Saturday, August 31, 2019

Environmental Policy Essay

Last month in the New York Times, Kate Galbraith noted that the campaigns of both Barack Obama and John McCain presented widely differing views on climate change and energy policy, particularly with regards to cap and trade schemes, market-based policy instruments intended to maneuver industrial sectors into reducing their greenhouse emissions. Cap and trade schemes have recently been gaining much currency within the discussions of environmental policy as a means to address the negative impacts which industry has upon the greenhouse problem. Such systems work by creating a financial incentive for emission reduction through the imposition of costs on emissions. By establishing a ‘cap’ which limits the total amount of emissions that can be made by a designated group of polluters and leaving them free to trade permits to pollute with one another, it encourages these polluters to meet or fall below the cap in a flexible market-based fashion, rather than forcing them to comply with stringent regulations that could needlessly compromise their business operations. Companies able to cut their emissions can further profit from selling their permits to those companies facing difficulty in reducing their own emissions. The incentive is that all the companies would choose to bring their emissions to cap levels and try to do so in the most cost-effective fashion. It encourages them to innovate the means to reduce emissions. Other governments have already taken action to introduce cap-and-trade schemes of their own: Australia has the New South Wales Greenhouse Gas Abatement Scheme; the Climate Change Response (Emissions Trading) Amendment Bill was recently enacted in New Zealand; and the European Parliament has its own system known as the European Union Emissions Trading Scheme. At present, no system similar to these exists in federal law, and representatives for both candidates – Dan Esty for Barack Obama, Douglas Holtz-Eakin for John McCain – maintained that this should be remedied as soon as possible. Where they disagree is how such a system should be structured. According to Esty, Obama favors distribution of emissions permits through auction, as this would force polluting businesses to pay competitively during initial distribution. Speaking for McCain, Holtz-Eakin advocates pre-determined distribution, limiting transactions to the permit trading market itself. The design of a cap and trade system is not a trivial matter. A poor design can wreck the efficacy of a cap and trade system as a policy instrument. If permits are distributed too generously, as Holtz-Eakin proposes, what could result is a situation in which industries have little incentive to expunge their business operations of greenhouse emissions, as they would effectively be operating in a trading market where permits are near worthless. Also, cap and trade systems cannot stand alone as an emission-reducing policy instrument, as there is a potential for traders to ‘game’ the market by deliberately holding out on purchasing permits until the last minute so as to reduce their value, making unreduced emissions affordable to even the worst emitter. Furthermore, cap and trade systems lack transparency and present opportunities for fraud. Worse still is that a poorly designed cap and trade system will not account for the geography of polluters, resulting in a NIMBY effect where pollution becomes localized to create ‘emissions ghettos. ’ As such, it should be recommended that any cap and trade system be designed to account for environmental justice, be subject to transparency, and should distribute permits at a market price, perhaps even stabilize such a price at a level high enough to incentivize the development of techniques and technologies to reduce emissions. Furthermore, a cap and trade system must be complemented by other policy instruments such as pollution zoning and carbon taxes. Works Cited Galbraith, Kate. â€Å"Candidates’ Advisers Spar Over Cap-and-Trade. † New York Times. 23 September 2008. Retrieved online November 9, 2008 from: http://greeninc. blogs. nytimes. com/2008/09/23/candidates-advisers-spar-over-cap-and-trade/? scp=3&sq=cap%20trade&st=cse Parker, David. â€Å"Historic climate change legislation passes. † New Zealand Government. 10 September 2008. Retrieved online November 9, 2008 from: http://www. beehive. govt. nz/release/historic+climate+change+legislation+passes Greenhouse Gas Reduction Scheme 2008, Introduction to the greenhouse gas reduction scheme, Greenhouse Gas Reduction Scheme. Retrieved online November 9, 2008 from: http://greenhousegas. nsw. gov. au/documents/Intro-GGAS. pdf Pearce, Fred. â€Å"European trading in carbon-emission permits begins. ’† New Scientist. 6 January 2005. Retrieved online November 9, 2008 from: http://environment. newscientist. com/channel/earth/dn6846-european-trading-in-carbonemission-permits-begins. html

Friday, August 30, 2019

Social Media: Positive or Negative?

Social Media: Positive or Negative? By: Michele Dean Facebook, Twitter, Pinterest and You Tube have become the fashionable way of communicating with the masses. It seems that you are not somebody until everybody knows about you. Actors, athletes and reality television stars use social media to connect with fans. As society becomes more interested in gossip, social media will become more popular. But, is this a positive step forward or could this fascination have negative consequences? A couple of years ago a Bulgarian diplomat was fired from his job for playing FarmVille on Facebook during budget meetings.Dimitar Kerin had been warned about playing the game while at work but he failed to pay heed to his superiors. When he was let go from his position, Dimitar stated that he wasn’t the only member of the committee to play the game. Dimitar pointed out that he was only level 40 whereas other committee members were level 46. (Bosker, 2010) In 2009 an employee of the Philadelphia Eagles Football Team was fired because of a post he placed on his Facebook page. The employee, Dan Leone, was upset that the team traded a player he liked. Dan decided to take to his Facebook page and let his friends know how he felt.He used a curse word and called his employers retarded. A short time later, Dan decided that his post was not professional and he deleted it. But, it was too late. Someone from the office had seen the post. Dan was fired a few days later. He had worked for the company for six years and never had any issues. He apologized profusely but the words fell on deaf ears. (ESPN News Services, 2009) Aside from employers tracking your use of social networking while on the clock, they are starting to use these sites to assist in the selection of new employees.In January of 2012 the job search website Career Builder hired Harris Interactive to find out how many companies searched social networking sites for information on prospective employees. The study found that 37% of the companies polled currently looked at the social media pages of applicants while another 11% stated that they would be starting that practice soon. The companies polled stated that they looked mainly for references to substance abuse, posts of inappropriate pictures, bad grammar and negative comments about former employers.One third of the companies polled admitted that they had passed on hiring someone based on what information they’d found. (Richard, 2012) So, what does this mean for those of us seeking employment in a future where nearly fifty percent of the employers we give our resumes to will be scouring Facebook, Twitter and You Tube for dirt on us? It means that privacy is of the utmost importance. Make sure that the information you share is only available to your friends. Be sure to update your privacy settings on a regular basis.Let your friends know what is acceptable to post about you and what isn’t. Remember, they can snap a picture of you and po st it on their own accounts. Basically, you should look at anything and everything that you do or say on any social network and assume that you are shouting it to the entire world. Eventually, someone important will see that information. So be careful. The Internet is not as anonymous as it used to be. References Bosker, B. (2010, May 30). Politician Dimitar Kerin Fired For Playing Farmville On The Job.Retrieved November 24, 2012, from The Huffington Post: http://www. huffingtonpost. com/2010/03/30/dimitar-kerin-fired-over-_n_518635. html ESPN News Services. (2009, March 9). Facebook post gets worker firec. Retrieved November 24, 2012, from ESPN. com: http://sports. espn. go. com/nfl/news/story? id=3965039 Richard, J. (2012, April 20). 37 Percent Of Employers Use Facebook To Pre-Screen Applicants, New Study Says. Retrieved November 24, 2012, from The Huffington Post: http://www. huffingtonpost. com/2012/04/20/employers-use-facebook-to-pre-screen-applicants_n_1441289. html

Business communications

I will be explaining the legal and ethical Issues that relate to the use of business information. I personally think that legal and ethical issues are usually to do with something that involves people having to abide to a law, in most cases there will be a consequence for not abiding with the law. Most businesses have different information about people working for them, that's when the Data Protection Act 1998 protects the Information held about people being misused.The information usually n the companys database must be: obtained fairly and lawfully, only to be used for the purposes stated during collection, adequate relevant and not excessive in relation to the intended use, accurate and up to date, not kept for longer than necessary, proceed in line with your rights and also protected from transfer to an area outside the European Economic Area unless adequate protection exists for that data in the area. There is also Freedom of Information Act 2000 (that came to effect in 2005) th is Includes Right of access to information held by public authorities.This Is when a person request Information to public authority, the authority has to be informed in writing by the public authority whether it holds information of the description specified in the request, and if that is the case, to have that information communicated back to them The Computer Misuse Act 1990 it is a law that does not allow certain activities when using computers, this include: hacking into other people's systems, misusing software or helping a person to gain access to protected files on someone's else's computer.There are also ethical Issues that are dealt with using organisational pollcles and codes of practise such as: use of email, internet and whistle blowing. These go under business ethics meaning moral principles concerning acceptable and unacceptable behaviour by business. Whistle blowing is also one of the ethical issues users can use and relate to. This is when an employee raises a concer n about a business practise either to management within the company or to an outside organisation like the press.Operational Issues In relation to the use of business Information, Including security of Information, backups, health and safety, business continuance plans and costs. Organisations have to store and manage countless pieces of information with some being far more important than others. To make sure that information is managed appropriately, a number of policies and procedures have to be put in place, concerning; security of information, backups, health and safety, organisational pollcles and business continuance plans and cost. ailable as and when they need it, in order to make good business decisions. Information security management deals with maintaining the integrity and availability of organisational information and knowledge. Backups is also one of the operation issues as most businesses have developed programs constantly to try to minimise the risk of losing vital i nformation stored on IT servers. This involves producing backups of information stored on the servers. Some companies back up constantly and some less frequently.Health and safety is also one of operational system and so are business continuance plans and costs. Business continuance plans are the steps that a company puts into place to make sure it is capable of surviving a worst-case scenario. M2 Legal issues are the laws raised by different companies so that users or customers will be aware of them. Ethical issues involve right and wrong or what is considered good, and what is considered evil in a society. Legal and ethical issues for businesses are usually different from business to business.

Thursday, August 29, 2019

The Life of Prophet Mohammad Essay Example | Topics and Well Written Essays - 1250 words

The Life of Prophet Mohammad - Essay Example The hermit asked them where they were from and they replied Mecca, he then told them that God would send a prophet from their people. When they inquired the name of the prophet, the hermit told them he would be called Muhammad and would lead them to new life (Kalby et al 1992). In the meantime, while saddened by the death of her husband, Aminah, felt healthy and stronger during her pregnancy. At his moment, she had dreams of many things. On one instance, it was as if a great light was coming from her and on another occasions heard a voice which told her that she would deliver a baby boy and would name her Muhammad. She did not tell any one about the voice. On the 12th day of Rabi al-Awwal, the year 570 A.D, a baby boy was born of Aminah. It's believed that when a chosen prophet is born, God (Allah) gives signs. Such signs were seen that day, for instance, a scholar from Yathrib saw a new star that had never been seen before in his studies of the stars and heavenly bodies. He called people to witness the star and told them a prophet must have been born (Kalby et al 1992). Aminah sent news to her father in law Abd al-Muttalib, who was so much delighted and immediately started thinking of naming the grandson. No ordinary name was to be given. After six days, he dreamt of Muhammad as the name just as Aminah herself had done and so he was named Muhammad meaning the 'Praised One' (Teece 2004). His Childhood Just like many families at that time, Aminah sent her son to the desert in his early ages so that they could grow and develop into a healthy boy as the desert was healthier. Muhammad was taken by a Halimah, a Bedouin woman. She was not very rich and in fact that year the harvest were even worse and she could not even breast feed her own baby. Nonetheless she and her husband opted to take Muhammad since he was the only child left as no one wanted to take him since the wet nurse had to be paid by the baby's father yet Muhammad had lost his dad (Teece 2004). Halimah never wanted to pick him either but she did not want to go back without a baby. When they reached home, Halimah noticed that a lot of things changed, the land was greener and lots of foods were harvested and she had plenty of milk from her sheep. She knew this was fortune from the new child. By the time Muhammad tuned two years, she had grown fond of him and Muhammad played with her children and would even go to take care of the sheep in the grazing fields. She had to return him and when she reached there she pleaded with Aminah to keep him a little longer which she accepted (Teece 2004). Muhammad (pbuh) Often sat alone and it's believed that at some instance two angels had washed his heart. This was to make his heart pure. Muhammad would be greater than all men ever born (a seal of prophets). On his return, Muhammad (pbuh) was a very healthy boy, Aminah decided to take him to visit his uncles in Yathrib. He had a great time with his cousins. Unfortunately, on their way home, his mother felt ill and died. He was later taken up by his grandfather. They lived together happily until when the grandfather also felt ill and asked Abu Talib, His son to take up Muhammad (pbuh) upon his death. Muhammad was easily assimilated into the family of Abu Talib though he (Abu Talib) had many

Wednesday, August 28, 2019

Volunteering with Hancock Christian Clearing House (HCCH) Essay

Volunteering with Hancock Christian Clearing House (HCCH) - Essay Example HCCH is a cooperative effort involving 42 Churches in Hancock County with a mission to help those who, under ordinary circumstances, may not qualify for the assistance from regular charitable and other social organizations. HCCH is mostly run by the volunteers like me who interact with the clients in order to determine their needs and assist them in finding proper solution for their needs. HCCH also provides training to its volunteers who need it. The main sources of funding for HCCH come in the shape of donations and contributions made by the members of the Churches and other individuals. According to one estimate, approximately $13000 is disbursed monthly to those in need. These funds are disbursed in terms of fulfilling the needs of needy for their housing rentals, medical aid, food support, transportation as well as fulfilling other needs. HCCH is a small organization but its efforts and endeavors are much bigger in their scope and impact on those who are rejected or refused help . My volunteer work with HCCH was based on different assignments which were given to me, or which I believed I could do to the best of my abilities and with highest efficiency. I participated in preparing a dinner at HCCH as a part of its efforts to provide food to its clients. I almost participated in every activity. First of all, I started with arranging the tables for dinner so that food when ready can be readily served to the people coming for dinner. After that I helped prepared the cakes which were going to be served besides helping other volunteers to label the cakes made by me and others. After the dinner was finished, I helped other volunteers to clean the tables as well as throwing the garbage also. Further, I helped the senile people, who came to dinner, to carry their dinner dishes so that a positive and healthy attitude can be developed in them. I also helped other staff members by

Tuesday, August 27, 2019

Metals in my life Essay Example | Topics and Well Written Essays - 2500 words

Metals in my life - Essay Example Gold and Copper are considered to be the first metals discovered. However currently there are eighty six known metals. The dependency of mankind on metals is averred by the fact that the human civilization was based on seven metals which were known to be the Metals of Antiquity. These seven metals included Gold, Copper, Silver, Lead, Tin, Iron and Mercury. While referring the early development of civilizations, it has been found in the history that these metals were known and used by the Mesopotamians, Egyptians, Greeks and the Romans. In the post modern era of advanced sciences, the role of metals is quite inevitable in the day to day activities of human beings. Its usefulness are widely ranged involving its applications in Transportation, Aerospace, Computers and other electronic devices that require conductors, Communications including satellites that depend on a tough but light metal shell, Food processing and preservation, Construction, Biomedical applications, Electrical power production and distribution, Farming and household conveniences. The objective of this essay is to analyze the role of metals in my life. The role of some of the metals play in my day to day life is being reviewed along with the factual on those metals. The dependency of my routine activities on the application of these metals is wide and vivid. In the following paragraphs some of the metals are being dealt in detail beginning with the scientific information on those metals and then on the utility of those metals in my life. Thus essay takes care of the science of metals with reference to my life along with the emotional and application level attachment of mine with those metals and their products. The beauty and ambience of this metal is very much reflected in its chemical symbol itself. Chemical symbol of Gold is ‘Au’ which has been derived from the Latin aurum meaning shining dawn. The name also refers much to the color of

Monday, August 26, 2019

How Hooliganism Is Seen in the Contemporary World Coursework

How Hooliganism Is Seen in the Contemporary World - Coursework Example It is evidently clear from the discussion that to give a reason for some of the key attributes of hooliganism, a division between impulsive, relatively secluded confrontations of spectator violence and the conduct of socially organized fan groups which participate in aggressive violent behavior should be drawn. This division is historically apparent through a change from a pattern in which assaults on football match officials and opponent players preponderated over assaults on opponent fans, to a practice in which fights against fans and the police became the dominant form of watcher muddled state. Pearson defines hooliganism as a violent, raucous and disparaging behavior. Hooliganism has closely been associated with sports activities due to violence among the spectators. There are numerous theories on the history and origin of hooliganism. In reference to the Oxford dictionary, hooliganism originated in the late years of the 19th century from the surname of an illusory unruly Irish family, Hooligan, in a musical-hall song of the 1890’s. Hooliganism has been used since the late 19th century. It described a street bunch of criminals in London in the 1890’s, just about the same time Manchester street mob were achieving disrepute. Exact first usage of the term hooliganism and how it came to be used in the present meaning is not well known. The Daily News reported a case at Southwark Police Court in London where it indicated that Clarke, 19 years old, arraigned for the attack on police was the ringleader of â€Å"Hooligan Boys†, a gang of youth. This gang had graced with their presence a music hall and caused disturbances which led to the police being called. Later the next month, two young men were brought before a court in London for unruly behavior.

Sunday, August 25, 2019

Privatisation in UK Essay Example | Topics and Well Written Essays - 1500 words

Privatisation in UK - Essay Example Privatisation in the UK has been part of a broader strategy to increase the role of markets in former state industries, to change the means of public control (by substituting arms-length regulation for more direct political control) and to modify incentives to economic efficiency. This process has taken more than fifteen years so far, and will take longer still to come to come to full fruition. The Government's approach to Company Law Reform has been dominated by a desire to please sections of the business lobby. This has undermined attempts to deliver corporate responsibility. In November 2005, Gordon Brown announced his intention to scrap the Operating and Financial Review (OFR), which would have obliged companies to report on their social and environmental performance. It is thus inevitable to take into consideration the underlying system of national (corporate) laws that regulates this field or that suffers from proper implementation, reform or application. The law is directly related to the performance of management in the process of directing and controlling the company as a means of maximizing the residuals and the value of the company for its shareholders, including all the interested parties under the stakeholder concept: workers; management; buyers; suppliers; creditors; local government; and so forth. The key to this obviously lies in the way the company is cond ucted, as well as the capacity of its managers to keep a continuity of success, regardless of the economic circumstances and the problems of the company itself. Stronger government oversight is necessary. Accounting reports have to give a clear picture on the company's operation as well as of its financial structure. Application of company law may give rise to conflicts of interest between a company and the government law. The Trade Justice Movement and the Corporate Responsibility (CORE) coalition are calling on the Government to ensure new laws, which apply to UK firms hold company directors to account for the impact of their activities on communities, workers and the environment in Britain and overseas. 'Disclosure', 'transparency' and 'shareholder value' make up the framework of shareholding governance nowadays and are amongst the most common words in company law while treating with privatisation symptoms and while seeking ways to combat its ills. These institutions look "ideally" towards improved corporate governance standards (which is selfish), in particular on facilitating developing markets to re-establish competition (again persona l gain), gain investors' confidence (for company profit) and promote national economical growth (where they seldom allow intervention, which poses the problem of applying proper company law). Trying to seek easier and cheaper alternatives to counter competition companies are going haywire with their social responsibility that seldom adhere to UK company law even if it exists or find ways to seek loopholes (since they remain unaccountable). Like companies, producing palm oil in the UK is actually obtaining by driving rapid rainforest destruction in South East Asia. Over 500 UK companies have been trading in palm oil, most for more than a decade now without any UK company law to curb them. Yet despite high profile public campaigns about its impacts, virtually none of these companies can prove

Saturday, August 24, 2019

Reseach Paper proposal Essay Example | Topics and Well Written Essays - 250 words

Reseach Paper proposal - Essay Example Machine helps machine to figure and work machine unfathomably speedier, lessening the handling speed, value and time. This development innovation changes all human lives. I have quite a while encounter in Plastic infusion Mold making and Machining part industry. For me as experience engineer, CNC is an enchantment. It made unthinkable dreams to true plausibility. CNC it helps me to transform and cut the metal speedier, precise and lively than some time recently. Useful of expounding on this theme is helping me to get progress data about CNC innovation. Whats more the gigantic sources from Cal State University Library are opening an alternate eye and world for me to get more learning and data about the business that I included as my first occupation. Clearly, this Human made engineering has some Advantage and Disadvantages. Points of interest of this machine are, for example, quick correspondence, less demanding arranging framework, sparing vitality and time, information stockpiling information regardless of size and numerous different things. Impediments of the Computer are, for example, unemployment, information security and wellbeing. In General profit or harm of this creation is upon to their client is utilizing it. It can spare some person time, expense and life, or it may case someone misfortune or harm. Anyway dependably workstation engineering improved human life and lead people to a propelled level of

Friday, August 23, 2019

Basic electric circuits and measurements Lab Report

Basic electric circuits and measurements - Lab Report Example From this, a powerful equation used in the experiment is derived as follows: Measurement for voltage and current for the resistor were obtained and recorded and a graph of V against I plotted to determine the value of R from the slope. In order to prove the validity of ohm’s equation, the experiment involved comparison of the experimentally and directly measured values for the resistor R. The following equation was used: The experiment have illustrated succinctly that the relationship between the flow of current and the flow of charge in a material results to the resistance. In which case, the flow of electric current is responsible for the generation of heat owing to the collision of free electrons. This insinuates and supports the ohm’s law, which relates between the current and voltage. For the resistors, a graph plotted for V against I gave a straight line from the origin thereby supporting the law, which states â€Å"the amount of voltage flowing from one point to another end in a conductor is directly proportional to the current between the two points, while keeping the temperature constant†. Further, the difference between the value of R from slope of graph and that from direct ohmmeter reading was insignificant thereby proving the success of the experiment. The electric resistance in material arises from the generation of heat as the result of collision of free electrons, when electric current flow (I). In which case, the heat generated opposes the flow of electrons (charges) ( V) through the material hence the resistance. For the resistors, a graph plotted for V against I gave a straight line from the origin thereby supporting the law which states that â€Å"the amount of voltage flowing from one point to another end in a conductor is directly proportional to the current between the two pointsl, while keeping the temperature constant The situation of non-linearity can be solved through restricting the amount of current at the

Thursday, August 22, 2019

DETERMINING IF A BURGLARY SUSPECT WAS GUILTY Essay

DETERMINING IF A BURGLARY SUSPECT WAS GUILTY - Essay Example Burglary can be committed in any building, tent or vessel used as a â€Å"human dwelling†. The words â€Å"human dwelling† must be noted as it connotes a wider meaning than the term â€Å"dwelling house†. (Tudor Jackson, The Law of Crimes, 3rd Edition). Once it is established that there has been a â€Å"breaking and entering†, it must still be proved that there was intent to commit a felony therein. Usually a felony has been committed on the premises e.g. theft, otherwise the intent to commit a felony must be established. This is the mens rea in the offence. The intent must exist at the time of breaking and entering. Therefore to determine that the suspect of burglary is guilty, the courts must establish the guilty mind or intention (mens rea) of the accused which shall be followed by the actual act committed i.e. breaking and entering into the house. To constitute burglary, it is not necessarily that the suspect must after breaking into or entering the house has to steal something. Having the intention of stealing even if he/she did not find what she intended to steal and left without taking anything is itself an offence of burglary committed. In Benton v. Maryland, 395 U.S 784 (1969), the petitioner was tried in a Maryland state Court for burglary and larceny. He was acquitted of larceny but convicted of burglary and sentenced to 10 years in prison. On retrial the petitioner was found guilty of both offences and concurrently sentenced to 15 years for burglary and 5 years for larceny. The appellate court ruled against petitioner on the double jeopardy issue.

Writ of Habeas Corpus Essay Example for Free

Writ of Habeas Corpus Essay Habeas Corpus demands a court to a jailer to produce the prisoner and announce the charges (Levin-Waldman, 2012). Habeas Corpus is an ancient common law that applies to all Americans and anybody in the United States at the time of their arrest. It is a legal procedure that requires a person to be brought in front after the have been arrested/ taken into custody. This is done so that the government to show cause to why the liberty of that person is being taken away and to let the person know what they are being charged with. Habeas Corpus is fundamental to American and all other English common law derivative systems of jurisprudence. It is the ultimate lawful and peaceable remedy for adjudicating the providence of liberty’s restraint (http://www.slate.com). History of Habeas Corpus The history of Habeas Corpus is an ancient law that has been used since the middle ages. It appears to be predominately of Anglo-Saxon common law origin but the exact origins are not really known. Even though the origin of Habeas Corpus is unknown it has been used in Europe for centuries. Its principle that has been used since the middle ages by various writs (http://www.slate.com). Habeas Corpus has evolved and changed a bit over the years, but it has basically remained the same. Habeas Corpus states that a person who has been arrested or in custody be brought before a court. Habeas Corpus has been used in the United States since the beginning of the American Revolutionary War. The Writ of Habeas Corpus was established by the British and was generally regarded as part of the fundamental protections guaranteed by law to each citizen (http://www.slate.com). Article I, Section 9 of the US Constitution guarantees the availability of the writ of habeas corpus (http://search.proquest.com). Habeas corpus serves as a tool or legal defense by people that are detained by the government. Habeas Corpus has also been used by detained suspected terrorist/ enemy combatants to challenge the government as to the legality of their detention. Since the beginning of the War on Terror hundreds of suspected terrorist/ enemy combatants have been held at the Guantanamo Bay, Cuba detention facility. Some of the detainees that are held there today have been in detention since January 2002. This has created many debates because many people feel that they are being held illegally in direct violation of the US Constitution and International Law. Suspension of Habeas Corpus Article I, Section 9 of the US Constitution, states that, â€Å"the privilege of the writ of habeas corpus shall not be suspended, unless when in cases of rebellion or invasion the public safety may require it (http://www.slate.com). This means that every American is entitled to Habeas Corpus and that the only way that the government can suspend Habeas Corpus is during a rebellion or a direct threat to public safety. This is one of the ways that the Bush Administration justified detaining hundreds of suspected terrorist for years in detention facilities like Guantanamo Bay, Cuba. Their justification was that the suspected terrorist posed a threat to the safety and security of the American people and the United States Government. They also used President Abraham Lincoln’s decision to suspend Habeas Corpus in April 27, 1861 as an example of how and way it was important to detain suspected terrorist. On April 27, 1861, President Lincoln suspended the habeas corpus privilege on points along the Philadelphia-Washington route (http://www.slate.com). This was done after 20,000 Confederate sympathizers in Baltimore tried to stop Union troops from traveling from one train station to another en route to Washington, causing a riot (http://www.slate.com). President Lincoln viewed the Confederate sympathizers as a threat to public safety, and their actions could also be considered a rebellion against the United States Government. After President Lincoln ordered the suspended the habeas corpus, his Generals detained anybody whom they believed posed a threat to Union troops or public safety. Habeas Corpus and the War on Terror After the September 11, 2001 attacks in the United States and the beginning of the War on terror the Bush Administration enacted one of the most controversial policies of their administration. This new policy enacted created many heated debates within the United States three branches of the U.S. Government, because it authorized the US Military to detain suspected terrorist/ enemy combatants for an undetermined amount of time. After the beginning of the War on Terror the Bush Administration order to use military commissions to try enemy combatants, which includes a provision denying habeas corpus rights to those subject to the order in federal court (http://search.proquest.com). These new polices also suspend the use of habeas corpus and it was justified by stating that these suspected terrorist were detained outside of the United States and they were being held at a location outside of the jurisdiction of the US Government. In later provision of these polices stated that the foreign nationals who have been held at Guantanamo Bay for six years without meaningful due process protections cannot be deprived of habeas corpus rights by either the president or Congress (http://search.proquest.com). Boumediene v. Bush Several law suits have been filed against the United States by detainees or families of the detainees in regards to the illegal detention of foreign nationals that are suspected to be terrorist or enemy combatants. In the case of Boumediene v. Bush the Supreme Court of the United States ruled on behalf of Lakhdar Boumediene, a naturalized citizen of Bosnia and Herzegovina. Boumediene was a detainee that was being held at military detention in Guantanamo Bay, Cuba by the United States. In this case the United States argued that Guantanamo Bay was not part of the United States, and under the 1903 lease between the United States and Cuba. Cuba had ultimate sovereignty over the territory even though it was being lease to the United States. But under the same lease agreement the United States had complete jurisdiction and control over the Naval Base (http://search.proquest.com). The Boumediene v. Bush case was head alone the case of Al Odah v. United States. Both of these cases challenged the legality of detainee detention at the military base in Guantanamo Bay, Cuba and it also challenged the constitutionality of the Military Commissions Act (MCA) of 2006. The United States Military Commissions Act of 2006 was drafted after the Supreme Courts decision on Hamdan v. Rumsfeld. Military Commissions Act authorizes trial by military commission for violations of the law of war. The MCA was signed by President George W. Bush on October 17, 2006 (http://search.proquest.com). On June 12, 2008, Supreme Court Justice Kennedy delivered stated that court ruled on 5-4 majority, stating that the prisoners being held at the Guantanamo Bay detention camps had a right to the habeas corpus under the United States Constitution. They also stated that the Military Commissions Act of 2006 was an unconstitutional suspension of that right (http://search.proquest.com). This decision was based on the fact that the United States had complete jurisdiction and control, over the territory (Guantanamo Bay Naval Base). Even though Cuba retained ultimate sovereignty over the territory, the United States still had control and jurisdiction over the Naval Base. This means that the people detained as enemy combatants at the Guantanamo Bay Naval Base were entitled to the writ of habeas corpus protected in Article I, Section 9 of the U.S. Constitution (http://search.proquest.com). Many people believe that enemy combatant should not have the same rights as an American Citizen. This can especially be said about suspected terrorist and anybody that threatens that safety and security of the United States. The Bush Administration justified the detention of hundreds of detainees at the Guantanamo Bay Naval Base, by stating that they were arrested outside of the United States and that is being held outside of United States territory. President Bush as the as commander-in-chief did use the US Constitution to justify his actions, Article I, Section 9 of the US Constitution, states that, â€Å"the privilege of the writ of habeas corpus shall not be suspended, unless when in cases of rebellion or invasion the public safety may require it (http://www.slate.com). This means that the commander-in-chief can suspend the writ of habeas corpus in the interest of public safety. I believe that this is a very valid justification as long as a reasonable person believes that there is still a threat to the public safety. Article 1, Section 9, Clause 2 of the US Constitution, gives Congress power to suspend the writ of habeas corpus. Article 1, Section 9, Clause 2 further states that only the Federal Government and not the States, has the authority to suspend the writ of habeas corpus. It does not specifically state who has the authority to suspend the writ. The role of the Supreme Court in protecting civil liberties, including the judicial philosophy is very important. The Supreme Court ensures that our constitutional rights are not violated and it also serves as part of the checks and balances that our government has. The Supreme Court has played a very important role in the war on terror and the court decisions have changed the way enemy combatants are detained and prosecuted in US Courts. The Supreme Court ruled that even if an enemy combatant is detained overseas and held outside of the United States, the detainee still have constitutional rights and the writ of habeas corpus does apply to them. After reading and analyzing the writ of habeas corpus, the Bush Administration’s detention justification and the US Supreme Court rulings, I feel that the President and the United States Government should be given a little more flexibility in regards to the writ of habeas corpus. I can understand why the Bush Administration detained these suspected terrorist/ enemy combatants and how they can justify that these people are dangerous and that they do pose a threat to the American people. But I also feel that keeping them detained indefinitely without due process is wrong. I do think that the military should handle suspected terrorist/ enemy combatants that are arrested/ detained outside of the United States. References Staab, J. B. (2008). The war on terrors impact on habeas corpus: The constitutionality of the military commissions act of 2006. Journal of the Institute of Justice and International Studies. Retrieved September 23, 2012, from http://search.proquest.com/docview/213962970?accountid=32521 Redish, M. H., McNamara, C. (2010). Habeas corpus, due process and the suspension clause: A study in the foundations of american constitutionalism. Virginia Law Review. Retrieved September 22, 2012, from http://search.proquest.com/docview/759595988?accountid=32521 Levin-Waldman, O. M. (2012). American government. San Diego, CA: Bridgepoint Education, Inc. Greenberg, D. (2001). Lincolns Crackdown Suspects jailed. No charges filed. Sound familiar? Slate. Retrieved September 22, 2012, from http://www.slate.com/articles/news_and_politics/history_lesson/2001/11/lincolns_crackdown.html Azmy, B. (2009). Boumediene v. bush and the new common law of habeas. Rochester, Rochester: Retrieved September 22, 2012, from http://search.proquest.com/docview/189874026?accountid=32521

Wednesday, August 21, 2019

Friend Recommendation System Software Design

Friend Recommendation System Software Design CHAPTER 4 SOFTWARE DESIGN DESCRIPTION 4.1Â  INTRODUCTION The Software Design Document provides transcript which will be used to aid in the software development phase of this project by providing the details for how the software should be built. Within the Software Design Document are narrative and graphical documentation of the software design for the project including use case models, sequence diagrams, object behaviour models, and other supporting requirement information. The requirements in SRS will be fully addressed in this software design document or alternative solution should be given. 4.2Â  DESIGN OVERVIEW The purpose of this software design document is to provide insight into the structure and design of each component in the Friend recommendation system. Topics covered include the following: Class hierarchies and interactions Data flow and design (DFD) User interface design Test cases and expected results In short, this document is meant to equip the reader with a solid understanding of the inner workings of the Friend recommendation system. The modules, as can be perceived from figure [ ], are as follows: Collect_Data_From_Sensors Data Collection Data preprocessing Activity Recognition Friend-matching graph construction Friend query and Feedback control These modules will be described in detail in the next section on System Design. 4.3Â  SYSTEM DESIGN This section provides a modular structure of the proposed system and explains each subsystem along with the relationships between the subsystems and the interfaces between the modules. Figure 4.1: The Architecture Diagram 4.4Â  DESIGN CONSTRAINTS: The server should be multithreaded. The Android application at the client side should have a retry mechanism to connect to server. Software System Attributes Usability : The software will be embedded in a website. It should be scalable designed to be easily adopted by a system. Reliability : The system should have accurate results and fast response to user’s changing habits. Security : The system uses GPS location information to find friends within some distance. In order to provide privacy, a region surrounding the accurate location will be uploaded to the system. 4.5Â  MODULE STRUCTURE The below is the structure of modules: Username/password User’s Credentials User Data User Data Query for Processed data Friends Send FeedbackFriend ListFriend List Figure 4.2 : The Module design 4.4.1 DESCRIPTION OF MODULES This section describes each of the above modules in brief. Module: LoginOrRegister This module contains login or registration in order to register the user with Friendbook application. If the user has already registered, then he/she can directly login and start using the application. If he/she is not registered then he/she has to register with friendbook application. Module: Authenticate Users This module compares the entered Username and Password with the respective records among the database entries. If a match is found, then redirects the user to his/her profile page. Else, an appropriate message is thrown and the user is redirected to the registration page. For registration, compares the Username entered with the ones in the database to check its availability. If unavailable, then asks for a different Username, else create a new record in the database and save the entered details. Redirects the user to his/her profile page on registration with appropriate message, if the Username is not already present. If the Username entered during registration is not unique, then an appropriate message is thrown. Name and Usernames should start with an alphabet and Password should contain at least one alphabet and one numeric character and one special character. Module: Collect_Data_From_Sensors Smartphone (e.g., iPhone or Android-based smartphones) are equipped with a rich set of embedded sensors, such as GPS, accelerometer, microphone, gyroscope, and camera. On the client side, each smartphone records data of its user from the sensors such as accelerometer, and GPS information. This collected data is further sent to the server for further processing. Module: Data Collection and Pre-processing This module collects the data sent from the client side. The raw data collected will be in format {time ,latitude ,longitude ,accx ,accy ,accz }. The collected raw data is further pre processed to remove outliers. Median filtering technique is used for outlier detection and removal. An unsupervised learning technique is applied on the preprocessed data to form clusters known as Kmeans clustering algorithm. The resulting clusters forms a list of activities carried out by a user, where each cluster representing an activity. Module: Activity Recognition Now that the k clusters are formed, each represents an activity, lifestyles are further extracted from these activities using LDA algorithm. A library called LAML is used*. It provides a convenient API to get topic structures for an array of input strings.The extracted lifestyles are used to find the similarities between the users. Once the similarity is calculated, the user who has highest similarity is suggested as a friend. Module: User Query and Feedback Control This module performs two tasks, it accepts and responds to user queries (eg, query for friend list) and collects feedback from users in order to improve the accuracy of the friend recommendation system. 4.6Â  INTERFACE DESCRIPTION: The following is the list of external interfaces: SOCIAL NETWORK PORTAL: A portal where the users can do registration by entering their details and also provide a feedback on the recommendations to improve the accuracy of the system. It is implemented using JSP and HTML. MOBILE INTERFACE: It continually sends the daily activities to the server via network using TCP connection. The daily activities are characterized by walking, sitting and GPS location. RECOMMENDATION SYSTEM : This is the interface in which the friend recommender algorithm works in the background. This interface will be used by the users. Customer cannot do many operations, but their feedbacks or ratings are very important to create a relevant recommendation. End users can only provide feedback and view recommendations. HARDWARE INTERFACES : The recommendation system can work on any smartphone device. These devices should have some limit requirements to make the application run effectively. The processor speed and internet speed are expected to be high. SOFTWARE INTERFACES: This system can work on any platform. Internet connection is a must to reach the system. Moreover, most of the application will be coded by Java. Java APIs of database management tools such as Netbeans, which is a standalone workbench application to interact with database management tools. 4.6.1 Use Case Diagrams And Key Features A use case diagram is a kind of behavioral design, which is constructed from an analysis. It presents a graphical synopsis of the capabilities provided by a system in terms of actors, aims and dependencies between use cases. Friend book user can perform following activities: Install the application in their mobiles Login/Register with the application View the list of most similar friends Upload feedback for improving accuracy of the system. The Use Case diagram in Figure 4.3, shows the different functionalities a friendbook user can perform. Figure 4.3 : Friendbook User Use Case The System can perform following activities: Collect raw data from users Pre-process the data Perform Activity Recognition and extract the lifestyles using LDA Find the list of friends based on similarity between users Handle Feedback Figure 4.4 : The Server Part Use Case 4.8Â  Class Diagram Top Level Client-Side Class Diagram: The client side class diagram, mainly consists of UI(user interface) required for a user to register with the application by providing user’s information, after which user will be able to login and start the service. Once the application starts, it continually records the values from sensors in the format: The above values are to the server at regular intervals (say 3secs). In order to send the values to server a TCP connection is setup. Once the connection is setup, the device will start sending the data. The users can also provide a feedback on the recommendation results given to them. Top Level Server-Side Class Diagram: The server-side class diagram, consists of classes that are executed in a sequential manner. Firstly, ActivityClustering class collects the data sent from the android device, and pre-processes it using median filtering technique. After the data is filtered, the processed data is then partitioned into k clusters using k-means algorithm. Next, a class known as ConvertToActivitySeq is invoked, which maps the activities to cluster they are close to and produces a list containing sequence of activities i.e,. the life document. This document is further given as an input to LifeStylemodelling class, which computes p(word/document) i.e, it calculates probability of word given the document matrix. This matrix is then decomposed to produce two matrices, called p(word/lifestyle) and p(lifestyle/document). Finally, p(lifestyle/document) matrix is used to calculate the similarities of the lifestyles between users. 4.8Â  DATA FLOW DIAGRAM The data flow diagrams are pictorial representation of data flowing in the system. DFD’s are used for the purpose of viewing the data processing in the system. In a data flow diagram, the data elements flow from external or an internal data source, through an internal process. Level 0 Data Flow Diagram A level 0 DFD or a context level design represents the intercommunication between the system and external sources, which act as data sinks. In Level 0 DFD, the interaction between the system and external entity are designed in terms of data flows across the system boundaries. This level diagram shows the complete system as a single procedure. In the DFD diagram shown in Fig*, the lifestyle information are the sensor values sent from the client i.e., android phone to the server. The data sent from client are processed to produce a list of potential friends. Figure 4.* : Level 0 DFD of Lifestyle based friend recommender Level 1 Data Flow Diagram The level 1 DFD, exhibits how the system is split into sub components, where each component represents one or more data flows to or from an external source. And when combined, it provides the complete functionality of the system as a whole. It represents the inter components data flows in a specific sequence and also the data flow between the components of the system. The proposed application consists of the components as shown in the figure 5.*. It first performs data collection, raw data pre-processing by noise removal, Activity recognition where each cluster represents an activity and finally calculates similaties between users to suggest a friend. Figure 5.* : Level 1 DFD of Lifestyle based friend recommender 4.9Â  OBJECTS AND ACTIONS (SEQUENCE DIAGRAM) The sequence diagrams shows below. Sequence for Setup Connection: This sequence is to set up FOR TCP connection between user and the server. Also monitors GPS and Accelerometer by collecting the data from them. Sequence for Monitor Result to the server: The raw data, that is sent from the client is collected by server. And the collected raw data is pre-processed for outlier removal. Sequence for Finding Friends: When the user queries for the friend list, the server accepts the request from the client and responds by sending the potential list of friends. Sequence for Data Collection: The data collection module collects life documents from users’ smartphones. The life document is collection of users activities. The life styles of users are extracted by the life style analysis module with the probabilistic topic model(by using a library for LDA ). Then the life style indexing module puts the life styles of users into the database in the format of (life- style, user) instead of (user, life-style). As the packet arrives , these packet will be store in files. Sequence for Preprocessing: The user sends data, and preprocesses to make the data consistent, by remove irrelevant data.The preprocessed data is converted into archive and upload to the database. Sequence for Database Connection: Data base connection is established when a friend request query is posed. A TCP connection will be established between user and server. Server will process this request and respond with the extracted information from the database i.e, the list of potential friends. 4.10Â  PSEUDO CODE MOBILE END: SERVER SIDE PSEUDO CODE:

Tuesday, August 20, 2019

Reasons Behind The Growth Of Eurocurrency Markets Finance Essay

Reasons Behind The Growth Of Eurocurrency Markets Finance Essay The Eurocurrency market Ñ onsists of banks, which Ñ alled Euro banks that aÑ Ãƒâ€˜Ã‚ ept deÑâ‚ ¬osits and make loans in foreign currencies. Eurocurrency is a deÑâ‚ ¬osit held in the bank outside the Ñ ountry in whose currency the deÑâ‚ ¬osit is dominated. The deÑâ‚ ¬osit can be Ñâ‚ ¬laced in a foreign bank or in the foreign branch of a domestiÑ  US bank. For à Ã‚ µxample, dollars deÑâ‚ ¬osited in a bank in Switzerland arà Ã‚ µ Eurodollars, yen deÑâ‚ ¬osited at a US bank are Euro yen, etc. The Eurocurrency market is dominated by US dollar or the Eurodollar. The deposit need to be held at a European bank or in Europe. Eurocurrency is used for lending and borrowing. The Eurocurrency market often provides a cheap and convenient form of liquidity for the financing of international trade and investment. The main borrowers and lenders are the commercial banks, large companies, and the central banks. By raising funds in Eurocurrencies it is possible to secure more favorable terms and rates of interest, and sometimes to avoid domestic regulations and taxation. The deposits and loans were initially on a short-term basis but increasing use is being made of medium-term loans, particularly through the raising of Eurobonds. This has to some extent replaced the syndicated loan market, in which banks lent money as a group in order to share the risk. The Eurocurrency market is dominated by US dollar or the Eurodollar. Occasionally, during the 1970s and 1980s, which were a weak dollar period, the Euro Swiss Franc and the Euro Deutsche Mark markets increased in importance. The Eurodollar market originated post Second World War in France and England thanks to the fear of Soviet Bloc countries that dollar deposits held in the US may be attached by US citizens with claims against communist governments. A Eurocurrency is a freely convertible currency deposited in a bank located in a country which is not the native country of the currency. Restrictions on convertibility take many forms limiting the amount that can be exchanged, the currencies into which exchange is possible, the uses for which foreign exchange can be obtained, or the range of holders who are allowed foreign exchange. The Eurocurrency market has grown rapidly mainly due to the existence of various US regulations that have raised costs and lowered returns on domestic banking transactions. In other words, the Eurocurrency market has become popular because of the absence of restrictions from the government which have led to attractive deposit rates for savers and attractive loan rates for borrowers. This means that banks can offer higher interest rates on Eurocurrency deposits than on deposits made in the home currency. Similarly, banks can also charge lower interest rates to Eurocurrency borrowers than to those who borrow the home currency. The spread between the Eurocurrency deposit and lending rates is less than the spread between the domestic deposit and lending rates giving Eurocurrency banks a competitive edge over domestic banks. The Eurocurrency market began to develop in the 1950s, when the Eastern Bloc countries were afraid the United States might seize their holdings of dollars. It means that instead of depositing their dollars in the United States, they deposited them in Europe. Additional dollar deposits came from Western European central banks and companies that exported to the United States. The other long-running disadvantage was a Regulation Q. This prohibited the payment of interest on demand deposits, as well as authorising the Federal Reserve to set a maximum interest rate payable on savings and time deposits in US banks. The level of interest rates in the money supply was raised through slowing down the growth of the money supply. However, while money market interest rates rose, the interest rates payable on time deposits, were held down by the ceiling. Investors moved their time deposits from the banking system, causing the banks to experience a shortage of funds. The banks then looked to the E urodollar market for funds, and in 1966, when money was tight, borrowing from European Branches of US banks by their head offices rose by $2.5 billion. Nevertheless, banks began to regard the market as a substitute source of dollars even when Regulation Q was not effective as in 1967. Funds raised through this method were then used to continue lending to customers in the US. Regulation Q stimulated the growth of the Eurodollar market in two ways: firstly, it reinforced the market`s ability to offer higher interest rates on deposits. Two other reasons why they could offer higher interest rates were that Euro banks operated on lower margins; and the effect of domestic reserve requirements. Secondly, the growth of the market was stimulated because of the demand for dollars from commercial banks in the US in order to go around domestic credit restraint policies. In 1957, the market surged again after changes in British laws. In the 1960s, the market grew once again when, after changes in US regulations discouraged US banks from lending to non-US residents, would be borrowers of dollars outside the United States turned to the Euromarkets a source of dollars. The next big increase in the Eurocurrency market came after the 1973-74 and 1979-80 oil price increases. OPEC (Organisation of the Petroleum Exporting Countries) members avoided potential confiscation of their dollars by depositing them in banks in London. The dramatic growth of flight capital to Swiss and other banks, encouraged by the development of financial centres such as Luxembourg in which regulations ensured the protection of the anonymity of lenders. The growth in supply of funds to the market was the use by central banks of the market in order to increase returns on their holdings of international reserves. However if there had not also been a large demand from borrowers for Eur odollar, the market would not have grown so rapidly. The reasons for the large demand from the borrowers include a US government discouragement from 1963 of borrowing by foreign companies directly from the US market through the imposition of a tax that increased the cost of borrowing in the US for borrowing in most of the industrial nations. The fact that the euro banks were free of the reserve requirements imposed on domestic banks, allowed them to maintain a lower spread between borrowing and lending rates. Another important reason of a large demand is a US government limitations on the amount of capital that US transnational corporations could shift out of the US to invest abroad, forcing them to borrow outside the US and providing the market with a major group of very creditworthy borrowers. The domestic and the international markets have two major components: the inter-bank mechanism, and the channelling of funds from initial depositors to ultimate borrowers. However, in the Euro-markets, the former plays a far more important role, with respects to the latter, in which the markets introduced important innovations. The general efficiency of the inter-bank mechanism in allowing banks access to funds at very short notice, as well as allowing them to place funds in the market for very short periods to earn some interest, helps to reduce the transactions and information costs in the Eurocurrency markets. This also allows them to operate on smaller margins. Two innovations, which are associated with lending to non-banks, and which have facilitated the expansion of the Euro-currency markets, are roll-over credits and the syndicated loan system. The introduction of roll-over credits reduces the risk of interest rates moving against a bank when it tends to borrow short and long-term. It enables banks to offer higher interest rates on short-term deposits, whilst at the same time being able to commit these funds long-term, through reducing the risk of making losses if deposit rates should rise again. On the borrower`s side of the market, such roll over credits imply that interest rates at the time of borrowing are less important, because if they should fall over the course of the loan, the borrower should reap the benefits. The second innovation is that of syndication of loans. A syndicated credit is a loan in which a group of financial institutions makes funds available on common conditions to a borrower. It allows credits of larger sizes sometimes over $1 billion, to be put together, a factor that was especially important in the financing of national balance of payments deficits. In the lender`s point of view, it reduces the risks of international bank lending , through diversification of loans to political entities. It also provides more protection against selective defaults: unwillingness of a nation to repay its debts will be met with pressure from several countries, whose banks are involved. Negotiations were also feasible, because at the same time, there are few enough creditors involved. On the other hand, a possible danger of the process, which has become increasingly recognised, is that in the event of a default, the repercussions will be spread over a wide part of the Euro-currency system. This has raised questions regarding the stability of the international banking system. There are certain important consequences of the rise of the Eurocurrency markets. The first is the shift in the financial system from one depending on a state to manage the flow of international liquidity, to a system where liquidity is provided by private banks. The international financial systems were threatened with a lack of credit, there is now, excess international liquidity, and private bank lending provides this. In 1980, the US inter-bank loan market stood at $74 billion, this almost doubled to $170 billion by 1995. The international inter-bank lending market by contrast had grown to $5.8 trillion by June 1995.

Monday, August 19, 2019

David Lachapelle Essay -- Biography Biographies Bio

David LaChapelle is an incredible, modern photographer. He combines celebrities with the bizarre. His photography is unique, charged with sexual imagery, and provides a unique view on people you see in the media, today. I chose an article from American Photo, May/June 2003, as the basis of my research paper on David LaChapelle. The magazine has a nice design. It is easy to read the print, and the titles of topics are always visible. You won't turn a page and have to take a minute to figure out what is going on, on that page. Although there are many ads in the magazine, I suppose that one shouldn't expect any less; they're mainly ads for photography-type companies and such. This issue is still plentiful in articles, starting off with a page on Henri Cartier-Bresson. As I skim through American Photo, I finally come to an article on "The 25 Most Important Photographers Now." There's a nice introduction on the first page, about what this article is about, and on the bottom-left corner it starts with the first photographer in the list, Gilles Bensimon. The article has a nice layout, including a picture by each photographer and their name headlined above or below, and each photographer also has a good-sized paragraph about himself or herself. Many, many pages into the "top 25," David LaChapelle finally appears. The bottom half of the page shows LaChapelle's photograph, "Facial," which was taken for Italian Vogue in 2001 ("David LaChapelle"). The paragraph written about him starts off with a self-explanation of his photography: " My pictures are escapist. For me, pictures are fantasies. At the same time, they're a document of our time." The article goes on to explain his photography with more detail, and basically fin... ... plays a major part. The pattern adds to the absurdity of the two girls; their expressions are both totally different. It's actually really hard to tell what this picture is even supposed to be about exactly, but I guess I just love all the colors and the beautifulness of the photograph as a whole. The use of color is an important aspect in David LaChapelle's photography. He uses saturation to a very high extent. As far as almost making his photography seem dreamlike. I think it's beautiful, and I love the bright colors he uses. Even though he may use a lot of computer manipulation, I think LaChapelle's photography shows a distinct honesty throughout his photography. He still shows what is real, but he dramatizes it and puts it in your face. Overall, David LaChapelle is a wonderful photographer, and is obviously continuing to develop his skills as an artist. David Lachapelle Essay -- Biography Biographies Bio David LaChapelle is an incredible, modern photographer. He combines celebrities with the bizarre. His photography is unique, charged with sexual imagery, and provides a unique view on people you see in the media, today. I chose an article from American Photo, May/June 2003, as the basis of my research paper on David LaChapelle. The magazine has a nice design. It is easy to read the print, and the titles of topics are always visible. You won't turn a page and have to take a minute to figure out what is going on, on that page. Although there are many ads in the magazine, I suppose that one shouldn't expect any less; they're mainly ads for photography-type companies and such. This issue is still plentiful in articles, starting off with a page on Henri Cartier-Bresson. As I skim through American Photo, I finally come to an article on "The 25 Most Important Photographers Now." There's a nice introduction on the first page, about what this article is about, and on the bottom-left corner it starts with the first photographer in the list, Gilles Bensimon. The article has a nice layout, including a picture by each photographer and their name headlined above or below, and each photographer also has a good-sized paragraph about himself or herself. Many, many pages into the "top 25," David LaChapelle finally appears. The bottom half of the page shows LaChapelle's photograph, "Facial," which was taken for Italian Vogue in 2001 ("David LaChapelle"). The paragraph written about him starts off with a self-explanation of his photography: " My pictures are escapist. For me, pictures are fantasies. At the same time, they're a document of our time." The article goes on to explain his photography with more detail, and basically fin... ... plays a major part. The pattern adds to the absurdity of the two girls; their expressions are both totally different. It's actually really hard to tell what this picture is even supposed to be about exactly, but I guess I just love all the colors and the beautifulness of the photograph as a whole. The use of color is an important aspect in David LaChapelle's photography. He uses saturation to a very high extent. As far as almost making his photography seem dreamlike. I think it's beautiful, and I love the bright colors he uses. Even though he may use a lot of computer manipulation, I think LaChapelle's photography shows a distinct honesty throughout his photography. He still shows what is real, but he dramatizes it and puts it in your face. Overall, David LaChapelle is a wonderful photographer, and is obviously continuing to develop his skills as an artist.

Sunday, August 18, 2019

Specialists Create Market Efficiency :: essays papers

Specialists Create Market Efficiency The NYSE should not abolish specialists. Both the NYSE and NASDAQ, however, need to realize that their relative trading volumes will continue to deteriorate as ECN's become more and more popular. The need for secondary and third markets will be diminished, however they still offer liquidity, so in some shape or form they will always be fashionable to certain types of investors. The current system established within NYSE is very old and outdated. For any single trade, a number of players must be involved. First, an investor places a buy or sell order to a broker. The brokerage firm then contacts its commission broker, who is actually on the floor, to consummate the order. In this rigid and time consuming system, the specialist plays a major part in any trade. Any buying or selling in a particular stock takes place at the specialists post. A computer monitor shows all bid and ask prices for a stock in addition to the number of shares they are willing to buy or sell at the given bid ask price. Basically, Specialists execute the trades of other brokers, but they can also buy or sell shares for their own portfolios. When no other broker can be found to take the other end of a trade, the specialist must take the end of the trade where no one else can be found to do so. This is done to create liquidity, and is one of the biggest benefits to this system. Also, t his type of trading creates an auction market, where buyers and sellers are together in one location, and the best buy or sell orders win trades. They also act as a dealer when they have to execute a trade when there isn't a buyer or seller available using their own inventory. Again, this is meant to facilitate liquidity. NYSE stocks, until recently, couldn't trade certain NYSE stocks outside of a formal stock exchange, however the NYSE has since abolished this rule. This has created a small trading volume of NYSE stocks over ECN's. The current system on NASDAQ and most other OTC's incorporates dealers, who offer bid and ask prices to brokers who execute trades based on a listing of the current quotes from dealers. Although this is a very liquid market, dealers typically take a spread from the bid/ask price in exchange for the risk that they incur for holding the security.

Saturday, August 17, 2019

Mental Health Presenting Issues Essay

It may seem at first that Medical Tourism is doing the world a favour by clearing the backlogged waiting lists for certain procedures without having to expand the local capacity that is in demand. (1). It is also proposed by supporters of Medical tourism that by bringing tourists into the country, not only the health sector, but other sectors, like the tourism and hospitality sectors will also benefit and through this flow on effect the people of the host country will benefit. For example India’s health care market is expected to expand from 5.2%GDP to 8.5% GDP by the end of 2012 because of Medical tourism. (2) This is taking a superficial look at the problem. It also effects on the health care of people of the host country, the standard of care received by the patient and effects on the workforce itself. While countries like India, Thailand and Singapore may seem to benefit overall, it has been argued that the extra funding the health care system is receiving from medical tou rism does not get diverted to help the public health sector -with levels of public spending on healthcare in India are amongst the lowest in the world (3). The local people should receive some of this profit that the health industry itself is receiving as many are unable to afford comparative health care. There is also the question of the effect on the workforce. There are fears that medical tourism could worsen the drain of local professionals by luring them from the public sector and rural areas to take jobs in urban centres. (2) The medical tourism facilities offer not only a better rate of pay, but also access to good equipment, resources and medications. Finally there is the cost on the individual receiving the care. Presently, there are a lack of comparative quality and safety data including infection rates for overseas institutions. There is also little information about adverse events as reporting of these events is also lacking. Many of the practitioners in these health care facilities pay less indemnity insurance and matters are dealt with locally. It is hard to know what compensations would be made, were something to go wrong during a procedure. – In nations that have long waiting lists for certain procedures, medical tourism provides a mechanism to clear backlogs by sending patients to foreign countries without expanding local capacity. Lancaster J. Surgeries, side trips for medical tourists. p. A1. Washington Post. October 21, 2004. – this reduces the burden on the local healthcare resources of the native country. – this is reinforced by Insurance companies have jumped on the medical tourism ride by offering reduced rates to those who are willing to travel overseas for medical treatment, further encouraging the medical tourism market. – It is proposed by supporters of Medical tourism that by bringing tourists into the country, other sectors, like the tourism and hospitality sectors will also benefit and through this flow on effect the people of the host country will benefit. – For example India’s health care market is expected to expand from 5.2%GDP to 8.5% GDP by the end of 2012 b ecause of Medical tourism. Medical visas mark growth of Indian medical tourism. Bull World Health Organ. 2007 – while countries may seem to benefit overall, it has been argued that the extra funding the health care system is receiving from medical tourism does not get diverted to help the public health sector. Levels of public spending on healthcare in India are amongst the lowest in the world. Health Spending in India, the impact of current Aid structures and Aid Effectiveness. EU HEALTH ODA AND AID EFFECTIVENESS / COUNTRY BRIEFING 6 / DECEMBER 2011(sourced at http://www.euroresources.org/fileadmin/user_upload/AfGH_Policy_Briefs/PolicyBriefing6_India_LoRes.pdf) – according to the WHO in 2010, in India 71% of total health expenditure was spent on private health – public health spending compared to private. The private costs are too high for the average Indian so they can’t directly benefit, if an – effect on public health workforce, There are fears, however, that medical tourism could worsen the internal brain drain and lure professionals from the public sector and rural areas to take jobs in urban centres. Medical visas mark growth of Indian medical tourism. Bull World Health Organ. 2007 – The question has arisen regarding the safety and quality of health care reicieved whilst overseas. – also who manages complications which may arise after treatment that was received overseas. Who should be responsible for that? – When medical treatment is sought from abroad, the normal continuum of care may be interrupted. Perhaps not surprisingly, given commercial imperatives, evidence of outcomes for medical tourist treatments is limited and reports are difficult to obtain and verify.

Fingerprint Analysis

I chose two glasses for this project. I chose a tall, green stained glass and then a short clear glass. I washed my hands thoroughly before attempting the project, and scrubbed my sink. I then put my fingerprints all over both glasses. I filled my sink with cold water, and then submerged my two glasses into the water for 4 hours. I took the glasses out, and saw that the fingerprints were still on the glasses!! I was extremely shocked at this finding because, I surely though that the water would eliminate the fingerprints. Hot water- I filled up a sink full of hot clean water, and sat both glasses in the sink for 4 hours, I drained the water and checked the glasses. There was STILL fingerprints on the glasses!!! I am in shock, once again! I surely thought since the cold water didn’t remove the fingerprints, that the hot water would remove the fingerprints. Soapy Water- I filled up a sink full of soapy water, and placed the two glasses into the sink and left them over night. After cooking breakfast, I checked on the glasses. I drained the water and carefully took the glasses out by the bottom so I wouldn’t get fingerprints on the glass. I examined the stained glass first, I did not see any fingerprints visually! However, when I examined the small clear glass I saw two fingerprints left on the glass. But most of the others have disappeared. So now, I am leaving new fingerprints all over the glass to do the last activity. Salt Water- After placing the two glasses into the salt water for 5 hours I examined them, and they both still had fingerprints all over the glasses. Now, I would like to test this again with more salt in the future to see if I use more salt, would it eliminate the prints.

Friday, August 16, 2019

America Correctional Association

The American Correctional Association (ACA) is the largest correctional association in the world and represents all organizations of corrections within the criminal justice system. â€Å"The ACA is comprised of 78 chapters and affiliated organizational members, including federal, state, and military correctional facilities and prisons, county jails and detention centers, community corrections and halfway houses, and probation/parole agencies. The organization leads the cause of corrections and correctional effectiveness for practitioners and to benefit the public† (Gale). In 1870, it was established as the National Prison Association (later renamed the American Prison Association), which makes it the oldest association in the correctional profession. The organization changed its name from the APA to the ACA in 1954 because they recognized that the corrections concept extends beyond prisons and jails. The ACA contributes towards increasing professional knowledge and abilities by providing an academic forum. The annual conventions focus on information about new philosophies and practices within the correctional disciplines. The ideas and information exchanged may ultimately affect over 600,000 staff members and inmates in the nation’s correctional systems† (Gale). The ACA also provides professional development, certification to standards and accreditation, and aids with research and publications. The ACA advocated for rehabilitation by providing offenders with physical exercise, recreation, religious programs, education, and job training. A nother issue within the ACA is the treatment and rehabilitation of female offenders. The Association on Programs for Female Offenders (APFO) is an affiliate of the ACA and serves as an advocacy group for female offenders. They advanced correctional concerns that pertain to female offenders. Some concerns are visitation with children, intra-prison pregnancies, and drug treatment programs designed to prevent harm to unborn children of pregnant females at the time of incarceration. With the knowledge and success the ACA provides, my career success can be improved. The education I received at Mount Mercy College is now getting improved from University of Phoenix. If I commit to a job within corrections after graduation, the ACA will continuously improve my education because of the unlimited access a member can receive. I would also try to attend their yearly conferences to become a better staff member within the correctional facility. References American Correctional Association. Retrieved from http://www. aca. org The Gale Group (2002). American Correctional Association. In World of Criminal Justice. Retrieved from http://www. credoreference. com/entry. worldcrims/american_correctional_association_aca

Thursday, August 15, 2019

Mao’s Last Dancer by Li Cunxin Essay

‘Non-fiction texts only deal with facts.’ Discuss the validity of this statement. In your essay response, you should discuss how composers of non-fiction texts present their point of view with specific reference to your non-fiction text. Autobiographies, as a narrative non-fiction text, generally rely on the conventions of factual historical evidence while presenting a personal point of view. Non-fiction texts therefore, rely on objective detail and a subjective perspective. Throughout the autobiography Mao’s Last Dancer the composer Li Cunxin offers a personal evaluation of actions and speculates on the significance of certain actions and events. To engage and entertain the responder the composer uses opinionative language and emotive language throughout. Recounts rely intensely on memory, which can be fragile and misleading, and therefore one should question the validity of such a text. Such an autobiography also deals with factual events but includes a level of subjectively. By saying non-fiction texts only deal with facts is partially wrong because non-fiction texts such as autobiographies do deal with the things other than facts and it contrastingly brings immediacy to events that have been simply narrate d by secondary versions. Consequently, non-fiction texts are not always objective when dealing with the events in a person’s life and this proves right through the novel. Autobiographies by their very nature rely back on memories from the past. This can be fragile and can ignore certain facts. In Li Cunxin’s text, most of his writing relied back on his memory. He exaggerates and reinforces his points quite strongly. Hyperbole is used in this line, â€Å"My leaps were high†¦It felt like as if I was flying†¦gliding through the open sky, and if the music allowed it, I would have stayed in the air all night,† (p314) adjusting the truth to portray him in a positive light. Furthermore, Time does have an effect on memory as it can be clouded over time and cannot be as strong. For example when Li has a conversation with Teacher Xiao he includes the exact dialogue, which was spoken. â€Å"Cunxin I understand your anger and I think Teacher Gao was wrong. He shouldn’t name†¦Ã¢â‚¬ (p182) The reader must question how the author remembers each detail from his past.  This adds to the subjective nature of this genre. Li reflecting from his memory also shapes his emotion, full on life. Emanating from Li’s personal emotions this indicates that this is a subjective recount as well as objective, â€Å"My feelings about leaving her and going back to China became unbearable† (p289). Aspects of the story also describe how his parents were feeling before he was born through the short dramatic sentences, but is not essentially factual as he was not actually there, â€Å"She knows her family will no longer be her main source of comfort†¦looks back at her familiar village for the last time, she has no tears,†(xiv) and so this relies on memory and perspective once again. The use of first person, it interoperates non-fiction texts such as autobiographies, an unreliable source of information. The purpose of writing in this style is to give the responder a personal effect, while reflecting back on their life story. Therefore, this reiterates the fact that the autobiography is only set on the personal and selective events being conveyed by the author. By doing so, the reader is presented with bias and limited factual content explored within Mao’s Last Dancer. They persuade the reader into believing its true; it could give the reader a wrong perception of true events and places because there is nothing else to judge them from. Aspects of one-sidedness are presented to us in Mao’s Last Dancer, which suggest the narrator is unreliable. The use of omission is brought to our attention at the start of the ‘afterword’. The fact that the author finishes writing on the page about a particular event which occurred in the distant past (being released from the Chinese Government). And then starts a new page erasing a whole stage out of his autobiography. â€Å"My new life with Elizabeth began like an East meets West fairy tale†¦Ã¢â‚¬  (p308) simply reassures the readers that the legitimacy of the text is not all true. What has happened in the release and the meeting of Elizabeth? The reader does not hear what her point of view is on the circumstances or what she thinks about it, such as why their marriage failed, â€Å"but it didn’t work out the way we both had hoped.† (p308) This merely gives the reader a one sided point of view. As we hear Li’s thoughts and emotions towards Elizabeth, the reader is manipulated into sympathizing with Li. Therefore Elizabeth is not given adequate characterization. â€Å"Our marriage eventually failed. We suffered  greatly and I felt terribly alone in the world. I had no one to go to.† (p308) The use of this personal style makes this genre a subjective text. However, autobiographies do include factual detail and are not all subjective. In Mao’s Last Dancer, the author includes an appendix, which outlines the historical events mentioned in the book. These include reference map, a historical timeline of China in the 20th Century and black and white photos with captions. These endorse Li Cunxin’s life story and set it within a historical context. Related evidence for the reader that these events actually occurred, â€Å"In 1921 the Chinese Government party was founded.† (p328). This references to historical figures, such as Chairman Mao Zedong, and the use of dates provided. However one must question why the author and their purpose selected these examples. The written style of non-fiction text both deals with facts and emotional theories. Thus all this occurring by nature. Emotional theories, which are focused on in the text, Mao’s Last Dancer, involves the idea of memory in which the events occurred. Throughout the novel we witness from the author the numerous times the fragility in memory. The one-sidedness in autobiographies often gives the reader a bias view on all events and the author usually alters the truth. By saying non-fiction texts only deal with facts is highly debatable as facts are intertwined with the personal.

Wednesday, August 14, 2019

Rites of Passage within Colour

Introduction In this essay I will be discoursing my personal experience of what Arnold Van Gennep ( 1909 ) has described as â€Å"rites de passage† , concentrating on the liminal stage. This essay will detail my experience of traveling from an all ‘coloured’ community to a bulk ‘black’ suburb and my rites of transition experience of seeking to be ‘black’ . I will besides be discoursing on why I agree and disagree with Van Genneps rites de transition. SEPARATION PHASE Separation stage â€Å"comprises symbolic behaviour meaning the withdrawal of the person either from an earlier fixed point in the societal construction, from a set of cultural traditions ( a â€Å"state† ) , or from both ( Turner, 1969, p. 94 ) . I was born on November 1, 1993 in East London, EC. I lived with my household in Buffalo Flats, EL for the first six old ages of my life, at the clip and today, it is still a predominately colored township. Turning up in that township for six old ages I, along with every other individual populating in that community is what South African society would depict and hold as ‘coloured’ . I would speak ‘coloured’ , walk ‘coloured’ , act ‘coloured’ , fight ‘coloured’ and believe it or non, somehow I would even run ‘coloured’ , or at least every bit ‘coloured’ as the stereotypes myself and my community had been placed in. At the age of six I moved from my beloved Buffalo Flats, EL to what I at the clip considered the center of nowhere, Midrand, GP. This, as Turner put it, was my separation stage. Midrand was a assorted suburb, many Whites, many inkinesss, rather a few Indians and a smattering of coloureds, or at least that was what I saw. I was taken off from my place, detached from it, separated from my household and friends and thrown into this whole new universe which led to my â€Å"liminal phase† . LIMINAL PHASE Liminal period is when â€Å"the features of the ritual topic ( the â€Å"passenger† ) are equivocal ; he passes through a cultural kingdom that has few or none of the properties of the past or coming state† ( Turner, 1969, p. 94 ) . This was the period in which I yearned to be ‘black’ , I prayed to be ‘black’ and after a subconscious and unstructured induction, I learnt how to be ‘black’ . I attended a assorted school, bulk black, but still a assorted school where I was one of two ‘pure’ coloured male childs in my class, the other named Michael Williams. The two of us along with a Chinese male child named Jacky Mo, made up my ‘communitas’ ( Turner, 1969 ) . We were all in the same phase of our lives, we were detached from the society we one time knew, for myself it was Buffalo Flats, for Michael it was the Cape Flats and for Jacky it was China, and we were all thrown into Midrand, and all three of us were in an unstructured and subconscious induction to be ‘black’ . We were all stripped of our race, were no longer coloured or Chinese, nor were we black, we were merely at that place. In between what we were and what we were endeavoring to be, being black wasn’t merely a race or civilization to us, it was a societal standing to be ‘cool’ , and we knew being non-black yet black, would be the highest award amongst our black friends and couples. During this unstructured induction phase our black friends became our somewhat â€Å"ritual elders† ( McNeill, 2011, p. 74 ) . They were learning us how to be black, what to make, how to make it and when to make it. Myself and Jacky lived in the same composite with a male child named Siyabonga Mlaba, who would subconsciously take up the function of being our ‘ritual elder’ . Traveling through this liminal period populating so near to one another made us really competitory for the blessing and regard of our ‘ritual elder’ . The same manner the ritual seniors punished the novices for singing about AIDS ( McNeill, 2011 ) , if we had disrespected or misunderstood any facet of ‘black’ civilization, we were besides punished, non in the same physical mode but with verbal maltreatment and humiliation to a point of feeling disdained. These ‘punishments’ were difficult to accept and understand, but it made me more hungry and eager to s uit in the group I was being initiated into. There were many symbols in my liminal period, one of the chief 1s being the manner I talked. The speech pattern, the words and the actions I used when I spoke were major symbols. I couldn’t merely talk with my normal ‘coloured’ speech pattern, I had to try to talk with the same speech pattern of my ‘black’ friends, use the same words and slang when I spoke. I couldn’t use the conversational ‘coloured’ recognizing â€Å"Awe my Broe! † , I had to utilize the ‘black’ township recognizing â€Å"Sho Mfede† . Around this clip as I easy incorporated African linguistic communications in my address, I began floating from my roots of speech production Afrikaans, easy I bit by bit stopped utilizing it until finally I ne'er spoke Afrikaans, unless in Afrikaans category. Other symbols were dress codification. For some uneven ground the ‘Tsotsi’ or ‘gangster’ image was one the young person wou ld gravitate to, and that’s the expression I wore proudly as a minor. All stars, faded denim and ever a beany worn half off or a popular cap called a â€Å"sportie† worn with a joust. This was all of import. The manner I ate was of import, I had to eat pablum and vleis with my manus, no spoon or fork was of all time required, and I felt more ‘black’ than of all time. As this induction took topographic point, the more it dragged on and the closer I got to my end as adjustment in as ‘black’ , the more I drifted off from my ain civilization and heritage, subconsciously I was denying who my community raised me to be. The more ‘black’ I was, the less ‘coloured’ I was. I looked at being ‘black’ or being a portion of ‘black’ civilization as a societal standing and non as something sacred and to be proud of. The sarcasm was that I viewed my ‘coloured’ civilization and people to be violent, yet I used force to seek and be ‘black’ . Contending was a symbol or portion of the ritual as anything else. ‘Black’ people were strong, and the manner we proved our strength was through these battles, the conflict of the better adult male. A circle would organize and one of the older ‘black’ childs would take one of us younger novices to contend each ot her or another member of the group. If the battle was won, the embracing would be like winning a war, or a football lucifer. But the also-ran will be made merriment of and humiliated, but after every battle a compulsory handshaking would take topographic point as a mark of regard and that it was non personal. I was grade three when my liminal period ended, a battle with a male child named Tebogo, a much bigger male child. He beat me down infinite times in that battle, but I won regard and my rubric of being black by ne'er giving up. So after three long old ages of subconscious induction I eventually made my manner out of the liminal period and was reincorporated to my societal group as longer a ‘coloured’ or novice, but as ‘black’ . But this is where I do non to the full agree with the theory of rites of transition. I the reincorporation stage does non really round up rites of transition, but really starts a new rhythm, do although now I’m ‘black’ , I have to once once more go through a liminal period and induction to turn out that I am worthy being a ‘Hip Hop Head’ . The group in which I spent as an novice for three old ages and eventually got accepted as one of their ain had another societal construction I had to be initiated into, taken back to a liminal stage whereby I was non what I was and non what I was going, but in between that. Take for illustration the school calling of an person. One gets separated from place, sent to school for 12 old ages ( liminal period ) and so reincorporated to the universe one time graduated high school. Yet the reincorporation of graduation is the separation stage for university, so the old ages analyzing at university is the liminal period an d graduating university is one time once more reincorporation. But that one time once more can be the separation stage in happening a occupation, where being unemployed is the liminal stage and acquiring a occupation is the reincorporation stage yet the separation stage for 1s calling and so on and so forth. Decision I agree and disagree on rites of transition, the separation stage and liminal period seem really solid, but the reaggregation/reincorporation stage can besides be seen as the separation stage for the new rhythm of rites of transition.

Tuesday, August 13, 2019

Key challenges and pitfall to virtual team performance Essay

Key challenges and pitfall to virtual team performance - Essay Example Companies also face the challenge of training and updating the technology used by the virtual team members. Defining the best task technology fit is another challenge that influences virtual team performance. Organizations face the challenge of scheduling meetings since the virtual team members live in different geographical areas with distinct time zones (Kirkman, Rosen, Gibson, Tesluk, & McPherson, 2002). Companies/individuals require complex technological applications to enhance virtual team performance (Ebrahim, Ahmed, & Taha, 2009). Moreover, virtual team performance experiences decreased control of activities since it involves virtual members. Mistrust and communication barriers also depict pitfalls in virtual team performance. Virtual team members develop divergent thoughts subject to cultural and functional diversity experienced in virtual activities Ebrahim, Ahmed, & Taha, 2009). Moreover, effective virtual team performance requires special training and motivation of virtual team members. The members are invisible and virtual meetings are seemingly ineffective since they do not involve physical interactions and personal feelings (Robb, 2014). Virtual environments do not offer detailed analysis of salient issues (Robb, 2014). Moreover, the members face the problem of working in different time zones that is very confusing. Kirkman, B., Rosen, B., Gibson, C., Tesluk, P., & McPherson, S. (2002). The Seven Challenges to Virtual Team Performance: Lessons from Sabre, Inc. Retrieved from:

Monday, August 12, 2019

The decisions made by the Bush administration, for the first time in Essay

The decisions made by the Bush administration, for the first time in American history, approving extraordinary procedures of investigation, questioning, and punishment to use in the War on Terror - Essay Example A UN panel formed on November 2004, defined terrorism as any act aimed to cause bodily harm to civilians for compelling the government to do any act (Allen). Even though America declared war against terror after the September 11 attacks, it conducted anti terrorist operations since the early 1990’s. From this period the US Government was operating anti terror programmes. One such programme was forcible capturing or seizing suspected terrorists from foreign countries and transferring them to a 3rd country. This programme came to be known as Extraordinary rendition. It was expanded by the Bush administration after the 2001 attacks. Latest records reveal that up to 1245 flights have been operated for transporting terror suspects from undisclosed locations to detention centers operated by CIA also called as Black sites. This action by the US government has created tensions between its European allies, namely the Council of Europe, Congressional committees and Human rights organizations. They have questioned the legality of the programme even though forgetting the ill effects of terror attacks suffered by US and many other foreign countries. This programme of Extraordinary rendition was formed after the 1993 attacks on US. It was a way for the CIA for keeping the terror suspects out from the American court system because they feared that the intelligence system could be jeopardized. This programme got approval from the Presidential Decision Directive 39 issued by President Bill Clinton. This directive gave suggestions regarding procedures to be used for forcible abduction of terrorists without the permission of the host governments. Actually this act was a blatant encroachment against the sovereignty of other nations on the grounds of fight against terror. This programme was extensively used after the September 11 attacks by the US government. The programme of Extraordinary rendition was promoted first by Richard