Saturday, August 31, 2019

M11Cde Skills-Based Assessment

School of Engineering & Computing Department of Computing Internet Information Security (M11CDE) Layered Security Student Name: BUSA ABANG OBI SID:4560229 I certify that this is my own work yes/no and that I have read and understand the University Assessment regulations. Signature: [pic] Submission Details The details below indicate what you should submit, when you should submit it and where is should be submitted to. Submission Date and Method Deadline 11 January 2013 11:50pm online submission. Submission Format: 1. Fill the online quiz for the practical test which will be available one week before the final fixed deadline. . Download an electronic copy of this document and where there are blanks or spaces to complete addressing information etc. , please include them in the document. You submission should include the answers in the document, but do not change the document in any other way! If the document has been modified other than to include the required information your submissi on will be null and void. 3. Your files should be name as â€Å"SID_FIRSTNAME_SURNAME. doc†. E. g. 100292_FIRSTNAME_SURNAME. doc. 4. Save the configurations from all your network devices and embed them into the end of this document. 5.If you have attempted to configure VLANs, please also include a switch configuration from any one of your LAN switches. Please note that this must be a switch that you have actually configured VLANs on. 6. If you have implemented the network in Packet Tracer, you may consider submitting a copy of that as well but this is not compulsory. Zero Tolerance for late submission: If your work is late it will have to be marked zero according to new university policy. Please ensure you upload your work well before the deadline. You will be able to delete and update your work before the deadline. Plagiarism Note:As with all assessed work, both the research and written submission should be your own work. When submitting this work you are explicitly indicati ng that you have read the rules on plagiarism as defined in the University regulations and that all work is in fact your own, except where explicitly referenced using the accepted referencing style. Feedback and marking: The practical work will be marked by using the questions set in the online quiz and number of questions for each section will depend on the weightings set in the below sections. Feedbacks and marks will be provided once the online practical quiz is submitted.Network topology [Whilst the topology shows only two hosts on each LAN, you should configure four hosts on each LAN. ] Network Information The WAN IP network address between Dundee and Glasgow is 209. 154. 17. 0 with a subnet mask of 255. 255. 255. 0. The WAN IP network address between Edinburgh and Glasgow is 209. 154. 16. 0 with a subnet mask of 255. 255. 255. 0. This is clearly shown on the network topology. Dundee information The LAN for Dundee has been assigned an IP network address of 192. 168. 6. 0 Each s ubnet of the above network needs to accommodate 14 host addresses. The subnet mask will be 255. 255. 255. 40. This is worked out by borrowing 4 bits from the final octet and is shown in the table below. Table 1 Custom Subnet Mask for Dundee |255 |255 |255 |240 | |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 | |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 0 0 0 0 | Use the 6th usable subnet for the LAN.Do not use subnet zero as the first usable subnet. The table below shows how the 6th usable network can be identified. |Network |Network ID |First Host |Last Host |Broadcast |Mask | |0 |192. 168. 6. 0 |192. 168. 6. 1 |192. 168. 6. 14 |192. 168. 6. 15 |/28 | |1 |192. 168. 6. 16 |192. 168. 6. 17 |192. 168. 6. 30 |192. 168. 6. 31 |/28 | |2 |192. 168. 6. 2 |192. 168. 6. 33 |192. 168. 6. 46 |192. 168. 6. 47 |/28 | |3 |192. 168. 6. 48 |192. 168. 6. 49 |192. 168. 6. 62 |192. 168. 6. 63 |/28 | |4 |192. 168. 6. 64 |192. 168. 6. 65 |192. 16 8. 6. 78 |192. 168. 6. 79 |/28 | |5 |192. 168. 6. 80 |192. 168. 6. 81 |192. 168. 6. 94 |192. 168. 6. 95 |/28 | |6 |192. 168. 6. 6 |192. 168. 6. 97 |192. 168. 6. 110 |192. 168. 6. 111 |/28 | |7 |192. 168. 6. 112 |192. 168. 6. 113 |192. 168. 6. 126 |192. 168. 6. 127 |/28 | You should be able to identify the pattern (or magic number from the subnet mask). If it is not immediately apparent subtract the last non-zero octet from 256. Edinburgh information The LAN for Edinburgh has been assigned an IP network address of 192. 168. 5. 0 Again, each subnet of the above network needs to accommodate 14 host addresses.The subnet mask will be 255. 255. 255. 240. This is worked out by borrowing 4 bits from the final octet and is shown in the table below. Table 1 Custom Subnet Mask for Edinburgh |255 |255 |255 |240 | |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 | |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 0 0 0 0 |Use the 4th usable subnet for the LAN. Do not use subnet zero as the first usable subnet. You must follow the example for Dundee to complete the table for step 1 planning. You should be able to identify the pattern (or magic number from the subnet mask). If it is not immediately apparent subtract the last non-zero octet from 256. The elements of the coursework are: 1. Planning and assigning addresses [30 marks] 2. Basic configuration [40 marks] 3. Security ACLs [10 marks] 4.Security VLANs [20 marks] The basic theme is that Glasgow (GLA) is regional headquarters of the company. Edinburgh and Dundee are branch offices. Each network associate (student) will be responsible for an entire network. This means that using either the lab equipment in EC1-13 or Packet Tracer, you will configure 3 routers, 2 switches and 8 PCs. A network address and specific number of hosts per subnet has been assigned for the local LAN on each network (Edinburgh and Dundee).From the information provided, the subnet address, the subnet mask, the first and last usable addresses and the broadcast address for each site LAN need to be determined. (When using the router or Packet Tracer – it is expected that you keep a copy of your router configuration at each stage, just in case you run into problems). Step 1 Planning Using the chart below, plan the first ten usable subnets of the LAN address assigned to Edinburgh. You have been given the first 6 addresses for Dundee, you are now expected to plan for the first 10 addresses for Edinburgh. Subnet |Subnet |Subnet |First Host |Last Host |Broadcast | | |Address |Mask (/x) | | | | |0 |192. 168. 5. 0 |28 |192. 168. 5. 1 |192. 168. 5. 14 |192. 168. 5. 5 | |1 |192. 168. 5. 16 |28 |192. 168. 5. 17 |192. 168. 5. 30 |192. 168. 5. 31 | |2 |192. 168. 5. 32 |28 |192. 168. 5. 33 |192. 168. 5. 46 |192. 168. 5. 47 | |3 |192. 168. 5. 48 |28 |192. 168. 5. 49 |192. 168. 5. 2 |192. 168. 5. 63 | |4 |192. 168. 5. 64 |28 |192. 168. 5. 65 |192. 168. 5. 78 |192. 168. 5. 79 | |5 |192. 1 68. 5. 80 |28 |192. 168. 5. 81 |192. 168. 5. 94 |192. 168. 5. 95 | |6 |192. 168. 5. 96 |28 |192. 168. 5. 97 |192. 68. 5. 110 |192. 168. 5. 111 | |7 |192. 168. 5. 112 |28 |192. 168. 5. 113 |192. 168. 5. 126 |192. 168. 5. 127 | |8 |192. 168. 5. 128 |28 |192. 168. 5. 129 |192. 168. 5. 142 |192. 168. 5. 143 | |9 |192. 168. 5. 144 |28 |192. 68. 5. 145 |192. 168. 5. 152 |192. 168. 5. 159 | |10 |192. 168. 5. 160 |28 |192. 168. 5. 161 |192. 168. 5. 174 |192. 168. 5. 175 | For the WAN links for DUN and EDN the lowest usable address on the networks must be used. Identify and use the lowest usable WAN address for your S0 interface assigned to you for the two networks shown: 1 Dundee:209. 154. 17. 1 Edinburgh:209. 154. 16. 1 For security reasons, all of the production workstations will be assigned the lower-half of the IP addresses of the assigned subnet. All of the network devices and management stations will be assigned the upper-half of the IP address numbers of the subnet assigned for the L AN. From this upper half range of addresses, the Ethernet router interface (the default gateway on each LAN) is to be assigned the highest usable address. Identify the required IP address of the Ethernet interface on your two routers. Address of your Ethernet interface on Dundee : 192. 168. 6. 10 Address of your Ethernet interface on Edinburgh : 192. 168. 5. 78 The host (PC) configurations must also be planned. Using the table, complete the host information. |Branch: DUN |IP Address Range | |Production Host Range |192. 168. 6. 97——–192. 168. 6. 103 | |(Lower half) | | |Management Host Range |192. 168. 6. 104——–192. 168. 6. 10 | |(Upper half) | | [5 marks for ranges of addresses] Supply addresses for a production and management host. Production Host (1) IP Address192. 168. 6. 97 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 6. 110 Management Host (1) IP Address192. 168. 6. 104 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 6. 110 |Branch: EDN |IP Address Range | |Production Host Range |192. 68. 5. 65——–192. 168. 5. 71 | |(Lower half) | | |Management Host Range |192. 168. 5. 72——–192. 168. 5. 78 | |(Upper half) | | Supply addresses for a production and management host. Production Host (1) IP Address192. 168. 5. 65 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 5. 78 Management Host (1)IP Address192. 168. 5. 72 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 5. 78 Step 2 Basic Configuration Apply a basic configuration to the router. This configuration should include all the normal configuration items. You must supply one router configuration file. This will be either Dundee or Edinburgh. The router configuration files will be marked as follows: Basic Configuration †¢ Router name †¢ Console and VTY configuration and passwords (use ‘cisco’, ‘class’ and ‘berril’ for console, secret and VTY passwords r espectively) †¢ Interface configurations DTE/DCE identified appropriately and clockrates set only on DCE †¢ Routing correct and working (RIP is fine) †¢ Host tables †¢ Banner display before login – warn of unauthorised access Basic Configuration (40 marks) Security (ACLS – Marked as part of step 3) 1. ACLs correct and applied to correct interface in correct direction [10] 2. ACLs correct but not applied to correct interface or direction [7 – 9] 3. ACLs attempted but some errors or wrong placement [4 – 6] 4. ACLs attempted but incorrect and not applied properly [1- 3] 5. ACLs not attempted [0]ACL Total (Total 10 marks) Step 3 Security There are several security concerns in the Internetwork. Develop Access Control Lists (ACLs) to address security issues. The following problems must be addressed: 1. The production hosts in both the Edinburgh and Dundee networks are permitted HTTP access to the 172. 16. 0. 0 network, management hosts are p ermitted no access to this network. 2. The company has discovered an Internet Web server at 198. 145. 7. 1 that is known to contain viruses. All hosts are banned from reaching this site. The ACLs are worth 10 marks. Step 4 VLANsThis step is the final 20% of the coursework mark. To achieve this step you should consider how you might use a VLAN to separate the production and management LANs. The goal is that neither network should be able to see the other network traffic. There is no additional guidance on this part of the skills test as you are expected to identify: 1. An appropriate VLAN number to use for each VLAN. 2. An appropriate VLAN configuration. 3. Implement the VLAN and provide the switch configuration file(s) to show that the VLAN has been implemented. VLAN Marks The VLAN component will be marked as follows: VLAN configured and correct configuration supplied [20] †¢ VLAN identified but configuration incomplete or incorrect [10 – 15] †¢ VLAN attempted [5 â €“ 10 depending on level of attempt] †¢ VLAN not attempted [0] VLAN (Total 20 marks) Appendix Network device configurations†¦Ã¢â‚¬ ¦ [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] Press RETURN to get started! Router>enable Router#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# Router(config)#hostname EDINBURGH EDINBURGH(config)#line console 0 EDINBURGH(config-line)#password ciscoEDINBURGH(config-line)#login EDINBURGH(config-line)#exit EDINBURGH(config)#line vty 0 4 EDINBURGH(config-line)#password cisco EDINBURGH(config-line)#login EDINBURGH(config-line)#exit EDINBURGH(config)#enable password cisco EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGH#configure terminal Enter configuration commands, one per line. End with CNTL/Z. EDINBURGH>en Password: EDINBURGH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGH(config)#enable secret class EDINBURGH(config)#exit EDINBURGH# SYS-5-CONFIG_I: Configured from console by console [pic] [pic] EDINBURGH#configure terminal Enter configuration commands, one per line. End with CNTL/Z. EDINBURGH(config)#interface serial2/0 EDINBURGH(config-if)#ip address 209. 154. 16. 1 255. 255. 255. 0 EDINBURGH(config-if)#no shutdown %LINK-5-CHANGED: Interface Serial2/0, changed state to up EDINBURGH(config-if)#exit %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial2/0, changed state to up EDINBURGH(config)#interface fastethernet0/0 EDINBURGH(config-if)#ip address 192. 168. 5. 78 255. 255. 255. 240 EDINBURGH(config-if)#no shutdown LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up EDINBURGH(config-if)#exit EDINBURGH(config)#router rip EDINBURGH(config-router)#network 172. 16. 0. 0 EDINBURGH(config-router)#network 192. 168. 6. 0 EDINBURGH(config-router)#network 192. 168. 5. 0 EDINBURGH(config-rout er)#network 209. 154. 16. 0 EDINBURGH(config-router)#network 209. 154. 17. 0 EDINBURGH(config-router)#exit EDINBURGH(config)# banner motd #warn of unauthorised access# EDINBURGH(config)# banner login #do not enter if you are not authorized# EDINBURGH(config)#ip host DUN 209. 54. 17. 1 192. 168. 6. 110 EDINBURGH(config)#ip host GLA 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGH#copy running-config startup-config Destination filename [startup-config]? Building configuration†¦ [OK] EDINBURGH# EDINBURGH>show host Default Domain is not set Name/address lookup uses domain service Name servers are 255. 255. 255. 255 Codes: UN – unknown, EX – expired, OK – OK, – revalidate temp – temporary, perm – permanent NA – Not Applicable None – Not definedHost Port Flags Age Type Address(es) DUN None (perm, OK) 0 IP 192. 168. 6. 110 209. 154. 17 . 1 GLA None (perm, OK) 0 IP 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 EDINBURGH> [pic] [pic] [pic] EDINBURGH#show r Building configuration†¦ Current configuration : 1291 bytes ! version 12. 2 no service timestamps log datetime msec no service timestamps debug datetime msec o service password-encryption ! hostname EDINBURGH ! ! ! enable secret 5 $1$mERr$9cTjUIEqNGurQiFU. ZeCi1 enable password cisco ! ! ! ! ! ! ! ! ip host DUN 192. 168. 6. 110 209. 154. 17. 1 ip host GLA 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 ! ! ! ! ! ! interface FastEthernet0/0 ip address 192. 168. 5. 78 255. 255. 255. 240 ip access-group 100 in duplex auto speed auto ! interface FastEthernet1/0 no ip address duplex auto speed auto shutdown ! interface Serial2/0 ip address 209. 154. 16. 1 255. 255. 255. 0 ip access-group 10 out ! interface Serial3/0 no ip address shutdown ! interface FastEthernet4/0 o ip address shutdown ! interface FastEthernet5/0 no ip address shutdown ! router rip network 172 . 16. 0. 0 network 192. 168. 5. 0 network 192. 168. 6. 0 network 209. 154. 16. 0 network 209. 154. 17. 0 ! ip classless ! ! access-list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq www access-list 100 permit ip any any access-list 10 permit any access-list 10 deny host 198. 145. 7. 1 ! ! ! no cdp run ! banner login ^Cdo not enter if you are not authorized^C banner motd ^Cwarn of unauthorised access^C ! ! ! ! line con 0 password cisco login line vty 0 4 password cisco login ! ! ! endEDINBURGH# EDINBURGH#show access-lists configuration EDINBURGH(config)#access-list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq 80 EDINBURGH(config)#access-list 100 permit ip any any EDINBURGH(config)#interface fastethernet0/0 EDINBURGH(config-if)#ip access-group 100 in EDINBURGH(config-if)#exit EDINBURGH(config)#access-list 10 permit any EDINBURGH(config)#access-list 10 deny host 198. 145. 7. 1 EDINBURGH(config)#interface serial2/0 EDINBURGH(config-if )#ip access-group 10 out EDINBURGH(config-if)#exit EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by consoleEDINBURGH#copy running-config startup-config Destination filename [startup-config]? Building configuration†¦ [OK] EDINBURGH# [pic] EDINBURGH#show access-lists Extended IP access list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq www permit ip any any Standard IP access list 10 permit any deny host 198. 145. 7. 1 EDINBURGH# [pic] EDINBURGHSWITCH CONFIGURATION Switch>en Switch#config t Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#hostname EDINBURGHSWITCH EDINBURGHSWITCH(config)#line console 0 EDINBURGHSWITCH(config-line)#password ciscoEDINBURGHSWITCH(config-line)#login EDINBURGHSWITCH(config-line)#exit EDINBURGHSWITCH(config)#line vty 0 4 EDINBURGHSWITCH(config-line)#password cisco EDINBURGHSWITCH(config-line)#login EDINBURGHSWITCH(config-line)#exit EDINBURGHSWITCH(config)#enable password c isco EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#enable secret class EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH# EDINBURGHSWITCH#config tEnter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#interface vlan1 EDINBURGHSWITCH(config-if)#ip address 192. 168. 5. 77 255. 255. 255. 240 EDINBURGHSWITCH(config-if)#no shutdown %LINK-5-CHANGED: Interface Vlan1, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up EDINBURGHSWITCH(config-if)#ip default-gateway 192. 168. 5. 78 EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH#copy running-config startup-config Destination filename [startup-config]? Building configuration†¦ [OK ]EDINBURGHSWITCH# EDINBURGHSWITCH#vlan database % Warning: It is recommended to configure VLAN from config mode, as VLAN database mode is being deprecated. Please consult user documentation for configuring VTP/VLAN in config mode. EDINBURGHSWITCH(vlan)#vlan 10 name production VLAN 10 modified: Name: production EDINBURGHSWITCH(vlan)#vlan 20 name management VLAN 20 added: Name: management EDINBURGHSWITCH(vlan)#exit APPLY completed. EDINBURGHSWITCH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#interface fastethernet0/2 EDINBURGHSWITCH(config-if)#switchport mode accessEDINBURGHSWITCH(config-if)#switchport access vlan 10 EDINBURGHSWITCH(config-if)

Friday, August 30, 2019

To what extent has the European Court of Human Rights (ECHR’s) case law recognised and protected the right not to be discriminated against on the ground of sexual orientation, in relation to marriage.

Abstract There has been much discussion as to whether the ECHR’s attempts to recognise and protect the right not to be discriminated against on the ground of sexual orientation have been successful. This is because, although the UK has in recent years made positive changes towards the equality of same-sex couples, discrimination is still prevalent in many other countries. This study aims to identify the extent to which such discrimination still exists and consider how effective the ECHR has been in preserving these rights. Introduction It will be examined the extent to which the European Court of Human Rights (ECHR’s) case law has recognised and protected the right not to be discriminated against on the ground of sexual orientation. This will be examined in respect of same-sex marriages and by considering whether same-sex couples are still being discriminated against or whether the ECHR has been successful in helping to protect the interests of such couples. Various case law of the ECHR will be examined and a review of the academic literature in this area will be conducted. These will be acquired by accessing relevant text books, journal articles, online databases and governmental reports. Once all the applicable information has been gathered an appropriate conclusion will then be drawn demonstrating that the ECHR has made significant attempts to protect the rights of individuals when it comes to their sexual orientation. However, it will be demonstrated that whilst this has proven successful in the UK, othe r countries are still reluctant to employ the ECHR’s approach. Literature Review The Marriage (Same Sex Couples) Act 2013 came into force on the 13 March 2014 to legalise same sex marriages as this was previously prohibited under section 11 (c) of the Matrimonial Causes Act 1973. This prohibited led to much debate and controversy for a number of years as it was felt that same-sex couples were being discriminated against and that their right to equality, as provided for under Article 14 of the European Convention of Human Rights 1951 (ECHR), as incorporated by the Human Rights Act 1998, was being violated. This controversy occurred regardless of the fact that civil partnerships were introduced under the Civil Partnership Act 2004 since it was still being argued that same-sex couples entering into a civil partnership were not provided with the same rights and responsibilities as heterosexual couples under a civil marriage. Inequality therefore still existed as the status of marriage was not capable of being acquired by same-sex couples. This was considered highly d etrimental and it was argued by Francoz-Terminal that; â€Å"if at one time homosexuality was considered as a choice that implied no procreation, nowadays legal systems have had to face a new factual reality.†[1] This highlights the importance of equality and it seems as though there has never been more of a pressing need for the provisions contained in the ECHR to be implemented. Not all agree that same sex-couples should have been permitted to marry rather than merely enter into a civil partnership, yet because of the increasing recognition of same-sex couples in many European countries it was evident that the permitting of gay marriages have been relevant when discussing reforms in England and Wales.†[2] There was clearly a pressing need for reform in this area since the 2004 Act had proven ineffective in providing same-sex couples with equal rights to heterosexual couples when it came to marriage. Nevertheless, whilst it was argued by some that civil partnerships were simply marriages under a different name, this was not entirely true. This is because the equal rights and responsibilities that were given to heterosexual couples were not being given to same-sex couples. For example, same sex couples were not allowed to get married in a church or other religious on the basis that these types of places are prohibited from conducting civil partnership ceremonies under the law. This was considered highly unfair given that some ministers were willing to marry same-sex couples; however they were prevented doing so by law. Modern beliefs that all people should be treated equally were therefore not being ascertained and all of the traditional views of marriage were upheld. Not all agree with the new changes, however, as churches can still refuse to marry same sex-couples which leaves same-sex couples open to further discrimination.[3] Yet, it is believed that the law should not restrict a person’s choice and that churches ministers should still have the ability to choose whether or not they would like to marry same-sex couples. This provides a fairer system overall because although some churches will permit same-sex marriages whilst others will not, the fact that marriages can be conducted in churches in the first place is a major step forward.[4] The debate as to whether same-sex marriages should be permitted has been going on for some time, and the courts have attempted to protect an individual’s right not to be discriminated against on grounds of sexual orientation on marriage. In The Attorney General for Ontario v M and H[5] it was held by the court that; â€Å"provincial governments are to take legislative action to ensure that individuals in same-sex relationships are afforded equal treatment with others in marriage-like relationships.† Regardless of these views, it wasn’t until the ECHR began to recognise such rights that Parliament decided to take action. In Schalk v. Kopf v. Austria[6] it was made clear by the ECHR that; â€Å"a failure by a state to allow same-sex couples to marry amounted to a violation of the article 12 right to marry.† This decision highlighted the need to make amendments to section 11 (c) of the 1973 Act so that same-sex couples were not being discriminated against on the basis of their sexual orientation when it came to marriage. It was quite surprising when the 2013 Act was implemented given the widespread concerns that existed and as put by Norrie; â€Å"the trouble with gay and lesbian people is that they are never satisfied. Give them a crumb and they want a slice of bread. Give them a slice of bread and they want a full meal.†[7] Nevertheless, although changes were made under the 2004 Act to provide same sex couples with equal rights to heterosexual couples, the ECHR did not believe that this went far enough and still found that discrimination subsisted. It could be said that civil ceremonies were the same as marriages, yet because the nature of the ceremonies were different as well as the rights that were provided to married couples, it was clear that further changes were needed if complete equality was to be attained. It was argued by Eireann that the 2004 Act was akin to marriage in that it allowed same-sex couples to â€Å"formally declare their allegiance to each other, register their partnership and commit themselves to a range of duties and responsibilities.†[8] On the other hand, because equality of choice and opportunity was removed from same-sex couples, their rights under the ECHR were not being fully recognised[9], which is why drastic changes to the law were implemented in 2013. Whether all 47 countries will follow the ECHR’s decision in Schalk is questionable[10], given the political backlash that some countries will be subjected to. Although the ECHR is of the view that same-sex marriages should be permit ted, they are also aware of the fact that not everyone agrees with this position. As a result, they made it clear in their judgment that the choice to marry same-sex couples should still remain with the minister conducting the ceremony and that the rights of ministers should also be upheld.[11] Therefore, whilst it is important that the rights to equality are being maintained when it comes to the marriage of same-sex couples, it is also important that the rights of ministers not to be discriminated against if they choose not to marry such couples are also preserved. The ECHR has made great attempts to recognise and protect the rights of individuals not to be discriminated against on grounds of sexual orientation over the years, which is enunciated in various case law decisions. An example of this can be seen in the Niemietz v Germany[12] case where it was made clear that the right to a private life under Article 8 of the ECHR included the right to establish relationships with other human beings regardless as to whether they were of the same sex or not. Therefore, the fact that there were laws against same-sex marriages demonstrated that the right to a private life under this Article was also being violated. This was also identified in Bensaid v United Kingdom[13] where the court held that â€Å"gender identification, name and sexual orientation and sexual life† were all capable of protection under Article 8. Arguably, the ECHR has been a pioneer for same-sex relationships for some time and has clearly made significant attempts to eradicat e discrimination on the basis of sexual orientation. In Mata Estevez v Spain[14] the Court held that same-sex relationships could be protected by the right to respect for private life, although it was held that homosexual relationships could not be protected by the right to a family life. However, this has since been resolved in the Schalk case above. The Schalk case is a major development within this area of the law, yet because many states have not yet legalised the marriage of same-sex couples it is manifest that the development of this area does remain ongoing. It remains to be seen what changes, if any will be made by other Member States because although this was a positive decision inferences were not drawn by the Court. This leads to confusion as to whether puzzling all States should follow suit and as has been noted; â€Å"the door may have been unlocked but remains closed (or half open) for now?†[15] Consequently, even though same sex marriages are now being permitted in the UK, inequality will still exist by the ability for ministers to refuse to marry same-sex couples. Whether this will ever be changed is doubtful since all individuals still have the right to freedom of belief and religion under Article 9 of the ECHR. Hence, there will still be many churches that will refuse to allow such marriages to take place, yet nothing can be done to stop this as this too will result in a violation of human rights. At present an attempt to strike a balance between these competing interests has been made and it is unlikely that discrimina tion on the grounds of sexual orientation with regards to marriage will ever be fully eradicated. Still, the rights same-sex couples have to marry has increased substantially over the years, though there will continue to be different views in relation to the acceptance of such marriages by society. Every person has a right to have an opinion and by forcing ministers to conduct same-sex marriages would seriously contravene. In addition to the UK, Belgium, the Netherlands and Canada, also allow same-sex marriages to be conducted, which demonstrates the movement that is being made towards achieving greater equality across the globe. This is believed highly desirable and as noted by the court in Fourie and Another v Minister of Home Affairs and Others;[16] â€Å"the limitation of marriage to opposite sex couples was unconstitutional.† Same-sex marriages should therefore be recognised in all countries as societal views are continuously changing and same-sex couples are starting to become the â€Å"norm.† It is questionable whether this will be implemented by all and as stressed by Herring; â€Å"the tensions between the traditional family ideal of what a family should be like and the realities of family life today indicate that family law is quite different from family law 30 years ago and where family law will be in 30 years time is hard to predict.†[17] Now that same-sex couples are able to marry under the 2013 Act, such couples are now able to claim a family status. This is necessary given that there is â€Å"no institution of a de facto family† as pointed out in McD v L & Another.[1 8] It is thus in the best interests of a child to be served in a marriage-based family and because same-sex couples can adopt, it is necessary for them to be able to marry also; N and Another v Health Service Executive & Ors[19] Nevertheless, because same-sex marriages are not permitted in all countries, such as France, it cannot be said that the ECHR’s approaches have been completely successful. It was recognised by Francoz-Terminal that the emergence of same-sex families has been challenging for French Law, yet it has been said that the courts do actually seem prepared to meet these challenges.†[20] Attitudes towards same-sex marriages have changed considerably over the years and are likely to continue to do so until such marriages are considered a normal part of society. As a result, â€Å"the married family can no longer be assumed to be the near-universal institution of civil society it once was.†[21] Because of the changes that continue to be made within society, it is vital that the law is able to keep abreast with such changes which can be achieved by making sure individuals are not discriminated against on the basis of their sexual orientation. Conversely, it has been said that marriage is being undermined as a result of this,[22] yet the courts should not be able to interfere in one’s beliefs as shown in Burden and Burden v UK.[23] The right to marry is enshrined in human rights law and is thereby considered a â€Å"fundamental part of the freedom of the individual to form personal relationships according to his or her own inclination.†[24] Resultan tly, individuals should have the right to marry whoever they wish regardless as to whether they are of the same-sex or not, though it remains to be seen whether other European countries will adopt the same approach as the UK in protecting such rights. Conclusion Overall, it is evident that the ECHR has recognised the rights of same-same couples for a number of years and has made great attempts to recognise and protect the right not to be discriminated against on grounds of sexual orientation. Nevertheless, it is only recently that the UK has implemented changes to reflect the stance taken by the ECHR by enacting the Marriage (Same Sex Couples) Act 2013. This Act makes it permissible for same sex couples to marry in religious settings. Although the Civil Partnership Act 2004 was said to provide similar rights, these were not considered enough and same-sex couples were still being subject to much discrimination. Since the 2013 Act was implemented, greater equality is now capable of being attained in the UK. The ECHR in Schalk is considered a major breakthrough in this area as this decision is what sparked the introduction of the new law. Nevertheless, because not all countries have followed the same approach as the UK, the ECHR still has some way to go in attaining equality for all. This is likely to prove difficult given the divergence of opinions that exist in this area, yet because the marriage of same-sex couples is becoming the ‘norm’, it is likely that other European countries will follow suit. The fact that ministers are able to choose whether or not to conduct same-sex marriages also ensures that their rights are also being protected. This maintains a balance between the rights of individuals not to be discriminated against on grounds of sexual orientation with the rights of belief and opinion. Bibliography Books Herring, J. Family Law, Longman, 4th Edition, (2009). Lowe, N. and Douglas, G. Bromley’s Family Law, OUP Oxford, 10th Edition, (2006). Probert, R., Family Law in England and Wales, Kluwer Law International, (2011). Standley, K. Family Law, Palgrave MacMillan, 7th Edition, (2010). Troyer, L. Church in Society, Xulon Press, (2011). Journals C F Stychin, ‘Not (Quite) a Horse and Carriage: The Civil Partnership Act 2004’ (2006), Feminist Legal Studies, Springer 2006, Volume 14, Number 1, 79-86. Doughty, S., Conservative UK: Most Britons Still Oppose Gay Marriage, The Daily Mail, (2011), Available [Online] at: http://www.dailymail.co.uk/news/article-2040783/Conservative-UK-Most-Britons-oppose-gay-marriage.html Eireann, D., Parliamentary Debates, Volume 697, Number 1, (2009), Available [Online] at: http://debates.oireachtas.ie/Xml/30/DAL20091203.PDF Francoz-Terminal, L, From same-sex couples to same-sex familiesCurrent French legal issues, Child and Family Law Quarterly, Issue 4, [2009] CFLQ 485, (2009). Matheson Ormsby Prentice, Civil Partnerships and Certain Rights and Obligations of Cohabitants Act 2010, Client Update, (2010), Available [Online] at: https://marketing.mop.ie/rs/vm.ashx?ct=24F76A1FD4AE4EE0CDD881AED12B921991907ABFDA9818CF5AE175767CEAC80BDF417 Norrie, K. Two by Two, by Two, The Journal Online, The Members Magazine of the Law Society of Scotland, (18 October, 2010), Available [Online] at: http://www.journalonline.co.uk/Magazine/55-10/1008759.aspx Peroni, L., Gay Marriage: Unlocking the Door but Keeping it ClosedStrasbourg Observers, (25 June, 2010), Available [Online] at: http://strasbourgobservers.com/2010/06/25/gay-marriage-court-unlocks-the-door-but-keeps-them-closed/ Probert, R. and Barlow, A. Displacing Marriage – Diversification and Harmonisation Within Europe, Child and Family Law Quarterly, [2000] CFLQ 153, Issue 2, (01 June, 2000). Ross, T., Archbishop Attacks Cameron’s ‘Gay Marriage’ Plan, The Telegraph, (2011) Available [Online] at: http://www.telegraph.co.uk/news/uknews/8809548/Archbishop-attacks-Camerons-gay-marriage-plan.html Rothwell, R. Why Civil Partnerships for Heterosexual Couples Could be a Good Idea, The Law Society Gazette, (11 August, 2010), Available [Online] at: http://www.lawgazette.co.uk/blogs/news-blog/why-civil-partnerships-heterosexual-couples-could-be-a-good-idea Sohrab, J., Recognising Aquired Gender, New Law Journal, 154 NLJ 1018, Issue 7135, (02 July, 2004). Tatchell, P., in BBC News, Gay Church ‘Marriages’ Set to Get the Go-Ahead, BBC, (14 February, 2011), Available [Online] at: http://www.bbc.co.uk/news/uk-12442375 The Office for National Statistics, Marriages, (February 11, 2010), Available [Online] at: http://www.statistics.gov.uk/cci/nugget.asp?id=322 Wintemute, R. Consensus is the Right Approach for the European Court of Human Rights, The Guardian, (12 August, 2010), Available [Online] at: http://www.guardian.co.uk/law/2010/aug/12/european-court-human-rights-consensus Cases Bensaid v United Kingdom (2001) 33 EHRR 205 Burden and Burden v UK [2008] All ER (D) 391, Application No 13378/05; (2008) 47 EHRR 857 Fourie and Another v Minister of Home Affairs and Others Application No. 56501/00, 10 May 2001 Niemietz v Germany (1992) 16 EHRR 97 Mata Estevez v Spain Application No. 56501/00, 10 May 2001 McD v L & Another [2009] IESC 81 N and Another v Health Service Executive & Ors [2006] I.E.S.C. 60 Schalk v. Kopf v. Austria [2010] ECHR 30141/04 (25 June 2010) The Attorney General for Ontario v M and H [1999] 2 SCR 3

Thursday, August 29, 2019

The New Yorker Research Paper Example | Topics and Well Written Essays - 1500 words

The New Yorker - Research Paper Example In 2010, the magazine employed sixteen fact checkers after sharp criticism concerning their fact checking process arose. In the following year, Adam Klasfeld in his article â€Å"Gawker Brought into New Yorker Fracas†, on the Courthouse News Service reported that the New Yorker had been sued by Peter Paul Biro for defamation on a July 2010 article. The magazine was unsuccessful in fighting for a dismissal of the case in 2012. Over the past two decades, the magazine has adopted the digital platform in its publishing and storage of material. Since the 1990s, the New Yorker published archived and the then current reports over the internet. In 2004, every cartoon printed since the inception of the magazine was published on compact discs. The magazine dà ©buted on Kindle and Nook in 2009 and went on to launch its iPad app the following year. The magazine was influential in the political scene in 2012 when it launched its online hub that centered on the coverage of the campaigns during the presidential election (New Yorker, web). This paper seeks to discuss the New Yorker’s move to go online and show why this decision is justified. The paper will also detail the application features and the benefits of this move to both the newspaper company and its audience. With technological developments, many users and organizations have favored the use of the internet for various basic functions such as communication, sales and advertising. As such, the use of smartphones and tablets has increasingly become a common occurrence among many people. These digital devices have user applications commonly referred to as â€Å"apps† that are designed to carry out a particular task. These programs are designed to run on the most common platform; android, Windows and iOS. Many businesses and organizations have adopted the use of these applications to interact with their target audience. The New Yorker is one such company (Jane, web). The magazine’s applications, known as the Goings

Wednesday, August 28, 2019

Org chemistry drawing assignment Coursework Example | Topics and Well Written Essays - 1000 words

Org chemistry drawing assignment - Coursework Example 3) Draw trans-1,3-dimethylcyclohexane and cis-1,3-dimethylcyclohexane as their most stable chair conformations. Label all non-favorable interactions, describe why they are unfavorable, and to what value (energy). Which is more stable, the trans or cis structure? All non-favorable 1,3-diaxial interactions are presented in the figure above. Such interactions are unfavorable because both methyl groups and hydrogens try to occupy the same space, which leads to destabilization of the molecule. Structure (I) should be highly unfavorable due to interaction between two methyl groups. As in the previous case, this destabilization is expressed in a value of several kJ/mole. Cis-1,3-dimethylcyclohexane represented in the rectangle is the most stable because both methyl groups occupy equatorial positions. 4) Draw trans-1,4-dimethylcyclohexane and cis-1,4-dimethylcyclohexane as their most stable chair conformations. Label all non-favorable interactions, describe why they are unfavorable, and to what value (energy). Which is more stable, the trans or cis structure? Non-favorable 1,3-diaxial interactions are shown in the figure above. Such interactions are unfavorable because both methyl groups and hydrogens try to occupy the same space, which leads to destabilization of the molecule. As in all previous cases, this destabilization is expressed in a value of several kJ/mole. Trans-1,4-dimethylcyclohexane represented in the rectangle is the most stable because both methyl groups occupy equatorial positions. Bromine is significantly bigger then ethyl substituent. For this reason, it will produce less steric interactions if bromine is in the equatorial position. For this reason, the conformation represented in the rectangular will be the most stable. It is expected that the most amount of cis-1-bromo-4-ethylcyclohexane will be with the equatorial

Tuesday, August 27, 2019

Quality improvement scenario Essay Example | Topics and Well Written Essays - 750 words

Quality improvement scenario - Essay Example However, if my improvement plan works there are several outcomes for patients with CHF patients in my floor. First, there will be a drastic reduction of readmissions of CHF patients. Secondly, CHF patients in my floor will not even be going to the ER or will not stay there for long once the improvement plan is in motion. Finally, this improvement plan will have the ability of preventing CHF to old age patients through teaching them on how to prevent it by living healthier lifestyles. This problem of readmission of CHF patients to the ER was uncovered by the quality improvement department. However, this problem is not unique to my hospital or my unit; it is a broader problem affecting almost every hospital or units (Desai & Stevenson, 2015). Furthermore, this problem is linked to a national quality and safety indicator for healthy people 2010 (Sullivan, 2012). Conversely, the problem of readmission of CHF patients to the ER is not linked to a national nurse-sensitive quality indicator. Data will be analyzed by the volunteering team which consists of the nurse manager for the cardiovascular unit, patient focused care assistant, a pharmacist, the staff nurse, the ER nurse and a physician (Stewart, Blue & Ebrary, 2001). After in depth assessment by all the volunteering staff, data will be compared to the data collected on the last quarters statistics. This will be able to give a clue as to whether the implementation plan is working or not. After comparisons of previous and present data, the volunteering team takes the assessed data to the director of CQI. The director will then asses the data and give a go ahead with the implementation or come up with a new directive on the plan. Data will be presented in a table form. The data will be used to improve performance in that the data collected was found to be impacting on the patient care. There are several ways in which the data can be used to improve performance. First,

Monday, August 26, 2019

Report on Aspects of the Contemporary Banking Sector - Risk and Essay

Report on Aspects of the Contemporary Banking Sector - Risk and Profitability Analysis - Essay Example According to the Sunday Times, HSBC’s commitment to sustainability has been recognized thus listed in the Best Green Companies List (2010). RBS is a retail banking institution under the RGS Group; it provides banking services including loans, deposits accounts and insurance. It is the largest bank in UK and the fourth largest bank globally. RBS is listed as the second best for customer satisfaction among the major high street banks. Barclays bank is another major bank having the largest network of ATMs in the region. It is the first UK bank to give local business customers access to online banking services to check their supplier credit ratings as well as the first bank to announce mass crush of contactless- enabled debit cards in the UK banking sector. The retail banking sector of Barclays offers loans, deposits accounts, insurance as well as Forex trading services for its customers. Lloyds TSB, a major banking network in the UK is a merger between Lloyds Bank and TSB thus fo rming one of the largest domestic banking forces in UK. The bank has over 3000 branches globally and are authorized and regulated by the Financial Services Authority. Lloyds TSB retail banking services include credit cards, deposit accounts, credit cards, and loans. b. By using at least 4-5 years of financial data, identify, calculate and interpret key profitability and risk ratios. Perform the analysis for each individual bank and then compare their performances and explain which bank has been the most effective in effectively managing profitability and exposure to risk. Modern banks focus on two important areas of revenue generation; loan provision to customers for an interest rate and providing other services including money transfer or exchange rates for a certain commission and other non-interest incomes and fees. This paper analyses the shareholder’s economic value creation using the four major banks; Barclays plc, HSBC, Lloyds TSB and RBS within a 5 year period. In ord er to analyze the business practices and activities of the banks and how they influence shareholder’s stock market value, we use both the external and internal information including the auditor’s annual financial reports, stock market data, and designed control variables. By applying the traditional accounting; ROA and ROE together with the innovative EVA methods to measure each bank’s prospective performance, and regress it against the stock market returns and other control values, one can be able to understand their explanatory power more so with regards to individual shareholder’s economic value. The results obtained were both traditional and innovative accounting methods and they explain the variations of the stock returns for the four British banks. Over the half year decade, there are signs of revenue reduction in the major banking industries. Lloyds TSB trades at a 4 per cent premium over the book value whereas RBS and Barclays trade at a discount to the book value of 32 per cent and 54 per cent, respectively. HSBC is the only UK rival trading at a premium to the book value. However, HSBC is physically diversified, and generates majority of its income outside Europe, more so in Asia. Since many American and European banks have their balance sheets significantly overstuffed with intangible goodwill and assets, tangible book value is of more relevance for comparing against the individual banks' market capitalizations. During the last half of 2008, market turmoil

Sunday, August 25, 2019

BP's Macondo Blow-out, Gulf of Mexico Research Paper

BP's Macondo Blow-out, Gulf of Mexico - Research Paper Example This explosion caused injuries to 17 people and led to 11 deaths of those who were working on the platform. The gushing wellhead was capped on July 15, 2010 after releasing nearly 4.9 million barrels of crude oil, the equivalent of 780,000m3.it was approximated that per day there was a loss of 53,000 barrels from the well before it was capped (Freudenburg and Robert 23). The daily flow rate had diminished with time beginning with around 62,000 barrels per day and this decreased as the hydrocarbons reservoir feeding the gusher depleted gradually. The relief well process was completed successfully on September 19, 2010. The location was at the Gulf of Mexico near Mississippi River Delta, United States. The spill date was between 20th April and 15th July 2010. It was officially sealed on 19th September 2010. The main cause was a wellhead blowout. The main operator who was working at the well was Transocean under contract for BP. The amount of the spill was approximately 4.9 million barr els in volume covering an area of between 2,500 to 68,000 square miles. The Gulf of Mexico is renowned as a rich hydrocarbon province. The oil and gas in deep water reservoirs in this area is often under extremely high pressure, which was a challenge to the drilling of the well. Prior to the blowout, the exploratory well was at a water depth of nearly 5,000 feet (1,500 m) (Freudenburg and Robert 23). ... In addition, the operations would have used complicated set of anchors, connected with cables that would have needed to be miles long. Initially, BP’s Macondo well was to explore prehistoric leftovers in the form of oil that was seen as a petroleum geologist’s version of literary license (Read 17). Prior to the blowout, the rig was constructed by Hyundai Heavy Industries, which was a South Korean company. Its ownership was by Transocean and was under lease to BP from March 2008 to September 2013. The principle developer and main operator of the Macondo Prospect was BP with a 65% share while Anadarko Petroleum Corporation owned 25% and, Moex Offshore 2007, which is a unit of Mitsui, owned 10% share (Read 25). After the accident, President Obama created the National Commission on the BP Deepwater Horizon Oil Spill and Offshore Drilling to investigate the main cause. The commission summarized that the accident occurred due to oversights, a number of different risk factors, and outright mistakes including overwhelming of the safeguards supposed to avert such an event. According to the White House report on January 2011, the report accused BP and its partners for deliberately making a sequence of cost – cutting decisions. Lack of a system that would ensure well safety was another accusation. The spill caused extensive damage to wildlife and marine habitats and as well as affecting the Gulf’s tourism and fishing industries. Its effects were also felt worldwide (Macondo report 5). The team recognized a number of risk factors that were technical in the design, testing and execution of the Macondo well. A responsible personnel management, risk, and communications by BP and its partners would certainly have averted the

Saturday, August 24, 2019

Viper's Den v. Jim Morriston Essay Example | Topics and Well Written Essays - 1500 words

Viper's Den v. Jim Morriston - Essay Example Unfortunately, the coffee was not wiped out on time because Flash attended to a phone call before cleaning it up. Jim Morriston was just through with his lunch and had taken two beers with it when he saw Flash and ran over to greet him. Jim Morriston did not see the coffee spill on the floor and neither did he see the bright yellow caution sign that warned of the slippery floor. As he was running towards Flash, he slipped and fell very heavily on the floor as a result of the coffee that had spilled on the floor. As he fell on the floor, he tried to support himself with his hands and ended up fracturing his arm in two places. As a result of this incident, Jim Morriston had to undergo surgery and he ended up spending two days in hospital so that he would be treated of the injuries he sustained from the fall. When Jim Morriston returned to Wyoming, he decided to sue Flash for negligence that led to the fall. A statement of the issues to be decided The major issues that need to be decide d include whether or not Flash has to litigate the case in Wyoming. Another major issue is whether Jim Morriston has a legitimate case of negligence over Flash and the Viper’s Den. In the first issue, Jim Morriston has sued Flash in Wyoming for neglect that led to his fall. He has gone to court right after he returned to his area of residence in Wyoming and has claimed the Flash neglected cleaning wiping off the coffee from the floor which resulted to the injuries and distress that he has today. Since the case is already in court in Wyoming, Flash needs to decide whether he has to litigate the case in Wyoming or not. Flash is of the idea that the state courts in Wyoming are not the proper jurisdiction for this particular type of case. He therefore has to decide whether he will proceed to litigate the case in Wyoming or he will challenge that decision made by Jim Morriston to take the case to the state courts at Wyoming. Another issue that needs to be decided is whether Jim Mo rriston has a legitimate case of negligence over Flash and the Viper’s Den. It has to be decided whether Jim Morriston was the one on the wrong for having taken two beers at lunch. It has to be decided whether the beers that Jim Morriston had taken impaired his sight, reasoning and actions to such an extent that he was not able to see the big bright yellow sign. The coffee spill should have been dealt with immediately so as to avoid any unnecessary accidents from occurring. However, had Jim Morriston been in his right state of mind, there would be higher chances that he would have seen the bright yellow sign and take caution to prevent him from falling. These major issues in this case therefore need to be decided in an attempt to resolve the case and come up with viable and legal solutions to the case at hand (Mallor, Barnes, Bowers & Langvardt, p. 340). Legal arguments that Flash can make against the case being litigated at Wyoming Flash can legally argue that if the reporte d incident took place in Bozeman, then Jim Morriston should have sued him in a court in Bozeman and not in Wyoming. Flash can argue that he does not do any business in Wyoming and the case would therefore lack objectivity if it was to be heard there. The state courts at Wyoming are not the proper jurisdiction for this type of case. The incident that is being reported tool place in a completely different

Friday, August 23, 2019

658 week 10 Essay Example | Topics and Well Written Essays - 2000 words

658 week 10 - Essay Example As it grows, it continues the learning process through these two fundamental methods. Through experience and instruction, an individual learns to acquire his needs from the environment. Since what a person learns is a function of their environment; the culture, society, or politics of the day will have a huge bearing on what a person can learn, unlearn, or relearn. All previous cultures and civilizations that have been experienced throughout the ages have had massive bearing on the populace behavior. The ancient Roman civilization was a republic complete with representative from every corner of the civilization. The concept of a republic complete with democratic institution was a reality. Our current civilizations borrow hugely from the Romans. This work will endeavor to interpret influences that create an individual and the social and political influence of our classrooms today. In the ancient Roman civilization, both during the Roman Republic and the Roman Empire, culture, society and politics played a huge role in the education system. The ancient Roman civilization political elite such as Julius Caesar, the Senate, Emperor Augustus, Constantine etc. were constantly involved in campaigns and conquest that had huge implication on the education system of the day (Zumbusch, 2014). These conquests and campaigns brought many slaves to Rome, some of whom played a role in the education system of the Roman civilization. Romes education system borrows massively from the Greek culture. Many Greek slaves and freemen acted as tutors. Livius Andronicus, a Greek captive from Terentum provides a classic example. As a slave, Andronicus tutored his masters children while as a freeman, became the first private tutor in Rome (Zumbusch, 2014). Ancient Rome society was composed of rigid social structure, which included the elite and the commoners. The elite were mostly successful merchants, rulers, priests and nobles. The commoners were mostly composed of farmers and laborers.

Impact of citizenship of the organisation behaviour Essay

Impact of citizenship of the organisation behaviour - Essay Example tatus in the organization, even at the lowermost levels these issues might make a difference, mainly in the presentation of individual teams in the organization (Stephen & Timothy 44). The approach of the individual can influence organizational behavior, mainly in individuals that clench responsibility for creating corporate culture, like the top management. For instance, it became discovered that money - oriented personal attitude in a worker have a negative effect on the organizational citizenship behavior (Stephen & Timothy 54). Nevertheless, it is not only the worker’s own organizational citizenship that may agonize; bad attitudes shows to affect organizational citizenship of the other employees too (Stephen & Timothy 77). Organizational behavior has often been likened to contextual performance. Correspondingly to organizational behavior, this concept emerged in reaction to the realization that looks at job precise work behaviors ignored a substantial portion of the job sphere (Don & John 67). Originally, experts in these fields focused only on activities that in a straight line supported the production of the organization. While the job market gets more aggressive, it became essential for employees to go beyond and beyond that gets formally required by the given job description in order to remain competitive (Don & John 67). Contextual performance often becomes defined as non- task connected activities and work behaviors that add to the psychological and social aspects of the organization (Jeff & Sandra 63). Contextual performance comprises of four dimensions: assistance to others, persistence of enthusiasm, rule and proscribed process following, and openly shielding the organizations objectives. Organizational behavior and contextual performance stake their defining qualities as they both contain of behaviors other than the ones needed to perform the repetitive functions of the job (Jeff & Sandra 13). All also require that the behaviors contribute to the

Thursday, August 22, 2019

Chaucer creates humour Essay Example for Free

Chaucer creates humour Essay The Merchants Tale is only rarely seen as humorous; most often it is noted for its darkness, its unrelieved acidity; it is said to offer a perversion of the courtly code.1 I disagree with this statement made by J. S. P. Tatlock. Chaucer was successful at creating humour within his narratives, which is partly why his works were, and still are, so popular. Humour can be achieved through a variety of elements including plot, characterisation, language, timing and circumstance. Chaucer used of all these, but largely drew upon the satirical portrayals of both the courtly love genre and religion within The Merchants Tale. The tale opens with The Merchant who is envious and astringent of all people that are of a higher class than he; therefore, in his narrative, he targets and satirizes the traditions of the knightly class, including the romantic conventions of courtly love often attributed to the upper classes.  Another of Chaucers tales is The Knights Tale which is about two knights and close friends, Arcite and Palamon, who are imprisoned by Theseus, duke of Athens. Whilst in prison they fall in love with the beautiful sister of Hippolyta, Emily (Emelye). The sense of competition brought about by this love causes them to hate each other. They eventually get let out of prison and fight each other to win the girl.  Arcite wins the battle, but dies before he can claim Emily, so Palamon marries her. The story introduces many typical aspects of knighthood such as courtly love and ethical dilemmas. The Merchants Tale begins with a description of Januarie who is presented, satirically, as A worthy knight. The Merchant however attempts to display to the audience that this knight is not worthy at all. He contrasts him to the knights in The Knights Tale. Theseus was tough, forceful, confident and young but Januarie is portrayed as old and fading, old and hoor. He is also shown as an exception to many knightly virtues, as he folwed al his bodily delit On women, thereas was his apetite. This portrayal of him shows the audience that he is in fact obsessed with women and sex. In the tale he attempts to gain himself a young wife, despite the warnings of his advisors. Chaucer uses the dialogue of the characters to explain to Januarie that a young wife will be difficult to keep happy at his age. He makes Januarie exclaim that She shal nat passe twenty yeer, certain Thanne shoulde I lede my lif in avoutrye,/ And go straight to the devel whan I die. Chaucer portrays him as a character envious of youth, so much so that if he cannot have a young wife he will have no choice but to sin. In other words, he must have a young wife for his own moral safety. This is not the image of a strong and powerful knight like Theseus. Januarie fails in the area of courtly love and ends up having his courtship mocked by the Merchant. This not only creates humour in the audiences eyes as we see how dim-witted Januarie really is, but it also creates sympathy for the character as he cannot help how he is portrayed. Another example of the use of satire is the whole incident with Damien, May and Januarie and the adultery issue. One could argue that May does not love Damien any more than she loves January. He could perhaps just be a suitable alternative for May to love. When she receives a love-letter from Damien, she disposes of it in the toilet (privy) which could show this lack of love for him. Therefore, her motivation for adultery could be seen as an action of revenge, as January assaulted May by marrying her, and not out of affection for Damien. This is satire on the whole theme of courtly love. This feeling of revenge on her part is further demonstrated in the cuckold scene. May deceives January in the garden and we, as the audience, cannot blame her for doing so. January built the garden so that he can have May sexually in the way he wants her. She feigns pregnancy and then steps onto Januarys back to have sex with Damien in the tree. She has been stepped on by January and now she gets to do the same to him. When Januarys sight is restored by the Gods, he rightfully accuses her of adultery. In response she acts impertinent and insulted: This thank have I for I have maad yow see/ Allas, quod she, that evere I was so kinde!'. This creates humour as the audience knows that Chaucer is satirising the idea of courtly love and cannot believe that Januarie is so dense that he believes Mays excuse.

Wednesday, August 21, 2019

Precursores De La Teoria De La Calidad

Precursores De La Teoria De La Calidad Antes de hablar de la calidad debemos referirnos a sus precursores y sobre todo al padre de la misma quien es W. Edward Deming, quien ha recibido numeroso reconocimientos entre ellos podemos hacer mencià ³n de la medalla Shewhart dela Soc. Americana de Control de Calidad en 1956. Desde muy pequeà ±o el Dr. W. Edward Deming aprendià ³ que las cosas que se hacen bien desde el principio siempre acaban bien. El estadista, educador y precursor dela Calidad Total W. Edward Deming, fue desconocido por muchos aà ±os por las corporaciones americanas, Deming viajo a Japà ³n en 1950 a la edad de 49 y pudo enseà ±ar a los administradores, ingenieros y cientà ­ficos Japoneses como podà ­an producir calidad. Luego de treinta aà ±os despuà ©s vio un documental en televisià ³n en la cadena NBC, titulado, â€Å"Si Japà ³n puede, porque nosotros no† y es a la sazà ³n donde corporaciones como Ford, General Motors y Dow Chemical, solo por mencionar algunas de las prestigiosas empresas que se dieron cuenta de lo que estaba atravesando y buscaron de inmediato la asesorà ­a del Dr. Deming. La vida del Dr. Deming se transformo por completo y se volvià ³ un torbellino de consultas y conferencias. La temprana vida de Edward Deming fue caracterizada por la carencia y el trabajo duro. Nacià ³ en Sioux City Iowa el 14 de octubre de 1900. Su padre, quien pedio una demanda judicial en Powell, siempre fue un abogado luchador, pero esto lo hizo que cambiara a toda la familia de dicha ciudad cuando Deming tenà ­a apenas siete aà ±os. Vivieron en una casa humilde donde el preocuparse por que seria su prà ³xima comida era parte de su rà ©gimen diario. Ampliamente cotizado luego que Deming compartià ³ sus ahora famosos â€Å"14 puntos† y â€Å"7 pecados mortales† con algunas de las corporaciones mà ¡s grandes de Amà ©rica. Sus patrones de calidad se convirtieron en sitios comunes en los libros de administracià ³n, y el premio Deming, otorgado por primera vez en Japà ³n pero ahora reconocido internacionalmente, es ahora buscado por algunas de las corporaciones mà ¡s grandes del mundo. Cuando Deming tenà ­a sus ocho aà ±os salià ³ a trabajar a un hotel local, Deming se fue de Powell a la edad de 17 hacia Laraman, ala Universidadde Wyoming donde realizo sus estudios de ingenierà ­a. Y luego recibià ³ un Ph. D en Fà ­sicas Matemà ¡ticas enla Universidadde Yale en 1927 donde al mismo tiempo fue empleado como profesor. Deming recibià ³ muchas ofertas en la industria privada pero tomà ³ un empleo donde trabajarà ­a para el Departamento de Agricultura en Washington, D.C. Fue acà ¡ donde Deming tuvo la dicha de conocer a su esposa, Lola Sharpe, con quien contrajo matrimonio en el 1932, y fue presentado con su guà ­a, Walter Shewhart, un estadà ­stico para Laboratorios Bell y sus escritos impactaron su vida y aquà ­ donde se convirtieron en la base de sus enseà ±anzas. Durantela Segunda GuerraMundial, Deming de dedico a enseà ±ar a los tà ©cnicos e ingenieros americanos estadà ­sticas para que pudieran mejorar la calidad de los materiales de guerra. Fue e n este trabajo en donde atrajo la atencià ³n de los japoneses. Luego de la guerra,la Unià ³n Japonesade Cientà ­ficos e Ingenieros buscà ³ a Deming. Y en julio de 1950, Deming se reunià ³ conla Unià ³nquien fue presentado con los administradores principales de las compaà ±Ãƒ ­as japonesas. Durante los treinta aà ±os siguientes, Deming dedicarà ­a todo su tiempo y esfuerzo a la enseà ±anza de los japoneses y de esta forma transformo su reputacià ³n en la produccià ³n de un motivo de risa a un motivo de admiracià ³n y elogio por las corporaciones. Es por esto que nos hacemos la siguiente pregunta  ¿Por quà © Deming fue todo un à ©xito en Japà ³n y desconocido por las corporaciones en Amà ©rica? Cuando Japà ³n estaba sumergido en una crisis en su economà ­a y en sus industrias le hicieron la invitacià ³n a Deming. Los Japoneses escucharon y cambiaron su forma de pensar, su estilo de como administrar, su trato a los empleados y se tomaron su tiempo. Tan solo c on seguir la filosofà ­a de Deming, los japoneses giraron al lado positivo su economà ­a y productividad por completo para dar paso y poder convertirse en los là ­deres del mercado mundial. Deming fue condecorado por el emperador Horohito con la medalla del Tesoro Sagrado de Japà ³n en su Segundo Grado por tan impresionante cambio que realizo. La mencià ³n decà ­a El pueblo de Japà ³n atribuyen el renacimiento de la industria Japonesa y su à ©xito mundial a Edward Deming No fue hasta la transmisià ³n del documental por NBC en Junio de 1980 donde se destaca el à ©xito industrial de Japà ³n que las corporaciones Americanas inician a prestar atencià ³n. Enfrentados por una produccià ³n decadente y costos increà ­blemente altos, los Presidentes de las corporaciones Americana iniciaron a consultar con Deming acerca de negocios. Se dieron cuanta que las tà ­picas soluciones rà ¡pidas y fà ¡ciles de las corporaciones Americanas ya no funcionaban. Los principios de Deming establecà ­an que mediante el uso de mediciones estadà ­sticas, una compaà ±Ãƒ ­a podrà ­a ser capaz de graficar como un sistema en particular estaba funcionando para luego desarrollar maneras para mejorar dicho sistema. A travà ©s de un proceso de transformacià ³n en avance, y siguiendo los Catorce Puntos y Siete Pecados Mortales, las compaà ±Ãƒ ­as estarà ­an en posicià ³n de mantenerse a la par con los constantes cambios del entorno econà ³mico. Obviamente, esto era mu cho mas largo, incluà ­a mas procesos de los que estaban acostumbrados las corporaciones Americanas; de aquà ­, la resistencia a las ideas de Deming. El Dr. Edward Deming estuvo disponible parala Amà ©rica corporativa para tà ©rminos de consulta y a individuales a travà ©s de sus escritos y tours de seminarios por los prà ³ximos trece aà ±os de su vida. En el 1993 murià ³, pero aun vive su trabajo. Sus Slogans de misià ³n, tales como el de Ford Calidad es el primer trabajo, son aun reconocidos en la industria; sus cursos empresariales son dictados aun usando sus principios como partes integrales del curriculum; y la abreviacià ³n TQM (Total Quality Management) es ampliamente conocido y comà ºnmente utilizado a travà ©s dela Amà ©rica corporativa. Kaoru Ishikawa Conocido como el gurà º de la calidad Kaoru Ishikawa, nacià ³ en la ciudad de Tokio, Japà ³n en el aà ±o de 1915, fue graduado dela Universidadde Tokio. Ishikawa y es hoy conocido como uno de los mà ¡s famosos gurà ºs de la calidad mundial. La teorà ­a de Ishikawa era manufacturar a bajo costo. Podemos encontrar dentro de su filosofà ­a de calidad que la calidad debe ser una revolucià ³n de la gerencia. El control de calidad es prà ¡cticamente desarrollar, diseà ±ar, manufacturar y mantener un producto de calidad. Algunos efectos dentro de empresas que se logran implementando el control de calidad son la reduccià ³n de precios, bajan los costos, se establece y mejora la tà ©cnica, entre otros. Kaoru Ishikawa tambià ©n dio a conocer al mundo sus siete herramientas bà ¡sicas para la calidad la cuales son: la grafica de pareto, el diagrama de causa efecto, la estratificacià ³n, la hoja de verificacià ³n, el histograma, el diagrama de dispersià ³n y la grafica de control de Schewhart. Podemos hacer mencià ³n de algunos de sus libros mà ¡s conocidos los cuales son: Que es el CTC, Guia de Control de calidad Herramientas de Control de Calidad. Kaoru Ishikawa en el Desarrollo dela Calidadnos dice que practicar el Control de Calidad (CTC) es desarrollar, diseà ±ar manufacturar y mantener un producto de calidad que sea el mà ¡s econà ³mico, el mà ¡s à ºtil y sobre todo el mà ¡s satisfactorio para el consumidor. En la Universidadde Tokio Ishikawa fue pedagogo y precursor de la Unià ³nof Japanese Scientists and Engineers (UJSE), la cual se ocupaba de promover la calidad dentro de Japà ³n mientras el ciclo de la post-guerra. Ishikawa inclusive durante gran parte de su vida originà ³ ideas revolucionarias de calidad. En el 1962, Ishikawa dio apertura a los ambientes de calidad en la Nippon Telegraph and Cable. Dando definicià ³n a los clientes como internos y externos de las organizaciones. Se puede decir que la carrera de Kaoru Ishikawa en algunas formas u otras es afà ­n a la historia econà ³mica del Japà ³n contemporà ¡neo. Ishikawa, en Japà ³n entero aprendieron sobre las bases del control de calidad estadà ­stico que los Americanos desplegaron. Pero como los logros econà ³micos del Japà ³n no son limitados a imitar productos extranjeros, los logros de calidad del Japà ³n e Ishikawa en particular van mas allà ¡ de la aplicacià ³n eficiente de ideas importadas. Es posible que la contribucià ³n mà ¡s importante de Ishikawa haya sido su rol en el desarrollo de una estrategia de calidad japonesa. La calidad para los Japoneses es parte de sus propias vidas, no solo la aplican de arriba a abajo en una empresa, sino que tambià ©n al producto, dentro del proceso de produccià ³n, tanto bajo el uso del cliente. Podemos decir que uno de los logros mà ¡s importantes de la vida de Kaoru Ishikawa fue contribuir al à ©xito de los ambientes de calidad. El diagrama de causa-efecto, habitualmente citado el diagrama de Ishikawa, posiblemente es el diagrama que lo hizo fundamentalmente conocido. Este diagrama ha manifestado ser una herramienta muy fuerte que puede ser simplemente utilizada para investigar y solucionar problemas, es tan simple que cualquier persona lo puede utilizar. A pesar que los ambientes de calidad se desplegaron primero en Japà ³n, se difundieron a mà ¡s de 50 paà ­ses, una expansià ³n que Ishikawa jamà ¡s se hubiera imaginado. Inicialmente, Ishikawa entendà ­a que los cà ­rculos dependà ­an de factores à ºnicos que se encontraban en la sociedad japonesa. Pero despuà ©s de ver cà ­rculos creà ¡ndose en Taiwà ¡n y Corea del Sur, à ©l teorizà ³ que los cà ­rculos de calidad pueden desarrollarse en cualquier paà ­s del mundo siempre y cuando dicho paà ­s utilizara el alfabeto Chino. El razonamiento de Ishikawa era que el alfabeto Chino, uno de los sistemas de escritura mà ¡s difà ­ciles pueden ser aprendidos solo con mucho estudio, el trabajo duro y el deseo de la educacià ³n en ese perà ­odo se hicieron sumamente importante en esos paà ­ses. Como parte del comità © para el premio Deming, Ishikawa impulso una auditoria implacable que establece cuales compaà ±Ãƒ ­as son aspirantes para el premio Deming. Dicha auditoria pretende la colaboracià ³n de los altos ejecutivos de la empresa. De acuerdo a Ishikawa el saber de la gente que la empresa es activa y se mueve hacia el perfeccionamiento es el mejor premio que el triunfador puede recibir.   

Tuesday, August 20, 2019

Defining And Analysing Computer Crimes

Defining And Analysing Computer Crimes Computer crime comes in many different forms and can cause serious amounts of damage. It has been around as long as the computer has and criminals are always finding new ways to beat the system. With the constant advancements in technology, it has become easier for criminals to hide information about their crime. Evidence is now handled and collected differently than it was in the past and requires a significant amount of careful forensic investigation. What is computer crime? Computer crime is illegal activity that is committed on the internet or through networks. The department of justice has three separate categories in which computer crime can be labeled. The first category is attacking computers of others, such as spreading a virus. The second category is using the computer to commit a crime which could also be committed the physical world, such as fraud or illegal gambling. The third and last category is using the computer to store stolen or illegal information (Citizenship.org). There are several different types of computer crime committed in the world today. Of those include: fraud, identity theft, phishing scams, malware, viruses, cyber stalking, and child pornography. Computer crime has been around for nearly two centuries, with the first ever recorded occurring in the year 1820 (hubpages.com). With the continual advancements in technology, it has been made easier for criminals to hide information about their crimes. Cyber crimes are handled differently than they have in the past because of this fact. When computers are attacked, it can completely alter the system and most times it will even cause damage. Also, computers that have been attacked have the capability to spread the attack to other systems within the same network (CERT.org). Statistics on Computer crime According to Minnesotas Internet Crime Complaint Center (IC3) 2008 Internet Crime Report, a total of 3,578 complaints came in. There are several different categories that the complaints are separated into. To name a few of those categories, there is check fraud, hacking, credit card fraud, Nigerian letter fraud, and identity theft. Here are some statistics that were collected during the year 2008: Non Delivery of Merchandise/Payment was the top complaint and accounted for 31.9% of all internet crime called in. Auction fraud came in second accounting for 27.5% of all internet fraud 78.5% of all perpetrators were male Within the country, California is the home to the largest percentage of perpetrators accounting for 15.8% Of the world, the United States is home to 66.1% of all perpetrators This is just a small percentage of the statistics I discovered when visiting the website of the Federal Bureau of Investigation (fbi.org). According to the IC3, the rate of computer crime continues to climb as the years pass by. The group has been collecting information and statistics on internet crime for the past three years in hopes to find trends among perpetrators and crimes committed in order to better solve the crimes of the future. Hacking: What is it? The term hacking has several different meanings and it means different things to different generations. In the 1950s and 1960s, computer programmers viewed hacking as an intellectual exercise and prefer to use the term cracking instead in order to separate themselves with the negative connotation that came along with being considered a hacker. The younger generation feels that hackers of today are doing the real work of exploration which was made necessary due to the prior generation selling out (Thomas). According to the dictionary, the official definition of hacker is a computer enthusiast and a microcomputer user who attempts to gain unauthorized access to proprietary computer systems (dictionary.com). Hacking has its own meaning to different people. To some its a means of exploration and education; to others its more about playing childish, but costly, pranks on people and companies (Thomas). Hacking Then Hackers of the 1960s and 1970s were found to be university graduate students with a profound interest in computers. Hacking grew to be quite popular in the labs of well respected colleges such as the Massachusetts Institute of Technology (MIT), Cornell, and Harvard. Students would play around with computers on their college campus and solve problems that eventually led to the creation of the personal computer. It was the birth of something that would lead to a new culture of innovative technological advances. Those who were able to hack were considered to be computer geniuses or nerds, rather than hackers (Thomas). Hacking Now Hackers of today are commonly found to be in their teenage years. The reason for such age difference between the times is that fifty to sixty years ago, you could only find computers on college campuses whereas today, it is uncommon to find a household that does not own at least one computer. They are more readily available for young children not yet in college to dupe around with. Technology today is also very different than it used to be. There are now passwords and PIN numbers in order to protect the user from having any information stolen. Security is stronger now, which is good for the common users of online systems such as eBay, online banking, or any other accounts which are password protected. However, as Thomas clearly states, security today is a double-edged sword. Although people are more protected, it also protects the hackers from becoming easily identified (Thomas). Hackers are able to take advantage of this and often continue to hack into systems of major companies, or even your personal computer at home. It seems that hacking was something more positive 60 years ago. It was used to discover new technology and helped to design and create more advanced machines and programs for people to use. It was something great that only those who were quite knowledgeable were capable of doing. However, with such great accomplishments, it has been made easier for the younger generation to turn the term hacker into something negative. Thomas describes these hackers as new-school hackers and soon a new hacking culture was born. Soon, hackers of the new generation began to use their knowledge against the world. They would meet to share what they have learned and would develop new ways to attack systems (Thomas). This new generation would turn hacking into crime that so many were willing to commit. Ethical Evaluation of Hacking From what it seems, hacking can be used to do both good and bad, which may make one wonder whether or not it can be viewed as ethical. I have always assumed that hacking was a bad thing and went along with its ever common negative connotation. I feel that people hack into systems to steal information from another party; whether it be a large corporations secret files, or your next door neighbors bank account. From what Ive studied so far, hackers from the past acted on a more ethical basis than the hacker of today. They used their knowledge for the better and acted on good will to try and find new ways to improve the age of computers. In order to really dig into it, I studied the ethics of hacking using two different working ethical theories; Kantianism and the Social Contract Theory. Hacking and Kantianism Kantianism has a lot to do with good will and the desire to do the right thing. The reason for doing a certain act, in this case hacking, should cultivate the desire to what is right. There are two categorical imperatives correlated with this theory. The first states that if you act on moral rule, you must first see how it will affect the universal more laws. This means that before you commit an act, first think about what would happen if everyone were to commit this same act (Quinn). To put this into perspective, hackers basically break security barriers to obtain information which they are probably not allowed to see in the first place. If there is a rule that makes it okay for everyone to break security barriers, it would completely defeat the purpose of having a secure system set up in the first place. There would no longer be such a thing as unauthorized information. Everyone would be allowed to somehow break in to the system and read it. The company might as well just display t his information freely, for the world to see. This would not be right as the information is protected for a reason. It is for certain peoples eyes, and their eyes only and is not for anyone else to see. The second categorical imperative states that you should treat both yourself and other as ends in themselves and not as a means to an end. This basically states that it is unethical to use someone for your benefit (Quinn). When relating this to the act of hacking, it tells us that we need to respect others and their right to privacy. When a hacker breaks into a system, they are using other peoples information to their benefit. They are invading privacy to get what they want, which is personal information. The first categorical imperative seems to correspond better with the topic, but both imperatives basically state the hacking is an unethical act. It is not right to disrespect people or to treat them unfairly, and when hacking occurs, that is exactly what happens. Therefore, according to the Kantianism, hacking is deemed to be unethical Hacking and the Social Contract Theory The social contract takes place in a civilized society and is based upon two things. The first thing is that there is an establishment of moral rules to govern relations among citizens. The second thing is that there must be a government capable of enforcing such rules. The social contract theory states, Morality consists in the set of rules, governing how people are to treat one another; that rational people will agree to accept, for their mutual benefit, on the condition that others follow those rules as well. This contract suggests that no man has authority over another and that no one lives above the law. The community is supposed to determine the rules for its members, and all who is part of that community must abide by such rules. In order for this theory to work, the laws must not only be stated, but enforced as well. This will prevent anyone from trying to cheat the system (Quinn). If hacking were to ever be considered socially acceptable, it would almost defeat the purpose of having secure systems. People would have the right to invade other peoples privacy and basically steal what does not belong to them. This type of crime is not accepted in the physical world, so why should we choose to accept it in cyberspace? The answer to that is we should not. The social contract theory has much to do with respect for yourself and respect for others. It is not very respectful to be deceitful and steal information or items which do not belong to you. Therefore, according to the social contract theory, hacking is deemed to be unethical. How Does the FBI control Cyber Crime? The Federal Bureau of Investigation has a four-fold method that works to control and eliminate cyber crime. The first step in this process is to stop those behind the most serious computer invasions and the spread of malevolent code. Second, they must identify and put a stop to online sexual predators that use the internet to meet and exploit children and to produce, possess, or share child pornography. The third step is to counteract operations that target United States intellectual property, endangering our national security and competitiveness. Lastly, dismantle national and transnational organized criminal enterprises engaging in internet fraud (fbi.gov). Computer invasions are not taken lightly and it is very important that the FBI work to control such a crime. Here are some facts taken from the Federal Bureau of Investigation website on how serious these cyber crimes are taken: A Cyber Division at FBI Headquarters to address cyber crime in a coordinated and cohesive manner Specially trained cyber squads at FBI headquarters and in each of the 56 field offices, staffed with agents and analysts who protect against investigate computer intrusions, theft of intellectual property and personal information, child pornography and exploitation, and online fraud New Cyber Action Teams that travel around the world on a moments notice to assist in computer intrusion cases and that gather vital intelligence that helps us identify the cyber crimes that are most dangerous to our national security and to our economy; 93 Computer Crimes Task Forces nationwide that combine state-of-the-art technology and the resources of our federal, state, and local counterparts; A growing partnership with other federal agencies, including the Department of Defense, the Department of Homeland Security, and others-which share similar concerns and resolve in combating cyber crime. There are different levels of cyber crime, but we can never be too careful when it comes to protecting our people and our national security. There are several different ways of course in which the FBI will take action and that all depends on the type of cyber crime that is being committed. For example if it is trying to catch an online predator, a sting operation will be created and a member of the FBI will pose as a young child in hopes that someone will fall in to the trap. The FBI is full of highly trained professionals that know what they are doing and work their hardest to catch anyone who is being unlawful. How is Cyber Crime Different Than Physical Crime? Crime that takes place on in cyberspace is quite similar to physical crime. It is a person using their knowledge to break into another someone elses personal property. There are several laws against both types of crimes, and the penalties are just as harsh in the cyber crime world as they are in the physical. Also, both of them have the potential to cause a lot of harm and damage to others. The difference between the two is the way that the victims, or potential victims, feel about such cyber and physical crime. In recent surveys, it states that more people believe that their chances of being victims of cyber crime are much higher than being victims of physical crime. Many people are scared to participate in online banking or to shop online in fear of someone intercepting and hacking into their accounts. Also, it has been found that people are very cautious when it comes to documents that contain personal information on them by completely destroying them or assuring that they are safely stored (crime-research.org). According to a survey conducted by IBM, more than half of the businesses located in the United States believe that cyber crime is more costly to them than physical crime. The ways in which it costs them are through lost revenue, loss of current and prospective customers, and loss of employee productivity (allaboutroimag.org). Conclusion Cyber crime and hacking have been around for many years to date. It is something that developed as soon as the computing machine did. There have always been computer geniuses out there to use their knowledge for good, along with bad. After doing a lot of research and in my ethical evaluations, I have concluded that hacking is an unethical act. What started out as something that seemed like a good thing, quickly turned bad as soon as the personal computer became widely available. People began to use their knowledge against others and today we are faced with more cyber crime than ever. It is important for us and our government to keep it under control as it can cause a lot of damage to anyone who becomes a victim.

Monday, August 19, 2019

John Steinbecks Of Mice and Men Essay -- Essays Papers

Of Mice and MenRough Draft In the book Of Mice and Men by John Steinbeck, there are many instances of foreshadowing. While they may not be noticed at first, they stick out like a sore thumb in the end. The main characters in the book are Lennie, a huge man with the mind of a young child, and George, a small man who had landed them a job on a ranch. Lennie is a man who doesn't think for himself, and relies on George for guidance. They travel together, forever chasing the dream of getting a piece of land to call their own. The ranch job would get them closer to buying their own little corner of the world. One major example was when Lennie got in a fight with Curley. "'Come on, ya big bastard. Get up on your feet.' He slashed at Lennie."(p.62) Candy warned George and Lennie when ...

Sunday, August 18, 2019

Internet Scams Essay -- Computer Fraud Fraudulent

Internet Scams From the comfort of an internet user’s own home they truly have the world at their finger tips. They have access to a Global Market place through the internet. Cyberspace offers unlimited options for quick and easy ways to shop, find investment opportunities, communicate, and much more. Unfortunately however, in today’s world fraudsters also find the internet to be a quick and easy way to fool and rob unsuspecting surfers with false advertising and false promises. The fraudsters target those who do not know how to determine the validity of online offers and sales. According to the National Fraud Information Center (NFC) there were 36,802 complaints of internet fraud in 2002, and the complaints increased to 37,183 in 2003 (Internet Scams). This growing problem affects internet users everywhere, who can lose hundreds of dollars to these cunning, ruthless scam artists. According to the NFC undelivered or misrepresented goods or services from auction websites made up 89% of scam complaints in 2003 (Internet Scams). In his article entitled â€Å"Sleaze Bay,† David Freedman explains why auction websites are so appealing for fraudsters: â€Å"As is true of much of the Web, the characteristics that make auction sites so appealing—anonymity, speed, low overhead, access to millions of people, lack of outside regulation, an ability to interact from a great distance—are the very same characteristics that make rip-offs so easy† (1). According to Freedman, sites such as E-bay may be subject to shill bidding; a practice against E-bay rules that is often illegal. Shill bidding involves a seller, their friends, family, or other sellers bidding to entice other bidders to join and raise their profits. This is based on the idea that â€Å"†¦bi... ...ainst internet fraud. Works Cited Fleitas, Amy. Internet Spam Spawns Scams. Bankrate, Inc. 22, Apr. 2004 http://www.bankrate.com/brm/news/advice/20021025b.asp Freedman, David. â€Å"Sleaze Bay.† Forbes. (2000) : 5 pgs. 22 Apr. 2004 http://www.forbes.com/asap/2000/1127/134.html FTC Names Its Dirty Dozen. Federal Trade Commission. 22 Apr. 2004 http://www.ftc.gov/bcp/conline/pubs/alerts/doznalrt.htm Hendersen, Les. Pyramid Schemes. 22 Apr. 2004 http://www.crimes-of-persuasion.com/Crimes/Delivered/pyramids.htm Internet Scams. National Fraud Information Center. 22 Apr. 2004 http://www.fraud.org/2003internetscams.pdf Lanford, Jim and Audri. Internet ScamBusters. 22 Apr. 2004 http://www.scambusters.org/index.html Online Shopping. Office of Fair Trading. 22 Apr. 2004 http://www.oft.gov.uk/Consumer/Your+Rights+When+Shopping+From+Home/Online+shopping.htm

salem witchcraft trials cause and effect Essay -- essays research pape

In 1692 the area of Salem town and Salem village became very vulnerable to conflict. Severe weather such as hurricanes had damaged land and crops, the effects of King Phillips War began to impact New England society, and colonists were being forced off of the frontiers by Native peoples. The Church and the government were in heavy conflict. And those residing in Salem began to grow suspicious of one another when some prospered and others hadn’t (Marcus, p13). Suddenly people seemed very paranoid and soon residents were placing blame on one another and accusing each other of witchcraft. In a fifteen month period between 1691 and 1692 nearly twelve dozen people were accused of witchcraft in or near Salem (Norton, p8).   Ã‚  Ã‚  Ã‚  Ã‚  Although witch trials were not uncommon in Puritanical New England, none had reached such epidemic proportions as Salem. In 1691 the mass hysteria began when several young girls dabbled in witchcraft and began acting strange. When villagers took notice the girls were seriously questioned and so they began naming people, mainly woman, who had supposedly bewitched them (Boyer, p66). Several other who had been accused were woman displayed ‘unfeminine’ behavior and those who stood to inherit more economic power than most men in the area (Boyer, p66). By 1692 the young girls had continued to make false accusations of townspeople. Many of those accused were townspeople who were more prominent than others. Villagers, such as the young girl...

Saturday, August 17, 2019

Pretense rather than Reality Turns Blanche Dubois

Pretense rather than Reality Turns Balance Dubious Desire into Devastation in Tennessee Williams A Streetcar Named Desire By bouquet Research Paper Title: Pretense rather than Reality Turns Balance Dubious Desire into Devastation in Tennessee Williams A Streetcar Named Desire Course Title: Research Paper and Viva Voce course code: ENG – 426 Date of submission: 02. 05. 2013 Submitted by RMI Roy Erg. NO. 2008236032 4th Year 2nd Semester Department of English Shallot University of Science and Technology, Sylphs Submitted to DRP. Handmaid Seeker Roy Associate ProfessorThis Research Paper is submitted in partial fulfillment of the requirements for the Degree B. A. (Honors) in English. Shallot University of Science and Technology, sylphs- 3114 (Signature of Supervisor) DRP. Handmaid Seeker Roy Associate Professor (Signature of Author) Declaration I hereby declare that, this research paper entitled â€Å"Pretense rather than Reality Turns Balance Dubious Desire into Devastation in T ennessee Williams A Streetcar Named Desire† is based on my own study under the guidance of my supervisor, DRP. Handmaid Seeker Roy, Associate Professor, Department of English, Shallot University f Science and Technology.I have prepared this paper in the form of Research Paper as partial fulfillment of the degree B. A. (Honors). I have neither taken any part of this paper directly from any other sources nor submitted any part of it or in full to any other institution or for the award of any degree. Acknowledgment First and foremost, I would like to thank my respectable supervisor DRP. Handmaid Seeker Roy who shared his ideas with me and offered his time and helpful comments during the stressful period. This work is a product of my sincere effort and my oppressor has certainly being a helping one in this regard.I am grateful to him for his invaluable guidance and co-operation. I should also thank my dearest friends who were always eager to assist me. I acknowledge my debt to all of the faculty members of my department for their contribution to my education and this work. 02 May, 2013. Into Pretense rather than Reality Turns Balance Dubious Desire Devastation in Tennessee Williams A Streetcar Named Abstract In today's rough and tough world, there seems to be no room for failure. The pressure to succeed in life sometimes seems unreasonable. Others often set expectations for people too high.This forces that person to develop ways to take the stress and tension out of their lives in their own individual ways. In the play A Streetcar Named Desire written by Tennessee Williams, the main character Balance Dubious is incapable of living in the present and facing reality and that's why she takes lies and pretense as a defensive shield. Throughout the play she lives her life in illusion. An in-depth psychological study of this text will show that the final catastrophe of Blanches life is the outcome of her own lie and pretense.This paper ring the truth that Allan, S tella and Stanley pretense has a clear influence on Blanches devastation. Balance Dubious the protagonist of Tennessee Williams A Streetcar Named Desire is a fallen woman in society's eyes because of her numerous sexual liaisons. Losing her ancestral estate due to a foreclosed mortgage, losing her young husband to suicide years earlier and her Job,evicting from a motel, she seeks solace and refuge with her married sister Stella and her husband Stanley Kowalski who are living in New Orleans. She comes with her new desires leaving behind her licentious past.Pretentious Balance is disdainful of the cramped quarters of the Kowalski' two- room apartment and of the apartment's location in a noisy, diverse, working-class neighborhood. In the Kowalski household, Balance pretends to be a woman who has never known indignity. Her false propriety is not simply snobbery, however; it constitutes a calculated attempt to make herself appear attractive to new male. She always pretends to be a young lady despite crossing that period earlier. The raw and unrefined working class Stanley can not put up with her pretense.Stanley intense tater of Balance is motivated in part by the aristocratic past Balance represents. His view of life, stripped of illusion and artificiality, sees beneath the pretenses and disguises of others. He investigates Blanches past and very cruelly reveals it to Mitch with whom Balance is dreaming of her marriage. As a result Mitch leaves her. Later Stanley in a state of drunkenness rapes Balance. After doing all these Stanley goes back to his real life and pretends as if nothing has happened. Still Balance knows truth and reality.Until the very last scene Balance does not lose touch with reality. In the last scene Stella confesses to Eunice that she simply cannot allow herself to believe Blanches assertion that Stanley raped her. Stella pretends only to save her own married life. Finally Balance losing her grip on reality soon goes to an insane asylum, but Balance believes she is leaving to Join her millionaire. All her hopes and desires of a better life ends up here with her going to an mental hospital. The researcher wants to show that Blanches own pretense is responsible for her fall.Reality can be fearful to a pretender as truth can only be harmful to a liar. Reality as tough for her but not hard enough to lead to her insanity. If she had shown the mental strength of accepting reality without pretending, certainly her life would have been different. A Streetcar Named Desire is a 1947 play written by American playwright Tennessee Williams for which he received the Pulitzer Prize for Drama in 1948. Multiple works and researches have been done on this famous drama by different critics. Alvin B.Korean presents A Streetcar Named Desire as Williams clearest treatment of the human dilemma which entails the dramatic dilemma. He offers in Streetcar two polar says of looking at experience: the realistic view of Stanley Kowalski and the eggn og- realistic view of his sister-in-law, Balance Dubious. Joseph N. Riddle showed A Streetcar Named Desire- Nietzsche Descending where Williams borrows from Nietzsche in great chunks, often undigested, using his sources with that liberal freedom that has become characteristic of the American artist in search of a theme.Again Leonard Bergman exemplifies traditional tragedy of A Streetcar Named Desire which enlist the array of forces emporal and eternal, comprehensible and beyond human ken- against which the heroic struggle must be waged. A Streetcar Named Desire is an inspired refutation of the linking of modern American drama with the common man. Balance Dubious was a troubled woman who throughout the play lives her life in illusions. To deal with the problems and hardships of her lives she retreats into her own separate world of illusion and lies.Balance says: gel don't want realism. I want magic! Yes, yes, Magic! I try to give that to people. I misrepresent things to them. I don't tell the truth, I tell what ought to be the truth. Eh (Sc. 9 p. 204) . The story begins with Balance going to New Orleans to stay with her sister Stella, and her husband Stanley for a while. She describes her voyage: eighty told me to take a streetcar named Desire, and then transfer to one called Cemeteries and ride six blocks and get off at Elysian Fields(Sc. 1 p. 177). This Cheshire is the driving force, the vehicle of her voyage.This driving force encourages her to evade harsh reality and create an illusory world with her imagination. When Balance first appears in agelessly Fields, she is presented through her congruousness appearance: she is daintily dressed in a white suit with a fluffy bodice, necklace ND earrings of pearl, white gloves and hate(Sc. 1 p. 1 17). In appearance, she is a glamorous, ladylike aristocrat, who is perhaps slightly nervous. She parades about the house as if she is a regal figure, wearing elegant gowns and delicate Jewelry.Balance likes to appear riche r than she really is, in a similar way to costume Jewelry emulating real gold or silver. Her reaction to Stellar apartment is somewhat shocking an its a part of her pretension: ego, left not going to be hypocritical, I'm going to be honestly critical about it! Explain this place to me! What are you doing in a place like this? H (SC. I p. 121) This reaction would be Justified if she had her previous high standards as a result of growing up in Belle Reeve, a great big place with white columns. Now she is a penniless woman with no place to live in.But her words to Stella shows that in her mind she is still living in her aristocratic world and unable to bear this common surrounding. She pretends to be someone very concerned with moral values and social reasoning. She does not want to be seen by the men before she powders herself. She hides behind a mask of manufactured beauty, struggling to stay attractive. She says: guy know I haven't put on one ounce in ten years, Stella? I weigh what I weighed the summer you left the Belle Revere (Sc. L p. 123). It seems that she believes she is still having the same glam-our as she had ten years earlier.Balance cannot seem to leave behind the moribund past of Belle Reeve and accept the sterile, modern New South of the Elysian Fields. Thus when Balance gets to New Orleans, she decides that in order to not reveal anything, she must create the illusions that she is happy and the reason she is there only because she's on vacation. This is so that nobody would think less of her. Even she lies to her loving sister Stella and hides the fact that she has lost her Job. gel was so exhausted by all left would been through my nerves broke. So Mr. graves is the superintendent – he suggested I take a leave of absence (Sc. P. 122). Thus she conceals the truth so that no one can know her weaknesses. But such attempts only reveal her pretension and superficiality throughout the play. She says to Stella: Egypt don't you look at me, Stell a, no,no,no, not till later, not till leave bathed and rested! Looked at in this merciless glare! Eh And turn that light off I won't be (Sc. L p. 120). She tries to avoid bright light of any kind. Her reaction to light can be regarded as an attempt to hide her true nature as well as her vanishing beauty and youth. By hiding from the light, she tries to escape reality.She covers the naked light bulb with a Chinese paper lantern, saying, gel canine stand a naked light bulb, any more than I can a rude remark or a vulgar action (Sc. 3 p. 150). This remark shows that Balance would rather hide behind polite phrases than accept truth and reality. However her illusory world soon confronts with Stanley straightforwardness and honesty which seems to pose a strong threat towards Balance. Balance deceives everyone for a good portion of the play. Stanley does not enjoy agencies, he says that visage men are took in by this Hollywood glam-our stuff and some men are note(Sc. P. 137). As Balance Dub ious has created a sort of glass cube around herself, for protection, and people such as Stanley threaten to shatter that glass cube by learning her secrets. Swell, life is too full of evasions and ambiguities , I think. I like an artiste who paints in strong, bold colors, primary colors (Sc. 2 p. 137). She is denying her reality and urging for a life filled with all brightness and colors. In front of Stanley she pretends that she is not vulnerable. Pretension is her primary means of self-defense. She is not deceitful out of malice. But, Stanley does not buy into her facades.Stanley and Balance gradually become enemies. He starts questioning her and others about her last few years. Stanley continuously tries to discover her true history so that he can destroy her pretensions and let everyone know the real Balance. He does this because he is straightforward and doesn't like to be deceived. Stanley search ultimately explores the reasons of her pretensions. :What initially leads to her illusions is love. When she was young sixteen, . Made the discovery – love All at once and much, much too completely (Sc. 6 p. 182). She met Allan Grey and fell in love.The young couple got married and, to Balance, were falling more and more in love, when one day coming into a room that I thought was empty (Sc. 6 p. 183), this illusion would be shattered. In this room she found her husband, Allan, and a older male friend of his. Allan Grey was gay. Allan was in fact a pretender himself, by trying to appear straight. At first, they tried to deny it but very soon the illusion was totally destroyed as Allan killed himself. From that moment she is afraid of reality and hides herself behind her pretentious world. But she forgets illusions honest last forever and pretensions must face truth someday.Balance came to Elysian Fields to forget her horrible past, and to have a fresh start . In fact Balance admits in the fourth scene that she wants to make herself a new life. Though she forgets, creation of happy life based on lies will soon be demolished with the blow of truth. After coming in New Orleans she meets a friend of Stanley, Mitch, and eventually she starts to think that maybe he is the one. Immediately, she realizes that, Mitch needs someone too. With Mitch she puts on the airs of a woman who has never known indignity. Although Balance was once a kind, normal, sweet girl, her very being has deteriorated.Now, all thefts left is what she struggles desperately to maintain on the outside. Balance thinks of Mitch as a future husband, and therefore she does not want him to know her past or her true age, and the best way to hide her age is to stay out of bright light where he could possibly see her wrinkles and fading youth in her face. However her deception soon brought into light by Stanley. Her promiscuity in laurel, sexual relations with anyone who agreed to it and finally her mistake of trying to seduce a 17 – year old student of hers. While stayi ng in New Orleans she tries her best to forget her past and purify herself.She is always having baths so no one can see her dirty or tired. She is obsessed with bathing, though it doesn't t necessarily washes her dirty past. Her past catches up with her and destroys her relationship with Mitch. Mitch accuses her of lying and pretending. But she denies such accusation asserting that gender inside,' didn't lie in my hearted(Sc. P. 205). Suddenly everything begins to fall around Balance Just as quickly as she has built it. Mitch realizes that Balance has been deceiving him and looks down on her true impure self. It is now that Balance completely unravels.Mitch leaves her and she is left all alone only with her broken illusions. This incident with Mitch makes Balance mentally and emotionally battered. Then Stanley comes to inflict more damage to her. Still then Balance is making stories about her supposed lovers (Sheep Hunting) to salvage her pride, pretend to play along with the charad e. He asks peculiar questions that force Balance to a point where she could no longer keep up her act. Then, to deliver the ultimate insult to Balance, Stanley brutally rapes her. This shock actually leads her to a permanent illusive world.Previously she used to lie with others but now she loses her touch with reality. Nobody is ready to accept her fairy tales anymore though this time she is telling the truth. Even Stella denies her truth. Stella tells Eunice: who replies: gel couldn't believe her story and go on living with Stanley', . Goon's ever believe tie Life has got to go on. No matter what happens, you've got to keep owing† (Sc. Al p. 217). Here it almost seems as though Stella is realizing what is reality and what is not. But she pretends to disbelieve Balance in order to avoid any kind of rift in married life.Thus Stella makes a conscious decision to believe Stanley instead of her sister because to do otherwise would be both emotionally and economically difficult wit h a new baby so she, too, is engaging in a measure of self-deception. Stanley is also revealed to be capable of deceit, he does not admit the truth of what happened between him and Balance to his friends, to Stella, and maybe not even to himself. Stellar deception shatters the least hope and strength of Balance. She is no more be capable of pulling herself to face the reality. Once she created this fantasy world to hide the hurts from her youth.But now she begins to fabricate lies so complex that even she believes them. All she ever desired was a good, clean life. What she acquired is complex enigmas buried in the deepest catacombs of her soul and an asylum, or psychiatric hospital to live with her own imagination and deceive none but herself. Finally Alliances shocking reality would not disturb Blanches life so much if he had never pretended to be straight. Balance felt she could evade reality and live up with illusion. But that was not to happen because reality stays with people l ike shadows.Balance blurt the truth in front of Allan which results in the suicide of him. It messed up her life and she sank herself into an illusory world to get some relief. Her illusion gave her temporary relief but snatched the opportunity of real happiness. She lied to her sister who as a result denies to accept her truth at last. She thought of finding happiness and escaping sorrow by hiding herself under the roof of Mitchell love. She wished to be loved and supported by Mitch. But he hardly spent a peaceful moment with Mitch as she was always afraid of the revelation of her lies.