Tuesday, December 24, 2019

The Civil War Of 1865 - 2230 Words

Although the Civil War of 1865 has ended and African Americans were given their freedom due to the Union Victory, conflict was still arising. Reconstruction was a major â€Å"milestone† as some would say in our history. Reconstruction gave light to the trials and tribulations that were apart of the south. Pre civil war south was known for their rigorous amount of slaves and their labor, post civil war south was known for their resistance against freed slaves and their soon to be citizenship. In Johnsons (2012) Reading the American Past Vol 2: from 1865, readers are exposed to a number of excerpts from this era that may or may not shed unseen light on this crucial period in history. Carl Schurz Reports on the Condition of the Defeated South, Black Codes Enacted in the South, Former Slaves Seek to Reunite Their Families and Klan Violence against Blacks are documents that allow readers to see first hand what was endured by many in the reconstruction era of 1863-1877. In Carl Schu rz Reports on the Condition of the Defeated South, the reader is able to sense the resentment the freed slaves have towards the soldiers. Schurz even states within his report that â€Å"The shooting of single soldiers and government couriers was not unfrequently reported while I was in the south.† It seems as though Schurz wants whoever reads his report to know that the south that Johnson sees is completely different than he’s led on. Schurz interviewed twenty people about their views on the new labor system andShow MoreRelatedThe Civil War ( 1861-1865 )1154 Words   |  5 PagesThe Civil War (1861-1865) is no doubt one of the most defining moments in U.S. history. Tensions between the North and the South reached a critical point in 1860 when the Southern states began to secede from the Union and form the Confederate States of America. The four years that ensued from the Battle of Fort Sumter claimed more than 600,000 lives, marking the Civil War the bloodiest battles in American history. Following the Union’s victory, the seceded states had to be readmitted into the UnionRead MoreAfrican Americans After The Civil War Of 18651226 Words   |  5 PagesThe American Civil War was ending and African Americans gained freedom, freedom from slavery and to live life as common folk. However, being set ‘free’ was not enough for African Americans to really experience what freedom was really like. Respect and rights of citizenship are by themselves weak in the ability to survive without also obtaining economic power. This paper will examine the progression of African Americans after the Civil War of 1865. The immigrant history of African –Americans is unlikeRead MoreThe Civil War, Lasting From 1861-1865, Consisted Of Numerous1156 Words   |  5 PagesThe Civil War, lasting from 1861-1865, consisted of numerous bloody battles, military involvements and other historically significant events. There were over ten thousand events, fifty of them being major.. These battles stretched across twenty-three states and caused over half a million casualties. America was divided between the confederates and union. One of these events started in Fort Sumter, South Carolina. The Confederate States of America were a chain of eleven southern states that separatedRead MoreThe American Civil War, Fought Between 1860 And 1865 Was1170 Words   |  5 PagesThe American Civil War, fought between 1860 and 1865 was one of the bloodiest conflicts in the history of warfare. At the end of the war, more than 600,000 soldiers were dead or wounded. The institution of slavery was ended and the United Stat es was changed forever. Several causes have been suggested for the conflict, including the disagreement over the institution of slavery, economic differences between the north and south and a difference in how the Constitution was to be interpreted. SlaveryRead MoreThe Civil War : A Bloody Battle1150 Words   |  5 Pagesâ€Å"With one terrible exception, the Civil War, law and the Constitution have kept America whole and free† (â€Å"Anthony Lewis†). This quote talks about how the Civil War kept America free. The Civil War was a very bloody battle that occurred about the right over slavery. The war began in 1861 and lasted for 4 years. The two armies were the Union and the Confederate. The Union won the war and it finally ended in 1865. The Civil War was one of the deadliest battles that changed the landscape of the US dueRead MoreThe Ultimate Causes Of The American Civil War941 Words   |  4 PagesThe American Civil War was a war fought within the United States of America between the North (Union) and the South (Confederacy) The war was one of the most critical events in American history. â€Å"It is estimated that 623,000 soldiers died during the Civil War†(Garrison) starting from 1861 and ending in 1865. While many still debate the ultimate causes of the Civil War, author James McPherson writes that, The Civil War started because of uncompromising differences between the free and slave statesRead MoreWar On Diplomacy By The American Civil War988 Words   |  4 PagesWar on Diplomacy To the victor goes the spoils, and in war that comes with writing the ballad of history. The American Civil War was no different, and it has gone down as a moral war that pitted brother against brother, spilt the blood of hundreds of thousands Americans, and showed the world that all men truly were created equal. This war showed the world that America was willing to do whatever it took to be one nation, indivisible with liberty, and justice for all. The Confederates did not shareRead MoreReconstruction Is The Effort Made In The United States1566 Words   |  7 Pagesfrom the Union. The Reconstruction Era last between the years of 1865-1877. The Civil War caused destruction and several deaths throughout the South in 1865. This struggle was compensated by radical Republicans who felt that they were in control of Southerners by punishing them for wanting to preserve their southern tradition. How would the North and the South come to an agreement about the freedom of slaves? Before the Civil War and the actions of President Abraham Lincoln the states were dividedRead MoreThe Things They Carried Essay1718 Words   |  7 Pagesexperience. It showed how the war held obligations to its soldiers and expectations for each of the men to follow. The Things They Carried also showed a side of war that was not always seen in other documents and accounts such as Tim O’Brien thoughts and feelings during the war. However, many of the things O’Brien stated throughout his book is very similar to the experiences shared by men in the Civil War, World War I, and World War II. Moreover, despite some similarities, each war is unique and have theirRead MoreEssay about The Reconstruction Era: The Planted Seeds1231 Words   |  5 PagesThe first roar of the Civil War ended with a last gasp for air. Where in such a war more than six hundred twenty thousand men sacrificed their lives for their own belief in the abolishment of slavery (â€Å"Civil War Facts† ). â€Å"We here highly resolve that these dead shall not have died in vain. That this nation, under God, shall have a new birth of freedom† (Baslor). These wise words of Abraham Lincoln cleared the way of a desolate trail of violence and pain, yet he was determined to accomplish his plans

Sunday, December 15, 2019

Disney Case Free Essays

Has Disney diversified too far in recent years? Disney is a brand multiplier enterprise, for example, with the Disney brand do multiplier, multiplied by a variety of means of operation in the back to get the maximum profit. Such business thinking amorphous, Disney began to put most of the profits completely turned to film and television products produced outside. Disney’s happy culture behinds additional full commercial culture, art downright commercialization. We will write a custom essay sample on Disney Case or any similar topic only for you Order Now Disney has introduced a Ministry exquisitely cartoons should vigorously promote the launch of each movie to play at the box office, earned the first round of release prints and videotapes. Then the follow-up product development, the theme park is one, each put a cartoon theme park to add a new character, creating atmosphere in the movies and the park, allowing visitors to visit the theme happily Park, Disney thus earned the second round. The then branded products, Disney in the United States and around the world to establish a number of Disney Store, Disney earned through the sale of branded products, third round. That was not enough, Disney continues the acquisition of TV channels, already has cartoon movie channels, home entertainment channels, and even bought a news channel. Go to Disneyland to buy Disney cartoon, this is one of the habits of Americans. Operators group of companies from Disney, the operations of the company are made up by four main business areas are as follows: 1. Entertainment 2. Media Network 3. Theme park 4. Related customer products. To make all things above happen, Disney might have gone so far to in recent years, because the different culture across different companies might affect adversely the whole culture image of Disney, different strategies from employees might lead internal conflict. And it is hard to gain profit with the increasing cost of managing all different departments. Diversification is a neutral in business industry, it is unnecessary always a good thing for a company, from the performance of Disney recent years, it is hard to say diversification is a good thing. How to cite Disney Case, Essay examples

Saturday, December 7, 2019

Red Brand Canners free essay sample

Mitchell Gordon, Vice-President of Operations, asked the Controller, the Sales Manager, and the Production Manager of Red Brand Canners to meet with him to discuss the amount of tomato products to pack that season. The tomato crop, which had been purchased at planting, was beginning to arrive at the cannery. Packing operations would have to start by the following Monday because, after this time the fruit would begin to deteriorate. In effect this ruled out the possibility of reselling any part of the crop which, if it remained unpacked, would be worthless.Red Brand was a medium-size company which canned and distributed a variety of fruit and vegetable products under private brand names in the western states. William Cooper, Controller, and Charles Myers, Sales Manager, were the first to arrive in Mr. Gordon’s office. Dan Tucker, Production Manager, came in a few minutes later and said that he ha d picked up Produce Inspection’s latest estimate of the quality of the incoming tomatoes. We will write a custom essay sample on Red Brand Canners or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page According to the report, about 25 per cent of the 7,000,000 pound crop was Grade ‘A’ and the remaining portion Grade ‘B’. Mr. Gordon asked Mr. Myers about the demand for tomato products for the coming year.Mr. Myers replied that they could sell all of the whole canned tomatoes Type A and Type B they could produce. The expected demand for tomato juice and tomato paste, however, was limited. The Sales Manager then passed around the latest demand forecast (Exhibit 1) reminding the group that selling prices had been set in light of long-term marketing strategy of the company, and that potential sales had been forecast at these prices. After looking at Mr. Myer’s estimates of demand, Mr. Cooper said that it looked as though the company â€Å"should do quite well (on the tomato crop) this year†.Mr. Tucker noted that the minimum average input quality for canned whole tomatoes Type A was ten, for juice was seven and for paste was six points per pound1. * Whole canned tomatoes Type B could be made entirely from ‘B’ grade tomatoes. Mr. Gordon stated that this was not a real limitation. Recently solicited to purchase 100,000 pounds of Grade ‘A’ tomatoes at 9. 50 cents per pound he had turned down the offer. He felt, however, that the tomatoes were still available. Mr. Myers, who had been doing some calculations, said that although he agreed that the Company â€Å"should do quite well this year†, it would not be by canning whole tomatoes.

Saturday, November 30, 2019

Post WWII Generations in America free essay sample

A paper which studies the characteristics of the three generations which have grown up in America since WWII. This paper show that since the end of World War II, the American people have seen an extraordinary change in the economic, social and moral priorities of the nation and its people. Three generations have grown up since the war, each positively and negatively influenced by their parents and social change. The paper studies the most affluent of the three the WWII generation; the Baby Boomers who are shaped by the political upheaval in America during their formative years and finally, the Gen-Xers a generation which saw many cultural firsts. Issues covered are: Raising Kids Differently Than The Generation Before, Influences of Baby Boomers, The Children of Baby Boomers, The Values Passed On By WWII Parents, Work Ethics, Social Changes, The Outcome of Baby Boomer Child-Rearing Methods. As time progressed, the baby boomers, who were encouraged by their parents to volunteer and contribute to the community, tossed aside this mentality in favor of making deals over power lunches. We will write a custom essay sample on Post WWII Generations in America or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page As divorce rates climbed and the number of unmarried mothers increased, it became apparent that rampant uninhibited sex was in. The Baby Boomers parents would find this notion unconceivable. Basically, Baby Boomers came to treat everything, including people, as if they were disposable and easily replaced. Boomers are known to downsize corporations at the expense of workers, invest in grossly over-valued technology stocks that represent completely intangible products, divorce families, and simply ignore the immature behaviors of politicians.

Tuesday, November 26, 2019

Free Essays on Lucille Clifton

Lucille Clifton In the poems â€Å"The Lost Baby Poem†, â€Å"She Understands Me†, and â€Å"Homage to My Hips†, Lucille Clifton is letting the reader know how she feels about life issues. In the three poems, Clifton does a great job of simplifying reproduction, abortion, and beauty. She makes very strong points about the way she feels. Clifton’s poems seem guided by her own experience and consciousness. In â€Å"She Understands Me†, the author is telling us about the time she had a baby; how she lived through her child again. In â€Å"The Lost Baby Poem†, Clifton is telling us about abortion, and how it must have been for the baby, and the way she felt about abortion. In â€Å"Homage to My Hips†, the author is telling us how she looks, and that she can get any man she wants. Her style throughout these poems is simple, very descriptive, and constant. Clifton’s poems are simple in language, complex in ideas, and reflective of everyday issues. In â€Å"The Lost Baby Poem,† Clifton explains why the mother did not have her child. It would have been born in winter, in a time where she had financial problems. Perhaps she would have given up her baby for adoption. Lucille Clifton uses the image of water and drowning to speak of the abortion through, â€Å"waters rushing.† She also uses the image of poverty through, â€Å"disconnected gas, and no car.† In the last lines of the poem, â€Å"Let the rivers pour over my head,† â€Å"Let black men call me stranger,† I believe the image is that the woman promises her unborn child that she will be the best mother to the children she already has, and that if she breaks her promise she should get punished by those things. The woman described in this poem sounds like she was strong. Clifton uses shot sentences, with no capitalization, and punctuation. In â€Å"Homage to My Hips,† Clifton captures the reality and symbolism of the body. She uses her body to express herself, as she accepts it as it is, ... Free Essays on Lucille Clifton Free Essays on Lucille Clifton Lucille Clifton In the poems â€Å"The Lost Baby Poem†, â€Å"She Understands Me†, and â€Å"Homage to My Hips†, Lucille Clifton is letting the reader know how she feels about life issues. In the three poems, Clifton does a great job of simplifying reproduction, abortion, and beauty. She makes very strong points about the way she feels. Clifton’s poems seem guided by her own experience and consciousness. In â€Å"She Understands Me†, the author is telling us about the time she had a baby; how she lived through her child again. In â€Å"The Lost Baby Poem†, Clifton is telling us about abortion, and how it must have been for the baby, and the way she felt about abortion. In â€Å"Homage to My Hips†, the author is telling us how she looks, and that she can get any man she wants. Her style throughout these poems is simple, very descriptive, and constant. Clifton’s poems are simple in language, complex in ideas, and reflective of everyday issues. In â€Å"The Lost Baby Poem,† Clifton explains why the mother did not have her child. It would have been born in winter, in a time where she had financial problems. Perhaps she would have given up her baby for adoption. Lucille Clifton uses the image of water and drowning to speak of the abortion through, â€Å"waters rushing.† She also uses the image of poverty through, â€Å"disconnected gas, and no car.† In the last lines of the poem, â€Å"Let the rivers pour over my head,† â€Å"Let black men call me stranger,† I believe the image is that the woman promises her unborn child that she will be the best mother to the children she already has, and that if she breaks her promise she should get punished by those things. The woman described in this poem sounds like she was strong. Clifton uses shot sentences, with no capitalization, and punctuation. In â€Å"Homage to My Hips,† Clifton captures the reality and symbolism of the body. She uses her body to express herself, as she accepts it as it is, ...

Friday, November 22, 2019

Bomb and Information

His statement is how the government is manipulating the media about the bombing incident. He wanted to prove me that the government has something to do with the attack and also is manipulating the media with fake or inaccurate information so we can believe whatever the media says. When I first heard about the attack on the media I was so sure that the government did a good Job but Many showed me a video as evidence to reinforce his statement. Now I am standing in the middle of a circle of accurate and inaccurate information, but unfortunately I ant decide who to trust.The media is not always right with the information that they are publishing therefore you cant always trust the most reliable sources when there is a news. To trust the media right after the event it is not a bad idea, but we need to know how to evaluate the information provided. The media controls our minds because they have the information that we are seeking, but we can rate the sources as accurate and non-accurate or incorrect. If you like to watch the news online, you should look at more trusted websites and match the information.Furthermore look for evidence that proves that the information is accurate. View the authors bibliography and make sure the author knows about the topic and somehow has something to do with the topic. During the Marathon in Boston on April 15, 2013 there were a lot of rumors about the explosion. The media was so desperate to find a suspect that they made an unknown number of speculations about people who were looking suspicious to them. At the beginning of the week when there were not pictures of the suspects the media was wondering if the attack was made by an alQaeda group or if the person who did it was related to them. There was an Indian American student who was accused as suspect number two by a website called http://www. Reedit. Com/. The information was declared incorrect after a few days. The general manager of website Reedit Erik Martin apologized in public to the student for the misunderstanding (Alexander). Many reporters were looking for evidence where they can find or identify a suspect. After the attack many pictures were sent to the TV, newspaper, and radio Stations, but there was one picture published onTwitter by a marathon spectator Dan Lampooner that caused an immense rumor. Lampooner posted a picture of an individual on top of the roof off building. The picture rapidly got 2,361 rewets and 620 favorites which is a lot for a picture posted the same day of the attack. A lot of people were alarm because the rumor and the false information of the supposed suspect on top of the roof were spread around by the users of the social networks. The FBI declined to mention on the photo or any other rumor (Brenner).There was a speculation about another bomb the same day f the marathon minutes after the Bombing. This speculation was about a bomb that went off at the JEFF Library in Boston. A Police Commissioner Edward Davis said during a press conference that besides those two bombs that went off during the marathon, there is a third case occurred at the Library and the authorities consider this as related to the attack. During the investigation the rumor was still being reported and the false information was being watched at everyones house even in my house.In the evening of the next day the authorities said, The JEFF incident may not have been n explosion; rather, it appears to be fire-related (Brenner). The reality of the fire on the library was a mechanical fire that broke out about the same time the two bombs went off (Brenner). In the course of the bombing there were a lot of victims involved in the incident, 144 people were reported injured. Unfortunately there were 3 people dead. Martin Richard was one of those who unluckily died while watching the marathon. A lot of different versions of the story were circulating by the news.The rumor was about an years old girl from Sandy Hook that was running the marathon and died while she was running. The media was wrong once again with this information and many people were there wrong information delivered to their housed by the media. Richards mother and his sister were gravely hurt in the attack. This information was declared by Richards father who said My dear son Martin has died from injuries sustained in the attack on Boston. My wife and daughter are both recovering from serious injuries. (Brenner).For the period of the week the FBI were collecting as such information as they could so they could investigate it. Two videos were published about two suspects walking near the place were the second bomb went off. The FBI called them black hat suspect and white hat suspect. On the video, it is well shown how they were carrying backpacks with them. The FBI published the two pictures of the suspects and the broadcast did an accurate Job this time because they posted and shared the pictures with the State of Massachusetts and the entire United States of America.The authorities found the suspects location when they ailed a MIT officer who was on duty. On Thursday, April 18, the FBI official decided to share the pictures of the two suspects involved in the attacks because they knew the media was going to publish it right away. The purpose of it was to get the audience aware and call the FBI or any police department if they see anything suspicious. The FBI received information about two suspects who robbed a seven eleven and shoot a couple times against an officer who was on his car.The police department started the chase against the two brothers Dashboard and Temperament Tsarinas. The police had a man on the ground in Watertown which was suspect number 1 Temperament Tsarinas. The second suspect was still on the run. The FBI, SWAT team, State Police and Boston police had a manhunt looking for Dashboard Tsarinas. The officials were looking for the suspect in Watertown. Dashboard was captured at night inside a boat that was in someones driveway covered by blood (The Telegraph). When you are looking for sources online or watching any news it is always a good Idea to think as a critical thinker.

Wednesday, November 20, 2019

The Influence of Buddhism on Japan Essay Example | Topics and Well Written Essays - 1000 words

The Influence of Buddhism on Japan - Essay Example Buddhist philosophy has changed over the centuries, but the impact on Japanese culture and politics remains a constant. Since being introduced to Japan, Buddhism has influenced Japanese society, almost as much as Japan has influenced Buddhism. Supposedly Buddha achieved enlightenment by sitting in this position under a tree. This posture promotes concentration which is part of the Eightfold path taught by Buddha. Buddha's fundamental teachings, the Eightfold Path, the Four Noble Truths, the idea of dependent origination, the five precepts, the five aggregates, and the three marks of existence, make up important elements of the perspective that Zen takes for its practice. All of the Buddhist sects allow Shinto to be mixed with Buddhism, even though the religions have conflicting views. This fosters superstitious ritual and beliefs that allow for Buddhist philosophies to grow. The mixture of religions allow for growth that makes the influence uniquely suited to the Japanese culture. It also allows for diverse worshipers. If one sect does not suit a citizen, Buddhism does not have to be abandoned. Another sect could be the answer to a dissatisfied worshiper. Buddhism is not rigid, like most Western religions. Maybe that is why the Japanese embraced Buddhism so wholeheartedly.

Tuesday, November 19, 2019

The Founding fathers of America Essay Example | Topics and Well Written Essays - 500 words

The Founding fathers of America - Essay Example The result of the revolution was the declaration of independence in 1776, they also took significant roles in the revolutionary war and established the US constitution which is arguably the best in the whole world as it comprised of top geniuses in the world. The words ‘founding fathers’ as used in reference to America is subdivided into two factions; "Signers of the Declaration of Independence"-these are the individuals as who signed the US independence declaration in the year 1776 (Burke 178). The other is the framers of the American constitution-these were the delegates fondly known as the federal convention who were involved in the drafting and final documentation of the American constitution. The final subset encompasses the group that took part in the signing of the confederation article (Jaffe 227). The reference to what founding fathers entails have also had other interpretations by historians to mean a collection of all those who took part in the struggle for the attainment of the independence in 1776. According to Richard B. Morris in 1973, he considered seven individuals as the founding fathers of America, Benjamin Franklin, George Washington, Alexander Hamilton, John Adams, John Jay, James Madison, and Thomas Jef ferson (Jaffe 234). The founding father of the America had the desire to create a nation that is God fearing and strongly anchored on Christianity, this is vividly demonstrated by the first president to the United States of America, George Washington during his inauguration when he said in 1789 that nations are obliged to acknowledge the almighty providence and strive to obey the will of the God (Meacham 277). In this sense the founding fathers of America endeavored to establish a strong Christian ground with which they expected prosperity to stem (Lambert 256). The founding fathers also single out democracy and liberty to be the driving force with which the people of America discharge

Saturday, November 16, 2019

Underage Drinking Essay Example for Free

Underage Drinking Essay Episode 4 Underage Drinking; A National Concern of It’s Always Sunny In Philadelphia addresses underage drinking through politically incorrect satire while still focusing on the seriousness of the subject matter. It is widely known and accepted that alcohol abuse by teenagers is not only a crime; it is also a sorrowful situation when it involves ruining lives and it can even result in death. The cast of It’s Always Sunny In Philadelphia presents a new and obviously demented view point to the subject. The friends portrayed in the show understand teenage drinking is unacceptable and in the opening scenes of this particular episode the cast shares some personal youthful experiences while sitting together in the bar that that is owned collectively by the group. Charlie points out a particularly dangerous moment when he says several times â€Å"Remember when we totaled Ben’s car after we plowed into that tree!† (â€Å"Underage Drinking, A National Concern†). Alcohol use among teens increases dramatically during the high-school years and leads to serious consequences for many teens. As studies by statistics from the National Institute of Health show, each year in the United States, alcohol-related automobile accidents are a major cause of teen deaths. Alcohol is also often a cause in other teenage deaths, including drowning, suicides and homicides. â€Å"Teens who drink are more likely to become sexually active, have sex more frequently and engage in risky, unprotected sex than are teens who dont drink.† (National Institute of Health). For each person who will agree with a specific angle to this subject there will be two who will stand up and disagree. A classic example from this episode is the early comment from Dee, â€Å"[there is] a social responsibility to keep teenagers from drinking.† (â€Å"Underage Drinking, A National Concern†). Obviously this is right thinking however this is the twisted turning point with regards to this episode. It is suggested and then agreed upon to give the local youth a â€Å"safe† place where they can consume alcohol without the worries typically associated with attempting to purchase liquor without valid identification. The topic should be black and  white. There isn’t supposed to be a gray area involving illegal activities and the bottom line is simple; if you’re under 21 you cannot drink alcohol. What happens on the show is especially ironic because the owners of the bar justify making money off of ignorant teenagers while telling each other they’re providing a controlled environment for something that teenagers are going to do anyway. They point out that in many countries the world over it is not uncommon for someone as young as 12 or 13 to be found drinking with some degree of regularity and rationalize that they’re actually providing a community service. Everyone would like to know why teens use drugs and alcohol; some use narcotics to fit in and then become addicted. Others think a more complicated reason exists why people use drugs, especially teenagers. During the teen years, kids are more likely to engage in risky behaviors. The increasing need for teenaged independence may make kids want to defy their parents wishes or instructions as a way of asserting their independence. Peer pressure can also have an effect on an adolescents decision to begin drinking. While much has been written about peer pressure, and its effect should not be ignored, study after study proves that parental involvement carries much more weight. Teenage bodies and minds are still developing, and drinking at that age has a much more negative effect than on an adult The abuse of alcohol by teenagers is a sneaky thing, and many times adults who dont want to believe their children would do that, find out too late that they already have. â€Å"Parents, teachers and social workers need to remain alert to the signs of alcohol abuse in teenagers.† (National Institute of Health). There is a misconception, especially among non-alcoholics, that a teenager is too young to become an alcoholic. This is a subject that is completely overlooked in the episode in spite of the tongue in cheek satire. Some recovering alcoholics can look back through specific teenage years and see that they were drinking as an alcoholic when they were much younger. It is true that most teenagers wont come to grips with their drinking problems until much later in life. Alcoholism does not discriminate against its victims, and it crosses into all age groups. What the show does not focus on ultimately, is that bad choices have bad consequences. If a teenager thinks they have a drinking problem, they should be assisted in finding help and not given rationalizations that offer a quick escape. There are many young people Alcoholics Anonymous groups available today all across the country. They are living their teenage years as it was intended to be, free of alcohol and happy. Underage drinking is a serious and criminal offence and there should be zero tolerance in spite of the success of comedic displays in the media. Works Cited National Institute of Health. Alcoholism When Drinking Becomes a Disease. â€Å"Underage Drinking; A National Concern.† It’s Always Sunny In Philadelphia. By Glenn Howerton. Rob McElhenney. Charlie Day. FX Productions. 18 Aug. 2005.

Thursday, November 14, 2019

Subliminal Advertising :: essays research papers

Throughout mass media there are illegal messages that still appear, such images are also known as Subliminal Advertising. Though illegal, such incidences can never be tried nor taken to a court of law. It is highly impossible and unlikely to notice these messages. However, they are triggered by the subconscience and send neural messages to your brain that you are unaware of, thus making it hard to notice when you are seeing these things. They are illegal because it was believed in earlier incidences that cigarette ads were sending similar messages telling the youths of America to smoke. I have witnessed similar messages called â€Å"Threshold Messages†, these are images that are digitally re-mastered so that you don’t notice what you are seeing but the neural pathways in the human brain hone in on and receive these messages. If you look very carefully at most Liqueur ads you will notice that the nude upper body of a woman is thrown into the ice in a wine ad, or there is the word â€Å"sex† etched into the eyes of a female in a herbal essence ad. However even such images are even unseen to the naked human eye. Unless your light threshold is low, you will not be able to encounter these images, but if you do have a low threshold for light, all you simply need are a little time, patience, and energy. As I was browsing through a Skateboarding Magazine, I had noticed an ad that was a â€Å"Absolute Vodka† ad, I looked all over the add for about an hour, finally I had seen a picture of a skull and crossbones in the ice that was in the glass. Though these images did not appeal to me, think about how they might appear to you average alcoholic or lush. One technique used by most corporations is a technique usually described as using â€Å"buzz words†, this is found more in print than is used on television or radio. If we are scrolling through a newspaper and we see an exciting flashy word, our eyes tend to draw towards it. Companies are entirely aware of this, so they flash words on us like, â€Å"Free,† †New.† †Hurry†. Something about these words makes us want to see what all the fuss is about, and to read the company’s ad. Now when you do read the ad, there will be â€Å"buzz words† embedded into he ad that do not even look flashy.

Monday, November 11, 2019

Quality Customer Service and IT

In times past quality service was not important to managers and staff that worked for the County of San Bernardino. However due to the proliferation of corruption and mismanagement taxpayers are demanding more for their dollar. It is a known fact that when local government is run efficiently more people can be put to work. The money saved from this can in turn be used to benefit the local cities. Civic improvements can be made instead of paying for people to sit at home. To create this quality service information technology needed to be implemented. This where the BAS or (Business Applications and Support) division enters the picture. The mission of BAS is to provide quality computer software support through a customer service oriented methodology. A while back, before ITSD, there were ASU (Automated Systems Unit) analysts who lead and coordinated automation projects. They would gather up the requests from the different SSG divisions/departments, do a preliminary analysis, write a work order stating the request and/or problem that was to be solved through automation. The work order would then find its way to ISD (Information Services Department) where it would be assigned to a programmer analyst who would do an in-depth analysis with the help of the ASU analyst and define the requirements for the automation project. The programming would begin and soon, a new program was created and deployed. The requests and problems soon began to multiply and expand until it was like a virtual snowstorm of requests, too many for one small unit to keep under control. Help arrived around 1990 in the form of the Automation Project Administrator – the first of the Automation Coordination Specialists gathered together to relieve some of the burden falling on ASU. The Automation Project Administrator soon gathered in a handful of Automation Coordination Specialists who took on much of the job of the initial analysis of automation requests and problem definition. They met with the users, defined the problem, wrote the initial work order, which then went to ASU to forward to ISD, and often worked with the ISD programmers. The two units, ASU and ACU, found themselves still unable to keep up with the many automation requests, particularly since ASU had years before branched out into computer hardware requisition and maintenance. Then came Information Technology and Support Division (ITSD). ASU and ACU merged into one entity, a small (but growing) and mighty automation division. ASU became Systems Operations and Support (SOS) and ACU became BAS – Business Applications and Support. The BAS Analysts do in-depth analyses of computer software requests, working with the users and their management, write detailed functionality and design specs and work with the programmers to make sure that the final product is what the user requested and will meet the needs of the department. Support nearly all software applications within SSG, including the TAD Mainframe Benefit Issuance System; GAPPS, CWS/CMS and a myriad of PC based applications as well as intranet/internet. A change in technology has occurred in the past, and will continue at increasing rate. What will we use in five short years, in ten years†¦. the future of office automation will be achieved by all of us working together. This is important in this day and age when quality customer service is the buzzword for all branches of civil service. The attached chart shows what the long-term plan is for the County of San Bernardino. These improvements will enable the line worker to put more people to work and less people on the public dole.

Saturday, November 9, 2019

Survey of Research Literature – Identity Theft

Research Analysis Survey of Research Literature in Information Technology Management Infrastructure Abstract: Identity theft is one of the fastest growing crimes in the United States. There are many definitions of identity theft, however this type of crime typically involves illegally utilizing somebody else’s personal information for both personal and or financial gain. Thieves acquire personal information through different methods ranging from stealing physical documents all the way to hacking into corporate databases.The field of Information Technology is one of the fastest growing fields in the world. Daily innovations and discoveries are flooding our lives. The continual strive for speed and efficiency make the world move faster into the new era of digital information.In addition to advances in computing, many other fields are forced to innovate and comply with the demands of the new 21st century consumer. However with all the convenience and access to this digital inform ation the world faces those who use the technology to destroy information and control others for their own benefit. The two most evident industries that face such challenges are the health industry and the financial industry. Both consists of billions of dollars in revenue each year and pose a lucrative target for the digital underground.The finance industry is a more interesting topic when it comes to identity theft since it involves the financial system for businesses, financial institutions and consumers. By looking at this industry directly we can see how these affects influence each other and what can be done to protect the consumer and the business sector. This paper will be separated into consumer and business parts and then further divided into sub parts where the focus would be on specific sections on what is closely related to or can result in identity theft.Once such threats and security issues are identified and thoroughly described, the paper will also cover some of the existing solutions that are currently being implemented by, businesses, financial institutions and even consumers themselves. Looking at all sides of the problem, identity theft touches upon a variety of issues such as tools that are used to identify ones credentials, information that is stored on computers of thousands or retailers, financial institutions as well as taking into account the technology that makes authentication and financial transactions possible.The spectrum of this is so large that only a small part of it can be analyzed and covered in this paper. What is Identity Theft? According to numerous sources, identity theft is a way to take someone else’s identity and utilize it for either financial or gains of being accountable for certain actions or consequences. The term identity theft has actually came from the word impersonation or cloning which describes a process of making an exact copy of something or in this case assuming an identity of another person.In t his paper there is only one side to the identity theft and it is the financial loss or gain that occurs during the process. Looking at the identity theft from several prospective and analyzing how it affects the consumer, business, or financial institution is what this analysis is attempting to identify. â€Å"Each year, millions of consumers are victimized by identity theft—the practice of using the identity of another to obtain credit. After the identity thief defaults, lenders and credit bureaus attribute the default to the impersonated consumer. Sovern 2004)† According to Sovern 2004, the default that occurs between the lender and the pretend consumer, in the end falls upon the innocent consumer whose information has been stolen in one way or another and misused for financial gain. Typically there are numerous parts to what results in identity theft. First of all identity thieves typically obtain personal information that is used to identify an individual, as well as credentials that can be used to authenticate themselves.Then, they would utilize the credentials to impersonate other individuals and proceed to gain access to financial documents and finally actual monetary assets. â€Å"Identity theft—the appropriation of someone else’s identity to commit fraud or theft (Milne 2003)—is a serious consumer problem (Sovern 2004)†. Identity theft is a commission of fraud that not only poses a serious threat to consumers but is a very serious crime that has unlimited consequences for everyone involved in the process.Although it is a serious crime and a wide spread problem there are many different ways that thieves can approach this type of method. The initial process of acquiring personal information that is needed to impersonate another individual can consist anywhere from finding the information in public records at the library, all the way to stealing financial documents like credit cards, checks, and digital informati on by hacking computer networks. The spectrum of this problem is endless and continues to grow on the daily basis, while financial information becomes ore widespread with the innovation of technology. Before looking at the specific areas of theft and their origins, identifying the meaning behind identity as being part of identity theft would be beneficial to the true understanding behind impersonating someone else. â€Å"Identity is a means of denoting an entity in a particular namespace and is the basis of security and privacy -regardless if the context is digital identification or non-digital identification ( Katzan 2010 )†.Unlike theft, identity is much harder to describe especially when looking at how it can be stolen and utilized for personal and financial gain. Katzan 2010 illustrates how an identity can also be referred to as a subject, which have several identities and belong to more than just one namespace. Identity is part of the management system which can establis h a process to another system and therefore result in a trust that is facilitated by a third party and acknowledges the basis for the digital identity in the computer-based information systems.Another side is the information that’s provided by a third party that claims the identity of a person but can be biased based on how that information came about, and therefore might require additional information to provide clear evidence and confirmation. † Identity is primarily used to establish a relationship between an attribute or set of attributes and a person, object, event, concept, or theory. The relationship can be direct, based on physical evidence, and in other cases, the relationship is indirect and based on a reference to other entities ( Katzan 2010)†.Thieves acquire such attributes of the identity through resource such as customer service representatives, Trojan horse computer programs, dumpster diving, corporate databases, and physically stealing computers. To prevent such occurrences the author suggests implementing reponsibilized and individualized forms of risk management where individuals are encouraged to incorporate informational security practices into their daily lives and care for their virtual self in the digital world. Phishing Attacks Moving forward beyond what both identity and theft really mean, identifying he most popular ways of gaining access to individual identity data is the first step to preventing consumers from being the victims of such thefts. The first most common approach to gathering the necessary information to impersonate an individual is a Phishing Attack. A Phishing Attack is a way to deceive a consumer into revealing personal information to the attacker through digital communication. â€Å"Phishing has been a major problem for information systems managers and users for several years now. In 2008, it was estimated that phishing resulted in close to $50 billion in damages to U. S. onsumers and businesses ( Wright, Marett, 2010). This obfuscation method of both email and Web sites is how thieves are able to convince users into fulfilling requests for personal information. Once that information is obtained it can be used to stage theft of either company or personal intellectual property. â€Å"In the most common phishing scam, the â€Å"phisher† sends an e-mail disguised to look like it is from a financial institution or e-commerce site. To appear credible and to attract the recipient's attention, the e-mail uses the company's logos and trademarks and employs â€Å"scare tactics† such as threats of account closure (Lynch 2005)†This method of obtaining identity information carries a relatively low risk in both legality and cost. The phisher who is carrying out the crime usually resides in an international location to avoid authorities which makes the apprehension and prosecuting of the fraud that is committed to be far more difficult. One of the studies that utilized analytical approach to find the reasoning behind the success of such a technique concluded that there are four phases in studying behavioral factors, which influence the replies coming from the consumer in regard to answering emails that request them to provide sensitive information.The study covered 299 subjects and analyzed the percentage of those who responded to different methods within the study of phishing. The final factor to the study is the awareness level that the communicator posses in regard to the security threats that are currently present in the digital world. Security awareness training is important in teaching Web users how to appropriately utilize both network and system resources. Complete review of security policies and their congruency with current threats is crucial in identifying noncompliance of both users and systems.Once systems are updated and users are aware of the different tactics that can be used against them and the different ways they can protect th emselves from becoming victims the world can move closer to eliminating phishing as an urgent threat. Driver’s License Moving past the phishing technique on the consumer side, taking an in-depth look at how identification has become an essential part of identity theft and what are the different tools that we use as consumers to present that trust between our identity and the business entity from which we want to acquire services.The first and probably the most widespread tool of identification in United States of America is a driver’s license. A driver’s license is an identification document that corresponds to a Department of Motor Vehicles database record, therefore is considered to be a legitimate identification document. It is very valuable and the most circulated picture credential that gives one the ability to operate a vehicle as well. One of the reasons behind counterfeiting driver’s licenses is due to the broad spectrum of different types of lice nses that exist in the USA.These counterfeits vary from simple laminates that are created on matrix printers, all the way to sophisticated and authentic, 45 degree hologram based laminates utilizing the same materials and even printing equipment that is used by the DMV. â€Å" The typical criminal would use fungible credentials as an instrument to defraud because it offers reduced risk, minimal effort, and increased effectiveness. Financial frauds, money laundering, and identity theft are three common exploits that typically rely on fungible credentials.Fungible credentials are useful precisely because they simultaneously obscure the criminal’s real identity and facilitate any authentication that may be required. (Berghel 2006) This type of credentials is a way to shield the thief’s real identity while still utilizing the facial identification with different credentials. Typically financial transactions are the most common way to utilize fungible credentials to gain a ccess to the victim’s assets. Since the process involves getting several versions of identification based on the verification process, in the end the original counterfeit documents are disposable.This means that the final identifiers that are obtained, such as the drivers license are legitimate due to its issuance from the government agency. This type of a scheme makes the detection of the final credentials impossible to detect since it was acquired from a legitimate source. The only way to really prevent this from happening is by having all government agencies and law enforcement to authenticate all documents no matter where they came from. However currently due to the extreme overhead for such process, this is currently not possible to achieve. A threat analysis of RFID PassportsThe second and most widespread tool in the world is the passport. A passport is a document that is issued by a national government for the sole purpose of traveling between countries and having the ability to identify the nationality of the traveler as well as the identity of the holder. Since 2007 all passports that have been issued in USA, contain an imbedded RFID chip, which is valid for a time period of ten years. The reason behind such change in passport policy is to provide a safer way to store critical identification data on the chip as well as encrypt such data and keep it safe.However in the last few years there have been approaches that defy the design and the security of the chip and permit the identification information to be stolen. â€Å"this individual used a small antenna connected to a computer in his backpack to eavesdrop on the radio communication between the security agent’s reader, which has the capacity to decrypt the highly sensitive and secured data on the passport, and the RFID-enabled passport itself(RAMOS, A. , SCOTT, W. , SCOTT, W. , LLOYD, D. , O'LEARY, K. , ; WALDO, J. 2009)†The process that is described above creates a way to find a nd obtain the information that is contained on the RFID chip, however in order to do so the proximity of the listening device and the timing of the transition are critical to its success. In addition to acquiring the data, the ability to decrypt the information before it can be utilized is a process in itself. â€Å"Six pieces of information can be stolen from the RFID chip on a U. S. passport: your name, nationality, gender, date of birth, place of birth, and a digitized photograph. Numerous problems of identity theft could arise from someone taking that information, but this article focuses on the financial risk. (RAMOS, A. , SCOTT, W. , SCOTT, W. , LLOYD, D. , O'LEARY, K. , & WALDO, J. 2009)† The information that is acquired during the intercept process is sufficient enough to create a duplicate passport and utilize it for financial gain. However due to the difficulty of this attack, cost of the equipment involved and the limited financial return as opposed to the high cos t of blank passports, this type of scenario is not very likely.As a solution to this possible downside of RFID chips, integrating basic access-control and encryption using the secret key that is integrated right into the passport help mitigate the risk of data interception. Another approach would be to control the RF signals that occur between the reader and the passport during the verification process. This would help minimize the chances for eavesdropping on the RF signals and interception of all identity information. Identity CardsIn order to go beyond the complications of the passport and the specialization of the driver’s license there is another way to identify a person and verify their credentials. This tool is called an Identity Card and is utilized on the government basis in several different countries. The idea behind the identity card is very similar to what a driver’s license does, however it only focuses on proving that the person who presents the card mat ches the credentials that the identity cards holds, without granting driving privileges as does the driver’s license.This new concept of identity card consists of two components, one is the database identity and the other is token identity. Database identity is the gathering of all information about a certain individual and recorded into databases, which is then accessible by the government. Token identity on the other hand only comprises of very specific information about the individual. This information consists of name, gender, date and place of birth, date of death, signature, photograph and biometrics.In addition biometrics consists of a face scan, two iris scans and ten fingerprints. In the context of identity theft, token identity is considered to be more than just information about an individual. â€Å"Unlike the individual pieces of information that comprise it, token identity has the essential characteristics of intangible property. Its misuse by another person not only infringes the individual’s personal right to identity, it infringes the individual’s proprietary rights in his/her registered identity, particularly in token identity. Sullivan 2009)† Utilization of token identity for transactional purposes constitutes an individuals’ identity which is all the information that the token holds. This is the information that is most useful for an identity thief since it is all that is required to enable a transaction. Not all of the information in the token is used for every transaction and therefore depends on the nature of the transaction, therefore the required information is automatically chosen from the token to match the transactional requirements. The phrase ‘identity theft’ is a misnomer, as identity theft does not actually deprive a person of their identity. The offence of theft or larceny traditionally involves an appropriation of the personal property of another with the intention to deprive him or her of that property permanently. Wrongfully accessing and using a person’s personal information or forging proof of identity documents, without taking any physical document or thing, would not deprive the person of the ability to use that information. (Sullivan 2009)Although wrongfully accessing or forging of the documents does not deprive the person of access to such information, it does however fundamentally damage the integrity of the individual token identity by denying exclusive use of the identity. Personally Identifiable Information Utilizing tools that identify oneself are needed to acquire, obtain and steal financial information, however in addition to that and the rapid innovation of the digital world, all the information that identifies us is freely available on the internet.In the last several years the internet progressed so rapidly that it is being used for social interaction, product purchases and financial transactions. In addition to that many companies a re continuously collect personal information utilizing social networks, service providers, and retail sites. These companies claim that under the customer license agreements information provided will be safe guarded and released in a non identifiable form. This means that the information will be de-identified by changing the fixed set of attributes that it currently resides in.Once it is de-identified it will become safe enough to release to the public and will prevent others from using it for marketing or advertising purposes. â€Å"The emergence of powerful re-identification algorithms demonstrates not just a flaw in a specific anonymization technique(s), but the fundamental inadequacy of the entire privacy protection paradigm based on â€Å"de-identifying† the data. De-identification provides only a weak form of privacy. (Narayanan, A. , & Shmatikov, V. 2010)†This type of technique is only part of the solution when it comes to privacy protection. The ability to deve lop effective technologies to protect private information is being developed on continuous basis and there is still no definite answer as to what the best approach really is. Utilizing the de-identifying approach is a step in the right direction but it only patches the problem instead of solving it. Currently there are limitation to the way privacy is preserved and protected, therefore a better method of protection needs to be build and implemented.Security through Technology Now that we covered the outstanding issues with the identity tools and even ways of how to protect the personal identifiable information, next step is to identify technology flaws that jeopardize the security of the process. The technology plays a crucial role in how secure the data is both inside and outside the primary location. When it comes to computer systems and security, the weakest components are the end users, especially when they are accessing corporate information from their home location.With progre ssion of wireless based network technology, the adaptation rate has been enormous and is justified by the convenience that wireless technology provides for both basic and business consumer. Numerous applications have been developed to utilize the convenience of working from home for employee and to have them access databases of their organization using just the Internet browser. This scenario also works for those who are continuously traveling and therefore use wireless services at the hotels or other lodge places.Many of such systems only rely on passwords to authenticate users and pose a real threat when it comes to accessing corporate information. In such a case a hacker can intercept such credential information and utilize it to access the corporate databases and therefore conduct an intrusion which will go undetected since it relies on real user account information. â€Å"Hackers do not require specific hacking tools, as operating systems can find nearby routers and connect to them almost automatically.Hackers can then perform illegal operations such as hacking other computers, spreading viruses, organizing terrorist activities, and so on. (Loo 2008)† As the technology progresses and innovation takes place it would still be close to impossible to solve all security problems no matter what technology is in place. Security depends on several different factors including coordination between employers, end user and manufactures of the technology that is being used.It is up to the employees to be aware of security risks and protect the technology they are using no matter where they are. Investing time into learning about countermeasures is a worthy investment which can eventually prevent unrecoverable events such as an intrusion. Employers and providers of technology should focus on the usability and simplicity of the technology as well as establishing the necessary guidelines for usability and finding the right tools to address it. Protect Government I nformationIdentity theft has an enormous impact on both time and finance of a consumer who becomes the target of it; however it’s not only consumers that see the consequences of such thefts. Businesses are being impacted by this occurrence as well. Organizations need to protect their assets from cyber crime, web attacks, data breaches and fraud. Criminals utilize such attacks to harvest data through these means for financial, political and personal gain. Such actions are becoming firm motivators for adaptation of information system security approach to protect assets of companies.The ISS approach utilizes an accreditation process that mandates that all government agencies are complying with such standard. A unified security approach would have been ideal in the case of government agencies however even with proper accreditation and mandated requirements, more than half the agencies demonstrated resistance by their management to implement such rules. One of the reasons for such resistance was the norms and culture with the organizations which could not be unified by one system covering all the agencies.Secondly the management of the government branches that lacked the accreditation pointed out that it was due to the lack of resources that was being committed by Treasury to pay for the needed changes that were part of the compliance process. â€Å"The key lesson learned from this study was that a large-scale IS/IT project conducted across multiple government agencies and sites of varying sizes requires that the implementation be staggered and suited to agency size, thus breaking down the complexity of the tasks enabling resources (people and budgets) to be put in place and allocated to future project phases. Smith, S. , Winchester, D. , Bunker, D. , & Jamieson, R. 2010)† The authors point out that the failure of implementation was mostly due to the long term financial backing of the project and that adequate resources and senior management commitmen t is crucial to the success of ISS. Data Breaches and Identity Theft Data security is an ongoing process and affects both consumers and businesses, however retailers and financial institutions are responsible for storing and processing consumer financial data, and they are solely responsible for the security of it.One of the leading causes of identity theft is data breaches which are a process of loosing data due to a security or network flaw. This is why a proportionate combination of security vs. amount of data collected needs to be found. If there is too much data and not enough security than the potential cost of a data breach is very high. â€Å"Dollar estimates of the cost of identity theft do not by themselves indicate that too much identity theft is occurring.However, press accounts of data breaches suggest that personal identifying data (PID) is being stolen too frequently, and that the data thefts are unduly facilitating various kinds of identity theft. 2 (Roberds, W. , & Schreft, S. 2008)† Establishing policies that can ensure that the balance between data collection and security is properly maintained will be crucial in preventing data breaches. Data network can help prevent theft by securing its databases better as well as increasing the amount of PID compiled in order to identify possible fraudulent attempts on the network.The downside of over collecting is the spillover effect where the data can be stolen and used on another network, therefore breaching the other network. â€Å"†¦the approach here allows for explicit calculation of the efficient levels of data accumulation and data security, and for straightforward evaluation of policies meant to attain efficiency. More generally, it offers an illustration of how any such calculation should balance the costs associated with data misuse against the substantial gains afforded by the relaxation of anonymity. (Roberds, W. , & Schreft, S. 2008)†There are specific variables that nee d to be adjusted in order to achieve the highest possible degree of security and consider the costs that are associated with implementing this specific formula. Formal Identity Theft Prevention Programs As was already discussed previously, identity theft is a serious problem, and can take a very long time to even notice that it is taking place in our lives. Due to the amount of damage that is caused to the consumer’s life and financial situation, the government has taken steps to combat identity theft at federal, state and local levels therefore attempting to assist victims of this crime.There are several steps that have been taken in legislation, however there are still no laws in place that can regulate the general use of personally identifiable information in regard to government branches and both public and private sector. The key piece of information that is considered to be most valuable to the identity thieves is the Social Security Number (SSN), therefore one of the p revention initiatives is in regard to displaying and using Social Security Numbers in easily accessible laces. Other initiatives include securing the availability of personal information though information resellers, security weaknesses in the federal agency information systems, and breaches in data security. â€Å".. federal systems and sensitive information are at increased risk of unauthorized access and disclosure, modification, or destruction, as well as inadvertent or deliberate disruption of system operations and services. ( Bertoni, D. 2009)†.According to the GAO study it has been reported that federal agencies still experience a large number of security related incidents and that provides access to large amounts of personally identifiable information that reside in the federal records that could be utilized for identity theft purposes. Protecting personally identifiable information that is stored in the federal system is critical since its loss and unauthorized discl osure could result in devastating consequences for the individuals.The consequences could range from fraud, theft, embarrassment and even inconvenience in the cases of identity and financial related transactions. Results of identity theft have direct impact on the credit records of individuals and can also carry substantial costs related to this activity; in addition denial of loans and even convictions for crimes that an individual did not commit is a possible outcome of identity theft on the federal level. Solutions:Identifying all the sub categories of identity theft is outside the scope of this paper, however with a general understanding of how it affects consumers and business, as well as the severity of the issue; the next step is to see what can really be done to minimize the damage. One approach to combating identity theft is the implementation of smart cards into the financial system. These cards are designed to incorporate embedded computer chips that rely on encryption al gorithms to safe guard the information and aid in authorization of transactions and identity verifications.If the technology is properly implemented it can really aid consumers, merchants, banks and others in securing transaction and combating identity theft. In addition it will help lower the costs of fraud prevention and provide benefits in the form of creating a more efficient payment system. Such technology has already seen implementation internationally and have proven to be a much more secure and efficient method of payments. â€Å"Payment smart cards hold the promise to improve the security of payment authorization and help reduce the costs of identity theft and payments fraud.Smart cards allow a range of security options and some issuers have implemented the strongest upgrades, while others have not. (Sullivan 2008) The reduced infrastructure costs are yet another benefit that financial institutions can use in favor of implementing the system in United States. However there are some significant challenges moving forward with this system in regard to adaptation of smart cards by issuers, as well as having the whole industry agree on specific security protocols that will be used in the new smart cards.Identifying the true cost and both hardware and software limitation of the new product is also crucial in preventing adoption limitations. There is also the problem of having criminals shift efforts towards areas of weakness in the security of payments, however due to the lack of competitive advantage in the security standard there is a lack of willingness from the provider’s side in investing time and money. The complex network structure that is required to support the new standards is also a roadblock for implementation and development.Smart cards have the potential to become the new payment authorization standard but at this time they are facing a number of adaptation and development challenges that are discouraging financial institutions from mo ving towards them. Enforcement of physical identification cards to improve security is viable way; however a bigger issue of security and lack of it still takes places in many businesses. In the case of ID cards the outcome of implementing such a system would result in large databases of information that will utilize the technology for identification purposes.The problem here is what goes on behind the closed doors of the organization that houses such large amount of personal data. Part of it has to do with proper disposal of sensitive documents which most consumers don’t shred and even businesses that don’t properly take care of them. Once the information is housed in a database and is protected by firewalls and encryption routines, there is no clear process of how to prevent it from leaving the organization through unauthorized parties, computer theft, loss of physical media or records. †¦there is a significant need to widely implement measures for tracking and tracing identity thieves and fraudsters once a breach has occurred. There are various means of doing so, whether electronic or physical (Gregory, A. 2008). These undercover tracking and tracing agents can log all the activity that is taking place by phone or email and then can be used for verification purposes and zero out any anomalies or breach attacks. This type of tracking can help companies stay on top of the activities that are taking place and even intervene in the process in order to minimize the outcome of the breach or fraudulent transactions.It will also help prevent the amount of complains, loss of reputation and damage to the company and its brand. The database of personal data can become quite large and is continuously exposed to security threats and data corruption, that’s why companies hire consultants to investigate risk and exposures of the database information. Consultants check for compliance with Data Protection Act as well as other required transactional practices. In some cases the database can be subjected to quality assessment and data hygiene as to keep the information up to date and as accurate as possible.The results of the analysis can then be used to create an actionable strategy to manage the databases and maintain integrity and efficiency for both short and long term. An increasing amount of identity theft incidents have also provoked major changes in the financial industry, especially with banking applications and the way that they protect data and ensure legitimate transactions. To insure such security and integrity, financial institutions have integrated biometric technologies such as fingerprint and facial recognition that are mandatory for customers and ensure higher level of security. Biometric methods are based on physiological or behavioral characteristics. Since they take advantage of mostly unchangeable characteristics, they are more reliable than traditional methods of authorization (Koltzsch, G. 2006)† T he usage of such technology that can be so closely bound to a physical attribute of a person is very promising, especially in the financial sector and has been looked at it for the last 10 years. However due to the cost and the complexity on the implementation part as well as inconvenience to the consumer, it has not been as widespread as originally planned.Today this technology is mostly used for standalone applications, such as guarding vaults, high security areas and employee authentication. Customer oriented solutions are still in early development stages and are not fully implemented due to the fear of alienating customers and pushing them away from what they are used to. Another reason for the lack of implementation is the difficulty in standardizing this technology on the international scale. The fear of investing in technology that will not be supported by others is what is slowing the adaptation process down.However due to the rise in identity theft and phishing cases there has been a new movement towards the development of this technology to prevent loss of information and financial resources. Protecting the payment system depends on the adoption of industry standards for data security and implementation of the new digitally aware way to personally identify an individual. Currently the identification process depends on the Social Security Number as we discussed previously, which is one of the main reasons that identity theft still occurs.To be affective in protecting the payment system there needs to be a way to properly monitor the compliance of the system and enforce proper penalties in the case of its absence. Payment system participants can also hold each other accountable for the damage in the incompliance of contractual agreements in place. Due to high litigation costs in the event of identity theft, merchants are now implementing new policies that allow them to discard transactional information much faster in order to prevent its exposure to t heft. Another fairly recent step taken by the private sector is the development of insurance products to cover losses from identity theft. Coverage for consumers is available from several sources, at a cost of approximately $120 per year, and appears to provide minimal coverage against lost wages, legal fees for defending against lawsuits brought by creditors or collection agencies, and select out-of-pocket expenses (Schreft, S. 2007)†. The down fall of this type of coverage is its limitations. Neither type of uch insurances or proposed coverage will really protect against identity theft risk because the financial sector cannot ensure against systematic risk. This results in the loss of confidence in the system all together therefore creating the possibility of users accessing such services less frequently. Imperfections in the ability to protect the consumer against crime, results in having the government oversee the failures and driving it towards protecting the integrity an d efficiency of the financial system. Shortcomings of the SystemTo combat identity theft is an enormous task that even the government is struggling to achieve. The reason for this is time, money and consistency between financial providers and government levels. Several different attempts have been made to provide tools for consumers to identify theft and report it to the institutions. However even though such systems are in place, many consumers complain that even when such theft occurs and notices are placed on accounts, thieves are still able to steal money under fraudulent identities. They are even able to successfully apply for loans when there are errors in the information provided.In addition to that the Credit Bureaus have made it close to impossible for an everyday consumer to reach an actual human customer support representative due to the automated telephone systems that have been implemented. Another reason why the system just does not work the way it was proposed, is the cost that the credit bureaus are enduring with the escalation of identity theft cases. The actual costs of thefts are not reflected on the bureaus since they only provide credit reports and credit monitoring services which consumers buy in most cases even if they have been a victim of theft.The bureaus have no real incentive in helping consumers prevent identity fraud, which is in this case is a conflict of interest for one of the parties involved. This conflict of interests entails in the amount of early revenues that are generates from products such as credit reports and credit monitoring services. The latest offering from the bureaus is an email notification service that notifies the consumers if any changes in the credit records occur and charges a fee for it. One observer has estimated that credit bureaus received $600 million in 2003 from sales of credit reports, credit scores, and credit monitoring services (Hendricks 2003). In such a case the credit bureaus are profiting fr om the sales of preventive service that prevent the client from the theft that the bureau makes possible. Overestimation of losses is also a shortcoming of the system that is geared toward protecting the consumer in the business of financial transaction and identity information. A claim that identity theft is the fastest growing crime in U. S. is what the consumers are being told on the continuous basis.Lately the press coverage of this topic has grown significantly and provided a number of related events that claims an affected population of 4. 6% and losses of more than $60 billion dollars a year. What consumers need to take into account is the $50 maximum liability that is provided by the financial institutions, as well as the fact the media is taking into account information theft that did not result in financial losses to the institutions. Such overestimation are leading many consumers away from doing business on the internet and providing erroneous information, while forcing t hem to implement monitoring services that cost them money.As was covered before, smart cards is viable solution to the new identifiable information problem, however its shortcoming is the same problem as it exists with current financial tools. The exchange of personal information between the consumer and merchant can still result in letting an impersonator utilize the information to initiate a payment therefore making the smart card inefficient at securing the customer. Conclusion Identity theft is one of the fastest growing crimes in United States, and the real reason behind that is the fact technology innovated at a much greater speed than businesses and consumers have been able to adapt to it.Because of that the tools that we use to identify ourselves are no longer safe and need to be updated. On the consumer side a variety of tools are available to protect oneself from identity theft. However the cost of such tools can be a draw back in their implementation. On the business side s tools such as high level encryption, RFID chips and transition standards are in development stages and are planned to be implemented in the near future. Identity cards and centralized databases can be the key to solving security epidemic but are not versatile enough and carry overhead cost during the implementation process.There are many viable solutions to protect both the consumer and the business; the path really depends on cost and time available to either one. Awareness is the best approach to keeping you data safe and secure.

Thursday, November 7, 2019

Mobodu Essays - Race And Crime In The United States, Free Essays

Mobodu Essays - Race And Crime In The United States, Free Essays mobodu Professor Seifert ENGW 102 Section 12 11 September 2017 African Americans and their White Counterparts in the Justice System According to the National Association for the Advancement of Colored People (NAACP), African Americans are incarcerated at more than five times the rate of whites. African Americans and Hispanics make up thirty-two percent of the United States population but comprise fifty-six percent of all incarcerated people was also determined by the NAACP. This trend unfortunately not only goes for adults but as well as children. The NAACP suggests that nationwide, African American children represent thirty-two percent of the children arrested, forty-two percent of children who are detained and fifty-two percent of children whose cases are judicially waived to criminal courts. Children are supposed to be the future of the world. How is this possible if more than half of all children nationwide are imprisoned? Sentences imposed on black males in the federal system are nearly twenty percent longer than those imposed on white males convicted of similar crimes was reported by the American Civil Lib erties Union (ACLU). ACLU also reported in the federal system, 71.3% of the 1,230 life without parole (LWOP) prisoners are black. This quite frankly amazes me not because blacks are subjected to longer terms in prison, but rather to the mass effect that has been tolerated and allowed. How are local, state and federal governments still able to get away with the mass incarceration of African Americans in 2017? My father earlier this year was arrested for a crime and was not able to obtain bail. The day after I found out that my dad was not going to be able to get out of jail, I saw on the news a white man who allegedly murdered someone was released on bail. My father did not kill anyone nor is he a threat to society and was denied bail but a white man who allegedly killed another person is not a menace to society. Due to the incarceration of my father, he missed my senior prom, my graduation from high school and my big announcement to where I was going to attend school. This New Year's Eve, I will be turning the big eighteen and my father will still be in jail awaiting trial. My father and I were extremely close and it hurts not being able to share the moments I dreamt of since I was a little girl with him by my side. I know this not only hurt me but also my mother. My parents have been married for twenty-seven years and I know not being able to wake up next to the man you love hurts. My m other is a strong woman and she tries her best not to let my younger brother and I see her hurting. To see her breakdown in tears in front of us I know there is pain and hurt there. In no means am I suggesting that African Americans should not have to serve time for the crime they committed, what I am suggesting is there should not be this big gap between the percent of African Americans and whites that are in jail. Why is it that African Americans spend more time in jail than their white counterparts? When one becomes imprisoned it not only affects the inmate, it also affects their loved ones as well. My main mission is to determine the extent in which the incarceration of a parent affects children and spouses. To do so, I plan to try to work with Howard University's Psychology Department and conduct a study to properly analyze the results. I know there are limitations to this study. For one, this issue of there being the possible emotional disconnect is result of the system keeping blacks of the streets. This cannot truly be fixed until we all realize as Americans that racism is still a prominent issue in today's society. This issue cannot be truly resolved until we as American people are able to see that we are the same. We in terms of the mission of this project possess some of the same demons. The amount of melanin present in defendant's skin cells should not determine the length of time

Monday, November 4, 2019

Domestic Bathtubs Lab Report Example | Topics and Well Written Essays - 1500 words

Domestic Bathtubs - Lab Report Example According to Wright, (1980), today, 62% of bathtubs, 28% of lavatories and 92% of whirlpool baths are made of plastic. According to Mazzurco (1986), the American National Standards Institute has set standards that manufacturers should observe when designing bath tubs. They may use enameled cast steel or iron besides plastic. Consumers are however taking into account the aesthetic features, safety, durability and environmental aspects when choosing bathtub materials. Customers and manufactures are now taking advantage of enameled or plastic bathtubs to design one-unit bathtubs. Safety, being an important factor to consider, is ensured in modern bathtubs by the use of prefabricated slip-resistant surfaces. The bath tabs should be leak free, the potential problem being solved by the provision of a moisture barrier between the subfloor and the bathtub, or ensuring that the base and the wall are integral parts of the bathtub. Bathtub Materials It is very important to choose the best mater ials for making bath tubs, just as it is important to consider its functions (Mazzurco 1986, pp.57). A wide range of materials that can be used to make bath tubs are readily available. However, they all have their own cons and pros of use. Other factors to consider in material selection are their cleanliness as well as longevity. These materials are in most cases available for spas, basic bath tubs and whirlpools. Examples of materials that are used to manufacture bath tubs are acrylic, cast iron, porcelain/ ceramic tiles, concrete, copper, cultured marble, fiberglass, granite, and porcelain on steel. Acrylic bath tubs normally chip and crack. Therefore, this material is reinforced by fiberglass to make it resistant. However, it is cost effective and light in weight thus allowing easier mass production. Bath tubs made of cast iron are very costly and heavy in weight. Manufacturing bath tubs with cast iron involves creating a mold according to the desired design, and then melting iro n and pouring it into the mold. Though they are expensive, they have two big advantages: many chemicals will not destroy the surface, and they firmly withstand abuse because it is nearly impossible to dent or scratch a bath tub made of cast iron. In its construction of porcelain or ceramic tile bath tubs, a wood form is produced and then covered in concrete. A gentle slope is essential as it ensures the right drainage. A water proof adhesive is used to glue the tiles to the concrete while cracks are sealed with grout. Unfortunately, they are often prone to small cracks that can cause leaks as a result of shifting of the whole house or form. Concrete is not a common material in the manufacture of bath tubs because of its high cost of labor. Concrete is either created in the factory or molded on site and then the finished product is delivered and placed in position. The biggest advantage of constructing bath tubs using tiles is that different textures and colors can be applied on the concrete. Furthermore, the material can conceive almost any color and shape. For a bath tub, copper is very costly to use. Another material that is normally used to manufacture bath tubs is cultured marble. Cultured marble is created by mixing polyester resin with limestone together and then coating it with gel. It is less expensive than cast iron but more

Saturday, November 2, 2019

Public relation campaign Essay Example | Topics and Well Written Essays - 2500 words

Public relation campaign - Essay Example However, its business is also contributed towards the non-pharmaceutical sources, specifically the crop protection industry accounting for 60% of non pharmaceutical business. Huntingdon Life Sciences uses animals in the biomedical research conducted by it for its customers. In UK around 60,000 animals are annually used. This number is further broken down by species like fish, bird, mouse, rat and other mammals. In the field of non clinical CRO, HLS is the third largest in the world but it is better known to general public as the target of animal rights campaign of high profile. Stop Huntingdon Animal Cruelty (SHAC), the animal rights group, has mainly orchestrated the campaign. Issues involved with Huntingdon Life Sciences Huntingdon Life Sciences has been criticised by the group of animal welfare and animal rights for using animals in research for abusing animals and for testing wide range of substances, particularly non-medical products on animals. It has been claimed by SHAC that around 500 animals died everyday at HLS. A film was recorded secretly inside HLS in UK which was subsequently broadcasted on television channel as â€Å"It’s a Dog’s Life† showing serious breaches of animal protection laws. It has also shown the taunting of animals and a puppy held up by scruff of neck and was repeatedly punched in face. The laboratory technicians responsible for this activity were suspended from HLS after this broadcast. The campaign of Stop Huntingdon Animal Cruelty is based in US and UK which aimed to close the company Huntingdon Life Sciences. The methods of campaign are the direct action which are non-violent and demonstrations and lobbying. It not only targets HLS but any institution, company or person doing business allegedly with laboratory, whether as suppliers, clients, cleaning and disposal services and employees of those companies. So, HLS was forced to set up its own security, laundry service, catering and delivery as the outside su ppliers doing business with it declined. The campaign against HLS led to crash of its share price. The Royal Bank of Scotland closes its bank account and the British government arranged for the state owned Bank of England to give them an account. The share price of company fell down and was dropped from New York Stock Exchange as its market capitalisation fall below NYSE limits. The British Government then took decision to tackle the problem of extremism of animal rights. There was an enactment of a police campaign called Operation Achilles against SHAC, involving police officers in Amsterdam, England and Belgium. 32 people linked to the group were arrested and seven leading members of SHAC were found guilty of blackmail. As a consequence of the operation, most violent activists were jailed. Public relation campaign Following the major issues involved with Huntingdon Life Sciences, a suitable public relation campaign can be proposed to improve the public perception of company and to counteract the negative effects of animal rights lobby. Public relations refer to the forms of planned communication, both inward and outward, which occurs between an organisation and public in order to achieve specific objectives with effect