Thursday, October 31, 2019

Exectuive Branch Paper Research Example | Topics and Well Written Essays - 1250 words

Exectuive Branch - Research Paper Example The decision-making branch of the state level is headed by heads of states. All bureaucrats in the state executive level are answerable to the president, but in other cases, the executive level in different states are headed by governors The president in any state level has his own directives to carry out like being the commander in chief of the armed forces. This implies that the head of state is the only individual who can command the military wing of the forces. Secondly, the president has authority to select individuals or ministers to oversee the daily running of public institutions, like ministries and embassies (Ferguson, 2006). Functions of the State Executive Level The executive level has various functions to perform. They include overseeing and put into practice the work of their juniors, since they are mandated to see the overall running, and implementations of the laws. Secondly, the executive level makes sure that laws are followed to uphold their constitution and protec t their interest. It applies rules and orders in insuring that enactments are strictly followed. The laws enforced into enactment by the executive level involve the constitution laws signed and acknowledged by the executive head. Thirdly they have the responsibility to appoint the judicial officers like lawyers and state judges. Lastly, the executive has the mandate to appoint officials in a state subsection. The arm is in-charge of the of all key policy-making positions in state or government (Thorburn, 2008). The Authorizing Legislation of the State Executive Level Authorizing legislation can be used to describe the management process, and the instructions used to institute information sharing in any set of an institution. The legislation offers a structure for the enactment of laws and ideas in any set of a system. The executive, state level is guided by rules on the appointments of their officials. The authorizing legislation in any state government is the president or the gover nor. An excellent authorizing legislation has to meet the set standards like being timely in fulfilling vacancies in any state office. All the officials in the state institutions are appropriately expected to use the legislation act in occupying vacant positions inside an institute. Secondly the authorizing legislation should be considerate of an institution when making decisions pertaining to the appointments of officials in an institution. The authorizing legislation should entail the opus and qualifications for individuals who are to be appointed to occupy key positions in a state institution. Thirdly, the legislation act should plainly state the duties of the commission is selecting to aid in its operations. Lastly, the act should clearly state powers and limits of state officials in the handling of issues. The powers awarded to an individual are stated to avoid abuse (Thorburn, 2008). Structure of the Executive Federal Level The executive federal, level entails distribution of power among the state governments and other institutions like the national administration. The level is collected the office of the president, the managerial departments, the first lady and the independent agencies and committees (Ferguson, 2006). 1 The office of the president is regarded to be the uppermost bureau in the structure. It is composed of the president, the first lady, the vice president and the cabinet. The president

Tuesday, October 29, 2019

Assignment (primary research required) Essay Example | Topics and Well Written Essays - 3000 words

Assignment (primary research required) - Essay Example This report explores the application of theoretical concepts of small business management in particular the issues surrounding marketing aspects of small businesses and the strategies that need to be adopted with particular reference to the restaurant industry. A primary study was conducted involving a family restaurant. The purpose of the research was to explore how successful small business entrepreneurs apply theoretical concepts of small business management such as marketing to their businesses. The findings suggest indicate that marketing is perceived as a means to build customer awareness about the enterprises and offerings. It was also found that application of marketing thoughts and practices are useful for profitability of the firm, but are constrained by lack of resources. Contents Abstract ii Contents iii Table of Figures iv Photo credit iv Managing Small Business Marketing 1 1. Introduction 1 1.1 Significance 1 1.2 Aims and objectives 2 2. Literature Review 2 2.1 Definiti on of small business 3 2.2 Marketing and business orientation 3 2.3 Marketing mixes and approach to marketing 4 2.4 Customer acquisition in small businesses 5 2.5 Customer relationship management in small businesses 6 2.6 Summary of critical review 8 3. Primary Research 8 3.1 Interview with owner manager 9 3.2 Findings 11 4. Discussion 11 5. Conclusion and Recommendations 12 5.1 Recommendations 12 The researcher also recommends that further studies may be undertaken to reveal the difference in the levels of success of small businesses in terms market share and profitability caused due to implementation of marketing principles and techniques. 12 References 13 Table of Figures Figure 1: EU Classification of enterprises 3 Figure 2: Small businesses usually follow the bottom-up marketing approach 5 Figure 3: Observations from literature review 8 Photo credit Cover page photo: http://www.oxfordrestaurantguide.com/gees/ Managing Small Business Marketing 1. Introduction The small business sector is a major contributor to the economy in many parts of the world. In the year 2000 the sector in the UK comprised approximately 3.7 million small firms, majority of which were micro businesses, of which 66 per cent were either run solo or self-employed people (Fraser & Thompson, 2011). Twenty-five per cent of these had less than 10 employees. These figures are growing steadily. The UK government believes that â€Å"the health of the economy requires the birth of new enterprises in substantial numbers. We cannot assume that the ordinary working of market forces will necessarily preserve a small firm sector† (Fraser & Thompson, 2011, p. 29); and considers it to appropriate to intervene in proliferation of small business. There are however other reasons for phenomenal growth of small business as, (1) free market economy; (2) control by large firms; (3) spirit of individualism; (4) growth of IT; (5) growth of niche marketing; (6) growth in service sector; and (7) unemploym ent. 1.1 Significance In the UK small businesses contributed a significant 25 per cent of total private sector employment. Their combined turnover represented almost 20 per cent of the total turnover of the private sector. Small business firms employing fewer than 50 people accounted for 9.5 million jobs

Sunday, October 27, 2019

Study on Phone Usage for Financial Services

Study on Phone Usage for Financial Services A STUDY ON USAGE OF MOBILE PHONE IN THE ACCESS OF FINANCIAL SERVICES AMONG RESIDENTS OF KANGUNDO CONSTITUENCY Background to the study The use of mobile has been taunted as the next big thing in the empowering of communities. ICT plays a big role in literally all spheres of life, and this explains why the government has supported laying of ICT infrastructure across the country. It is reported that Central Bank of Kenya’s enabling regulatory approach allows 23 million people (74% of adult population) to use mobile financial services via 90,000 agents (Alliance for Financial Inclusion, 2012, P.20). Expansion of the ICT sector has a direct contribution to a society’s access to information and subsequently empowerment. The use of mobile phone has revolutionized banking in the recent past, by netting the initially unbanked. Inventions in mobile phone have made tremendous contributions to financial services advancement. Banks have jostled to outsmart each other by launching varied mobile banking services, so are the mobile network operators. Such services by the banks are dependent on the platforms of existing mobile phone network operators. These services are accessed through USSD, WAP applications and internet banking. We have seen the emergence of mobile bank accounts such as M-benki (KCB), M-Shwari (CBA), M-Kesho (Equity Bank) and Pesa Mob (Family Bank). There have been partnership deals among these Banks and Mobile phone operators. Moreover, customers are able to access credit facilities through these mobile bank accounts as well as make loan payments. Other services in clude funds transfer, airtime top up, credit card payment, accessing mini-statements, balance enquiries and even stoppage of cheques. Agency Banking, which was meant to bring banking services closer to the customers equally relies heavily on the use of mobile phones. They include KCB Mtaani and Co-op Jirani. However, it is notable that there is a variation in usage of the mobile phone platform between urban and rural areas. We shall seek to know the trends in the usage of mobile phones to access financial services by residents of Kangundo Constituency. Statement of the problem This is a study to gauge whether residents of Kangundo constituency have embraced mobile phone technology to access financial services. Significance of study This study seeks to appreciate the use to technology to ease financial services accessibility. Traditional methods of visiting banks have long been overtaken by inventions in technology. Therefore this study will seek to explore whether the residents of this constituency have taken advantage of the more convenient financial services provision methods, as is now commonly known- paperless and Branchless banking. Access to banking services includes access to credit facilities which are a key catalyst for economic empowerment. The findings of this survey will prove useful to the constituents of Kangundo, financial services providers as well as mobile network operators. Purpose of the study This study seeks to: To establish the number of residents who own mobile phones To establish the number of residents who have registered for mobile phone services such as Mpesa, Airtel Money, Yu Cash and Orange Cash To establish the number of residents who have opened mobile bank accounts To establish applications used to access mobile banking services: USSD, WAP, Internet banking To establish the usage of bank agents in access of financial services To establish demographic trends in access of Banking services (Age, sex, education, employment status) Definition of concepts USSD- Unstructured Supplementary Service Data WAP Wireless Application Protocol Unbanked By definition, unbanked customers have no checking, savings, credit, or insurance account with a traditional, regulated depository institution (Delloitte, 2012, p.2) Literature Review The government recognizes ICT as a foundation for economic development, and as such, Kenya’s vision of knowledge based economy aims at shifting the current industrial development path towards innovation where creation, adoption, adaptation and use of knowledge remain the key source of economic growth as this is a critical tool for expanding human skills and rests largely on a system of producing, distributing and utilizing information and knowledge that in turn plays a great role in driving productivity and economic prosperity (Government of Kenya, 2013, p.21). One of such ICT tools is the mobile phones which continue to offer a myriad of opportunities, specifically on the financial sphere. To leverage on the above, the Government bets on the increase in communication to spur economic growth in tandem with the vision 2030 blueprint. As Watts, 2001 observes, ‘’some clients may prefer to access services at a distance. Increasingly, in all fields, consumers want a service to be available when they identify a need for it, with minimum delay and minimum effort: they want it here, and they want it now’’ (p6). The urge to access services with urgency and at a minimum cost is making more people gravitate towards technologically based products that are available through the mobile phone. The use of this gadget has simplified life and as such transactions can comfortably be initiated and terminated at one’s convenience. Further, it is notable that the settlement of these transactions is instant. ICT increase efficiency, productivity, and access to goods, services, information, and markets. Demand for these benefits is high. If the right compliments- such as power, connectivity, content, skills and support systems, functional markets and supportive policy frameworks- can be put in place, demand for ICT will be correspondingly high (William J. Kramer, Beth Jenkins, Robert s. Katz, 2007, p.9). With Kangundo being a rural area, we shall then be interested in knowing how the use of mobile phone has impacted on its residents, and whether they have taken full advantage of this revolutionary tool that continue to transform lives across the globe. Mobile phones have characterized the everyday life of Kenyans. Cheap Chinese phones have found their way in the market and this has eased the affordability of this ICT tool. Mobile ownership at the household level is almost as high as access. Approximately 75% of the households have at least a member who owns a mobile phone. In rural areas, ownership is 67% while in urban areas ownership reaches 90% (CCK, 2011, p.13). It is essential for banks to sensitize on mobile banking and ensure that customers maximize its use bearing in mind the capital invested (Korir, 2012, p.43). Information is power and banks have a role to play if they are to penetrate and crack open the mobile banking market. Banks will rely much on studies to inform their decisions on the best way to tap in to this market. The government has indeed been on the forefront by championing for ease of access of banking services to all citizens. Branchless banking through retail agents is made possible through the information and communication technologies that customers, retail agents and mobile network operators use to record and communicate transaction details quickly, reliably and cheaply over great distances. Among the first mobile network operators in the world to offer branchless banking were Globe Telecom and SMART in the Philippines. They launched their SmartMoney service in 2000 (in conjunction with Banco de Oro) followed by the G-Cash1 service in 2000. Customers can store cash, send funds from person to person, pay bills, make loan repayments and purchase goods at shops. They primarily use G-cash to buy airtime and to send money to friends and family (Financial Sector Deepening, 2009a, p1) Mobile banking represents a more cost efficient channel for the banks, allowing them to charge less for transactions, and permitting the consumer to have immediate access to information related to their bank accounts.P.3. Worldwide, more people now own a mobile phone than a bank account. A revolution in mobile phone payments is taking place. The way mobile devices are evolving makes it difficult for banks to find the right solution to manage complex technologies and provide a consistent service to customers. http://www.cr2.com/solutions/mobile-banking/mobile-banking-solution.html Alliance for financial inclusion. A High Level Conference on Kenya’s Economic Successes, Prospects and Challenges Making Inclusive Growth a Reality September 2013 Central Bank of Kenya’s enabling regulatory approach allows 23 million people (74% of adult population) to use mobile financial services via 90,000 agents. Pg 20 References Alliance for Financial Inclusion. 2013. A High Level Conference on Kenya’s Economic Successes, Prospects and Challenges Making Inclusive Growth a Reality. Retrieved on February 22, 2014 from Delloitte. (2012). Banking the Unbanked: Prepaid Cards, Mobile payments, and Global opportunities in Mobile Banking. Retrieved February 22, 2014, from https://www.deloitte.com/assets/DcomunitedStates/Local%20Assets /Documents /FSI/US_FSI_Bankingtheunbanked_043012.pdf

Friday, October 25, 2019

abraham lincoln Essay -- essays research papers

Abraham Lincoln was born in Hardin County, Kentucky on February 12, 1809, to Thomas Lincoln and Nancy Hanks. Thomas had been apprenticed as a carpenter after the death of his father and the passing of the family property to his eldest brother as required under the system of primogeniture. Thorough dint of hard work or with funds from his family, Thomas acquired enough money to purchase a farm, but his ownership was soon challenged. Kentucky had been surveyed in such a primitive manner that boundaries were never certain. After having the titles of two other farm parcels challenged, Thomas tired of Kentucky and in 1816 moved his family to southern Indiana. The federal government had surveyed Indiana in a manner that insured sound titles. Abraham Lincoln later explained his father's move as "partly on account of slavery; but chiefly on account of the difficulty in land titles." If distaste for slavery motivated Thomas Lincoln to leave Kentucky, it was probably anger at the in fluence of the planter class rather than concern for the lot of the slaves, as Thomas never expressed any moral qualms about the institution. The Lincoln family's problems in Kentucky were not atypical for frontier settlers. Traditionally, the frontier has been portrayed as an agrarian idyll, a vision of sturdy and prosperous yeomen farmers serving as a bulwark of democracy. In fact, the frontier provided as many opportunities for failure as for success. Settlers were plagued by sickness and dea...

Thursday, October 24, 2019

Sauses of religious crises in nigeria Essay

This essay is an attempt at identifying the remote and immediate causes of the incessant religious crises in northern towns and cities, if you’d rather the so-called middle belt political zone of the north. In expressing this view, there is no intention on my part to mock the bones of those who died so long ago and who tried, however ineffectually, to lead their people. The thrust of this piece is that the nuisance of religious crises in the North is essentially a result of the manipulation of religion to score political goals: using religion to confuse or destabilize; which set the stage for what we experienced time and again: series of violent provocations, reactions and counter reactions; all in the name of religion. This manipulation of religion is orchestrated and masterminded by selfish elements within the so-called elite class of both the Islamic and Christian religions, herein referred to simply as the manipulators. The motive for the manipulation of religion is a self centred one, a means through which selfish politicians seek to attain undue political leverage in an otherwise politically competitive level playing field. The reason for this is, in the words of the late Dr. Yusufu Bala Usman â€Å"to enable this class (the manipulators) to cover themselves with religious and ethnic disguises in order to further entrench division among our people (and) slow down their awakening at any cost.† This is because any single one of them (the manipulators) â€Å"cannot appear as what he really is in the political economy of Nigeria. He has to find a cover. He cannot claim political leadership openly on the grounds that he is, or wants to be, an exporter-importer, a contractor (etcetera)†¦ he has to take cover as a Muslim or Christian †¦ the manipulation of religion in Nigeria today is essentially a means of creating the context for this fancy-dress ball, for this charade of disguises.† (See Dr. Y. B. Usman’s The Manipulation of Religion in Nigeria 1977-1987). Ever wonder why religious crises in Nigeria are essentially a northern affair? Kafanchan, Zangon-Kataf, Tafawa-Balewa, Yelwan-Shendam, Jos, Kaduna, Bauchi etcetera; in most places it happened more than once. Between 1804 and 1812, an Islamic state, what we now referred to as the Sokoto Caliphate was established as a bye-product of the Islamic reform movement started by Shehu Usmanu Danfodio in Hausaland at about 1774. The Sokoto Caliphate comprised of a large chunk of pre-colonial Hausaland: Kano, Katsina, Gobir and Zazzau; Western flank of the pre-colonial Borno before the Shehus of Kukawa: Hadejia, Gumel, Kazaure, Katagum, Misau and Gombe; Benue valley and the Bauchi Plateau, including the present Jos Plateau; Nupe and Ilorin emirates. The Sokoto Caliphate was regarded as a bye-product of the Islamic reform movement because Shehu Danfodio did not set out to conquer lands and territories, but rather to call, as Sheikh Abdullahi Fodio wrote in Tazyin al-Waraqat â€Å"to the revival of Faith, and Islam, and good works, and to abandon customs contrary to them.† Following the establishment of the Sokoto Caliphate, the successors of the Shehu and the flag bearers failed to sustain the spirit of the Islamic reform movement; rather they were so much after the luxury of life and the delights of power. As Sheikh Abdullahi Fodio lamented in Tazyin al-Waraqat â€Å" I am left in the midst of liars and hypocrites who say one thing and do entirely another, people who do not value knowledge and its pursuit†¦ people whose preoccupation is attainment of political power for the procurement of sensual comfort through concubines, flutist, gorgeous clothing and brisk horses†¦Ã¢â‚¬  Having derailed from the path concretely mapped out by Shehu Danfodio, the successors of Shehu and the flag-bearers found it more convenient to subjugate and exploit both the non Muslim Hausas (Maguzawa) and the several hundred animist minority tribes and ethnic groups within their domain than to call them to the Islamic faith. For one hundred years, these non Muslim communities were fit only to serve the Caliphate as major suppliers of slaves, concubines, food and raw materials. In 1903 the Caliphate was overthrown by the British. When the Whiteman came with the Christian religion to this doomed people, a marriage of convenience was inevitable: he offered them hope; they accepted his religion. The rest is history. In my article titled Nigeria: Washing Our Dirty Linen in Public published by Gamji in 2007, I described the features of northern Nigerian Christianity when I wrote: The Northern Nigeria brand of Christianity is, probably, the most politicised version of Christianity on the surface of today’s earth. Christianity in the North has a distinct meaning and flavour from anywhere else. In the North, Christianity is, more or less, a political banner, movement or platform upon which all non-Muslim ethnic Northerners flock in opposition to what they perceived as Hausa and Fulani led oppression, both real and imagine. This northern Christian mindset is clear if one look at what the average northern Christian consider the political (read: Christian) Middle belt as distinct from the geographical Middle belt. The average southern Christian, until very recently, views issues with the Hausa and Fulani led north essentially in regional and tribal terms. The Northern Christian reduces all issues, social, political and even economic, within the North simply to Islam v. Christianity. Islam is viewed as the symbol of Hausa and Fulani corrupt power and materialism which must be fought at all cost. Some church leaders indicate to their followers that the secret of their wretchedness can be explained in the prosperity of the other side. This set the background for the fear of the other side. How easily fear leads to distrust, to hatred, to dehumanisation and, to death. Which way out of this quagmire? Manipulation is the root cause of all these crises. â€Å"Manipulation† wrote Dr. Y. B. Usman â€Å"means essentially controlling the action of a person or group without that person or group knowing the goals, purpose and method of that control and without even being aware that a form of control is being exercised on them at all†. From the foregoing it is clear that the manipulators succeeded in manipulating the people because the people are not aware of being manipulated. The corollary to this premise is that the people will not accept to be manipulated if they are conscious and aware enough to see through the manipulators’ lies. The one million dollars question then is: How do we equip the people with the tools necessary for them to be not only conscious and aware of the manipulators tricks, but also to be able to effectively resist them? Dear concerned Reader, let us brainstorm to come-up with an answer to this question. This I believe, will be a right step in the right direction towards finding a lasting solution to this nuisance of incessant religious crises in our dear country.

Wednesday, October 23, 2019

The Natural of Semantic Change

SEMANTICS THE NATURE OF SEMANTIC CHANGE Presented by group 9: Riva Nugraha Jiwa 0910733154 Alfi Nurhidayati 1010731008 Nadia Turrahmi 1010732014 ENGLISH DEPARTMENT FACULTY OF HUMANITIES ANDALAS UNIVERSITY INTRODUCTION 70 years ago, Edward Sapir introduced a new concept of linguistics. He said that language moved on every time and then created their own forms and never static. Every word, every grammatical element, proverbs, sounds and accents configured which was changed slowly and this was the ways how a language could long lasting.This concept of language made the other linguists interested. The change of meaning could happen because of some reasons, according to Millet a meaning could change easily because of the discontinuous from one generation to the other generations, the blur of meaning, the lost of motivation, the appearance of polysemy, there are some ambiguous contexts, vocabulary structures, and so on. The nature of semantic change can be divided into some categories, met aphor, metonymy, popular etymology, ellipsis, and also some consequences change of meaning. SEMANTIC CHANGE A.The nature of semantic change Aksioma Leibniz said â€Å"natura non facit saltus† that means the nature changed indirectly and slowly, this sentence also can we applied in change of meaning. Every changing had their each reason and always related and associated from the old meaning into the new meaning. One of semantics tradition looks up meaning as â€Å"the interrelationship between name and meaning†. So, we can conclude that change of meaning divide into two types: change of meaning based on association of meaning-meaning, and also name-name. Every type can be differs into similarity ad contiguity. . Metaphor Metaphor is important in language because it can make them more creative and aesthetics, it is common in literary field such as poem. Metaphor has some functions in everyday life, there are as the motivation, expression ways, as the source of synonym an d polysemy, to fill the blank in vocabulary, and the way to express the emotion, etc. The structure of metaphor is simple, it always said one thing is another thing. It does not use the word as, like, and comparative words and other, this case make the reader try to find the similarities.For example: a) Her home is a prison, in this case her home have same characteristic of prison, we can imagine that she can’t leave her home, she tapped inside, and maybe afraid of the outside. b) The police man let him off by a yellow card, in this sentence ‘yellow card’ refers to warning, the original sense is in soccer player a yellow card that the referee shows to the player when cautioning them and give the second chance to introspect themselves. c) in Indonesian language we can take the example Gonzales menanduk bola, we know that Gonzales is a human and he did the work which is did by an animal buffalo.In this case, menanduk have same meaning with the other, because it ref ers to an action using a head, in human we call menyundul and in buffalo we cal menanduk. * Anthropomorphic metaphor The person who is interested toward this kind of metaphor is Giambattista Vico, he said that in every language the most part of expression refer to inanimate, compared by transferring from any part of body, sense, and also the emotion of human being. For example: a) in Indonesian language: jantung kota, bahu jalan, mulut sungai, etc. b) in English language muscle comes from Latin language musculus that means ‘little mouse’. Animal metaphor This category applied for animal or inanimate types, many plants using animal’s name to call them. For example: a) lidah buaya, kumis kucing, jambu monyet, etc. b) in English there are some plants with animal’s name goat’s-beard and dog’s tail. Beside that, there are animal’s name transferred into human being for describe humor, irony, and other. For example: si beo, the speaker use th is word toward the other because they have same characteristic or their action refer to the animal itself. * From concrete to abstractOne of the tendency in metaphor is explaining the abstract into the concrete, when we try to find the abstract word at first we must know the concrete one. For example in English light ‘sinar, cahaya, lampu’ which is concrete, when this word close to the other morpheme they sometimes become abstract like highlights ‘menyoroti’. If it compares to Indonesian language the condition is same, for example the concrete one is ‘sinar, cahaya’, it become abstract metaphor in sorot mata, hidupnya sedang bersinar, ajarannya menyinari dunia, harta yang menyilaukan, and so on. Synaesthetic metaphor This metaphor based on the transferred of one sense to the other sense, for example from sense of hearing to sight, from touch to sound, etc. If we talk about the sound which is warm and cool, we can see that there are the similari ties between temperatures with the kind of sounds. The structure of metaphor begin in literary works when the raising of symbolism era. We can see from one of Shakespeare’s work: I see a voice; now will I to the chink To spy an I can hear my Thisby’s face 2. MetonymyMetonymy involves some sort of connection between concepts, but in this case there is no similarity between them, but they are closely linked in some other way. Metonymy can divide into the association they based on. First, metonymy transfer based on spaces and places. The change of meaning the Latin word coxa ‘pinggul’ into France language cuisse ‘pupu;paha’ it explained that pinggul and paha is our part of body which is close and do not have correct constraint. Second, metonymy transfer based on time or temporal.The name of action or event can be transferred into something that predate and follow the change. For example, in English, ‘collation’ now defined into diffe rent meaning ‘perbandingan’ and ‘makanan ringan’ where as both of them are relates. Previously, in Catholic ceremony the reading from Collationes Patrum by Cassian usually read before the end of mass, it followed by snack which called collation because the snack related with the reading. So, the name of book followed by the snack that also consume in the close time in mass period.Third, the relation can create the change of metonymy, there are some part that is important but sometime it divide into own category, or we can call it pars pro toto. For example in Indonesia, ‘pasukan baju kuning’ it refers to the group who clean up the road. And the last metonymy is simple and famous because we don’t need the worst and crucial speech. We know that most of the founder named something which they found by their name. For example, the terminology in electricity ampere, volt, ohm named by the founder Andre Ampere, Count Allessandro Volta, and Geor g Simon Ohm. . Popular Etymology Etymology is the branch of linguistics that studies the origin and development of words and other linguistic forms. The examples of the areas that are studied include the earliest origins of a word, how its meanings and connotations have changed, the meanings and origins of its component parts, whether or how it has spread to other languages, and how its meaning or use has been influenced by other words. The history of a word also is called its etymology.For example, France language forain become English foreign which come from Latin foranus, one of derivative from Latin foris ‘tidak dengan; ke luar negeri; the nature meaning is the foreign as we used in English. 4. Ellipsis Words which often occur side by side are act to have a semantic influence on each other. We have already sees an example of this in the history of negation in French. The commonest form which this influence takes in ellipsis. In a set phrase made up of two words, one of the se it omitted and its meaning it transferred to its partner.For example, in Jakarta’s dialect ‘tidak tahu’, sometimes just utter in ‘tahu’. B. The consequences of the change of meaning * The change in the area of meaning Many older writer divide change of meaning in three categories, there are: extension, restriction, and the last that do not grouped into both of them. The division can called as â€Å"logical division† they also has some weaknesses, although the division is simple and easy. The division does not give clearly describing about the formal form in causes or the background how it can be changed.And then, the third division just grouped because can’t let in first and second division. Truthfully the basic is the meaning become wide or narrow and continuously by the time. 1). Restriction This change make the meaning of certain word become restrict and the intense become more variable. For example, English ‘poison’ means racun, first the word come from ‘potion’ that means ‘beer’ because beer can damage our body and sometimes make somebody die. Later poison just use to refer the drink that can make somebody die, not to all of beer. 2). ExtensionIn extension meaning, the word can be applied in large contexts by following the time the intense become weaker and something that referred become smaller. For example, arriver in France and arrive in English, this word come from Latin arripare, it become ripa ‘tepi sungai; pantai’ because it refers to the coming of someone. * The changes in evaluation: pejorative and ameliorative 1). Pejorative The change caused the word become lower or negative than before, for example: ‘perempuan’ come from ‘empu’ that means ‘ibu jari’ it should be has higher meaning.But nowadays, ‘perempuan’ is lower if compare to ‘wanita’. 2). Ameliorative The change caused the wo rd become higher and positive than before, for example: ‘minister’ at first define as ‘minus or slave’ but nowadays the meaning become higher into ‘the person who stayed in governmental system. CONCLUSION The Nature of Semantic Change, there is must always be some connection, some association between the old and the new meaning, association is the necessary condition of semantic change.Meaning is determined by three factors: the objective reference (the referent), the subjective apprehension (the subject, i. e. the speaker or the hearer) and the traditional range (the word). Any change has as its immediate cause a change in one of these three relations. Types of semantic change: Similarity of the senses (metaphor), Contiguity of the senses (metonymy), Similarity of the names (folk etymology), Contiguity of the names (ellipsis), all of these types is changes that occur with time. Reference: * Ullman, Stephen. 2011. Pengantar Semantik. Pustaka Pelajar: Yogyakarta

Tuesday, October 22, 2019

Free Essays on African American Entrepreneurship

African-American Entrepreneurship In a comparative light, there seems to be significant problems, or obstacles, for African American entrepreneurs. These problems are categorized by environmental factors, and issues related to capital. There is an effort to trace the development of African American entrepreneurship throughout American history, in the post reconstruction era to the present, in relationship to social conditions of discrimination. Uniquely, African American entrepreneurs are involved in the affirmation of a paradox of American ideology. African American entrepreneurs, in pursuit of the American dream, have been taught to stress individual success where what is needed is communal solidarity to foster access to the things that they have been categorically denied. A high concentration of African American entrepreneurs are focused in the service economy. Although these jobs provide viable service and profit for many individuals, they are not high-profit occupations. This accounts for an African American ent repreneurship without a high market share. The reasoning for this can partially be explained by the Great Migration, a period lasting from 1900-1930, in which millions of African Americans migrated from the south to northern cities. Upon arrival in the north, African Americans faced entrepreneurial opportunities and already established European communities. With the arrival of these masses of African Americans came radical changes in the moderate status of race relations in the north. In Cleveland, the influx of African Americans prompted white fears over residential encroachment and occupational competition, resulting in a sharp rise in racial tension and and increase in institutional discrimination. This caused a transformation in the services that already existing African American entrepreneurs were providing. The newly racialized environment now regulated African American businesses to servicing only African Americans... Free Essays on African American Entrepreneurship Free Essays on African American Entrepreneurship African-American Entrepreneurship In a comparative light, there seems to be significant problems, or obstacles, for African American entrepreneurs. These problems are categorized by environmental factors, and issues related to capital. There is an effort to trace the development of African American entrepreneurship throughout American history, in the post reconstruction era to the present, in relationship to social conditions of discrimination. Uniquely, African American entrepreneurs are involved in the affirmation of a paradox of American ideology. African American entrepreneurs, in pursuit of the American dream, have been taught to stress individual success where what is needed is communal solidarity to foster access to the things that they have been categorically denied. A high concentration of African American entrepreneurs are focused in the service economy. Although these jobs provide viable service and profit for many individuals, they are not high-profit occupations. This accounts for an African American ent repreneurship without a high market share. The reasoning for this can partially be explained by the Great Migration, a period lasting from 1900-1930, in which millions of African Americans migrated from the south to northern cities. Upon arrival in the north, African Americans faced entrepreneurial opportunities and already established European communities. With the arrival of these masses of African Americans came radical changes in the moderate status of race relations in the north. In Cleveland, the influx of African Americans prompted white fears over residential encroachment and occupational competition, resulting in a sharp rise in racial tension and and increase in institutional discrimination. This caused a transformation in the services that already existing African American entrepreneurs were providing. The newly racialized environment now regulated African American businesses to servicing only African Americans...

Monday, October 21, 2019

Solar Energy Essays - Energy Conversion, Renewable Energy

Solar Energy Essays - Energy Conversion, Renewable Energy Solar Energy Tran 1 Solar Energy About 47 percent of the energy that the sun releases to the earth actually reaches the ground. About a third is reflected directly back into space by the atmosphere. The time in which solar energy is available, is also the time we least need it least - daytime. Because the sun's energy cannot be stored for use another time, we need to convert the suns energy into an energy that can be stored. One possible method of storing solar energy is by heating water that can be insulated. The water is heated by passing it through hollow panels. Black-coated steal plates are used because dark colors absorb heat more efficiently. However, this method only supplies enough energy for activities such as washing and bathing. The solar panels generate low grade heat, that is, they generate low temperatures for the amount of heat needed in a day. In order to generate high grade heat, intense enough to convert water into high-pressure steam which can then be used to turn electric generators there must be another method. The concentrated beams of sunlight are collected in a device called a solar furnace, which acts on the same principles as a large magnifying glass. The solar furnace takes the sunlight from a large area and by the use of lenses and mirrors can focus the light into a very small area. Very elaborate solar furnaces have machines that angle the mirrors and lenses to the sun all day. This system can provide sizable amounts of electricity and create extremely high temperatures of over 6000 degrees Fahrenheit. Solar energy generators are very clean, little waste is emitted from the generators into the environment. The use of coal, oil and gasoline is a constant drain, economically and environmentally. Will solar energy be the wave of the future? Could the worlds Tran 2 requirement of energy be fulfilled by the powerhouse of our galaxy - the sun? Automobiles in the future will probably run on solar energy, and houses will have solar heaters. Solar cells today are mostly made of silicon, one of the most common elements on Earth. The crystalline silicon solar cell was one of the first types to be developed and it is still the most common type in use today. They do not pollute the atmosphere and they leave behind no harmful waste products. Photovoltaic cells work effectively even in cloudy weather and unlike solar heaters, are more efficient at low temperatures. They do their job silently and there are no moving parts to wear out. It is no wonder that one marvels on how such a device would function. To understand how a solar cell works, it is necessary to go back to some basic atomic concepts. In the simplest model of the atom, electrons orbit a central nucleus, composed of protons and neutrons. Each electron carries one negative charge and each proton one positive charge. Neutrons carry no charge. Every atom has the same number of electrons as there are protons, so, on the whole, it is electrically neutral. The electrons have discrete kinetic energy levels, which increase with the orbital radius. When atoms bond together to form a solid, the electron energy levels merge into bands. In electrical conductors, these bands are continuous but in insulators and semiconductors there is an energy gap, in which no electron orbits can exist, between the inner valence band and outer conduction band [Book 1]. Valence electrons help to bind together the atoms in a solid by orbiting 2 adjacent nuclei, while conduction electrons, being less closely bound to the nuclei, are free to move in response to an applied voltage or electric field. The fewer conduction electrons there are, the higher the electrical resistively of the material. Tran 3 In semiconductors, the materials from which solar sells are made, the energy gap E.g. is fairly small. Because of this, electrons in the valence band can easily be made to jump to the conduction band by the injection of energy, either in the form of heat or light [Book 4]. This explains why the high resistively of semiconductors decreases as the temperature is raised or the material illuminated. The excitation of valence electrons to the conduction band is best accomplished when the semiconductor is in the crystalline state, i.e. when the atoms are arranged in a precise geometrical formation or lattice. At room temperature and low illumination, pure or so-called intrinsic semiconductors have a high resistively. But the

Friday, October 18, 2019

AIB service models encounter Assignment Example | Topics and Well Written Essays - 500 words

AIB service models encounter - Assignment Example Obstacles that might arise and the timeframe required to implement the proposals are also discussed. After using three blueprints models from different scenarios; it is evident that there is poor management set up. The organization has set up management that implies that the overall manager should handle all the issues that arise in the running of the hotel. All complaints are directed to the manager who otherwise should be delegating the concerned offices to address the issues. This set up leaves the manager over worked. When a female confirmation of the reservation made two weeks earlier is unable to be traced due to mishap in paperwork, the member of staff calls the manager to address the issue. This is a problem that the concerned department should be able to handle without the involvement of the manager. However, the manager should be the final person to be consulted if the department falls short of ability to address the issue. From the models employed, it is also evident that, the hotel suffers un-professionalism among its staff. The problem is even worse that this attribute is observed in the overall manager. According to Stephen (2012, pp. 132) the manager should be able to guide and mold the young and the employees below him. It is of no doubt that the manager should be able to motivate, guide and mentor the young and the new employees. Seeing the employees emulate good ethics should be the manager’s tall order. If the manager conducts himself in an unprofessional manner, it will be easy for the rest of the staff to emulate him (Stephen 2012, pp. 93). The manager acts inappropriately towards the attractive young client. He inappropriately became flirtatious and tried to get close to the lady-client. Further, he acts inefficiently as he stops at the vending shop and takes his time making his way to the same customer awaiting him. The manager is also rude and discriminating when addressing the person who was unable to access wheelchair as

The Student Protest Movement Essay Example | Topics and Well Written Essays - 1000 words

The Student Protest Movement - Essay Example In the USA, the Civil Liberties Movement had moved from the south toward the northern towns with the concerns of open accommodation, as well as the Black Awareness Movement. The German scholar movements were mainly a reaction in opposition to the perceived totalitarianism and two-facedness of the German administration and supplementary Western regimes, particularly in regard to the poor livelihood conditions of scholars (Keach, 2009, pp. 5). Students within 108 German campuses protested for the East Germany identification, the exclusion of regime administrators with Nazi accounts and for the students’ civil liberties. Madrid University learners protested the police participation in scholar demonstrations, objected the autocrat Francisco Franco's administration, and demonstrated concerning trade unions, as well as worker rights. Violent Protest in France and Italy In 1968, students utilized a wide variety of protest strategies, for instance, sit-in, professions, demonstrations, etc. However, particularly in France and Italy they often took part in violent protest. Students in Italy protested violently because they wanted to convert the political consciousness and assurance of a whole generation of youthful Italians. Scholars were facing limitations, as well as hardships and comprehended very evidently that totalitarianism and corruption within the university structure reflected an essentially exploitative societal order (Lichfiel, 2010, pp. 11). Therefore, a violent protest was their only option. They also demanded refusal of the purported campus reform bill being talked about in congress, which reintroduced restrictions on campus admission and forced mindless limits on diploma, as well as degree programs. Scholars were also confronting an administration ban on remonstrations. 16th March 1968, the police forcefully forced scholars to leave structures on the main university grounds, and the heads of the group chose to recapture the Architecture structure. In France, the bona fide logic of the 1968 violent objections was done to gain the incredible sense of emancipation, of self-determination for the scholars. The students desired the entire order, power, as well as tradition system to be brushed aside. The scholars wanted the Sorbonne campus reopened so that they could take it up and later announced it as an independent â€Å"people's institution of higher education† because they felt the campus was for everyone (O'Hagan, 2008, pp. 6). Additionally, socialists perceived a chance to act as a concession amid de Gaulle, as well as the Communists utilizing violent protests for results. On May 28th, Federation of the independent and communist Left, Francois Mitterrand declared that through violent protests they no longer have a state and was set to form a new-fangled regime. Violent protests brought about the beginning of a novel age to be dominated largely by the supposed new societal movements. Media’s framing devices to à ¢â‚¬Ëœunmake’ student protest in the 1960s Lumley says that by the initial 1968months the scholar movement within Italy had

Wk3multicult Essay Example | Topics and Well Written Essays - 750 words

Wk3multicult - Essay Example In the therapeutic situation, it would be a good idea to do a thorough interview and ask questions about their cultural ideas. A counselor can do this if they are sensitive to the issues. One of the largest differences between the APA and ACA guidelines for multicultural populations is the size of their documents; the APA guidelines were 103 pages while the ACA guidelines were only 3 pages. I think the difference was because the ACA seemed to need to break down each of their guidelines into several steps which meant a lot of documentation. The ACA guidelines were more succinct and gave an easier read. Another difference is that the ACA guidelines are broken down into three basic areas: Counselor awareness of their own cultural values and beliefs, counselor awareness of the clients worldview and culturally appropriate intervention strategies. The APA has five guidelines that are basically the same as the ACA guidelines. Both guidelines encourage practitioners to become aware of their own values and cultural biases. They both also explain that practitioners should have sensitivity to multicultural issues and to people. ACA guidelines emphasize education while APA guidelines research. In each case they are encouraging their practitioners to go be mindful of the "importance of multicultural sensitivity/responsiveness, knowledge and understanding" (APA guideline #2) when they are working with diverse groups. ACA guidelines are more specific to individual counselors. As an example, they suggest that culturally skilled counselors have an understanding of how "race, culture, ethnicity and so forth may affect personality formation†¦" (ACA Guidelines, B2). This seems to speak to a smaller group of practitioners than the APA guidelines do. These guidelines also suggest that psychologists are not only psychologists, but they are also educators and this means that they should teach multiculturalism in their education of others. The APA guidelines seemed

Thursday, October 17, 2019

Surviving Divorce Essay Example | Topics and Well Written Essays - 1250 words - 1

Surviving Divorce - Essay Example For sensitive beings, it really is a trauma, or may be more than that. To come out of the cocoon shell after the divorce, and start leading a normal life, is actually a task that demands a lot of determination, energy, and strength of character and mind. Surviving a divorce alone is not that difficult as it is when there are children. This paper tends to discuss how surviving a divorce is difficult, and how one should be able to survive it, with and without children. â€Å"More than 40 percent of marriages in America end in divorce† (The Survivor’s Club, para.2). There are a lot of people out there who have decided to get separated from their spouses, have signed the papers, have convinced their children that they would be going to live a single-parent lifestyle, have moved, and have finally settled. So, this is not something out of the world. People get married, and if they find out that they are not going to be compatible to spend their whole lives with each other, they get divorced. However, what happens next is a matter of sensibility and good planning. An ill-planned life after a divorce results in a greater havoc and a heavier mess than before. On the other hand, a well-planned life after a divorce brings much more happiness and satisfaction than the time before divorce. All of us have known someone who has survived a divorce with strength and potency; and, all of us have also known a person who has chosen to be a victim of t raumatic stress for good, or at least for many years after the divorce, not letting the dark shadows of sadness and gloom end. So, to survive a divorce or be a life time victim of stress and depression is all a matter of using sense and sensibility. Of course, there is pain attached to the whole thing, but how we lessen the pain, or bear it, is the magic trick. According to Wendy Walsh (para.2): A pain-free divorce is limited to those who are

Influential Legislation for Drug Related Crime Essay

Influential Legislation for Drug Related Crime - Essay Example Taking that into consideration, a key piece of legislation to observe is the documentation, which comes from the United Nations Office on Drugs and Crime. Legislation when best presented can give the greatest potential for success achieved. The words inside the proposed legislation, while being strong on their own merit when written carefully, can also be further aided by the weight of an organization which can accomplish the task of carrying the message which is found when looking inside the words on the papers. Such an organization to fit this idea would be the United Nations. The United Nations is an organization whose sole purpose it to aid, through words as well as actions taken, the efforts designed to combat problems which can have an adverse effect on a country, as well as the rest of the world at large. This would of course include such things as drugs and crime, with the lethal reality of consequences being felt if each are interlocked with the other and used to form either greater havoc on the unsuspecting public, and the unsuspecting world. The following is a direct quote from the first paragraph of the documentation. "Recognizing the drug problem was still a global challenge and constituted a serious threat to health, development and security, the Ministerial Segment of the Commission on Narcotic Segment of the Commission on Narcotic Drugs concluded its two-day session with the adoption of recommendations to enhance the implementation of drug control measures," (UN ODC pg. 1). This in itself is the beginning of a document that outlines the motives of this particular branch of the United Nations. It reads of the intentions of this group in the continuing war against drug-related crime, and how best to alleviate the problem(s) which most definitely come as a result. What is this commission, and what influence does it have The document answers this when it says that, "The Commission, the central policy-making body within the United Nations system dealing with drug-related matters, analyzes the world drug situation and develops proposals to strengthen the international drug control system," (UN ODC pg. 1). This statement alone begins to allude to the overall idea and purpose of this legislation, and the purpose of this group. It also begins to take a closer look at the UN's purpose itself in combating drug-related crimes. It shows itself as a dominant player in the war against drugs and the interlocking relationship that it holds with the criminal world. Drugs can have such a devastating impact on those who are forced to be in the situation. It can end lives, kill dreams, and leave lasting effects which can stay present for decades, and even centuries afterwards. Obviously, there are those who are willing participants in the act of drug trafficking, and the link between those drugs and the crime world. These are people who feel they have nothing to loose, and aren't afraid of those honest people who are out to avenge the wrongs committed against those who are defenseless. During the meeting which this document addresses it makes light of this fact. That is, "At that meeting, over 150 Governments adopted a Political Declaration, committing themselves to achieving significant and measurable reductions of the illicit supply and demand for drugs by the year 2008. The current ministerial segment constituted a

Wednesday, October 16, 2019

Wk3multicult Essay Example | Topics and Well Written Essays - 750 words

Wk3multicult - Essay Example In the therapeutic situation, it would be a good idea to do a thorough interview and ask questions about their cultural ideas. A counselor can do this if they are sensitive to the issues. One of the largest differences between the APA and ACA guidelines for multicultural populations is the size of their documents; the APA guidelines were 103 pages while the ACA guidelines were only 3 pages. I think the difference was because the ACA seemed to need to break down each of their guidelines into several steps which meant a lot of documentation. The ACA guidelines were more succinct and gave an easier read. Another difference is that the ACA guidelines are broken down into three basic areas: Counselor awareness of their own cultural values and beliefs, counselor awareness of the clients worldview and culturally appropriate intervention strategies. The APA has five guidelines that are basically the same as the ACA guidelines. Both guidelines encourage practitioners to become aware of their own values and cultural biases. They both also explain that practitioners should have sensitivity to multicultural issues and to people. ACA guidelines emphasize education while APA guidelines research. In each case they are encouraging their practitioners to go be mindful of the "importance of multicultural sensitivity/responsiveness, knowledge and understanding" (APA guideline #2) when they are working with diverse groups. ACA guidelines are more specific to individual counselors. As an example, they suggest that culturally skilled counselors have an understanding of how "race, culture, ethnicity and so forth may affect personality formation†¦" (ACA Guidelines, B2). This seems to speak to a smaller group of practitioners than the APA guidelines do. These guidelines also suggest that psychologists are not only psychologists, but they are also educators and this means that they should teach multiculturalism in their education of others. The APA guidelines seemed

Influential Legislation for Drug Related Crime Essay

Influential Legislation for Drug Related Crime - Essay Example Taking that into consideration, a key piece of legislation to observe is the documentation, which comes from the United Nations Office on Drugs and Crime. Legislation when best presented can give the greatest potential for success achieved. The words inside the proposed legislation, while being strong on their own merit when written carefully, can also be further aided by the weight of an organization which can accomplish the task of carrying the message which is found when looking inside the words on the papers. Such an organization to fit this idea would be the United Nations. The United Nations is an organization whose sole purpose it to aid, through words as well as actions taken, the efforts designed to combat problems which can have an adverse effect on a country, as well as the rest of the world at large. This would of course include such things as drugs and crime, with the lethal reality of consequences being felt if each are interlocked with the other and used to form either greater havoc on the unsuspecting public, and the unsuspecting world. The following is a direct quote from the first paragraph of the documentation. "Recognizing the drug problem was still a global challenge and constituted a serious threat to health, development and security, the Ministerial Segment of the Commission on Narcotic Segment of the Commission on Narcotic Drugs concluded its two-day session with the adoption of recommendations to enhance the implementation of drug control measures," (UN ODC pg. 1). This in itself is the beginning of a document that outlines the motives of this particular branch of the United Nations. It reads of the intentions of this group in the continuing war against drug-related crime, and how best to alleviate the problem(s) which most definitely come as a result. What is this commission, and what influence does it have The document answers this when it says that, "The Commission, the central policy-making body within the United Nations system dealing with drug-related matters, analyzes the world drug situation and develops proposals to strengthen the international drug control system," (UN ODC pg. 1). This statement alone begins to allude to the overall idea and purpose of this legislation, and the purpose of this group. It also begins to take a closer look at the UN's purpose itself in combating drug-related crimes. It shows itself as a dominant player in the war against drugs and the interlocking relationship that it holds with the criminal world. Drugs can have such a devastating impact on those who are forced to be in the situation. It can end lives, kill dreams, and leave lasting effects which can stay present for decades, and even centuries afterwards. Obviously, there are those who are willing participants in the act of drug trafficking, and the link between those drugs and the crime world. These are people who feel they have nothing to loose, and aren't afraid of those honest people who are out to avenge the wrongs committed against those who are defenseless. During the meeting which this document addresses it makes light of this fact. That is, "At that meeting, over 150 Governments adopted a Political Declaration, committing themselves to achieving significant and measurable reductions of the illicit supply and demand for drugs by the year 2008. The current ministerial segment constituted a

Tuesday, October 15, 2019

Web 2.0 Applications Essay Example for Free

Web 2.0 Applications Essay O’Reilly (2006) in his Commencement Speech at UC Berkley , explained that the genuine Web 2. 0 application is the one where there is a proportionality between the number of users and the development of the application. Because of this, it is argued that the core value of Web 2. 0 is being able to effectively harness the innovativeness of everyone in the group. This kind of development is a step forward as compared to the previous state of the internet where the Web as a platform remained a baffling mess of buzzwords with no real clarity. Spolsky(2005) agreed with this stating that Web 2.0 is â€Å"a big, vague, nebulous cloud of pure architectural nothingness† and that â€Å"when people use the term Web 2. 0, I always feel a little bit stupider for the rest of the day. † Although this is obviously true, in this specific sense, the concept of the Web 2. 0 application is nothing new at all to the World Wide Web. The term Web 2. 0 is used when a read-write aspect of the Web is used in a participatory way that actually creates greater shared knowledge for all. It was the widespread adoption of blogs, wikis, MySpace and other read-write techniques that ushered in a common I-write-and-everyone-reads-it usage pattern (Hinchcliffe 2006). The concept of Weblog or Blogging has been defined by Drezner and Farrell (2004) as â€Å"A web page with minimal to no external editing, providing on-line commentary, periodically updated and presented in reverse chronological order, with hyperlinks to other online sources. † Yet even though this definition exists, other researchers such as Nardi et al (2004) express that weblogs currently accessible in the internet have a great diversity that is there is not a single dominant style of activity in the net. Others (Dyrud , Worley Quible, 2005) agree with this but on the hand, they expressed that there is something common to all blogs and that is they are primarily a venue in order to share information (regardless of the amount and manner) between people, groups, and organizations. According to Blood (2000) there are essentially two types of weblog: those that emphasize the diary and comment aspect, and those that emphasize hyperlinks. The former may seek to influence wider public opinion, or merely to raise the profile of the blogger; the latter act as a filter system, looking at what exists on the Web and recommending content that might be of interest to visitors. If bloggers make mistakes in the information they publish, they rely on their peers to point out any errors (Johnson and Kaye 2004) – this sentence is very ‘stand alone’ you may wish to introduce the idea of authority of authority of Web 2. 0 technologies (which will presumably covered again in Wikis etc) . Thus, Blogs have unique features that traditional web media does not have. About 2. 7 million bloggers update their blogs at least weekly. According to Technorati, new blog creation continues to grow Figure X shows the number of new blogs created each day, from January 2004 to January 2006: As was mentioned above, there are various types of blogs and each variation provides the information to the user as different as possible. Factors to be considered are the type of the media to be used in order to transfer the information, the device that is used, the genre, the legal status of the publishers, blog search engines, and blogging communities and directories. One varying consideration to blogs is the kind of media that is used in order to share the message from the person/organization that would want to give the message to the recipient of the message. Take for example; a video blog is called a vlog, a blog that is comprised of links to other sites or networks is called a linklog. Another kind of blog that contains a series of sets of sketches is called a sketchblog and another type similar to a sketchblog is called a photoblog – one that comprises of photos being shared, uploaded and downloaded.

Monday, October 14, 2019

Static Code Analysis

Static Code Analysis Jim Kielt Table of Contents (Jump to) 1.0 Analysis 1.1 Cross-Site Scripting: 239 vulnerabilities detected. 1.2 File Manipulation: 9 vulnerabilities detected. 1.3 SQL Injection: 4 vulnerabilities detected. 2.0 Bibliography Table of Figures Figure 1 RIPS results output for bWAPP Figure 2 Line of code from xss_json.php vulnerable to Cross-Site Scripting detected by RIPS Figure 3 Returned message from xss_json.php Figure 4 Returned message from xss_json.php with a script being passed to the application. Figure 5 Returned message from secured xss_json.php with the script being passed to the application. Figure 6 Vulnerable to File Manipulation code detected by RIPS Figure 7 Link to uploaded file on unrestricted_file_upload.php showing path to uploads Figure 8 Attempted upload of a PDF file on unrestricted_file_upload.php Figure 9 Vulnerable to SQL Injection code detected by RIPS Figure 10 Message from SQL Injection on sqli_3.php 1.0 Analysis The open source project for analysis for source code vulnerabilities is The Buggy Web App or bWAPP. This application is deliberately insecure to help security experts and students of IT security learn about the vulnerabilities that exist on the Internet today, how they can be exploited and how they can then be secured. bWapp is a PHP application that makes use of a MySQL database. [1] To analyse the source code for vulnerabilities, a static source code analysis tool is required. RIPS is such a tool which is written in PHP and designed to find vulnerabilities in PHP applications. It transforms the PHP source code that it is analysing; into a programme model that can detect potentially vulnerable functions or sensitive sinks that could then be tainted by user input that causes vulnerabilities. [2] So a potentially vulnerable function in source code that uses a source containing user input creates a vulnerability. bWAPP is available as a virtual machine called buzz-box where it can run as a stand-alone web server on a lab/testing network. To analyse the buzz-box server, the RIPS application files need to be extracted to the buzz-box server’s document root i.e. /var/www/rips/. Then on the host machine’s browser, navigate to http://localhost/rips to bring up the main scanning page. The path to the file or directory and/or subdirectories to be scanned is entered along with some available options before the scan button is clicked. The available options for scanning are as follows: Verbosity level:1. User tainted 2. User, file and database tainted 3. User, file and database tainted secured 4. User, file and database untainted secured 5. Debug mode Vulnerability type: All or one of the following: Server-side all or one of the following: Code Execution, Command Injection, Header Injection, File Disclosure, File Inclusion, File Manipulation, LDAP Injection, SQL Injection, XPath Injection, and other. Client-side all or one of the following: Cross-Site Scripting and HTTP Response Splitting Unserialized / POP For the bWAPP analysys, /var/www/bWAPP was entered as the path with the subdirectories option checked. Verbosity level option 2 (User, file and database tainted) and vulnerability type option All was selected. After clicking the scan button, 198 files were scanned in the web directory and after just under a minute, the statistical output in figure 1 was generated. According to RIPS, the scanner works by tokenizing and parsing all of the PHP source code in the file or directory structure and tranforms the code into a program model which detects sensitive sinks that can be tainted by user input, the source throughout execution of the program. At a glimpse it can be seen that Cross-Site Scripting has been heavely detected along with some of the other top vulnerablilties found in web apps today. Of the 198 files scanned, 4251 sensitive sinks (vulnerable functions) were found of which 293 could be tainted by user input and therefore considered vulnerabilities. The three chosen vulnerabilites for futher analysis are as follows: 1.1 Cross-Site Scripting:239 vulnerabilities detected. Cross-site scripting (XSS) is an injection attack where malicious scripts can be passed through user input on to the web application to create undesired effects and generally performed through a client browser. An attacker can use his browser to use XSS to execute a malicious script to another browser user visiting the same page and have the script display unintended information or perform an unintended action. Because the user’s browser has no way to know if the script should be trusted or not, it has no option but to execture the script. The script or tainted data becomes embedded into the HTML output by the application and rendered by the users browser which can lead to website defacement, phishing or cookie stealing and session hijacking.[3] A potentially vulnerable function like echo() which prints data to the screen that uses a source like $_GET containing user input can create Cross-Site Scripting vulnerability, e.g: $title = $_GET[title]; echo ($title]); The above code would display whatever the user enters and could therefore be exploited. To demonstrate the Cross-Site Scripting vulnerability in bWAPP, the focus is on the bWAPP/xss_json.php file/page. Figure 2 shows the code snipit where user input was found and marked by the scanner (white dots) as a potential entry point for exploitation. Line 34 of the program places unchecked user input straight into a function which causes the vulnerablility. Figure 2 Line of code from xss_json.php vulnerable to Cross-Site Scripting detected by RIPS This page was opened in a browser and was titled ‘XSS-Reflected(JSON)’, displaying one textfield and a search button looking for the name of a movie to be entered. To test how this page works, ‘Spiderman’ was entered using the ‘Marvel’ hint ans submitted. The resulting message appeared below the textfield based on the input (see figure 3). Figure 3 Returned message from xss_json.php So the user input was displayed back in the output message which could mean that the input was probably unchecked. To test how the texfield responded to a simple script to display cookie information in an alert box, the following was entered and submitted: alert(document.cookie) The message this time did not display the entered script statement but instead tried to execute the script and displayed lines of the code from the page (see figure 4): Figure 4 Returned message from xss_json.php with a script being passed to the application. This message reveals information about the application that should never be dispayed and raises a security concern. A hacker could learn further how to exploit the application using this information. Mitigation: We should never trust user data entered into an aplication which needs to be screened for the likes of scripting code. All entered data should be encoded before being embedded into the output. HTML encoding converts untrusted user input into a safe format that can be used as output instead of executing as code in the browser e.g Converts ‘’ to ‘amp’. For PHP applications, HTML entity encoding is done via the htmlspecialchars() function which convert all special characters to HTML entities.[4] To encode any double or single quotation marks that could be interpreted by the application as code, the ENT_QUOTES parameter is used to prevent any injections and defining the correct charset prevents any special characters being used in the input e.g UTF-8 ASCII compatible multi-byte 8-bit Unicode. Line 34 shows the vulnerable code which was updated to incorporate the mitigation to make it secure. Vulnerable code: $title = $_GET[title]; Secure code: $title = htmlspecialchars ($_GET[title], ENT_QUOTES, utf-8); Once the code was secured, the same script code was entered and submitted and this time, the message showed the script statement in the message but this time treated it as a string and did not attempt to execute it (see figure 5): Figure 5 Returned message from secured xss_json.php with the script being passed to the application. 1.2 File Manipulation:9 vulnerabilities detected. File Manipulation can occur with Full Path Disclosure vulnerabilities where an attacker can see the path of a file in the url of a webapp, e.g. /var/www/htdocs/file. This gives the attacker a partial knowldege of how the application is structured or how the underlying operating system is arranged in order to mount different kinds of attacks. [5] Knowing the location of a particular file, the attacker could access and manipulate it by adding malicious code to compromise the webapp server or even upload an attack tool to that location. A potentially vulnerable function like move_uploaded_file() that uses a source like $_FILES directly from user input (upload) can create File Manipulation, e.g. move_uploaded_file($_FILES[file][tmp_name], images/ . $_FILES[file][name]); To demonstrate File Manipulation in bWAPP, the bWAPP/unrestricted_file_upload.php page was examined. Figure 6 shows the vulnerable code where unchecked user input (the selected file for upload) is used by the application. Figure 6 Vulnerable to File Manipulation code detected by RIPS When the page was opened in the broswer, a ‘Browse’ and ‘Upload’ button were displayed where an image file could be uploaded to the server. A test image file was uploaded and the resulting message returned the link to where the file is stored on the server. The link was followed to a directory called ‘images’in the bWAPP directory. Navigating to the images directory brought up a list of all files in the that directory (see figure 7). A PDF file was then selected and successfully uploaded so no file type check was in place. Effectively these files could be manipulated as described above or malicious files uploaded and executed like a webscript that take control of the server. Figure 7 Link to uploaded file on unrestricted_file_upload.php showing path to uploads Mitigation: Sensitive information like file locations should not be visable to the user and any path or file names displayed should be encoded to prevent leakage of this information. This could be achieved by changing the path and filename to a format that the server understands like a hashing function. The move_uploaded_file function should have the file checked that the files being uploaded are image files before being uploaded to the ‘images’ directory. Line 34 shows the vulnerable code which uploads any file to the ‘images’ directly without being firstly checked. The preg_match() function can be used to check for particular file extensions, in this case images file types, in a new $filename variable. [6] A file check statement was added to the vulnerable code that checks for the file type and will now only execute the original code as long as the file has the correct extension using an if statement. Line 166 uses the $file_error variable to determine if the upload is successful or not which determines the output, so $file_error is firslty set to an unsuccessful attempt message by default which is cleared if the correct file extension executes. Vulnerable code: move_uploaded_file($_FILES[file][tmp_name], images/ . $_FILES[file][name]); Secure code: $filename = $_FILES[file][name]; $file_error = Not an image file, try again; if(preg_match(/.(gif|png|jpg)$/, $filename)) { move_uploaded_file($_FILES[file][tmp_name], images/ . $_FILES[file][name]); $file_error = ; } Once the code was secure, another PDF file was browsed to and the ‘Upload’ button clicked and this time because the file is now firstly checked for file type and because pdf in not in the array of allowable files, the upload function does not execute (see figure 8): Figure 8 Attempted upload of a PDF file on unrestricted_file_upload.php 1.3 SQL Injection:4 vulnerabilities detected. SQL Injection attacks happen when SQL queries are successfully injected through user input data into the application that can reveal information about the database to allow for further attacks where the database can be modified by the insertion, updating and deletion of data. [7] The user input is crafted in such a way that it is interpreted by the application as SQL commands allowing the attacker contol over the database in even the operating system itself. A potentially vulnerable function like mysql_query() that uses a source like $_POST containing user input can create SQL Injection e.g $login = $_POST[login]; $password = $_POST[password]; $sql = SELECT * FROM heroes WHERE login = . $login . AND password = . $password . ; $recordset = mysql_query($sql, $link); To demonstrate the SQL Injection in bWAPP, the bWAPP/ sqli_3.php page was examined. Figure 9 shows the vulnerable code where unchecked user input is used by the application. Figure 9 Vulnerable to SQL Injection code detected by RIPS When this webpage is loaded, it shows a login screen for ‘superhero’ credentials requesting a login and password. A basic test for web applications for SQL Injection is the entering of the following command in place for the username and/or password: or 1=1 The single quote is interpreted by the web application as a special character in SQL which allows for the additional condition to the SQL command 1=1 which is of course always true and the double hyphen is intrepreted by the web application as a comment which closes off the query. When the or 1=1 statement is entered into the login and password fields, a welcome note is displayed (see figure 10): Figure 10 Message from SQL Injection on sqli_3.php This shows that this web page is vulnerable to SQL Injection attacks which uses unchecked user input directly by the application which could be exploited in compromising the server. Mitigation: The most successful defence against SQL injections is to never use user input directly in the application and to use parameterized queries (prepared statements) instead — which is supported by most languages — and to avoid using dynamic SQL queries or SQL queries with string concatenation. For PHP the mysql_real_escape_string() function can be used to escape special characters in a string for use in an SQL statement. Lines 137 and 137 of the code takes in the user inputs which are executed in the SQL statement in line 140 which is the vulnerable code really is. By implementing the mysql_real_escape_string() function into the code it will escape any special characters. [8] Vulnerable code: $sql = SELECT * FROM heroes WHERE login = . $login . AND password = . $password . ; Secure code: $sql = SELECT * FROM heroes WHERE login = . mysql_real_escape_string($login) . AND password = . mysql_real_escape_string($password) . ; Once the code was secured, the or 1=1 statement was entered again into the login and password fields and this time instead of getting the previous message as above, the invalid message displayed (see figure 11) Figure 11 Message after attempted SQL injection on secured sqli_3.php 2.0 Bibliography [1] itsecgames. 2015. itsecgames. [ONLINE] Available at: http://www.itsecgames.com/. [Accessed 19 February 2015]. [2] RIPS free PHP security scanner using static code analysis. 2015. RIPS free PHP security scanner using static code analysis. [ONLINE] Available at: http://rips-scanner.sourceforge.net/. [Accessed 19 February 2015]. [3] Cross-site Scripting (XSS) OWASP. 2015. Cross-site Scripting (XSS) OWASP. [ONLINE] Available at: https://www.owasp.org/index.php/XSS. [Accessed 19 February 2015]. [4] PHP: htmlspecialchars Manual . 2015. PHP: htmlspecialchars Manual . [ONLINE] Available at: http://php.net/manual/en/function.htmlspecialchars.php. [Accessed 25 February 2015]. [5] Full Path Disclosure OWASP. 2015. Full Path Disclosure OWASP. [ONLINE] Available at: https://www.owasp.org/index.php/Full_Path_Disclosure. [Accessed 02 March 2015]. [6] PHP: preg_match Manual . 2015. PHP: preg_match Manual . [ONLINE] Available at: http://php.net/manual/en/function.preg-match.php. [Accessed 25 February 2015]. [7] SQL Injection OWASP. 2015. SQL Injection OWASP. [ONLINE] Available at: https://www.owasp.org/index.php/SQL_Injection. [Accessed 19 February 2015]. [8] PHP: mysql_real_escape_string Manual . 2015. PHP: mysql_real_escape_string Manual . [ONLINE] Available at: http://php.net/manual/en/function.mysql-real-escape-string.php. [Accessed 25 March 2015].

Sunday, October 13, 2019

Germany :: essays research papers

Germany is located in Central Europe. It borders the Baltic Sea and the North Sea. It is between the Netherlands and Poland, south of Denmark. It is slightly smaller than Montana.   Ã‚  Ã‚  Ã‚  Ã‚  Germany’s economy was the world’s third most powerful in 1997. The German economy benefited from robust exports, particularly to other members of the EU and the US, as well as strengthening equipment investments. But anemic private consumption and contraction in the construction industry limited the expansion. Unemployment continued to set post-war monthly records through the end of 1997 and averaged 4.3 million for the year. In preparation for the first of January 1999, the start of the European Monetary Union, the government has made major efforts in 1996-97 to reduce the fiscal deficit. This effort has been complicated by growing unemployment, an erosion of the tax base, and the continuing transfer of roughly $100 billion a year to eastern Germany to refurbish this ex-communist area. In recent years business and political leaders have become increasingly concerned about Germany’s decline in attractiveness as an investment target. They cite increasing preference by German companies to locate new manufacturing facilities in foreign countries rather than in Germany, to be closer to the markets, and to avoid Germany’s high tax rates, high wage cost, rigid labor structures, and extensive regulations. For similar reasons foreign investment in Germany has been lagging for years.   Ã‚  Ã‚  Ã‚  Ã‚  Germany is one of the world’s leading industrial nations. Western Germany is among the world’s largest and technologically advanced producers of iron, steel, coal, cement, chemicals, machinery, vehicles, machine tools, and electronics. Eastern Germany’s industries are metal fabrication, chemicals, brown coal, shipbuilding, machine building, textiles, and petroleum refining. Industry employs around 41 percent of the German work force. Germany’s biggest industry is vehicles because of luxury cars such as the BMW, Mercedes-Benz, and Porsche, but you can’t forget the VW Beetle.   Ã‚  Ã‚  Ã‚  Ã‚  German exports value at 521.1 billion dollars. Manufacturing, such as machines and machine tools, chemicals, motor vehicles, and iron and steel products, totals over 88 percent of all exports. Agricultural products account for 5 percent, raw materials for a little over 2 percent, and fuels as 1 percent. Other non-mentioned products total about 3 and a half percent.   Ã‚  Ã‚  Ã‚  Ã‚  German imports value at 455.7 billion dollars. manufactured items are also the most imported at a little over 74 percent of all imports. Agricultural products equal around 10 percent, fuels are over 6 percent, and raw materials are almost 6 percent. Other non-mentioned materials are under 4 percent of the total imports.   Ã‚  Ã‚  Ã‚  Ã‚  The labor force is roughly 38.7 million people. As said earlier industry employs around 41 percent, agriculture employs 3 percent, and services employ

Saturday, October 12, 2019

Windmill Energy is not an Acceptable Energy Source Replacement for Cali

Windmill Energy is not an Acceptable Energy Source Replacement for California Abstract Windmill energy is an old form of energy that is now being modernized to generate electricity in our society today. The big question is whether or not it is a feasible replacement of energy for California. Through research it has been concluded that energy for California cannot be produced only by windmill energy. It can produce about 50% of California’s energy. All aspects including, location, cost, and environment are important to how much energy is produced. Introduction From past to current situations, the United States has had to rely more and more on foreign countries to retrieve an efficient amount of fossil fuel. During these times, the production of nuclear energy had come to a halt and foreign energy was used. In 2000- 2001, California went into an energy crisis where there was an increase in the cost of gas and numerous blackouts. There were no longer any low-priced energy sources. Currently, gas prices have been soaring and it is not expected that they will reduce. Due to these circumstances, California has been in need of a more efficient energy source, outside of oil. For current times, an efficient energy source for California can be windmill energy because of its low-cost, California’s enormous coastal areas and locations, and environmental issues. Wind power has been a part of our lives longer than we have thought. â€Å"The Egyptians are believed to be the first to make practical use of wind power. Around 2800 Wind Energy 3 BC†¦Ã¢â‚¬  (Park, 1981, p.13). Today, wind power can be used to heat up homes, produce electricity, and pump water. Windmills can be made by putting together old car generators. In the past, farmers would use ... ...m/cgi-bin/article.cgi?file=/chronicle/archive/2001/02/27/MN200385.DTL Wolff, W. & Brabant, E.J. (1984). Your Wind Driven Generator. New York: Van Nostrand Reinhold Company. Wind and Hydropower Technologies Program. U.S. Department of Energy. Retrieved August 3, 2006 Wind Energy 8 http://www.eere.energy.gov/windandhydro/windpoweringamerica/astate_template.asp?stateab=ca (1996-2005) Part 5- The Future of Wind Power. Illustrated History of Wind Power Development. Retrieved August 3, 2006 from http://www.telosnet.com/wind/future.html Saum, S.B. (2005, November) Power Hunting. California Alumni. Retreived August 3, 2006 http://www.alumni.berkeley.edu/Alumni/Cal_Monthly/November_2005/Power_hunting.asp (2006, July). Watts Up? Schwarzenegger Weathers Perfect Energy Storm, Barely. Politics Central http://politicscentral.com/2006/07/29/watts_up_schwarzenegger_weathe.php

Friday, October 11, 2019

Jack London’s The Call of the Wild: A Review Essay

In Jack London’s novel The Call of the Wild, the main character, Buck, has developed from a house dog to a sled dog. Buck, being forced to adapt in order to survive, has made him become the leader of the pack. When Buck was being attacked by the man in the red sweater, â€Å"He saw, once for all, that he stood no chance against a man with a club. He learned the lesson, and in all his afterlife he never forgot it† (11). This shows that eventually Buck realized that he had to learn to respect the club. Also, Buck learned that he is not able to beat everyone, he must accept defeat sometimes. And once he would respect the club, the club wouldn’t hurt him. With Buck pulling the sled every single day, â€Å"his muscles became as hard as iron, and he grew callous to all ordinary pain† (25). Buck is developing and is becoming stronger to pull the sled. Also, the pain in Buck’s feet have disappeared since he is so use to having the same monotonous running every day. Later in the book, Buck was able to pull a 1000 pound sled. This shows that Buck has truly developed into a sled dog, because a house dog would never be able to achieve that. Also, being able to pull a 1000 pound sled means that he has grown stronger from all the running that he has done over the last few months. With him getting stronger and learning to respect the club, Buck has truly turned into an incredible sled dog.

Thursday, October 10, 2019

Human Nature and Power Essay

During the Renaissance, many brilliant philosophers have explored the concept of human nature. The question, what motivates humanity has been taken into consideration in the composure of virtually every society. By establishing that premise, many went on to create an ideal society with the intention of developing that thought. Niccolo Machiavelli and Thomas More are outstanding representatives among them. In both More’s Utopia and Machiavelli’s The Prince, perfect societies are constructed. However, More and Machiavelli have different opinions about the human nature in relation to the role of power and authority. Thomas More optimistically describes human nature. He depicts that man by nature is good-willed and conforming. He believes that human nature can be improved. Therefore, if the governing power is to be removed then man would be a less hostile force. Niccolo Machiavelli, on the other hand, describes human nature negatively. Man is untrustworthy, ungrateful, greedy and lying. Machiavelli suggests that man will never change and that one will always attempt to overcome the other. Power and authority is implied in the very essence of Machiavelli’s work. It is tied in with the greed and selfishness. More believed human nature to be good, created by God, and susceptible to great improvement if social, political, and economic conditions were reformed so that human misery were eliminated and that fundamental human virtue were thereby liberated and nurtured. More believed in socialism insofar as it would eliminate private property, which he saw as the root of evil. He believed that when private property exists, and when money dominates all other considerations, then â€Å"it is hardly ever possible for a commonwealth to be governed justly or happily. † More believes that justice simply cannot exist when the â€Å"worst citizens† own the â€Å"best things,† or â€Å"where property is limited to a few. † In such a situation, those who have so much are â€Å"always uneasy,† fearing they will have it taken, and those who have so little â€Å"are utterly wretched† (More 38). Where there is no justice, people will believe that there is no reward for virtue, which will result in people behaving according to their lowest standards, rather than according to their highest. In Utopia, Thomas More’ view of human nature is far more positive than negative. While he certainly shows an awareness of the flaws in human beings, he attributes those flaws more to the environment, and political and socioeconomic factors, than to the nature of humanity. In other words, More shows that human nature can be altered by altering the environment. If the environment is improved, meaning socially, politically and economically, then the behavior of human beings will be improved, bringing out the best in human nature. So in More’s view, if the governing power and authority is to be removed then man would be a less hostile force. Machiavelli expresses his view of the basic lack of goodness in human nature. He believes that in general, most people have a primary interest in themselves, and are motivated by their financial greed. Men are mainly concerned with their property and honor. â€Å"When neither their property nor their honor is touched, the majority of men live content†¦ † If he â€Å"wishes to profess goodness at all times† he â€Å"must fall to ruin among so many who are not good. † If he wishes to maintain his power, he must â€Å"learn how not to be good, and to use it or not according to necessity† (Machiavelli 127). Machiavelli, envisions society as one that turns to power and satisfaction of vices as seen through The Prince. Machiavelli advises that to keep power one must learn to be corrupt. This advice is given due to the idea that one who knows not corruption and believes in honesty is faced with those who use manipulation as part of the job. Machiavelli also sees pursuing virtue as an act that leads to ruin, while serving vice will fortify life. Human nature is one that tends to be drawn to pleasant, satisfactory things. If there is no benefit to the self for actions performed, motivation to perform such actions will be low or nonexistent. As seen throughout history, many actions have been taken in order for people to gain power, even if that action is genocide. Men are willing to step over men in order to have power and make an enjoyable life for hisself. Such occurrences can be seen multiple times, being unprompted and completely by choice of the power hungry. According to the different point of view of human nature from More and Machiavelli above, we can understand how More and Machiavelli view power and the role of power and authority. In the Prince, the authority is in either monarchy or dictatorship. Machiavelli focuses on the manipulation of the people to maintain power. The importance lies in the fact that in a monarchy or dictatorship, one person has the power in a society and all the rest serve only to obey him. Starkly different is More’s creation. His society is a true communist one and it could also beargued that it is also a democracy. Leaders are elected by the people, who make their owndecisions freely. Nothing, not even power, is owned in that society by an individual. The power is distributed, thus empowerment. The capitalism of Machiavelli’s world, the idea strongly ties in with this contrast. it was written for the use of one man to dominate over and control his kingdom, it was obviously not meant for lesser mortals. It in itself is a tool of power which could be used for only the good of the prince who uses it. Whether or not the people are empowered does not matter, it is irrelevant. It only matters that theprince uses it to maintain his own power. In contrast, Utopia is a fantasy written by More tosuggest an alternative way of life for the people. He focuses very little on the doings of the princein his ideal society; what matters in Utopia is the actions of the people. One might even say thatthe people are empowered, but the ideals that truly run the society, are empowered. More’s truefocus does not even lie in power, but in the seeking of ideals. The Utopian society highlights the unwritten laws of morality that humans possess if they are raised in a society that promotes honesty and virtue. However, Machiavelli argues that men are evil and inherent selfishness, no matter how pleasant a society raises them. People’s natural tendency to lie, cheat, and steal swells up without any restrictions, destroying not only their own community but also their government. It is implied that the treatment of criminals is harsh and strict. In Utopia, More describes how this ideal society punishes its’ criminals and it is obvious that they are mild and gentle. Since vice is not only destroyed, and men preserved, but they are treated in such a manner as to make them see the necessity of being honest (Utopia, 14). Although More and Machiavelli’s opinions differ greatly in their view of human nature, both works are unbelievably intriguing in that each of the societies would leave an incredible mark in history. The visual given through More’s Utopia portrays society an optimist’s view. More believes that when given all equal opportunities and provisions, people will lead a virtuous, unselfish life. People will work for the benefit of other people in order to create an equal and pleasant society. People only turn to corruption when faced with shortages or vanity in believing some deserve more than others. So in More’s Utopian world, the governing authority is removed and the power is distributed. However, in the Prince, People’s natural tendency to lie, cheat, and steal swells up without any restrictions, power and authority is implied in the very essence of Machiavelli’s work. It is tied in with the greed and selfishness. So Machiavelli focuses on the manipulation of the people to maintain power.

Wednesday, October 9, 2019

Application Of Ethical Theory To A Case Study Philosophy Essay

Application Of Ethical Theory To A Case Study Philosophy Essay John is a loyal employee and has been working at the same firm for many years, since the current manager was a child but a year ago John’s son and wife died in an accident, which led to John being depress. He turn up for work late, sometimes drunk and often absent. He has been repeatedly warned but his behaviour hasn’t change. The manager decides to keep him on the job; did he do the right thing? It can be acknowledge that business ethics is the process or the study of standard and principles that guide the expected behaviour in the business world. Although businesses must make a profit to ensure survival, efforts must be made in order to balance the aspiration for profit against the desires and needs of society. (Ferell 2002). Ethical decision-making is the process by which one makes choices about ethical issues, based on a set of standards that separate right from wrong. It reflects an understanding of the principles inherent in ethics, and the various philosophical approaches to ethical decision-making. Ethical decision-making also requires a systematic framework for tackling difficult and often controversial moral questions, as mention in the case study on whether Michael has done the right thing by keeping John on the job. With the business world changing all the time, a large variety of stakeholders may have an interest with an establishment, such as customers, shareholders, the media, government, non- government, employees and investors. Undoubtedly, they have a shifting level of authority on the growth and operation of the business. The case study illustrate 4 key stakeholder; Michael the manager, employees, family members and customers. It is vital that every stakeholder is taken into account before a decision is made. As mention by Freeman (1984) a stakeholder of an organisation is people who can influence or is impinge on by the achievement of the business objectives’. For instance to sack John, will it help his family? Will it help other employees? Will it benefit the business? All these questions must be taken in account before sacking John. A factor that determines a decision is based on how pertinent or important the case is, or the intensity of the issue.   The importance of issues varies from time to time, and is influenced by one’s values and beliefs. Individuals and their values is one of the greatest challenges faced as it relates to organizational ethics.   Individual factors are important in evaluating and resolving ethical issues.   Conflicts between co-workers usually arise in the workplace and decisions that are made are based on their beliefs and moral philosophies.  Ã‚   Ethical issues importance reflects an individual’s feelings, thereby activating the ethical decision-making process.   The management can influence an ethical decision through rewards or punishments.   Employees should train workers on how to handle ethical issues which is a step in developing the employees’ ability to make decisions which will also enhance organizational ethics. Without a doubt, the decision to dismiss John will have a major impact on him. This is due to the fact that he is unskilled. Getting back to employment will be difficult as all businesses will look for someone who has skilled. In addition it will be hard to get back into employment due to the fact that businesses may ask him why he left his previous job and to say â€Å"I got the sack† will not please to the employee.