Saturday, September 7, 2019
Lord of the Flies Essay Example for Free
Lord of the Flies Essay Every child, regardless of when, loses their innocence; it is inevitable. In Lord of the Flies, the reader can recognize this law live up to its word, namely in the protagonist Ralph. Upon arriving on the island, Ralph was oblivious to the circumstances he was soon to be subjected to. Ralphââ¬â¢s innocent and childlike mindset has distorted itself into that of a hostile hunter. In William Goldingââ¬â¢s Lord of the Flies, the reader witnesses the Loss of Innocence theme and observes Ralphââ¬â¢s descent into impurity. Ralph is first portrayed as just another kid, waiting for his problems to disappear. He had no plan on how to get off the island, and no reason to worry about it; ââ¬Å"daddyâ⬠would take care of it for him. Ralph was not concerned about what to do about the situation he was in, and told Piggy why. Ralph tells Piggy, ââ¬Å" Daddy taught me. Heââ¬â¢s a commander in the Navy. When he gets leave heââ¬â¢ll come and rescue usâ⬠¦ Theyââ¬â¢d tell him at the airport. â⬠(7) Ralph relied upon the airport telling his father where their plane crashed, with little to no knowledge as to where they could have landed. Though the odds were very slim, Ralph counted on his daddy coming to get him from the island in the middle of the Pacific. He was like a helpless little child, grasping his daddyââ¬â¢s hand and waiting to be led. With the increase of time spent on the island, Ralphââ¬â¢s innocence begins to diminish. Ralph is no longer the helpless little child he once was when he first landed; Ralph has evolved from a benign child to a hostile hunter. After going hunting with the boys, Ralph tried to regain the groupââ¬â¢s attention as they all focused on Jackââ¬â¢sââ¬â¢ wounded left arm. Ralph reminisced on how he hit the pig with his spear and then began to act as though Roger were the pig, jabbing at him while Roger rushed away. Soon, the group surrounded Robert, all participating in the jabbing: ââ¬Å"Ralph too was fighting to get near, to get a handful of that brown, vulnerable flesh. The desire to squeeze and hurt was overmastering. â⬠(101) The boys all got hold of Roger and, without any second thought, began to poke at him, hurting him as a result. The ââ¬Å"innocent Ralphâ⬠would have attempted to prevent the actions, rather than beginning the prodding of Roger. Ralph has evidently lost his innocence and this situation shows no different. As Ralph spends more time on the island, he, along with the reader, becomes aware of his loss of innocence.. After the deaths of both Simon and Piggy, Ralph has officially become a loner. Everyone else on the island has transferred over to Jackââ¬â¢s group of uncivilized hunters, the polar opposite of the group once run under Ralphââ¬â¢s chieftainship. Knowing that Ralph is now an independent individual in hiding, Jack sweeps the island to ensure that he finds Ralph. After Samneric reveal Ralphââ¬â¢s position, however, Jack lights the island on fire so Ralph cannot escape the fiery wrath of the opposing chief. After desperately sprinting away from the hunters, Ralph runs into a naval officer. The officer questions Ralph about the group and after answering these questions, Ralph has another moment of clarity and begins sobbing. ââ¬Å" Ralph wept for the end of innocence, the darkness of manââ¬â¢s heart, and the fall through the air of the true, wise friend called Piggy. â⬠(182) After being given the chance to relax, Ralph begins to grasp the concept that he has changed throughout this entire experience. The innocent stage has now passed, for himself and the rest of the group. Ralph now knows that he is no different from the other children; all children lose their innocence at some point. Goldingââ¬â¢s depiction of Ralph from the beginning of the novel to the end of the novel greatly reflects the theme of loss of innocence. Ralph evolves from the helpless child to the hostile hunter after the crises he is put through. Ralph is a representation of every child on the earth and the inescapable loss of innocence. Through Ralph, the reader can learn that a crisis, no matter the scale, can affect the victim.
Friday, September 6, 2019
Csr in Inidan Banking Sector Essay Example for Free
Csr in Inidan Banking Sector Essay State regulatory bodies, NGOs, media, customers have significantly addressed social responsibility issues in banking sector. International organization such as World Bank also exerts pressures on banks to analyze social and environmental risk involved in projects to be financed. In addition the reputation and resultant profitability of an organization are greatly effected by their CSR activities. Researchers have found a positive correlation between CSR and financial performance of the organization. Around the globe, a good commitment is being shown by the banking industry to CSR principles. Banks are showing conscious efforts to reduce the regulatory actions by depicting a good environmental citizen image. Banking in India has originated in the last decades of the 18th century with the establishment of General Bank of India in 1786, and the Bank of Hindustan set up in 1870 (both banks are now defunct). At present, the commercial banking structure in India consists of Scheduled Commercial Banks Unscheduled Banks. Banking in India has evolved in four distinct phases: Foundation phase, Expansion phase, consolidation phase and Reforms phase. An integrated approach of combining CSR with the ultimate customer satisfaction is being adopted by Indian banking industry voluntarily. An attempt has been initiated to ensure social responsible behavior of banking sector in a more systematic manner. Public and private sector banks have common thrust areas which are children welfare, community welfare, education, environment, healthcare, poverty eradication, rural development, vocational training, womenââ¬â¢s empowerment, protection to girl child, employment. The core areas for reporting CSR activities are slightly different in both public and private sector banks. The major areas investigated for reporting CSR activities in public and private sector banks is shown by the Figure 1 and Figure 2 respectively below: X axis in the below charts represents the fields of CSR activities and Y axis represents the number of banks working in the particular fields out of the selected sample. Figure 1: Core thrust areas for reported CSR activities in public sector banks Source: 1-IJAEBM-Volume-No-1-Issue-No-2-CSR-Practices-and-CSR-Reporting-in-Indian-Banking-Sector-058-066 As per the chart above rural development has been the ost actively participated activity for Indian public sector banks. Besides, their primary focus has been on gender equality through women empowerment. Figure 2: Core thrust areas for reported CSR activities in private sector banks Source: 1-IJAEBM-Volume-No-1-Issue-No-2-CSR-Practices-and-CSR-Reporting-in-Indian-Banking-Sector-058-066 Enhancing the level of education and employment has been the major areas for reporting CSR activities i n Indian private sector bank. Following are community welfare, programs for child welfare and protection of environment. 3. 1 RBI guidelines on CSR: On December 20, 2007 RBI circulated a notice for all the scheduled commercial banks to highlight the role of banks in corporate social responsibility, with title ââ¬Å"Corporate Social Responsibility, Sustainable Development and Non-Financial Reporting ââ¬â Role of Banksâ⬠. Major issues discussed in the notice were regarding ââ¬â 1. Corporate Social Responsibility 2. Sustainable Development 3. Non-Financial Reporting Talking about the corporate social responsibility program RBI followed many international initiatives to highlight the importance of the notice like ââ¬â 1. United Nations Environment Program Finance Initiative (UNEP FI) 2. They can achieve the mission by supporting initiatives that are * Cost effective * Capable of large-scale replication * Measurable * Having potential for both near and long-term impact. * Banks must provide appropriate training to its employees on environmental and social risks in lending to ensure that climate change is taken into account in corporate banking decisions. 6. Conclusion The CSR moment in the banking sector is slowing picking the pace. Many banks are showing their inclination and interest towards the CSR activities and believe it as their social responsibility. On the other side CSR reporting practices are far from satisfaction. There are hardly few banks which report their activities on triple bottom line principles. The lack of uniform standards for rating CSR practices leads to problem in comparison of corporate houses and difficulty in determining the CSR rating. In spite of the slow adaptation of CSR reporting practices in India, it is predicted to pick up a great pace in near future. The need for enacting some stringent regulatory provisions to ensure adherence to social responsibility principles is necessary. https://ru.scribd.com/doc/19779226/CSR-PROGRAM-IN-BANKING-SECTOR-AN-INDIAN-PERSPECTIVE http://www.karmayog.org/ https://en.wikipedia.org/wiki/Reserve_Bank_of_India https://en.wikipedia.org/wiki/Corporate_social_responsibility
Thursday, September 5, 2019
Theories of Personality | Essay
Theories of Personality | Essay Psychologists have long been interested in the study of personality because it is useful for understanding and predicting human behaviour. Even laypersons in day to day life, on an intuitive basis, make personality judgements about individuals they meet based on social characteristics, intellectual quality and appearance. Moreover, one seeks to understand oneself by identifying and developing personality. Personality determines the way in which individuals think and behave, it affects the way one would conduct oneself in day to day actions. Individuals possess unique patterns of behaviour varying from the way one walks, talks, or eats to the way one spends free time. The vast array of forms that personality takes accounts for why individuals are different from one another. The reason why it is important to understand such individual differences of personality is because job performance, academic performance, political and social attitudes, social relationships and health are all affe cted by oneââ¬â¢s personality. Personality psychology seeks to bring scientific rigor to the process of understanding different personalities. Apparent qualities and behaviours may differ from the real inner personality of an individual. Consequently defining and understanding personality is a difficult task. A significant amount of definitions of personality have been introduced by various psychologists. Among such definitions was a comprehensive definition put forward by Burger. Burger (2011) defined personality as consistent behaviour patterns and intrapersonal processes that originate from within the individual. Due to the complexity of understanding and identifying human personality, various theories of personality have been introduced over the years by various psychologists. Sigmund Freud, devised what is today a popular theory, known as the structural theory of personality (Freud 1923 cited in McLeod 2013). The theory was devised based on the psychodynamic perspective which emphasises the influence that forces and drives within the unconscious mind have on human behaviour. Freud portrayed the human mind as an iceberg (Freud 1900, 1905 cited in McLeod 2013). The tip of the iceberg, which is the small section visible above the surface, symbolises the conscious mind. Just beneath the conscious mind is the preconscious mind which is outside oneââ¬â¢s awareness but is easily accessible. The bottom of the iceberg which takes up the majority of its volume is the unconscious mind. The structural theory of personality assembles personality into 3 systems; the id, ego and superego. The balance of these 3 structures results in oneââ¬â¢s personality. The id, which is in the unconscious mind, is the instinctive and primitive component of personality. Life instincts (Eros) and death instincts (Thanatos) are the basic instincts that are constituent of the id (Freud 1920, 1925 cited in McLeod 2013). The id operate on the pleasure principle in which basic instincts, specifically the desire for food and sex, require immediate gratification, regardless of any consequences (Freud 1920 cited in McLeod 2008). The id, similar to the way of an infant crying in order to get what it wants, has no regard for social norms. In order to mediate between the external world and the selfish desires of id, the ego develops. The ego, abiding in the conscious mind, is the component of personality that makes decisions and finds realistic and reasonable ways to satisfy the desires of id. The egoââ¬â¢s essentiality is to make compromises and exercise social etiquette in order to avoid disapproval or consequences of society. There is a third influential a nd largely unconscious set of forces which dictates oneââ¬â¢s beliefs and morals, called the superego. Oneââ¬â¢s beliefs of what is right and wrong is acquired through childhood experiences and nurturing. When one behaves in a way that one believes is morally incorrect, the superego causes one to feel guilty. Superegoââ¬â¢s goal unlike the id and ego is moral perfection. According to the manner in which the id, ego and superego interact, Freud suggested that there are 3 personalities; the psychotic personality, neurotic personality and healthy personality. A healthy psyche is one of which the egoââ¬â¢s role is dominant over superego and id. When the conflict between superego and id become overwhelming the unconscious processes of ego use defence mechanisms (repression being one of the most common defence mechanisms) in order to protect the self from anxiety. The psychotic psyche is one in which id is dominant and causes the individual to act in an impulsive and asocial m anner. The neurotic psyche is one in which superego is governing and causes the individual to be a perfectionist, unreasonably guilty and neurotic if any moral code is broken to obtain pleasure. The structural theory of personality is a highly comprehensive theory. The theoretical system explicitly explains and interprets an exceptional range of human behaviour and experiences, which is essential in understanding the different types of personalities. Contemporary psychology engages certain concepts of the psychodynamic theory and heuristic value of the theory has been appreciated (Shaver and Mikulincer 2005). Freudââ¬â¢s controversial ideas ââ¬â that unconscious forces exist and influence behaviour, that early experiences play a large role in development of personality, that individuals resist threats by using defence mechanisms and that conflicting feelings often result in compromise ââ¬â are accepted now by many psychologists and research conducted has given evidence to the validity of Freudââ¬â¢s views (Westen 1998; Baumeister, Dale and Sommer 1998). While other perspectives, particularly social and cognitive perspectives, emphasise typically on proximal cau ses, the psychodynamic perspective emphasise on distal causes of behavioural processes as well. The use of case studies as a research method to study personality esteems the complexity of personality and resulting behaviour by investigating in depth as opposed to a brief, snapshot laboratory study. However critics assert that there are several problems with the case study method that Freud used in constructing the structural theory of personality. Patientsââ¬â¢ observations were not recorded immediately upon hearing them, therefore Freudââ¬â¢s memory of such detailed and extensive accounts of participants may have been distorted, and/or later recorded in a biased manner (Sulloway 1991). Furthermore the subjects of Freudââ¬â¢s case studies, on most occasions, were wealthy European individuals making the meagre sample unrepresentative and too illusive to draw universal conclusions about human behaviour. Consequently, the precision of the structural theory of personality is impaired. The testability of the structural theory is a major problem because propositions and concepts are ambiguous. The ambiguity results in difficulty in deriving a clear hypothesis that can be put to test and proven. Much of the theory is presented in metaphors ââ¬â life and death instincts, and the mind depicted as an iceberg ââ¬â which complicates any attempt to scientifically test and prove the theory. In addition, the structural theory of personality helps in explaining behaviour after observation but does not contribute substantially to predicting behaviour, which essentially, is a main purpose of studying personality in the first place. The theory can further be criticised because it is deterministic. It gives a degrading and pessimistic view of human nature because one is thought to be irrational and controlled by sex and aggressive tendencies. While numerous assumptions come into play, the explanation is still restricted to biological forces, and ignores other influences on personal development that may include altruism, competence, exploration and freewill. The scientific validity of Freudââ¬â¢s theory has been challenged by Eysenck. After a review of clinical literature, Eysenck found that out of 7,000 case histories of neurotic patients, 66% of patients treated by means of psychoanalysis improved, however 72% of patients who were not treated by means of any therapy improved within 2 years after the onset of their illness (Eysenck 1952). These findings oppose the validity of the concepts of the psychoanalytical approach and the structural theory of personality. A contemporary theory of personality proposed by Mischel and Shoda takes into account the cognitive and affective processes that have an influence on behaviour and gives more focus to situationism. Situationism is the assumption that individualsââ¬â¢ behaviour is directed by the situation the individual is in rather than dispositional traits. The cognitive-affective system theory of personality was proposed to resolve the contradictory findings on the consistency of personality and the inconsistency of behaviour across situations (Mischel and Shoda 1995). According to the cognitive-affective systems theory, there are 2 important concepts that must be combined. The first is that in order to understand an individual, the individualââ¬â¢s thoughts must be understood. Therefore the individualââ¬â¢s representation of the world is a significant factor to consider. The second is that thought proceeds concurrently on multiple tracks which intersect occasionally. The theory conceptua lises personality as ââ¬Ëa stable system that mediates how the individual selects, construes, and processes social information and generates social behavioursââ¬â¢ (Mischel and Shoda 1995). Essentially, the interaction between cognition and personality affects behaviour in different situations. The reason why there are inconsistencies in behaviour is not due to the situation alone or random error; it stems from patterns of variation within the individual which are called behavioural signatures of personality (Mischel and Shoda 1995). Stable variations of behaviour take place in the form of contingencies: if X, then A but if Y then B. Behaviour occurs as a result of personal dispositions and cognitive and affective qualities (particularly thinking, planning, evaluating and feeling) interacting with the situation. Cognitive-affective units are represented by 5 stable person variables (Mischel and Shoda 1995). The first is encoding strategies, or individualsââ¬â¢ unique way of categorising information from stimuli. The second is competencies and self-regulatory strategies, particularly intelligence, the individualââ¬â¢s goals and self-produced consequences. Third is oneââ¬â¢s expectancies and beliefs, or oneââ¬â¢s predictions of the outcome of each of the behavioural possibilities in the situation. Fourth is oneââ¬â¢s goals and values and finally, affective responses including feelings, emotions and affects caused by physiological reactions. The cognitive-affective personality systems theory is a comprehensive theory that accounts for both situational and dispositional attributes, bringing a balance between the two attributes. Freudââ¬â¢s psychoanalytical theory overlooks situations and attributes individualsââ¬â¢ personality and behavioural traits largely to dispositions. Thus the cognitive-affective personality systems theory can be better applied to a variety of different situations. It offers a stable personality system while maintaining that there may be patterns of variations in behaviour, without resulting in controversy. Unlike Freudââ¬â¢s theory, the cognitive affective personality systems theory gives highlight to conscious rather than unconscious drives. Individuals are regarded as being able to set their own goals, plan and evaluate their actions, and even to think about thinking. Therefore Mischelââ¬â¢s theory is less deterministic and considers freewill. The cognitive-affective systems theory has a more positive outlook on humankind, perceiving individuals as unified, affective, purposive and social beings, as opposed to the negative outlook of the structural theory of personality. Both the structural theory and the cognitive-affective systems theory of personality are idiographic and appreciate the uniqueness of individuals. The theories do not seek to establish generalizations of personality types. The cognitive-affective systems theory suggests that every individual has his/her own unique behaviour signature and unique pattern of variation (Mischel and Shoda 1995). Freud used case stud ies because each client had unique experiences and unique configurations of defence mechanisms. However when concentrating on the psychic energies, id, ego and superego, that are allegedly common to all individuals the structural theory of personality may arguably be nomothetic to a certain extent. In addition, the cognitive-affective systems theory must be commended for being idiographic because it also maintains its scientific nature. The cognitive-affective systems theory, unlike the structural theory, is scientific and pragmatic. Its propositions are unambiguous and testable hypotheses can be derived. The theory is based on the findings of experiments, including an experiment that was conducted in 1965 to investigate the effect situational and generalised expectancies for success have on on choices of immediate, less valuable non-contingent rewards as opposed to delayed, more valuable contingent rewards (Mischel and Staub 1965). In addition another study was conducted to test whether individuals are able to voluntarily delay gratification in await for a preferred reward (Mischel and Ebbesen 1970). Both studies reveal how individuals examine the situation and and make a cognitive decision about the reward they decide to settle for, thereby giving sound evidence for the cognitive-affective personality theory. Furthermore, a study revealed that 4 year old children who were able to delay gratification were significa ntly different from their peers as adolescents; they were more intelligent, exhibited more self-control, less distractible and more resistant to temptation than the adolescents who were less able to delay gratification as 4 year olds (Shoda, Mischel and Peake 1990). The finding from that study shows a similarity between psychoanalytic and cognitive-affective concepts of personality. Both perspectives suggest that personality characteristics emerge from childhood and is considerably consistent over time. However a limitation of the cognitive-affective personality system is that it emphasises mainly on the effect of nurture while overlooking the effect that nature might have on human behaviour. The theory overlooks biological and unconscious influences that may affect personality. Contrastingly, the structural theory of personality takes into account that both the effect of nurture and nature influence personality and its development. A further problem with the cognitive-affective personality theory is that defining a situation is difficult therefore the number of interactions that come into play when determining behaviour are too complex to study clearly. Moreover, it is difficult to take the complexity of the relationship between the situation, personality and behaviour into account when in extreme positions. The field of personality psychology has witnessed many theories being brought into the spotlight with each theory contributing more or less to understanding human behaviour. The contribution that Freud and Mischel have provided are indeed valuable. Freud made the first attempt to explain human personality and is considered a legacy for his work. Psychologists that followed in attempt to explain personality either improved upon Freudââ¬â¢s ideas or opposed it and provided alternate theories. However, due to the lack of empiricism of the psychoanalytic approach, Mischelââ¬â¢s cognitive-affective personality systems theory surpasses the structural theory of personality and can be better applied to predicting and explaining human behaviour. The theory does not oversimplify the complex processes behind personality; it takes a holistic view and considers that one behaves according to the situation one is in and that the course of action that one takes is not taken passively but activ ely. The cognitive-affective theory has minimal loopholes and is one of the most useful theories that has been developed to understand the multifaceted human personality. List of References Baumeister, R. F., Dale, K. and Sommer, K. L. (1998) ââ¬ËFreudian Defense Mechanisms and Empirical Findings in Modern Social Psychology: Reaction Formation, Projection, Displacement, Undoing, Isolation, Sublimation, and Denialââ¬â¢. Journal of Personality 66 (6), 1081-1124 Burger, J. M. (2011) Personality. 8th edn. USA: Wadsworth, Cengage Learning Eysenck, H. J. (1952) ââ¬ËThe Effects of Psychotherapy: An Evaluationââ¬â¢. Journal of Consulting Psychology 16 (5), 319-324 McLeod, S. (2008) Id, Ego and Superego [online] available from www.simplypsychology.org/psyche.html> [18 June 2015] McLeod, S. (2013) Sigmund Freud [online] available from www.simplypsychology.org/Sigmund-Freud.html> [18 June 2015] Mischel, W. and Ebbesen, E. B. (1970) ââ¬ËAttention in Delay of Gratificationââ¬â¢. Journal of Personality and Social Psychology 16 (2), 329-337 Mischel, W. and Shoda, Y. (1995) ââ¬ËA Cognitive-Affective System Theory of Personality: Reconceptualizing Situations, Dispositions, Dynamics, and Invariance in Personality Structureââ¬â¢ Psychological Review 102 (2), 246-268 Mischel, W. and Staub, E. (1965) ââ¬ËEffects of Expectancy on Working and Waiting for Larger Rewardââ¬â¢. Journal of Personality and Social Psychology 2 (5), 625-633 Shaver, R. P. and Mikulincer, M. (2005) ââ¬ËAttachment Theory and Research: Resurrection of the Psychodynamic Approach to Personalityââ¬â¢. Journal of Research in Personality 39 (1), 22-45 Shoda, Y, Mischel, W., and Peake, P. K. (1990) ââ¬ËPredicting Adolescent Cognitive and Self-Regulatory Competencies from Preschool delay of Gratification: Identifying Diagnostic Conditionsââ¬â¢. Developmental Psychology 26 (6), 978-986 Sulloway, F. J. (1991) ââ¬ËReassessing Freudââ¬â¢s Case Histories: The Social Construction of Psychoanalysisââ¬â¢. Isis 82 (2), 245-275 Westen, D. (1998) ââ¬ËThe Scientific Legacy of Sigmund Freud: Toward a Psychodynamically Informed Psychological Scienceââ¬â¢. Psychological Bulletin 124 (3), 333-371
Wednesday, September 4, 2019
Walter Mosley :: essays research papers
Walter Mosley was born in Los Angeles in 1952. He currently lives in New York City. He has been at various times in his life a potter, a computer programmer, a poet, and a short story writer; he studied writing in the graduate program of City College of New York. The first title in his Easy Rawlins mystery series, DEVIL IN A BLUE DRESS was released in September 1990 to great critical acclaim. His first non-mystery, a novel about the blues, R.L.'s DREAM, was published by W.W. Norton in August 1995. Mosley's most recent work, BLUE LIGHT, a science fiction novel, was published by Little, Brown in November 1998 Mosley's work twice nominated for Edgar Award; both WHITE BUTTERFLY and BLACK BETTY were nominated for a Golden Dagger Award in England; and one of his short stories, THE WATTS LION, was nominated for the Best Pi Short Story in 1994. THE THIEF, another short story, was awarded the O.Henry Prize in 1996. ALWAYS OUTNUMBERED, ALWAYS OUTGUNNED was awarded the Anisfield-Wolf Book Award in 1998. Mosley's books have been translated into twenty languages and his short stories have appeared in GC, Esquire, USA Weekend, and Buzz magazines. Devil in a Blue Dress was made into a movie in 1995 starring Denzel Washington and Jennifer Beals, produced by Jonathan Demme and directed by Carl Franklin. Always Outnumbered, Always Outgunned was adapted by Mosley for an HBO original movie starring Lawrence Fishburne, Natalie Cole, Cicely Tyson, and Bill Cobbs, directed by Michael Apted, and produced by Palomar Productions. A second Socrates Fortlow movie is in the works, with Mosley again writing the script and Fishburne in the lead role. Mosley serves on the board of TransAfrica, the National BookFoundation, the Poetry Society of America, Manhattan Theater Club, and is past president of the Mystery Writers of America. Walter Mosley :: essays research papers Walter Mosley was born in Los Angeles in 1952. He currently lives in New York City. He has been at various times in his life a potter, a computer programmer, a poet, and a short story writer; he studied writing in the graduate program of City College of New York. The first title in his Easy Rawlins mystery series, DEVIL IN A BLUE DRESS was released in September 1990 to great critical acclaim. His first non-mystery, a novel about the blues, R.L.'s DREAM, was published by W.W. Norton in August 1995. Mosley's most recent work, BLUE LIGHT, a science fiction novel, was published by Little, Brown in November 1998 Mosley's work twice nominated for Edgar Award; both WHITE BUTTERFLY and BLACK BETTY were nominated for a Golden Dagger Award in England; and one of his short stories, THE WATTS LION, was nominated for the Best Pi Short Story in 1994. THE THIEF, another short story, was awarded the O.Henry Prize in 1996. ALWAYS OUTNUMBERED, ALWAYS OUTGUNNED was awarded the Anisfield-Wolf Book Award in 1998. Mosley's books have been translated into twenty languages and his short stories have appeared in GC, Esquire, USA Weekend, and Buzz magazines. Devil in a Blue Dress was made into a movie in 1995 starring Denzel Washington and Jennifer Beals, produced by Jonathan Demme and directed by Carl Franklin. Always Outnumbered, Always Outgunned was adapted by Mosley for an HBO original movie starring Lawrence Fishburne, Natalie Cole, Cicely Tyson, and Bill Cobbs, directed by Michael Apted, and produced by Palomar Productions. A second Socrates Fortlow movie is in the works, with Mosley again writing the script and Fishburne in the lead role. Mosley serves on the board of TransAfrica, the National BookFoundation, the Poetry Society of America, Manhattan Theater Club, and is past president of the Mystery Writers of America.
Tuesday, September 3, 2019
Medical Conditions Of Concentration Camps :: essays research papers
Medical Conditions of Concentration Camps The medical conditions in concentration camps were very horrable. Many things happened to the prisoners at this camp and most of the worst things happened because of the medical treatments. Throughout all the camps medical experiments were performed on the prisoners. They were not only performed on the jewish but on all different kinds of people that were at the camps. The experiments were for the most part either harsh or deadly. Some of the experiments were as follows. People were submersed in ice cold water for hours on end to test out new kinds of suits. Others were deprived of oxygen, sterilized, had patches of there skin burned, or immediatly killed by an injection to the heart for dissection. Some people were also sent away to anatomy hospitals. One of the most desired places to be by doctors was Block 10. Block 10 was in Auschwitz and was a medical block. It meant the difference between life and death for many people in Auschwitz. There were benefits and disadvantages to being there for both the doctors and the prisoners. For a doctor it was seen as a chance to do any and all experiments they thought might be interesting. For prisoners it was a chance to live, if they were lucky. Some prisoners were taken by doctors for experiments and depending on the nature of the experiment they might live for a long time or be killed imediatly. Doctors picked which people should be killed through a selection process. A person could be killed for having as little as a tiny scar, or because ofa defect, or anything at all. The doctors of Block 10 are most remembered. The two that stand out most are Josef Mengele and Ernst B. Josef Mengele as one of the cruelest doctors who killed many, many people. He was said to be seen at selections night and day. And in some cases even taking children to the gas chambers by playing a game with them.
Monday, September 2, 2019
Adolf Hitler Essay example -- Nazi Hitler Biography Biographies Essays
Adolf Hitler One of the most prominent names in the history of the world is Adolf Hitler. Adolf Hitlerââ¬â¢s impact on the twentieth century is much more than any other man. Whether this impact is considered good or not, it does not matter. Hitlerââ¬â¢s influence on the world, although not a good one, is unquestionable. Many leaders have had inspirations of ruling the world, but few of those leaders have had the strength or power to even attempt world domination. But Hitler was one of those few, his ability to lead a group into a fight for immoral purposes, and total control over Germany led to his dominance. Hitlerââ¬â¢s promise to Germany to bring the country back to a major power status lured the country into his rule. Germany had visions of power and greatness, and Hitler was the leader who was going to accomplish that for them. So with power in mind, Germany followed Hitlerââ¬â¢s lead, which led to the annihilation and almost extinction of the Jews in Europe. We have all heard the horror stories of the concentration camps, and the events that were a part of World War Two. It is sad to say, but only a man who had great intelligence and leadership qualities could lead such a battle. No man before Hitler reig ned in so much power, and no man after him has even come close. Although his actions were not justified, Hitler became the most dominant man in the world. Adolf Hitler was born on April 20, 1889 in the Austrian town of Braunau. He was the fourth child of Alois Schickelgruber and Klara Hitler. Two of his siblings died from diphtheria when they were children, and one died shortly after his birth. Hitlerââ¬â¢s father was a customs official, illegitimate by birth, which was described by his housemaid as a "very strict but comfortable" man. When Hitler was a child, his mother gave him love and affection. When Adolf was three years old, the family moved to Passau, along the Inn River on the German side of the border. A brother, Edmond, was born two years later. The family moved once more in 1895 to the farm community of Hafeld, 30 miles southwest of Linz. Another sister, Paula, was born in 1896, the sixth of the family, supplemented by a half brother and half sister from one of his fat her's two previous marriages. Following another family move, Adolf lived for six months across from a large Benedictine monastery. The monastery's coat of arms' most salient feature was ... ... to be inevitably lost and with his followers having doubts, Hitler killed himself on April 30, 1945 (Duffy 115-120). We can all agree that Hitlerââ¬â¢s master plan was corrupt. And that it is to the worldââ¬â¢s benefit that Hitler was not able to accomplish his master plan. But we must also notice that Hitler is a man who had a great amount of power, and came as close as anyone to dominating the world. Although his beliefs and actions are defiantly corrupt, Hitlerââ¬â¢s effect on the world is enormous. Hitler fought for the German culture that he loved, and influenced the Germans into fighting with him. His motive for fighting was not justified, but he proved he was man who had to be dealt with. His impact on the world is arguably more than that of any other single man. Although his impact did not improve the world, Hitler can still be considered the most dominant man in the history of the world. Bibliography 1. Davidson, Eugene. The Unmaking of Adolf Hiltler. Missouri: University of Missouri Press, 1996. 2. Duffy, James. Target Hitler. Connecticut: Greenwood Publishing Group Inc., 1992. 3. Simpson, William. Hitler and Germany. New York: Cambridge University Press, 1991.. Adolf Hitler Essay example -- Nazi Hitler Biography Biographies Essays Adolf Hitler One of the most prominent names in the history of the world is Adolf Hitler. Adolf Hitlerââ¬â¢s impact on the twentieth century is much more than any other man. Whether this impact is considered good or not, it does not matter. Hitlerââ¬â¢s influence on the world, although not a good one, is unquestionable. Many leaders have had inspirations of ruling the world, but few of those leaders have had the strength or power to even attempt world domination. But Hitler was one of those few, his ability to lead a group into a fight for immoral purposes, and total control over Germany led to his dominance. Hitlerââ¬â¢s promise to Germany to bring the country back to a major power status lured the country into his rule. Germany had visions of power and greatness, and Hitler was the leader who was going to accomplish that for them. So with power in mind, Germany followed Hitlerââ¬â¢s lead, which led to the annihilation and almost extinction of the Jews in Europe. We have all heard the horror stories of the concentration camps, and the events that were a part of World War Two. It is sad to say, but only a man who had great intelligence and leadership qualities could lead such a battle. No man before Hitler reig ned in so much power, and no man after him has even come close. Although his actions were not justified, Hitler became the most dominant man in the world. Adolf Hitler was born on April 20, 1889 in the Austrian town of Braunau. He was the fourth child of Alois Schickelgruber and Klara Hitler. Two of his siblings died from diphtheria when they were children, and one died shortly after his birth. Hitlerââ¬â¢s father was a customs official, illegitimate by birth, which was described by his housemaid as a "very strict but comfortable" man. When Hitler was a child, his mother gave him love and affection. When Adolf was three years old, the family moved to Passau, along the Inn River on the German side of the border. A brother, Edmond, was born two years later. The family moved once more in 1895 to the farm community of Hafeld, 30 miles southwest of Linz. Another sister, Paula, was born in 1896, the sixth of the family, supplemented by a half brother and half sister from one of his fat her's two previous marriages. Following another family move, Adolf lived for six months across from a large Benedictine monastery. The monastery's coat of arms' most salient feature was ... ... to be inevitably lost and with his followers having doubts, Hitler killed himself on April 30, 1945 (Duffy 115-120). We can all agree that Hitlerââ¬â¢s master plan was corrupt. And that it is to the worldââ¬â¢s benefit that Hitler was not able to accomplish his master plan. But we must also notice that Hitler is a man who had a great amount of power, and came as close as anyone to dominating the world. Although his beliefs and actions are defiantly corrupt, Hitlerââ¬â¢s effect on the world is enormous. Hitler fought for the German culture that he loved, and influenced the Germans into fighting with him. His motive for fighting was not justified, but he proved he was man who had to be dealt with. His impact on the world is arguably more than that of any other single man. Although his impact did not improve the world, Hitler can still be considered the most dominant man in the history of the world. Bibliography 1. Davidson, Eugene. The Unmaking of Adolf Hiltler. Missouri: University of Missouri Press, 1996. 2. Duffy, James. Target Hitler. Connecticut: Greenwood Publishing Group Inc., 1992. 3. Simpson, William. Hitler and Germany. New York: Cambridge University Press, 1991..
Sunday, September 1, 2019
Network security and business
Company X is reputed to be the world's leading manufacturer and supplier of sportswear (sports shoes and vestments) and sports equipments with its headquarters situated in Oregon, Portland metropolitan area. The company presently accrued 16 billion US dollar worth excess revenue in 2007 only. In the year 2008, that company is credited to have recruited 30,000 employees globally, while at the same time maintaining its status as the sole grand crown holder of the Fortune 500 title as far the state of Oregon is concerned. In this essay, the vulnerabilities experienced by the company shall be looked at in respect to network security which entails working towards the protection of information that is passed o0r stored through or within the computer. The company was founded in 1964 and then later re branded in 1978. The company is so well established that it does not only sell its products under its own company name, but it also does so through its subsidiaries. In addition to this, company X also owns other sports companies. In an effort to realize expansion, company X extended its services to run retail stores under its name. As a result of this, the company X has approximately 19,000 retail departments in the US alone. In the same vein, the company sells its products to about 140 countries globally. The company has been traditionally sponsoring sportsmen and women around the globe and has very distinct logo and slogans. The slogans used by this company unlike those of the fellow competitors, made it to the top five slogans of the 20th century, and was accredited for this by the Smithsonian Institution. In 1980, company X had hit the 50% market share mark in the the United States, being only 16 years old. The most recent type of inventions by this company involves the production of new models of cricket shoes which in comparison to their competitors, are 30% lighter (Bernstein, 1996). The company seeks to maintain its vibrant market and maintains its upper hand against its competitors by producing products that are appealing to the tastes of the materialistic youth. The sports wear company produces and sells assortments used in sundry and diverse world of sports sch as basket ball, athletics, golf, American football (rugby), tennis, wrestling, skating, football and skate boarding, among others. The company X having become a global entity, also faces many problems that come with expansionism. The troubles touch on cases of workers' rights in relation to the occupation safety and health matters. These cases are more distributed in the developing economies than in developed ones. Conversely, there are also issues about social responsibility that border on the environmental safety in relation to the production processes and wastes produced by the company. The problem also stretches to its outsourcing vendors, who together with the company have been challenged by critics to work towards carbon neutrality. Critics have also dismissed as lies the claim by the company that it increased the salary scale of its workers by 95%. These critics posit that the company seeks to always exploit its workers, of whom 58% are young adults aged between 22- 24 years, while 83% of the workers are women. Half of these workers in these companies are saidà to have gone through their high school educational programs.à Because few of these people have work related skills, critics maintain, the subsidiaries of company X are reported to be using this state of affairs to exploit their employees by issuing them very minimal wages (Mc Nab, 2004). Again, it is reported that out of company X's contract factories, 20% deal in the casual production of of the products. These factories are always bedeviled by cases of harassment and abuse (of which the company has moved in to sort out the situation by liaising with the Global Alliance in order to review the first twenty one of the most notorious factories. The company also set up the prescribed code of conduct so as to inculcate social responsibility among the workers. Spates of continual human rights abuse nevertheless continued to persist. In Indonesia for example, 30.2% of the workers of company X are reported to have been victims of exploitation. 56% of these workers are said to have undergone verbal abuse. In about the same spectrum, 7.8% are reported to have succumbed to unwanted sexual comments, while 3.3% are said to have been abused physically. In Pakistan, the matter deteriorated to cases of child abuse and the conscription of child labor. For instance, in the same country, the issue came to the global attention when pictures were displayed, portraying children knitting football which were to be then sold by this company. Another matter that haunts this company X is the protection of information, or commonly called by the corporate world and the computer science and management as network security. Of recent developments, concerns over privacy have soared, and become subject to public furore and debates when it was found out by security experts after conducting a research in the University of Washington, that company X's iPod sport kit had the ability to track people . Initially, the surveillance system that works through the company's iPod sports kit had been designed to allow the user (mainly the sports person) of this facility to take note of the calories that have been burned, the speed, the distance covered and the time dispensed when undertaking sports activities. The kit was fitted with a transmitter that was designed to be stuck on the shoes and the iPod's transmitter. The tracking is made possible by the fact that the transmitter relays particular ID. Although the problem first seemed minuscule due to the fact that the information could only be accessed from a 60 feet away shoe, yet it was found out later that more problems, it seemed would set in since the surveillance or tracking system was then fed to the Google maps (Sloot, 2003). In order to bring in ameliorations in this matter, comprehensive laws are being proposed so that company X and its counterparts who use these systems can be forced to beef up security into the models- a measure which these companies are ignoring. Some related speculations are also rife that the company's retailing contractorsà are using the RFID tags for tracking their consignments and keeping track of the stock market. This problem is hydra headed since apart from the obvious fact that this may scare away potential customers, it still has exposed the company to anti company X campaigns which have widely beenà activated and managed by the Caspian organization in the US. Customers will shy away from the products since the communication system of the company X seems to have been compromised in its CIA (confidentiality, integrity and availability) of information security. Confidentiality portends that only the permitted authorities access information, while integrity ensures that information stays only within the precincts of the authorized handlers. Availability on the other hand demands that those who are authorized access information are be able to so do efficiently and quickly. The external leaking in and out of confidential information can be very costly and should always be avoided Company X is working out to ameliorate this problem. On 5th March 2008, in Oregon, it held a meeting in which the departmental heads and subsidiary representatives met, and analyzed the extent of the vulnerability (they had already come into the board meeting, having known the nature, and the extent of the risk). As an immediate contingency, company X decided that it was going to suspend the sale of the iPod transmitters as a measure to instill risk avoidance. Having also become aware that there was also the danger of information systems being invaded by hackers, (as was seen in the 31st July, 2007 when in Pakistan tens of its computers succumbed), consensus was arrived at that all computer systems in the organizations adopt the man- in- between technique by adopting the firewall computer security system that will be able to detect the nature of the on coming information. On another front, the company X agreed that it was to globally look at its wireless networking: the technology that the supports the connectivity of each computer to a specific network or networks. This does not portend coming up with a new system of networking, but bolstering the configurations and the security systems. New and stronger RAMs( Random Access Memory ) were bought and have already been set in place.à This will ensure that the roiter system within the company's area of jurisdictions are very strong and very fast in detecting anomalies (Raquet and Saxe, 2005). The computer technicians in company X suggested that the leaking of the company's secret information could be due to the fact that the computer connectivity in Pakistan could have been in the open mode configuration. These technicians elaborated that open computer mode connectivity allows anyone even without the building to access information from an open mode configured computer. The situations becomes more vulnerable in the present day due to the portability of the computers (laptops and palm tops). Open mode wireless computers have a preset name that makes the computer to, on being turned on, start broadcasting packets which prompt all wireless devices within the precincts about the availability of connectivity (Albanese and Sonnenreich, 2003). However, should the computers be switched on to closed configuration, the beacon packets are no longer broadcasted by the access point. It was also discovered that although the headquarters were already filtered, yet not all of the subsidiaries were. It is an this backdrop that the computer technicians under the aegis of the company's information and technology department recommended that the Wireless Encryption Protocol (WEP)à be introduced to ward off even the most sophisticated hackers. Wireless Encryption Protocol ensure that the data that is being relayed is not in the readable format, but instead, it becomes only readable after being decoded in a backward manner on being received. This leaves the data unreadable on being captured in between transition since the data is still encoded. The hacker is frustrated unless in possession of the knowledge about theà original address. Conclusion. As a concept, network security is very important in the realization of a company's secret information. Good and comprehensive network security keeps secret information from flowing outwards to unwanted parties, while at the same time, enabling efficient flow of information within an enterprise. The systems of communication ( the hardware, the software and the orgware ) is also adequately protected. Company X would accrue higher returns if it enhanced all of its network security systems within its disposal. References. Albanese, J. and Sonnenreich, W. (2003). Illustrations on network security. US: Mc Graw Hill. Bernstein, T. (1996). Internet security designed for business. US: Wiley. Mc Nab, C. (2004). Assessment of network security. US: O' Rielley. Raquet, C. and Saxe, W. (2005). Advocacy and governance of business network security. US: Cisco Press. Sloot, P. (2003). International conference of computational science.
Subscribe to:
Posts (Atom)