Wednesday, July 31, 2019

3-D Password for More Security

ADVANCED E-SECURITY CP5603 MINOR RESEARCH REPORT Submitted By: Neeraj Kumar MIT-MBA Student ID. : 12682310 TABLE OF CONTENTS Title Page no ABSTRACT 3 INTRODUCTION 2-6 1. 1 Authentication 5 1. Authentication Methods 5-6 1. 3 Organization of the Report 6 ACTUAL RESEARCH WORK 7-8 3D PASSWORD SYSTEM 2. 1 Overview 7 2. 2 Innovative Component 7-8 2. Comparison with Current Authentication Systems 8 IMPLEMENTATION OF THE 3D PASSWORD 9-16 3. 1 Virtual Object Recognition 9 3. 2 3D Password Selection and Inputs 10-13 3. 3 3D Virtual Environment Design Guidelines 14-16 APPLICATIONS 17-18 4. Advantages 18 CONCLUSION 19 REFERENCES 20 ABSTRACT Current authentication systems suffer from many weaknesses. Textual passwords are commonly used; however, users do not follow their requirements. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks.Many available graphical passwords have a password sp ace that is less than or equal to the textual password space. Smart cards or tokens can be stolen. Many biometric authentications have been proposed; however, users tend to resist using biometrics because of their intrusiveness and the effect on their privacy. Moreover, biometrics cannot be revoked. In this report mechanism of secure authentication is dicussed. The 3-D password is a multifactor authentication scheme. To be authenticated, we present a 3-D virtual environment where the user navigates and interacts with various objects.The sequence of actions and interactions toward the objects inside the 3-D environment constructs the user’s 3-D password. The 3-D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3-D virtual environment. The design of the 3-D virtual environment and the type of objects selected determine the 3-D password key space. INTRODUCTION In this chapter the pass word stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc.Current authentication systems suffer from many weaknesses. Textual passwords are commonly used; however, users do not follow their requirements. Users tend to choose meaningful words from dictionary or their pet names, girlfriends etc. Ten years back Klein performed such tests and he could crack 10-15 passwords per day. On the other hand, if a password is hard to guess, then it is often hard to remember. Users have difficulty remembering a password that is long and random appearing. So, they create short, simple, and insecure passwords that are susceptible to attack.Which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Graphical passwords schemes have been proposed. The strength of graphical passwords comes from the fact that users can recall and recognize pictures more than words. Most graphical passwords are vulnerable for shoulder surfing attacks, where an attacker can observe or record the legitimate user’s graphical password by camera. Token based systems such as ATMs are widely applied in banking systems and in laboratories entrances as a mean of authentication. However, Smart cards or tokens are vulnerable to loss or theft.Moreover, the user has to carry the token whenever access required. Biometric scanning is your â€Å"natural† signature and Cards or Tokens prove your validity. But some people hate the fact to carry around their cards, some refuse to undergo strong IR exposure to their retinas (Biometric scanning). In this seminar, present and evaluate our contribution, i. e. , the 3-D password. The 3-D password is a multifactor authentication scheme. To be authenticated, we present a 3-D virtual environment where the user navigates and interacts with various objects.The sequence of actions and interactions toward the objects inside the 3-D environment constructs the user’s 3-D password. The 3-D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3-D virtual environment. The design of the 3-D virtual environment and the type of objects selected determine the 3-Dpassword key space. 1. 1 AUTHENTICATION Authentication is the act of establishing or confirming something as authentic, that is, that claims made by or about the subject are true.This might involve confirming the identity of a person, tracing the origins of an artifact, ensuring that a product is what it’s packaging and labeling claims to be, or assuring that a computer program is a trusted one. For example, when you show proper identification credentials to a bank teller, you are asking to be authenticated to act on behalf of the account holder. If your authentication request is approved, you become authorized to access the accounts of that account holder, but no others. 1. 2 AUTHENTICATION METHODS The first i s comparing the attributes of the object itself to what is known about objects of that origin.For example, an art expert might look for similarities in the style of painting, check the location and form of a signature, or compare the object to an old photograph. An archaeologist might use carbon dating to verify the age of an artifact, do a chemical analysis of the materials used, or compare the style of construction or decoration to other artifacts of similar origin. The physics of sound and light, and comparison with a known physical environment, can be used to examine the authenticity of audio recordings, photographs, or videos. The second type relies on documentation or other external affirmations.For example, the rules of evidence in criminal courts often require establishing the chain of custody of evidence presented. This can be accomplished through a written evidence log, or by testimony from the police detectives and forensics staff that handled it. Some antiques are accomp anied by certificates attesting to their authenticity. External records have their own problems of forgery and perjury, and are also vulnerable to being separated from the artifact and lost. Currency and other financial instruments commonly use the first type of authentication method.Bills, coins, and cheques incorporate hard-to-duplicate physical features, such as fine printing or engraving, distinctive feel, watermarks, and holographic imagery, which are easy for receivers to verify. Consumer goods such as pharmaceuticals, perfume, fashion clothing can use either type of authentication method to prevent counterfeit goods from taking advantage of a popular brand's reputation (damaging the brand owner's sales and reputation). A trademark is a legally protected marking or other identifying feature which aids consumers in the identification of genuine brand-name goods. 1. ORGANIZATION OF THE REPORT The 3-D password is a multifactor authentication scheme. To be authenticated, we presen t a 3-D virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions toward the objects inside the 3-D environment constructs the user’s 3-D password. The 3-D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3-D virtual environment. The design of the 3-D virtual environment and the type of objects selected determine the 3-Dpassword key space.ACTUAL RESEARCH WORK 3D PASSWORD SYSTEM 2. 1 OVERVIEW In this chapter the system consist of multi factor authentication scheme. It can combine all existing authentication schemes into a single 3Dvirtual environment. This 3D virtual environment contains several objects or items with which the user can interact. The user is presented with this 3D virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions toward the objects i nside the 3D environment constructs the user’s 3Dpassword.The 3D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3D virtual environment. The choice of what authentication schemes will be part of the user's 3D password reflects the user's preferences and requirements. A user who prefers to remember and recall a password might choose textual and graphical password as part of their 3D password. On the other hand users who have more difficulty with memory or recall might prefer to choose smart cards or biometrics as part of their 3D password.Moreover user who prefers to keep any kind of biometric data private might not interact with object that requires biometric information. Therefore it is the user's choice and decision to construct the desired and preferred 3D password. 2. 2 INNOVATIVE COMPONENT The proposed system is a multi-factor authentication scheme that combines the benefits of various authentication schemes. Users have the freedom to select whether the 3D password will be solely recall, recognition, or token based, or combination of two schemes or more. This freedom of selection is necessary because users are different and they have different requirements.Therefore, to ensure high user acceptability, the user’s freedom of selection is important. The following requirements are satisfied in the proposed scheme 1. The new scheme provide secrets that are easy to remember and very difficult for intruders to guess. 2. The new scheme provides secrets that are not easy to write down on paper. Moreover, the scheme secrets should be difficult to share with others. 3. The new scheme provides secrets that can be easily revoked or changed. 2. 3 COMPARISON WITH CURRENT AUTHENTICATION SYSTEMS Suffer from many weaknesses. Textual passwords are commonly used.Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and v ulnerable to dictionary or brute force attacks. Many available graphical passwords have a password space that is less than or equal to the textual password space. Smart cards or tokens can be stolen. Many biometric authentications have been proposed. However, users tend to resist using biometrics because of their intrusiveness and the effect on their privacy. Moreover, biometrics cannot be revoked. The 3D password is a multi-factor authentication scheme.The design of the 3D virtual environment and the type of objects selected determine the 3D password key space. User have freedom to select whether the 3D password will be solely recall, recognition, or token based, or combination of two schemes or more. IMPLEMENTATION 3. 1 VIRTUAL OBJECT RECOGNITION Virtual objects can be any object that we encounter in real life. Any obvious actions and interactions toward the real life objects can be done in the virtual3Denvironment toward the virtual objects. Moreover, any user input (such as spea king in a specific location) in the virtual 3Denvironment can be considered as a part of the 3Dpassword.We can have the following objects: 1) A computer with which the user can type; 2) A fingerprint reader that requires the user’s fingerprint; 3) A biometric recognition device; 4) A paper or a white board that a user can write, sign, or draw on; 5) An automated teller machine (ATM) that requests a token; 6) A light that can be switched on/off; 7) A television or radio where channels can be selected; 8) A staple that can be punched; 9) A car that can be driven; 10) A book that can be moved from one place to another; 11) Any graphical password scheme; 12) Any real life object; 3) Any upcoming authentication scheme. The action toward an object (assume a fingerprint recognition device)that exists in location (x1 , y1 , z1 ) is different from the actions toward a similar object (another fingerprint recognition device) that exists in location (x2 , y2 , z2 ),where x1 = x2 , y1 = y 2 , and z1 = z2 . Therefore, to perform the legitimate 3Dpassword, the user must follow the same scenario performed by the legitimate user. This means interacting with the same objects that reside at the exact locations and perform the exact actions in the proper sequence. 3. 2 3D PASSWORD SELECTION AND INPUTSLet us consider a 3Dvirtual environment space of size G ? G ? G. The 3Denvironment space is represented by the coordinates (x, y, z) ? [1†¦ G]? [1†¦ G]? [1†¦ G]. The objects are distributed in the 3Dvirtual environment with unique (x, y, z) coordinates. We assume that the user can navigate into the 3Dvirtual environment and interact with the objects using any input device such as a mouse, key board, fingerprint scanner, iris scanner, stylus, card reader, and microphone. Consider the sequence of those actions and interactions using the previous input devices as the user’s 3Dpassword.For example, consider a user who navigates through the 3Dvirtualenvironment that consists of an office and a meeting room. Let us assume that the user is in the virtual office and the user turns around to the door located in (10, 24, 91) and opens it. Then, the user closes the door. The user then finds a computer to the left, which exists in the position (4, 34, 18), and the user types â€Å"FALCON. † Then, the user walks to the meeting room and picks up a pen located at (10, 24, 80) and draws only one dot in a paper located in (1, 18, 30), which is the dot (x, y) coordinate relative to the paper space is (330, 130).The user then presses the login button. The initial representation of user actions in the 3Dvirtual environment can be recorded as follows: †¢ (10, 24, 91) Action = Open the office door; †¢ (10, 24, 91) Action = Close the office door; †¢ (4, 34, 18) Action = Typing, â€Å"F†; †¢ (4, 34, 18) Action = Typing, â€Å"A†; †¢ (4, 34, 18) Action = Typing, â€Å"L†; †¢ (4, 34, 18) Action = Typin g, â€Å"C†; †¢ (4, 34, 18) Action = Typing, â€Å"O†; †¢ (4, 34, 18) Action = Typing, â€Å"N†; †¢ (10, 24, 80) Action = Pick up the pen; †¢ (1, 18, 80) Action = Drawing, point = (330, 130). Figure 3. 2 – Snapshot of an experimental 3-D virtual environmentThe 3-D password is a multifactor authentication scheme. It can combine all existing authentication schemes into a single 3-D virtual environment. This 3-D virtual environment contains several objects or items with which the user can interact. The type of interaction varies from one item to another. The 3-D password is constructed by observing the actions and interactions of the user and by observing the sequences of such actions. It is the user’s choice to select which type of authentication techniques will be part of their 3-D password. This is chieved through interacting only with the objects that acquire information that the user is comfortable in providing and ignoring th e objects that request information that the user prefers not to provide. For example, if an item requests an iris scan and the user is not comfortable in providing such information, the user simply avoids interacting with that item. Moreover, giving the user the freedom of choice as to what type of authentication schemes will be part of their 3-D password and given the large number of objects and items in the environment, the number of possible 3-D passwords will increase.Thus, it becomes much more difficult for the attacker to guess the user’s 3-D password. Fig 3. 2. 1 State diagram of 3D password 3. 3 3D VIRTUAL ENVIRONMENT DESIGN GUIDELINES The design of the 3 D virtual environments affects the usability, effectiveness, acceptability of 3D password. The first step in building a 3 ­Dpassword system is to design a 3 ­Denvironment that reflects the administration needs and the security requirements. Figure 3. 3 3D virtual environment 1) Real life-similarity ­The prospec tive 3 ¬D virtual environment should reflect what people are used to seeing in real life. Objects used in virtual environments should be relatively similar in size to real objects (sized to scale). Possible actions and interactions toward virtual objects should reflect real life situations. Object responses should be realistic. The target should have a 3 ­D virtual environment that users can interact. 2) Object uniqueness and distinction ­ Every virtual object or item in the 3 ­D virtual environment is different from any other virtual object.The uniqueness comes from the fact that every virtual object has its own attributes such as position. Thus, the prospective interaction with object 1 is not equal to the interaction with object 2. However, having similar objects such as 20 computers in one place might confuse the user. Therefore, the design of the 3 ­D virtual environment should consider that every object should be distinguishable from other objects. Similarly, in desi gning a 3 ­Dvirtual environment, it should be easy for users to navigate through and to distinguish between objects.The distinguishing factor increases the user’s recognition of objects. Therefore, it improves the system usability. 3) Three Dimensional Virtual Environment Size  ­ A 3 ­Dvirtual environment can depict a city or even the world. On the other hand, it can depict a space as focused as a single room or office. A large 3 ¬D virtual environment will increase the time required by the user to perform a 3 ­Dpassword. Moreover, a large3 ­Dvirtual environment can contain a large number of virtual objects. Therefore, the probable 3 ­Dpassword space broadens.However, a small 3 ­D virtual environment usually contains only a few objects, and thus, performing a 3 ­D password will take less time. 4) Number of objects and their types ­ Part of designing a 3 ­D virtual environment is determining the types of objects and how many objects should be placed in th e environment. The types of objects reflect what kind of responses the object will have. For simplicity, we can consider requesting a textual password or a fingerprint as an object response type. Selecting the right object response types and the number of objects affects the probable password space of a 3 ­D password. ) System Importance ­ The 3D virtual environment should consider what systems will be protected by a 3D password. The number of objects and the types of objects that have been used in the 3D virtual environment should reflect the importance of the protected system. APPLICATIONS The 3D password can have a password space that is very large compared to other authentication schemes, so the 3 ­D password’s main application domains are protecting critical systems and resources. 1. Critical servers ­Many large organizations have critical servers that are usually protected by a textual password. A 3-D password authentication proposes a sound replacement for a te xtual password. Moreover, entrances to such locations are usually protected by access cards and sometimes PIN numbers. Therefore, a 3-D password can be used to protect the entrance to such locations and protect the usage of such servers. 2. Nuclear and military facilities- Such facilities should be protected by the most powerful authentication systems.The 3 ­D password has a very large probable password space, and since it can contain token ­, biometrics ­, recognition ­, and knowledge based authentications in a single authentication system, it is a sound choice for high level security locations. 3. Airplanes and jet fighters ­ Because of the possible threat of misusing airplanes and jet fighters for religious, political agendas, usage of such airplanes should be protected by a powerful authentication system. In addition, 3 ­D passwords can be used in less critical systems because the 3D virtual environment can be designed to fit to any system needs.A small virtual envir onment can be used in the following systems like Some other application areas: †¢ ATM †¢ Desktop Computers ; laptop logins †¢ Web Authentication 4. 1 ADVANTAGES * Easy to memorize: Users can memorize a 3D password as a â€Å"little† story which makes the password easy to remember * Flexibility: 3d passwords allows multi-factor authentication. Smart cards, biometrics and alpha num. password can embedded in the 3d password technology * Strength: A scenario in a 3D environment offers as almost unlimited combination of possibilities.As such system can have specific 3d world, hack are extremely difficult. * The 3D password gives users the freedom of selecting what type of authentication techniques. * Secrets those are not easy to write down on paper. * The scheme secrets should be difficult to share with others. * Provide secrets that can be easily revoked or changed. CONCLUSION There are many authentication schemes in the current state. Some of them are based on us er’s physical and behavioral properties, and some other authentication schemes are based on user’s knowledge such as textual and graphical passwords.Moreover, there are some other important authentication schemes that are based on what you have, such as smart cards. Among the various authentication schemes, textual password and token-based schemes, or the combination of both, are commonly applied. However, as mentioned before, both authentication schemes are vulnerable to certain attacks. Moreover, there are many authentication schemes that are currently under study and they may require additional time and effort to be applicable for commercial use.In this report the 3D password mechanism is explained the 3-D password is a multifactor authentication scheme that combines these various authentication schemes into a single3-D virtual environment. The virtual environment can contain any existing authentication scheme or even any upcoming authentication schemes by adding it as a response to actions performed on an object. Therefore, the resulted password space becomes very large compared to any existing authentication schemes. REFERENCES [1] X. Suo, Y. Zhu, and G. S. Owen, â€Å"Graphical passwords: A survey,† in Proc. 1st Annual . Comput. Security Appl. Conf. , Dec. 5–9, 2005, pp. 463–472. [2] D. V. Klein, â€Å"Foiling the cracker: A survey of, and improvement to passwords security, in Proc. USENIX Security Workshop, 2008, Measurement,VOL. 57,September 2008. [3] NBC news, ATM Fraud: Banking on Your Money, Dateline Hidden Cameras Show Criminals Owning ATMs, Dec. 11, 2003. [4] T. Kitten, Keeping an Eye on the ATM. (2005, Jul. 11). ATMMarketPlace. com. [6] G. E. Blonder, â€Å"Graphical password,† U. S. Patent 5 559 961,Sep. 24, 1996. [7] http://en. wikipedia. org/wiki/3-D_Secure

Tuesday, July 30, 2019

Reflection of Aggression Essay

People usually relate the behavior of others to their internal dispositions or to their external situations. A dispositional attribution pertains to the personality of a certain person, whereas a situational attribution pertains to the environmental conditions around an event. For example, if a child was bullying another, it could be considered a dispositional attribution because the kid is just naturally a bully and he has a low self-esteem, or it could be a situational attribution because the kid that he is bullying is annoying and he deserved it. Another cause of bullying is to impress other people. It is easier to bully someone when you have a group of people behind you. Because of social facilitation, people tend to improve their performance and want to better themselves in the presence of others.For some people, they consider making someone else feel bad a way to better themselves. A person that is normally not a bully may tend to become one in a group situation. Although it ma y not be part of someone’s personality to be a bully, this may change because of deindividuation. Because the rest of the group is doing something, a certain person feels more comfortable doing it as well. A kid that may not bully anyone on his own would go along with the crowd in bullying someone because of the loss of self-awareness in a group situation. Sometimes, people can be bullied for a certain reason that is extremely unethical. This is called a prejudice or a stereotype. These two things are unjustifiable attitudes toward a group of people that in many circumstances are not at all true. For example, a person or group of people could be bullied because of their race or culture. This would be called a prejudice because it is unjustifiable to be making fun of someone because of his or her color. Oftentimes, a person is bullied because someone else needs a person to take his or her anger out on. Sometimes, a person can just be a target for someone’s anger, or a person to blame. A person may be bullied just because someone else needs a person to blame an event on. Also, a person can take out their aggression on another person when it is caused by their inability to achieve a certain goal. This is called the frustration-aggression principle. No matter what the reason, bullying or making fun of someone is not the solution to a problem. Things should be thought out and considered before drastic action is taken against a certain person, or group of people.

Monday, July 29, 2019

Brenton Butler Essay Sample

On the forenoon of May 7th. 2000 the slaying of Mary Ann Stephens occurred. She was a tourer to Jacksonville. Florida along with her hubby. The two were remaining at the Ramada Inn Hotel and had merely came from breakfast when they were approached by a immature black adult male who held them at gunpoint. took Mrs. Stephens’ bag so proceeded to hit her between the eyes. When the constabulary foremost arrived. the aged woman’s organic structure was several inches off from the way on which her and her hubby were walking along to acquire back to their room. Her organic structure was strewn across the grass. covered in blood with the slug and it’s lesion being clearly seeable to the bare oculus. This instance became controversial and it is believed that there was racial favoritism and profiling involved because Brenton Butler. and immature black male. was arrested several hours subsequently by constabularies. Police InvestigationIn the procedure of the apprehension of Brenton Butler. there was no extended probe done by the constabulary. During the test. this fact was admitted by the officers when Pat McGuiness. who was stand foring Brenton. raised the point of them non oppugning neighbors. non look intoing for Deoxyribonucleic acid on the stolen bag etc. When they arrived at the scene. they asked Mr. Stephens to give them a description of the taw. Mr. Stephens described the taw to be tall. scraggy physique. dark shirt and trunkss. a fishing chapeau and black in skin colour. Polices that were appraising the country saw Brenton Butler. who was at the clip walking from his place to Blockbuster to manus out a sketch. a thinly framed. tall. male have oning a dark shirt and dark shorts†¦coincidentally. Brenton Butler was a black male. Officer Williams and Officer Darnell told Brenton there had been a slaying nearby and asked him to come with them to inquire him some inquiries about anythin g he may hold seen. which Brenton agreed to. When they brought 15-year-old Brenton Butler to the offense scene. Mr. Stephens instantly identified Brenton as being the liquidator and asked the officers to convey him nearer. at this clip he positively identified him as being his wife’s liquidator. When brought into the constabulary station. Military officers William and Darnell passed Butler onto Detective Glover. Detective Glover got Brenton to squeal to the slaying. He did this by physically endangering the life of Brenton and stating that for every ten seconds that passed in which Butler didn’t mark the confession. he would ache him. He represented that by demoing Brenton his gun. Detective Glover so brought Brenton out into the forests where the gun had allegedly been hidden and wanted Brenton to demo him where it was. which Brenton did non cognize. Because of this. although there was no sufficient grounds to turn out such actions. Detective Glover punched Butler in the tummy twice and one time in his left oculus. If more investigation would hold been done. they would hold accounted the fact that Brenton was 5 inches shorter and many old ages younger than the adult male that Mr. Stephens reported. Brenton besides had a really noticeable logo on the forepart of the shirt he was have oning. when Mr. Stephens spoke of what the liquidator was have oning he said the shirt had been obviou sly. Besides. when Mr. McGuiness spoke with Brenton’s female parent in their place. he got a expression at Brenton’s hat aggregation. which consisted of 3 chapeaus. none of which were anything remotely near to the â€Å"fishing hat† which Mr. Stephens identified on the liquidator. Mr. Stephens besides neer mentioned the liquidator have oning spectacless. which Brenton wears mundane and would hold been visibly noticeable to Mr. Stephens sing the place of the liquidator at the clip in relation to himself. Neither officers nor investigators felt the demand to oppugn neighbours inquiring if they had seen Brenton at the times specified in their study. they didn’t experience the demand to garner background information on Brenton or see the fact that Brenton Butler had neer been in gaol before that day of the month. therefore he had neer committed a offense in Jacksonville. Florida. Brenton Butler was charged with armed robbery and the first grade slaying or Mary Ann Stephens on May 7th. 2000. Brenton Butler Page 1What about the Forensic Investigation†¦ ?Like the constabulary probe. there was a deficiency of forensic engagement in this instance every bit good. Brenton Butler was entirely charged based on the fact that. an oculus informant. Mr. Stephens identified Brenton as the liquidator. Many will declare this instance to be racial favoritism and racial profiling. due to the fact that Brenton was a black male like the liquidator. Brenton merely happened to be in the incorrect topographic point at the incorrect clip. In the forensic probe. after happening Mrs. Stephens’ stolen bag in a refuse container a stat mi off from the slaying. they should hold tested the bag for DNA and finger prints. If they had done this. they would hold seen that Brenton Butler’s finger prints were in fact non to be found on the bag. alternatively they would hold those of another adult male and Butler would hold been immediately proved inexperienced person. Cardinal people involved in the instance Brenton Butler – the accusedOfficer Darnell – constabularies officer. one of the officer’s that arrested and questioned Butler Officer Williams – constabularies officer. the 2nd officer that arrested and questioned Brenton Detective Glover – investigator and boy of the sheriff. Butler was passed on to Glover to give him a confession. Glover allegedly beat Brenton in the forests and threatened him and forced him into subscribing a written confession Pat McGuiness – attorney. he was the taking attorney stand foring Brenton. after the test he did more investigating Anne Finnell – attorney. she was besides supporting Brenton in his instance Harry Shorstein – State Attorney. decided to prosecute the instance after Brenton confessed Mr. Stephens – retired. he was a tourer sing Jacksonville with his married woman who was shot by a immature black male. he was an oculus informant to the instance. he identified Brenton Butler as be ing the liquidator of his married woman Mary Anne Stephens – retired. held at gunpoint. robbed and murdered Trial ProcedureIn this instance. following Brenton Butler’s apprehension. he taken in for a 12 hr inquiring and so signed and verbally confessed to the slaying after being threatened by Detective Glover. State Attorney Harry Shorstein decided to prosecute the instance. During the test. the chief focal point of the defending attorneies was deficiency of process. deficiency of probe and constabulary ferociousness. All that the prosecution attorney could concentrate on was the fact that Mr. Stephens had reported a tall. skinny. black male have oning dark vesture. which would depict Brenton. and the fact that Brenton confessed to the robbery and slaying. The constabulary and investigators involved in the instance. other than the oculus informant who identified Brenton and the false confession. did nil to garner grounds to turn out Brenton guilty. During the whole procedure. they didn’t state his parents where he was or that he was arrested. which by jurisprudence you have to if the accused is under age. they mislead Brenton’s parents when they showed up to their household place inquiring if Brenton was at that place and stating they merely wanted to speak to him about housebreakings that had been happening in the country. Besides. Officer Darnell had told Brenton he had the right to an lawyer and that if he didn’t have one that he would reach one for him. which he neer followed through with. In respects to the confession given and signed by Brenton. by jurisprudence. a confession must be made on your ain free will. you can’t be pressured into a confession. swayed or otherwise or else it can be deemed unequal to the instance. Brenton ButlerPage 2ResultAfter the shutting statements made by both opposing sides in the tribunal room. the justice told the jury how to do their determination. so they left the courtroom to make their finding of fact. It took the jury less than 1 hr to come to their decision. In respects to the charges against Brenton Butler by the State of Florida for the first degree slaying of Mary Ann Stephens. the jury found him non guilty. In respects to the charges against Brenton Butler by the province of Florida for armed robbery. the jury found him non guilty of that every bit good. So in other words. the jury found him inexperienced person of all charges. After the acquittal. Pat McGuinness. who represented Butler. set out to happen the existent liquidator so he could truly settle the instance. Person had notified him of two possible suspects. He so tested the bag for DNA and found that the prints on the bag matched to one of the names given to him. Jermel Williams pleaded guilty to second-degree slaying and was sentenced to ten old ages in prison. He besides testified against Juan Curtis. who’s fingerprints matched those found on Mrs. Stephens bag. Curtis was found guilty of first-degree slaying and sentenced to life in prison. Although later it was found that because there was no confession. they had denied Curtis’ right to a just test. so they granted him a retrial in which he was found guilty and sentenced to two back-to-back life footings. In February 2001. Brenton’s attorneies announced that they were prosecuting a civil case in which they wanted $ 2. 5 million in amendss against the metropolis. Sheriff’s section and the single officers. Eight months subsequently they refiled the case and wanted $ 8. 5 million alternatively. The Butler household accepted 775. 000 from the metropolis as a colony in 2002. They accepted this sum because of assorted grounds including how long the instance would be d ragged on and how hard it was to turn out the instance under the federal civil rights jurisprudence. Brenton Butler Now Brenton Butler is now 28 old ages old and has written a book about his experience called â€Å"They Said It Was Murder† . The book includes new inside informations about the whippings. his clip in gaol and other unfairnesss in the probe. Besides it discusses the impact the instance had on his household and the near-death of his female parent due to the emphasis of his apprehension. Miscarriages of Justice Brenton Butler spent 6 guiltless months in gaol. His civil rights were violated. They took him to the offense scene under false pretences. didn’t inform his parents of his whereabouts or that he had been arrested ( in the beginning ) and take his parents to believe that they had merely come to their place because they were inquiring the adolescents in the vicinity about reoccurring interruption Immigration and Naturalization Services. Besides. during Brenton’s oppugning. he was threatened and forced into subscribing a confession by Detective Glover and the other two officers and Brenton was taken into a wood and beaten by said investigator. These were all evidently unfairnesss in the instance. Why? Because officers and investigators are supposed to stay by certain Torahs and the rights of the accused and in this instance they did non and they were negligent. Another unfairness was the fact that anyone accused of perpetrating a offense is guiltless until proved guilty. I n Brenton’s instance. every bit shortly as he was spotted walking on the pavement. he was immediately guilty. Brenton ButlerPage 3Personal Chemical reaction Like the Steven Truscott instance. this merely shows us. even though this took topographic point in another state. how flawed our system is. It shows us that even constabularies officers can be racially know aparting and don’t abide by the Torahs. This instance taught us that one second we can be making something wholly normal and accustomed and if you end up in the incorrect topographic point at the incorrect clip. you neer know what could go on. It besides teaches us that we need to be more cognizant of our rights and be more educated on what to make in that sort of state of affairs. In my sentiment. I still trust the jurisprudence and I still trust the constabulary officers will protect me. After hearing about Brenton Butler and what he had to travel through and how ill he was treated it makes me fear the idea of something like this of all time someway go oning to myself. It makes me doubt the judgement of our authorities and our jurisprudence hatchet mans. It besides makes me recognize that society to is really judgmental and racially know aparting. In my sentiment. every bit good as in the sentiment of many others. Mr. Stephens merely identified Brenton Butler as the liquidator because of his race. The deficiency of grounds dorsums this theory up. It’s non merely Mr. Stephens that react in that manner of leap to that decision though. Although the whole segregation coevals has passed us. we still know apart against others. chiefly because they are different from ourselves and we don’t know about their civilization etc. Hearing about Brenton Butler’s instance made me inquire what his household must hold gone through. The emphasis they must hold been under. the anxiousness. the defeat and anger†¦it made me inquire how I would hold handled the state of affairs if I were in it. I besides can’t aid but believe what if Brenton had been a white male†¦he wouldn’t have been stopped by the constabulary that twenty-four hours and wouldn’t have been identified as the liquidator. What if the constabulary and investigators had done more to happen grounds. what if they had tested the bag for fingerprints one time they found it. why didn’t they check the bag for fingerprints†¦cases like this are really thought provoking and do you inquire so many inquiries that can’t be answered. I’m sword lily that he was proven guiltless after everything he went through and I’m sword lily he has been able to travel on with his life and portion with others his experience through his novel.

Sunday, July 28, 2019

Health Care Paper Research Example | Topics and Well Written Essays - 1500 words

Health Care - Research Paper Example According to Frontline video there is need to focus on other healthcare systems with an aim of drawing comparison. The United Kingdom healthcare system is unique in that the governments pays for healthcare and are responsible for the national health services. This enables affordable healthcare to all while exempting the old and the young from payment related to drugs. In the case of Germany, citizens are allowed to purchase their insurance cover from private companies. This is positive in the sense that people are at liberty to choose an insurance cover that suits their needs. In Japan, the government ensures each individual has an insurance cover in that the employers enroll its employees to a suitable insurance company. The employee is required to pay a large amount of the required premiums those unemployed are enrolled in government plan. In Taiwan, the government monopolizes the health insurance hence minimizing healthcare cartels. The mandatory government insurance plan ensures low cost of drugs as well as a subsidized healthcare. In Switzerland, the country subsidizes healthcare services for lower income earners. This is an effort of ensuring that the healthcare system is accessible to all. The cost of healthcare service is a major concern. In Switzerland, the amount of premium paid is slightly below $ 800. Citizens pay the premium amount totally and no exemption is given to citizens. The Germany case is such that the private sector is given more powers in matters insurance. The model applied by the country may be ineffective to those of low incomes. In Taiwan lack of competitor in social insurance would imply that the government may fail to regulate standards in the healthcare. In Japan there is need to focus on limited government participation in healthcare service provision. The private sector solemnly controls the health sector thus government lacks

The Impact of Chronic Diseases on Children and Their Families Research Paper

The Impact of Chronic Diseases on Children and Their Families - Research Paper Example incidence; moreover, although not commonly seen among children in Australia, cancer has also become one of the most common causes of death among Australian children (Australian Institute of Health and Welfare, 2006). Other chronic illnesses seen among Australia’s school-age children include cystic fibrosis, cerebral palsy, and epilepsy. Risk factors for this disease are mostly modifiable risks which include childhood obesity, unhealthy, and lack of physical activity (Berk, 2008). These chronic conditions impact on children as well as their families because they take place at a time which is crucial to the child’s development (Slater, et.al., 2010). In some cases, care for these children often lasts a lifetime, as seen in diseases like diabetes and cardiovascular diseases (Slater, et.al., 2010). For example, Type 1 diabetes calls for lifetime care and multiprofessional medical management; moreover, self-management needs to be emphasized to the child for eventual independ ent management. It is also a costly type of care because of the prolonged nature of the disease and the prolonged treatment needed (Australian Institute of Health and Welfare, 2006). The illness and the treatment process involved can impact negatively on the children and their families, economically, socially, as well as psychologically. As these children are still developing physically and emotionally, their care is different from the care required of chronically ill adults (Wilson, et.al., 2008). Even as the social and economic conditions of the families can also impact on a child’s overall care, it is also a crucial element in the overall outcome of chronic childhood diseases. Moreover, children who have chronic illnesses, along with their families have a high risk of experiencing psychological... This study shall then be concluded based on recommendations which nurses can implement as primary health care givers. Chronic diseases among children are significant health issues because they impact significantly on the quality of lives and on the development of children. In Australia, asthma is considered the most common chronic illness among children 0-14 years of age. In recent years, diabetes has also increased in incidence; moreover, although not commonly seen among children in Australia, cancer has also become one of the most common causes of death among Australian children. Other chronic illnesses seen among Australia’s school-age children include cystic fibrosis, cerebral palsy, and epilepsy. Risk factors for this disease are mostly modifiable risks which include childhood obesity, unhealthy, and lack of physical activity. This paper declares that Chronic diseases among children cause issues in his normal development, issues which mostly relate to delayed developmental processes. Varni, et.al.,describes how children with diabetes, GI conditions, cardiac afflictions, asthma, obesity, ESRD, psychiatric issues, cancer, and cerebral palsy manifested with an impaired health-related quality of life, as compared to healthy children. The study revealed that those with cerebral palsy manifested the most impairment, and those with diabetes presented with the best quality of life. Among parents, they expressed that cardiac afflictions, diabetes, obesity, GI diseases, ESRD, asthma, cancer, and cerebral palsy caused a decreased quality in their lives.

Saturday, July 27, 2019

Are comparative educations offered in Public meduim size Midwestern Research Paper

Are comparative educations offered in Public meduim size Midwestern Universites - Research Paper Example ard to comprehensive modernizing projects of the 19th century and numerous rural communities that mainly trigger advancement of the democratic and social institutions. Moreover, one room schoolhouses act as cultural heritage and correspondingly link to the contemporary utilization of the schoolhouses. International and comparative Education in universities provides the opportunity to bridge the gap through offering modern avenues of sharing knowledge within the institutions which is in the mid- sized Midwestern city. Underlying regional universities in Midwestern offer a full comparative of undergraduate programs and specific master’s programs with very few doctoral programs. The regional universities within Midwest that offer comparative education programs include Providence College, Elon University, Creighton University and Santa Clara University. Comparative education within the Midwestern universities fosters regional collaboration in regard to the multi-state compact orga nizations that mainly serve the purpose of prevailing higher education within the northeast, southern and corresponding western regions of the United States with the student exchange programs, and policy conferences. Nevertheless, the program is hampered by numerous factors that mainly revolve around technology that is inadequate confidence in the integration of the technology coupled with lack of comprehension thus resulting to discrepancies in the implementation of the comparative education program with the Midwestern universities. There is also insufficient training and practice in the integration of the technology pertaining to the comparative education that ought to be embraced. The studies on the pre-service teacher technology integration and corresponding faculty perceptions technology integration applicable within the comparative education program at the medium-sized, Midwestern universities are mainly compared to the underlying account for the self-reported education program.

Friday, July 26, 2019

Form food safety enforcement Essay Example | Topics and Well Written Essays - 1500 words

Form food safety enforcement - Essay Example However, the basic purpose of this paper is to evaluate the successful outcome or otherwise in the cessation of the outbreak, identification of what went wrong and the measures needed to prevent a recurrence. Food poisoning is defined under the Food Safety Act as 'any disease of an infectious or toxic nature caused by or thought to be caused by the consumption of food or water' (HPA) 2004 (Management of outbreak of foodborne illness in England and Wales). Food safety laws in the United Kingdom center on protecting the consumer by ensuring that food is safe for consumption. Many provisions of the law focus on prevention rather than cure. Food business operators (FBOs) must show that they have adopted hygienic practices at their premises. The risks associated with food processing and preparation must be assessed by the FBOs, the food industry and the food laws enforcers. The degrees of protection are achieved through enforcement of specific provisions and through a framework that seeks to minimize the risk of unsafe food being present in the market. Any breach in the provisions of law results in criminal action. The law and its enforcement are governed by European and domestic laws. Actually, the provisions of law comprise broad principles and they are carried forward in more detailed forms by secondary legislation in domestic law. This process may change the fundamental principles upon which national legislation is based (Professor Bridget M. Hutter and Tola Amodu). There are many organizations in the United Kingdom involved in food regulations such as National Health Service, Local Health Boards, Chartered Institute of Environmental Health, and so on based locally, and at the national level. The ministers and central government officials formulate policy and tend not to be specialists in food safety protection. The Food Standards Agency (FSA) is an independent Government department with special knowledge in the domain. The FSA formulates policy whilst overseeing and directing the enforcement activity of local players. The Meat Hygiene Service is an executive agency of the FSA and responsible for statutory inspections of licensed premises including slaughterhouses, cutting plants and cold storages in the United Kingdom producing meat for human consumption (Background to the 2006 food hygiene legislation). Self regulation

Thursday, July 25, 2019

Work place emotions and attitudes Essay Example | Topics and Well Written Essays - 2500 words

Work place emotions and attitudes - Essay Example Emotions are an attempt to express outwardly, to express what we believe. How a person feel is a reflection of how he thinks. Negative thoughts produce negative emotions and positive thoughts produce positive emotions. Laws exist about emotions just like there are laws about physics. Every emotion is a result of some thought that preceded that emotion. If a person has a healthy body then how he thinks causes how he feels. How he feels affects how he behaves. And, how he behaves produces results (Pennington and Haslam, N.D.). Attitudes are inclination or propensities, or tendencies, to react in a favorable or unfavorable way toward an object or any situation. Attitudes reflect a person’s likes and dislikes toward other persons, objects, events, and activities in their environment. Attitudes can have a significant effect on the behavior of a person at work. In the world of work we are concerned with attitudes toward supervision, pay, benefits, promotion or anything that might trigger positive or negative reactions. Employee satisfaction and attitudes represent one of the key areas of measuring organizational effectiveness. Attitudes toward supervision, pay, benefits, promotion, or anything that might trigger positive or negative reactions. Employee satisfaction and attitudes represent one of the key areas for measuring organizational effectiveness. Because of the importance of the links of task, contextual, and ethical performance with important measures of organizational effectiveness, one of the key goals of managers should be to create linkages between employee performance and their satisfaction. However, it is not always easy to change a person’s attitudes about their work. The reason is that, attitudes toward work may be only one important aspect of the person’s structure of attitudes. They might be linked strongly to other important ones, making them deeply embedded, and thereby limiting how much managers can succeed in altering the way

Wednesday, July 24, 2019

Advantages of Breastfeeding Research Paper Example | Topics and Well Written Essays - 1500 words

Advantages of Breastfeeding - Research Paper Example The World Health Organization, health care unions, and government health organizations confirm the logical confirmation of the obvious advantage of human milk as well as the risks associated with artificial milk products. The WHO along with the American Academy of Pediatrics suggests that mothers exclusively breastfeed their newborns al least for the initial six months, and carry on for at least two and a half years. Human milk gives best advantages for babies, together with premature, as well as sick infants. Human milk is only one of its kinds. Advanced nutrients as well as useful substances are present in human milk that cannot be replaced. â€Å"Breastfeeding offers best physical condition, nutritional, immunologic and developmental benefits to newborns as well as protection from postpartum complications and future disease for mothers† (Sears, p. 190). Breast milk is the most comprehensive type of nourishment for newborns. Experts have indicated, â€Å"It has just the exa ct amount of fat, sugar, water, and protein that is needed for a baby's growth and development† (American Academy of Pediatrics, p. 301). Most newborns find it convenient to digest breast milk as compared to formula-feed. As a result, breastfed babies grow precisely the way they are supposed to. They are likely to gain less extra weight and to be leaner. This may result in staying away from being overweight during the teenage years or even after that. Breast milk has antibodies in it to help defend newborns from germs and viruses. Latest researches on this topic revel that children who are not exclusively breastfed for at least six months are more expected to develop a wide range of contagious diseases together with ear infections, diarrhea, and respiratory illnesses (American Academy of Pediatrics, p. 301) and have additional hospitalizations. In addition, babies who are not breastfed have a 19 percent higher post neonatal newborn death rate in the United States. A number of studies imply that babies who are not breastfed have increasing rates of ‘sudden infant death syndrome’ (SIDS) (Newman, p. 320-23) during the initial year of life, and higher rates of â€Å"type 1 and type 2 diabetes, lymphoma, leukemia, Hodgkin's disease, overweight and obesity, high cholesterol and asthma† (Newman, p. 323). For children, breastfeeding sustains best growth and defends against severe and chronic sickness. For mothers, breastfeeding assists with improvement from pregnancy as well as from childbirth and gives lifetime health benefits. For society, breastfeeding offers a variety of financial as well as environmental rewards. Breast milk is a remarkable substance that cannot be replaced by some artificial means. Matchless in its composition and function, breast milk has a perfect balance of nutrition that the newborn can digest without difficulty. It changes eventually, and even d the course of a day, to meet the varying requirements of the growing b aby. It has substances vital for best development of the infant’s intellect, with effects on both cognitive as well as visual function. It provides growth factors that ‘join to mature the infant gut’. It gives the newborn with immune factors made to fight allergens as well as diseases particular to the mother’s and newborn’s atmosphere (Hausman, p. 192). Advantages for Children In particular, experts have identified that breastfeeding provides benefits for children no other alternative of feeding can duplicate. The advantages of breastfeeding start from the initial moments following childbirth and last for a number of years once breastfeeding stops. In comparison

Tuesday, July 23, 2019

Comparison of Dictatorship and Democracy Essay Example | Topics and Well Written Essays - 500 words

Comparison of Dictatorship and Democracy - Essay Example There has been a debate which form of government is more beneficial for the people living in the society as well for the betterment and economic development of the country and different people have different views. It is important to analyze and understand both these forms of government before discussing and comparing these two forms. A dictatorship is an autocratic form of government and generally, this type of government is run or ruled by a single individual or a small group of people as an oligarchy (Acemoglu, 2006). Normally this single individual or small group has all the powers. Some believe that dictators have the power without the consent and approval of the people living in society. On the other hand, democracy is defined as the government that is elected by the people or citizen of the country (Olson, 1993). In a democracy, any eligible citizen of the country can participate and get elected to form the government. Democracy is also termed or defined as the government of t he people, by the people, and for the people (Dewey, 2004). Over the years, there has been a debate whether dictatorship is more powerful and better in ruling the government or democracy. However, some scholars and politicians believe that democracy is more important and crucial for the economic growth and prosperity of the country. One of the main advantages of democracy is that the government is elected by the people and citizens of the country (Dahl, 1989). Therefore the government will make their efforts to make sure that the economy prospers and the country moves in the right direction. However, on the other hand in a dictatorship, dictators that are governing and managing the country may or may not think of the betterment of the country as they are not elected as in a democratic country. Generally, freedom of speech is limited or less in a dictatorship form of government than a democratic form.           Ã‚  

Students and Politics Essay Example for Free

Students and Politics Essay The student community, being young and energetic, are a bundle of inflammablematerial, which at the touch of a spark ignites into a large uncontrollable fire like forestfire. They, being young have no patience, are lively and malleable. In India, the trend of students actively participating in politics began in the early 20thcentury, when India was fighting for its freedom. The elders being busy with their breadearning, they actively encouraged the youngsters to enter the arena of politics. Besides,they were young and would be easily enthused to join the mass movement at the drop of a hat. Political parties at that time started enlisting the support of the young students whoorganized themselves happily, to help one party or the other. This trend started in theearly years of 20th century and continued and even expanded up to date. However, once independence was won, it was to be reconsidered if students should beallowed or couraged to enter politics. Some sections of society now started believing thatstudents should stay away from politics and keep to their study schedules only. While thesociety kept debating on this issue, the politician took the younger generation as their work cum energy tanks and this participation of students in politics has come to stay. The present scenario in India is thus a keen struggle of political parties engaged inenlisting support of students. This obviously results in the students getting sharplydivided as if they were of this political party or that so much so, even the campuselections become tainted with a touch of politics. There is of course nothing without advantages and disadvantages, so does thisinvolvement of students in politics. There are both serious disadvantages and may be fewadvantages too of students being on the centre stage of politics. Disadvantages outnumber the advantages. Firstly, while the students, have primarily entered college for studies theyget distracted from their prime objective and become entangled in the dirty game of politics. The energy and time they use or waster in masterminding political moves, couldwell be used to study. This entry of politics in the premises of educational institutions hascaused many a damage to several students. Students have got rusticated owing to their active participation in politics, thus losing their hold on studies. Politics teaches studentsto put an end to all rules and regulations and become rowdy and violent. This leads to closure of institutions which again take a toll of students study time. Thevery innocent and loving appearance of children gets lost and they become rude, arrogantand disobedient. When there is too much of hooliganism entering into educationalinstitutions, even police is to be called sometimes and there is utter disorder in thecampus and even bullets find their way among the students. The disadvantages of students entering politics are numerous and destructive. When we study the advantages of this system, they do exist but, are very few and hardlysignificant. Children entering the arena of politics learn the art of public speaking. Theylearn to be assertive and impressive. This medium is a good stepping stone to the art of leadership. The important and real advantage is that students in these prime years of life gain a lot of knowledge of politics which gives them training to enter the arena as trained politicians. After studying the pros and cons of students participation in politics, the disadvantagesare more damaging than the gains acquired in the sequence. For, all the advantagesstudents gain, can as well be achieved so in other ways also and there is no need for their entry into politics. Students must stay away from politics and retain their interest in studies which alone canhelp them steer the ships of their lives. The most progressive, articulate, inspired and dynamic segment of the country’spopulation is the student’s community. The formative period of student’s lifeshould be utilized for an all round balanced development of his/her personality. Political experience constitutes an essential part of this learning experience. Thisperiod prepares one to face the challenges better and enables one to succeed inlife. The much hyped dirty murky nature not with standing. Politics has the potentialto inculcate qualities like general awareness, keeping abreast with current happenings and above all leadership qualities in an individual. Student’s who joinpolitics are good orators. They become assertive by shedding their timid nessand shyness. Tackling problems and solving disputes and handling crisissituations however small or big they may be, infuses confidence in them. It helpsin developing skills to deal with people from all backgrounds and of all shades of opinion. Moreover, politics cannot be divorced from a student’s life as he continuouslyinteracts with the Student’s Union and various other student associations incollege. Students also have a great deal of exposure to mediums like the press,television, cinema, etc. hich are important agents of political expression. Political science is a vital part of the syllabi both at the school and college level. This underlines the role that politics plays in various stages of a person’s life. Hence, it is futile to shut out students from politics. History is replete with examples of students playing a vital role in over-throwingcorrupt dictatorial regimes, freeing their people from foreign yoke and launchingrelentless crusades against social injustice and exploitation. Majority of the greatleaders entered politics during their student life. Therefore, political education or training during student life is important for success in life. Many students’organizations like all Manipur students union (AMSU) are big and powerfulstudents’ organizations in the north eastern part of India. Their clout is so greatthat they could even go against the general people’s verdict. Where politiciansfail, they succeed easily. The power of the youth is a mighty river, waiting to bechannelized. The politics of a particular system determines whether this happensin a constructive or destructive manner. However, there is a limit to the extent of a students’ involvement so that abalanced participation does not affect his main purpose, which is to study. Whilehe is not expected to remain passive in the face of criminalization of politics,dismantling of democratic organizations, corruption, communalism and casteism,he should not indulge in factional or partisan politics, or give into the unjustdirections of senior party leaders. The student wing should herald the new, onlythen do they deserve to be called the promise of tomorrow. A better tomorrow.

Monday, July 22, 2019

Crossing Heavens Border Essay Example for Free

Crossing Heavens Border Essay After the division of Korea in World War II, North Korea introduced communism into their country aiming to create a country where everyone was equally wealthy. However, unlike the expectation, NK’s national plans didn’t work out well, and North Koreans started to suffer from political oppression and chronic food shortages. North Koreans who could not stand the situation in their home country started fleeing from North to South Korea. first broadcast in July 2007 reveals the 10 day journey of the North Korean defectors who cross several border to settle in South Korea. The journey of North Korean defectors begins in Tumen and Yalu river, the rivers defectors have to cross to reach Shenyang, a city in China. As soon as they arrive in China, North Korean defectors always have to be careful. This is because they can be caught by Chinese authorities that repatriate defectors back to their home country, where they face cruel punishments. Often, defectors temporarily settle in Shenyang to raise money before they smuggle into South. Some women defectors are even tempted into sex industries, and they often lose their opportunity to reach South Korea. Those who successfully depart Shenyang ride on an illegal bus for 10 hours that takes them to Beijing. In Beijing, group of defectors spread out themselves and melt into the crowd to avoid authority until they board a train to Kunming. On the train, the defectors hide themselves from Chinese officials’ inspection by either leaving their seat or pretending to sleep when the officials are around. After three tenth days, they arrive in Kunming. From there, they face another 8 hour drive through the mountains toward the jungle border with Laos. Even for North Korean defectors who are chastened by adversities, crossing the jungle, which takes 18 hours on foot, is strenuous. Finally, after they cross another border to Thailand from Laos, the defectors can apply for asylum at the South Korean embassy in Bangkok, and their long arduous trip ends there (Crossing Heavens Border, PBS). At the embassy, we interviewed a 23-year-old North Korean refugee Lee Ok Kyung, who was waiting for her South Korean visa to be issued. Lee recalled her memory of childhood in the North as a nightmare.â€Å"Everyone around me was struggling to find food so dying from hunger wasn’t anything new to us† she said. â€Å"My parents ran their pants off on farms day and night, but they were paid much less than the amount of work they did because all their money was sent to the supreme leader Kim Jong Il. However, no one complained about this because everyone was brainwashed that Kim was their demigod of North Korea. Unlike my neighbors, however, I knew that Kim and the high officials were deceiving us. I left North Korea because I was eager to free myself from suppression of the North Korean government. From my respect, North Korea was a heavenly country without any future or freedom. † Until now, many of North Koreans risk their lives in the hope of resettling in South Korea, a country now home to more than 23,500 defectors. However, against the refugee’s expectation, life in a new country is not easy. Many find themselves unable to cope with the faster pace of life in the South, and they are often looked down upon by their Southern neighbors. Nevertheless, North Korean refugees take such adversities lying down because they have a desperate bid for freedom that can only be acquired by crossing the border.

Sunday, July 21, 2019

The theories of leadership and motivation

The theories of leadership and motivation Leadership is the character which every organisation wants to see in their staff and the person who is self motivated and who can motivate the team members become a good manager. Leadership is nothing but inspiring the team leader is the one who does it, inspiration is nothing but motivation. So leadership and motivation is a chemistry which can take any difficult task to success. The leadership and motivation chemistry is mostly helpful in management sector whether it is in business or in the team; every individual posses leadership but the one who practices on the go become a perfect leader. The main aspect a leader consists is a vision for the certain purpose. When a task or project is taken over by a company the company searches for a leader who posses knowledge on the project and vision how to develop the project, make use of colleagues and give the organisation a profit on it. A leader tends to influence the task to be continued and change to be taken place to make the organisation profitable. There are several theories on leadership by great leaders some of them say that leadership is an action not position or person. These theories help to prepare a perfect leader, all these theories are proposed and practiced by great leaders and managers but latest management considers a leader who follows his role. Leadership theories: Considering leadership reveals school of thought giving different leadership theories such as Great Man theory, trait theory, behaviourist theory, situational leadership theory, contingency theory, transactional theory and transformational theory. Great man theory is the one proposed before twentieth century where it says that leaders are born with the talent and leader should be a man this lead to the next theory trait theory. Trait theory: The trait theory rose from the concepts of the Great Man approach. This theory leads to identify the important characteristics of a successful leader. The people who got the characters as defined by the traits approach are isolated or shortlisted and those are recruited as leaders. This type of approach was mostly implemented in military and still used in some of the area. According to the trait theory the person who got the following skills is said to be a trait. Ambitious and success oriented Adaptable to all kinds of situations Co operative to all the members in the organization Highly active or energetic Dominative Good decision making ability Self-confident Adaptable to stress conditions and Dependable. These are the characters which make a person trait and they should posses some skills which are Skills Intelligent Skilled conceptually Creative Fluent in speaking Tactful Self motivated and self belief Skilled socially When these kinds of skills and characters are identified in the person, the person is recruited in the team. Behavioural theory: The trait study doesnt give any conclusive results and it was hard to measure some more critical issues such as honesty, integrity and loyalty. This leaded the attention to be diverted on to the behaviour theories. The behaviour theory focuses on human relationship and success performance as well. According to behavioural theory the manager believes that the working environment should be like an entertainment place where the expenditure of mental and physical efforts is treated to be play and rest. The idea of manager is an average person not only learns to accept but also seek responsibility. The people will automatically learn to exercise self-control and self direction to achieve the goal or target. The organizational problems can become imaginative and creative. Contingency theory model: This theory illustrates that there are many ways for the manager to lead the team to get best outcome. According to the situation the manager can find a best way to get the best outcome. Fiedler worked on contingency theory according to that he looked for three situations which define the condition of a managerial task. Leader and team member relationship Work structure or project structure Position and power The manager should maintain relation with their team members to get along and create confidence and make them feel free to think about the task and give their ideas to help the task to be finished. Project structure is the job highly structured or unstructured or in between. The power shows how much authority a manager does posses. This theory rates the manager whether the manger is relationship oriented or task oriented. The task oriented managers gets success in such situations where there is good leader and team member relationship and structured projects or tasks doesnt matter whether the position power is weak or strong. And get success when the project is unstructured and does have any sort of good vision by having a strong power and position. The variables which affect the task such as environmental variables are combined in a heavy some and differentiated as favourable and unfavourable situations. The task oriented management style depends on the favourable and unfavourable environment variables but the relationship management style stays in the middle by managing or changing the variables to accumulate with their style. Both styles of managements got their sides to be good when all the performance and team work well in the tasks. There is no good or bad management in these two managements. Task motivated management style leaders do best when the team performs well and they are good in achieving good sales record and performance better than their competitor where as the relationship oriented leaders are helpful to gain positive customer service and build a positive image to the organisation. Transactional and transformational leadership: Transformational leadership is a relationship of mutual simulation and elevation that converts the followers in to leaders and may convert leaders into moral agents Transformational leadership is communicating with the leaders and the team members to take them to higher level something like a leader can become a moral agent and the follower can become a leader. Transactional leadership technique builds the person to finish the certain task such as job done for the time being. Some of the differences between transactional and transformational leadership are Transactional style of leadership builds a man to complete a certain task where as transformational styles builds a member to become a leader. This focuses on task completion and tactical style of management where as transformational leadership focus on strategies and missions. These are some theories of the leadership which shows how a leader act on different situations and how different leaders behave to get success in the organization. Motivation in Management: Theories of motivation: The theories of motivation can be divided into 3 broad categories. Reinforcement theories emphasize the means through which the process of controlling an individuals behavior by manipulating its consequences takes place. Content theories focus primarily on individual needs the physiological or psychological deficiencies that we feel a compulsion to reduce or eliminate. Process theories focus on the thought or cognitive processes that take place within the minds of people and that control their behavior. Early Theories of Motivation: Hierarchy of Needs Theory Theory X and Theory Y Motivation-Hygiene Theory Contemporary Theories of Motivation: ERG Theory McClellands Theory of Needs Cognitive Evaluation Theory Task Characteristics Theories Goal-Setting Theory Equity Theory Hierarchy of Needs Theory: Abraham Maslow hypothesized that within every human being there exists a hierarchy of five needs: 1. Physiological. 2. Safety. 3. Social. 4. Esteem. 5. Self-actualization. Maslow then categorized these 5 needs into lower-order needs and higher-order needs.Lower-order needs are needs that are satisfied externally: physiological and safety needs.Higher-order needs are needs that are satisfied internally (within the person): social, esteem, and self-actualization needs. Theory X and Theory Y of Douglas McGrogor: McGregor concluded that a managers vision of the nature of human beings is based on a certain blend of assumptions and that he or she tends to mold his or her actions toward subordinates according to these assumptions: Employees naturally dislike work and, whenever possible, will attempt to avoid it Since employees dislike work, they must be coerced, controlled, or threatened with punishment to achieve goals Employees will avoid responsibilities and seek formal direction whenever possible Motivation-hygiene Theory: According to Herzberg, the factors leading to job satisfaction are dividing and distinct from those that leads to job dissatisfaction. Hygiene factors include factors such as: company policy and administration, supervision, interpersonal relations, working conditions, and salary. Motivator factors include factors such as: attainment, recognition, the work itself, responsibility and growth. Hygiene Factors Company rule and management; Supervision; association with supervisor; Work circumstances; Salary; Relationship with peers; Personal life; association with subordinates; Status; Safety Motivator Factors: attainment credit; Work itself; Responsibility; progression; Growth Contemporary Theories of Motivation: ERG Theory: ERG Theory proposed by Clayton Alderfer of Yale University: Alderfer fights that there are three groups of core needs: 1) Existence 2) Relatedness 3) Growth Existence group is worried with providing our basic material existence requirements. Relatedness group is the desire we have for maintaining important interpersonal relationships McClellands Theory of Needs: McClellands theory of needs focuses on three needs: 1) Achievement 2) Power 3) Affiliation Cognitive Evaluation Theory: Allocating extrinsic rewards for behaviour that had been previously intrinsically rewarded tends to decrease the overall level of motivation. (This concept was proposed in the late 1960s.)The interdependence of extrinsic and intrinsic rewards is a real phenomenon Task Characteristics Theories: These theories seek to identify task characteristics of jobs, how these characteristics are combined to form different jobs, and their relationship to employee motivation, satisfaction, and performance. Goal-setting theory: Specific and difficult goals lead to higher performance. Feedback leads to higher performance than non-feedback. In addition to feedback, 2 other factors have been found to influence the goals-performance relationship. These are: 1. Goal commitment. 2. Sufficient self-efficacy. Equity Theory: Individuals make comparisons of their job inputs and outcomes relatives to those of others and then act in response so as to remove any inequities. Stacy Adams proposed that this negative tension state provides the motivation to do something to correct it. There are 4 referent comparisons that employee can use: 1. Self-inside. 2. Self-outside. 3. Other inside. 4. Other outside. Conclusion The change in the leadership theories time by time says that the leader should posses certain characters which lead the organisational success whether to believe in maintaining a relationship or to go on tactically the manager or the leader should act to the situation and get success at the end. Depending on the companies motive the leader should react or behave with the team members to achieve the target. Usually maintaining a good relation helps to make the team members life easy and manage the work happily. The team members become more innovative and achieve targets easily where as with tactical style leadership may create some sort of pressure on the team members, there is no guarantee that in every situation relational ship management is successful. the leader should adapt himself for the situation and act according to a particular situation. We have discussed above only a collection of the motivation theories and thoughts of the various proponents of management .In some of the theories and opinion presented, however, one can observe some glimpses of the person and how, perhaps, he or she could be motivated. This is satisfying in itself. But, as noted earlier, practice has been in advance of theory in this field, so let us now move to the realistic side of management of human behaviour and motivation in the workplace. REFERNCES: AstraZeneca (1999) Leadership in AstaZeneca. AstraZeneca HR, Dec 1999 Bass, B. (1985) Leadership and Performance Beyond Expectations. New York: Free Press. Blackler, F. and Kennedy, A. (2003) The Design of a Development Programme for Experienced Top Bergmann, H., Hurson, K. and Russ-Eft, D. (1999) Everyone a Leader: A grassroots model for thenew workplace. New York: John Wiley and Sons Gosling, J. and Mintzberg, H. (2003) Mindsets for Managers. Working paper, Centre for LeadershipStudies Hersey, P. and K.H. Blanchard (1977) Management of Organizational Behaviour. Englewood Cliffs NJ:Prentice hal1 Rodgers, H., Frearson, M., Holden, R. and Gold, J. (2003) The Rush to Leadership. Presented atManagement Theory at Work conference, Lancaster University, April 2003 Tannenbaum, R. and Schmidt, W. (1958) How to choose a leadership pattern. Harvard BusinesReview 36(2), 95-101

Saturday, July 20, 2019

Public Education Essay -- Education Reform

Public education in the United States is perhaps one of the most critical issues we face as a nation. Once pronouncing the United States as a â€Å"nation at risk†, the educational institution began to implement one reform strategy after another. In efforts to improve schooling for K-12 students, education reform has fiddled with class size, revised graduation requirements, and created standardized testing just to name a few. Unfortunately, traditional public schools are still failing to provide students with a quality education. This is disheartening as we learn that the United States lags behind in math and science compared to our international counterparts. It is safe to say that educational reform has spent billions of dollars over the years in an honest effort to reform education in American; however, most reform decisions have produced little changes. Among the many radical education reform strategies implemented, charter schools are perhaps one of the most prominent. It has been roughly twenty years since several states opened a number of charter schools. The best way to describe charter schools is to say they are independent public schools of choice that are free from rules and regulations compared to traditional public schools. Charter schools are accountable for producing results; otherwise, they are subject to closing due to failing performance. There are more than 5,400 charter schools serving more than 1.7 million children across the country (Center for Education Reform, 2010). Currently, 40 states and the District of Columbia have charter school with 41 laws in place and only 13 have strong laws. The states with the strong laws, 65 percent show positive achievement gains (Center for Education Reform, 2010). These stati... ...ountry could benefit from the presence of charter schools. Although traditional public schooling is in trouble, they are not lost. With thousands of students on waiting list for charter school enrollment and a thousand more who will not attend a school of choice speaks to the need for charter schools. Conventional public schools need to move beyond the mandates of a bureaucratic system in order to experience real revitalization. Perhaps Andy Smarick has the right idea instead of trying to fix failing schools close them and start fresh (2010). Perhaps it is unrealistic to believe with the number of failing schools across this country we could replace them with new schools, but it is clear that something has to be done to ensure a quality education exist for all students. In the meantime, why not give charter schools a chance to educate those who they can serve.

Eve’s Speech to the Forbidden Tree in Milton’s Paradise Lost

Eve’s Speech to the Forbidden Tree in Milton’s Paradise Lost In Book IX of Milton’s Paradise Lost, Eve makes a very important and revealing speech to the tree of knowledge. In it, she demonstrates the effect that the forbidden fruit has had on her. Eve’s language becomes as shameful as the nakedness that Adam and Eve would later try to cover up with fig leaves. After eating the forbidden apple, Eve’s speech is riddled with blasphemy, self-exaltation, and egocentrism. The first part of Eve’s speech contains the most blatant blasphemy. In it, she turns the forbidden tree into an idol, or a false god. She promises that â€Å"henceforth [her] early care, / Not without song each morning, and due praise / Shall tend [the tree]† (ln 799-801). The long sounds of the spondees in â€Å"not without song each morning, and due praise† add to the deliberateness of Eve’s blasphemy. The tree replaces God in her eyes, and begins to receive the praise that she had formerly reserved only for God. Besides being blasphemous, this is also ironic. In her foolishness, Eve ends up praising the very thing that will ultimately prove to be her undoing. Eve considers the tree a great gift. However, because of the influence of the serpent, she does not consider it a gift from God. The serpent has caused her to believe that God did not give the tree to Adam and Eve because it was not his to give. Therefore, Eve supposes that God must â€Å"envy what [he] cannot give: / For had the gift been [his], it had not here / Thus grown† (ln 805-7). In other words, she argues that if God had had possession of this tree, he would not have left it where it is. Therefore, according to Eve’s manipulated reasoning, God must not have the knowledge that the tree bestow... ...d â€Å"Adam† in line 831. The last two lines of this speech are very dramatic. Eve has such a great love for Adam that she could endure anything as long as he would be by her side, but she would be nothing without him. However, this creates a paradox. One may ask, if Eve loves Adam as much as she professes to, then why put his life in jeopardy just to make her own suffering more bearable? The answer, of course, goes back to the selfishness that has pervaded her entire speech. These lines stand out because of the spondees at the end of both of them. Eve’s language is drastically altered when she partakes of the forbidden fruit. It becomes permeated with blasphemy, self-praise and selfish words. Works Cited: Milton, John. Paradise Lost. in The Norton Anthology of English Literature, M. H. Abrams, ed. New York: W. W. Norton and Company, 1993. 1594-5.

Friday, July 19, 2019

Production Context of Bye Bye Blues :: Anne Wheeler Bye Bye Blues Essays

Production Context of Bye Bye Blues In his essay on the historical fiction film, Leger Grindon writes: "History is no more than a useful device to speak of the present time. The historical film indulges its contact with the immediate and generally refuses the past its distinct and foreign character" (Grindon 189). It is exactly this distinct character, however, that director Anne Wheeler hoped to capture in her 1989 film Bye Bye Blues. In an interview taken during the film’s production, Wheeler explained: "I’m trying to present history as it was, not as we hope it was" (Hays 9). With Bye Bye Blues, Wheeler has created more than simply what Grindon purports the historical fiction to be; her film captures much of the detail of life on the Canadian home-front during the Second World War. Wheeler does, however, weave into the film a deeper message about the role of the woman in society, which, ultimately, speaks directly to the audience of the 1990’s. While Bye Bye Blues is factual, the film does not d epict history entirely as it happened. This is not to say that Wheeler has overtly classified the forties as a period of triumph for feminists the world over, for she has not. Much of Bye Bye Blues is indeed authentic. "Wheeler has said time and again in interviews that stylistically, she likes to keep things as realistic as possible" (Hays 9). This is evidenced by the manner in which Wheeler tackles her subject; the film treats the events of the past with subtlety. "The overall impression left by accounts of life on the home-front is of ... boredom and ... deprivation punctuated by moments of terror" (Klein 10). Had the director exaggerated the events of the war, even on the home-front, she would have sacrificed some of the film’s realism. Instead of glorifying the war and over-dramatizing events like the return of Daisy’s husband, the story is presented in a straight-forward and unsentimental manner. Wheeler presents problems that are true-to-life, such as Daisy being unable to afford new shoes for her son . And certainly the events the film addresses are historically accurate: Japan did invade Singapore at the end of 1940, taking enemy soldiers hostage as prisoners of war (Snyder 267). During the war, women were left to fend for themselves and their children, without knowing whether their husbands were dead or alive, let alone where they could write to them (Vickers 25).

Thursday, July 18, 2019

My Learning Organization

I work as a full time comptroller for a copier reseller. Our company lease copiers to different clients for a monthly fee. When these copiers are turned over after the lease contract, the company either has it released or refurbishes the machines and sells these machines at refurbished price. The organization in our company is not large. We are just a group of ten workers but have been servicing big clients for the past ten years. I would say that our company is an example of a learning organization. Personally, as part of this team, I continue to test my experiences by at the least keenly aware of my day to day routines. Being a comptroller is a tedious job and I am expected to look into the unexpected. I cannot do this if I make my job into a habitual routine where small items can escape my attention. Existing systems and existing work flow can make someone lax meaning, one would just merely trust the system to check itself, which doesn’t really happen especially when the process fails. To test my routines, I would sometimes randomly check receipts that have been processed, just to make sure if they have been processed rightly. Sometimes I would have fun using the system in the office to evaluating my own home budget or inventory. This way, I would know if I have learned the experience by its very nature because the more I can adapt the learning to other kinds of venues, the more I know that I have learned the process indeed. In terms of producing information, my work lets me be responsible in counter checking sales and inventory. The information I deliver is crucial because should there be anomalies in sales or inventory, my information would be helpful in proving discrepancies. I may have second hand data but the corroboration of the information from my work will help support primary data that the office needs, not only to balance finances but most especially to forecast business. It is important for our company’s employees to share knowledge. Information from our specific work is shared systematically through the regular weekly meetings. Though the company is small, these meetings are helpful in leveling off expectations, affirming transactions, threshing out possible conflicts between employees or systems that do create conflict from time to time. Mistakes happen and it is in these weekly meetings that the lessons of a few are shared with everyone thereby sharing the learning. Sharing of knowledge also takes place when we exchange insights about our work like our clients, a good sale, a problematic machine. These insights are shared during breaks or in a few shared exchanges that can happen in a few seconds. These insights are important to note because these insights are seeds of knowledge that each person plants into the learning organization. I couldn’t think of any other innovative step that company has taken up that’s big enough to commemorate. But in the last few years that I have worked with my company, I believe that innovations that have been done came as small steps that are almost not felt but the impact towards helping the company grow is definitive. An example would be making sure there is a person in charge during lunch breaks. It was a matter of adjusting some people’s lunch hour so that we can still answer client inquiries that came in during lunch breaks. True enough, there were successful client inquiries that were received during this unholy hour. Another example is allowing lactating office mates to express their milk or even bring their newborn to the office. Though the newborn took a few office hours from the employees since it can’t be helped to muse over the infants from time to time, the infants also provided a stress relief from time to time. Innovations need not be spectacular or ground breaking. Sometimes, the mere effort of our manager to take time out to look at your family’s picture on the screen savers is innovative enough. As a comptroller of the company, changes that can help facilitate the company’s transition from its existing performance to become high performing would have to be spearheaded by the sales force. Spearheading doesn’t mean to be the sole lone ranger to go out in the field. The company has existing information, experience and knowledge enough to make it accomplish bigger markets. If bigger markets are to be conquered, the ten-man team need to be a high performing unit to maximize company resource. The usual way for most businesses to become bigger is to put in additional capital or resources to accomplish new and bigger tasks. I believe that the better strategy to adopt is to bank on the learning of the company as a team and make it work to get additional clients. All information and knowledge are summarized and insights are articulated. It is best for the sales team to translate these data into formidable input that could help them increase their sales forecast. In this knowledge based setting, companies though transforming themselves to become paperless communities still need the services of copiers. Print has always been time honored and historically, tactile systems of documentation are still considered a part of man’s cultural lifestyle. Therefore, there is yet a big market for our company to expand. The methods of Peter Vaill will help the company achieve its expansion by transforming the company into a highly performing system. The existing weekly meeting of the team can yet evolve into the venue where each team player can fine tune each other’s rhythm according to the other team player’s pace so that no one lags behind and no one goes too far forward. Should the company need additional workforce, the decision must be decided by the whole team because it is important to acknowledge weaknesses or failures. Learning organizations continually engage themselves into processing their mistakes so that growth is felt by the whole organization. If this happens, the organization will be able to trust each other as they take in bigger challenges and bigger learnings. Reference: Vaill, Peter B. 1998. Spirited Leading and Learning: Process Wisdom for a New Age. Jossey-Bass

Wednesday, July 17, 2019

Hunger games Essay

Over the long hot summer I read an interesting disc written by Suzanne Collins called The famish Games. It is an inspirational halt ab forth a small territorial dominion in the post-apocalyptic nation of Panem in North America. The aridness Games is an yearbook locoweedtery in which one boy and one girl aged 1218 from each of the twelve districts atomic number 18 selected to compete in a become televised battle to the death. This is an underdog floor of Katniss Everdeen who is from district 12 a coal-mining district that is the poorest and least be district. She is able to come out taking and find her love Peeta Mellark who is as well from district 12. This story shows pot our age that redden through adversity if you work potent enough you can do anything you necessitate to.Katniss faced much adversity in her life from her father dying in a mine accident, her having to find victuals so her and her sister did not starve, and her taking the tooshie of her sister when she is picked to take place in the hunger games. This relates to a lot of people because we face challenges in normal life, but like Katniss we mustiness be able to overcome these challenges and make the trounce of it. Katniss also showed a lot of courage by taking the places of her sister in The Hunger Games this act of bravery is something that legion(predicate) people would not do. If you want to be brave in your life you must be able to sacrifice yourself for another(prenominal) person this is another reason why I believe this book tie in to so many people.I personally enjoyed this underdog story. The incident that the least likely achiever of the games came out the winner makes the story broad to me. I admire the bravery of Katniss for putt her life in danger to make unnecessary her sister who I believe would suck in not survived the games. Another reason I like this book is because of the action and the fact that you must drink down someone that major power be your friend. It shows the desperation of people and how they support to survive.As I read the book my opinion of Peeta change by at first I thought he said he loved Katniss in the beginning to add publicity and to stay put Katniss to trust him, and then he would down her. I was wrong and it turns out that he did love her and they would both win the games because they refused to killeach other. This proves that you cannot judge some by there words but by there actions.In conclusion The Hunger Games is a book about love, bravery, and trust. With out theses Katniss and Peeta would not have been able to survive. It is also a story of how underdogs can win no matter what the chances atomic number 18. It is an inspirational story that I believe everyone should get the chances to read. These are the reasons why I enjoyed and would recommended this book to people my age.