Monday, September 30, 2019

Anger, a Deadly Sin

The seven deadly sins include Pride, Greed, Envy, Anger, Lust, Gluttony, and Sloth. One of the seven deadly sins that I have suffered from is Anger. Anger is termed as being deeply resentful indignation and may include being impatient with the faults of others. Both of these come into play in the events that unraveled that one night in Charlotte, N. C. The following events occurred late on a Thursday night, whilst there was still a LOL autumn breeze blowing the leaves from their initial resting place, in downtown Charlotte.As I approached the epicenter, the main nightlife area in Charlotte, I could taste the crispness in the air and knew that tonight would indeed be memorable. I went to the door of one of the popular local drinking holes and proceeded inside with my friends close behind. Soon after we entered you could tell that the crisp air was left outside and replaced with a rather uncomfortably humid haze. As we headed peer into the building the haze became natural and the influ x of people around us seemed unimportant.We walked up to the bar counter and ordered our drinks. We then continued to walk around and converse with the rest of the people inside. As the night progressed the effects of alcohol were taking its toll on some of the other people in the bar. Just as I was walking outside to get some fresh air someone bumped into me and spilt their drink all over my shirt and pants. This was the point that I couldn't control myself and broke one of the sins. I then pushed the other guy over and he fell down on the floor.I stormed off to the bathroom to dry off the stain that would of other wised been noticeable to everyone in the bar. We continued to catch glimpses of each other as the night progressed. I'd keep catching him looking in my direction and finally proceeded to confront him about the situation. Words were then exchanged and tempers began to flare. I don't know what overcame me but I began to go into a fit of rage. After making a scene we were t hen kicked out of the bar. This outcome was negative because it led to an early end to the night.It also led to further fits of rage on our way back home afterwards. I began to get heated with the same friends that had come with me. The consequences for my actions were few but it did lead to my enlightenment on how to control my temper. Once I realized that I needed to take steps to develop self-control I looked up different ways to relax and relive stress. Some of the steps that I began to use were sticking to a firm workout schedule and having times of the day Just to relax.There were no lingering implications following the event due to the fact that once I got kicked out no one else became involved. I was unfortunately consumed by the deadly sin of Anger. As the term states I was overcome with deep resentful indignation and it all started with the fault by the other man in the bar. After all that occurred suffering from the sin of Anger only led the need for self-control. The mor al of this story is that it is better to handle situations in a peaceful manner rather than being overtaken by anger.

Sunday, September 29, 2019

How to Get Motivated Essay

Motivation is literally the desire to do things. It’s the difference between waking up before dawn to pound the pavement and lazing around the house all day. It’s the crucial element in setting and attaining goals—and research shows you can influence your own levels of motivation and self-control. So figure out what you want, power through the pain period, and start being who you want to be. 5 Keys to Unlock Your Creative Motivation Motivation is a much more complex process than just â€Å"wanting† to do something. When you’re working on a creative project and the going gets tough, if you’re not motivated enough, you’ll quit. And it always gets tough, whether you’re a novelist, artist, musician, or even a creative entrepreneur. In my own research with highly experienced writers, I found that motivators are often combined for best effect. Here, then, are 5 ways to raise your motivation level: 1. Increase the challenge of your project. Try something you’ve never done before. When I interviewed bestselling novelist Diana Gabaldon, she told me that she once gave herself the challenge of writing a â€Å"triple-nested flashback.† For many of us, concocting an ordinary flashback is challenge enough, but those are a snap for her. 2. Change your creative method for the stimulation of a fresh approach. I f you typically write with an outline, try not to. Or begin writing without an ending in mind. If you never write with a plan, see what happens if you plan ahead. Even if it doesn’t work, you’ll learn something. Here’s Wells Tower, author of a volume of short stories, Everything Ravaged Everything Burned: I can never coldly write a story; it doesn’t work. I’ve tried it where I have an outline, and I’ll think this is going to be so easy, but when I sit down of course it’s not. You have to get into a state of autohypnosis and let the story be what it wants to be. 3. Create from a different point of view. Do you always write in first-person? Do you never write in first-person point of view? Try the opposite. Or create something artistic from the point of view of the bicycle, or the car, or the dog or cat, or the new immigrant or the alien from outer space. 4. Look deeper to find your intrinsic motivation. Here’s how poet Ralph Angel put it: As much as I hate to admit it, I’ve learned in recent years that writing, even more than some of the most important relationships in my life, is where I am most in touch with myself, and, worst case scenario, people I love die and my life goes on. But if anything took me away from the work, I would be separated somehow from myself. 5. Forget about the goal and find the fun. This is the most crucial key to entering flow. Put all thought of audience aside for the time being and find something pleasurable about what you’re trying to create. If it’s not fun, figure out why not and make it more engaging for yourself. There’s nothing trivial about fun, as I’ve found in my talks with great creative individuals. It’s one of the many motivators that bring them back to the work they do, day in and day out. The 3 Biggest Myths About Motivation That Won’t Go Away Just Write Down Your Goals, and Success is Guaranteed! There is a story that motivational speakers/authors love to tell about the Yale Class of 1953.Researchers, so the story goes, asked graduating Yale seniors if they had specific goals they wanted to achieve in the future that they had written down. Twenty years later, the researchers found that the mere 3% of students who had specific, written goals were wealthier than the other 97% combined. Isn’t that amazing? It would be if it were true, which it isn’t. I wish it were that simple. To be fair, there is evidence that getting specific about what you want to achieve is really important. (Not a guaranteed road to fabulous wealth, but still important.) In other words, specificity is necessary, but it’s not nearly sufficient. Writing goals down is actually neither – it can’t hurt, but there’s also no hard evidence that writing per se does anything to help. Just Try to Do Your Best! Telling someone, or yourself, to just â€Å"do your best† is believed to be a great motivator. It isn’t. Theoretically, it encourages without putting on too much pressure. In reality, and rather ironically, it is more-or-less permission to be mediocre. Edwin Locke and Gary Latham, two renown organizational psychologists, have spent several decades studying the difference between â€Å"do your best† goals and their antithesis: specific and difficult goals. Evidence from more than 1,000 studies conducted by researchers across the globe shows that goals that not only spell out exactly what needs to be accomplished, but that also set the bar for achievement high, result in far superior performance than simply trying to â€Å"do your best.† That’s because more difficult goals cause you to, often unconsciously, increase your effort, focus and commitment to the goal, persist longer, and make better use of the most effective strategies. Just Visualize Succe ss! Advocates of â€Å"positive thinking† are particularly fond of this piece of advice. But visualizing success, particularly effortless success, is not just unhelpful – it’s a great way to set yourself up for failure. Few motivational gurus understand that there’s an awfully big difference between believing you will succeed, and believing you will succeed easily. Realistic optimists believe they will succeed, but also believe they have to make success happen – through things like effort, careful planning, persistence, and choosing the right strategies. They don’t shy away from thinking â€Å"negative† thoughts, like what obstacles will I face? and how will I deal with them? Unrealistic optimists, on the other hand, believe that success will happen to them, if they do lots and lots of visualizing. Recent research shows that this actually (and once again, ironically) serves to drain the very energy we need to reach our goals. People who sp end too much time fantasizing about the wonderful future that awaits them don’t have enough gas left in the tank to actually get there.

Saturday, September 28, 2019

Alzheimer\s Disease Essays - Cognitive Disorders, Free Essays

Alzheimer?s Disease Alzheimer?s disease is named after Dr. Alois Alzheimer who discovered the disease in 1906 after studying the brain tissue of an elderly woman who died of an unusual mental illness. It is a serious disease which causes mental deterioration and eventually death. Alzheimer?s disease is ?a progressive degenerating process of neural tissue? (Black). The symptoms of this disease can be slowed with certain treatments, but cannot yet be prevented or cured. Although not an infectious disease, Alzheimer?s is still very prominent in the world. Forty-five percent of people who are eighty-five and older have Alzheimer?s disease (Alzheimer?s). Also, the number of cases of Alzheimer?s is rapidly increasing. The National Institutes of Health (NIH) states that, ?experts suggest that as many as 5.1 million Americans may have Alzheimer?s disease? and that there are ?200,000 individuals under age 65 who have younger-onset Alzheimer?s? (NIH). Alzheimer?s is also the sixth leading cause of death in the United States. While other diseases? mortality rates are declining, Alzheimer?s mortality rate has gone up by sixty-six percent in the past eight years alone (Alzheimer?s). According to the NIH, scientists do not yet understand what causes Alzheimer?s. However, they do believe that Alzheimer?s develops due to a complicated series of events in the brain. The cause of Alzheimer?s is thought to be a mix of factors having to do with genetics, environment, and lifestyle. It is interesting to note that recent studies have shown that African Americans are actually at a higher risk of getting Alzheimer?s than other races. This may be due to the fact that African Americans have a higher rate of vascular disease, which is one of the risk factors of Alzheimer?s (African). Women also are more susceptible to this disease. As the NIH states, ?Because people differ in their genetic make-up and lifestyle, the importance of any one of these factors in increasing or decreasing the risk of developing Alzheimer?s may differ from person to person? (NIH). This makes finding a cure for Alzheimer?s all the more difficult because so many factors can affect it. Alzheimer?s is categorized in four different levels of severity: Early, Mild, Moderate, and Severe. During the Early Alzheimer?s stage, the patient has a decline in certain aspects of cognition such as word-finding, vision/spatial issues, and impaired reasoning or judgment. Some other symptoms may include: depression, social withdrawal, mood swings, distrust in others, irritability, aggressiveness, changes in sleeping habits, wandering, loss of inhibitions, and delusions, such as believing something has been stolen (NIH). Later, in the Mild Alzheimer?s stage, memory loss and other cognitive abilities worsen. A person with Alzheimer?s may have problems such as getting lost, trouble handling money and paying bills, repeating questions, taking longer to complete normal daily tasks, poor judgment, and mood and personality changes. As it progresses even further into Moderate Alzheimer?s, damage occurs to parts of the brain that control language, reasoning, sensory processing, and consciou s thought. Memory loss and confusion will worsen even more, and the patient will have trouble recognizing familiar people (NIH). The NIH says that, ?[The patient] may be unable to learn new things, carry out tasks that involve multiple steps (such as getting dressed), or cope with new situations. They may have hallucinations, delusions, and paranoia, and may behave impulsively? (NIH). By the time the patient reaches the final stage, Severe Alzheimer?s, the brain tissue will have shrunk significantly. According to the NIH, ?People with severe Alzheimer?s cannot communicate and are completely dependent upon others for their care. Near the end, the person may be in bed most or all of the time as the body shuts down? (NIH). Alzheimer?s vastly affects the daily life of a patient and his or her family. A person with Alzheimer?s will be very limited in the things that most people consider normal, daily tasks. As stated above, they will have trouble communicating with other people, and memory loss will take away most of or all reliability from them. They will also lose the ability to drive safely, as they will be more likely to get lost, will have a harder time turning, or may drift out of their lane more often (Driving). Their family and friends will also be greatly affected

Friday, September 27, 2019

People management Essay Example | Topics and Well Written Essays - 1500 words

People management - Essay Example This paper aims at identifying the reasons of general employee dissatisfaction reflecting in high turnover rate, poor service, and downfall in profitability, decline in repeat business and other signs of detoriation in sports complex. Methodology The first and foremost task as a line manager of this sports complex is to identify all the problems areas. An analysis of the reasons of these problems will help us in actually finding the solution. This can be done through various methods which include observation, questionnaires to find out what employees dislike about company policies by ensuring anonymity, conducting open meetings, building trust among employees by giving value to their suggestions, conducting exit interview from leaving employees to develop sound understanding of deficiencies in the system and the source of dissatisfaction. Findings All the problems of sports complex were actually deep rooted in employee dissatisfaction. Diminishing profits, declining sales, customer c omplaints, high turnover, decline in repeat business all this were the result of ineffective and inefficient human resource policy and practices. A major restructuring and revitalization of HR policy was required to meet the current challenges. The problems identified were Lack of communication No synergy in team work Highly de motivated employees Authoritative management style No effort regarding building human capital relationship Inflexible policies rather than contingency approach Analysis of the Problem and Recommendations A deep analysis of the situation and the problem revealed certain shortcomings in the HR policies and practices. I will discuss in detail all of them one by one what is lacking and deficient and how it can be improved by strengthening certain practices in sport complex. Effective Communication HRM should realize the importance of communication skills and the development of interpersonal skills between the management and workforce. What we observe here at spor ts complex is a certain lack of communication. A good Hr manager needs to build a rapport with his staff so that they can communicate openly with each other. However a good manager should notice and keep track of all verbal and non verbal communication. According to Albert Mehrabian nonverbal communication is a complex communication phenomena which very subtly convey the feelings such as body language, facial expressions, hand and arm gestures, postures, positions and various arms and feet movement all communicate along with the verbal words. Sometimes there is dichotomy between verbal and nonverbal communication which subtly convey the true feelings of the person. 1(Albert Mehrabian, 2009) A good manager is a reader of all sorts of communication and does not ignore any. A manager should possess good interpersonal skills so that environment is friendly, pleasant and receptive. What I recommend here is effective open communication where both managers and workforce can freely interact with each and can openly discuss whatever problems they are facing, instead of opting out of the job or rude behavior with customers which shows lack of interest on the part of the workforce. Effective communication and conflict management is the first step towards building trust among employees. 2(Michael Fielding, 2006) Successful Team

Thursday, September 26, 2019

Toyota Economic and Recall Crisis Research Paper

Toyota Economic and Recall Crisis - Research Paper Example Toyota has 522 subsidiaries, more than 320,000 staff worldwide, more than 12 Japanese factories, and more than 51 locations in 26 countries. As of 2009, Toyota faced a crisis that almost brought about its down fall. The company had earlier faced an economic crisis that started in 2007 spreading across auto industries worldwide. Consequently, in March 2008, the company recorded its first ever loss after 70 years. Other problems that have faced Toyota include the problem with acceleration in 2009 that led to a recall of millions of vehicles. As a result of this, consumer attitudes towards the brand changed. In January 2010, complaints from customers continued and the number of recalls continued to rise. This continued through April 2010, causing a further drop in customer’s feelings towards the brand. In an attempt to retain its customers, and maintain its position as the number one global auto industry, Toyota changed its motto to â€Å"Moving Forward!† Through this, the company communicated its desire to create a new and better beginning. Gradually, the company has been gaining positive disposition from its customers. Today, Toyota has been able to rise again, even though it has lost its number one spot. Keywords: Toyota, Toyota Motor Corporation, Toyota Production System, Manufacturers, Crisis, Automobile, Auto-maker, Gas Pedals, Acceleration, Recalls For many years, Toyota Motor Corporation has been the biggest automobile manufacturer in the world. It also is a leading advocate eco-friendly and technological cars. The company has exported millions of vehicles worldwide. Through this, it earned the reputation of being the best automobile manufacturer and exporter. Since 2007, the company has however faced a number of problems affecting both its reputation and positive customer disposition. Today, the company has however gradually regained its reputation. Toyota Motor Company was established in 1937 by Kiichiro Toyoda. In 1952, the company rapidly grew becoming successful (Borowski, 2010). Initially, the company exported its vehicles to South America. After five years, it was able to penetrate markets in North America. Having sold its products in North America, Toyota was able to penetrate the United States market in the business of exporting automobiles. Borowski (2010) points out that â€Å"In 1982, Toyota Motor Company and Toyota Motor Sales Company joined forces to Toyota Motor Corporation (TMC)† ( p.3). â€Å"The company now has 522 subsidiaries, 320,808 staff worldwide and is producing not only in the 12 Japanese factories but also in 51 other locations in 26 countries† (Borowski, 2010, p.3). In 2007, Toyota Motor Corporation had the highest share price value among all car-manufacturers. In, 2008, Toyota made an annual turnover worth billions of United States dollars after selling millions of vehicles.. Consequently, the company gained the status of being the biggest manufacturer of automobiles. This has however changed due to the financial crisis that began in 2007, damaging Toyota’s image, and also due to over sticking gas pedals that led to many recalls worldwide. According to Ohno, a structure of theories and procedures for improving collaborative strength known as the Toyota Production System is used at Toyota to maintain the company’s productivity, and at the same time, ensure that customers are satisfied with the quality and efficient delivery of vehicles (1998). The production of Toyota automobiles evolved from Henry Ford’s historic manufacturing systems. Herny Ford manufacturing system thus paved way for the foundation of the Toyota Production System. Due to conditions in Japan, there was inherent need to make considerable improvements to Ford’

Public & Private enterprise Essay Example | Topics and Well Written Essays - 500 words

Public & Private enterprise - Essay Example Some good and services are not suppose to be provided by the private sectors in some countries. The public goods and services are defined by economist as non excludable and non rival while private goods are excludable and rival (Kelly, 2007). In public purchasing, it is important to use ethics in order to improve the morale and loyalty of customers and workers. Ethics in management ensure that leaders behave according to the code of contact hence attracting customers and retaining the previous customers (Kelly, 2007) In the reconstruction of Tappan Zee Bridge it is important to use the Public-Private Partnership (PPP). The construction will be effective since both the private and public sector will provide services and funds. There will be merging of ideas and the construction will be effective (Kelly, 2007). In respect to the wimp video there are five types of government. Monarchy or dictatorship is the first form of government which is ruled by a king with nobles. Oligarchy is another form which is the most common form of government ruled by powerful few. Anarchy is another form which means without government. People decided to have no government due to crimes committed by the government. Government is necessary for the protection and security and anarchy is not a good form of government. Democracy type f government means a form of government the rule of the majority. Republic government means the public thing and the government is limited by the law to safeguard the public (Kelly, 2007). Private-public enterprises are a contract made between a private party and a public sector authority. In the enterprise, a private party provides a service and assumes all risks, substantial financial and technical risks in the business. Example of the private-public enterprise is health organization providing health services, water privatization, centralized units and financing like banking services

Wednesday, September 25, 2019

Feminism and Pop Culture Research Paper Example | Topics and Well Written Essays - 2250 words

Feminism and Pop Culture - Research Paper Example The title of the song speaks well of women’s independence. Females do not always need to depend on men to accomplish their daily tasks. Unlike the old days, womenfolk can be trusted to handle financial issues at home. It is not only the men who can analyze where funds go and how to make worthwhile investments. They have become more open-minded about what they are capable of, as well as braver in trying out the possibilities of their chosen pursuits. By the 20th century, women in many countries had gained the right to vote and advanced their status in politics and education. In the 1980s, there were already women doctors, lawyers, and engineers, though few in number as compared to men. In fact, according to Discovery, â€Å"over half of college graduates are women in 1986†. Many of them also pursued higher education in law, business, and medicine. In fact, the first lines are already poignant regarding how times have changed in treating the so called â€Å"fairer sex†. For instance, in the line, â€Å" so we’re comin’ out of the kitchen†, it means that those days where wives are just locked up at home doing household chores are already history. Indeed, a number of women nowadays are breadwinners along with their husbands. For some, their husbands are the ones in charge of household chores. In a report on comparing women and men’s salaries from 1980 to 1986, it was found out that although men, in general, had higher salaries, women were able to enjoy more frequent promotions and higher percentages of pay increase. (Gerhart and Milkovich 2). It further explained that one of the main causes for their income progress was high performance ratings. However, the reason why many of them could receive promotion was because most were employed in lower levels, thus, making the chances for elevation bi gger. On the other hand, this is related to a recent article which was just published last November 13, 2011, in Mail Online. It says, â€Å"one woman in five now earns more than her husband or boyfriend† (Barrow). The study suggests that the percentage of females having higher salaries as compared to their partners will continue to increase. Though this statistics is based on United Kingdom population, this reflects the worldwide shift that

Tuesday, September 24, 2019

Global Warming and Human Actions Research Paper

Global Warming and Human Actions - Research Paper Example The sun releases energy to the atmosphere in form of radiations and some scientists argue that approximately a third of the energy released by the sun to the earth are reflected to the space upon hitting the earth’s surface (Houghton, 1997). The remaining portion of solar energy released to the earth is absorbed by the oceans and land. Consequently, the surface of the earth gets heated and becomes warm, emitting infrared rations, which are considered as long-wave. The greenhouse gases in the atmosphere tap part of the long-wave radiations, leading to the warming of the atmosphere. The gases that naturally occur as greenhouse gases consist of methane, nitrous oxide, ozone, water vapor, and carbon dioxide. Together, these gases form a natural greenhouse, which increasingly warms the Earth (Maslin, 2006). Scientists have hypothesized and are increasingly researching on the contribution of the solar energy output’s variation and its possible cause in increasing the earthâ⠂¬â„¢s temperature (Harding, n.d). However, there is an increased consensus on the role played by human beings in increasing the problem of global warming. Scientific researchers have concluded increasingly that global warming is fundamentally linked to the rising level of greenhouse gases in the atmosphere, mainly methane, and carbon dioxide, as a result of fossil fuel combustion, farming, deforestation, and industrial activities by human beings. This paper critically analyzes whether global warming is due to human actions or not and if there is a possibility of the human race taking actions to stop the effects of global warming or not. Is Global Warming Due Do Human Actions? Global Warming Not Because of the Human Actions The question whether the actions of human beings contribute towards global warming has long been a debate by the scientists with others refuting the assertion whereas others acknowledge it as a fact. Guy Callender, in 1938, established that the trends in global w arming contributed to the 10% rise in the level of atmospheric carbon dioxide as a result of combustion of fossil fuels. However, some scientists threw away the suggested findings of Callender arguing that large amounts of carbon dioxide gas that humans emit are dissolved safely in oceans. Later, Roger Revelle, and Hans Suess dispelled this school of thought by discovering that there was a complex chemical buffering system preventing the sea water from absorbing large volumes of atmospheric carbon dioxide. Since then, the potential of humans contributing to global warming was raised (Harding, n.d). Human beings should not be blamed for the ever-increasing levels of global warming. The increase in atmospheric temperatures may be attributed to the more vigorous solar energy’s output. A section of scientists researching on the causes of global warming have postulated that the solar activity have increased rapidly over the past decades as well as the amount of carbon dioxide from the volcanic emissions, and this may have potentially contributed to the increased amount of greenhouse gases in the atmosphere leading to a rise in global warming (Harding, n.d). According to the theory on solar variation, scientists assert that the sun is continually gaining strength and as a result it is as the strongest point as compared to the past years. The increased amount of radiation from the sun is therefore hypothesized as the contributing factor toward the increasing global warming phenomenon. The amount of radiant energy that the sun emits

Sunday, September 22, 2019

Union Organization Campaigns Research Paper Example | Topics and Well Written Essays - 3250 words

Union Organization Campaigns - Research Paper Example From the critical perspective, the overall efficacy of labor union and its ability to deliver entrusted objectives is largely determined with the effectiveness of union organizational campaigns and tactics utilized to achieve desirable goals. Unions can organize corporate campaigns ranging from various on-job actions and litigation to strike and negative publicity campaigns. The overall purpose of evaluating the effectiveness of union organizational campaign, its success or failure is to reveal combinations of tactics useful in specific labor actions that are associated with more coherent strategies for winning employer concessions. Since the late 1970s, scholars have taken notice of unions increased use of union organizational campaigns. Some view it as the means necessary to make labor more mobile and flexible, in order to keep up with how corporations have restructured themselves to compete in the global economy. Business has become â€Å"leaner and meaner† incorporating changes to increase productivity and cut costs (Champlin and Knoedler, 1999). Union organizational campaigns are attempts to address these new transformations in the economic environment through focused strategies executed to bring management into bargaining and counter unfriendly labor actions through targeting a company's points of vulnerability in order to decrease its profits (Heckscher, 1988). Others authors see the incorporation of new tactics as facilitating the overall expansion of union membership, resulting in a revitalized worker’s social movement. 's social movement. They estimate this will increase the status of unions through increasing the power of unions as a whole. This perspective supports restructuring in order to change values and objectives within unions so that they can gain external benefits, such as increasing membership (Moody, 1998). Reorganization would include forging multi-union connections to coordinate bargaining "across industrial lines to attack the centers of capital" (Moody 1998, p.341). Extended solidarity and mobilization could increase the legitimacy of picket lines, strengthen the ability unions to use their combined leverage to prompt equitable contract negotiations, and may garner widespread public support for workers. There is no consensus on how to define union organizational campaigns. There is also no conclusive classification of what actions and expected outcomes delineate the success or failure of a campaign. Kim Moody's book (1998), An Injury to All: The Decline of American Unionism, credited Ray Rogers as the first to coin the term "corporate

Saturday, September 21, 2019

Z for Zachariah Essay Example for Free

Z for Zachariah Essay Survival, basically refined is stated as the fact or state of continuing to live or exist, especially in difficult situations. â€Å"Never, never give in, in anything great or small, never give in† is a famous quote by Sir Winston Churchill that helps explain the real aspects of what it takes to survive. The following text will explain and explore ‘survival’ from various techniques and effects as well as compare and contrast the similarities and differences between ‘Z for Zachariah’, our class novel of a teenage girl living in a post-apocalyptic world and ‘Touching the Void’, a thrilling story of two adventurous climbers who’s journey takes a turn for the worse. ‘Z for Zachariah’ is based in a post –apocalyptic time period within the American Midwest. It is set out in a diary entry written by the protagonist, in this case a 16 year old girl named Ann Burden. It focuses on what she does just to stay alive during the daily events she encounters. Through the use of this 1st person perspective, you are able to believe that you are right there in the heart of the novel. Most importantly, it enables you to experience the life of Ann and what it is like to live in a time of struggle and despair. Other techniques such as flashbacks (a jump backwards in time to fill in details from the past) and symbolism (the use of an object or idea to represent something else by association) help re-instate the initial format of ‘survival’ portrayed in the novel. Touching the Void’ is a documentary based on the true story of two mountaineers climbing in the Peruvian Andes where one of the climbers falls and sustains a serious leg injury, making him unable to carry on. This leaves them with a serious conundrum of what to do to get out alive. Throughout the documentary a variety of techniques are portrayed to get the audience engaged. It is c onstantly reverting to the interviews of Joe Simpson and Simon Yates to concede a much better engaging atmosphere for the audience. Also, through the use of re-enactment it provides the feeling of you actually being there and witnessing the events that happen throughout the film. ‘Survival’ is clearly shown in its true form in this documentary. Both of these particular texts have differences and similarities between them. Whereas ‘Z for Zachariah’ is written with many themes in mind such as ‘good and evil’, ‘hope and despair’ and ‘life and death’ ‘Touching the Void’ is filmed with only one, this is ‘survival instinct ‘. This simply stated is what happens when you are put in a high pressure situation with no apparent way of etting out. Also, where the novel is a fiction story, the documentary happened in the ever present world in which we live, making it a more realistic and easier to understand the viewpoint. Although there are not many similarities shared between the two texts, there is one key feature they both possess and that is the aspect of ‘Lone Survival’. This is what makes these stories of survival what they are and why they are truly great. The ability to think when you are all by yourself is quite difficult, especially when the thought of death is in mind. However, in both of these texts the protagonists are able to regain their focus and carry on strong to finish alive at the end of the journey. Both ‘Z for Zachariah’ and ‘Touching the Void’ have uniquely different ideas of how survival can vary in different ways, as well as change the people involved in the event for the rest of their lives. These are great examples of survival at their best, and In the end Life is the struggle for survival, in which the strongest wins, and as Winston Churchill once said â€Å"Never, never give in, in anything great or small, never give in†.

Friday, September 20, 2019

Literature Review of E-Banking

Literature Review of E-Banking CHAPTER 2. LITERATURE REVIEW This chapter is the literature review; the purpose of this chapter is to investigate past publications by different authors. This will include textbooks, articles and online publications that could enlightened the readers more on the area of banking and internet security measures, the standard and policy used for internet banking security in the United Kingdom and more importantly, the synergistic impact of online banking and information security in the UK banking sector. Since the invention of information technology and the internet, people of different calibre are using it to improve the services efficiently and effectively. In the retail banking sector, most of the businesses have moved majority of their physical transaction processes to online transaction process. A good example of this, I own an account with the HSBC bank for over 4years now and I cannot remember the last time I went into my branch to transact business. Most of my bill payment and transfers are done through my online banking.) Irrespective of this, Lassar et al. (2005) also affirmed that financial institutions should be able to forecast and figure out how such technology will be applied by customers. Banks and Financial institutions rely upon mostly on Information Technology for their everyday activities; therefore the Information acquired by financial organisation is not used only by the organisation and their employees but also by their customers and stake holders and partners. The users who rely on these services anticipate constant possibility of direct access to organizational information (McAnally, et al 2000). Comment..Your idea is good but you are not using well structured sentences and paragraphing. We need to talk about this asap! DEFINITION OF E BANKING. The growing tendency of e banking transaction has really signalled issues on information security that are to be noted and stringently taken care of. To get this security managed, it must be a combined effort and relationship between the customers and the financial institutions. (Re-structure the above paragraph) In general, e-banking is defined as the automated delivery of new and traditional banking products and services directly to customers through electronic, interactive communication channels. E-banking includes the systems that enable financial institution customers, individuals or businesses, to access accounts, transact business, or obtain information on financial products and services through a public or private network, including the Internet which is an integral part of e-banking. (FFIEC handbook, 2006). This new development as drastically changed the phase of internet business in the United Kingdom and it is a welcome phenomenon. WHAT IS INTERNET BANKING. For quite some years now, internet banking levels have been executed to be more fficient approach through which the banking transactions are made without having o leave your place of abode or your place of work. Some of the customers have been ecognised to turn to internet banking as a result of frustrations with conventional tandard of operation and practices. Anand, (2008) said further that while some ustomers want human interaction in transaction, some of them turned to the internet acilities for security reasons. The reason is that the customer are given assurance that heir transactions are safe and secured and most of these transactions are made via the nternet explorer interface. In its report in 2009 (what report?.This is not Harvard standard of referencing), he said online bankinghas risen. 25% of all the people who responded as regards to the most preferred way to bank.Mobile bankinghas not started at all. Only 1% of the people make transaction via mobile. The figure below s hows how they stand: Online banking: 25% Branches: 21% ATM: 17% Mail: 9% Telephone: 4% Mobile: 1% Unknown: 23% Comment Can you represent this figures or percentage with a pie chart/graph or something more comprehensive? He went ahead and said more people visit the bank branch than using the online banking . The term internet banking can then be referred to as the use of internet as a secluded way of doing banking services. These services comprise the conventional ways such as account opening or funds transfer to different accounts and new banking services like payments online that is customers permission to receive and pay bills on their website. Having understood the significant importance of IT and e banking and amount of risks and threats involve in driving the business process, therefore there is need for consistent continuation of security in business, which brings about the understanding of Information security. It is a continuous process. Information security, is the process of protecting information and information system from unauthorised access, use, disclosure, disruption, modification, destruction or bombardment, it involves confidentiality, integrity and availability of various data irrespective of the form the data takes. E.g. electronic, print, written verbal or in any other forms. (ISACA and CISA Review Manual, 2006). Comment You are not given your headings titles figures e.g. 2.0, 2.1, 2.2 etc You did not give your tables title and figures either. An Overview Of Online Banking Environment in UK An increasing competitions among the financial institutions have forced many of the competitors to offer similar prices on deposits and loans, the effort for gaining competitive advantage were shifted towards no priced-factors (Akinci et.al 2004). customers and financial institutes have noted the recent revolution in UK retail banking. The conversion from traditional banking to internet banking has been effective (kolodinsky and Hogarth, 2001). Although some researchers have bated that online banking has not lived up to expectation e.g Sarel and Marmorstein (2003) and Wang et al. (2003), a lots of studies still say that internet banking is still the most wealthiest and profitable means to transact business(Mos,1998;Sheshunoff, 2000).Online banking has come to stay no doubt about that and financial institutions are ready to move on with it. Luxman (1999) for example predicted that in the nearest future that the importance of internet banking will be felt most especially in the remote areas where some bans have closed their branches Going by the survey carried out for alliance and Leicester by (VOBS survey, 2004), 2,395 UK adults were interviewed, more that half of them now bank online. 61 percent now used it more than the previous couple of years. However, visiting the baking hall is very much popular with respondents preferring to go to banking and deal face to face with the banking staff for activities like paying cheques 73 percent, 20 percent withdraw cash over the counter and 20 percent will lodge on one complaints or the other. Mike Warriner (2008).said in a recent report from Forrester stated that only 31% of British adults bank online despite 75% regularly shopping online to quote Benjamin Ensor, principal analyst at Forrester Research, By international standards, the U.K. is an online banking laggard. He then goes on to say that The U.K. also has a relatively large number of quitters, with about two million people saying that they used to use online banking but have given up. WHAT IS WRONG WITH UK INTERNET BANKING According to a survey carried out by Darrell R. (2009) Medium size organizations all over the world are very much concerned about cyber threats. The number of incidents reported really justifies their doubts. At the close of mid 2009, McAfee discovered a new malware as they did in 2008 which could cause a lot of havoc in the internet world..Irrespective of this discovery; most organizations still cut their IT security budget instead of increasing it. A threat up budget down, McAfee called it security paradox. Ron C. (2009) reports that most companies in the UK are lagging behind the rest of the world in information security management practices, according to a new study from PriceWaterhouseCoopers. 7,000 security professionals all over the world was surveyed, mainly in large companies consisting of 455 in the U.K. The survey found out that British organisation emerges to be less prepared to fight the risks that tackle them in their information systems. The table below shows that U.K. lags in quite a few key areas of information security. Organisations have smaller amount CISOs in place; only 37% have a clear idea of where their data is stored. Then, nearly half (49%) do not know the number of security incidents they experienced in the preceding year. INTERNET TRANSACTION Transactions online help customers with the competence to conduct transactions via the website of the institution by introducing banking transactions or buying products and services. There are lots of transactions customers can engaged in on the internet which can be a small as basic retail account balance to a very big business funds transfer. Internet banking services, such as the ones carried out through some other means are categorised based on the type of customers they support. The following table shows some of the common retail and wholesale internet banking services offered by financial institutions. (FFIEC, 2006) Since transactional websites typically enable the electronic exchange of confidential. Customer information and the transfer of funds, services through online banking makes the financial institutions to be vulnerable to higher risk than basic. ADVANTAGES OF ONLINE BANKING. Convenience According to (Gerlach, 2000), internet banking services allow customers handle their habitual banking transaction without visiting the bank building or meeting any banks staff. No need to wait until 8 or 9 in the morning before you can get answer to your bank account request or details Customers can handle their transactions anywhere they like as long as they are connected to the internet or where there is availability of internet. However, since most banks offers 24 hours online banking services 7 days a week, internet banking can allow you to view and work with your account no matter what time or day it is. Thus, they can make payments, check balance, transfer money etc at the comfort zone of their homes or offices. Hence online banking has broken the limitations of the conventional way of banking thus provides customers swiftness and convenience. Time Saving and Money. When you visit banks, you will discover that most banks branches are always engaged with one activity and customers have to wait for a long time before attended to. This is a waste of time and energy. Luckily, some banking transactions can be handled at home or in office or anywhere that is convenient for the customers. In other words, customers do not need to wait for a long time in a long queue or go to their respective banks branch to carry out their banking business. Online banking therefore helps can help customers to save time and cost of travelling. Ease and Efficiency As long as they adhere to the simple steps to be followed by login in their information and clicking the right button, customers can able to check their accounts and know what their balance is, transfer funds and also carry out other valuable transactions. The timely check can help customers overdraft charges and also to know if the transactions they made was successful and completed. Hence, banking online helps customers to manage their account more easily and conveniently. On Time Gain and Update Information Online banking systems also provide the customers a timely updates about both their existing and new products and services, banking news and other vital information that the customers need to know or be updated with. Therefore customers can benefit some relative information at the appropriate time for them to make quick and right decisions. Profitability Fewer banking building will be maintained as a result of online banking and fewer employers will be involved there is a much lower over head with online banks. The saving they get as a result of this process allows them to give greater interest rates on savings account and lower lending rates and service charge. Cost Effective Internet banking cost less, this is because there are only few buildings to maintain and salaries paid to employees will be reduced as well. Since they have more to safe now and this allows them to increase their interest rate on savings account and lower lending rate and charges Easier To Catch Fraudulent Activities Since you have the opportunity of viewing your account details at anytime, it is easier to know if any fraudulent activities have gone through your account before much damage is done. Once you log into your account, you will see immediately whether there is anything wrong when you check your deposits and debits. If you do not make any transaction and you see any strange details in your account, you will see it write away and make necessary alarm to the financial institution While the internet offers miscellaneous advantages and opportunities, it also presents various security risks. Having this in mind, banks take wide measures to protect the information transmitted and processed when banking online. This comprises ensuring confidential data sent over the internet cannot be accessed on modified by unauthorised third party. But banks dont normally have influence of the systems used by the customers. The choice is entirely up to them. More over a system connected that is a pc connected to the internet for example will usually be used for a number of other applications as well. The systems used by the online banking customers are therefore exposed to risks beyond the banks control. For this reason, the bankers cannot be liable for them. Berlin, (2007). Some Dangers Faced When Using the Internet. Berlin, (2007) Third party gaining access to information transmitted or getting information under false pretences, this can be done with the aid of the following: Virus and warms: Programmes that are sent over the internet that can damage your pc when they replicate. Trojans: programmes that intercepts passwords that is not known to users that compromise computer security. Phishing: Using a fake name, website or address for fraudulent purposes. Pharming: Users being redirected to fraudulent server Root kits; An unauthorized administrative level access without the real administrator noticing through a malicious software. Their feature is almost as Trojans. Hacking: Having access to a PC via the internet when not authorised. Banks now have some numbers of measures in place that gives effective protection against attacks when information are processed by the bankers server or when information is sent over the internet. SOME SECURITY RULES WERE ALSO GIVEN Rule 1: Install security software including an up to date scanner. Additional security software has to be installed. your normal operating system standard tools alone cannot solve some security problems. F your security is not adequately in place, you run the risk of unauthorised persons gaining access to your data.e.g never save you PINs and TANs on your PC. A firewall can protect you from such attack Rule 2: Protect sensitive data when sending it over open network. Data sent over the internet may be intercepted or viewed by an unauthorised third party when the network is not secured. Banks have now taken some measure to ensure that data sent via the internet is encrypted before transmission. Rule 3: Be sure you know who you are dealing with. Not everyone on the internet are not who they claim they are. Check the URL you are in and make sure that your banks internet address is correctly spelled. Hackers impersonate someone in a position of trust to get the information they needed. This is called PHISHING. It is another technique to steal confidential code. This works by redirecting you to their own rogue server. Rule 4: Be careful with sensitive data and access media Your access code and media must be protected e.g. (PINs, chips) from unauthorised use. Do not save sensitive data such as Passwords PINs, access code, credit card numbers on your hard drive especially if the PC is not been used by you alone. This could allow third party to view your data. Rule 5: Choose a secure password. A combination of upper case and lower case letters , numbers and symbols is a typical example of a good password usually of six to eight characters. It will be difficult for anyone to guess your password. Rule 6: Only use a programme from a trustworthy source Dont download from the internet any programme into your hard drive unless you are sure of the source and that its reliable. Rule 7: Use up-to-date programme version Use your preferred internet browser and PC operating system version that is up-to-date. Rule 8: Run security checks on your PC Take a few moment to run a personal security checks before using your PC to bank online. Make sure the entire security feature that protects your computer are on. Rule 9: The security setting on your internet browser must be activated. Use Block ActiveX Control and let Java applet to run after confirmation. Do not make use of browser auto-completion function which is able to save your user name and passwords you enter and suggest matches. Rule 10: Do not make your current account available for fraudulent financial transaction. Any offers that is asking you to make your current account available for payment and other financial transaction for unknown firms and individual must be suspicious especially if they are located not within your country SOME ONLINE BANKING SCURITIES AVAILABLE Internet Security: Internet security refers to the methods used in protecting data and information in a computer from unauthorized persons. It is a serious issue in the world wide today. People who use internet should be using the internet should be well conscious of the trouble aroused as a result of it. A familiar methods used by people to guarantee information in internet are Encryption of the data Encryption of data deals with packaging up the original information into an unintelligible form that can be decoded using a certain technique. This is called cipher text. Usage of passwords -Passwords are used to avoid illegal entry of data so that the entire system is protected. Creation of passwords must be in a way that the other people do not simply guess it. Methods: There are some several methods that helps in internet security. They are listed below; Firewalls:This is software that filters unlawful access in a network. It must have a correct configuration and has to be combined with proxy firewall for a protected system. Taking Backup of Data: backup of the data from the system should be taken regularly. If the computer unexpectedly crashes down or the operating system failed to boot due to virus attack, by taking the backup data will reduce the penalty. Preventing Virus Attack: Viruses can affect computer, Trojan horse, worms etc as a result of some infected files downloaded from the internet. They are programs that are installed by itself and run at any time the host programs run and cause malicious attack. Baleful Links:Those who use the internet can avoid their system from getting affected by the virus by avoiding needless links and emails.Links may lead to download files suddenly. These cause a problem to the security of the computer and therefore must be avoided. File Sharing:Both original and pirated files are joined when files are shared on the internet thereby reduces the speed of the computer. This must be prevented. Routers:Some connections are prevented by certain routers from outside from the computer. NAT (Network Address Translation) is software that does this function and its of low cost and smallest amount complexity. Preventing Spy-Ware: Internet securities are threatened by several software. Without the permission of the user some software runs along with other application. Insider threat detection sill a challenge Threats detection from inside has always been a problem, but most investments in information security still tend to focus on keeping out viruses and intruders. The possible danger of a rascal employee can regularly be discounted, mistreated or just take the risk of doing business. A new survey conducted among 600 office workers in Canary Wharf, London and Wall Street, New York, revealed that many employees have no qualms about mishandling information. One-third of them said they would steal data to help a friend find a job, and 41% admitted they had already taken data, just in case they needed it in some future employment. Ron C. (2009) The study, which was commissioned by security company Cyber-Ark Software Inc., found that customers and their contact details were the favourite files to steal, followed by plans, proposals and product information. CUSTOMERS ATTITUDE Understanding of the impact of technology based transaction system on customers perceptions and behaviour is essential. (Moutinho et al. 2000).If banks are willing to integrate new technology into their existing relationship buildng activities Asher (1999) argued that cooperate customers seems to be willing to use internet as a key medium in banks dealings. He said the evidence suggest that coperate clints have shown a preference for online banking, due to the perception of being more cost effevtiv thah conventional channels Financial institutions use this technology in service delivery may often compromise bank business relation. (Keltner 1995) in terms of higher degree of convinience and accessability. (Devlin 1995) Therfore customers perception is very high in the delivery of the electronic banking. According to Nexhmi et al.(2003). Customers participate typically is the process of enabling customers to make their services, products. It can be diversified between the types of serv ices offered, even the services providers within the same market place for intance. Meuter et al.(2000) points out that self service technologies are increasing the way in which customers interact with their providers in the creation of service outcomes and are a typical example of a market place transaction that require no personal interaction FINANCIAL INSTITUTION AD MANAGERS ATTITUDE AND APPROACH Internet banking was still in a very young stage and its entire benefits has been realised.(Nath et. al 2001). In this case, managers of financial institutions attitude towards the perceptions of electronic channels were of significant importance.(Akinci et .al( 2004). Mols (2001) state that management support and future orientation were the two most important factors which driving the introduction and expectation of the new e-channel In another study, Mols (2000) grouped the bank managers according to their attitude towards internet banking: The sceptics the nervous, the positive and the reluctant groups. In Scotland, Moutinho et.al (2002) emphasized he scotish bank managers efficiency and enhancement of customer services as to perceive advantages of internet banking. Faster easier and more reliable service to customer and the improment of the competitive position were highlighted. (Aladwani ,2001). Based on the UK evidence,Li 2001 claimed that: the integrated banking model, aroun d which traditional banks have built their strategies in the past were showing sign of fragmentation In this sense, he sumerised four emerging internet model in the UK. The first was based on accepting internet banking as a new delivery channel that was integrated with existing model. The second model is called e-banking, was based on multibanking in which the internet was the integrative component. The third model consisted of creating baby e-banks with their own e brand name and product range. The last model was seen as entirely a new business model without a physical network. Laws, Directives, Regulations and Standards Shon Harris All in One Certified Information System Security Professional Exam Guide, Fourth Edition, 2008 Different laws, directives, regulations and standards were enacted for different reasons which include data protection, software copyright, data privacy, computer misuse as well as controls on cryptography. Health and safety, prevention of fraudulent activities, personal privacy, public order, intellectual property, environment protection and national security are reasons why the regulations can be implemented in governments and private sectors. The violation of these regulations has a severe punishment attached to them which may range from fine to jail term of up to ten years or more depending on the gravity of the crime committed. Examples of the regulations that governs information usage and protection are discussed briefly below The Sarbanes-Oxley Act (SOX) The SOX was enacted in 2002 as a result of the corporate scandals and fraud that threatened the economy of United States of America. This is also known as the Public Company Accounting Reform and Investor Protection Act of 2002 that applied to companies that publicly trading on United States market. How organizations must track, manage and report on financial information was provided for in the SOX requirements. Processes and controls must be in place to protect data because of the organizations reliance on computer equipment and electronic storage for transacting and archiving data, the section 404 of SOX is directly applied to information technology. Chief Financial Officer (CFO), Chief Executive Officer (CEO) and others can be jailed if the law is violated. The Computer Fraud and Abuse Act This act is the primary U.S federal antihacking statute that was written in 1986 and amended in 1996.Prohibition was made on seven forms of activities and was made federal crimes: The knowing access of computers of the federal government to obtain classified information without authorization or in excess of authorization.. The intentional access of computer to obtain information from a financial institution, the federal government, or nay protected computer involved in interstate or foreign communications without authorization or through use of excess of authorization. The intentional and unauthorized access of computers of the federal government, or computers used by or for government when the .access affects the governments use of that computer. The knowing access of a protected computer without authorization or in excess of authorization with the intent to defraud. Knowingly causing the transmission of a program, information, code, or command and, as a result of such conduct, intentionally causing damage without authorization to a protected computer. The knowing trafficking of computer passwords with the intent to defraud. The transmission of communications containing threats to cause damage to a protected computer. The penalty for breaching this act ranges from felonies to misdemeanors with corresponding small to large fines and jail sentences. Employee Privacy Issues For a company to be adequately protected, various employee privacy issues must be considered within the organization. Organization must understand what it can and cannot monitor as a result of different state with different privacy laws. Organization must state it in its policy that monitoring in any form are done within the organization to prevent being sued by employee for invading their privacy. This is considered the best way in which organization can protect itself. Payment Card Industry Data Security Standard (PCI DSS) The advent of internet and computer technology led to the increase in identity theft and credit card fraud which gives opportunity to millions to be stolen at once. Stabilizing customer trust in credit card as a safe way of conducting transaction and to curb the problem, a proactive step was taking by the credit card industry. The standard affects any entity that processes, transmits, stores or accepts credit data. The PCI Data Security Standard is made up of 12 main requirements that are broken down into six major categories. They are A Secured Network must be built and maintained. Requirement 1: To protect cardholder data, a firewall configuration must be installed and maintained Requirement 2: Ensure that systems passwords and other security parameters are not in vendors supplied defaults. Data of Cardholder must be protected. Requirement 3: Stored data of cardholder must be protected. Requirement 4: Across open and public networks, cardholder data must be encrypted in transmission Vulnerability Management Program must be maintained. Requirement 5:Anti-virus software must be used and updated regularly. Requirement 6: Secured systems and applications must be developed and maintained. Access Control Measures must be strong in its implementation. Requirement 7: Based on Business need-to-know, cardholder data access must be restricted. Requirement 8: Every individual having access to computer must be given a unique ID. Requirement 9: Physical access to cardholder data must be adequately restricted. Monitoring and Testing of Networks must be carried out regularly Requirement 10: All access to network resources and cardholder data must be tracked and monitored. Requirement 11: Security systems and processes must be regularly tested. An Information Security Policy must be developed and maintained. Requirement 12: A policy that addresses information security must be maintained The violation of the standard does not lead to jail term but may result in financial penalties or revocation of merchant status within the credit card industry because PCI DSS is a private sector initiative. 2.5 Database Security, Compliance and Audit by Charles Le Grand and Dan Sarel. Information Systems Control Journal Vol 5, 2008. Grand and Sarel (2008), states what it takes to adequately protect the database to ensure that compliance is met. It also provides information for auditing purposes. The objectives for ensuring database access control were also exploded by the authors. On the conclusion note of the article the authors said that the simple goal of ensuring database security is to ensure that only authorized individuals have access and all access is monitored. To limit access to only people whose jobs require it, access protection must apply to identifying the sensitive data elements: the methods for managing user credentials and access rights: and the records of who accessed what, when and what they did with it. Insider

Thursday, September 19, 2019

International Charter Of Human Essay -- essays research papers

International Declaration of Human Rights and Freedoms History   Ã‚  Ã‚  Ã‚  Ã‚  After the war crimes committed by the Germans in the holocaust that occurred during World War II, the United nations decided to create a document guaranteeing respect for human rights and fundamental freedoms for all people, regardless of race, sex, language, or religion. This document was called The Universal Declaration of Human Rights.   Ã‚  Ã‚  Ã‚  Ã‚  The declaration was voted in on December 10, 1948, which is now celebrated each year as Human Rights Day. The Declaration says that â€Å"all human beings are born free and equal† and establishes basic rights for all people and rules for the actions of governments in many areas pertaining to those rights. For example, it says that all people have the right to liberty, religious and political freedom, education, and economic well-being. It bans torture and states that all people have the right to participate in their governments.   Ã‚  Ã‚  Ã‚  Ã‚  The declaration is not a law, unfortunately, and in some cases has had little actual effect on the member countries of the UN. Governments with poor human rights records, such as China, do not agree with the UN’s attempts to promote human rights, saying that such actions interfere with their internal affairs.   Ã‚  Ã‚  Ã‚  Ã‚  The UN has a Commission on Human Rights. Its job is to monitor abuses of the declaration in member countries, hold international meetings on human rights issues and handle complaints about violations to the basic human rights.   Ã‚  Ã‚  Ã‚  Ã‚  It was in 1993 that the General Assembly created the position of High Commissioner for Human Rights. The commissioner job is to oversee all of the UN’s human rights programs, work to prevent human rights violations, and investigate human rights abuses. It is also in the commissioner’s power to publicize abuses to human rights taking place in any country. However most publicity about abuses to human rights does not come from the UN but from rival countries or non-governmental groups like Amnesty International   Ã‚  Ã‚  Ã‚  Ã‚  The UN has also written four international treaties on human rights. These treaties do have the force of law but are very hard to enforce. The treaties deal only with the problems of genocide, racial discrimination, civil and po... ...rights issues in the world. Before it was drafted, many cases involving human rights were simply ignored or kept quiet. Take for example just before World War Two, Nazi Germany was known to want to eliminate a great percentage of people not fitting into their â€Å"Aryan† master race, yet they still hosted the Olympics of 1936. At those Olympics they refused to grant a gold medal to a Jewish person, Jesse Owens, and still America and many other countries chose to ignore Germany for political reasons. After the war, almost in response to the declarations, various human rights organizations, such as amnesty international have been created. They almost always use the Declaration as their basic outline for the rights of human beings. These groups bring much attention to the human rights problems of the world. A good example was the later war in Vietnam, protests in the United States over unfair treatment of enemy civilians is one of the main reasons they were forced to pull ou t.   Ã‚  Ã‚  Ã‚  Ã‚  So in conclusion I must say that nobody can argue that forcing people to stand up and take notice is the only way to eliminate a problem and that is what the Declaration has achieved.

Wednesday, September 18, 2019

Cognitive Psychology and Modern Policing Essays -- Psychology Criminal

The intention of this essay is to explore the area surrounding how cognitive psychology has affected or disaffected policing practices and the positive or negative outcomes of it. To do this, a deeper understanding of the terms cognitive and psychology, along with their interactive relationship had to be expounded. The scope of cognitive psychology is vast in relation to the public and police, particularly due to the fact that it is an individual process with many external mitigating factors. Therefore I have attempted to narrow the field and concentrate on a couple of specific examples of the use of cognitive psychology, while attempting to explain the theories behind the processes. What is psychology? In basic terms it is simply the study of the mind, but that very general description has a much wider application as the psychology of today differs from that of two centuries ago. Psychology as a discipline dates back to the nineteenth century when a philosopher named William Wundt opened the first psychology laboratory at a German university. What Wundt and his co-workers attempted to do was to investigate the mind through introspection, which was observing and analysing the structure of the subjects conscious mental processes, (Thoughts, images and feelings), under controlled conditions. Today's psychology has dramatically changed and is now focused on how ones behaviour changes as a result of experience. Cognitive means to learn, to observe, to experience. When applied to psychology it is further broken down into how that particular learning observations and experience directs a person's development. Factors such as physical, emotional, educational and behavioural cognitive (copycat learning) are influenced by parents... ...orary Psychology (Dec 2001) APA review of Books Volume 46, No 6 Gleitman (1992) Basic Psychology (third edition): WW Norton & Co Harrison, P. (1983) Inside the Inner City; Penguin Books Hollin. C, Koppen. P, Penrod. S (2003) Psychology, Crime and Law (journal); Volume 9, No 2: Brunner Routledge King. R, Winchup. E, (2000) Doing Research on Crime and Justice: Oxford University Press McLaughlin and Muncie (2001) The Sage Dictionary of Criminology: Sage Publications Maguire. M, Morgan. R, Reiner. R (1994) Oxford Handbook of Criminology: Oxford Press Roger, Hopkins, Burke (1998) Zero Tolerance Policing: Perpetuity Press Rose, D (1992) A Climate of Fear: Bloomsbury Press S.E.G. Lea (1984) Instinct, Environment and Behaviour: New essential Psychology Talor, Peplau, Sears (1994) Social Psychology (eighth edition): Prentice-Hall

Street Scalpers :: essays papers

Street Scalpers Ticket scalping has shown much benefits to both consumers and sellers, and where demand meets supply. For the ultimate consumers, scalpers offer an alternative to purchasing the much sought after tickets without waiting in line. However, at a higher monetary value! Demand for these "easy" tickets has been great that keeps ticket scalping going on for years. There are different value people put in the things they do over the others. What is the value an individual put to wait in line or to pay a higher price differs these people into two groups. From the economic perspective, people who waits in line expects their marginal benefits from the ticket to match or exceed their marginal cost. While others choose to purchase from street scalpers has place their time as their marginal benefits over the marginal cost of higher price. Ticket scalping will thrive as long as there is demand for the service and people are willing to pay a higher price. As the two group of people identify their marginal benefits opposite of one another, the price for the same event changes as well. The time-cost to wait in line seems higher to the buyers from the scalpers and therefor, it is fair that they pay a higher price for the ticket without having to spent unproductive hours. To enforce restrictions on reselling tickets, the price of the tickets will become less affordable as there will be less audience to make the event more successful and profitable. It will also cost the scalpers to charge their customers an even higher price. The best solution to stop ticket scalping is to have enough tickets for everyone who wants it.

Tuesday, September 17, 2019

Reality of Business and HR Strategy Essay

â€Å"Strategic HRM is an approach that defines how the organisation’s goals will be achieved through people by means of HR strategies and integrated HR policies and practices† (Armstrong, 2009). The overall aim of strategic HRM is to maximise the firms’ performance by making sure all employees are of high calibre and committed to achieving the organisations competitive advantage. Within HRM it is not clear how to best link strategic HRM to the organisations strategy. The main argument involves two different approaches; best fit and best practice. The best fit strategy involves organisations tailoring their HR strategies around the organisations strategies and needs. Whereas the latter suggests that organisations will be more successful if they adopt best practices within the work place (Boxall and Purcell, 2008). ‘Best practice’, a form of universalism, is based around the theory that high commitment will reflect the organisations high performance l evel regardless of the firm’s competitive strategy (Torrington et al, 2011). This is demonstrated in Guest’s model (1989) Theory of HRM. The model is built around four main HR goals; commitment, flexibility, quality and strategic integration, the theory being if all goals are achieved then the organisation’s performance will be enhanced. Pfeffer (1998), also a supporter, progresses the said theory by claiming policies such as; high spending on training, high wages directly linked to performance will determine a high level of commitment and performance. Another criticism of best practice theory is that it is difficult to accept that there is an overall best practice for every organisation . One practice may have been successful and effective for an organisation does not mean that it will work for every organisation (Armstrong, 2006). This factor helps show that when analysing business and hr within all organisations best practice is impossible to achieve as every organisations situations are different. Torrington et al (2011), dispute the validity of the theory by arguing that a simple model cannot realistically meet the complexity that comes with managing staff. As well as universalist the approach is also unitarist, as it presumes that all management have to do is follow a set of policies and it will automatically a chieve high performance, and that workers will obey  this without question. In reality this is a lot more complicated to re-enact. Hofstede (1980), as cited by Boxall and Purcell, also argues that it would be extremely difficult to design a set of practices due to extreme differences between countries and cultures. Furthermore, best practice may benefit executives but on shareholders and waged employee’s expense. An example being, it may put in place a generous redundancy package for executives and typically employees lose out. It can be argued that the most sustainable HRM practices are those which benefit the organisation as a whole such as best fit (Boxall and Purcell, 2008). In a addition to these arguments, Boxall and Purcell (2011) cite studies by MacDuffie (1995) and Ichniowski and Snow (1999) which suggest that best practice is impossible to achieve when comparing two industrial firms. Although many theorists would argue that best fit is the most applicable for most organisations, best practice should not be completely overlooked as Becker and Gerhart (1996) state that it may be more †appropriate for identifying the principles underlying the choice of practices, as opposed to the practices themselves† References Armstrong (2009) Armstrong’s Handook of Human Resource Management Practice London: Koogan Boxall, P & Purcell, J (2011) Strategy and Human Resource Management 3rd Edition Hampshire: Palgrave MacMillan Becker, B E and Gerhart, S (1996) The Impact of Human Resource Management on Organisational Performance: Progress and Prospects Academy of Management Journal 39 (4), Page 779-801 Hall, L, Taylor L. & Torrington, D. (2008) Human Resource Management 7th Edition London: Prentice Hall

Monday, September 16, 2019

Language †Symbolic Representation Essay

Language is a way of communication that involves symbolic representation. Language allows information about culture and society to be passed down from one generation to another. It is there to make people understand each other. Language is not only descriptive but is also an action. The way people use language is how they see things in the society they live in. People who speak the same language will up to a certain point share a perception of reality. This is different to people who speak more than one language. † No two languages are ever sufficiently similar to be considered as representing the same social reality. The worlds in which different societies live are distinct worlds, not merely the some worlds with different labels attached.† Edward Sapir, Understanding Language. If we are to believe this quote from Sapir, then language is probably the most important influence on building a society or any other social group. Language is more than a balance of communication or a means of bonding people together in a society, it is power, whether it be maintaining the status quo or changing it. When the countries of Africa regained independence, one of the first things they did, was to restore the mother-tongue names, Rhodesia named after the British colonialist Cecil Rhodes, was quickly changed to Zimbabwe. Also, the city in Northern Ireland known to the English as Londonderry is known to Irish nationalists as Derry. Londonderry only became so, after the London merchants who controlled it several centuries ago changed the name, it had always been Derry before that. Women are referred to as Miss or Mrs, which gives their marital status, whereas men are just Mr, and when a women does get married it is expected that she take her husbands surname, why? Is it, that the way language is used, it is telling us that men are superior to women and their family name is more important, maybe in the past when women were inferior to men, but not now. More and more women are keeping their own family name when they marry and refer to themselves as Ms, which doesn’t give any clues as to marital status. Even women who are not married don’t like to be referred to as Miss, so they too are being referred to as Ms. Names are very important in societies, when naming a newborn child it normally indicates the sex of the child. Once a certain name is used for a girl it loses it popularity as a boys name, e.g. Beverley, Gayle and Shirley were all popular boys names. Names that are for both sexes normally have different spellings, e.g. Tony / Toni, Terry / Terri and Lesley / Leslie. In some cultures girl’s names are derivatives of boys, by adding a few letters to the end of a boys name it becomes a girls name, e.g. Henry / Henrietta, Pat / Patricia and Robert / Roberta. Many boys’ names in English have no obvious meaning, girl’s names do, and girls are sometimes named after virtues, such as, Faith or Patience. Girls are also named after flowers, Rose, Lily or Daisy all meaning pretty. Class distinction can also be recognised in names, Tracey, Sharon, Kelly, Kevin, Paul, John, Steve and Chris all sound common but Chloe, Charlotte, Harry, William, Oliver and George all sound upper- class and would be perceived to be so. The way in which language is used shows a difference in social class, working class people tend to be abrupt with their children saying don’t do that, and when the child asks why they say because I said so, and middle class people would be more likely to explain in detail why. Middle class people tend to talk to their children more than lower class people. Working class children will grow up with a limited amount of language to do well in the society in which they live, therefore restricting the job or career opportunities open to them, they will more than likely have a manual job rather than a non-manual job. Whereas middle class children will grow up with a much broader vocabulary, so they will do well and go on to university and have better non-manual well-paid career. This is why children from a middle class background do well at school and go on to university rather than lower class children. Although, it is not being said that lower class children are less intelligent than middle class children, but because middle class children grow up with a better and broader vocabulary they do well as adults. There are so many different ways, in which language is used in society, slang for example, they way a sum of money is relayed, a ton meaning one hundred pounds, a monkey meaning five hundred pounds and a score meaning twenty pounds. People who are deft use sign language. Body language is another, the way people look when they are lying, the way people act when they are attracted to somebody, this is body language. Swearing is a form of language, why is fuck offending? Who said that a certain word is offensive? Its just a word, but it’s the way people are taught from a young age that they learn what words are acceptable to use in polite society and what words are not acceptable to use in polite society. When someone dies, people aren’t meant to mention it for fear of upsetting them, people don’t want to use language in the wrong way. People don’t like speaking in black and white, they go for a grey way of speaking known as ‘euphemisms’ e.g. people don’t say menstruation they say, got the painters in, red flag day or mouse in the house. Another example would be, people don’t say died, they might say something like, pushing up daises, kicked the bucket or meet the maker. Euphemisms are used mainly when people don’t want to face the bluntness of a situation so they try to make things sound nicer. Someone will say, I had to have the dog put to sleep, when really what should be said is, I killed the dog. Most euphemisms begin from childhood, passed down from mother to child, the naming of things, pee pee for urinating, winky or willie for penis, minnie for vagina, woo woo for dog, poo poo for excretion, din dins for dinner etc. People use euphemisms all through life, as adults we use them not unlike children, when we say, shag, rumpy-pumpy, hanky panky, a bit of how’s your father or nookie we mean sexual intercourse. Adults also use euphemisms to name sexual organs such as, prick, dick or knob all meaning penis, or a women’s organ’s can be referred to as bush for vagina, and then there’s always boob’s, tits, baps etc. all meaning breasts. People use euphemisms all through language to make things sound innocent rather than harder and fuller. Euphemisms are even used to name food, people eat pork but really its pig, but do people go into a restaurant and ask for a slice of pig. The same for beef, its cow but people don’t go into a restaurant and ask for cow. Language is used all the time in people’s day-to-day lives, people use language from the moment they are born and sometimes even before they are born. Some expectant mothers play classical music or relaxation sounds to their unborn child, in order to make them have a good cultural beginning before the child is even born. All people in society use some form of language all the time, whether it be sign language, body language, verbal language, language through a computer for handicapped people, sign language for the deft, euphemisms etc. As humans we communicate all the time and the way we communicate is through language. Even doctors, nurses, bank workers, teachers etc all have a way of using language which is known as jargon.

Sunday, September 15, 2019

Ethical and Environmental Requirements Essay

Since all the nations understand the effects of the fossil fuel there need to take a practical step towards solving this problem. This is a very expensive undertaking because many nations had already invested in fossil fuel extraction. In order to preserve the natural environment, all the countries are supposed to come to an agreement and reduce the dependence on oil as a form of energy because it causes more destruction to the environment and also leads to depletion of resource because it cannot be recycled or replaced at the rate at which it is being utilized (Littell 2005). This calls fro the investment in the energy sources that are considered ethical, environmental friendly and also addressing the social issues. The use of biomass has been suggested as the most effective alternative to the use of fossil fuel. The renewable energy sources are not a substitute to the fossils energies per se because they may cause other adverse effects like ion the case of palm oil in Netherlands; this was discovered to be more dangerous than the fossil fuels because of the scientific evidence, which showed that it caused more destruction to the environment (Littell 2005). The use of bio fuel also revealed that the methane gas which would be released was just as harmful as carbon dioxide from fossil fuel. On the other hand, the use of bio fuel from the food stuff would not be economical because, it would utilize most of the land which could otherwise be used for agriculture while at the same time the whole grain harvest for instance in the united states, converting it to manufacture oil would only yield up to 16% of the total fuel needs, in the Latin America, the growing of sugar cane as supported by the US lead to destruction of forests making it obvious that the large scale investment in to the bio fuel would create competition for land (food crops, forest and bio fuel plantation) and the result would be food shortage and increased prices of the important necessity (Jackson 2006). Most countries are likely to become depended on foreign energy. Many of the developing nations will not be able to afford the technology involved in the production of the bio fuel or other alternatives that are considered ethical and environmental friendly. This is because the technology is relatively new and maybe very costly (Newton 2003). The developed countries may have the capital to invest but lack the land and these calls for cooperation between governments though some may be seen as exploitation. For instance the sugar cane plantation in Argentina meant to produce ethanol, the project was backed by the United States who wanted to use it for production of bio fuel hence clearing large pieces of land and reducing land for food crop production. The volumes produced by the project were meant for Argentina’s domestic use and led to increased prices of sugar and practically led to cultivation of one crop (sugarcane) seen by the thousands of hectares covered by sugar cane fields. This could be a serious tragedy of crop letdown waiting to take place. The result of the investment in the bio fuel could be worse if the bio fuel campaign to substitute petroleum oil with bio fuel is enacted (Jackson 2006). Most countries consider energy conservation as a fundamental part of government projects that the world uses to decrease their carbon release track record. The major problem of investing in bio fuel that has not been fully addressed is that, lack of skills and innovative technology in the field could create a culture of mono-cropping, and as a consequence, retail prices of common commodities would greatly increase. The U. S target of using the Latin America for the growth of bio fuel quota in order to maintain their uneconomical way of living was seen as a different type of the United States of America’s imperialism of the area. Most of the developing countries are bound to be adversely affected by the changes. The conventional traditions and cultures in most countries have been seen to emphasize so much on food crop cultivation. People have so much respect for their food crops that the long lasting campaign by the developed countries has been unable to suppress their love for food crop cultivation compared to cash crops for fuel (Newton 2003). Though the investment in bio fuel is an attractive venture, it is very expensive for the developing nations because it calls for investment into new technology from scratch. It has been predicted that implementing the bio fuel plan may leave a common person 30% poorer and therefore unable to deal with the problem in the current economic situation (Mintzer 1992). These conclusions are based on the argument that new technology is expensive plus the fact that more farm land would be required for cash crop farming to produce raw material for bio fuel like the sugar cane, oil plants and bio gas animal ranches. It estimated that involvement in bio fuel production would cost over $ 553 Trillion. The decision to take the necessary steps towards solving the inevitable climate crisis of global warming was very critical. The issues of global warming on the other hand presented a challenging opportunity for research, technology innovation and entrepreneur investment (Newton et al 2005). Global warming has presents an equilibrium situation. People do not take into account all the facts around the subject and hence consider the problem on wrong postulations. In order to save the world, the cost should not be an issue because the benefits are very obvious. However the threat to food security is the major concern because food is a necessity. The use of electricity in homes as an alternative to carbon gas fuels is very efficient and most ethical and environmental friendly energy source as there are no emissions into the atmosphere and also there is little environmental destruction (Campbell & Reece 2005). Conclusion The use of alternative energy which is ethical and environmental friendly became a concern because of global warming effects and depletion of sources. The accompanying price increase also pushes for the need of alternatives with high efficiency especially in the automotive industry. The ethical and environmental friendly has created more room for technology industry to develop hybrid vehicles and other machinery to use bio fuel and electric automotive to use electricity. Other power sources include flywheels, fuel cells and ultra-capacitors. Biomass and hydrogen being low carbon emitters are not workable alternatives to fossil fuel. Nuclear power and carbon capture and storage also present low carbon alternative though not the best solution. References Al Gore. (2006). An inconvenient truth. Planetary Emergency of Global Warming and What we Can Do about it. Rodale Berger J. J (1998). Charging Ahead.The Business of Renewable Energy and what it Means for America. University of California Press Campbell N. A & Reece J. B (2005) Biology. Pearson. Benjamin Cummings Jackson R. M (2006). Annual Editions: Global Issues. Global Issues 06/07. McGraw-Hill Higher Education Littell M. (2005). Science. Integrated Course 2. McDougal Littell Mintzer I. M (1992). Confronting Climate Change. Risks, Implications and Responses. Stockholm Environment Institute. Cambridge University Press Newton L. H (2003). Ethics and Sustainability. Sustainable Development and the Moral Life. Prentice Hall Newton L. H Dillingham C. K & Choly (2005). Watersheds 4. Ten Cases in Environmental Ethics. Thomson Wadsworth

Saturday, September 14, 2019

The Confederate War

Ever since the Civil War ended there have been numerous books written regarding the reasons why the Confederacy lost the war. Most of these books seem to believe that the Confederacy lost the war because they lacked the desire to win. In Gary Gallagher’s The Confederate War, Gallagher offers a different reason for the Confederacy loss than most books written about the Confederate War.Gallagher has thoroughly researched newspapers, diaries, books and historical documents which support his argument that the Confederate War was lost due to a lack of sound military planning and not the widely known thought that the Confederacy lacked the desire to win the war. Many historians believe that the Confederacy failed to succeed due to failed alliances within the confederacy. Gallagher states in his book â€Å"that Historians argue that the confederates lacked sufficient will to win the war, never developed a strong collective national identity and pursued a flawed military strategy tha t wasted precious manpower. † (Gallagher, 1997, p.3) Gallagher argues that the South had a strong desire to win the war and a strong sense of national togetherness but what was lacking was a good military strategy to win the Civil War. Gallagher has provided proof of his arguments through his vast amounts of research that the Confederate soldiers had a strong desire to win and the people did ban together with a sense of national pride. He also shows that they did have a weak military plan. I believe that Gallagher’s book offers a unique look at the Civil War. He adds a different twist to the contemporary thinking of the events and people involved in the Confederate War.I think anyone wanting to learn about a different aspect of the Civil War would find this book thought-provoking and insightful. I believe anyone studying the Civil War would benefit from learning about this authors different point of view. Gallagher’s book offers a unique look at the Civil War fro m the Confederate point of view. He quotes newspaper articles, private letters and diaries from and about the Confederate soldiers during the war which I found inspiring and certainly led me to value Gallagher’s insights. After reading this book I find myself agreeing with Gallagher’s point of view, he offers a very convincing argument.

Friday, September 13, 2019

No topic Assignment Example | Topics and Well Written Essays - 250 words - 2

No topic - Assignment Example The overwhelming mortgages did not directly impact the Federal Reserve but through independent investment companies, which really demonstrates how the American economy is almost entirely feeding from the financial industry. I think there is more of a fiscal policy involvement in this case: the Federal Government had the intentions to bail out the projected failing companies such as the Bear Stearns. For instance, the former Federal Reserve Chairman, Ben Bernanke, devised a merger between the Bear Stearns and the JP Morgan, which would allow the Federal Government to shell out $30 billion in order to cover up the dubious assets associated with toxic mortgages. This implies for a relative more expansionary policy strategy by the government. I think one of the most important lessons that I learned from watching the video is how the finance industry has dominantly gained control over our government. Aside from the hints that the economic crash was â€Å"contrived†, the video reveals some of the most undesirable realities of the United States: the country’s goals toward recovery will fall short except if we get rid of the financial oligarchy that is hindering the fundamental

Thursday, September 12, 2019

Passenger Load Factor Research Paper Example | Topics and Well Written Essays - 1500 words

Passenger Load Factor - Research Paper Example All the companies that exist and are stable, have this kind of management for it makes a company or an organization’s operations to work within the expected lines. Without this kind of operation, the company or organization cannot make any step both economically and financially. Operation management is also important in other fields a part from companies and organizations. This therefore makes it a global matter hence referred to as global operation. Operation caters for the risks and success made by the company. Just like any other moving machine with an engine, various organizations believe in operational management for it propels the company toward the desirable direction. At times this kind of operation can lead an organization or company to a path that is full of risks and this may be due to poor management by various unskilled personnel. Global operation forms the basis for all other operations that exist within any kind of management Global operations serve an important role to various running institutions in the world. It organizes, coordinates and controls the steps made by an organization or company towards any kind of direction. This is to ensure that the company arrives at ideal decisions and all its programs are set in a manner that can lead to success. As a global operation, every organization or service rendering company, must always do their best in ensuring good operations are conducted within their companies or organizations so as to meet some of their set goals and targets The main purpose of operation management is to convert the unfinished goods of companies into finished commodities or services. The unfinished goods and services mentioned in this paper refer to various human resources, processes and facilities. There are very many things involved in operation management. In various factories, transformation is referred to as the physical change of a commodity from one

Wednesday, September 11, 2019

Lost in Translation Essay Example | Topics and Well Written Essays - 1000 words

Lost in Translation - Essay Example Even though globalization has enabled many individuals to have a culture that they can lean back on as depicted in "Globalization" by Maria Jerskey, there are thousands and thousands of individuals who are caught in between foreign cultures or are surrounded by languages that they can neither comprehend nor understand. Therefore, despite the fact that globalization has brought communities together as shown in "Globalization" by Maria Jerskey, it has also brought identity, cultural, language, and ethical challenges as depicted in  "Lost in Translation" Eva Hoffman. The term identity simply refers to who a person is. This term is however paradoxical in the sense that it can be used to refer to ‘sameness’ (what individuals from different groups have in common) and ‘uniqueness’ (the inimitable and distinct traits of individuals). Identity in Lost in Translation can be taken as being central. The problems faced by Hoffman are much more than merely linguistic ones (Ueda para. 2) since define her identity and self-definition. Globalization has enabled the relationship between an individual’s innate identity, enacted identity and language. In â€Å"Lost in Translation,† Hoffman loses the concept of her individuality through her inability to express herself in a new environment. For instance, she says that she becoming a very serious and stern person thereby ignoring the wit and irony available around her even though the irony is all around her. Although globalization has enabled Eva to interact with individuals from a new culture, it has created an identity challenge. Eva argues that she lives in a society whereby nobody gives her identity and therefore on has to re-invent herself each day (Hoffman160). Furthermore, Hoffman identifies that the frame of culture in America is stronger and thus it holds the individual personality more firmly as compared to her home country. This too confirms the complex relationship between