Thursday, October 31, 2019

Annotated Bibliography Essay Example | Topics and Well Written Essays - 1250 words

Annotated Bibliography - Essay Example However, eating disorders are caused by many factors, both social and cultural factors. With the increases of eating disorders among students the awareness campaign has been extended to schools. This paper will look at the possible causes of eating disorders. It will also look at the treatments of these disorders. Stewart, G. (2000). Teens with eating disorders. San Diego: Lucent books. Eating disorders among teenagers are mainly caused by psychological issues. Teenagers are easily disappointed or depressed with occurrences in their lives. In most cases they tend to eat a lot to drown their sorrows (Stewart, 2000). This scenario is rampant to male students. At young age depression could be cause a lot of harm in teenagers. With eating a lot many affected individuals feel more occupied thus they have less time to think about their problems. At first it is not of concern since the feeding is under the control of the student’s mind (Stewart, 2000). However, with time the student loses control and it slowly turns into an eating disorder. Swain, P. (2006). New developments in eating disorder research. New York: Nova publishers. Swain (2006) says that there is not a single cause for eating disorder. She suggests that most cases of eating disorder are caused by concern over weight and body shape. In female students, the issue of weight brings a lot of concern to them. Some of them may turn to dieting as a way of watching their weight. In many scenarios these individuals acquire the eating disorder whereby they cannot feed. They get a king of psychological disgust every time they think of feeding (Swain, 2006). The author relates the same occurrences regarding the issue of acquiring a certain body shape. Herrin, M. & Matsumoto, N. (2006). The parent’s guide to eating disorders. California: Gurze books. The two authors bring up the factor of genetic background. For example, if one identical twin has anorexia the probability of the other twin to have the di sorder is at about 80% (Herrin & Matsumoto, 2006). This is because they have in them the genes of the eating disorder. In other scenarios some individuals inherit the eating disorders. LeGrange, D. & Lock, J. (2011). Eating disorders in children and adolescents: A clinical handbook. London: Guilford Press. Another genetic factor is the hormonal influence. Some brain chemicals create a possibility of having an eating disorder. According to LeGrange & Lock (2011) individuals suffering from anorexia nervosa have high levels of vasopressin and cortistol hormones. The hormones are released after any occurrence of emotional or physical stress. The hormones are found to cause eating disorders in a number of people. Goodman, L. & Villapiano, M. (2001).eating disorders: A journey to recovery Handbook. New York: Psychology Press. Sociological factors also have a great role to play in the cause of eating disorders. We live in a society which perceive being fat as a disability. In every street corner, on radio, on television and on the internet there is always that negative perception of being fat. To adolescent this causes a lot of worry to them. In order to be fit in these societies they tend do anything possible not to become fat (Goodman & Villapiano, 2001). It is at this point that eating disorders like bulimia occur. According to the authors peer pressure also plays its negative role to cause these disorders. Teenager especially students tend to try and fit in the social

Tuesday, October 29, 2019

Unit 7 paper biochem Essay Example | Topics and Well Written Essays - 750 words

Unit 7 paper biochem - Essay Example As the extent and the strength of the exercises increases, the aerobic system (mitochondrial or oxidative system) takes over and provides the energy needed. Therefore, the first few minutes of running involve anaerobic activity, but as the intensity of the exercise increases during running and weight lifting, aerobic activity takes over to oxidise the previously produced pyruvate into more ATP to sustain the body during the exercise. These energy systems are interdependent of each other and work concurrently in the body. Based on the meal plan above, rice is the key carbohydrate food that is rich in starch. Skim milk, in addition, contains carbohydrates in the form of lactose (milk sugar). Beans also contain the polysaccharide starch. Protein foods include chicken, beans, and skim milk (whey proteins). Olive oil, skim milk, and ranch dressing contain fats. Olive oil, ranch salad, and chicken contain unsaturated fats, whereas skim milk contains exceptionally small quantities of saturated fats since skim milk usually has a low quantity of fat compared to whole milk. The salad contains vitamins, minerals, and roughage (fiber), which do not undergo digestion in the alimentary canal. When food is ingested in the mouth, the grinding action of the teeth (mechanical digestion) breaks it down into small pieces as saliva lubricates it. Chemical digestion of carbohydrates begins in the mouth where salivary amylase (ptyalin) digests starch into maltose. In the stomach, waves of muscular contractions called peristalsis (mechanical digestion) further squeeze the food, aiding in mechanical digestion. The gastric cells in the stomach walls secrete acidic juices including hydrochloric acid that create a favourable environment for the enzyme pepsin, which digests proteins into peptides. The partially digested food passes to the duodenum where most of the enzymatic digestion takes place. The pancreas

Sunday, October 27, 2019

Internet addiction among adolescents

Internet addiction among adolescents Internet addiction among adolescents Abstract Today’s world is a technology driven world, where all the people are linked to the use of internet in one way or the other. Mainly it is the adolescents who use the internet services the most, be it for the gaming purposes, studies or any other. But with the advent of internet technology, life has obviously become easier on the part of adolescents. Each of the innovation brings along with it many of the hurdles or risks. One of the main risks that are associated with the use of internet is internet addiction among adolescents. Keyword: Internet addiction, Adolescents, Internet technology, Internet services Internet addiction among adolescents The technological development of the internet in the initial stages was designed for the promotion of research and communication among various technological institutions. This is also linked to the usage of internet by the adolescents (Aydm, B., San, S. V, 2011). This is because, in the technological institutions, there were mainly the adolescents only who used the internet for the research purposes. But with the advent of new technological era, HCL Company made various handy browsers that made the usage of internet by the adolescents more flexible and appropriate (Hamid, 2015). Then eventually after the coming in of the smart phones, the usage of internet became more accessible to the adolescents. Diagnosis Clinical disorders have been the most fatal things that have been identified to date in regards to the excessive usage of internet. In the clinical disorders have, it is insomnia and depression that are the most common among adolescents who have excessive usage of the internet technologies (Aydm San, 2011). Insomnia is on the rise among adolescents who over use the internet because, they are deprived of the sleep as they all the time are glued to the internet. Moreover depression is on the rise among the adolescents (Esen et al., 2013). This is because most of the adolescents are inclined towards the usage of internet and mainly the social media. As a result, many of the adolescents engage themselves in the fake profiles. As a result, when the bitter truth is out, most of the people go in a state of depression. Thereby insomnia and depression are among the top most disorders that are linked to the internet addiction among adolescents. Correlation to Personality Behaviours, Preferences and Environments It has been found that whenever a person is stress or a stressful situation, people become stressed or engage themselves with the use of internet. This is something that is common among the adolescents. They immerse themselves in the cyber space in order to combat stress. Whereas some others who lack confidence level, escape themselves to online interaction. Also the personality traits like extroversion and high emotional instability are also some of the factors that are negatively correlated with internet addiction and are seen among the adolescents (Hariri et al, 2015). Among some others are insomnia and depression that affect the individuals or adolescents the most. There are various advantages that the internet has provided to the adolescents. Like with the use of internet, it became easier for the adolescents to learn through the e-books. Moreover, they also were able to learn by sitting at one place through video conferencing via the internet. This was one of the most valuable advantages that the adolescents had with the use of internet (Kuss et al, 2013). Though it also leads to an addiction among the adolescents, as instead of the books, they were more attracted towards the e-books. This lead to all time screen usage, which in a way is not useful in relation to the health parameters. Literature reviewed First group of Study As the use of technology is in the hands of the user, be it for the good or for the bad. It was seen with the advent of newer technologies that internet usage among the adolescents was increasing day by day, but on the wrong side. This is so because, the pornographic material was easily available on the internet and more and more adolescent’s age attracted towards it. This is also something that leads to internet addiction among the adolescents. In fact, it is the result of wrong usage of the technology only that the rise of cyber crime also increased (Israelashvili et al., 2012; Esen et al., 2013; Orsal et al., 2013). In the recent studies on the usage of internet, it was seen that almost 80% of the population comprises of the adolescents only who are addicted to the usage of internet and are a crime partner in most of the cyber crimes that occur all across the world. Second group of study Increase in the addiction of internet with adolescents, it was seen that there were many of the health problems also that came across. In China, it was seen that internet addiction has became the most significant mental health problem among the adolescents. The incidence rate of internet addiction among the Taiwan college students was 5.9% and almost 10.6 % among the Chinese college students. It was also seen that most of the Chinese adolescents who were addicted to the internet faced mental disorders like; they often became aggressive and also had some of the short term memory loss (Li et al., 2015; Sar et al., 2012; Usman et al., 2014). Third group of Study Some of the main domains of internet that are popular among the adolescents include, chatting rooms, e-mails, discussion forums etc. These are the main areas because most of the adolescents are attracted towards the usage of internet for the chatting or messaging purposes (Hariri et al., 2015; Esen et al., 2013; Aydm et al., 2011). The pitfalls were many when it was accessed in terms of the internet addiction. Like memory problems, health disorders and also the family problems that disturbed the overall life form of the individuals. In the research studies, it was found by many of the researchers that the common problems that existed among the adolescents who were addicted to the internet included, emotional sensitiveness, maladaptation, insomnia and also not been able to express themselves(Li et al., 2015). This is because most of the adolescents in this age are inclined towards the usage of social media. Thereby they get so much addicted towards it that they eventually face emotion al sensitiveness and barriers. A survey conducted by Young, 1996, depicted a graph that illustrated the usage of internet by the adolescents and how has increased over the years. Similarities First Similarity Apart from the social media, online gaming has been the most significant parameter linked with the internet that makes the adolescents linked to the internet all the times. Playing online games has increased the risk of being addicted to the internet by almost 2.7% every time. Previous researches have indicated that unlike the other kind of games forms like the browser and offline games, there are the online games that appear to have the high addictive potential. It is because of this only that vulnerable adolescents develop an addiction as a consequence of frequent engagement. Online games generally demand a large amount of the commitment and time investment and this is what makes the adolescents addicted to it (Esen et al., 2013; Aydm et al., 2011; Li et al., 2015; Orsal et al., 2013). Second Similarity Negativity was among the other important consequence that has been identified with the increased usage of the internet. With the internet addiction among the adolescents, they tend to go through various experiences that they relate to their real lives in one form or the other. Thereby in the process of relating, there arise many such situations when the person gets negative due to the higher usage of internet (Sar et al., 2012; Li et al., 2015). Moreover, this occurs because the viewpoint is consolidated towards a single side only. Third similarity Studies in different cultures have stated that internet addiction has only been seen as a concern in most of the cultures, rather than a benefit. As more and more time they spend on the internet, makes them have less time on practicing on their own. And as a result, they had lower grades as compared to the ones who did not use the internet (Li et al., 2015; Usman et al., 2014). This is the case when the other people in the conversation expect different way of reaction (Kuss et al., 2013; Hariri et al., 2014). The relationship among internet addiction and interpersonal problem is rapidly increasing day by day. These problems are mainly identified when the family members of the adolescents tend to complain about the adolescents who make excessive internet usage. Differences Gender Differences The studies conducted on the usage of the internet among the adolescents have suggested that there are gender differences that have been seen after the addiction to internet. The studies done by the Turkish university have put forth that the male counterparts are the ones who spend more time on the internet than the female ones. Though some of the studies also suggest that the female members are high in number. It was also seen that the addiction among the women on the internet was more on the shopping sites and the other areas (Aydm et al., 2011; Li et al., 2015; Usman et al., 2014; Sar et al., 2012). Whereas in case of males, the access to internet was made mainly too social media and gaming areas. Physical Differences The internet addicted adolescents are very less likely to engage in the health promoting behaviours and rather are mostly against it. As due to the excessive internet usage they are not able to keep themselves fit. In order to overcome this deficiency, most of the adolescents tend to take health supplements. These actually tend to decrease their health and thereby leaving the internet addict prone to the diseases. Thereby, there are many physical differences also that come across with internet addiction among adolescents (Israelashvili et al., 2012; Kuss et al., 2013; Esen et al., 2013). Work Differences Many of the employers have seen that the excessive usage of internet has potentially reduced the level of work, rather than enhancement of productivity. Employers who make lesser usage of internet tend to improve more on scale of performance. And the ones who are addicted to internet, most likely develop a tendency to work less and thereby become lethargic also. Moreover, excessive usage of internet also causes delay of work to be accomplished in a sooner time period (Hamid et al., 2015; Orsal et al., 2013). Thereby the need is that internet usage must be reduced while the adolescents are on work, so that distractions can be less. Thereby, these are the major differences that were encountered among different adolescents who are addicted to the internet. Discussion In order to identify that an adolescent is addicted to the internet or not, there are three basic classic mass media innovations (Aydm et al., 2012). These include surveillance, escape, companionship, identity and environment. It has been proved by many of the studies that the adolescents make the most usage of internet to reinforce relationships that at times also takes them into the negative room. It was stated that among the adolescents, college students are exposed to a higher risk of internet addiction (Usman et al., 2014). This is mainly due to the higher vulnerability of them using the internet for one or the other purpose in the college also. There are approximately 922.3 million, who represent 44% of the world internet user population. It has been one of the majorly growing concerns, as it is compliable to the health issues also. If talked about China, it is yet another country that is facing the charges of internet addiction among the adolescents. In order to combat the internet addiction, the governments of Japan, China and South Korea have set up the boot camps. These are helpful in providing the therapy to make the adolescents free of any kind of internet addiction (Israelashvili et al., 2012). Though there are many negatives that are seen among the adolescents with the use of internet, there are many of the advantages also. Unfortunately, Internet is misused by some of the groups of individuals if the adolescents get addicted to the internet for the learning and other useful purposes, then no more will it be known as addiction (Li et al., 2015). Rather when one can impart great knowledge from the use of internet if used for useful purposes. It has been identified in the studies from literature that if internet usage is made up to the mark by adolescents then it can reap better returns to them rather than making them an internet addict (Sar et al., 2012). To conclude, it can well be stated that it is in the hands of adolescents only whether to use the internet for their own convenience or other means. If it is used appropriately, then it will serve as a boon or otherwise a curse. Future Research and Studies The internet usage among adolescents is studied further by considering the various different racist. If university and school used only the sites which are related to the students and blocking all the other sites then it will be advantage for the students that they cannot rely on internet for longer period of time. Further research can be done on the usage of the internet by studying the different universities and combining the studies on the basis of age and sex. References Aydm, B., San, S. V. (2011). Internet addiction among adolescents. The role of self-esteem. Procedia- Social and Behavioural Science, 15, 3500-3505. Doi.org/10.1016/j.sbspro.2011.04.325. Esen, B. K., Aktas, E., Tuncer, I. (2013). An Analysis of University Students’ Internet Use in Relation to Loneliness and Social Self-efficacy.Procedia Social and Behavioural Sciences,84, 1504–1508. doi.org/10.1016/j.sbspro.2013.06.780 Hamid, S., Waycott, J., Kurnia, S., Chang, S. (2015). Understanding student’s perceptions of the benefits of online social networking use for teaching and learning.TheInternetandHigherEducation,26,1–9.doi.org/10.1016/j.iheduc.2015.02.004 Hariri, M. T. Al-, Hattami, A. A. Al-. (2015). Utilization of internet by health collegesstudents at the University of Dammam.Journal of Taibah University Medical Sciences,10(1), 66–73. doi.org/10.1016/j.jtumed.2015.01.006 Israelashvili, M., Kim, T., Bukobza, G. (2012). Adolescent’s over-use of the cyber world – Internet addiction or identity exploration?Journal of Adolescence,35(2), 417–424. doi.org/10.1016/j.adolescence.2011.07.015 Kuss, D. J., Griffiths, M. D., Binder, J. F. (2013). Internet addiction in students: Prevalence and risk factors.Computers in Human Behaviour, 29(3), 959–966. doi.org/10.1016/j.chb.2012.12.024 Li, W., O’Brien, J. E., Snyder, S. M., Howard, M. O. (2015). Characteristics of Internet Addiction/Pathological Internet Use in U.S. University Students: A Qualitative-MethodInvestigation.PLOSONE,10(2).doi.org/10.1371/journal.pone.0117372 Ã…Å ¾ar, A. H., Gà ¶ktà ¼rk, G. Y., Tura, G., Kazaz, N. (2012). Is the Internet Use an Effective Method to Cope With Elderly Loneliness and Decrease Loneliness Symptom?Procedia Social and Behavioural Sciences,55, 1053–1059. doi.org/10.1016/j.sbspro.2012.09.597 Orsal, O., Unsal, A., Ozalp, S. S. (2013). Evaluation of Internet Addiction and Depression among University Students.Procedia Social and Behavioural Sciences,82, 445–454. doi.org/10.1016/j.sbspro.2013.06.291 Usman, N. H., Alavi, M., Shafeq, S. M. (2014). Relationship between Internet Addiction and Academic Performance among Foreign Undergraduate Students.Procedia Social and Behavioural Sciences,114, 845–851. doi.org/10.1016/j.sbspro.2013.12.795

Friday, October 25, 2019

Social Psychology and the Stanford Prison Experiment by Philip Zimbardo

Social psychology is an empirical science that studies how people think about, influence, and relate to one another. This field focuses on how individuals view and affect one another. Social psychology also produces the idea of construals which represent how a person perceives, comprehends or interprets the environment. Construals introduce the idea that people want to make themselves look good to others and they want to be seen as right. It is also said that the social setting in which people interact impacts behavior, which brings up the idea of behaviorism. Behaviorism is the idea that behavior is a function of the person and the environment. The ideas of social psychology mentioned above can be applied to the Stanford Prison Experiment; in which the environment, the participants, and construals brought about behaviors that may not have been how the participants actually would behave in real life. The Stanford Prison Experiment was conducted in 1971 by Philip Zimbardo of Stanford University. The purpose of the experiment was a landmark study of the human response to captivity, in particular, to the real world circumstances of prison life. In social psychology, this idea is known as â€Å"mundane realism†. Mundane realism refers to the ability to mirror the real world as much as possible, which is just what this study did. Twenty-four subjects were randomly assigned to play the role of "prisoner" or "guard" and they were made to conform to these roles. Subjects became so entranced in these roles that the guards started to behave as if they really were the guards of a true prison. Zimbardo had told them to think of themselves in this way and it led to the guards mentally abusing the prisoners with their cruel and degrading ro... ...ion people based on the orders of Adolf Hitler and his henchmen. In reference to the two situations, one participant of the study said that â€Å"anybody can be a guard, but not every one becomes sadistic.† This saying can be applied to real life situations, especially that of the New Jersey incident. These occurrences can be analyzed using social psychology because the environment, the situation, and those holding the authority influenced the behavior of others. Due to these influences, prisoners and guards acted on the roles they were given, in the way that society sees them. The description, in itself, is the definition of social psychology. Works Cited Ratnesar, Romesh. July/August 2011. The Menace Within. Stanford Magazine, pp. 1-9. Smothers, Ronald. (1998, February 6). Asylum Seekers Testify on Abuse by Jail Guards. The New York Times, pp. 1A, 9A.

Thursday, October 24, 2019

Annotated Bib. a Separate Piece

Juan Carlos Garcia Ms. Garcia A. S. English 3-4 20 November 2012 A. S. English 3-4: An Annotated Bibliography Knowles, J. (1959). A Separate Peace. New York: The Macmillan Company In this nonfiction book based in the years of World War 2, the tragedy that happened to Finny during a summer at Devon set the topic for the story about the novel. During a summer at Devon Finny’s best friend, Gene, who is thoughtful and intelligent and had also developed a love-hate relationship with Finny, made a decision that would end in the death of Finny.They day when Leper, Gene, and Finny were all jumping off a tree at the Devon River there was a serious accident. When Gene and Finny were on a branch in the tree Gene spasmodically decided to shake the branch in order for Finny for all off, although Gene would never admit this to be true. Finny broken his leg and was practically crippled. This â€Å"accident† came to be the main aspect of A Separate Peace. Directly after the accident Br inker was interested in what actually happened that day at the river since it was accepted that Finny just fell off.One day when Gene was alone in his form room Brinker and his friends forced Gene down to the butt room, a room where smoking was allowed. Brinker further investigated that day during the summer by interrogating Gene. Gene felt uncomfortable so he fled. As he returned to his room he saw a very familiar face, it belonged to Finny. Finny had returned from resting at his house after the accident. Life went on and Finny continued to be the leader he was born to be, he instigated a snow ball war and school carnival.Towards the end of the boys’ final year in high school, Brinker gathered all the seniors in order to find the truth of that summer day. Slowly but surely Finny began to remember more and more of that day. What finally set him off to realize what Gene did was the return of Leper. Leper enlisted and went out to the war but began seeing things so people though t he was delusional, so he ran away to his mother’s house and ended up wandering around Devon.At the senior boys’ meeting Leper revealed that while by the base of the tree and looking up at the branch where Finny and Gene were, he saw the shape of a body make a sudden move then he saw the other body fall from the trees. When Finny realized what Gene did he broke out in tears and stormed out of the room. While he was leaving Finny fell down a marble stairway and broke his leg again. The doctor said not to worry for this was a clean break and an easy fix.During surgery on Finny’s leg a bit of marrow escaped from the bone as he was setting it, entering Finny’s bloodstream and stopping his heart. Finny died. This book has a very good theme but was not written to entertain the mind of a high school teen. The theme of friendship and the theme of telling the truth instead of hiding from it can help you overcome problems with your friend helped me out in life per sonally. I saw how what someone can see as white lie can produce even worse problems than the problems that would occur for telling the truth.I have been in situations where I could easily get out of a dilemma by lying but it was exceptionally wrong to do so. I thought this story was boring because besides Finny’s death, Finny falling out of the tree, and the â€Å"trials† on Gene there wasn’t much action. The writing of Knowles taught me to always do what is right no matter the consequence for it, because there may be greater consequences for not telling the truth.

Wednesday, October 23, 2019

Americans with a Better Cause (Abc), a Nonprofit Organization Essay

According with what we learned so far and the book, there are 4 sources of American law. The U.S. Constitution and the constitutions of the various states. Statutory law—including laws passed by Congress, state legislatures, or local governing bodies. Regulations created by administrative agencies, such as the Food and Drug Administration. And finally, case law and common law doctrines. In the case of a federal statute conflicting with the United States Constitution then the Constitution will take priority as it has throughout history of the U.S. Supreme Court. If a federal law is in direct conflict with a state statute, where the â€Å"supremacy clause† is valid, such as interstate commerce for example, then the federal law will be superior. However, if the federal law is NOT one that the federal government has exclusive control over, then the state constitution will control unless the federal government can show there is government need that is greater, as in the case of a national emergency, for example. The U.S. Constitution will always have priority if any law is in violation of it regardless of what its source. If a state constitution does not violate the U.S. Constitution of federal law then it is supreme within the state’s borders, thus in both cases the U.S.Constitution will always prevail. Hence in the case above the DOJ enforcing the constitutional laws trumps the ABC suit conflicting with state law. The U.S. Constitution will always trump any federal statute but it is irrelevant if a federal statute conflicts with a state constitution due to the supremacy clause. US Constitution Art VI, Clause 2 â€Å"This Constitution, and the Laws of the United States which shall be made in Pursuance thereof; and all Treaties made, or which shall be made, under the Authority of the United States, shall be the supreme Law of the Land; and the Judges in every State shall be bound thereby, any Thing in the Constitution or Laws of any State to the Contrary notwithstanding.† Therefore, in settling the constitutional question would, if upheld, eventually by the U.S.Supreme Court if necessary, end the case. But, if not upheld or thrown our of court, then it would have to go to the state court and this might set up another Constitutional challenge, involving again, taking it to the U.S.Supreme Court again.

Tuesday, October 22, 2019

When I Was Puerto Rican essays

When I Was Puerto Rican essays Growing up in Puerto Rico, Esmeralda Santiago experienced life in a variety of ways. Through her book she shares a number of these experiences, many that played an important role in shaping her as an individual. She shows her experiences from the earliest part of her youth through her life as young adult. Of the many experiences Santiago shares, I think here experiences she lives through while living in El Mangle, as well as in Sabana Grande were two specific periods in her life that helped shape her individuality. Living in the barrio of El Mangle, according to Negi, was an awful place to live. She seemed to develop her opinion the moment she was greeted by the horrible stench in the air. Her experiences with the school in El Mangle, I thought, in some ways became valuable tools shed eventually use in crisis situations. One experience Negi describes during an embarrassing moment showed that there was probably an even earlier interest in performing arts than Negi had originally anticipated. As Negi attempted to solve the math problem center stage, with a bloodthirsty audience looking on, her performing skills had already began to develop. She had no idea that she would be asked to replay a similar role in the future. Being called an ignorant jibara and immediately defending herself presented an unyielding attitude that Negi would benefit in a world of performing. When she describes herself leaving her body, her description of the process resembles a popular scene used in some movie scr ipts. Often time writers will have a particular scene written in their movies where they use a similar process. The deceased man watches the doctors pound on his chest in an attempt to revive him or the woman killed in an automobile accident watches her children mourn as shes laid to rest. Little does she know, but this art of removing the soul from her body, which Negi does, allows her to amaze a panel of judges at her auditi...

Monday, October 21, 2019

Free Essays on The Battle Of The Alamo

The Battle of the Alamo Alamo is the Spanish word for â€Å"cottonwood† and was originally named mision San Antonio de Valero and has been a part of Texas history since 1724. During the early 1800’s a Spanish military cavalry referred to the old mission as the Alamo in honor of their hometown Alamo de Parrass, Coahuila. The Alamo served as a home to missionaries and Indians but most of its inhabitants have been soldiers. The Alamo was home for Revolutionaries and Royalists during the ten-year struggle for Mexican independence. The Alamo was even occupied by Spanish, rebel, and Mexican forces until the Texas Revolution. December 1835, Ben Milam and a group of Texan and Tejano volunteers were involved in a nasty skirmish with Mexican troops quartered in the city of San Antonio. Finally after five days of fighting, General Martin Perfecto de Cos and his soldiers were forced to surrender. The volunteers than occupied the Alamo and strengthened its already fortified defenses. All was good until February 23, 1836. After losing San Antonio to the Texans during the Siege of Bexar, Mexican General Santa Anna determined to retake this key location and at the same time impress upon the Texans the futility of further resistance to Mexican rule. The arrival of General Antonio Lopez de Santa Anna and his army nearly caught the volunteers by surprise. Nonetheless, the Texans and Tejanos prepared to defend the Alamo together and they did for thirteen long days against Santa Anna’s army. The commander of the Alamo was Colonel William B. Travis. He sent out couriers to communities in Texas pleading for help. On the eighth day of the siege, a small gathering of thirty-two volunteers arrived from Gonzales, bringing the total number to nearly two hundred. These freedom fighters knew that the Alamo was essential to the defense of Texas and they were ready to die rather than surrender to the Mexican army. As legend goes, Colonel Travis drew a l... Free Essays on The Battle Of The Alamo Free Essays on The Battle Of The Alamo The Battle of the Alamo Alamo is the Spanish word for â€Å"cottonwood† and was originally named mision San Antonio de Valero and has been a part of Texas history since 1724. During the early 1800’s a Spanish military cavalry referred to the old mission as the Alamo in honor of their hometown Alamo de Parrass, Coahuila. The Alamo served as a home to missionaries and Indians but most of its inhabitants have been soldiers. The Alamo was home for Revolutionaries and Royalists during the ten-year struggle for Mexican independence. The Alamo was even occupied by Spanish, rebel, and Mexican forces until the Texas Revolution. December 1835, Ben Milam and a group of Texan and Tejano volunteers were involved in a nasty skirmish with Mexican troops quartered in the city of San Antonio. Finally after five days of fighting, General Martin Perfecto de Cos and his soldiers were forced to surrender. The volunteers than occupied the Alamo and strengthened its already fortified defenses. All was good until February 23, 1836. After losing San Antonio to the Texans during the Siege of Bexar, Mexican General Santa Anna determined to retake this key location and at the same time impress upon the Texans the futility of further resistance to Mexican rule. The arrival of General Antonio Lopez de Santa Anna and his army nearly caught the volunteers by surprise. Nonetheless, the Texans and Tejanos prepared to defend the Alamo together and they did for thirteen long days against Santa Anna’s army. The commander of the Alamo was Colonel William B. Travis. He sent out couriers to communities in Texas pleading for help. On the eighth day of the siege, a small gathering of thirty-two volunteers arrived from Gonzales, bringing the total number to nearly two hundred. These freedom fighters knew that the Alamo was essential to the defense of Texas and they were ready to die rather than surrender to the Mexican army. As legend goes, Colonel Travis drew a l...

Sunday, October 20, 2019

A Tree Grows in Brooklyn Paper

In the world that Betty Smith describes in â€Å"A Tree Grows in Brooklyn† however, this poverty is depicted as a kind of virtue, a force that causes individuals to grow, and families to bond c. Yet, while female characters like Katie and Francie grow from overcoming the hardships brought on by poverty, Francie’s father Johnny Nolan is defeated by it and ends up dying of alcoholism. In the 1900’s, gender roles and social expectations of men and women were more rigid than today, and both sexes were supposed to stay within gender boundaries d. In telling the story of Katie and Johnny Nolan, Betty Smith reveals how often times immigrant women like Katie, who went against gender stereotypes, survived and grew from the hardships of poverty, while men like Johnny, who tried to fulfill their gender role, were defeated by it. II. 1ST Body paragraph a. In the beginning of the novel, he has found a job, but it is as a low paying waiter and unstable. Even so, he dresses with style, is handsome, and seems content being a singing waiter. He is able to bring home money to his wife, Katie. His daughter, Francie always helps him get his bow tie on and he calls her â€Å"pre-Madonna,† then she eagerly awaits his return with her brother Neely, for he always bring back treats like caviar and oysters. They are a happy family. However, Johnny loses his job and his family becomes more and more hungry, but he can’t help them. He can’t find another job i. In the early 1900’s, men were supposed to provide for their family, but as Johnny Nolan illustrates, this was hard for immigrant men. ii. Perhaps not being in control and not being able to bring home money to his family makes him feel like a waste and a failure, for as the story goes on, he drinks more and more until he dies of alcoholism. Katie tries to help her husband, â€Å"She told him it was a good thing, that suffering would harden him, would teach him such a lesson that he’d stop drinking. But poor Johnny just wouldn’t harden. † (P. 98) iii. Johnny grew up with the gender stereotype of the man of the house being the â€Å"breadwinner†, and in the Irish American community in Brooklyn, he cannot fulfill this role. III. 2ND Body paragraph i. Yet, Katie has no choice and even though the cleaning job she finds does not pay well, she goes out to work ii. In contrast, Katie, Francie’s mother, is able to overcome poverty because she breaks down the gender stereotypes of what a married woman should do in her time; Katie goes out of the house to work. At that time, were expected to stay home and be cared for while caring for the children iii. Yet, Katie has no choice and even though the cleaning job she finds does not pay well, she goes out to work. Thus, as she faces poverty, we see Katie rise to the challenge by being flexible. In contrast to Johnny, she is able to experience poverty as a learning experience and change. At one point she says to passersby, â€Å"Look at that tree growing up there out of that grating. It gets no sun, and water only when it rains. It’s growing out of sour earth. And it’s strong because its hard struggle to live is making it strong. My children will be strong that way. † IV. 3RD Body paragraph a. Johnny and Katie Nolan, exemplify a theme of gender difference in the overcoming of poverty for immigrants i. Katie is flexible and able to adapt, so she eventually obtains a better life. She does not stay within her gender role of remaining in the house, but goes out to work. In contrast, Johnny is unable to be as flexible and his stubbornness in keeping within his gender role and his own idea of his responsibility to his family eventually destroys him ii. Betty Smith does not judge Johnny in her novel, but rather portrays him as a sympathetic and highly likeable, but he is a conflicted and ultimately tragic character. V. Conclusion paragraph a. In the patriarchal society of the early 1900’s that Betty Smith describes in her book â€Å"A Tree Grows In Brooklyn†, it would seem logical if women did not fair as well as men in times of difficulty. After all women had fewer rights. They could not vote or get the same wages as men i. By going against gender stereotypes, Katie is able to persevere and overcome poverty, while her husband, Johnny Nolan, who tries to follow them, is defeated iii. In 2012 many women have broken gender boundaries; Hilary Clinton is Secretary of state, Lady Gaga and Beyonce are millionaires and international pop stars. Men too have broken out of gender stereotypes for it is socially acceptable for men to work at home and even earn less than women. In â€Å"A Tree Grows In Brooklyn, â€Å" however, Betty Smith captures a world, gone now, in which strict gender roles defined a person’s life. But for immigrants, trying to make a start in America, the need to adapt and go against these gender roles was critical. A Tree Grows in Brooklyn Paper In the world that Betty Smith describes in â€Å"A Tree Grows in Brooklyn† however, this poverty is depicted as a kind of virtue, a force that causes individuals to grow, and families to bond c. Yet, while female characters like Katie and Francie grow from overcoming the hardships brought on by poverty, Francie’s father Johnny Nolan is defeated by it and ends up dying of alcoholism. In the 1900’s, gender roles and social expectations of men and women were more rigid than today, and both sexes were supposed to stay within gender boundaries d. In telling the story of Katie and Johnny Nolan, Betty Smith reveals how often times immigrant women like Katie, who went against gender stereotypes, survived and grew from the hardships of poverty, while men like Johnny, who tried to fulfill their gender role, were defeated by it. II. 1ST Body paragraph a. In the beginning of the novel, he has found a job, but it is as a low paying waiter and unstable. Even so, he dresses with style, is handsome, and seems content being a singing waiter. He is able to bring home money to his wife, Katie. His daughter, Francie always helps him get his bow tie on and he calls her â€Å"pre-Madonna,† then she eagerly awaits his return with her brother Neely, for he always bring back treats like caviar and oysters. They are a happy family. However, Johnny loses his job and his family becomes more and more hungry, but he can’t help them. He can’t find another job i. In the early 1900’s, men were supposed to provide for their family, but as Johnny Nolan illustrates, this was hard for immigrant men. ii. Perhaps not being in control and not being able to bring home money to his family makes him feel like a waste and a failure, for as the story goes on, he drinks more and more until he dies of alcoholism. Katie tries to help her husband, â€Å"She told him it was a good thing, that suffering would harden him, would teach him such a lesson that he’d stop drinking. But poor Johnny just wouldn’t harden. † (P. 98) iii. Johnny grew up with the gender stereotype of the man of the house being the â€Å"breadwinner†, and in the Irish American community in Brooklyn, he cannot fulfill this role. III. 2ND Body paragraph i. Yet, Katie has no choice and even though the cleaning job she finds does not pay well, she goes out to work ii. In contrast, Katie, Francie’s mother, is able to overcome poverty because she breaks down the gender stereotypes of what a married woman should do in her time; Katie goes out of the house to work. At that time, were expected to stay home and be cared for while caring for the children iii. Yet, Katie has no choice and even though the cleaning job she finds does not pay well, she goes out to work. Thus, as she faces poverty, we see Katie rise to the challenge by being flexible. In contrast to Johnny, she is able to experience poverty as a learning experience and change. At one point she says to passersby, â€Å"Look at that tree growing up there out of that grating. It gets no sun, and water only when it rains. It’s growing out of sour earth. And it’s strong because its hard struggle to live is making it strong. My children will be strong that way. † IV. 3RD Body paragraph a. Johnny and Katie Nolan, exemplify a theme of gender difference in the overcoming of poverty for immigrants i. Katie is flexible and able to adapt, so she eventually obtains a better life. She does not stay within her gender role of remaining in the house, but goes out to work. In contrast, Johnny is unable to be as flexible and his stubbornness in keeping within his gender role and his own idea of his responsibility to his family eventually destroys him ii. Betty Smith does not judge Johnny in her novel, but rather portrays him as a sympathetic and highly likeable, but he is a conflicted and ultimately tragic character. V. Conclusion paragraph a. In the patriarchal society of the early 1900’s that Betty Smith describes in her book â€Å"A Tree Grows In Brooklyn†, it would seem logical if women did not fair as well as men in times of difficulty. After all women had fewer rights. They could not vote or get the same wages as men i. By going against gender stereotypes, Katie is able to persevere and overcome poverty, while her husband, Johnny Nolan, who tries to follow them, is defeated iii. In 2012 many women have broken gender boundaries; Hilary Clinton is Secretary of state, Lady Gaga and Beyonce are millionaires and international pop stars. Men too have broken out of gender stereotypes for it is socially acceptable for men to work at home and even earn less than women. In â€Å"A Tree Grows In Brooklyn, â€Å" however, Betty Smith captures a world, gone now, in which strict gender roles defined a person’s life. But for immigrants, trying to make a start in America, the need to adapt and go against these gender roles was critical.

Friday, October 18, 2019

Illegal Immigration & US Economy Research Paper

Illegal Immigration & US Economy - Research Paper Example Two third of legal immigrants - that is, 50 percent to 70 percent of current total immigrant inflow - are not likely to undergo civic inspection. In accordance with the general assumption of people, legal immigrants have a positive effect on nation’s economy whereas illegal immigrants have negative effect. Irrespective of the differences in the legislative body, majority of individuals believe that United States economic welfare will improve only if the number of illegal immigrants decreased. From an entirely economic point of view, the best immigration strategy would admit those whose talents are in shortest supply and whose tax inputs are as large as achievable. United States can get the maximum possible raise in revenues by hiring immigrants in scarce professions, irrespective of their skill level. In the United States, scarce employees would incorporate not just highly learned persons, for instance, the computer programmers and engineers employed by quickly growing technology industries, but also low-skilled employees in manufacturing, groceries preparation, and cleaning services, for which the supply of U.S. local labor has been declining. In either case, the national manual labor market for these recruits is rigid, in the sense that U.S. incomes for these professions are high as compared to incomes abroad (Chomsky, p. 109). Illegal immigration has apparent flaws. The constant increase in number of illegal immigrants can become a threat for the state of law and can also deteriorate the government’s capability to impose laws on labor market. ... From an entirely economic point of view, the best immigration strategy would admit those whose talents are in shortest supply and whose tax inputs are as large as achievable. United States can get the maximum possible raise in revenues by hiring immigrants in scarce professions, irrespective of their skill level. In the United States, scarce employees would incorporate not just highly learned persons, for instance, the computer programmers and engineers employed by quickly growing technology industries, but also low-skilled employees in manufacturing, groceries preparation, and cleaning services, for which the supply of U.S. local labor has been declining. In either case, the national manual labor market for these recruits is rigid, in the sense that U.S. incomes for these professions are high as compared to incomes abroad (Chomsky, p. 109). Illegal immigration has apparent flaws. The constant increase in number of illegal immigrants can become a threat for the state of law and can a lso deteriorate the government’s capability to impose laws on labor market. This increase in number also place United States at the higher risk of terrorism, even though no illegal immigrant is ever charged for terrorist activity. Huge inflows of illegal foreigners also lighten up the dedication of employers to U.S. labor market associations and form a population of employees with restricted upward mobility in addition to a doubtful place in U.S. society. There are several reasons to be worried about increasing levels of illegal immigration. Yet, it is important not to lose sight of the reality that illegal immigration has an apparent economic sense. It gives U.S. companies the types of human resources they would like to have. If

Media Torrent Essay Example | Topics and Well Written Essays - 750 words

Media Torrent - Essay Example In his article â€Å"Supersaturation, or The Media Torrent and Disposable Feeling†, Todd Gitlin states his observation and provides sufficient evidence supporting the fact that media has great influence on our lives. Right from the time of emergence of television and internet, media has been influencing the lives of individuals whether it is through print, television, films or social networking websites. However one may take into account the fact that the notion of media saturation has gone through several significant amendments since the time Gitlin’s article was published. There are many evidences illustrated by Gitlin that support his ideas of â€Å"super-saturation† and â€Å"disposable feeling†. The literal meaning of â€Å"super-saturation† is to increase the concentration of solution beyond saturation. The word â€Å"super-saturation† is used by Gitlin for defining the notion that how the modern society has completely absorbed the internet and media. The society is completely immersed in the images and gossips that are being displayed by media. There is no clear line present, which distinguishes living space from working space. Outer world has invaded the inner world of people. Gitlin uses the phrase â€Å"disposable feeling† because individuals today are easily switching from one feeling to another, one scandal to another, without making effort to actually find out the hidden truth. I completely agree with Gitlin’s idea that media has its impact on our lives through several means and its component have gr adually immersed in our daily. We can easily observe the amount of movies and TV shows being watched and quantity of CD’s and cameras being used in today’s modern world. Gitlin states that the extensive use of internet has not diminished the use of media but has affected the flow of unlimited media. I do support the fact presented by Gitlin that Internet has revolutionized the use of media. Our hyper-mediated world is affected by internet to a great extent converting us from media users to media producers (Gitlin). Gitlin’s article to some extent downplays the massive influence that internet had on the society at the time it was penned. Despite of this fact many of the points suggested by Gitlin are still valid in today’s world. The emergence of the social networking website â€Å"Facebook† is the example of the actualization of Gitlin’s observation. This website is known for providing its users with hyper-mediated experience as it allows th em to upload photos, videos, texts and provide them variety of ways through which they are allowed to express themselves. Facebook media is different from the inherent media as on this social networking website a mass population is acting of watching other people’s activities. 600 million Facebook users actively participate in this process of acting and watching. They create their own replicas through their profiles. People become kings, queens, demons, angels and adopt the character of their choice, which is far away from reality. These websites have created a virtual world that is far from reality. Gitlin has also stated that individuals today have the authority to create their own content. This proposition of Gitlin can be easily implied to the communicative quality of Facebook where individuals develop their original content and portray it in a way different from reality. The experience of their life is no

Global Operations Management of Wal-Mart Essay Example | Topics and Well Written Essays - 1250 words - 2

Global Operations Management of Wal-Mart - Essay Example The paper tells that global supply chain management focuses on the process of planning and optimizing the different international and local processes of procurement, production, and distribution. In order to manage the global or international supply chain in effective and efficient manner, it is required to integrate all supply chain partners in the overall process. Wal-Mart is operating in the industry of international retailing for a couple of years. The company has been in the business of providing different products and goods to the end consumers all over the world. Wal-Mart is known to be one of the largest retail organization in the global industry. Apart from different physical superstores and hypermarkets, Wal-Mart has also entered into the industry or electronic commerce by offering products through online retail stores. Wal-Mart has been able to create the competitive edge in the industry on the basis of considerably low prices. And for this, it has used efficient and effec tive supply chain strategies to increase the responsiveness of the global supply chain and at the same time increase the overall efficiency of the supply chain. Wal-Mart has been able to integrate different stages and partners of the supply chain together with the help of different technological systems like Enterprise Resource Planning (ERP) system. The supply chain of Wal-Mart is more complicated because of the fact that it has to integrate different manufacturers in the whole process. For example, the let's consider the example of a simple detergent provided by the company. Production is about producing and manufacturing different products and goods. In reference to Wal-Mart, the main function of production is handled by different manufacturers and Wal-Mart focuses on the process of making these products

Thursday, October 17, 2019

Modernity and Modernism Essay Example | Topics and Well Written Essays - 2000 words

Modernity and Modernism - Essay Example The essay "Modernity and Modernism" analyzes the impact of modernism and modernity in the context of the history and culture. In the following parts of this paper, first history of modernism has been included in which a limited introduction of modernism from World War II and evolutionary changes in the architecture, craft, art and design have been provided. It is followed by the segment Le Corbusier’s monuments in Chandigarh in which they have been analysed in the light of the relevant theories. Before the conclusion, the idealist modernism part has been provided. Modernism is both evolutionary and revolutionary process. It does not remain the same but kept changing with the changes social, cultural, economic, personal, and other dimensions of today’s modern society. After the world war one, social, cultural and economic change was felt in which culture; art, design and architecture were mainly affected by the appetite for the change played the main role in this endeavo ur. However, it gained particular momentum particularly after the world war two in which more revolutionary thinking for economy; political activism affected the modernism in which a substantial amount of cultural change was experienced. Two world wars severely affected the modernism and developments taking place in the field of art, design, architecture and craft. In the World War II, millions of people died in which people from involved states as a whole lost sight on the sustained growth and stability of economic and cultural factors.

Geological Society of America Assignment Example | Topics and Well Written Essays - 250 words

Geological Society of America - Assignment Example The presence of these plates can be confirmed by the appearance of oceanic trenches when these plates sink beneath one another. These trenches can run for hundreds of miles. Another evidence of their existence and activity is the formation of ridges where these plates pull apart. Transform faults also form where the tectonic plates slide to opposite sides of each other (Eckel, 1982). The movement of plates was used to settle the debate on how the island arcs, both continental and oceanic, form. Island arcs form where oceanic and continental, oceanic or transitional plates sink beneath each other. The past decades saw the geoscience community reject research and theories on the formation of island arcs based on the tectonic plates. To add to this conflict, there was conflicting continent formation theories based on tectonic plates. One considered seafloor-spreading while the other was in favor of pieces of continents afloat dense oceanic

Wednesday, October 16, 2019

Lin200 final Assignment Example | Topics and Well Written Essays - 500 words

Lin200 final - Assignment Example 24. Localization is about the examination and study of various parts of the brain that carries out specialized functions in the learning and mastery of language. This is because different parts of the brains carry out various functions and the use of MRI scans and other things show the development of matter around various parts of the brain. Researchers indicate that language acquisition significantly alters the brain and parts of it. The left hemisphere of the brain and right hemisphere have specialized functions they each perform. For example, the Broca’s area is known for syntax learning. 26. A. Nonrefundable: non-refund-able; Category – Compounding form adjective; Root – Refund; Bases – Refund (verb), Able (adjective), Non (Adjective). Inflectional Affix: â€Å"Non† negating â€Å"Refund†; Derivational Affix: the connection of the first two roots with â€Å"–able† gives it a state or form. 28. A. Coordination is a problem with this because crippled and landing are somewhat problematic; There are also topicalization issues and there is also a problem with the pro-form substitution so I think it fails the test; B. There are some coordination issues with this sentence. â€Å"Took† does not seem to get along well with â€Å"to the garage†. There seem to be some issues with pseudo-clefting in this sentence as well. The sentence is grammatically correct, but has some few gaps. 32. Linguistic Relativity: This is the view that the nature and structure of a given language defines the worldview of its speakers. It posits that language and its structure determines the thought of its speakers. An example is the case of languages being specialized in certain worldviews and thoughts and helping to promote certain activities. For instance, Hebrew is structured to ensure that its speakers tilt towards a given worldview of Judaism and Jewish customs. 33. Homographs are words

Geological Society of America Assignment Example | Topics and Well Written Essays - 250 words

Geological Society of America - Assignment Example The presence of these plates can be confirmed by the appearance of oceanic trenches when these plates sink beneath one another. These trenches can run for hundreds of miles. Another evidence of their existence and activity is the formation of ridges where these plates pull apart. Transform faults also form where the tectonic plates slide to opposite sides of each other (Eckel, 1982). The movement of plates was used to settle the debate on how the island arcs, both continental and oceanic, form. Island arcs form where oceanic and continental, oceanic or transitional plates sink beneath each other. The past decades saw the geoscience community reject research and theories on the formation of island arcs based on the tectonic plates. To add to this conflict, there was conflicting continent formation theories based on tectonic plates. One considered seafloor-spreading while the other was in favor of pieces of continents afloat dense oceanic

Tuesday, October 15, 2019

There Is No Such Thing as a Job for Life Essay Example for Free

There Is No Such Thing as a Job for Life Essay This notion seems to pose as a self evident statement, but in reality it has become a common truth a couple of decades ago. Statements such as â€Å"One in three workers remain in a job for less than two years†¦Ã¢â‚¬  (Trapp, 1995) make their way to the public at a constant rate increasing its validity. In the following essay we are going to assess the basic historical changes that have led to an unstable and fluctuating job market while providing the necessary explanation concerning the effects that shape our current situation. Furthermore we are going to examine how globalisation acts as a catalyst to these circumstances. In order to address this issue we have to take into consideration the historical background that has led to this notion. I am going to concentrate on one of the people that made the most important steps on the concept of production relating their work to its current form. I’m going to address the work of F. W. Taylor that was the theorist that put together what Henry Ford, the second persona, put into action through the assembly line. Taylor’s aim was to optimise the production of a product by focusing on two main aspects. The first was to break down the process of production into the smallest possible component, a process known as specialisation, and in advance to limit the time frame that each step needed to completion. This was named by Taylor as a division of labour in time and motion. In order to achieve that Taylor manifested a number of methods, such as the training workers into mastering a simple and specific task so that they didn’t have to put any mental effort into it that would have complicated the process. In order though to control this massive chain of production Taylor had to take into consideration a way to monitor it. That’s where Taylor introduced the principle of management where the working labour that its job was the systematic repetition of a task was supervised by a number of managers that were to compensate for the lack of any mental activity carried out by the rest of the workforce. Taylor’s theoretical contributions were justified my his belief that the one best ethod and best implementation can only be discovered or developed through scientific study and analysis†(Taylor,1964, 131) but his analysis failed to consider the implications that his methods have brought upon the workforce; even though they may have renovated the industrial world its side effect was the creation of a new generation of deskilled and demotivated workers. And as we observe this is not an issue of the past since all the assembly lines still work within the framework that Taylor f irst implemented, from a highly technological product to the simplest household item. This paragraph is going to focus on the problems that appear by the deskilled labour force and how this affects its employability. Deskilling as it’s defined by the Oxford Dictionary is â€Å"†¦the process by which skilled labor within an industry or economy is eliminated by the introduction of technologies operated by semiskilled or unskilled workers. † This elimination raises a number of issues, firstly is the issue of the working satisfaction of the labor force. By stripping the creativity out of the labor force’s job you are creating a level of dissatisfaction. This dissatisfaction is due to the fact that the reward that the workers get by the creativeness that they used to assert is now lost; even if in most cases it has been replaced by a higher payroll this didn’t seem to cover the damage. As Noon and Blyton (1997, 147) put it â€Å"The dehumanising effects can often be seen in the glazed expressions of the young people who serve. Thus you have a new generation of deskilled workers that lacks the confidence to interact with their working place or any working place, a worker that’s alienated who is not only less able to keep up with the increasingly demanding working environment but is less able to mobilize in any other work place. The other issue that arises from this deskilling that exists in the secondary sector is that for a deskilled worker it’s easier to become redundant. This is the case since the semiskilled workers may have gone through a sophisticated and elaborated training but their training only covered the absolutely necessary aspects of their specific task. This may be considered as a form of upskilling but in its essence is just another component making the worker more dependable to his current job in an epoch that the job market is becoming more and more contestable. The rise in the employments market contestability is largely dependable to the role of globalisation and up to a certain extend has played a main role to the instability that is currently present. Financial Times (Stern, 2012) defines globalisation as â€Å"†¦the integration of economies, industries, markets, cultures and policy-making around the world. † Therefore one cannot argue that it has contracted the employment market as well as any other market. This contraction is a result of the â€Å"widening deepening and speeding up of worldwide interconnectedness† (Baldry, 2007, 40) providing chances for people to compete in any market from anywhere in the world. That’s not an issue to the well rounded and highly trained workers, but it raises a number of concerns for the semi-skilled workers that add up to the overwhelming majority of the working population. They are faced with a crisis that not only have not caused but are also unable to confront. They have to compete against people from countries that are less paid and better trained causing the unemployment figures to rise dramatically as the IMF(Slaughter and Swagel, 1997) states here â€Å"there is no doubt that globalisation has coincided with higher unemployment among the less skilled and with widening income inequality. Other than that there are cases of mass shifts in the markets where companies assign projects to foreign countries that were previously based at home. We observe that for example in the telecommunication industry where the telephone helpdesks of British companies get assigned to Indian stated firms that offer a better deal due to the lower wages provided to the Indian workforce; making this abstract, as it is generally perceived, mobilisation of the industry more rigid and more challenging. Coming to an end I can’t avoid emphasizing on the statements vitality and the public concern that this raises. A statement that has never been more accurate than now; and as we observe notions such as Globalisation and Division of labour rooting and becoming embedded to our culture and our society this issue will not only rise but become untreatable. Therefore either some steps have to be made forward or the trust towards the socio-political system will start shaking from its foundations.

Monday, October 14, 2019

Internet Threats and Security for Protection

Internet Threats and Security for Protection Introduction Technology is still under development in Saudi Arabia and has not reached the advance level as its reached in UK and USA. Therefore Internet Security is still a main as well as a major issues to most businesses and organisations in Saudi Arabia. Media hype surrounding the topic of Internet security can scare the general public, as the novice users. The continual talk of the latest virus alerts, which have corrupted thousands and stories of teenagers hacking into networks and stealing numerous informations such as personal details, credit card details other details which relates to different institution, is enough to put anyone off the idea using their personal details over the Net. All this media hype needs to be addressed to see if it is just that, or is there a ground for all this sensationalism. The chances to actually undergo extensive research and establish leads and ideas that I have not come across before about Internet Security, it is a major challenge for me and I feel that by conducting this research it will broaden my knowledge about Internet Security and also make people understand the aspects of Internet Security which they havent come across before. Abstract This dissertation looks at the question: ‘Is The Internet Secure?. Where secure is defined as ‘secure enough to trade or pass information via the Internet. With the constant media hype of Internet Security, it felt that this title to be one of interest and appealed. Therefore, research include, determining what types of organisations are present on the net, and categorising them into several groups. Studying past literature to determine all possible threats on the Internet and then to discuss possible solutions to these threats. As society is in the information revolution, in which the Internet is the main channel for distribution, this area of research is related to each and every one of us. Internet trading is a common practice amongst the new age. However, this is a subject that needs to be addressed to see whether all this ‘Media Hype is just that, or is their just grounds for concern. With the number of users on the Internet growing daily, and businesses becoming completely dependant on technology, serious issues of vulnerability need to be looked at. To ensure that no gaps appear in the security aspects of Internet, which will in turn trap the new users. Conclusions where made by in viewed and researched based companies. This research aims to provide the reader with a deeper understanding of Internet Security. The Internet is a medium that will be a part of future generations, and it is paramount that it is managed correctly and to ensure it does not have devastating consequences for those involved in its operation. The research carried out draws the conclusion, that the Internet is not a secure for trading, and that a regulatory body is required or a more structured policing. Therefore more actions from organisations are needed as well as from the government. Future research can concentrate on data recovery methods, application methods and interviewing in more depth and on a longer scale. Acknowledgement Chapter Outline Chapter1: The introductory of this chapter starts with the definition of I.T security. It follows on with what the aims and objectives are and the methodology followed during the fact finding exercise. The chapter outlines the scope and the limitations of the project. Chapter 2: This chapter describes how the internet was formed and how it has developed. Finally it highlights the key developments of the internet throughout its early life cycle, and the growth of its user base. Chapter 3: Defines the types of businesses that trade on the net categorising them into several divisions, which are further explained in the appendix. This chapter also talks about on-line banking and how to purchase over the Internet. Chapter 4: Starts by discussing the potential threats of viruses, how they work and how they spread. It also discusses what different authors believe to be the main threats of the Internet. It also talks about all the potential threats and briefly defines each one. Chapter 5: Discusses the potential answers to the security issues, broadly discussing all of the security applications available. The chapter introduces computer security as well as the different application. Chapter 6: The fact finding stage highlights the responses gained from the organisations, which were interviewed. The findings were incorporated into graphs to illustrate the answer. Chapter 7: To conclude this study, the author discusses what the project aims were, how the findings were achieved and why came to this conclusion. A SWOT analysis was also carried out to assist the conclusion. Appendix: Any information that did not fit in the thesis, which the author felt important, is included in the appendices. There are also other documents and information, which has been referenced in the dissertation in the appendices. I.T security as defined in this dissertation is the practices, procedures, applications and services which ensure a security breach or loss of use of a computer system does not occur. Security provides protection for IT system resources from human action. The security products, services and procedures used will aim to protect any hardware or data in the system. 1 Introduction Media hype surrounding the topic of Internet security can scare the general public, as the novice users. The continual talk of the latest virus alerts, which have corrupted thousands and stories of teenagers hacking into networks and stealing numerous informations such as personal details, credit card details other details which relates to different institution, is enough to put anyone off the idea using their personal details over the Net. All this media hype needs to be addressed to see if it is just that, or is there a ground for all this sensationalism. 1.1Human Action Human-inspired security breaches are defined as accidental or deliberate, passive or active attacks, which result in the loss or damage of I.T system hardware, software or data. This can come in many guises, as the following shows: Viruses where a program is placed on a system with the intention of corrupting its processing. The theft of data. Hacking deliberately gaining unauthorised access to a computer system. The invasion of privacy, through the unauthorised disclosure of data and breaches of data protection legislation. Sabotage interfering with the processing of a system, such as the placing of a ‘clone machine. 1.2The Key areas of I.T Security I.T security involves a number of key areas. The most important of these are introduced under the following headings. 1.2.1 E-Commerce E-Commerce (Electronic Commerce) enables measures to secure web merchants sites from external hacking and intrusion, with the aim to develop secure online transactions. E-Commerce requires the means to engage in electronic transactions without the fear that credit card details and bank details could get into the wrong hands. These involve, for example, the use of secure payment servers and secure software servers. 1.2.2 Network Security The aim of network security is to create a secure environment in which the users can send classified information and business applications solely to those people that they wish to receive them, preventing others from accessing the data. This is an issue of increasing concern, given the growing importance of networks to companies. This aspect of security tends to resolve around using network management and security software tools, and developing network security policies. 1.2.3 Virus Protection To prevent computer viruses from infecting I.T systems, companies use anti-virus software and alert systems. The requirements for information security as well as the type of products and services used to have undergone a major transformation since 1995. The need for security has widened, where traditionally it was confined mainly to governments, protecting classified data, financial institutions and protecting messages with monetary value, today most medium-sized to large organisations require information security. The growth of computer networks, group working and mobile working, and the subsequent need to communicate with contacts outside the organisation, has made I.T systems more open to external forces and more vulnerable to internal action. Today, security is demanded to handle communications through the internet, intranet, extranet and Virtual Private Networks (VPNs). All of these technologies use common, standardised networking protocols and such networks are exposed to greater security threats than before. In a modern computer network, employees share information with each other, and companies share information with their suppliers, partners and customers. This calls for a more sophisticated security system, which is more comprehensive and flexible than the products and services used in the past, and which can be deployed to a large number of users in a consistent, manageable and secure fashion. 1.3 Aims and Objectives Introduce and provide an overview of the development of the Internet. How it was started and how it works. Identify the diverse nature of businesses that trade on the Internet, their roles and their functions. Identify and disseminate the literature available on threats inherent in the use of the Internet including viruses and secure transmission of data. Identify and discuss the appropriate solutions for any potential threats for internet security. Evaluate and conclude the arguments, to discuss potential ways of enforcing a suitable security policy for web-based companies. 1.4 Methodology Information for this study was gathered from journals, books, Internet sources and certain company documentation pertaining to Internet security. The best form of methodology for this type of research would be to use Quantitative and Qualitative analysis as well as the use of secondary sources, as mentioned. Quantitative research was used to gain rich information, basically finding out the ‘experts opinions from the relevant areas of expertise, for the research. The qualitative research consisted of a questionnaire with open ended and some closed questions. The main aim of this questionnaire was to elaborate on the authors literature review, basically agreeing or disagreeing with the literature presented on this study. For the quantitative aspect of the research a short structured questionnaire was designed, this consisted of closed questions, which would give a statistical look to the fact-findings chapter. This questionnaire was distributed in Preston and Jeddah (Kingdom of Saudi Arabia). Closed question questionnaires were used to obtain the awareness of the issues presented, to gain views, beliefs and attitude to these. The questionnaires were designed to ensure easy reading, therefore overcoming any confusion on the respondents behalf. Questions were explained to ensure comple te reliability in their responses 1.5Limitations and scope of Dissertation As Internet Security is a very large topic, this author has limited his research to the following: Types of businesses on the web, categorising them in several areas. Discussing threats that past authors identified. Discussing possible solutions to these threats that past authors identified. Carrying out a first hand fact-finding excersing to either agree with the literature or disagree. Setting out the key differences. Summarising the thesis and presenting the findings. 2What is the Internet and how it started The revolution in computer networking has made it possible for personal computers able to communicate with each other. This chapter is about the Internet and basically a history of its beginning. It provides a comprehensive view of literature regarding factors that promote e-commerce and aid the new era of online banking. The scale of the Internet is awesome and therefore more and more people are connecting to the net. Statistics continues to grow on a daily basis at an alarming rate. People from all walks of life, not just the scientist, teachers and computer experts use the Internet. 2.1Origins of the Internet The Internet has its roots in a network set up by the United States Department of defence in the early 1970s (Ellsworth 1994). This network (ARPANET) was a collection of four computers. By 1996 the Internet was a collection of over 50,000 networks. The methods they slowly developed included a ‘Protocol (which is a computer language) allowing dissimilar computer systems to communicate, and a method that routed data through multiple communication paths using groups of data with their own destination addresses built in packets. Prior to this technology, even with machines that were compatible, the used had physically carry magnetic tapes and insert them into another machine in order to transfer data from one computer to another. With the new technology, a computer simply has to put its data into envelope called an Internet Protocol (IP) packet, and ‘address the packet correctly to send a message on the network. The philosophy was that every computer on the network could talk to any other computer. 2.2NSF Developments In the late 1980s the National Science Foundation (NSF), started expanding its own NSFNET using the technology developed by ARPANET.†(Krol 192). Five supercomputer centres at major universities were created, and connections were used for e-mail, and for transferring data and information between sites. This created a communications problem, they needed a way to connect their centres together and to allow the clients of these access. â€Å"In response, the NSF built its own network based on ARPANET Internet Protocol (IP) technology. â€Å"(Eraase 1994) it connected these centres with telephone lines. Since the telephone lines were paid for the mile, it was obvious that each university could not be connected to a supercomputing centre, due to financial constraints. They instead created regional chains of networks, with each university being connected to its neighbours, at the top of this chain there was a connection to the super computer. Eventually any computer was able to communicate with any other computer by forwarding the conversation through its neighbours. 2.3Internet Created The NSF agreed to commercial exploitation and on-line service sprang up. â€Å"CompuServe, the first of these, started in 1970 and fifteen years later claimed 3.2 million users in 20 countries. It was part owned by commercial relationships with the German group Bertelsmann and the French group Hachette† (Winston 1998). Prodigy belonged to IBM and Sears claimed 1.4 million users. His ‘World Wide Web was open for business in 1992. Meanwhile a commercial Internet Exchange had been established in 1991. Large multinational corporations have been on the Internet for years, although their access has been limited to research and engineering departments. In 1992, many of the restrictions on commercial use began to change. In fact, there are already more commercial sites on the Internet than educational and research sites combined, according to statistic, commercial addresses now comprise of 51% of the network domains. The Internet is made up of over 25,000 networks that can transfer data via many routes. However, it is near enough impossible to pin down any exact numbers concerning its size due to the fact its growth is unparalleled by any other industry. Ghosh 1998 states that the Internet has been adopted faster than any other technological development. 2.4The use of the Internet Between 1993 and 1998, more than 100 million users of the Internet were estimated, and the number of sites of the WWW has grown from 130 to 4.3 million sites. As of June 1999, the Internet users population has been placed at around 170 million people. It has been forecasted that the number users will reach 350 million by 2005 worldwide. In simple terms, the Internet allows millions of people all over the world to communicate and to share. â€Å"The Internet is the first global forum and the first global library† (Hahn and Stout 1994). Commercial businesses are the fastest growing segment of the Internet, you can gather information communicate and actually transact business on the Internet. Here are a few reasons why businesses are using the internet: E-mail is a low cost method for maintaining communication at all levels. Messages can be exchanged in minutes. E-mail is a domain for sharing information and is said to be one of the most important productivity packages around. The Internet allows businesses to be in touch with different branches and work teams at other locations. This creating a virtual community in which people are able to communicate on a daily basis. Using the Internet many organisations are able to bring a global edge to home grown businesses. For many companies, the use of the Internet creates a level playing field; smaller businesses can create an image on the network to compete with larger businesses. â€Å"Many corporations use the Internet to keep a check on the rate of emerging and new technologies, and the market response to these technologies† (Ellsworth 1994). The public information and discussion groups available on the Internet provide insight and feedback that is hard to get in any other manner. Here people from all levels of industry, exchange information on marketing research and technological developments. Having the most up-to-date information about your markets and your products allows you to keep or increase your competitive edge. In a business where the concept of getting closer to the customer prime, the internet is becoming increasingly important as well. Internet sales, where customers are sought and served on-line through Gophers and variety of virtual storefronts, are also becoming more popular. Customers can be and are sought before the sale and supported after sale. Companies are able to do actual product sales transactions on the Internet. In addition, in some cases it is possible to deliver the product via the Internet, as with software and information. Many companies have been using the Internet for the transmission of data. The major financial institutions in the world use the Internet extensively for exchanging information and files. Corporate users are now responsible for the transfer of the largest portion of data. 2.5The World Wide Web â€Å"The WWW is the newest information resources to the Internet† (Krol 1992). It is based on technology called Hypertext Mark-up Language (HTML). Hypertext is a method of presenting information where selected words in the text can be expanded at any time to provide other information about the word. These words are actually links to other documents, which may be text, picture or sound format. The presentation of information on the web is much friendlier that traditional methods and the interface provides for a user -friendly environment. â€Å"The combined with the ability to use any of the Internets tools within the web has been a catalyst for the rush to get on the Internet† (Ellsworth 1994). The WWW can be defined as a global, interactive, dynamic, cross platform, distributed, graphical, hypertext information system that runs over the Internet and is available globally (Lemay 2000 Online). In the early 1990s the advent of the World Wide Web on the Internet represented the tuning point for electronic ecommerce by providing an easy to use technology solution to the problem of information publishing and dissemination. The web made electronic commerce a cheaper way of conducting business and enable more diverse business activities. The WWW infrastructure is built around the following:- Web sites: A web site is a collection of web pages maintained by a college, university, government, agency, company or individual. Web age: A web page is document on the web. Web pages can include text, pictures, sound and videos. Web server: A web server is a computer connected to the Internet that makes web pages available to the world. The Wold Wide Web is a dynamic structure, and due to the popularity of this new phenomenon it is expanding rapidly. The reason for it being so popular is the fact that information can be made available to anyone anywhere in the world in a matter of minutes (Kalakota, Whinston. 1997 p.145). What types of businesses are trading on the web Business is changing. The way we do business is changing. The electronic commerce revolution is upon us, and perhaps represents the greatest single change to the way in which business operates. Companies of all sizes are now working together to establish their position and create opportunities in this world. The Internet phenomenon has result in a major shift in the way organisations do business, and how they intend to proceed in the future. Many organisations now realise that without an e-commerce strategy they will not survive. This realisation has affected, and will continue to affect business relationship of all sizes. E-Commerce E-Commerce (Electronic Commerce) is the buying and selling of goods and services on the Internet, especially the World Wide Web. In practice, this term and a newer term, e-business are often used interchangeably. For online retail selling, the term e tailing is sometimes used. E-Commerce can be divided into: E-tailing or â€Å"Virtual Storefronts† on web sites with online catalogues, sometimes gathered into a â€Å"Virtual mall†. The gathering and use of demographic data through web contacts. Electronic Data Interchange (EDI), the business to -business exchange of data. E-mail and fax and their use as media for reaching prospects and establish customers (for example, with newsletters). Business-to-Business buying and selling. The security of business transactions. Electronic messaging technologies streamline business processes by reducing paperwork and increasing automation. (Kalakota, Whinston. 1997 p.54). E-Commerce today, is a very wide area of study due to its phenomenon growth and thus, can be described as an umbrella concept, which will continue to grow. Therefore incorporating a variety of disciplines and can be described as following path of a hierarchical structure. Recent technology has increased the capacity of e-commerce transactions, resulting in noticeable paradigms in a number of daily transactions. There are unforeseen benefits not only to businesses, but also consumers, the government and even on a global trade level. The technology that is responsible for taking e-commerce to a global stage is the Internet. There are also other factors that have affected the growth of e-commerce, for example, the availability of hardware at affordable costs, as well as the increased power and ease of use of operating systems and software. With the prices of computer hardware and network equipment falling, e-commerce is seen as one of the strategic investments in line with marketing goals of most business, to stay competitive, improve productivity and to deliver quality services. Commonly, e-commerce is associated with the buying a selling of information, products and services via computer networks. It is also known as the paperless exchange of electronic information, whether it is by electronic data interchange (EDI), electronic funds transfer or other similar technologies methods. Overview of E-Commerce E-Commerce, evolved as early as the days of Alexandra Bell, followed by the launch of terrestrial television and radio communications. However recent developments in technology have increased the efficiency in commerce and have placed e-commerce under the spotlight. During the mid 20th century, the channels through e-commerce took place were telephone networks, the television and the radio. In their infancy they impressed businesses and consumers, so did EDI in the early 1970s and now at present the Internet has bought back the same feelings. Below is an illustration of a generic framework for electronic commerce (Kalakota, Whinston.1997) The figure 1 below is an illustration of the e-commerce overview. Electronic Commerce B2A B2C C2A B2B The Internet Telephone Fax The Internet Telephone Fax Cable Satellite, and Digital TV Telephone Fax The Internet including EDI, marketing, purchasing and e-mail Collaborative Work Groups EDI via Internet Telecomm uniting Electronic Funds Transfer E-Mail Video Conferencing Telephone Fax Figure 1 Types of E-commerce E-commerce covers five main categories that are listed below: Business to Business (B2B) Business within Business (BWB) Business to Administration (B2A) Consumer to Administration (C2A) Business to Consumer (B2C) These are discussed in detail in Appendix 3 titled Types of Web Traders. The introduction of e-commerce has facilitated consumer to business transactions, customers learn about products through electronic purchasing. From a consumer perspective electronic commerce facilitates for the following: Social Interaction. Electronic Commerce enables consumers to communicate with each other through electronic mail, video conferencing and news groups. Personal Finance Agreement. Use electronic means to manage personal finance and management using the online banking tools Purchasing Products and Information. Allows consumer to find online information about exiting and new products and services. (Kalakota, Whinston. 1997 p.139) The explosion in Internet traffic has created other problems. Mostly worryingly, there are continuing fears that many companies offering financial services online are not providing a secure environment to clients and customers. Purchasing on the Web The Internet and the World Wide Web have dramatically changed the way consumers seek and use information online. Whether they are shopping for Information or shopping for goods and services on-line, todays consumers must learn how to manage the resources (Kelley, B Weibke, J. 2003). Most attention on e-commerce has focused on business-to-business transactions and analysts say the surging electronic business-to-business market is about to explode. On-line purchasing systems promise to streamline operations, save time and cut the costs of businesses drowning in order processing. Most buying over the Internet focuses on indirect materials, also known as non-production goods or maintenance, repair and operations. Typically, such applications let any employee order through managed access rights, non-production supplies and service from an on-line catalogue using on a web server. They simplify the process of buying day-to-day items such as office equipments, PCs and other electrical goods to run the company. According to a recent study carried out by Forrester Research (2000) has suggested that the on-line commerce will raise form  £657 billion in 2002 and reach the figure of  £6.8 trillion in 2004. The statistics suggested that more customers are shopping day by day and revenue is increasing for on-line shoppers. The view is supported by Swazey (1999) who believes that the on-line shoppers spend more time on-line shopping than normal high streets shoppers and the amount of money spent rises with the amount of time spent on-line. The view point of Swazey (1999) is similar to Ghosh (1998) as he states that the â€Å"On-line shoppers tend to get carried away within the comfort of their own h ome†. However the above viewpoint have contrast in bearing to an article (Computer Fraud Security, Sept 2000, p.2) that seemed to suggest that although it may seems like everyone is on-line, but its not true. Internet Banking Internet Banking is no longer a novelty. Banks have long ceased being worried about trading via the web, and instead have embraced the newest delivery channel with enthusiasm. All clearing banks, including the connected building societies, now offer Internet based banking services and all will have an online current account in place. Some, including Barclays, Woolwich, Abbey National and HSBC have developed other channels of delivery including digital TV and mobile phone banking service. All e-banks promise busy current account users speed and convenience. There are no counter queues in cyberspace and e-banks are open 24 hours a day, seven days a week. On-line banking customers can check their balances, view recent transactions, transfers funds, set-up standing orders and direct debits and also option to pay bills on line. In the past, the banking industry was chiefly concerned with asset quality and capitalisation, if the bank was performing well along these dimensions than the banks would be profitable. Today performing well on asset quality and capitalisation is not enough. (Kalakota, Whinston.1997 p.30) The Internet is a medium that provides a new dimension and introduces much opportunity especially for banks; the main advantages are outlined as follows: Enable innovation Cost savings Increased customer base Enable mass customisation Marketing and communication Developments of non core business In a report issued by the BE Agency (2000), it states that the experts believe that the slump in high street banking due to deregulation can be revived by this new medium e-commerce, offering the potential of reviving or at least halting the decline, by raising customer service standards, increasing the choice of retail financial products, reducing the charges and giving customers a more convenient way to manage their money. It is agreed with Patterson (2000) that the banks will have to go online, his reasons being as to why banks have to adopt this new medium is â€Å"in short answer to win over new customers† it is easier to leave it at that, but also the factors he has also said that it will also promote this new medium are lower cost of account servicing, cross selling opportunities, customer relations and because they have to. Customers can now deal with their accounts personally at any time from anywhere in the word for any reason. Customers can also have the same facility to compare and contrast the products and services of a multitude of banks and choose one that meets their requirements. Knowing how safe is it to use the website an

Sunday, October 13, 2019

Dealing With Guilt in Nathaniel Hawthornes The Scarlet Letter Essays

Dealing With Guilt in The Scarlet Letter    Throughout The Scarlet Letter, Nathaniel Hawthorne attempted to expose the varying ways in which different people deal with lingering guilt from sins they have perpetrated. The contrasting characters of Hester Prynne and Arthur Dimmesdale ideally exemplified the differences in thought and behavior people have for guilt. Although they were both guilty of committing the same crime, these two individuals differed in that one punished themselves with physical and mental torture and the other chose to continue on with their life, devoting it to those less fortunate than they.    In order to show this difference in the two main characters, they both had to be put on relatively same grounds. Hawthorne achieved this by making them both involved in the same offense: adultery. Hester Prynne and Arthur Dimmesdale both resided in the same town and both knew the same people in the settlement. However, despite this effort for equality, it was impossible to make both characters play on the same level. For development and in...

Saturday, October 12, 2019

Are We Now Becoming the Terrorists? Essay -- September 11 Terrorism Es

Are We Now Becoming the Terrorists?    Terrorism is a weapon of the weak. Shut out of the great conversations that shape our histories and unable to control the grand forces that shape our destinies, terrorists strike out in angry desperation to force those they have identified as their oppressors to pay attention to the plight of the alienated and to hear the terrorists' demands. The events of September 11 were just such a gesture. The horror we felt watching a jet flown deliberately into a tall building and watching people leap to their deaths to escape the flames and collapse of the ruined skyscrapers filled us with a strange awe and a feeling of helplessness. We felt forced to pay attention.   The first question on everyone's lips was: what can we do? What can we do to prevent this from happening again? What can we do to punish those responsible? How we answer these questions will decide whether we live in a civilization worth defending, or if we, too, are weak.       This unprecedented attack on American soil brings into focus the connections between our freedoms, our security, and the international system. Our choices over what to do are constrained by the ways these parts of our lives are connected. Our leaders and representatives, responding to the theories and analyses of their advisors and of the think tanks that dedicate themselves to studying such questions, have already begun to speak of September 11 as this generation's Pearl Harbor and the need to prepare for war, and of the trade-offs we will have to make for our security. Their first responses - and those of many of us - are to lash out at those who have wronged us.       However, to lash out now is a path fraught with n... ...saster relief and peacekeepers, but we are the single largest supplier of arms to the already intensely violent Middle East. And because Israel is our strategic ally in the region, we won't even allow discussion of whether its policies towards Palestinians are racist.       If we are to do anything, we must be ready to take a path more difficult than anyone has suggested so far. We must be ready to be thoughtful and sober, and to look for political solutions to the problems in the world that are now producing the threats to our security. Today, we feel like now is the time to act. Our pain, our helplessness, our frustration at discovering we are vulnerable makes us want to take control over our lives again. We are ready to retaliate against acts of angry desperation with anger and despair. But now is not the time to become terrorists ourselves. Â