, , 1983, Deep and Deep Publications, pg. 25 Hogan and Inni, ââ¬Å"American Social Legislationsâ⬠, Harper and Brothers, New York, at p. 4. Supra Note 7. The introduction of certa in major changes in the Hindu family law is a very important instance of social reconstruction in India in recent times. This has been brought about by such Acts, as The Hindu Marriage Act, 1955, the Hindu Minority and Guardianship Act, 1956, and the Hindu Adoption and Maintenance Act, 1956. The provisions of these Acts are calculated to generate effective means of social control.For instance,Section 12 of the Act prohibits polygamy which was very prevalent in the society before the enactment of the Act. This can be viewed as a measure to balance the interests of the husband and wife as also a means for social control. The socio-economic revolution that has resulted from new land legislations is best seen in rural India. The land reform measures, adopted by the State Governments in the wake of Constitutional amendments, are meant to mitigate the hardships of tenants, strengthen and safeguard their tenancy rights and confer a new status on them.This type of legislation can be rightly regarded as one neutralising the socio-economic disharmony in the rural population. The pitiable conditions and large-scale poverty of the rural population produced a sense of frustration in our peasantry endangering the entire society. The grievances of the agriculturists are being gradually removed by the land reform projects which would ultimately bring about a degree of social satisfaction and create a spirit of co-operation in the masses. 11 The new labour laws are aimed at battering the conditions of the workers in trade and industry.These laws have had an impact on social structure to a large extent. The individual workerââ¬â¢s interest has been given great importance. The freedom of contract between the employer and the employee has been regulated in the interest of the worker and attempt has been made to assure to every worker condition of work ensuring a decent standard of life. A number of important enactments as, for example, The Industrial Disputes Act, 1947, The Mi nimum Wages Act, 1948, The Plantation Labour Act, 1951, The Maternity Benefit Act, 1961 have been designed to curb, if not eradicate, the urge to exploit workers.Thus, they promote the welfare of workers and balance interests of employees and employers hence resulting in social engineering. CONSTITUTIONAL PROVISIONS PROMOTING SOCIAL HARMONY The glaring inequality of different types more particularly based on sex and caste prevailed in Indian society until the pre-independence days, despite continuous efforts by the state, reformers and missionaries to control and eradicate them. The immediate 11 Supra note 7, at pg. 27 task for the Indian people and constitution makers was to establish an egalitarian society.Therefore, in the preamble of the constitution it was declared that ââ¬Å"we, THE PEOPLE OF INDIA, having solemnly resolved to constitute India into a SOVEREIGN SOCIALIST SECULAR DEMOCRATIC REPUBLIC and to secure to all its citizens: JUSTICE, social, economic and political; LIB ERTY of thought, expression, belief, faith and worship; EQUALITY of status and of opportunity; and to promote among them all FRATERNITY assuring the dignity of the individual and the unity and integrity of the nation. 2 The constitutional provisions relating to secularism aim at bringing about integration and harmony in the society. Article 15 of the Constitution forbids a classification on the ground only of religion, race, caste, sex, place of birth or any of them, subject to specified exceptions and Article 16 makes a like provision in connection with public employment with the addition of ââ¬Å"descentâ⬠and ââ¬Å"residenceâ⬠as forbidden grounds of classification. The Constitution gives the right to all persons to profess freely, practise and propagate religion subject to public rder, morality and to other provisions of the Constitution on Fundamental Rights. Thus, in India no religion is given a preferential status or accorded any special privilege and the Constitu tional provisions aim that no person should suffer any disability because of his religion. In order to achieve social progress and political advancement, the practice of untouchability has been outlawed by Article 17 of the Constitution and by the Untouchability Offences Act, 1955 enacted in pursuance of Article 17. These are clear indications to end social equality.The provisions referred to are aimed at effectively balancing the various conflicting interests in the society and form the basis of what Roscoe Pound termed as ââ¬Å"social engineeringâ⬠. A STUDY OF CASE LAWS While Sociological jurists emphasize on the balancing of the conflicting interests of the individual, society and the public through the process which Roscoe Pound terms as the process of ââ¬Ësocial engineeringââ¬â¢, the same has also been witnessed though the action of the Supreme Court when, in Vellore Citizenââ¬â¢s Welfare Forum v.The Union of India13 which is known as the Tanneriesââ¬â¢ case t he Supreme Court observed as ââ¬Å"The Constitutional and statutory provisions protect a personââ¬â¢s right to fresh air, clean water and pollution-free environment, but the source of the right is the inalienable common 12 Bal Gobind, Kashyap, Reformative law and social justice in Indian society, 1995, Regency Publications, New Delhi, at p. 8 13 AIR 1999 SC 2715 law right of clean environmentâ⬠. The Court further observed, ââ¬Å"Our legal system having been founded on the British Common Law, the right of a person to pollution-free environment is part of the basic jurisprudence of the landâ⬠.Thus the Court gave priority of public interest over individual interest. In B. Venkatramma v. State of Madras14, the passing of a communal order by the Government allotting certain vacant posts in government services in fixed proportions to Muslims, Christians, Harijans, Backward Hindus, Hindus, Non-Brahmin Hindus, and Brahmins was taken to be a violation of Article 16(1) of the c onstitution by the Supreme Court. CONCLUSION Rapid change in Indian social life is the result of many factors.The influence of public opinion, the lessons of history, and the examples of progress achieved in other countries, the impact of ideas from the West- all have played a part. The legislative activity in India after independence has been directed, by and large, towards the creation of a new social order. The gap between pressure of changed patterns and the slowly evolving new norms of social life was sought to be plugged by many important laws. To make social engineering through the use of law, the importance of other factors like economic development needs to be realised.Law cannot, by itself play a vital role unless it is accompanied with economic development. Public opinion also plays an important role. There should be awareness amongst the various sections of the society before legislation is enacted for its successful enforcement. The purpose of social legislation like ot her types of legislations is not fulfilled if its enforcement is lax. If laws are evaded by people, this undermines the purpose of legislation, breeds corruption and puts the administrative machinery under heavy strain. This may ultimately lead to disintegration of the society.Hence, rather than passing a number of legislations in this area without making adequate provisions for their enforcement, it is better to have fewer social laws containing clear-cut provisions for effective enforcement. The conflicts in modern Indian society are largely due to the fact that social life has not been properly adjusted to the forces of present age. In order to harmonize our relations in the society, it is absolutely essential that changes in law should be preconditioned by the existing public opinion in the society.In other words, the changes in 14 AIR 1964 SC 572 law should be only in those directions and to that extent which the people in general aspire in the society. Mere super-imposition an d direct adoption of foreign models in their entirely original form can create disruption and disorder in the society. We should retain our own social values and include foreign ideals in such a manner that the latter are fully assimilated and become a part of our social system.
Subscribe to:
Comments (Atom)