Saturday, August 31, 2019

U.S.-China Trade

The reemergence of China as a great power is arguably the single most important development in the post-Cold War world. The rapid economic growth of the People's Republic of China (PRC) over the past decade, coupled with its high level of defense spending, have stimulated much interest as well as trepidation among policy-makers and analysts across the world. Although the continued augmentation of Chinese power is not predetermined, the profound effects of China's growing process cannot be underestimated.When analyzing a state's trade expectations one must also take into account the effects of diplomacy and bargaining, as Copeland suggests. A state can make some economic, political and military concessions to induce its trading partners to relax trade restrictions, thus raising its expectations for future trade. If the price for a higher level of trade is seen to be reasonable, the state would be willing to pay it, but if the price is unacceptable because it would undermine the state' s `internal stability or its external power position', there would be very little that the state could do to improve its trade expectations.If Chinese decision-makers' expectations for future trade are high, they will be less likely to use force to deal with unresolved disputes with neighboring countries. If, however, they have a negative view of their future trading environment, they will be likely to take measures, including military actions, to remove any obstacles that might forestall the pursuit of great-power status (Segal, 70). For the moment, China's expectations of future trade are by and large optimistic, but there is evidence of growing Chinese suspicion of a Western `conspiracy' to contain China which may alter Beijing's future perceptions.To ensure that the rise of China will not cause regional and global instability, the outside world should seek to integrate China into the international community by pursuing policies that will have a positive influence on China's expe cted value of trade. Since the late 1970s China has gradually emerged as a major trading nation in the world, and its economic and trade relations with most countries have broadened considerably. Indeed, China has been actively involved in global economic activities, and is fully integrated into the Asia-Pacific economy.The PRC is now a member of most major international and regional economic organizations, including the World Bank, the International Monetary Fund, the Asian Development Bank, and APEC. (Segal, 70) From 1980 to 1997 the Chinese government approved 162 foreign financial institutions to develop business in China. (Segal, 70) Over 200 of the world's top 500 companies have now invested in the country. (Segal, 70) As a result, there has been a huge growth in China's foreign trade over the past two decades. From 1978 to 1997 China's export grew from US$9. 8 billion to US$182. 7 billion, and its imports grew from US$10.9 billion to US$142. 4 billion. Between 1983 and 1997 a ctual foreign direct investment in China increased from US$916 million to US$45. 3 billion(Segal, 70) In 1997, according to the World Trade Organization, China became one of the top 10 trading countries in the world. (Segal, 70) China has also benefited from its involvement in a regional division of labor and economic cooperation in East Asia. It is integrated into a number of sub-regional economic groupings or ‘growth triangles' such as the Hong Kong-Guangdong-Shenzhen triangle and the Northeast China-Korea-Japan triangle.In addition, China is closely involved in the development of two new sub-regional groupings: the Yellow Sea Economic Zone that includes Liaoning and Shandong provinces, Japan and South Korea; and the Tumen River project that seeks to promote economic cooperation between China, Japan, North Korea, South Korea, Mongolia and Russia. (Rachman, 129) No doubt, China's integration into the world economy has brought about much benefit to the country, but it has also increased Chinese vulnerability in a world of growing interdependence. Indeed, foreign direct investment has become the single most important source of foreign capital for the PRC.(Rachman, 132)It is estimated that ‘foreign investment may now account for one-quarter of all Chinese exports'. (Rachman, 132)In 1996 the total value of foreign-funded firms' import and export trade reached US$137. 1 billion accounting for 47% of the national total of foreign trade. (Rachman, 136)According to a Beijing Review report, 18 million people, about 10% of China's non-farming population, are employed by foreign-funded firms. The investment by these firms covers a whole range of areas that are vital to Chinese economic modernization, including infrastructure, energy, communication and high-tech projects.(Rachman, 143)The Chinese government has also relied heavily on foreign investment to develop the central and western regions of China that are still very poor. In 1996, for example, a total amount of USS 1. 34 billion of foreign government loans was utilized for 69 projects in these underdeveloped regions. In addition, 125 key projects in the PRC are supported by foreign government loans that include the construction of metropolitan underground railways, power plants, airports, telephone networks, and other large-scale development plans. (Rachman, 171)In the past decade China has increased its foreign borrowings substantially. Its total external debt is believed to have risen from US$24,000 million in 1987 to US$116,280 million in 1996. (Rachman, 183)Besides, many of China's reform projects, such as enterprise restructuring, infrastructure improvement, financial reform, poverty reduction, human development and environmental protection, are currently supported by the World Bank. (Lieberthal, 36) Of all the major sectors of the Chinese economy, energy is probably the most critical one in terms of sustaining the PRC's modernization program.In this sector the role of forei gn capital is becoming more significant. For example, a joint venture has been established at the Pingshao coal mine, and the construction of a power station in Guangxi Zhuang is financed entirely by foreign investment. In the areas of petroleum and natural gas, a greater effort has also been made to attract foreign capital. By 1997, China had signed 126 contracts with 65 foreign oil companies. (Lieberthal, 36) Moreover, the progress of Chinese reform is dependent on the availability of advanced foreign technology and equipment.The contract value of Chinese technology imports amounted to US$159. 23 million in 1997. Indeed, imported technologies play an important part in major Chinese industries ranging from energy, electronics, computer software to telecommunications, information and other high-tech industries. (Lieberthal, 36) Clearly, Chinese leaders are aware that the success of China's economic modernization rests ultimately with its access to the global market and with inflows of external funding.If, for political or security reasons, the world were to reduce the level of economic interactions with or apply trade sanctions against China, it would have a devastating effect on Chinese economic development. For the moment, China's expectations of future trade with both its Asian neighbors and Western nations are by and large positive. In a speech to an academic symposium in Beijing, Chen Jian, a senior official of the Chinese Ministry of Foreign Affairs, said that ‘the international situation has moved at a speed faster than expected in a direction favorable to China †¦.The ongoing reform and opening up policies and the economic development in China†¦ are based on the judgement that world peace can be maintained and a new world war will not erupt for the near future'. (Yahuda, 22) Similarly, Wu Yi, Minister of Foreign Trade and Economic Cooperation, has noted: ‘We are immersed in the irreversible general trend toward worldwide economic integration†¦ economic cooperation with various countries makes it easier than any time in the past to reach a common view, and can be carded out in a wider area and at a higher starting point.This in turn portends that possibility for successful cooperation is much greater in the future'. (Yahuda, 22) This type of optimistic assessment of the future trading environment is echoed by many Chinese leaders, officials and scholars. (Yahuda, 56) Despite the recent financial turmoil in East and South East Asia, they believe that the economic dynamism in the Asia-Pacific will continue into the twenty-first century and that China will benefit from further economic growth and cooperation in the region.â€Å"For example, citing the view of a Chicago professor and Nobel Prize winner, a Chinese commentator maintains that ‘the prospects of most rapidly growing economic entities of East Asia are still bright. † ‘Even if the economy of these countries stops growing in the c oming five years', it is argued, ‘their average speed of economic increase in the next 25 years will surpass that of the world'. (Yahuda, 101) In any case, Chinese leaders know that the potential market and business opportunities that the PRC can offer to the outside world are so attractive that no country would like to miss them.(Yahuda, 193) It is therefore unlikely that any countries would want to sever trade relations with China in the near future. To raise its expectations for future trade China has been and will be willing to make economic and political concessions when negotiating contracts and trade agreements with its trading partners. Thus, the outside world will have some leverage to steer China in a certain direction, and it should take the opportunity to encourage further economic reform, openness and trade liberalization in the country.As liberals rightly argue, economic liberalization will gradually lead to greater political liberalization and democratization in China that will, in turn, help preserve peace and stability in the Asia-Pacific region. However, the international community must be patient with the pace of change in China and more sensitive to Chinese security perceptions. This is not to say that the outside world should accede to any Chinese demands or policies.On the contrary, it should be prepared to raise its concern over particular Chinese policies, debate with China on issues of fundamental disagreement, and stand firm on matters of principle. For example, the outside world must not ignore human rights issues in China for the sake of short-term commercial benefits. Western countries should try to persuade the Chinese government to improve its human rights record through dialogue and diplomatic channels rather than by economic coercion.They must recognize that the process of democratization in China will be a lengthy and thorny one, given the lack of democratic tradition in Chinese history. An evolutionary path toward democ racy is preferable to a violent change of regime in China that will be likely to produce an unstable and ineffective government which would be incapable of handling the crises and upheavals associated with rapid political transformation in such a vast country. A chaotic China could not possibly pursue a rational and coherent policy toward other countries.In this regard, the warning of some liberal scholars of the linkages between democratic transition and war should be heeded. Whether the reemergence of China as a great power in the post-Cold War international system is caused by structural factors (as the realist argues) or by unit-level decisions (as the liberal suggests), the challenge that China presents to the rest of world is formidable. The best way of abating the likelihood of military conflict between the great powers, as Copeland suggests, is to `alter leaders' perceptions of the future trading environment in which they operate'.(Harris, 151) China's current expectations o f future trade are, on the whole, positive, but there are growing suspicions among Chinese leaders and intellectuals of external forces seeking to `contain' China. Such a fear could magnify at a time when nationalistic sentiment is rising in Chinese society (Harris, 151) that might lead to low expectations of future trade. To ensure that China's rise will not cause regional and global instability, the outside world should pursue policies that would enhance Chinese decision-makers' confidence in their future trading environment.This will not be a simple task due to China's innate distrust of other great powers as a result of its unpleasant encounters with Japan and Western powers in the nineteenth century. Given the complexity of Chinese domestic politics and enormous ideological and institutional constraints, China may not always respond to external efforts positively, (Harris, 151) but if China's trading partners hope to integrate the country into the international community peacef ully, they must do what they can to raise PRC leaders' expectations for future trade.In the case of China, it has made some economic and political concessions to induce the outside world to trade with and invest in China. On most issues, Chinese leaders find the price of higher trade level reasonable and are willing to make compromise. The concept of `one country, two systems', for example, was basically formulated to assure the Western world that China's priority was economic development. In order to retain the confidence of foreign investors in Hong Kong, Chinese leaders have promised that the territory's capitalist system will remain unchanged for at least 50 years from 1997.(Harris, 151) China's decision to shelve temporarily the issue of sovereignty in the South China Sea also reflects its desire to maintain harmonious relations with the United States of America that are propitious for China's trading environment. Works Cited Gerald Segal, `Tying China into the international sy stem', Survival 37(2), (Summer 2004), p. 70. Gideon Rachman, `Containing China', The Washington Quarterly 19(1), (Winter 1995), p. 132. Hans J. Morgenthau, Politics Among Nations: The Struggle for Power and Peace, revised 5th edition (New York: Alfred A.Knopf, 1978), p. 29. Kenneth Lieberthal, `A new China strategy', Foreign Affairs 74(6), (November/December 1995), p. 36. Michael Yahuda, ‘How much has China learned about interdependence? ‘, in David S. G. Goodman and Gerald Segal, eds. , China Rising: Nationalism and Interdependence (London: Routledge, 1997), p. 22. `Stay back, China', The Economist, (16 March 1996), p. 15. Stuart Harris, ‘China's role in the WTO and APEC', in Goodman and Segal, eds. , China Rising, p. 151.

Friday, August 30, 2019

Reaction Paper Of Jose Rizal Life

One note, this movie is not for the faint of heart. There are graphic depictions of violence and even torture. The opening few scenes depict some episodes from Rizal's novels. In one a Catholic priest rapes a Filipina. I guess I now know where the Mestizo mixed blood class came from in the Philippines. In the other scene a Catholic priest beats a child for alleged stealing. Strong stuff and it made me wonder how the Catholic Church could possibly retain any power in the country, if this is what the national hero thought about it. The movie tells the life story of Jose Rizal, the national hero of the Philippines. A three hour epic movie on the life and struggles of his poet and patriotisms. It covers his life from his childhood to his execution at the hands of the Spanish forces occupying the Philippines in the late 19th century. We are also thrown into the world of Rizal's novels filmed in black and white, so we get a glimpse of how he viewed Filipino society under the Spanish heal. The film also through a series of flashback showing Rizal as a genius, a writer, a doctor, an artist, a lover, a friend, a brother and a son, thus giving a rich texture of Rizal’s character. The movie introduces us to the life of subjugation of the Filipino people under the rule of the Spanish friars. From the execution of three Filipino priests in 1872 for alleged subversion to the harsh and unequal treatment of Filipino students in the schools, this film is a stinging indictment of Spanish colonial rule in the Philippines. I also commend the film for its bravery in showing the evil tyranny of the Catholic Church during that time. Considering that the Philippines is a Catholic nation that is like butchering a sacred cow but alas, Abaya works her magic in depicting the suffering of the Filipinos because of the friars. This is by far the best Filipino movie that I have seen so far. I would urge anyone reading this who likes movies, to either rent it or buy it. I particularly love the last scene of the film when Rizal fell in the ground facing the sky, having his last breath looking at a beautiful sunrise- a metaphor depicting that Rizal did not die in vain. He did not die for nothing. He did not die defeated. Rather he died victorious because his death is the torch that lights Philippine independence, which ignites Philippine Revolution. The movie tells the life story of Jose Rizal, the national hero of the Philippines. It covers his life from his childhood to his execution at the hands of the Spanish forces occupying the Philippines in the late 19th century. We are also thrown into the world of Rizal's novels. So we get a glimpse of how he viewed Filipino society under the Spanish heal. And the movie introduces us to the life of subjugation of the Filipino people under the rule of the Spanish friars. From the execution of three Filipino priests in 1872 for alleged subversion to the harsh and unequal treatment of Filipino students in the schools, this film is a stinging indictment of Spanish colonial rule in the Philippines. We see scenes both from Rizal's actual life but also from his imagination. As a young man, Jose is sent to study in Spain. This is a plan hatched by his brother Paciano. Jose will write and do everything in his power to bring to the attention of the world the abuses of Spanish power in the Philippines, while Paciano will protect the Rizal family at home and keep up the struggle against Spanish rule. Jose excels in his studies as a medical student at Madrid University and eventually earns a degree as an ophthalmic surgeon. Meantime, he becomes involved with a group of radical Filipino students who also seek to end the Spanish abuses in their country.

Thursday, August 29, 2019

Cybersecurity Vulnerabilities Facing IT Managers Essay

Cyber-security demands are ever increasing in the field of Information Technology with the globalization of the internet. Disruptions due to cyber-attacks are affecting the economy, costing companies billions of dollars each year in lost revenue. To counter this problem corporations are spending more and more on infrastructure and investing to secure the cyber security vulnerabilities which range anywhere from software to hardware to networks and people that use them. Due to the complexity of information systems that interact with each other and their counter parts, the requirement to meet specific cyber security compliances have become a challenging issues for security professionals worldwide. To help with these issues, security professionals have created different standards and frameworks over the years for addressing this growing concern of vulnerabilities within enterprise systems and the critical information they hold (â€Å"Critical Security Controls,† n.d.). Before we get into the details let first examine what exactly is a security vulnerability. By definition a security vulnerability can be flaws in hardware, software, networks or the employees that use them which in turn can allow hackers to compromise the confidentiality, integrity and availability of the information system (â€Å"Common Cybersecurity,† 2011). To thoroughly discuss this topic in more detail I will first discuss Confidentiality as it is one of the three main goals of IT Security. Confidentiality is as simple as it sounds, limiting access to resources for only those that need it. Confidentiality vulnerabilities occur when hackers try to exploits some weakness or flaw  within information system and view information that they are not normally allowed to. In this case the confidentiality of the documents have been compromised. The second goal of IT security which can also be affected if security vulnerabilities are present is Integrity. Integrity by definition can mean many different things for different topics but for the IT world it solely relates to the trustworthiness of a document or resource. This means that the document or file has been unhindered or changed and is still in its original form. This is very important because if data has been hindered or changed it can cause substantial damage to corporations due to the possible wrong decisions being made like investments or unintended publications or even trouble with the law if tax audits are not adding up properly which would all result in a net loss. The last goal of IT security which can be compromised if security vulnerabilities exist is Availability of the information system. Availability refers to the idea that a resource is accessible by those that need it, whenever they need it. In my personal opinion I believe availability is probably the most important out of the three security goals. I say this simply because there are many mission critical applications out there that need to be online 24/7 and any downturn can result in catastrophic results. One prime example of this is the air traffic control towers at LAX; they were having problems with the system a few months back due to the U-2 spy plane flying over their airspace. This caused major panic which grounded taxied planes that were ready to take off and forced the manual tracking of planes already in air (Ahlers, 2014). Throughout this the paper I intend to report on the many different types of cyber-security vulnerabilities available and their effects. I will also describe in detail the vulnerability I feel is the most important facing IT managers today, its impact on organizations and the solution. As I stated before there are many different types of security vulnerabilities out there which can affect the integrity, availability and confidentiality of a resource. So the question still remains what exactly are t hese types of vulnerabilities? Especially since they range from software, hardware, networks and the people that use them. Firstly I will discuss the software vulnerabilities, more specifically in terms of web applications. This is because more than half of the current  computer security threats and vulnerabilities today affect web applications and that number is ever increasing. (Fonseca, Seixas, Vieira, Madeira, 2014). When considering the programming language used to develop web applications you have PHP which is considered a weak language, on the other hand you have Java, C# and Visual Basic which are considered strong languages. It is important to note that the language used to develop the web applications is very important because although the different programming languages are similar overall, each one has different rules of how data is stored, retrieved, the execution methods, tables and so on. For example when I say how data is stored and retrieve, I am basically regarding to data types and data structures and how the programming language that is being used maps their values into type fields like strings for names, Int for numbers, or even Boolean for true and false statements. Overall though even if you are using a strong typed language like Java, it does not always guarantee itself free from defects because the language itself may not be the root cause of the vulnerability but possibly the implementation methods used or even insufficient testing (Fonseca, Seixas, Vieira, Madeira, 2014). Vulnerabilities in web applications invite XSS exploits and SQL injection which are the most common types. Below you can see in the image the evolution of reports caused by SQL injection and XSS exploits over the years. This next section we will discuss some more types of security vulnerabilities, more specifically vulnerabilities with regards to hardware. Many people assume that hardware vulnerabilities have the lowest security concern compared to other types of vulnerabilities like software, networks and people that use them simply because they can be stored up in secure environments. The truth is even hardware vulnerabilities can be easily susceptible to attacks. Hardware in general have a longer lifespan than software because simply with software you can upgrade it and install new patches/builds even after deployment. With hardware you once you purchase it, you are most likely going to keep it for a while. When it does become obsolete and ready to be disposed a lot of organizations make the simple mistake of not securely disposing the old hardware properly which in turn opens up the door for intruders. Old hardware have software programs installed on them and other things like IC transistors whi ch can help  hackers learn a lot more about the organization and help lead to future attacks (Bloom, Leontie, Narahari, Simha, 2012). The most recent example of hardware vulnerability which caused one of the biggest Cybersecurity breaches in history was most recently with Target. 40 million credit and debit cards with customer information was stolen simply because a malware was introduced to the point of sale system through a hardware encryption vulnerability (Russon, 2014). Although hardware vulnerabilities are not normally the root cause for majority of the exploits and breaches out there, it is always still good to follow best practices. Network vulnerabilities will be the next topic of discussion and my personal favorite. Vulnerabilities through network systems are very common especially with the all the resources available to hackers today. There are many open source software programs on the market which can help intruders learn critical information about an organization. Just to name a few of the most popular and commonly used ones include Nmap security scanner and Wireshark. Nmap security scanner was originally developed to be used for security and system administration purposes only, like mapping the network for vulnerabilities. Today it most commonly used for black hat hacking (Weston, 2013). Hackers use it to scan open unused ports and other vulnerabilities which in turn helps them gain unauthorized access to the network. Wireshark on the other hand is also similar to Nmap as it was originally developed for network analysis and troubleshooting. It allows administrators to view and capture all packet resources that passes through a particular interface. Over the years hackers have started using Wireshark to exploit unsecured networks and gain unauthorized access (Shaffer, 2009). Although scanning unused open ports and capturing packets are a great way for intruders to gain access to a network, the most popular method by far to breach a network is USB thumb devices. Most enterprise networks are very secure in the sense that they use a DMZ (De-militarized zone) and outside penetration becomes very difficult. In a de-militarized zone outside network traffic must go pass through two different firewalls to get to the intranet of the organization. The first firewall includes all the commonly used servers like FTP, SMTP and all other resources that can be accessible by the public. The second firewall has the actual intranet of the organization which includes all private resources (Rouse, 2007). Below is the diagram of a DMZ. So the question still remains, since most enterprise organizations use DMZ which in turn helps prevent port scanning or packet analyzing, why is USB thumb devices the most popular network vulnerability? (Markel, 2013) The answer is very simple â€Å"Social engineering†. We as human beings, through social conditioning do not stop and ask questions when were not familiar with someone, which in turn has become one of the major causes for the cybersecurity breaches that occur today. Just to give one example from my own personal experiences at work, each floor has an authentication swipe policy to gain entry. Every time I enter the office area, there are a few people with me and only one person in the group usually swipes his/her badge to open the door. This is a huge security vulnerability because anyone can just follow the group and gain access to the entire intranet of the organization. In my case in particular I work for United Airlines headquarters in Chicago at the Willis tower which is more than 100 stories high and the fact that the entire building is not ours alone, this becomes a huge security concern. While I have briefly explained the vulnerabilities in software, hardware, networks and the people that use them, the question still remains, what is the most important security vulnerability facing IT managers today?. This answer to this questions differs person to person, and one must take into consideration the actual vulnerability, its threat source and the outcomes. A person with a small home business might only be concerned with denial of service attacks, since they may not have enough cash flow to properly secure their network. On the other hand an enterprise organization with large cash flow might have a different prospective and probably does not concern itself with denial of service attacks but instead is focuses on making sure all the systems are upda te using windows server update services. In my personal opinion though, you might have guessed it but it’s definitely us human beings because we have the tendency to fall victims and contribute to the successful security breaches that occur in today’s society. Mateti in his essay â€Å"TCP/IP Suite† stated that vulnerabilities occur because of human error. A study by Symantec and the Ponemon institute showed that 64 percent of data breaches in 2012 were resulted due to human mistakes (Olavsrud, 2013). Larry Ponemon the founder of security research at Ponemon Institute and chairman stated that â€Å"Eight  years of research on data breach costs has shown employees behavior to be one of the most pressing issues facing organizations today†, up by twenty two percent since the first survey† (Olvasrud, 2013). A prime example of this is when I stated earlier about how anyone can just enter my office area without swiping their card, just by simply following the group. This is a form of human erro r when employees are too intimidated to ask questions and request authorization from someone they believe does not work for the organization. The intruder can just walk in the front door pretending to be a salesperson, repairman or even a white collar businessman and may look like someone legitimate but in fact they are not. This intruder now has direct access to the intranet and can install malicious malware on to the computers to disrupt daily operations or even steal sensitive data like confidential project information, release dates, trade secrets and many more. A very good example of this is the Stuxnet worm which infect the Iranian nuclear facilities and caused a lot of damage internally which in turn delayed Iran’s nuclear development. All of the security measures that were put in place by Iran’s cyber defense team were circumvented simply by just one employee because the worm was introduced through an infected USB drive. This simply shows how the direct access from unauthorized users due to employee negligence can cause such tremendous damage and that all the perimeter defense become completely useles s. Another prime example of human errors was the RSA breach in 2011 where cybercriminals thought instead of just sending millions of phishing emails to different random mailboxes, let’s send personalized emails to specific employees. The employees at RSA thinking since it’s a personalized message its â€Å"safe† and clicked on the links unknowingly which in turn caused the malware to be downloaded on to the network. To counter this problem firstly IT managers need to properly train employees and give them specific guidelines to follow. Symantec has issued a press releases with the guidelines on how to properly secure sensitive data which includes information on how to train employees for these types of intrusions. Human error is not just limited to intimation or foolishness, it also expands too many different areas because after all it is us humans who manage the cyberspace, grant physical access to the terminals and systems that are connected to the internetwork. We setup the protocols used for communication, set the security policies and procedures,  code backend server software, create passwords used to access sensitive information, maintain updates on computers and so on (â€Å"Security 2011, † 2011 ). The human element matters very much possibly more than the software, hardware or the network systems especially when it comes to properly securing an internetwork from data breaches. The impact on the organization always depends on what type of business it is and what it is engaged in. For example if an organization is very popular and has bigger presence in the online commerce (Amazon and New Egg) compared to one that does not use the internet quiet often will be more concerned with web based attacks and vulnerabilities. The impact though regardless of the type of organization will always be tremendous. Once a breach occurs not only are you spending on recovering from its effects but you are also spending on beefing up your current security measures by installing new devices, hiring new employees so the same occurrence does not occur again (Hobson, 2008) Sometimes at the end of the day some of the cost are not even recoverable like sensitive data, trade secrets, personnel information or even customer information. Another major cost and headache that occurs once an organization becomes a victim of cybercrime is lawsuits. Many customers who feel that the organization could not protect their confidentiality will sue the corporation for millions of dollars which in turn can cause major loss. IT managers can do many things to help prevent breaches due to human errors. The first thing they can do is properly train the employees as stated above on a periodical basis and use current guidelines like Symantec to properly secure their intranet from any type of intrusion. IT managers can also establish a safe harbor in the sense that they can force employees to periodically change their passwords and establish rules so the password must be certain characters long and must include other types of characters besides just the typical alphanumerical ones. Employee negligence also due to bad habits like sending sensitive data over an unsecured email and IT managers must ensure that they continually educate their employees. There are many different types of security vulnerabilities out there in today’s world that are affecting organizations. In my personal opinion I believe human error is the one vulnerability that affects IT managers the most simply because we as humans make mistakes. It is in our nature and no matter how hard we try we will always be susceptible to deception either through social engineering tactics or clicking dangerous  links because it â€Å"looks safe† or even being negligent by not reporting something unusual. Employees need to realize that their actions can bring terrible consequences for both them and the organization as a whole. References Fonseca, J., Seixas, N., Viera, M., & Madeira, H. (2014). Analysis of Field Data on Web Security Vulnerabilities. IEEE Transaction on Dependable & Secure Computing, 11(2), 89-100 doi:10.1109/TDSC.2013.37 Russon, M. (2014, June 10). Forget Software Vulnerabilities, Hardware Security Must Improve Before It’s Too Late. International Business Times RSS. Retrieved July 12, 2014, from http://www.ibtimes.co.uk/forget-software-vulnerabilities-hardware-security-must-improve-before-its-too-late-1451912 Bloom, G., Leontie, E., Narahari, B., & Simha, R. (2012, January 1). Hardware and Security: Vulnerabilities and Solutions. . Retrieved July 12, 2014, from http://www.seas.gwu.edu/~simha/research/HWSecBookChapter12.pdf Common Cyber Security Vulnerabilities in Industrial Control Systems. (2011, January 1). . Retrieved July 12, 2014, from https://ics-cert.us-cert.gov/sites/default/files/documents/DHS_Common_Cybersecurity_Vulnerabilities_ICS_2010.pdf Critical Security Controls. (n.d.). SANS I nstitute -. Retrieved July 12, 2014, from http://www.sans.org/critical-security-controls Ahlers, M. (2014, May 6). FAA computer vexed by U-2 spy plane over LA. CNN. Retrieved July 13, 2014, from http://www.cnn.com/2014/05/05/us/california-ground-stop-spy-plane-computer/ Most Important Cybersecurity Vulnerability Facing It Managers. (n.d.). . Retrieved July 13, 2014, from http://www.ukessays.com/essays/computer-science/most-important-cybersecurity-vulnerability-facing-it-managers-computer-science-essay.php Security 2011: Attack Of The Human Errors – Network Computing. (2011, December 22).Network Computing. Retrieved July 13, 2014, from http://www.networkcomputing.com/networking/security-2011-attack-of-the-human-errors/d/d-id/1233294? Hobson, D. (2008, August 8). The real cost of a security breach. SC Magazine. Retrieved July 13, 2014, from http://www.scmagazine.com/the-real-cost-of-a-security-breach/article/113717/ Direct, M. (2013, December 20). Human error is the root cause of most data

Wednesday, August 28, 2019

Indigenous Voice Performance Essay Example | Topics and Well Written Essays - 500 words

Indigenous Voice Performance - Essay Example   The indigenous voices performances were held at the Washington State University (Washington State University Performing Arts, n.d.). The performers were both indigenous rap and hip hop, artists. They included Supaman, Nataani Means, Yaz and Witko. The aim of these indigenous performances was to celebrate world art. The first artist was Supaman who is member of the Apsaalooke group. He originated from the Crow Reservation in Montana. Supaman was a local American dancer as well as a hip hop performer whose mission was to encourage the youth and educate the public using hopeful songs and culture (Washington State University Performing Arts, n.d.). Supaman performed a song called prayer loop song, which contained a combination of traditional symbols and modern sounds. In the song, Supaman wore a traditional but fancy attire to represent two distinct worlds combining positively. The second artist, Nataani Means is a son of an Indian leader Russell Means.   Nataani Means performed th e radical featuring Russell Means, a song that told true stories of indigenous people living in the United States (Washington State University Performing Arts, n.d.). Nataani Means aim was to show the struggles that the modern indigenous Americans go through.  Ã‚   The third performer was Mike Cliff (Witko) performed a song called alive that addresses issues faced by the Lakota people in the United States. Witko who was originally from Lakota mentioned the judgments and discriminations that the Lakota people face.

Tuesday, August 27, 2019

JPMorgan Chase Essay Example | Topics and Well Written Essays - 1250 words - 3

JPMorgan Chase - Essay Example However, in some cases when there is massive fraud involved in the bank transactions or the investment decisions then the bank managers try to conceal the whole matter through different tactics. Similar thing happened with one of the biggest banks of United States of America i.e. JP Morgan Chase. In this case the bank had undergone a massive monetary loss. The Chief Investment Officer (CIO) at the bank declared a loss of 5.8 billion in summers of 2012. However, when the investigating agencies looked in to the matter then they were not provided with sufficient records or data related to different transactions and the overall investment decisions which JP Morgan Chase had made in the recent times. The Securities and Exchange Commission was basically responsible to investigate this case but they were provided with falsified information from the key executives and the chief investment officer. SEC and CFTC In the contemporary world economies are based upon the productivity and sound perf ormance of financial and banking sectors. However, these sectors are the most sensitive areas and prone to significant gambling due to the involvement of huge monetary amounts. There are several agencies primarily responsible to prevent financial sectors from possible gambling and their subsequent consequences. These include The Securities and Exchange Commission (SEC), The Commodities Future Training Commission (CFTC) etc. These agencies take the first line actions so as to protect the financial processes and also to investigate the cases of gambling such as the one which took place in JP Morgan Chase. Recently SEC and CFTC have developed a cooperative advisory committee in order to effectively and efficiently investigate the regulation issues and the fraud cases. First of all they are required to detect the rising regulatory risks, subsequently followed by evaluation and quantification of these risks and their broad impacts over the financial sector and the overall economy. Moreov er they are responsible to advocate investors and the major market players (CFTC-SEC Joint Advisory Committee, 2013). Valid Contract In broader terms contracts are defined as the legal obligation which is constructed between two parties so as to make their agreement associated with the law. In this way both of them are entitled to refrain from breach of contract law and also to pay penalties in case of frauds. Therefore parties willing to enter into a contract are required to fulfill the following requirements (Walston-Dunham, 2011): Involvement of two parties: The contracts are not made on individual basis hence there must be two parties involved in a valid contract. Legal capacity: This indicates the mental and physical abilities of both members to fulfill legal obligations i.e. their age and psychological state must be in accordance with the requirements. Individuals below 18 years of age cannot enter in to a valid contract while on the other hand mental patients are also ineligi ble. Offer: One of the two parties must make an offer to another party. This offer is regarding the nature of operations they both want to perform under the valid contract. Acceptance: The offer made by the first party must be accepted by the other party so as to prepare a legal contract. Intention: This indicates the real intention of both parties to legally bind their agreement. If either of them fails to represent a clear intention then the contract might not be made. Consideration: In order to verify

Monday, August 26, 2019

Strategic Marketing Plan for(iPhone 4 in London) Essay

Strategic Marketing Plan for(iPhone 4 in London) - Essay Example Based on its established brand equity, Apple Corporation has the opportunity to skim the market with high prices in the UK market. However, once the upper class market has been catered, iPhone 4 can head for the mass market with low prices. This will expand iPhone 4’s life cycle over a longer period of time till the product itself matures. This report contains a detailed analysis of all the marketing and operational aspects of launching Apple Corporation’s iPhone 4 in the UK markets. 1. Resource Analysis The tangible resources available for the introduction of smart phone include the production facilities of the company which already exist. Apple Corporation’s main strength is its ability to develop hardware and software systems which it has developed through extensive Research and Development (Apple.Inc). The quality, method and organization of the current production process are already available. The production requirements can be met by existing state-of-the-a rt facilities. The marketing management process remains the same and the same distribution channels though which our competitors sell their smart phones, will be used. The IT systems are already developed which makes it easy to integrate with our customers and suppliers. The intangible assets available include our Goodwill in the market. The reputation of delivering the objects on time is also important. The key commercial rights protected by patents and trademark will work as an asset for our company. However, introducing this new smart phone will increase our labor cost by ?10 per person as more workers will be needed. The R&D department will need more labor therefore it will be increased by 500 men working at the rate of ?10 per hour and there will be 30 more employees for managerial work. As the existing production facilities will be used, there is no need of extra physical capacity. However, to improve and modify our facilities, a financial injection of ?500,000 will be needed which we will raise through debts as raising through equity will increase our interest expense. (Deutschman; Useem). 2. SWOT Analysis (Apple) Strengths (ReportLinker.com; iphoners.com) Apple stands on a strong foundation of Innovation through which it will introduce iPhone 4 with unique positioning. Apple’s phones are meant to be user friendly and with this ease of use, the company differentiates itself from the competitors who produce more complex versions of PDAs. iPhone 4 would be a competitive product and will be launched in the market with competitive prices through its competitive advantage of cheap raw material availability. The brand itself has long been established and therefore, the market will be highly receptive to new brand extensions. Weaknesses (ReportLinker.com; iphoners.com) Touch screen phone usage causes a medical condition called Gorilla Arm, which is caused when one holds his/her hand at waist length and continuous usage of touch screen phones may cause s uch problems. The consumers may therefore feel discomfort while using touch phones. Opportunities (ReportLinker.com; iphoners.com) Smart phones have a growing consumer base which is a good sign for Apple’s business as the new iPhone 4 can anticipate higher turnover rate. All the other brands such as Nokia, Samsung and especially Blackberry are positioned towards the corporate sector. iPhone 4 will be targeted towards a different and a larger market which can be

Theodore Roosevelt's Main Contributions to American History Essay

Theodore Roosevelt's Main Contributions to American History - Essay Example This paper will discuss the main contributions of Theodore Roosevelt to American history. â€Å"Theodore brought modernism to the American government† (Woods 2010, 1). He was properly suited for this responsibility. Philosophically, Roosevelt was an expert who was determined to bring effectiveness and intelligence to fight against spoilers of the natural environment, as well as international disorder. Roosevelt was as historians put it, "the first great leader who changed America to the modern industrial age" (Woods 2010, 1). Roosevelt had little endurance with federalism and also with a majority of the constitutional barriers that stood between him and the establishment of a fresh American state. Politically, Theodore was a dedicated nationalist. He, therefore, could hardly bring himself to address Thomas Jefferson, whom he detested. Moreover, as late as the 1880s, Roosevelt was still criticizing Jefferson Davis as a traitor. Roosevelt was angered by The Confederate cause bec ause it denied a large united nation its own justification. â€Å"Roosevelt took to the presidential office a consistent and thorough philosophy of a government† (Woods 2010, 1). What a former leader might have done without fanfare or hesitatingly, Theodore Roosevelt formed a much better principle. ... They all echo the president's self-belief in proficient commissions and his stewardship assumption of the executive branch. As one historian put it, these acts, put together, "may well be regarded as the dawn of a modern regulatory nation, the great America" (Woods 2010, 1). Not all American leaders were confident at this view. One traditional Republican stated that Roosevelt was â€Å"unconsciously or consciously trying to focus all power in Washington, to eliminate state lines, as well as to govern the people by bureaus and commissions." Roosevelt was a natural publicist. â€Å"He offered an astonishing heritage to the American citizens of a variety of resources and lands in public ownership† (Bedford/St Martin's 2009, 16). He used the Presidency's "bully pulpit" successfully to stimulate public interest in conservation matters. Theodore’s key contribution to the conservation movement was "wielding his presidential status to craft an alliance of people from civic lea ders and naturalists who favored conservation to useful resource specialists, as well as users" (Woods 2010, 1). No success shows this better than the Governor's Conference of 1907. At this meeting, Roosevelt conveyed all the country’s governors and several other leaders together and, using his own eagerness for conservation, he ignited policies, discussions and proceedings that still echo today at many levels of the American government. â€Å"Theodore Roosevelt also assumed that he had a duty to spread American interests and ideas across the globe† (Roosevelt 2006, 1). As the leading world power, the U.S. had an apparent chance to remake the global system in a manner that would eradicate the old ruins of war, as well as corrupt alliances. Roosevelt

Sunday, August 25, 2019

Computer Graphics Essay Example | Topics and Well Written Essays - 1250 words

Computer Graphics - Essay Example [Wallace, 2001. pp3-6] The JPEG compression algorithm involves three stages - Colour Space Conversion (Red-Green-Blue triplets mapped to Luminance-Chrominance Blue-Chrominance Red triplets), Segmentation into 8x8 pixel blocks, and Discrete Cosine Transformation (image transformation from spatial domain to frequency domain representation) encoding stage that includes Quantization (sorting the output waveform of DCT), Zigzag Scan (sorting the frequency coefficients from low to high), and Entropy Coding (Huffman Coding and Arithmetic Coding). The encoding and decoding algorithms for JPEG images are shown in figures 1 and 2 respectively. Compression is used to reduce the file sizes such that they can be used on web pages or documentation or any other light weight graphics applications. The 8x8 blocks of source images are first shifted from unsigned integers to signed integers and then are applied to the Forward Discrete Cosine Transformer (FDCT). To decode the compressed image to achieve the 8x8 blocks again, they are applied to the entropy decoder whereby the output is taken out from Inverse Discrete Cosine Transformer (IDCT). The final processing step of DCT encoder is the entropy coding that achieves additional compression by encoding the quantized DCT coefficients based on statistical characteristics. There are two types of Entropy Coding methods - Huffman coding and Arithmetic coding. Huffman coding requires one or more sets of Huffman code tables whereas Arithmetic coding doesn't require any external tables (althoug h statistical conditioning tables as inputs can improve coding efficiency). The quantization stage of JPEG algorithm results in loss of information, thus making JPEG standard a lossy compression technique. [Wallace, 2001. pp3-6] Compression Ratios and JPEG image formats: Compression is specified in terms of bits per pixel including the chrominance and luminance components) called the compression bit rate. Higher the value of bits per pixel, better would be the image quality. The JPEG standard recommends the following mapping of image quality with bit rates in colored images having moderately complex scenes: 0.25 to 0.5 bits per pixel: The output image shall possess moderate to good quality 0.5 to 0.75 bits per pixel: The output image shall possess good to very good quality 0.75 to 1.5 bits per pixel: The output image shall possess excellent quality 1.5 to 2.0 bits per pixel: The output image shall be practically non-distinguishable from the original image The improved version of original JPEG technology is JPEG 2000 that provides better rate

Saturday, August 24, 2019

New buses for corfu Assignment Example | Topics and Well Written Essays - 4000 words

New buses for corfu - Assignment Example In consideration to providing the cost saving approach in the business, business is planning to acquire the new services that would meet with the needs of services. Moreover, during the initial time of agreement Trivia appears to provide it services all across the island. In this consideration, later Trivia bus agency introduces accumulated buses service in order to meet the additional requirement of passengers. However, after six month of operation of Trivia buses in island, business recognizes to make some considerable changes in the route of buses in order to provide access more destinations. Moreover, with the implementation of this approach there was considerable dilemma in inhabitants, as they now have to travel with three different buses to reach their destination. Correspondingly, prior to the agreement of Corfu Transport Authority with Trivia the old public transportation system is very much friendly to the passages. However, with the introduction of Trivia, the drivers were employed to drive buses at those location based on the passengers reports. However, the drivers were provided with inferior wage system in comparison to Corfu Transport Authority. This resulted to lack of affection in the mind of the passengers to avail the services of Trivia and over the period of three years the rate of passengers has been diminished to two third whereby increasing the rate of private transportation. In this regard, the paper intends to highlight the account of failure to provide appropriate services by Trivia Buses in the island of Corfu. Besides, the paper also emphasizes over providing the method through which Corfu Transport Authority can command the transportation system. Additionally, the paper will reflect the benefits of integrated marketing approach to attract larger sections of Corfu’s islanders and tourists to avail the public transpiration system. Transportation is one of the fundamental as well as integral

Friday, August 23, 2019

Ecomerce Essay Example | Topics and Well Written Essays - 1000 words

Ecomerce - Essay Example developed world, there is one upcoming piece of technology which might have a greater effect on the economies of the developing work than anything else in the past. The internet and electronic business might have got their start in America but the expansion and further development of their use will take place in countries like Venezuela, Brazil, India and other countries where the cost of computer equipment still places it out of reach for many people. This is where the $100 laptop and the one laptop per child program comes in, with the market penetration that the low cost laptop brings the number of people who are online will be increased many fold and along with that there will be additional input for e-commerce. In the coming years, EBay could get bids on products from across the world and other discount retailers could find themselves selling to individuals living in places where they wouldn’t even have dreamt of selling their wares. Fundamentally, the $100 laptop is a solution for bringing the internet to the real masses of the world that have till yet remained outside the information loop (Laptop.org, 2006). Since the laptop also functions as a capable internet device the information access and communication technology which is taken as a given by the developed world will also make their way towards the developing countries (Wikipedia, 2006). It may not be the perfect method to bring about equality in the world but it will certainly boost global e-commerce over the coming years. The central characteristic of the project is the cost of the laptop which is expected to start somewhere in the range between $130 and $140 initially when it is launched in 2007 (Zuckerman, 2005). However by the year 2008, when it is delivered in large numbers to distribution centres around the world, the cost is actually expected to be less than $100 (Stecklow, 2005). Additionally, due to the donations expected from large organizations which are supporting this initiative the

Thursday, August 22, 2019

Sugary Drinks Essay Example for Free

Sugary Drinks Essay Beverages are different types of drinks made for human consumption to quench thirst. Sugary drinks or soft drink is one type of beverage, which is added with sugar such as Coca Cola which is a common soft drink. Energy drinks are also known as sugary drinks. Sugary drinks have many reasons for and against regulating it. Although sugary drinks are in favor of many people, it is also important to note that it is in opposition to others in a nation at large which gives use to the question of whether sugary drinks should be regulated or not. This essay will discuss the reasons why the government should not and should regulate sugary drinks. To begin with, a reason against regulating sugary drinks is that it generates employment opportunities for the nation. Sugary drinks companies will need a high manual labor component in its various manufacturing process, therefore locals based near the factory are mostly recruited. For instance, as shown in the annual reports, â€Å"Coca Cola Amatil Limited employs approximately fifteen thousand people across the group† (Coca Cola Amatil Limited 2013, p. 75). Ultimately, unemployment rate in an economy is maintained which further leads to economic growth. In addition, alongside employment, a few sugary drinks are beneficial for the people. Such drinks are energy drinks which contain vitamins and proteins in it such as Powerade, V-drink and Mother. Players consume these energy drinks while training, before playing and also after playing to be energized. In the case of Fiji Marist 7s tournament, â€Å"Coca Cola Amatil Limited providing the Powerade dinks that replenishes electrolytes, carbohydrates and vitamins during physical activity† (Kumar 2013, p. 45). Hence, sugary energy drinks are highly valuable for the strength of the players. Furthermore, choice of drinks is sighted as a personal right. Every citizen of a country has the full rights and freedom to choose what they want to consume regardless of the drawbacks. In other words, a person cannot be turned away from others decisions. To illustrate, according to David, â€Å"I criticize Conly’s defense of the soft drink ban and offer my own view of the justification for paternalise food and beverage policies† (Resnik 2014). Therefore, choosing between the various types of drinks to consume is entirely dependable on a person itself. However, there is another side to this argument. It is evenly important to recognize the arguments against regulating sugary drinks. This essay discusses the arguments against sugary drinks. Equally, a major reason for regulating sugary drinks is to prevent non-communicable diseases among children. Daily consumption of sugary drinks leads to weight gain, poor diet and health and tooth decay in children. Meanwhile, there is less control of sugar level which leads to diabetes. Children are too young to suffer from such non-communicable diseases. For example, A thoughtful redesign of a school environment with changes to school dietary options, implementation of reduction of access to sugary soft drinks resulted in a deadline in the prevalence of overweight from 20. 8% in the 2004-2005 school years to 20. 4% in 2005-2006 (Environmental Health Perspective 2009, p. 159). Thus, making amendments to access of sugary drinks in schools will avert non-communicable diseases. Moreover, another reason for regulating sugary drinks is to reduce pollution in an economy. A greater manufacturing process of soft drinks in a factory produces toxic wastes into the community which harms the lives of the people living near the factory. This includes environmental as well as marine pollution. It can cause skin rashes, ulcers and respiratory problems. Also, food from marine sources will affect the health such as upset stomach. An example would be that â€Å"The Non Government Organization found high levels of toxic chromium and other pollutants in the soil and water around five Coca Cola and Pepsico plants in northern India† (Googleschorlar 2010). Thus, regulating sugary drinks reduces the risks of ones life that is affected by pollution. Finally, regulating sugary drinks helps a government minimize its health care costs. Higher health care costs directly cause increase in health insurance, hence minimizing the costs, helps the government use the remaining funds in the other ministry departments. As revealed by the Vice President of Fiji, Ratu Joni Madraiwiwi, in a recent announcement that â€Å"the government expenditure has steadily increased over the years to an alarming level and at a cost of two million dollars to health services† (International Journal of Productivity and Performance Management 2007, p. 538) As a result, the expenditures of the government need to be adhered to and decreased. In conclusion, the essay discussed the reasons for and against sugary drinks and why the government should not and should regulate it. In contrast, regulating sugary drinks are more important. Regulating sugary drinks is of more importance because it creates non-communicable diseases, pollution and adds costs to the health care system. The government should make sure that its citizen is ardent in taking care of their health. If the public continues to limit their consumption of sugary drinks, then the nation would be able to combat the tribulations of sugary drinks.

Wednesday, August 21, 2019

Health care Transparency Essay Example for Free

Health care Transparency Essay Health care Transparency is openness about the quality of healthcare provided, sharing information whether it be good or bad for the purpose of improvement. In the past, health care transparency was secretive, people did not want to share patent information for reason of privacy to their clients as well to avoid law suits. However there is a way in which you can share information without violating doctor patient privilege. The future of health care transparency looks as though it is going to improve, I say improve because I agree with Dr. Patrick Crawley that the movement will allow sharing of information therefore allowing improvements to be made leading to less law suits. Really kind of taking on a best practices type of mentality as well sometimes we need others to step in and help work through issues that may arise. Overall I think that hospitals becoming transparent will force improvement, at first I am sure there will be a struggle just as in any new process however once the kinks are worked out improvement will shine through. Health care transparency will help patients make more informed decisions when deciding where to go when care is needed, this may cause longer wait times at first however raising the standards and outing the facilities that are not providing good treatment cause only force them to do whatever it takes to increase standards and service provided. We as consumers need to become more informed decisions makers however with information available to us is limited we are unable to make accurate decisions on where to receive our care. We have systems/sites in which we can choose babysitters, plumbers and other types of services we made need why would we not want to choose our health care facility with the same type of research. Some of this information is already made available by some facilities, such as checking out wait times and even being able to sign up to be seen before even arriving improving the time in which we would wait to  receive care. The more we alignment with this advancement the better the care we will see.

Tuesday, August 20, 2019

Men Are From Mars, Women Are From Venus

Men Are From Mars, Women Are From Venus Men are from Mars, Women are from Venus is a book written by the psychologist John Gray, which was published in May 1992. It was published in many languages and was a true bestseller. In contrast to many other psychologists, who pay more attention to the similarity between the sexes, Gray focuses specifically on the differences. As an example, a typical problem is that women think that men can not listen. This is due to the fact that in a difficult moment a woman to speak out, and from the man she wants to get support and recognition that its difficulties are significant. A man in a hurry at once wants to find a solution, instead of listening carefully. In the book Men are from Mars, Women are from Venus will be reviewed different problems. For example, another problem is that men think that women try to remake them, like cut and make recommendations. For example, when a man can not do some task independently, the woman thinks that she should help, and begins to give advice. But a ma n sees in this not her help, and distrusts his own abilities, because for men it is important to reach all on his own. Other sex differences discussed in the book are in the points system for men and women, the behavior in stressful situations, etc. Introduction The approach to gender relations in the book is used as a metaphor, the assumption that men and women are so different that they can be regarded as originating from two different planets. It is not just another book of self help but a valuable tool for understanding what really goes on inside the heads of men and women, its changing moods and why those changes occur. One of the highlights of the book talks about the different reactions of men and women facing the same problem, for example, why women love to talk about problems with friends while men prefer to stay quiet, thinking of a solution, what makes women crazy, or because men dont like to request information, or because they hate it when they hear I told you!. Much more than just pointing out the differences, the book teaches how to handle these differences with practical solutions, and thus to save the relationships that seemed doomed to failure. Purpose In interpersonal relationships, man and woman are configured to achieve different goals. Woman set on communication and cooperation, love and understanding. The scientists noted that already in infancy girls are more emotionally responsive to peoples faces, while boys to the shape of objects. Man aims to win the status and authority on competition and its successful completion.Thus, entering into an unfamiliar room, the man first explores the sources of possible threats, scans the inputs and outputs (for possible derogations), sits with his back against the wall, so that he has precise control of the territory. The woman, coming together with him, picks up the emotional climate, draws attention to the interesting personalities, capable of a few minutes to determine the nuances of relationships that in each pair are present, according to Men Are From Mars, Women Are From Venus (2011). Man, conceived to be an exemplary provider and protector, can not stand to make mistakes and show a woman his own weakness or failure. He does not like to hear from womens tips, suggestions, comments, since he hears them about his accusation of incompetence. It will be up to exhaustion that led his wife and children in an unfamiliar place, but never to ask a passer-road. He will be agonizing experience, but not uttered a word with the woman that she did not recognize his failure. Therefore, a woman must be very thin and transparent to the man to direct him where he needs. Generally, for men it is very important to hear from the women that he really gives her all for her happiness, according to Men are from Mars, Women are from Venus: An Analysis of a Potential meme (2007). Sensory organs in a woman are sharper and more sensitive. Emotional adjustment in women is much higher than in men. Women feel thin little change in attitudes and moods, capture non-verbal signals that their brains are continually receives and analyzes information from the outside world. Woman understands the intricate relationship of heroes in movies and books, knows all about the tastes, preferences and problems of their children a man can only assume something. Hearing a woman for several orders of magnitude than the male. A woman knows how to share the sounds, assign them to different categories, to make a decision about each of them (which gives it the ability to simultaneously arguing with her husband, mentor a child and talking with a friend on the phone). Female hearing was originally set up to childs cry thats why for a man would be hard to sleep when the baby is beating in hysterics, and a woman wakes up at the first sound. The boys still in their teens cited a psychological deafness when they hear something that do not want to listen. If a woman wants a man to come up to important information, it is best to submit it in writing, according to Men are from Mars, Women are from Venus? (2007). The book Men are from Mars, Women are from Venus shows the importance of the issue in the society. The topic is extremely important and it is often discussed in the society. As a fact, there are many differences between men and women, which can be easily explained. That is why the book Men are from Mars, Women are from Venus will be interesting for both sexes, as there are many interesting issues discussed, which can contribute to the understanding between the sexes. The most famous book about the relationship between men and women will become movies. Hollywood producers are going to film a series of bestsellers by John Gray Men are from Mars, Women are from Venus, read before Bridget Jones and the millions of women worldwide. Of particular intrigue to this event was attached to that book of Gray its not fiction, and psychological benefits. Incidentally, this is not the first attempt to film the creation of John Gray. The romantic comedy Hes Just Not That Into You is based on the book You just do not like him. Men are from Mars, Women are from Venus was published in 1992 and immediately became a bestseller. Psychologist John Gray wrote a total of 16 books on gender relations, 13 of them dedicated to Mars and Venus. Metaphor, invented by Gray, turned into a real cultural phenomenon. Based on the books, information was delivered to the TV show, a musical, was released a DVD with lectures, the author who brought profits of more than 100 million dollars, and the books themselves separated the 50 millionth circulation in 45 countries. The very first of them lasted for nearly seven years in the bestseller list, The New York Times. Relationships Most problems in relationships, men and women arise because we are really different. And not just different men and women are from different planets. Our approach to most issues is so different that for the understanding of different issues we need a common language. Men are from Mars, Women Are from Venus is a U.S. trial, the best-selling book by John Gray published in 1992. Gray matter includes difference between men and women of essentialist views and exhibits examples and behaviors to allow both sexes to better understand the opposite sex, according to Deborah Cameron (2007). In 2006, the French translation of the book was directed by Thomas Douarec. This show has enjoyed considerable success across the francophone world. The show and book deal with the relationship of the couple in their corner very caricatured (men who do not ask for directions by car or women who carry too many clothes on a journey), traits being pushed deliberately in order to better illustrate and contrast male and female sides of each person, according to Men Are From Mars, Women Are From Venus (2007). About love and sex there is so much said and written, that remains to add that for women love this is poetry, and for the man prose. Man lives with the installation of doing something, he demonstrates a deep love acts (such as conquering a mountain peak or a knock-out carpets). A woman wants beautiful confessions and words. When relations are at a stage of courtship, the man says to a woman more than the rest of his life together is it the needs to achieve his goal in getting the desired girlfriend. In this case it is necessary to seek a compromise a man at times is romantic, and women appreciate what a man does for them. And how many tears shed by women due to the fact that in intimate relationships men pay little attention to caress and touch! Willingness to men for sex at almost any time in any mood (after a quarrel, during the illness of children, etc.) makes a woman think that a man just uses her! But let us turn to science and see that the hypothalamus, where is the center of sex, the male is much more feminine, in addition, the hormone testosterone, responsible for sexual attraction, in its content in the male body is 10-20 times higher than the female. Such is the nature. Truth I must say that this unrestrained desire has a clear subconscious goal the continuation of a kind, survival among the aggressive environment. In support of women say that their skin is 10 times more sensitive than men, it is thinner and comes with an additional layer. Thats why women are in dire need of touch. Men have thicker skin and is less sensitive to tactile contact (its sensitivity is concentrated in a few places). It is rather difficult to find a common language among such different creatures. Now a lot of talk is necessary about the problems of financial, political, or environmental, but few people think about the problems of the relationship. I think that the question of survival, even as they must come first and not just because a decrease in physical work degrades men as the stronger sex, but gradually takes the joy out of life, but the meaning of life in happiness. Who needs a life of continuous suffering and anxieties? And true happiness we can draw only a harmonious relationship. We eat no food, and energy is extracted from food. And this energy, that is giving us the fullness of life, we spend on the stress of negative relationships. Stress is the main catalyst of our quarrels. But the root cause of most conflicts is the fact that men and women in different ways have to cope with it. Their reactions to stress are very different and these differences are increasing with the increasing stress. American writer John Gray, Ph.D. in his book Mars and Venus: Why we fight? Says: Sometimes it seems that we are from different planets, men are from Mars and women from Venus. And there is not a positive understanding of the mechanisms for responding to stress, Mars and Venus are in conflict, rather than closer. The difference between the response to stress is that men cope with it alone and do not like when somebody is even helping him, not to mention that if he was ordered or even advised, and women, on the contrary, want him to communicate or work together, asking assistance. Coming tired from work, men tend to at least briefly retire to rest. Women are not capable of passive recreation and can not get rid of the weight of their cares and affairs. If the husband returns from work and is not in the spirit of loving wife the best of intentions, rather than to give it to recover alone, begins to pester him with questions, with their problems or even the consolation than further increases his stress. No wonder they say that good intentions lined the road to hell. A woman in distress has a need to speak out. The man, instead of silence to listen, (or at least pretend) that he listens, is thinking that his problems are not worth a damn, and is trying some way to soothe her, this way adding fuel to the fire. She decides that her husband does not sympathize with her. In men, there is an anti-stress hormone testosterone, and they produce it alone. Women have oxytocin. Women feel comfortable in a conversation, telling someone about their problems. Men do not like to complain and relieve stress, solving problems and acting independently. Ignorance of these differences leads to the fact that men are tired of womens issues (and they are never quiet, always somewhat concerned), dismiss them, words such as: Do not pay any attention to such trifles!. These words are only fueling the fire. She decides that the partner ignores it, does not want to give him attention. From this the stress only increases. Conversation threatens to grow into a quarrel. A man in a stressful, irritable state can not maintain a conversation. For him, to restore normal testosterone levels and calm down, you need some time to be alone and he, sensing the looming conflict, somehow stops the conflict and leaves. If a woman at this point is wise not to leave him alone and go after h im, trying something else to finish saying, the man can blow up and the scandal will be provided. As we know, the scandal is as a fire, it is easier to prevent than to extinguish it. To do this you need to know more its anatomy. The fact that women in conversation tend to move away from the main theme, that man, as mentioned in the previous article, annoying for the simple reason that he, unlike women, can only focus on one subject of discussion. Starting from this, nervous, he instinctively raises the tone. This, in turn, drives up the woman, and she already becomes angry, remembering all the past wrongs, totally forgetting about the problem of the conversation, according to according to Men are From Mars, Women are From Venus-what Does It Mean Really? (2010). To prevent this from happening, women need to try to track the topic of conversation, without going beyond its limits, until it is completed by a decision. And most importantly for both partners during the whole conversation it is important to remember about a compromise, if there is at least something they want to get from one another. Otherwise, they get nothing, except stress. And they lose energy, and with it good mood, maybe even in the long term, even health. Any pressure, according to the law of reflection, is causing even greater resistance from the other side. Differences It is known that women differ from men. There is a childrens song, which is sung, that the boys are made of pistols, soccer balls, slingshots and ruptured after climbing over the fences of pants. About the girls in the same song is sung, they are made of sweets, aerial lace dresses and ribbons, braided into tight braids caring moms. When we grow up, the difference between the sexes is not reduced, and vice versa, it becomes increasingly evident, even in appearance. For example, men do not have these breasts that are tempting to stick out from under your fashion T-shirts. And women are the subject of a mens pride, an object of admiration and envy of mens girlfriends. Sexes differ in chromosome structure. That is, the differences start at the biological level: For example, women are better versed in the smells. Their brains can store and classify the different smells much better than the average male brain. But for men, this ability is an exception. Male perspective is arranged in such a way that they see in the dark better than women do, and thus may be well to concentrate on driving. Womens skin is much more sensitive, since it has more nerve endings. Therefore, women are so fond of massages and all sorts of amenities such as aromatic shower gels and creams for massage. Women sweat twice as compared with men, according to How men from Mars and women from Venus Can make the most of their differences (2008). Women have better-developed intuition. This is due to the fact that we have more interactions between the two halves of the brain the left and right. While men can not immediately switch from a logical problem in the figurative, some time needs to pass. So when a woman calls him at work to inform that she bought a wonderful summer curtains tropical colors (as recommended by designers this season), a man may fall short in a stupor, trying to adjust to a different way of working of the brain. He is now obsessed with the whole process of intelligence or strategic planning. So women do not have to be offended if a man answers her a little harsh and off-topic. This does not apply to a woman personally. Women tend to be dissatisfied with their figure, all the time trying to find flaws in themselves. Women do not give any names and nicknames, caressing the body parts, which can not be said about men. Women in a joint interview prefer to talk about their failures. Also, women often have not enough communication, received on the job, and they want a little chat after work with her man. Men, by contrast, often exaggerate their abilities, are rarely dissatisfied with their figure, and prefer to talk only about their successes and achievements in various fields of life. They totally lack of communication that they received during the day at work and many evening conversations can lull them, according to Men are From Mars, Women are From Venus-what Does It Mean Really? (2010). We are so very different from each other as Mars and Venus. It is unclear how we all manage to coexist under one roof. At the same time, in our differences there is a big plus they are the guarantee of our mutual attraction. As men and women, we all want to be happy. Irresistible desire for happiness is the strongest instinct and desire. It does not matter what its made from butterscotch and fruit gum, or toy cars and slingshots and we are particularly pleased at the very moment when our happiness is the joint. Gray presents almost exclusively focus on differences, unlike many psychologists (and feminists), but also points out that Mars and Venus are only stereotypes and can not describe the individual woman or man. This reservation is easily overlooked in the book, then focuses just on differences, not similarities. Not all sex researchers agree with Gray in the fact that two sexes communicate in such different ways, as it has been pointed out that there is often very large overlap in gender psychology. Among feminists, the book has been criticized for being misogyn or to require that women must adapt to mens behavior. Others have pointed out that Gray has not made detailed references to the research he claims underlie the book. Martians appreciate the power, efficiency, and love to compete who will overtake someone who will reach more in life. Their regular job is to assert itself in our own and others eyes, to prove that they are better, stronger, more talented than others. Their sense of self is determined by how they are able to achieve good results. Only success gives them a feeling of fullness of life, self-realization, according to Men are from Mars, Women are from Venus Author John Gray coming to KC to talk about New Book Venus on Fire Mars on Ice (2010). For women there are other values. For them, above all, is love, companionship, beauty, the world of human relations. They leave plenty of time to care, support and help each other. Their sense of self is determined by their feelings and the quality of relationships. The contacts with others, opportunities to share their own feelings, and experiences, as well as sharing others joys and sorrows, which realize their potential. Interests focus on the Martians subjects, things, rather than on people and their feelings. And today, on Earth, while women dream about love, thoughts, men occupy powerful cars, computers, working with incredible speed, technical innovations and advanced technologies. They care about things that can help them achieve those or other results, in terms of their power and for women communication is paramount. Sharing their feelings and experiences for them is far more important than to achieve success or to achieve high results. They realize themselves in conversation, relationships with others experiencing this feeling of great satisfaction. For the Martians it is essential to reach the result: for them it is a way to prove that they are worth something, and it brings them the moral satisfaction. However, men feel it only if they got the desired results on their own, and not someone elses help. At the same time, womens intuition is very strong. They have developed this ability over the centuries, divining the wishes and needs of others. They are proud that they can be empathetic and able to capture the feelings one experiences. Offer help and assistance before men ask about is womens brightest manifestation of love, according to according to Men Are From Mars, Women Are From Venus (2011). To sum it up, it can be said that Men are from Mars, Women are from Venus is a book written by John Gray. It is a self-help book that offers a range of solutions designed to improve the relationship between spouses. The starting point of the book is that the two sexes are very different, and for that relationship to function, it is necessary to understand the opposite sex different forms of communication and emotional needs. Gray uses the Roman gods, respectively, war and love as a metaphor for gender differences. Conclusion This book will help to learn the practical aspect of the solution of problems arising from misunderstanding of insurmountable differences between men and women. There is described a theoretical analysis of the psychology of these differences, as well as a practical tutorial for creating such relationships, which by law can be called love. Men are from Mars, Women are from Venus is one of the greatest bestsellers of our time. This is a book that has changed for the better the fate of people who read it. Most problems in relationships, which arise among men and women, occur because we are really different. And not just different people we are from different planets. Our approach to most issues is so different that for the present understanding of special needs a common language is needed and this book will help to find and learn the language of each and every. When we learn it, disappears the majority of the reasons to be unhappy in love, in family, in business relationships. The book is intended for all men and women over 16 years.

Gun Control is NOT Losing your Target in the Recoil Essay example -- Se

Guns, like many other issues of the day, have two distinct and opposing views with many people in the middle or undecided. Even following the tragic events of December 7, 1993, when unemployed handyman Colin Ferguson boarded the LIR’s 5:33 out of Penn Station. Ferguson waited until the train, filled with local commuters on their way home, pulled out of the Hicksville station before drawing a 9mm pistol. Ferguson then opened fire walking up and down the aisle shooting passangers indiscriminately, stopping only to reload, twice. When he was finished six were dead and 19 were injured. Gun control advocates think that outlawing guns would have stopped the killings from ever happening. While gun rights advocates believe just as strongly that it could have been stopped by one innocent person being armed and fighting back. In order for an issue to even be at hand, both sides must agree that there is a problem with guns and gun control. Both gun control and pro gun advocates do agree that there is a problem. Pro gunners say it is too hard to own a gun and the gun controllers say it is too easy to get a gun. Gun control advocates would argue that gun ownership is not a right and is not protected by the second amendment. They further believe guns are harmful to society. Gun control advocates also believe guns are not needed for self-defense. Gun-controllers use points such as, the constitution, specifically the second amendment, hunting and gun related assaults to try to prove their point; however most of their arguments are based in emotions and only have merit in the specific case they are trying to illustrate. For when you strip away the emotional rhetoric and examine issues logically, so called gun control laws fail to accomplish any of their stated goals. A lawyer once said, "If the facts are with you, argue the facts. If the facts are against you, argue the law." Now gun control advocates have added, â€Å"If the facts and the law are against you, argue the emotions!† Let us start this discussion with the simplest and strongest argument for gun rights. This argument comes to us from the very foundation of our great nation, the Constitution. On December 15, 1791, the new United States of America adopted the Bill of Rights the first ten amendments to the U.S. Constitution, affirming the fundamental rights of its citizens. The First Amendment guarantees freedom of ... ...ton D.C.: U.S. Government Printing Office, 1989 The Avalon Project at Yale Law School: The Federalist Papers. 2003. 27 Mar. 2005 United States v. Cruikshank. 92 U.S. 542. U.S. Supreme Court. 1857 Online. Find Law. 30 Mar. 2005 United States v. Emerson. Criminal Action No. 6:98-CR-103-C United States District Court Texas, San Angelo Division. 1999 Find Law. 30 Mar. 2005 United States v. Emerson. No. 99-10331 U.S. Court of Appeals for the Fifth Circuit. 2001 Online. Find Law. 30 Mar. 2005 United States. Department of Justice. Crime in the United States 2000 Federal Bureau of Investigation Uniform Crime Report. Washington D.C., 2000. United States. Department of Justice. Guns in America: National Survey on Private Ownership and Use of Firearms. Washington D.C.: May 1997. United States. Department of Justice. National Crime and Victims Survey. Washington D.C., 2003. Wright, James D., and Peter H. Rossi. Armed and Dangerous: A Survey of Felons and Their Firearms, Expanded Edition. Hawthorne, NY: Aldine de Gruyter. 1994. Wright, James D., and Peter H. Rossi. The Armed Criminal in America: a Survey of Incarcerated Felons. Washington D.C., National Institute of Justice, 1997

Monday, August 19, 2019

Hamlet: Emotions of Despair, Sadness, Anger, and Inner Peace :: Shakespeare Hamlet Essays

Hamlet: Emotions of Despair, Sadness, Anger, and Inner Peace The character of Prince Hamlet, in Shakespeare's "Hamlet," displays many strong yet justified emotions. For instance, in Hamlet's "To be Or Not To Be" soliloquy, perhaps one of the most well known quotes in the English language, Hamlet actually debates suicide. His despair, sorrow, anger and inner peace are all justifiable emotions for this troubled character. Hamlet's feeling of despair towards his life and to the world develops as the play moves on. In Hamlet's first soliloquy he reveals that his despair has driven him to thoughts of suicide; "How weary (horrible) †¦ His law 'gainst self slaughter." Likewise, when Hamlet talks to his friends, Rosenerantz and Guildenstern in Act 2 scene 2, Hamlet wishes they tell the King and Queen that he has "lost all mirth," in this world so "foul and pestilent." In his "To be or not to be" soliloquy, he expresses his despair through thoughts of suicide, suggesting that suicide is an easy way to end life's conflicts. But luckily he concludes that the fear of an unknown afterlife is what keeps us living. All of Hamlet's thoughts of despair can be understood when one looks at the horrible conflicts Hamlet goes through. Sorrow, perhaps the most evident emotion, is very well developed throughout the play. Initially, the only cause of Hamlet's sorrow is his father's death. However, after reading Act 1, scene 2, we see in Hamlet's asides that another source of his melancholy is his mother's hasty marriage to Claudius, the new king of Denmark. Further, when Queen Gertrude asks her son why his father's death "seems" so important, he replies, "Seems, madam? Nay it is. I know not 'seems'." In addition, Shakespeare reveals another source of sadness; now Hamlet is alone, with the most loved character in his life, Ophelia, rejecting him. This cause is well brought out in Hamlet's soliloquy in which he states; "Now I am alone. O, what a rouge and peasant slave am I!" Finally, when Hamlet discovers that Ophelia has died, new reasons for Hamlet's extreme feelings of sorrow are added. In fact, his sorrow is so great that "Forty thousand brothers/Could not (with all their quantity of love) Make up my sum." Thus, Hamlet's well developed sadness, is reasonable throughout the play. Unfortunately, Hamlet's thoughts of mourning are replaced by those of anger. Most readers of Hamlet agree, to some extent or another, that Hamlet is well justified in expressing anger. Perhaps the first incident of Hamlet's true expression of anger is during his scene with the ghost in Act

Sunday, August 18, 2019

New Physical Properties :: Science Chemistry Physics Papers

New Physical Properties Discussions about physicalism, reduction, special sciences, the layered image of reality, multiple realizability, emergence, downward causation, etc., typically make the ontological presupposition that there is no room for new properties in the physical world. The domain of physical properties would thus have been established once and for all. It is my purpose in this paper to explore the alternative hypothesis that there can be, and that in fact there are, new physical properties. In the first section, I propose a brief analysis of the notions of property, physical property, and new physical property. In the second section, I present four general situations in which it would be plausible to speak of the existence of new physical properties. All of this is used to evaluate the content and scope of the hypothesis of physical novelty. Lastly, I examine certain interesting consequences of such a physical novelty in relation to some of the above mentioned topics. I. Properties, Physical Properties, and New Physical Properties My aim here is to explore the hypothesis that there can be in the world, and that in fact there are, new physical properties. But, before doing it, we need to make clear the sense in which we are going to speak of properties, of physical properties and of the existence of new physical properties. A. Referential Expressions for Properties Strictly speaking, nominalizations and quotations are the usual procedures by means of which we get to construe referential expressions from the predicates of our languages. And it is through certain nominalizations, but not through quotations, that we get to construe from predicates something able to refer to properties. Which nominalizations would lead from predicates to referential expressions for properties? Consider a sentence like the following: 1. The sky has a salmon color. There are three possible kinds of nominalizations that we could construe involving all the elements presents in 1: 2. The sky that has a salmon color. 3. The having a salmon color the sky. 4. The salmon color of the sky. Here, the sky that has a salmon color is an object. And 2 is a referential expression for an object. Just for the same object which is referred by the subject of sentence 1. The having a salmon color the sky is an event. And 3 is a referential expression for an event. Finally, the salmon color of the sky is a property. And 4 is a referential expression for a property.

Saturday, August 17, 2019

Corrections Trends Evaluation Paper Essay

Corrections have existed throughout society for many years and continued to change and evolve in the United States reflecting society’s values and ideals throughout the centuries. In the criminal justice system, corrections exist in more than one form. Not only do corrections refer to jails and prison systems but they also pertain to community-based programs, such as probation, parole, halfway houses, and treatment facilities. Past, present, and future trends in regard to the development and operation of institutional and community-based corrections vary between states but corrections have grown immensely since the early 1800s and have continued to expand over time. Corrections are adamant to continue to expand into the future because crime is not slowing down so there will remain a strong need for corrections throughout society. The subject of this paper pertains to research of past, present, and future trends in the development and operation of corrections. In some ways corrections are similar to the operation trends of two decades ago. In other ways the development of corrections has come far compared to corrections in the beginning. Other subjects of the paper include current and future issues for prisons and prison administrators and an explanation for why these issues overwhelm corrections. A last topic for discussion is the roles of alternate corrections as a developing trend. Conditions in the early era were inhumane because of prisoners starving, and trends of punishment were in the form of physical punishment. Examples of this were punishments, such as prisoners hanged, tortured, beheaded, or mutilated. This punishment was popular in England, but it had an effect on its American predecessors. Although the conservative e trend that emerged in the 1970s continued to dominate justice system policy the debate between punishment and treatment brought new questions about (Muraskin & Roberts, 2009, pp. 263). Over the years and into the future many still wonder the dominate method in reducing the number of criminals in the department of corrections. The American colonies used means of a corporal punishment just as the motherlands (Gaines & Miller, 208, pp. 313). The system brutally executed citizens who had violated any law. However, not all colonial administrators adhered to a brutal punishment, such as the death penalty. â€Å"The Great Law† ensured any victim a restitution of property or goods, given by the felon (pp. 313). This code, based on Quaker ideals and humanity and rehabilitation, by William Penn was introduced. Although â€Å"The Great Law† still allowed the death penalty, most felons who could not pay restitution to their victims were not executed but were sent to prison where they worked. This exceptional code, in William Penn’s case gained attention by other American colonies. After Penn’s death, Pennsylvania, The center of prison reform, opened its very first penitentiary in Philadelphia (Johnston, 2011). This initiated a chain reaction and other states looked to Pennsylvania as an example for reform. They looked to the penitentiary as a hope of rehabilitating the criminal spirit. It helped to treat and discipline prisoners rather than physically harm them. The silence in a penitentiary was meant to force prisoners to think about their crimes, and weigh the benefits against the consequences. Although the silence treatment was successful, many inmates brought into the penitentiaries and had to share rooms as a result of crowded conditions. This happened at the Walnut Street Prison Penitentiary, and it ended with overcrowded conditions and excessive cost. The prison eventually shut down. Although the prison was shut down, many states continued to use the penitentiary system. If overcrowding occurred it just meant building new penitentiaries. The penitentiary system was important because it influenced later concepts. Such as the idea of separate confinement, which kept inmates separated in individual cells (Gaines & Miller. 2008, pp. 314). These prisoners had contact with religious instructors known as clergy or prison officials only. Another concept introduced was the idea of reform and progress. Inmates who behaved well and followed rules climb a ladder and once at the top may qualify for early release from confinement. The history and structure of prisons and prison administrators has changed immensely over the years. Society today faces the increased probability of incarceration for offenders and inmates serve more time for crimes in the present-day compared to the length of incarceration several years ago. This is in part because of the Sentencing Reform Act of 1984, which caused the length of time served by federal convicts for their crimes to rise significantly (Gaines & Miller, 2008, pp. 316). With more offenders going to prison for longer stays many prisons face overcrowding conditions. The prison overcrowding problem contributes to several issues currently facing prisons and prison administrators. Prison overcrowding is a current issue that without some extreme solutions will continue to plaque the entire department of corrections well into the future. Over the past decade the prison population continues to rise sharply. Stricter laws, harsher punishment, high rates of recidivism, and higher levels of drug related crimes contribute to the rapid growth of incarcerated offenders. Prison overcrowding almost always has a negative effect on inmates and prison administration or staff. Overcrowding leads to higher rates of illness, so in turn prison administrators see an increase in health care costs. Limited more are resources and the likelihood of recidivism rates is higher when prisons reach a maximum capacity population. Another current and future issue of concern for prisons and prison administrators stemming from overcrowding is prison violence. Prison researcher Stephen C. Light found that when conditions such as overcrowding worsen. Inmate misconduct often increases (Gaines & Miller, 2008, pp. 340). Prisoners often use violence as a way to show power or to control other inmates. Prison violence is a means of surviving for some inmates who think of violence as a deterrent against victimization or violence to acquire money or sexual favors. The correctional officers also have to resort to violence as a form of discipline or controlling prison gangs and riots. Funding is another major issue facing prisons and prison administration currently and will continue into the future. The operational cost to house inmates must stay with the limits of an assigned budget. Currently a majority of prisons operate under state and federal governments, unlike the past when private prisons were more common. Private prisons were often more cost-efficient because of labor costs, competitive bidding, and less red tape involved with private prisons. Prison administration and staff place themselves at risk daily for a paycheck; therefore wages must be in a prison budget. Operating costs for electric and water is essential and rises as the inmate population increases. Prisoners have rights to three meals a day and prison budgets must provide these rights. Another necessity in the budget for prisons and prison administrators is the need to rehabilitate and reform inmates. Counselors, doctors, and teachers are necessary inside prisons to attempt to reduce the number of repeat offenders in the prison system. Several alternate correction systems play a role as developing trends in society today. With many issues facing correctional institutions today the developing trends and roles of community-based corrections are becoming more common. Community corrections are being framed in terms of alternative sanctions but a slow pace (Muraskin & Roberts, 2009, pp. 263). The emphasis of community corrections is on controlling punishment and retribution potential (263). The main reason for community-based program is that the cost to place an offender on probation is less than the cost to house an offender in prison. The goal of probation is to give an offender the opportunity to stay out of trouble as opposed to prison. In a sense probation is a second chance for offenders to stay in the community and maintain freedom under supervision. Day reporting centers, half way houses, and electronic monitoring are other examples of community-based corrections that prevent an offender from incarceration in a prison. The goals of these corrections are to allow offenders to stay in the community and maintain employment with special conditions. Community-based programs save funding and space in correctional facilities while recognizing that offenders do need some supervision and discipline to remain in the general population of the community. Corrections have existed throughout society for many years in one form or another. Several types of corrections exist today from jails and prisons to community-based corrections such as probation, halfway houses, and electronic monitoring. Corrections and trends are much different today than in the past and years from then as society evolves changes in corrections are sure to occur. Issues facing corrections, including funding shortages, prison overcrowding, and violence in correctional facilities have worsened over the years and will continue into the future. Community-based programs will continue to make some progress in the correction institutions by improving alternative programs for offenders, but society will never be crime free and therefore corrections will always be necessary.