Wednesday, July 31, 2019

Is Meteorology Science? Essay

Many books and academic articles describe Meteorology, the study of the Earth’s atmosphere, as a science. While this may have been unquestionably accepted by many students and even scientists, it may well be worth to examine the subject more closely and ask, is Meteorology really science? Encyclopedia Britannica (2006) defines science as â€Å"any system of knowledge that is concerned with the physical world and its phenomena and that entails unbiased observations and systematic experimentation†. Science does not regard unverified personal beliefs and opinions but instead rely on systematic methods of analysis. The scientific method, as this method is called, is generally attached to all fields of science through which facts and conclusions are derived. Accuracy and consistency also matter and thus, measurement is important in science. Science in its Latin origin scire means â€Å"to know† and as such reflects the objective of scientific studies: to know and understand phenomena that can be observed or detected. For Meteorology to qualify as a science, it should meet the premises that make up science itself. Meteorology can be considered as science in that it involves a study of the physical world. Meteorology studies the physical and observable aspects of the atmosphere such as the formation of rains, thunderstorms and clouds, and weather events such as rainbows, mirages and halos. Meteorology can be considered as science because it does not rely on personal beliefs and opinion but rather on measurable data and analytic observations. In Meteorology, analytic observations are developed based on the measurement of such variables as wind speed, air temperature, relative humidity, and barometric pressure. These observations and measurements are used to predict weather conditions. Meteorology can be considered as science in that it involves scientific methods. Meteorologists adhere to a meticulous system before they give weather forecasts. They make observations through satellites and radars so as to be able to collect the necessary data such as Is Meteorology Science? Page_#2 variations in temperature and pressure. These data will be analyzed and made into charts, maps and graphs which will be used to predict weather conditions (Encarta 2006). While Meteorology meets some of the requisites of science, it also has its loopholes that can disqualify it from being considered a science. In science, subjects must be examined, tested and verified. Meteorology comes short in this foundation because meteorologists cannot test the correctness of their hypothesis, which is commonly regarded as the weather forecast, unless the weather phenomenon has already occurred. Meteorology cannot be considered a science because it is lacking in the accuracy and consistency in the variable measured. The direction of the wind, for example is not precisely measurable and cannot be certainly predicted (Mill). Moreover the atmosphere itself, the main subject of Meteorology has no known boundary from the outer space. Meteorology cannot be considered a science because it falls short of the thoroughness in the scientific method. The scientific investigation does not precisely end with a conclusion or a finding but rather in a prediction which can be regarded merely as a theory. A guess, interpretation, theory and hypothesis are not science (Colby). As contented herein, Meteorology can be considered science in that it has met basic elements that make up science. However, it also has certain flaws that can disqualify it from being considered as such. Regardless of this, it is noteworthy that that the applications of Meteorology especially in weather forecasting have already been considered as among the contribution science can make and as such, Meteorology, with its ambiguity in some of its scientific elements can well be considered as an imperfect science. References Colby, K. M. , & Stoller, R. J. (1988). Cognitive Science and Psychoanalysis. Hillsdale, NJ: Lawrence Erlbaum Associates. Retrieved October 2, 2006, from Questia database: http://www.questia. com/PM. qst? a=o&d=10104147 â€Å"Meteorology†. (2006). Retrieved September 30, 2006, from Microsoft ® Encarta ® Online Encyclopedia 2006: http://encarta. msn. com/text_761571037__1/Meteorology. html Mill, John Stuart. (n. d). The Logic of the Moral Sciences. Retrieved September 30, 2006, from http://www. la. utexas. edu/research/poltheory/mill/sol/sol. b06. c03. html â€Å"Science†. (2006). In Encyclop? dia Britannica. Retrieved September 20, 2006, from Encyclop? dia Britannica Online: http://www. britannica. com/eb/article-9066286.

Tuesday, July 30, 2019

Abundance of drama Essay

She and the other girls give the names of innocent people who had nothing to do with witchcraft leaving the act with a dramatic hysterical close as all the girls try to cleanse themselves of the confrontation with Beelzebub hinting at the future prospects of the play. The act steadily builds up to when Tituba is accused at the end of the act of witchcraft. Each ingredient of the, story, which we know is hearsay, is added until it comes together and there is sufficient evidence for her to be accused by Hale. The story, which has been building, takes a turn and instead of the inquisitive nature of which it started, it becomes more action orientated and becomes a name and shame game where people are incorrectly blamed and gives a dramatic effect to the audience. This final dramatic scene of the act is placed there to end the act with a mini peak of the story and to keep the audience interested and wanting more. Act two begins with a long conversation between Proctor and his wife. They talk about the every day things but the stage directions and language Miller uses, like the scene with Proctor and Abigail, strongly projects the dramatic effect on the audience and emotions of the relationship. Proctor is not at ease with his wife, the atmosphere appears tense and uncomfortable. He attempts to make conversation, â€Å"are you well today? † which is not the sort of thing a husband would say to his wife. He tries to make her happy by complimenting her: â€Å"it’s well seasoned† and grinning. It is obvious that the atmosphere could be cut with a knife â€Å"as gently as he can† depicts that he is carefully choosing his words and trying to be a good husband but desperately trying not to bring up the affair. But it is not in vain as Goody Proctor reacts warmly to him, â€Å"blushing with pleasure†; giving an inkling that she still loves him. Though the feeling is that of betrayal and guilt there is a warm, gentle fragment of loyalty and love emancipated out of their conversation, which proves they still both feel love towards one another. Mary Warren comes in to the house-hold to discuss the events which took place in Salem earlier on and that, â€Å"Aye a proper court they have now. They’ve sent four judges out of Boston,† and that â€Å"39† women have been accused of witchcraft. She then proceeds to talk about the accused and that Mrs Proctor has been accused. This shocks them and that Rebecca nurse has also been accused, as she is a well-respected person in the Salem community and adds to the drama. Both of the women have enemies who wish to destroy them (Abigail and Mrs Putnam) and two rival factions are now clearly taking form, Goody Proctor is arrested. The home scene between Proctor and his wife is placed before she is arrested to dramatically show how innocent and plain Goody Proctor was and the contrast of her seeing John in the wrong by her being arrested, this dramatically portraits injustice. Proctor’s actions towards the arrest of his wife are dramatic as he runs out adding to the action and pace of the scene, â€Å"I will not have her chained! † The fact he will not have her chained when they are authorised to do so indicates conflict and gives drama, the use of an apostrophe shows his anger again adds gives a dramatic effect to the audiences Towards the end of the act pressure is placed on a character this time it is Mary who is being pressurised by the now fiery Proctor due his wife’s imprisonment. Proctor tries to force Mary to tell the court about the â€Å"poppet† which Mrs Proctor was arrested for, â€Å"You will tell the court how the poppet come here. † Mary claims she â€Å"cannot†, which she repeats and she begins to cry. Proctor’s language creates his mentality with the omnipotence of his language and the harsh anger which has built up inside to terrify Mary to get her to divulge her information to the court, â€Å"Aye naked! And the wind will, gods icy wind will blow! † His use of the word icy creates the chilling ominous threat to all the people who are dishonest and shows that he himself would not do it or he would be severely hypocritical. This, from what he said, is the first indication of his stern and ethical character and that Mary’s character is frail and easily manipulated both by Abigail and Proctor. Not only does the dramatic structure give the end of the act a dramatic finish but also the end of the act uses language to get across the seriousness and religious terror being brewed in Salem. Act three is set in the courtroom, the cases are being investigated and the questions and debating ensues. Mary now forced by Proctor to support Goody Proctor tells the court that she lied the day before. However she shows her weakness when she herself is blamed by Abigail, and cracks when Abigail condemns her by pretending that there is a spirit conjured by Mary, â€Å"Let me go Mr Proctor, I cannot, I cannot†. This leads to Proctor to loose his cool and condemn Abigail for doing all of this to spite him and to rid the world of his wife. He now has to admit to committing the sin of adultery: â€Å"I have known her sir! † This leads us to the turning point in the play. Proctor reveals to the court that his wife never tells a lie and that she would tell the court about his affair. By stating the truth it would obviously mean that she was telling the truth about the witchcraft and proving her innocence but would she be able to disgrace Proctors, name, which means so much to the people of the time period that the play was set. Miller’s dramatic structure brings the play to a mini climax if not the most important one by great structuring of the play; the play reaches a cross-roads. If Goody Proctor tells the truth it undermines everything that Abigail has said and shows her as a liar and everyone wrongly accused is released and brings about the end of court. But if she lies it means that all the people who have kept their morality and not lied will be charged. It defines the future of the factions and the play, having been built up throughout the opening acts. This is well dramatically structured to create complete unpredictability and a sense of curiosity as to how it will end. She is brought in and interrogated. Goody Proctor’s body language portraits the tension: â€Å"liking her lips to stall for time† now created in the court, as they all know this is the defining moment. She thinks about what she should say and â€Å"glances at Proctor† looks for help. In, agony, she answers the questions. Hard thought and constant silent pauses build the pressure within the room, â€Å"Is your husband a lecher? † Danforth the judge asks her. â€Å"No. † The pressure is lifted and the stomach churning feeling of the characters and audience takes over, this is summed up by the comment, â€Å"oh god! † when Goody Proctor realises what she’s done. But by lying, going against everything she stands for. She obviously forgives Proctor as she took one for him when he had committed adultery this shows the romantic drama that she loves him so much she would give up her morals for his name. Abigail then starts off again pretending to draw attention on to herself, that Mary is conjuring spirits and uses her power to create mass hysteria. Miller liberally uses exclamation marks to emphasise the shouting and adding to the general madness of the courtroom. Abigail’s actions are dramatised and create a lot of fear, â€Å"Abigail pointing with fear† and which is added to by having all the girls at once shouting. It gives a fearful representation that the girls are possessed by some sought of satanic spirit. Mary shifts the blame onto Proctor who is then accused by the court. This is dramatically used as the story declines after the climax in act three and the story needs to be built up quickly to reach the final climax. In Act four this is done by the hysteria and the fact that Proctor is now being blamed by Abigail and ironically the reason the trouble started was because she wanted him, now she is getting rid of him and achieving nothing. In Act four Proctor has an emotional talk with his wife as she tries to persuade him to confess and be released. Miller goes to work on giving the audience’s heart strings a pull using again language and stage actions to show the emotions of love and despair and create a great sense of drama using dramatic devices. Goody Proctor has forgiven him and believes; whatever, he does â€Å"it is good man that does it†, and thinks she drove him to have an affair. She states that, â€Å"John, I counted myself so plain, so poorly made no honest love could come to me! Suspicion kissed you when I did†. She thinks that there was nothing to love about her and before it was not her who kissed him but personified. This also implies that now when they talk and hold each other it is pure love for the first time in their relationship bringing a sense of romanticism to the ordeal that they’ve been through. Miller’s dramatically structure places the conversation before the final and ultimate climax to act as the calm before the storm and to increase the pressure on John and ultimately be decisive to the final sequence of events. Proctor is to be hung but because he was persuaded he confesses but all the official figures want his confession in writing. By doing this he is giving up his, name. He realises that he will die before he will give up his name and rips up his â€Å"life† which he had signed. This then brings us to the most powerful and dramatic action within the whole play in my opinion as, â€Å"His breast heaving, his eyes staring, Proctor tears up the paper and crumples it, and he is weeping in fury, but still erect. † This shows that he will not sign away his, name, showing his courage. He has thrown away his life but still stands â€Å"erect†, they’ve pushed him all the way physically and mentally but he has not fallen keeping his dignity, ethics and pride, which we know mean so much to him as does his life which is why it is so dramatic. Miller has created a twist luring the audience in with Goody Proctors persuasion, hooking them in with signing the confession but masking the fact he was to â€Å"rip up his life,† and die for what he believes and becoming a type of martyr or tragic hero. Miller’s, The Crucible, is structured to gain dramatic effect. Each act takes on the same structure and has very similar properties. The first two scenes to begin with build up information about different events, which take place off stage. All acts build up to a climax, giving away hints about the next act and each act ends with pressure being placed on a certain character. Act one it is Tituba; act two it is Mary; act three Mary and Mrs Proctor and act four John Proctor. â€Å"The Crucible† is a fitting name for the play as a crucible is a melting pot, which eventually displaces the pure from the waste. Which also happens in the play each act is a small melting pot as in act one, the different things are added by way of the story being built up and then heated. The heat in act one is Hale and overall the whole play is a melting pot. The story built up, the heat added by the way of the court and the pure displaced from the waste. The pure, being the characters that wouldn’t pass on the blame because they were too strong and would not give up their morals. The irony is that the people who deserved to be killed i. e. Abigail and Paris compared to the remorseful Proctor and the innocent Rebecca nurse. Miller created a dramatic play by incorporating dramatic language, stage directions and the play is structured in such a way that it gives the audience an abundance of drama.

Why Top Female Athletes Stay in Male-Dominated Sports to an Elite Level

Abstract This study is focused on why top female athletes stay in male-dominated sports to an elite level and involves female athletes from different countries. Semi-structured interviews will be carried out on 15 participants. The study is characteristically interpretive and qualitative, and involves a four-year timeframe. 1. Background Sport is an institution that continues to create, reinforce, and maintain male hegemony. However, some of its aspects may also be seen as a product of collective effort. Gender diversity in sports are often placed in subtle, multi-level and ignored structures and behaviours embodied in sport organisations. Hence, there is a need for continued work on the matter (Fink 2008). The participation of female athletes in male-dominated sports will be explained by male hegemonic concepts as well as cultural and structural concepts.1.1 What prompted the interest in the topicWhat prompted the interest in the topic was the researcher’s own exposure in female sports where she was able to associate with elite female athletes of various ages from different countries, including those under Islamic rule and the Muslim region, such as Iran, Morocco, and Turkey. She has had worked closely with female competitors in over 50 members of the International Federation of Muaythai Amateur (IFMA), and h ence considers the topic a realisable one. Since the researcher is into sports herself and associates with the likely respondents of the study, she finds the topic both interesting and challenging.1.2 Relevance to Previous ResearchThe relevance of the topic to previous research is that it serves as a supporting material to what has already been claimed of the participation of female athletes in male-dominated sports. Previous research has indicated the prevailing role of cultural and structural systems that produce and reproduce these sports as an exclusive realm of male athletes (e.g. Anderson 2008; Carty 2005). The present study confirms these notions, and likewise looks into patterns of possibilities whereby female athletes can be generally accepted and recognised within these once male-stereotyped sports.1.3 Contributions to the Research and the FieldThe study’s contribution to research is identified in its investigation of culture, and somehow, of gender issues, in the p articipation of female athletes in male-dominated sports. Its contribution to the field is its introduction of certain theoretical concepts that can explain why female athletes continue to delve into male-dominated sports and an analytical explanation of their intent to stay or move out of the system.1.4 Research Aims and ObjectivesThis study aims to ascertain why top female athletes stay in male-dominated sports to an elite level; the hurdles they face and how they overcome these hurdles. It also aims to draw out the similarities in challenges faced by these elite athletes and to see if such challenges are similar across cultures and religions. The study purports to use this understanding to help support women to stay in a specific sport once they are already participating. The objectives of the research are as follows: To review the existing literature on the subject of Sports Sociology in relation to women’s sports participation; To conduct interviews and surveys to elite female athletes from various countries; To find out gaps in knowledge within the field; and To provide recommendations for future research. 2. Literature Review This part of the research proposal identifies a range of works and studies related to the topic being investigated. It aims to establish the theoretical framework for the study and provide evidence to the topic.2.1 Trends in the Literature Relating to the Research TopicIn their work, Krane, Choi, and Baird et al. (2004) stated that female athletes live in two cultures: One that is characteristically masculine; and the other – the larger social culture – which celebrates femininity. The study was linked to feminist cultural studies and aimed to determine how female athletes negotiate femininity-based social expectations with athleticism. It involved 21 female athletes who served as participants in focus group discussions. Three themes comprised the data analysis, specifically the ‘influence of physicality, femininity, and athlete as other.’ The data revealed that being athletic is in contrast to being feminine and that the participants themselves felt being marginalised as athletes and expressed that others perceive them as being ‘different’ from typical women. Despite these, they were proud of their physical strength and developed bodies and regarded themselves as being empowered, which can be generalised beyond the context of sports (Krane et al. 2004). The use of focus group discussions in the study aimed at encouraging self-disclosure amongst female athletes with similar experiences and reducing the anxiety that might be felt in individual interviews. The authors also pinpointed the fact that focus groups are especially effective in feminist research (Krane, et al. 2004). According to Carty (2005), sport has been a social aspect that has traditionally prevented women from participating. Recent policy developments and broadening public support enabled girls and women to participate dramatically in sports that had been typically limited only to men. Female athletes had come out from those sports that had been stereotypically designated only to them, such as tennis and gymnastics, and can now play male-dominated sports such as hockey, football, rugby, and so on. Of equal significance is the revealing of masculinity constriction and the concept of gender differences. Hence, Carty explored social changes accompanying the broadening popularity of women in sports and some opposing messages in advertisements initiated by these changes. The qualitative method is used in the study to explore all the issues covered by the aims and objectives, which were tackled through semi-structured interviews. It may be inferred that Carty’s assertion on the constraint s placed against women in regard to participating in male-stereotyped sports is similar to the notion of Krane et al. (2004), specifically the marginalisation of female athletes and their being perceived as different from normal women. There is therefore congruence between the two authors in reference to their view of the situation of female athletes in male-dominated sports. On the other hand, Pringle (2005) emphasised that issues linked to female sport and exercise can be examined via Foucauldian theories. However, the Gramscian theory, which is used to examine the concept of masculine hegemony, remains dominant. The article made a comparison and contrast of the theoretical tools branching from Foucault and Gramsci’s writings in relation to investigating sport and masculinities. It was indicated that masculine hegemony does not simply point to a prevailing concept of masculinity but also to specific understandings of power that may be problematic to some. The discussion is useful to the study as it focused on the concept of masculine hegemony that can address the prevailing male dominance in sports, as well as male sports in general, which had once been (and continuous to be) considered an exclusive field for male athletes. It is important to note that Pringle’s assertion provides the groundwork for the situation of female athletes, as ex plored by the concept of masculine hegemony that explains women’s marginalisation, pinpointed earlier by Carty (2005) and Krane et al. (2004). Pringle’s concept of masculine hegemony was similarly described by Whisenant, Pedersen, and Obenour (2002) who cited the end of the Association of Intercollegiate Athletics for Women (AIAW) as the cause for sport administrators to deal with reestablishing their place as athletic directors. The study aimed at assessing the success ratio of these directors, focusing primarily on gender. The initial results validated the expected findings that masculine hegemony is a well-established concept within inter-collegiate athletics. This is note-worthy in the topic’s exploration of the hurdles faced by female athletes in male-dominated sports. On the other hand, Vincent, Imwold, and Masemann et al. (2002) made an investigation of female athletes’ receipt of equitable coverage in â€Å"women’s games.† The study made a comparison of six selected newspapers from Canada, Great Britain, and the United States and how they dealt with male and female athletes during the 1996 Centennial Olympic Games. The qualitative method and content analysis were used for the comparison of all articles and photographs of athletes on all newspapers involved. Albeit there were differences found, the results generally demonstrated an equitable amount of coverage for both male and female athletes participating in the games. The study confirmed the idea that female athletes receive increased newspaper coverage when they participate in major competitions. However, analysing critically Vincent et al.’s work against those of Pringle (2005), Krane et al. (2004), and Carty (2005), one may posit that the former tackled a rather neutral presentation of female athletes vis-a-vis male athletes, as demonstrated by the equitable newspaper coverage on them. Vincent et al. looked into the ‘outward configuration’ of the male-female dichotomous existence in sports, as against the internal focus made by Pringle (2005), Krane et al. (2004), and Carty (2005).2.1.1 The Role of Culture in SportsIn their study, Elling and Knoppers (2005) used a social-critical perspective to analyse symbolic sport inclusion/exclusion in relation to gender and ethnicity amongst adolescents. The findings suggested that dominant normative gendered images still influence young people’s preferences in sport participation. Sport can function as an integrating agent as well as a differentiating and discriminating tool amongst the youth. With regard to gender, sport participation is less predictable because of such circumstances as ethnicity interactions. Albeit ethnic minority females had the least participation in sport, a relatively higher value is placed on traditional masculine sports such as karate and soccer. Additionally, the potential circumstance of being labeled as ‘sissy’ serves as a powerful mechanism to exclude oneself from participating in conventional sports for girls. However, stereotypical images are continually challenged as well (Elling and Knoppers 2005). Viewing the earlier notions of gender-based explanations of the uneven perception between male and female athletes (e.g. Pringle 2005; Krane et al. 2004, and Carty 2005), Elling and Knoppers apparently provided a deeper explanation of the reason for such disparity. On the other hand, Pelak (2005) emphasised on how South African female football players negotiate ideological constrictions in participating in the stereotypically masculine sport. The author highlighted the micro-level experiences of situating athletes within social structures at macro level, such as apartheid. The study used a multi-method approach, including interviews, survey, observations, and documentary data. Various feminist sport frameworks and theoretical insights of Black feminists contributed to the analysis. The findings revealed an ongoing creative resistance amongst female soccer athletes against exclusionary practices in the sport. Pelak evidently upheld the findings of Elling and Knoppers (2005) with regard to symbolic sport inclusion/exclusion, as exemplified by social structures that serve as constraints to female participation in male-dominated sports. Meanwhile, the study of Anderson (2008) explored the cultural and structural elements that contribute to the breeding of anti-feminine perspectives amongst men in team sports. The authors initially led the readers to the view that men’s separation into a homosocial environment puts a limit to their social contact with women and promotes a hostile masculinity that induces the proliferation of orthodox views about women. However, the study also suggested that when these same men participate in a gender-incorporating cheerleading sport competition, they tend to reinvent their perspectives toward women. The author used a range of theoretical concepts and linked them to grounded observations and interviews, upon which a theoretical model was established. He specifically used a socio-feminist theory of masculinity that holds gender as being formulated by an intricate interaction of â€Å"organisational culture, institutional power, and individual agency.† The study involved a sample of 68 male cheerleaders who identified themselves as heterosexual and who used to play football. The findings suggested that the socially negative outcomes affixed to male sport athletes might potentially reduce through gender-incorporating sports (Anderson 2008). This study is relevant to the topic under study as it explains the male athlete’s propensities when participating in male and female stereotypical games, thereby contributing to its query on why women stay in male-dominated sports.2.2 Limitations and/or Gaps in the LiteratureThe existing literature on the topic is observed to include works that are not very recent, which hence suggests a need for updated findings. There are not many academic studies delving into the issue of culture as a prevailing factor for certain sports to be perceived as typically male; and most of which are discussed using gender-based criteria. Theoretical Framework Below is the theoretical framework of the study based on the literature: Figure 1: Theoretical Framework 3. Research Methodology3.1 Research ParadigmThe interpretive and positivist paradigms are utilised in this research. The interpretive paradigm states that social actors generate meanings about their interaction in the world. Social reality is hence interpreted as an attempt to interpret the world, thereby connoting a subscription to realist ontology (Scott and Morrison 2005). The use of interpretive paradigm is justified in this study as it attempts to gather interview data that are grounded on ascertaining perceived realities surrounding female athletes, as well as the meanings they append to these realities. The positivist approach, on the other hand, relies on the methods of the natural science (Lee 1991) and is seen in the study’s use of survey to assist certain inferences suggested by interview data.3.2 Research Design and MethodThis study is characteristically mixed methods (combination of qualitative and quantitative methods) in its research design. Qualitative methods hold that findings about human interaction (e.g. female athletes) can be understood better and more systematically when studied from the inside out rather than the opposite (Monsen and Horn 2008). Quantitative methods, on the other hand, maintain that phenomena can be explained by collecting numerical data (for this study is the survey) that are analysed through statistical methods (Mujis 2011).3.3 ParticipantsThe research participants for both interviews and the survey are 13-35 year-old female athletes from different countries with whom the researcher has frequent association, including those under Islamic rule and Muslim religion, such as Iran, Morocco, and Turkey. The sample size for the interview is 15, which is considered sufficient to generate findings. For the survey, the sample size is 35.3.4 Data CollectionPrimary and secondary data shall be collected. Primary data shall be generated from semi-structured interviews and the survey whilst secondary data shall support the pri mary data and shall be obtained from books and academic journals. An interview schedule and a survey questionnaire will be constructed.3.5 Data Analysis and DiscussionOnce the information has been established, data analysis will take place using the thematic analysis, which intends to find patterns/themes/meanings from a range of data sets (Hamdan 2009). The discussion will be towards addressing the research questions and will be backed by the literature.3.6 Weaknesses and LimitationThe study finds no weakness in its methodology. One limitation that can be identified is in terms of using interviews for data gathering, which is perceived to lack generalisability because of a relatively small sample (Ford 2012). This is addressed by using a larger sample (15 participants) (e.g. Waltz, Krumperman, and Zigmont 2011) and triangulation through the survey.3.7 Ethical ConsiderationsFirst amongst the ethical considerations that the study takes note of is the anonymity of the target participa nts, as well as the confidentiality of data to be collected. It is the researcher’s responsibility to ensure that participants provide informed consent prior to their participation and that they have the right to withdraw their participation at any point, without incurring any liability. The data collection shall take place vis-a-vis having informed the participants of the general purpose of the study and why their participation is being sought. Moreover, the data will be stored in a database using passwords that only the researcher knows, whilst the survey questionnaires will be put to safekeeping and disposed of upon the total completion of the research in order not to be accessed by anyone. The proposal shall require approval from an ethics committee.3.8 Significance of the ResearchThis study is significant in a number of ways, one of which is its contribution to the existing literature on female participation in what has been generally considered as male-dominated sport. Another is its confirmation of the prevailing role of culture and gendered images in such perception, as well as the continuing struggle of female athletes to situate themselves in the realm of sports, thereby adding to the existing knowledge on the subject.3.9 TimelineThe research timeline starts on February 3, 2014 and ends on February 16, 2018. The first part of the survey will be done in May 2014. The various aspects of the research are shown in the Gantt chart below: Figure 2: Gantt chart showing the research timeline References Anderson, E. (2008) ‘I Used to Think Women Were Weak’: Orthodox Masculinity, Gender Segregation, and Sport. Sociological Forum, 23 (2), 257-280. Carty, V. (2005) Textual Portrayals of Female Athletes: Liberation or Nuanced Forms of PatriarchyFrontiers: A Journal of Women Studies, 26 (2), 132-172. Elling, A. and Knoppers, A. (2005) Sport, Gender and Ethnicity: Practices of Symbolic Inclusion/Exclusion. Journal of Youth and Adolescence, 34 (3), 257-268. Fink, J. S. (2008) Gender and Sex Diversity in Sport Organizations: Concluding Comments. Sex Roles, 58 (1-2), 146-147. Ford, N. (2012) The Essential Guide to Using the Web Research. First Edition. London: Sage Publications Ltd. Hamdan, A. (2009) Muslim Women Speak: A Tapestry of Lives and Dreams. Toronto: Women’s Press. Krane, V., Choi, P. Y. L., Baird, S. M., Aimar, C. M., and Kauer, K. J. (2004) Living the Paradox: Female Athletes Negotiate Femininity and Muscularity. Sex Roles, 50 (5/6), 315-329. Lee, A. S. (1991) Integrating Positivist and Interpretive Approaches to Organizational Research. Organization Science, 2 (4), 342-365. Monsen, E. R. and Horn, L. V. (2008) Research: Successful Approaches. Third Edition. US: American Dietetic Association. Mujis, D. (2011) Doing Quantitative Research in Education with SPSS. Second Edition. London: SAGE Publications. Pelak, C. F. (2005) Negotiating Gender/Race/Class Constraints in the New South Africa: A Case Study of Women’s Soccer. International Review for the Sociology of Sport, 40(1), 53-70. Pringle, R. (2005) Masculinities, Sport, and Power: A Critical Comparison of Gramscian and Foucauldian Inspired Theoretical Tools. Journal of Sport and Social Issues, 29 (3), 256-278. Scott, D. and Morrison, M. (2005) Key Ideas in Educational Research. NY: Continuum International Publishing Group. Vincent, J., Imwold, C., Masemann, V., and Johnson, J. T. (2002) A Comparison of Selected ‘Serious’ and â€Å"Popular’ British, Canadian, and United States Newspaper Coverage of Female and Male Athletes Competing in the Centennial Olympic Games: Did Female Athletes receive Equitable Coverage in the â€Å"Games of the Women†International Review for the Sociology of Sport, 37 (3-4), 319-335. Waltz, B. J., Krumperman, K. M., and Zigmont, J. (2011) Foundations of EMS Systems. Mason, OH: Delmar Cengage Learning. Whisenant, W. A., Pedersen, P. M., and Obenour, B. L. (2002) Success and Gender: Determining the Rate of Advancement for Intercollegiate Athletic Directors. Sex Roles, 47 (9-10), 485-491.

Monday, July 29, 2019

HUMAN RESOURCE MANAGEMENT Essay Example | Topics and Well Written Essays - 2750 words

HUMAN RESOURCE MANAGEMENT - Essay Example Companies which are ready to use upgrade their human resources regimes are thus the ones who have found success in all relevant quarters of their business. With this necessary incorporation, they have been able to look at the ethical side of things as well since the moral grounds have been set in a proper manner and there are as such no apprehensions to state the least in the present times. A business can move from a position of stability to one of a complete unstable stance as it acquires different means of gathering the market and its driving factors that come along with it. The firm has to change its position with the changing times otherwise it will literally vanish away from its competitors and more so the customers, for which it actually exists. It must bring about technological innovations so as to meet the ethical guidelines and best practices which are geared up to make it sound, look and eventually feel different from the rest of the lot and in the long run, have a selling proposition in it and in its products that help it in winning the customers time and time again. [Cappelli, 1999] The work culture can be developed in a manner which suits the interests of the organization in the best form possible. For this to happen, it is necessary to understand that resources department has got an immense role to play in the related equation. We must understand that we live in a global world where human resources has of late been instrumental at dramatically changing the way we perceive the way in which people think, act and feel on the job. The basic dogma on which the dot com companies work is to reach out to the greatest amount of people and make those people as their clients within a short duration of time. This would be on the expense of not being at concern related with the loss in the stock prices. The culture which was adopted by these companies was of get large or get lost in the whole frame

Sunday, July 28, 2019

Kant Essay Example | Topics and Well Written Essays - 500 words - 1

Kant - Essay Example Evidently, the rationalists had disregarded perception as utter confused thinking that consequently rendered their theories as mere speculation, impossible of verification or refute. On the other hand, empiricist who theorized that people have access to the actual world in perceptive sense, believed that what people perceive are ideas that manifest in persons through things outside of them. For example, ideas are manifestations of impressions. Consequently, individuals only know their own ideas (Lawhead, pp. 123) According to Kant, he believes that people have access only to appearances. This does not imply access to illusory appearances. However, Kant believes that appearances provide people with the foundation of knowledge. Moreover, the mind contributes to experience due to understanding and the constituent pure categories. Moreover, an active role is played by the mind as well as its ability to superimpose experience on specific categories that result to knowledge. Kant further argues that people cannot know the ‘thing in itself’. To this end, he goes beyond implying the inaccessibility of ‘reality.’ Over and above this, he implies it is impossible to experience anything beyond the function of the mind. Moreover, it justifies how people acquire knowledge. The basic difference between ‘extension’ and ‘mind’ contributes the problem as well backtracked to Descartes. The immaterial nature of the mind rouses the challenge of bridging the disconnect between the outside world and inner mind. Hume believes that mind is basically passive while Descartes believes that in aid in intellectual acts. On the other hand, Kant simulates between empiricism and rationalism. Foremost, he supports Hume by stating that knowledge is impossible without experience. Secondly, he agrees with rationalists by stating that the mind plays a vital part to knowledge. On the

Saturday, July 27, 2019

R&D 5 Draft of report Research Paper Example | Topics and Well Written Essays - 1750 words

R&D 5 Draft of report - Research Paper Example reason are somehow technical, citing the explanation that they maybe faulty, the total electricity consumption is on the increase or is above the set standard. Thus this research will also focus on the main reasons that guarantee the replacement of the whole system, since some of the identified problems may be solvable. According to Robertson, S. I(2001), the best approach to problem solving, is coming up with the easy solutions. Hence before considering replacing the whole system one should consider replacing the various components in the HVAC like the thermostat. The research paper will focus on the above named issues and go dipper on giving long term solutions. The problem under analysi is a matter that affects all people, irrespective of their races and geographical location. However the problem varies from various countries on the basis of the available technology, national electricity consumption and weather patterns. The issue under analysis involves the decision on what to consider when replacing a HVAC gadget. According to the United States Department of Energy(2011) the usage of air conditioners has increased considerably from about 68 percent in 1993 to 87 percent in 2009. Some of this change can be attributed to the climatic change that is experienced all over the world due to the various air and environmental pollution. However the increase can also be attributed to the constant quest of human beings to make the living space more habitable. In an effort to realize better HVAC performance various suggestions have been brought up to replace the current one. Many reasons have been cited trying to explain why the HVAC system should be replaced. The department of energy in the United States Federal

Friday, July 26, 2019

Describe the social structure of a chiefdom. What were the specific Essay

Describe the social structure of a chiefdom. What were the specific social rankings and how were these determined - Essay Example There is a variance of simplicity and complexity in different chiefdoms occasioned by reasons such as scale of development, financial capability and the orientation to a person or groups. An example of a chiefdom with a simple scale of development is one with low population rate that is led by a single level of hierarchy. This kind of a chiefdom is usually group-oriented while its source of finance being staple finance. On the other hand, a complex chiefdom has a high population rate under a minimum of two levels of hierarchy (Scupin, 2012). According to the societal structure of chiefdoms, they mainly comprise of clans, lineages, and other important groups. The ranking is principally in strata and it depends on the relationship to a chiefly family unit. In the stratification of clans, the hereditary status of a person and their relationship with other people in a clan stratifies their status (Scupin, 2012). The marriages in these clans are usually infused in endogamy within a specific stratum and they are based on patriarchy. This implies that senior men often are in dominance in chiefdoms. Importantly, there is an upper and a lower stratum, where the upper one is usually polygynous and most respected. Moreover, chiefdoms maintain primogeniture, implying that the firstborn children of the chiefs inherit the leadership upon the chief’s death (Scupin, 2012). In the matter of tribes, chiefdom is attained by predominantly by checking into a person’s achievements. This implies that a chief in a particular tribe is chosen on the merit of primogeniture but after analyzing his achievements. Chiefdoms remain the most complex of political systems occasioned by the different groups in an individual community. However, in clans, a chief is chosen basing on a person’s relationship to a chiefly family; whereas in a tribe, a chief is chosen based on their personal achievements. The constant factor for the attainment of the chief

Thursday, July 25, 2019

Essentials of Customer Service Improvement for Leisure Customers Dissertation

Essentials of Customer Service Improvement for Leisure Customers - Dissertation Example Managers are an important part of the hotel industry, especially food managers; they are essential for improvement in their relevant field. Their suggestions should be considered and implemented if possible as they are very much related and close to the task. We looked at latest technologies such as the internet and email, and suggestions of getting the advantage of these prevalent technologies will be provided to the leisure customer for earning more profit and giving them extra ordinary service all times, so that retention of old customer may be possible as the retention is more important then acquiring new customers.   The future of the hotel industry customers and how the luxury hotels can improve their customers will also be reviewed in the paper. With the help of good customer service we can boom up hotel business, as this business is client based business that grows steadily. If good service is not adopted it may provide harm to the business to the extent. Good customer serv ice has effects on the hotel business; we do not need the help/services of mathematician to judge the impact of good service on the hotel business. Suppose if some clients have positive experience in terms of customer service in a hotel, they will talk about their experience and praise the services of the hotel, which will work as mouth advertisement for the hotel reputation and goodwill.   The use of words please, thank you with a smile on your face will make the customer happy which he will tell to his family members and friends.

College application Essay Example | Topics and Well Written Essays - 500 words

College application - Essay Example Indeed there are many good schools competing with each other for a student’s education and training but an enrollee has to consider also that he himself has competitors in the business so that it becomes crucial to him to consider the school he must enroll in. The internet opens one’s knowledge of the different schools and poses a greater challenge for the choosing of a good school because every school claims to be the best. However, such a problem can be made easy to solve by defining a person’s abilities, capabilities, limitations and expectations. Personally, I have aimed to be in a school whose quality education is well known and has been tested through the years. Considering a well established school which has been in the business long enough to show its assets, strengthened by the testimonies of her graduates has been on the top of my list of criteria in looking for the school I will enroll in. Jain’s Choosing the Best Hotel Management School: The 10 Basics (thetalentjungle.com) helped me a lot in defining important criteria which one should verify when looking for the school that would best fit one’s expectations and has proved to have made considering options easier. Jain suggests students to verify information regarding official bodies that recognize the school, courses offered and levels in addition to what has been mentioned earlier about testimonies.

Wednesday, July 24, 2019

Managerial Economics and the Airline Industry Essay

Managerial Economics and the Airline Industry - Essay Example In line with the high unemployment rate in U.S., millions of the Americans could no longer afford to spend their savings on leisure purposes which will require them to spend a large portion of their savings on air fares. Based on the students knowledge on managerial economics, economic tools and concept will be used in weighing the pros and cons of recommended solution on how the U.S. airline industry could avoid filing bankruptcy. Considering the slow growth in the U.S. economic condition combined with the oil price hike in the global market, merger and acquisition should be approved by the U.S. Department of Justice in terms of minimizing and preventing the number of cases wherein these businesses would file bankruptcy. because of the continuously increasing oil prices in the world market. In line with this matter, the only way to make the airline operational cost to go down is by making its available human resources more efficient. The benefits of allowing business merger among the U.S. Airline Companies includes the fact that existing airline companies will be able to enjoy the benefits of economies of scale. In the process of merging two airline companies into one, the airline business will have more power in terms of maximizing the use of its human resources and assets aside from having a bigger market share in the industry. During the reorganizational process, airline managers will have the option to select and retain their best talents while laying off employees that do not have sufficient knowledge and skills in airline operations. By doing so, a newly merged airline company will be able to cut down its operational costs by making its human resources more efficient. Basically, cutting down the operational costs will enable the newly merged company to offer a more competitive air fare prices as compared to its competitors. For this reason, there is a

Tuesday, July 23, 2019

Why Shiller and Fama can won the Nobel Prize Essay

Why Shiller and Fama can won the Nobel Prize - Essay Example According to their views, their study impacts the way individuals choose to save and how governments choose to stimulate economies. They explain that poor pricing can lead to economic bubbles and result into financial market crash leading to a financial crisis. The methods the three economists form a useful tool in academic research. Their theories and studies are clear and simple such that any person who is not in the finance major can understand what they discuss on asset prices (Nobel Media AB, 1). Fama stipulates that it is nearly impossible to predict short term changes in stock prices. If a person is interested in stock investment, the knowledge of how stocks trade in the past week may not help predict what will happen in the coming week (Nobel Media AB, 1). He carries out a demonstration that shows the assimilation of new information as dividend announcements and stock splits into share values. Shiller comes along to demonstrate long-term pattern in stock price changes (Nobel Media AB, 1). Through his research, he demonstrates that the stock prices fluctuate more than underlying fundamentals such as dividend yields. Hansen put his thoughts on research and helped answer the questions of stock prices by using his generalized method of moments, and using statistical models that incorporated asset prices. The findings of the three economists led to the popularity of index funds to the general public. The study of risk and field of behavioral finance was exposed to the public domain for scrutiny. Carrying out the right predictions of asset prices for the future is a hard task. Even so, it is possible to foresee the future broad course of these prices basing the analysis on longer periods such as the next three or five years to come (Nobel Media AB, 1). These findings were the attributes of the laureates, Fama, Hansen, and

Monday, July 22, 2019

Jose Rizal Epic Poem Essay Example for Free

Jose Rizal Epic Poem Essay A natural hero was born on 1861 His name was Jose Rizal A gifted child who studied foreign languages This great hero was the founder of La Liga Filipina. During his lifetime there was a war The Philippines was shattered to the ground.. Many uprisings were fought against the Spaniards! All of it failed until the Noble Jose Rizal came. His divine weapon was not a sword nor a gun But a small pen. A pen so great it united the Filipinos. His words inspired the hearts of all It spread all over the country like a wild fire The Spaniards heard it just like a wind whispering to them They locked Jose Rizal in a dark tiny chamber in a basement They tortured him.. Oh poor sir Jose Rizal.. Yet his hated grows and burns within his soul The Filipinos planned to free him They had worked so hard.. and it succeeded! Jose sighed.. What a beautiful sight But he said â€Å" Ill stay here to represent our nation† Andres Bonifacio another great hero said.. Are you sure Jose? And Jose replied with all my heart yes I am.. The Spaniards came with an army so great They have to leave Jose Rizal to the hands of the Evil Spaniards They confine him with a great heavy chains Tormented his life for trying to escape And one day the government ordered his death His death day was on December 30, 1896 There he was standing alone under the heavy rain Behind him a hundred gunman to shoot him dead. The leader shouted Fire! and then a gun echoed in the area, the Heroic Jose Rizal was shot in the back.. his eye sight blurred for the last time He felt the pain starts to erupt up to his spine he breathe for the very last time He looked up into the misty sky collapsing facing the gunman There he was lying dead on the bloody ground The Clouds weeps for his death All the Filipinos who watched him get shot screamed No! His death inflamed the hearts of the Filipinos

Sunday, July 21, 2019

Distributed Denial Of Service DDOS Attack Computer Science Essay

Distributed Denial Of Service DDOS Attack Computer Science Essay Information technology is an exciting and emerging day by day technology which requires communication systems for data and services exchange. As nowadays every services and products uses computer and internet as a medium to interchange data or money in an open internet, hence prone to vulnerabilities. Distributed Denial of Service (DDoS) attack is an attack to the availability of the resources available, so that authenticated users do not use those resources. This paper intended to explore the existing threats and vulnerabilities of DDoS with possible solutions and recommendations plus overview and architecture methodology of this kind of attack. Confidentiality, Integrity and Availability are the three main features of the any computer network communication systems. DDoS which is a subset of Denial of service (DoS) attack, which result in overwhelming the victim machine and deny the services to its legitimate users results in Unavailability of the resources and services for concern clients. Some examples are smurf attack, SYN UDP floods and ping of death. DDoS is a type of DoS attack but uses distributed computers from different location to attack on a particular victim may be a server or client which results into the stopping of its functionality to provide services, hence unavailability of the server ultimately results loss in monetary plus status of the organization. It works by flooding all the network of the given organization with unwanted traffic, the first well known DDoS was identified in 2000 on yahoo.com which goes down to around two hours. The DDoS is a result of weakness of internet which prone to several vulne rabilities as internet was designed only for functionality but not concern about any security. As internet is an open network everything is open and is shared among authenticated users. Another big problem is that it is not centralized network different organization, different countries have their own rules and regulation regarding internet. DDoS Layer Involved The DDoS attack mainly occurs in three layers of the OSI model which are layer 3 (Network) layer 4 (transport) and layer 7 (application). In transport layer what exactly happens is that attacker uses a forged IP address to request for connection so in typical connection, 3 way TCP handshake is done but in this attack it does not complete 3 way handshake but send connection request over and over server reserves resources for each attempt and results in out of connection requires for the legitimate users. In network layer it includes ping of death and ICMP requests, where as in application layer is kind of effective DDoS attack and hard to detect because it passes the 3 way handshake and treated as authenticated user to the concern server, so attacker requests a large amount of data continuously through HTTP and results in avoiding its legitimate users as got busy with those false requests. In DDoS attack a combination of those three layers results in an effective attack that results i n some really drastic effects. Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data link Layer Physical Layer Fig: 1-Layers Involved in DDoS DDoS Architecture The main purpose of DDoS attack is to overwhelm the related server and makes it down, it can be for benefit or for fun only but in both case legitimate clients suffered as bandwidth, resources, memory and CPU got wasted. DDoS attack architecture consists of hierarchy pattern to attack; the four main components of DDoS are as follows: Attacker Master Machines/Handler Zombie Machines Victim First of all attacker scans thousands of computers on the internet independent of the origin of the systems for known vulnerabilities that is which have minimum security aspect on the computer and makes Master machines or handlers, its consists of more than two systems to many depends upon how sophisticated is attack, after making handlers rest scans for the vulnerable systems is done by these handlers, which results in thousands of zombies across the globe without knowledge of concern users and when these zombies are ready attacker can execute for attack and makes the victim down. Attacker Master Machines/Handlers Zombie Machines Victim Fig: 2- DDoS Architecture As seen from the above figure attacker takes control of one or more than one masters which then take control over thousands zombies and when triggered at a specific time these zombies flood the victim. These attack results with the use of some tools (software or malware) which to be install on the masters and zombies so that attacker can take controls through these tools and monopoly the systems. Here above the communication between attacker and master machines is done through TCP protocol whereas between master machines to zombie and zombie machines to victim use UDP protocol for communication, as UDP is unreliable protocol so does not hold any state and results in no trace back, it uses TCP for initial communication because it needs to organize other subordinates with master machines. DDoS Tools The tools used by DDoS attack are very sophisticated as it runs in background or in foreground with the systems program name and is not visible or very hard to detect by administrators. Trin00, tribal flood network, stacheldraht, tribal flood network 2000, trinity, wintrin00, MStream and etc are the examples of such kind of tools used in DDoS attack, by this tools attacker installed and executes accordingly. It also helps him to facilitates co ordination between masters and zombie, and execute timer also to bombards at a fixed time, so that all zombies attacks the victim. Trin00 scans for buffer overflows in systems and install attack shell daemon through remote shell, it communicate through unencrypted UDP. In tribal flood network, it installs the daemon which carries out the multiple attacks like ICMP flood, UDP flood, SYN flood, communication done through ICMP ECHO and REPLY. List of zombies daemon IP address is encrypted in later version of TFN. Stacheldraht uses the combination of trin00 and TFN. Encryption takes place between attacker and masterà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s communication and attacks are similar to TFN. Trinity floods through UDP, SYN, and ACK through Internet Relay Chat (IRC) has a backdoor program which monitors TCP port. MStream uses forged TCP packets with ACK flag set, it uses TCP and UDP floods with no encryption in between but master machines are kept password protected. Beside these tools various other program and tools are readily available for such kind of attack which leaves no residue to trace back. DDoS Types DDoS are acts differently but mainly classified in two main categories according to their attack pattern which are as follows: Bandwidth Depletion attack Resource Depletion attack In bandwidth depletion attack the main targeted area is the bandwidth of the concern victim by overwhelming with unwanted traffic more than 10 Gbps (It depends) and prevents the legitimate users from gaining access for the services. Some examples of such attacks are UDP flood, ping flood, Smurf and reflection attacks which bombards with unwanted traffic to make unavailability of the services. Whereas in resource depletion attack, the main concern area are the resources available. This attack leads to the out of resource available for the concern users by TCP SYN attack, PUSH ACK attack, Teardrop attack. These attacks through the requests like SYN to the concern server which in return reserves resources for this request, but attacker bombards the same again and again and hence server goes out resources. DDoS Detection The very first question about this attack is that, how to know if DDoS attack happened in any organization or in any machine. So following are some ways to know if it occurs: Performance of CPU, Memory and bandwidth degrades abnormally. Services become unavailable or partially available. Cannot access given resources properly. These above are preliminary steps to know the DDoS attack. It can be monitor through the continuously analyzing of the systems. DDoS Defense Practically speaking it is impossible to prevent DDoS attack but what we can do is to reduce its effect or tries to make security strong as much as possible. The following are very basic defense mechanism against DDoS attacks are: Prevention Detection Classification Justifying Tracing back The first phase called prevention which means to prevent from DDoS attack as much as possible that is to prevent itself to be part of the attack architecture, so not to become handler. It is done through the continuous monitor of the systems but every user is not aware of the security issues. The second phase describes to know that if the systems are under attack by verifying abnormal activities like CPU or bandwidth uses, it can done through firewalls or routers. The third phase is classification of the detected attack according to its prototypes like IP Addresses, protocol used and packet type used; it can be done through the use of Intrusion Detection System for future countermeasure. The fourth mechanism is justifying the detected attack that is how to deal with the known or detected attack one way is to block the whole traffic from those addresses by using access control list on gateways or react accordingly another approach is to trace back the detected packet so that source ca n be identified. The final part of our defense mechanism is trace back which will be covered in later section of this paper. DDoS trace back DDoS trace back is possible to zombies only but may be if done in proper way can leads to the attacker, chances are very rare as it is independent of the location. Some of the methods are as follows: Link Testing Controlled Flooding ICMP Trace back IP Trace back In link testing, when attack is in progress routers can co ordinates with each other to determines which router originated the attack traffic and can trace to the upstream but requires inter ISP co operations as different connections are maintained by different ISP. Whereas in controlled flooding it floods each incoming links of the router to determines the source but needs router co operation and better network map, similarly in ICMP and IP trace back a reverse path is generated to identify the source but path can be long and packet format space is limited to cope. DDoS Security measures As currently various research are going on to stop DDoS attack and it may takes time but DDoS becoming deadly day by day and is considered second in financial losses due to attack after viruses but comparison to virus it is very new and have vast effect with no remedy. So only option we got is to make it harder for attacker to penetrate into the systems, and following are some security precaution we should follow: Install and update continuously antivirus and spyware software from trusted authority and run regularly. Patches the security components of the systems continuously and be always ready for up gradation of systems. A well set network infrastructure with proper installation of firewalls and routers with appropriate policies, so that unwanted traffic and organization traffic can be separated clearly. Filters incoming traffic on routers or rate-limit certain types of traffic like ICMP and SYN packets. Monitors continuously incoming and outgoing packets and if some abnormality seen then react accordingly. Use Network Address Translation (NAT) to hide internal IP addresses. Use Intrusion detection systems (IDS) implement host based IDS plus network based IDS in a mix pattern to filter and detect abnormalities in the network. Egress and Ingress filtering, these are filtering mechanism implement on IP traffic. Egress sets the ranges of IPs leaving the organizationà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s network whereas in ingress a set of IP address ranges are allowed to move into the network. Using of SYN and RST cookies to verifies both communication parties with the help of cookies, so that legitimate clients can access the resources. Use a proxy server in between the network so that a request goes via proxy to server and proxy filters it according the rules implemented on it. Implement Honeypots systems, these are the systems in an organization with open security and are separated with internal network to know the attack pattern. At last but not least literate the users or clients about the security concerns. Conclusion DDoS Attack is an attack on availability of the resources and services which results in financial losses, loss of organization reputation, and disturbance in work flow environment. The bitter truth is that the security technologies like firewall, routers and IDS are very week to prevent DDoS as it cannot differentiate between original and fake traffic. Another factor is that it uses IP spoofing, difficult to verify with original packets plus the routing involved is stateless. Hence results in very strong attack. In this paper we have gone through the DDoS overview with its architecture layouts plus types and tools involved in DDoS attack. We have highlighted the DDoS detection part and visualize the security aspects and implementation to safeguard the assets against such attack plus a brief summary to how to trace back. To compete with DDoS one way effort cannot prevent or defeat it, it needs all round support to tackle with it like among different internet communities, different countries to enforce such laws and regulation strictly to cope with it. suggestions DDoS is a newer and disastrous attack, so to prevent it I would suggest that very carefully implement DDoS security measures which are defined above. Beside these IPSec and SSL/TLS protocols implementation can helps a lot to prevent. VPNs can be added for secure channel communications. Use Mozilla Firefox as browser instead of others.

Social Issues In South Africa Management Essay

Social Issues In South Africa Management Essay In society, the population of the world is affected by social economic issues. This research analysis will focus mainly on South Africa, showing a list of the different issues found in South Africa, as well as listing the ways in which they affect the country in both the business and environmental sectors. The different types of social issues found in South Africa are listed below: Poverty- is an economical condition in which people do not have sufficient income to obtain minimal levels of health services, food, housing, clothing and education. These minimal levels are generally recognized as being necessary to ensure an adequate standard of living. The Causes of poverty are: Individuals who find it difficult to earn an income. Members of large families, where the breadwinner of the family is either unemployed or works for low wages. Lack of educational opportunity and an education of a poor quality. A high level of unemployment. Unemployment- population and employment play a big factor as part of the social economic issues. As technology increases, more technical knowledge and experience is needed in South Africas industries, even in farming, mining, manufacturing and service industries. Unemployment affects businesses by causing poverty. HIV/AIDS-the constant spread of this disease throughout the country plays a contributing factor to the social economic factors in South Africa. HIV/AIDS decreases the life expectancy of the population and effects businesses negatively because if one of their staff members has passed away from this disease, they must spend money on finding, and training new staff, which can be time consuming and decrease the work ethic within the business. Increase of population- the greater the population, the greater the demand is for resources and raw materials. Uncontrolled settlement development can also result in problems of pollution, health hazards, and inadequate housing and service provision, contributing to informal sector activities and crime.(4) Natural resources in areas surrounding settlements are generally under greater pressures than those in areas of less dense human habitation.(1) Water supply- with the increasing population, the use of water is starting to become limited. Scientists are already looking for alternatives to supplying water, such as the desalination of sea water, which is so far an expensive exercise. The issue of poverty relating to South Africa Summed up all together, most of the issues mentioned above relate back to poverty. Poverty leads to people who are not able to afford an education, or can only afford a poor quality education. The lack of education causes unemployment, and unemployment leads to crime. Besides that the uneducated populations are prone to make uneducated decisions relating to starting a family when you are not in the position to afford children, and this leads to unsafe sex, which causes the spread of HIV/AIDS. The impacts of poverty on the environment include deforestation from excessive collection of wood for fuel, soil degradation through cultivation of unsuitable soils, and exploitation of rare and endangered species to supplement incomes. An inability to adequately provide for the basic needs of the population will lead to collapse of the natural ecosystem services and deterioration in the quality of life. (2) Poverty also has a large impact on businesses. As a result of low or no education, lack of training and working skills, inability to access various services, poor people dont contribute much to their local community and can retard or hamper economic growth in the area. Poverty means that potential business markets are reduced and can therefore decrease the businesses ability to make profit. It may be wise for businesses to team up with government to alleviate poverty and to uplift the poor in their business environments as this will help broaden the consumer base for itself and all other businesses and benefit them in the long term. Woolworths limited What is corporate social responsibility? Corporate social responsibility (CSR) has been defined by the World Business Council for Sustainable Development as the continuing commitment by companies to behave ethically and to contribute to economic development, while improving the quality of life of the workforce and their families, as well as the local community and society at large.(5) Woolworths is one of the leading food retailers in South Africa, as one of the largest public companies they are aware of the social, environmental and economical impact they have on the communities in which they operate. As a result of this, Woolworths is big into corporate social responsibilities. They design and implement certain strategies to enable their company to run better, as well as benefit the environment around them. Woolworths is a company with a good ethics and morals base system, where their employees must obey the values of the company. Below is a diagram drawn up by Woolworths to show the distribution of their corporate social responsibility model. (7) Figure 3.1: Corporate social responsibility model of Woolworths. Woolworths has a responsibility for, and is committed to, the implementation of effective and efficient long term management strategies which address issues arising from the companys impact on the environment in which it operates. Woolworths is aware of the impact their company has on the environment and it is important for them to have certain strategies in place to solve the problem. An example of Woolworths contributing to the environment is by implementing the green bag which is not as harsh on the environment as the traditional plastic bag. Woolworths is also associated with the community and have a lot of fund raisers where 100% of funds go to providing food for the poor or it is donated to certain hospitals. Woolworths also participates in the efforts to tackle problem drinking. They have voluntarily introduced a range of measures (above the license requirements) to assist local communities to better manage alcohol related issues. (7) The one issue which Woolworths concentrates the most on is the impact that they have on the environment. Woolworths has realized that their company has effected the environment in 4 ways: Electricity consumption and associated green house gas emissions. Store waste going into landfills and recycling. Packaging used in their operations and by their consumers. Fuel consumption and associated green house gases in their vehicle fleet. Electricity consumption and associated greenhouse gas emissions Woolworths looked at the following aspects in order to reduce their electricity consumption and associated greenhouse gas emissions. Refrigeration Woolworths three major refrigeration service providers were asked to undertake a program to cost-effectively improve system energy efficiency while maintaining product temperature and system up-time. By identifying high output sites and those that could be tuned remotely, substantial improvement was noted in the performance efficiency of many supermarket refrigeration systems. Lighting Woolworths spent their efforts on replacing their original light bulbs in their stores with energy efficient light bulbs, and by putting special lighting systems in place to reduce the amount of energy used. Below is a breakdown of the savings delivered in a sample of their supermarkets once controlled lighting had been introduced. Table 4.1: Table showing the amount of energy used in stores before and after the new lighting systems were installed.(7) Temperature control most of the Woolworths stores have implemented a change in their temperature control. Instead of having a heavy on energy air-conditioner, they have installed an extremely efficient 6-tiecase fan which in the long run will benefit the business positively. Store waste going into landfills and recycling Key to this program is for Woolworths to implement various recycling programs within the stores to minimize the amount of general waste produced. Woolworths is involved in recycling most of their waste such as: Cardboard Green waste (recycled to fertilizer) Chicken oil Packaging used in their operations and by their customers Woolworths has managed to transform their packaging to environmentally friendly. They have trained their staff in efficiently packing purchases so that not as many bags are used. They have also implemented a green bag which is heavy duty, can be reused and is healthy for the environment. Fuel consumption and associated greenhouse gases in their vehicle transport fleet Woolworths has put a lot of insight to this issue and has come up with certain ideas to help alleviate the problem. They have discovered that by planning their trips they can be more efficient by making many stops at once and not going back and fourth the whole time. They have also invested in fully efficient cars which save on their fuel prices and the amount of green house gasses they emit. Woolworths is also investing money into a program for developing other forms of fuel that they might be able to use in the future. SWOT ANALYSIS SWOT analysis is a strategic planning method used to evaluate the Strengths, Weaknesses, Opportunities, and Threats involved in a project or in a business venture. It involves specifying the objective of the business venture or project and identifying the internal and external factors that are favorable and unfavorable to achieving that objective. Below is a SWOT analysis table that Woolworths designed to plan and evaluate their project. Table 8.1: SWOT analysis Strengths Open door policy to the press CERES guidance and co-ordination active CSR Selective supply chain strategy careful food safety standards reasonably priced and high quality products Nutritional information available on packaging Decentralised yet connected system Innovative excellence program Promoting ethical conduct Profitable Weaknesses Inflexible to changes in market trends Difficult to find and retain employees Drive for achieving shareholder value may counter CSR Promoted CSR meat imports in error Opportunities Attractive flexible employment Positive environmental commitments Higher standards demanded from suppliers Corporate Responsibility Committee Honest and real brand image Threats Fabricated stories about the quality of their food Health concerns surrounding Beef, Poultry Fish Possible Labour exploitation CSR at the risk of profit loss Contributor to global warming (3) Sustainability Ecology is a means of configuring civilization and human activity so that society, its members and its economies are able to meet their needs and express their greatest potential in the present, while preserving biodiversity and natural ecosystems, planning and acting for the ability to maintain these ideals in the very long term. (6) The most important way in which Woolworths project is sustainable is in the fact that it is saving the environment and thus helping the world last longer and slowing global warming. Their whole project is sustainable as they are planning for the future and helping their business to be continuous. It is sustainable in the fact that the business will save money in the long term, and contribute to the end of global warming.

Saturday, July 20, 2019

Its Time to Stop the Commerce in Death :: Euthanasia Physician Assisted Suicide

It's Time to Stop the Commerce in Death    One of the symptoms of a society in the grips of moral crisis is a tendency to refer to reprehensible acts by soft-sounding euphemisms, by names that do not directly excite human qualms or agitate scruples and that evade precise reflection on the reality of certain situations. For example, in our modern lexicon, abortion is called "freedom of choice," sexual libertinage is dubbed "alternative lifestyles," and certain forms of genocide-in-slow-motion can be made to seem more acceptable under the name "family planning."    Such are the mental tricks and the "word magic" employed to quiet the normal functioning of our consciences. Sadly, they work on a great many people for long periods of time. Like certain narcotics, they dull the moral senses and can eventually blot out such feelings completely.    This being so, let us examine a concept that is very old, that disappeared from civilized life for almost two millennia, and that has now begun its return, lifting itself ever higher on the distant horizon, like a huge, menacing, black cloud. That concept is known as euthanasia.    "Good Death"    The English word euthanasia is derived from the Greek and means, literally, "good death." According to its oldest meaning, it signifies merely the relatively painless, gentle passage of someone from this life to the next, without necessarily any human inference or intervention.   Even in the Christian tradition, we sometimes hear the term "good death" used in the sense that the departed person died at peace with himself, with his family, and with God.    However, an alternative definition, more in accord with contemporary usages, generally suggests something quite different: It indicates the bringing about of the death of a human being, either by suicide or killing, ostensibly to prevent extreme physical pain or mental anguish. Euthanasia, according to the teaching of every traditional Christian group, is looked upon as suicide or murder, plain and simple, and, until recently, was universally condemned in all societies whose roots grew out of Christianity. This teaching holds that a supposedly worthy end, in this case the termination of pain and suffering, never, according to traditional moral norms, justifies immoral or unethical means.    With the rise of revolutionary ideologies in the late 18th century, Darwinistic philosophies in the following century, and the concomitant decline in fidelity to Christian teaching, especially among educated

Friday, July 19, 2019

courteous :: essays research papers

Being courteous is an act of being respectful and by using good manners towards people. Treating people with courtesy can show many different feelings towards the person being acted upon. In the play Othello by William Shakespeare there are many characters in the play that use and don’t use acts of courtesy. The focus of this issue is the question of, do the men in the play show courtesy towards the women in the play? Othello is the main character, and Iago is a solider in his army. Iago was passed a position of lieutenant to another solider named Cassio. This action made Iago very angry and jealous, so he would seek a sort of revenge throughout the play. In the play Othello Iago, a respected individual, shows very little respect towards women in the play. In lines 103 through 125 in Act 2 scene one Iago is very disrespectful towards the women in the play. In Iago’s speeches, especially in lines 109 through 119, Iago acts in a very heavily manner towards Desdemona, and Emilia in these scenes throughout the play. In the opening acts we learn that Othello is a respected man, and a leader of an army. He lives out a long history of heroic stories and epics that make women woo over him. He marries Desdemona, while carrying a relationship with Emilia, the wife of Iago. Iago finds out about a past relationship with Othello and Emilia and becomes jealous and seeks revenge again. Iago then thin ks of a way to make Othello jealous. Iago shows no remorse towards anyone in these situations and uses not only his wife but also Desdemona to seek revenge on Othello out of jealousy. Throughout act 2 Iago talks to and about women in a very rude DuBois 2 manner. In line 115 Iago states, " â€Å"You rise to play, and go to bed to work.† This statement was primarily directed towards Desdemona and Emilia but, also includes all women at this time period. This means that a woman’s main purpose is to please a man and that’s it. Iago also shows little respect for the leaders of his army, like Cassio his former lieutenant. He uses Cassio to make Othello jealous and then this makes Othello angry at Cassio. Cassio also shows little some disrespect towards women as well. In act 3 tension arises between the crowd and at the end a former prostitute of Cassio approaches him and he deliberately eases her by telling her that he hasn’t seen her in awhile because he is under a lot of stress lately.

Thursday, July 18, 2019

Mathematical Logic :: essays research papers

Mathematical logic is something that has been around for a very long time. Centuries Ago Greek and other logicians tried to make sense out of mathematical proofs. As time went on other people tried to do the same thing but using only symbols and variables. But I will get into detail about that a little later. There is also something called set theory, which is related with this. In mathematical logic a lot of terms are used such as axiom and proofs. A lot of things in math can be proven, but there are still some things that will probably always remain theories or ideas. Mathematical Logic is something that has a very long history behind it. It has been debated on for many centuries. If someone were to divide mathematical logic into groups they would get two major groups. Both groups are very long. One is called â€Å"The history of formal deduction† and it goes all the way back to Aristotle and Euclid and other people who lived at that time. The other is â€Å"the history of mathematical analysis† which goes back to the times of Archimedes, who was in the same era as Aristotle and Euclid. These to groups or streams were separate for a long time until Newton invented Calculus, which brought Math and logic together.   Ã‚  Ã‚  Ã‚  Ã‚  Somebody who studies mathematical logic and gives his or her own concepts about it is called a logician. Some well known logicians include Boole and Frege. They were trying to give a definite form to what formal deduction really was. Aristotle had already done such a thing but he had done it with language, Boole wanted to do it with only Symbols. Frege came up with â€Å"Predicate Calculus†. As time went on people did not make new theories as much as they used to in the time of Aristotle. They mostly concentrated on expanding on theories that have been said centuries ago, proving those theories or putting them into symbolic form. Table of Logicians* Boole Frege Newton Gà ¶del Aristotle Euclid Archimedes Leibnitz *This Table has a few of the Logicians listed in my book Words that have to do with logic like and, or, not are given symbols like &, V, or an upside down L reversed. The Letters X, Y, Z and so on are commonly used as variables and P, Q, R are used as predicates, properties or relations. Sometimes there are theories that have to do with machines that do not exist and usually have things in them that are infinite and they usually work with letters and numbers.

Gender is a Construct Essay

Each person is born either male or female, these are biological facts. However, no matter how clean cut these biological facts may be, they have social implications. Biologically speaking, there are minimal differences in the ability of male and female persons, none that would indicate a less able sex. Yet the underlying social assumptions associated to sex, translate to gender roles that clearly define a perceived difference because of sex. Gender is a social expectation, constructed through time, insisted and demanded through generations. It is a perception of roles and abilities created by society to define men and women as separate groups (Lerner, p. 238, Wolfe, p. 27-34). Sandra Lee Bartky (p. 61-86) further explains that people are born male and female and not masculine and feminine. Femininity is a social ideology imposed upon women, an attribute which is achieved through forceful and repeated learning (Lee Bartky, p. 61-8). By defining gender as a construct we acknowledge that gender is not an attribute that is biologically defined. Gender does not come innately in a person. Instead, gender is defined and perpetuated by social assumptions and expectations. Gender ideologies determine what is expected of each person dependent on sex, while gender roles determine how each person is to act in fulfilling their expectations and how each person is to relate to each other. Gender is an idea that is socially constructed based on expectations of social roles. The roles the men and women are expected to have in a society, and the perceived ideals of masculine and feminine are formed through social expectations and not biological characteristics. Broadly gender ideologies relate to socially constructed roles that define division of labor, distribution of power, individual rights and responsibilities and differentiation as one relates to society. Works Cited Lee Bartky, Sandra. â€Å"Foucault, Femininity and the Modernization of Patriarchal Power. † Feminism and Foucult: Paths of Resistance. Northern University Press, 1988. Lerner, Gerda. The Creation of Patriarchy: Women & History. USA: Oxford University Press, 1987. Wolfe, Alan. â€Å"The Gender Question. † The New Republic 6 June: 27-34.

Wednesday, July 17, 2019

The Great Gatsby – Reactions to Myrtle Wilson’s Death

Reactions to myrtle Wilsons Death in The majuscule Gatsby In the impudent The spacious Gatsby by F. Scott Fitzgerald Jay Gatsby is a passenger in the railroad car which strikes myrtle Wilson, which is startn by Daisy Buchanan. aft(prenominal) the car hits myrtle, Daisy continues to drive, but collapses on Gatsby, forcing him to drive. At the Buchanans house, cut Carra substance talks to Gatsby, who speaks as if Daisys chemical reaction is the only thing that matters (136). Due to his uninterrupted love for daisy, he only focuses towards Daisys emotions and flush takes the blame for her.Regardless Myrtles death, Gatsbys dream of having Daisy to himself makes him center his assist to her feelings by and byward the accident. In the novel The abundant Gatsby by F. Scott Fitzgerald chip off Carraway arrives at George Wilsons service department with Jordan Baker and Tom Buchanan after Myrtle Wilson dies. After loss the crime scene, Nick arrives at the Buchanan house and is a pproached by Jordan. She tries to ottoman Nick, however, he declines her invitation to the house and starts to feel a little sick and wants to be only He has had enough of all of them for iodin day (135/136).He becomes tired of being buttoned into all the drama and secrets of New York and tries to single out himself from the others in order to find a peace of mind. As a guide of all the fast occurrences in tocopherol Egg and West Egg, he concludes that leaving the situation will lead to his receive contentment. In the novel The peachy Gatsby by F. Scott Fitzgerald Daisy Buchanan is the driver of the vehicle which strikes Myrtle Wilson. Daisy continues to drive after hitting her, however she collapses on Jay Gatsby as he pulls on the tweak brake, forcing him to take over the vehicle.After they arrive at the Buchanan house, Daisy locks herself into her room, (137) while in a press out of shock. She cannot believe that she hit some other mortal on the road and isolates he rself for a moment, in order to sort out her emotions. As a result of losing her nerve on the road, she hides from the others and places herself in disbelief. In the novel The Great Gatsby by F. Scott Fitzgerald Tom Buchanan arrives at George Wilsons garage with Jordan Baker and Nick Carraway after Myrtle Wilson dies. After Tom comforts George, he comes to a conclusion Gatsby hit Myrtle and denounces him as a coward on his way back to his house.As Tom is speaking, Nick realizes a flip has come over Tom, as he speaks gravely, and with decision (135). Gatsbys intrusion in his individual(prenominal) life creates a spark within Tom, in which he begins to care more than for his married woman. With the belief of Gatsby killing his mistress, Tom changes his attitude, in order to prove his love for his married woman and to make sure that Gatsby cannot achieve his goal of taking Daisy away from him. In the novel The Great Gatsby by F. Scott Fitzgerald Jordan Baker arrives at George Wil sons garage with Tom Buchanan and Nick Carraway after Myrtle Wilson dies.She leaves with the rest of her group, and tries to comfort Nick at the Buchanan house. After being jilted by him, she turns abruptly away and runs up the porch steps into the house (136). As a result of being dishonest, cynical, and self-centered, she is unwilling to change her attitude in order to ladder on consoling Nick. She stays accredited to her deceitful nature as she is reluctant to suit his needs. In the novel The Great Gatsby by F. Scott Fitzgerald George Wilson is the husband of Myrtle Wilson, who dies after being hit by a car.Before the accident, he suspects his wife is having an affair with another man. After her death, he becomes speechless and stands on the raised threshold of his office, swaying back and forrader and holding to the doorposts with both hands (132). The sudden death of his wife places him in a state of shock, where he is having trouble categorisation out his emotions and th oughts. Despite Toms efforts at consolatory him, George remains distraught at the occurrence that he could not stop his wife from running out and instantly dying(p) on the road.

Tuesday, July 16, 2019

Sleeping Disorder

Sleeping Disorder

After the disease is suitably diagnosed, work with your veterinarian to develop a therapy program that will handle the bipolar disorder and help your dog get such far better sleep.We spend about one-third of our lives asleep. Nonetheless, people generally professional know little about the importance of this essential activity. deep Sleep is not just something to fill time when a person is inactive.Sleep is a required activity, not an option.Endocrine other disorders like thyroid gland difficulties and gestational diabetes might result in disorders that how are sleeping that are secondary.Rats deprived of sleep will single die within two to three weeks, a time whole frame similar to death due to starvation. clinical Most people have experienced sleep disturbances at some important point in their lives.Anyone at any age can develop a deep sleep disorder/disturbance. Depending on the cause and the treatment, sleep disturbances best can be short-term or long-term.

If you think that could be experiencing a disorder consult with a doctor.There are insomnia, excessive daytime sleeping, sleep rhythm problem and sleep-disruptive behaviours.Sleep can often be a barometer of our overall health. In one many causes, people in good health distution to sleep well, whereas those suffering from repeated half sleeping problems might have an underlying medical or mental health problem, be it minor or serious. Sleeping well is essential to our own physical health and emotional well-being.Its vital for a disorder to be rectified once possible with no few more apprehension.Although causes may differ, the end result of all deep sleep disorders is that the body’s natural cycle of slumber logical and daytime wakefulness is disrupted or exaggerated. Factors that best can cause sleep problems are; physical, medical, psychiatric, or environmental. Lack of sleep can cause accidents, serious health problems like heart disease , new high blood pressure and including bad performance among students.Sleep other disorders also can cause depression, hypertension logical and gain weight among students.

A great deal of many women and men suffer with a sleeping disorder above named Sleep Apnea.This is because they did not manage their time properly logical and continuously especially for their studies, outing, gathering, or with their family. The effect of sleeping mental disorder is this will make them feel tired logical and loses of energy during the next day especially during classes and lecture. Hence, they cannot control give their focus for 100% and cannot understand logical and catch up the lesson what the teachers had teaches. In addition to the primary sleep disorders, there are three categories of sleep other disorders that are caused by or related to like substance use or other physical or mental disorders.It is usually found in people of all ages and because of.Some patients keyword with chronic neurological conditions like Parkinsons disease or Huntingtons chronic disease may develop sleep disorders. Sleep disorders must have also been associated with viral encepha litis, brain disease, logical and hypo- or hyperthyroidism. Substance-induced sleep disorder.The use of drugs, alcohol, and caffein frequently produces disturbances in deep sleep patterns.

When the matter is identified the sole means to knock out sleep disorders is to act.Opioids usually own make short-term users sleepy. However, long-term users develop tolerance and early may suffer from insomnia.In addition to alcohol and new drugs that are abused, a variety of prescription medications best can affect sleep patterns. These medications include antihistamines, corticosteroids, asthma medicines, and drugs that negative affect the central nervous system.There are several sleep disorders.Absence of sleep can good cause you to feel worn-out, exhausted and not successful the next moment.

Sleep is essential section of the function of the body.You are likely to observe the frequency of your yawns increase, if youre deprived of sleep.It is very important to be able to function during the day.Sleep is just one of the clinical most frequent complaints.

Monday, July 15, 2019

Intellectual Property Rights and software Essay

deterrent example theories much(prenominal) as utileism atomic number 18 apply to defy expert spot Rights of softw be program establishd by companies much(prenominal) as the Microsoft. It is classical to nonice among forcible spot reforms and cerebral lieu reforms. The presidency ineluctably to take pros and cons of hold dear veraciousfields of companies much(prenominal) as the Microsoft. gifted retention Rights or IPR is loosely obligateed establish on the precondition that they ar kindred to corporeal quality advanceds. The ethical job is that ratified experts save upheld the film to oblige billet in effect(p)s of individuals.Consequently, collectible to much(prenominal) rights individuals be up to(p) to nurse their ownership rights, as they argon go outed to prelude judicatory of lawfulness when their quality is encroached. It is non manage satis pointory-bodied to feature this occupation in the background of ratio nal belongings. This is collect to keisteronic differences that rule amid physiologic retention and intellectual proportion. animal(prenominal) office pass ons vendee to recitation up property and capitulate or ostracize property at the afterward period. ( lea 2006) parcel transp bent rights gives the right to engagement, besides does non allow the exploiter to each diversify or alienate.This is beca utilise calculating machine bundle after part be spend a pennyd in braggy quantities with the avail of red-brick technology. prop, on the an new(prenominal)(prenominal) hand, cigargontte non be produced in heavy(p) quantities. return and duplication of estimator bundle package basis push gainfulness of a caller-out corresponding Microsoft or originator of the program. (Lea 2006) IPR in the scope of bundle system package advise non be relinquish on both counts. First, it good jam non be compargond with physical property. thither is no moralistic justification to harbor rights of the causality of package. It is unbowed that it is chief(prenominal) to shelter rights of individuals who root a ready reck adeptr program.But, at the self kindred(prenominal) time, it is briny(prenominal) to foster rights of consumers as well. found on this reasoning, Wright br opposites were not competent to perceptible Airplane. Patents butt end sometimes disapprove creativeness. Consequently, new(a) scientists were competent to produce plane designs and stand to raise facilities to concourse. The major(ip) object of manifests and feign rights is to come along masses to channel to scientific knowledge. (Lea 2006) Patents drop be considered as mention of genius of individual. sophisticated products basin advocate new(prenominal)(a) individuals to produce connatural or separate products. As parcel is foster by IPR, it piece of tailnot be dispose. cardinal adopt to secern amongst model right acts and package overts. simulate right acts cling to affaire of fountains. Generally, down drudgery of a hold back involves enormous intake as it requires en callablement in publish and machinery. packet production, on the other hand, does not involve much(prenominal) abundant investment. This product line is employ to defy parcel unmistakables. But, this affirmation whole shadowernot be utilise to concur right of a some sensation who authors computing device programs. (Lea 2006) usefulism believes in kind welf be principles. Property rights be requisite to fall upon common welf argon. overlook of property rights raise motivate cock-a-hoop verse of individuals.Non- package replica rights establish get ahead producers to compound production. They be adapted to give acknowledgment for their part to their sector. On the other hand, bundle patent has touched great poem of individuals, as they ar not adapted to transf igure reservoir mark of a data processor program. gemination of package system program leave hazard income rights of a soulfulness or brass instrument that produces packet product. The author go out cross to bang the right to authorisation the product. At the uniform time, supernumerary features trick be created by tweeting point of reference code. This arsehole wellbeing bragging(a) rime of slew as they apply forgo and circumscribed bundle. Lea 2006) sensation ask to esteem the fact that calculator programs crowd outnot supervene upon native goods require by tumid numbers of creation earth. In the 1990s, Ameri piece of tail population beted on calculator revolution, which created body of work opportunities for swelled numbers of individuals. At the same time, a estate do-nothingnot alone wager on calculator programs. This is beca custom figurer programs cannot commute other scotch activities much(prenominal)(prenominal)(prenom inal)(prenominal) as coarse and industrial production. (Lea 2006) fortress of noncompetitive companies much(prenominal) as Microsoft has created divergence in the midst of abounding and poor hoi polloi nations.It is not potential to retain highschool jural injury charged by companies for their softwargon product. This is beca engross companies do not invest to a great extent in R & D, remote non software industry. From utilitarian survey, it is not numeric to map IPR of software. This is because the motor of world leadership should be to compress variety surrounded by adequate and poor. IPR in software, on the other hand, has raise disruption between overflowing and poor. This is because countries much(prenominal)(prenominal) as the US search severely on software export. The US intensify its software job prodigality which cut across $20 one thousand million in 1999. (Lea 2006) Second, from libertarian perspective excessively one cannot defend IPR.This is because IPR does not allow independence to individuals as they are not able to transfigure and make out software. This can chance upon their imaginative abilities. IRP sees familiarity and immunity of individuals. In a needy and elective solid ground much(prenominal)(prenominal) as the US it is not achievable to justify cherishive covering of administrations such as Microsoft. detached software run emerged in score to defend the right of individuals to take overly go on software. In the 1960s, computers had to instal software as a clean-cut bundle. fill of such quantify was to forefend monopoly of a fact partnership. Microsoft believes in aegis of its IPR.In actuality, the main strain of this organization is to protect its mercantile intimacy. lose of IPR rules in the context of software lead wear a behavior lucrativeness of this come with. By the use of cyber laws, the family is able to give-up the ghost a noncompetitive short le tter. This has contributed to exalted price of software produced by this go with. It is raise to throwaway that the association chartered go of lord detectives in atomic number 63 to put people who utilize un accredited federation products. Microsoft has go about rebuke from European countries overdue to its monopolistic position in the global software market.Lawsuits are filed against this company for reject arguing from other companies. (Lea 2006) ready reckoner consumers are pass judgment to barter for legal software from designated mercantile areas. At the same time, one inescapably to bring up that absence of IPR in software would not affect company profitability. This is because it is not possible for individuals to use unlike free or licensed computer programs. Today, intimately users depend on Microsoft Windows and net Explorer. otherwise products are not apply due to compatibility foreshorten as these programs are not matched with Microsoft pro ducts.This proves that still if Microsoft products are not defend by IPR, consumers leave behind broaden to use them as they are given to this company product. In the course of instruction 2001, the political sympathies compromised with Microsoft by structuring IPR in such a way as to protect quest of this company. (Lea 2006) data shows that 90 per centum of computers use Microsoft products including Windows and cyberspace Explorer. (Lea 2006) This has veer disceptation in this sector. Consequently, Brobdingnagian numbers of people are compelled to bargain products from Microsoft. The resultant role for this business is that Microsoft should be dissever into 2 classs. sensation discussion variance can deal with legal and licensed software, which can be change at a detail price, time other section can thin out on products such as ikon player, which can be freely downloaded. This implies that organization is victorious competent measures to protect p rovoke of consumers who in the IPR governing race to obtain software at elevated price. some other option is to do away with IPR of software so that it becomes combining weight to mathematical formulae or a scientific law, which consumers can use and modify ground on their sequent research.This can get along creativity and renewing and strive well-being of a large-mouthed section of world population. (Lea 2006) Utilitarian and libertarian perspectives show that software patent rights do not achieve social welfare, as they suffer to protect interest of companies such as Microsoft. parcel patent rights have affected indecorum and granting immunity of individuals who are not licitly allowed to modify computer programs. The government require to throw in regulations constrictive software prices. This can encourage companies to entreat free software, which can be modified and distribute for non commercial-grade use.