Thursday, October 31, 2019

Evaluate an Argument Essay Example | Topics and Well Written Essays - 500 words - 1

Evaluate an Argument - Essay Example The author further states that the information may be true but, but since the experts do not review the site’s access; there is a substantial peril in relying on this resource for your academic works (Isites.harvard.edu, n.d.). As with the conclusion of the argument, the author clamps the whole argument against the use of Wikipedia and suggests that Wikipedia is good for use for some functions. For instance, they can be used for becoming accustomed or background information of what one is researching (Isites.harvard.edu, n.d.). For the validation of the argument to hold, it means that all of their premises that support the argument are all true and the conclusion must ultimately be true. The argument in this article is valid because the premises are well linked to the conclusion. In terms of soundness, the argument is not sound even if it is deductive and logically valid; it has some mythical arguments that habitually make it unsound. When viewed from an inductive perspective, which holds on the basis of probability, that if the premises given are true then conclusion is most likely to be true. The inductive argument employed here is strong- it holds on the assumption that the conclusion of X is probably true if the premises of X are true. The deductive is valid as per the author’s premises for a number of reasons, which include; the contributors are not expertise and are anonymous and, therefore, their credibility is questionable; the information or articles on the website are out-of-date and may be posted by someone who wants to just mislead the audience; and because the administrators do not review the site’s access. Based on these validations, it clear that the deductive argument is true and valid since its conclusion sustains all the premises stated therein. However, the deductive argument in the article is not sound because of the following. Several

Tuesday, October 29, 2019

Is Google maling us stupid Essay Example | Topics and Well Written Essays - 1000 words

Is Google maling us stupid - Essay Example Knowledge was now a living and breathing thing that, although not physical in appearance, had a direct and positive effect on the minds of society as people were forced to memorize the spoken word. Each and every bit of information needed to be committed to memory in order to successfully pass it on to the next generation. Then the advent of writing came about and now we had a permanent record of all these teachings to look back on anytime that we needed to. However, this knowledge was now incomplete in its solid form. It was no longer that easy to add new information to it because of the difficulties posed by the writing method of the time. And yet, we somehow managed to continue to grow this databank of information for future use. When typewriters were invented, the world of learning changed forever as it now became easier to understand the written word. Books and newspapers, these were the icing on the cake at the time. It helped people collect knowledge that they deemed important for themselves and their closest family members and friends. But that was not the end of the evolution of knowledge. Instead, it marked only the beginning. Then, television came and allowed us to not only hear about the information that could be gleaned from books, now, we could also see it in actuality and discover the wonders of learning in a totally new way. Thanks to television, we saw the past of the knowledge that we had but also, managed to see its future as well. And this electronic piece of technology was already considered the biggest threat to learning by most academicians and scholars because they felt that the brain was no longer functioning the way it should be. That is, reading and remembering the information that was passing through it. That belief proved to be unfounded and nothing but the fear of people who did not understand how learning and knowledge were fast evolving and becoming an even more relevant part of the daily lives of people. And that academic and sc holarly argument is the very same argument that is now being used by the very same people to prove that the internet and search engines in particular are stunting the growth of the human brain. Rewiring it and turning it into a lazy soft mass in our skulls that cannot be used for anything. Not even remembering simple information. If only these people would get over their fear of technology and the way that it changes the learning process of man for the better, maybe they would finally see that mankind is actually reaching a learning type of maturity that was not available to him before. These people argue that because all the answers to all the questions one has, regardless of how inane it is, can be found through the internet and the use of a search engine then man no longer knows how to research, discern the statements he is reading, and most disturbingly, he no longer has the ability to remember information because he just needs to bookmark the information for future reference. T hus turning our brains into a pile of mush. In reality, the search engines are a highly beneficial tool for those who wish to further learn and gain knowledge about specific topics. Gone are the times of sitting in a dusty old library going through piles of reading material, poring over them for significant information for days on end. These days, knowledge

Sunday, October 27, 2019

Constructivism Analysis of Chinas Rise

Constructivism Analysis of Chinas Rise China has been rising rapidly since the implication of reform and open-door policy in 1978. During the thirty years, China became the second largest economic power with $8.3 trillion GDP and growth rate of 7.8% in 2013. The income per capital is 6000$. On the political side, China has been taking actions on reform domestically and taking part in the international activities. Military, cultural as well as technology have been developed. Most important of this fact is that China consistently adopting the peaceful rise strategy which seeks a new regional structure of mutual trust, cooperation and mutual beneficial. This essay will explain Chinas rise process in Constructivism approach. Realism, liberalism and Constructivism are the three important theories of international relations. Under Realism, there is a game of super power states to survive. The rise of China is reasonable seen as a threat regarding its growing political, economic and military capabilities. Neighbour states should be cautious about the unsatisfied China (à §Ã‚ ½Ã¢â‚¬Ëœ) to transform the regional system. Liberalism argues that the increase of economic interdependence will increase of economic interdependence will decrease the likelihood of political conflicts (21111). Due to the high opportunity cost, violence could be avoided to maintain each countrys material interests. These two theories focus on visible facts in the international relations; while there is invisible factors should be highlighted. Social Constructivism is an important approach in explain international relation with a starting point of human behaviour and unconsciously follows cultural and historical norms; meanwhile, compared with other materialistic theories who regard countries are unitary actors to maximise their power, constructivists see countries as social actors that may follow both material power comparison and international rules.(32) Wendt thinks that the international structure would influences both national behaviour and identity, interest. Two important spheres should be highlighted in the ongoing international structures-the national identity and structural change for a certain region.(à ¥Ã¢â‚¬  Ã‚ Ãƒ ¨Ã‚ ¡Ã‚ ¥Ãƒ ¥Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ãƒ ¯Ã‚ ¼Ã¢â‚¬ ° National Identity of China In the international society (rather than international system (b1,193)), national identity is an important role for the regional security,(45) Wdent, one of the most prominent constructivists, defines identity is a property of international actors that generates motivational and behavioural dispositions'(wdent 1999,224 cited in36) and is a relatively stable, role-specific understandings and expectations about self(Wdent,1999,21 cited in 36). National identity is crucial in the international relations that matters foreign policy making as well as the interaction between Self and Other. (b1, 197) Under the constructivism view, East Asia is a society of states with various national images among which China is quite unique since it has been à ¨Ã‚ ¡Ã…’à ¨Ã‚ µÃ‚ ° in so called Chinese Model for about forty years. A better understanding of Chinas national identity is based on the application of Wendts four identities categories (b2,224-233). First, corporate identity of China argues the essential properties that rarely changes. Domestically, no matter which kind of political regime is applied, government policies are deeply influenced by thousands-year Confucian morality which values harmony and prosperity(Culture Revolution from 1966 to 1976 is an exception and an extreme case in very special situation). The huge population of 1.3 billion from 56 ethnic groups and large geographic territory helps China to achieve a successful domestic market but regard domestic stability of first importance. Second, type identity is corresponding to regime type which reflects self-organising and social quality(b2,226). Stated in 1982 Constitution, http://english.people.com.cn/constitution/constitution.html The Peoples Republic of Chinais a socialist state under the peoples democratic dictatorship led by the working class and based on the alliance of workers and peasants. Even though the word democratic is always ignored by foreign scholars, the tight central control does not mean an arbitrary all the time, nor does it possible in the globalising process. Marxism with Chinese characters is the main doctrine (47), as a result, the so called arbitrary governance is actually a Chinese style governance based on social reality rather than the compelling aspiration from a single party, it is the lesson learned from massive history from 1959 to 1976. On economic aspect, China now is applying a two-track system of socialist plus market economy with Chinese characteristicsà ¯Ã‚ ¼Ã‹â€ once again), which has led to huge achievements in last two decades. Chinese develop process has constructed the Beijing Consensus that draws many attention from the world. Third, the following two national identity categoriesroleà ¨Ã‚ Ã¢â‚¬ Ãƒ §Ã‚ ³Ã‚ »Ãƒ ¥Ã‹â€ Ã‚ °Ãƒ §Ã‚ ¬Ã‚ ¬Ãƒ ¤Ã‚ ºÃ…’à §Ã‚ §Ã‚ Ãƒ ¦-†¡Ãƒ ¥Ã…’- and collective identity are more important in this article because they are closely related to interactions with foreign countries and contribute to structural change in a long-term. Chinas rise is a continuing process, so collective identity would be discussed in the next section. Wendt (b2,227-228) argues that role identity cannot realised by oneself, but carry Others around with us in our heads. In the international society, role identity is based on the degree of interdependence†¦of Self and Others. Corresponding to the rising China, is the increasing cultural, political and economic interactions with East Asia countries. This raises the question to many countries that whether China is a status quo power. Though status quo and revisionist power are two concepts under realisms power transition theory, they are vital in constructivism by showing that how would neighbour countries identify China and to interpret their further foreign policies in the region. For this question, Chinese foreign policies such as neighbour friendly and peace-loving would make sense if there is a positive answer. However, China Threat idea, which indicates an unsatisfied and revisionist China, is also widespread and seems quite convinced. Numbers of literatures have been discussing about the problem and Johnston(49) summarised that China for now is generally a status quo power while seeking a more favourable international system in a moderate method, a revisionist situation would occur when territory dis pute and Taiwan dilemma are heavily intensified. Back to the theme of the article, a status quo power is more aligned with Chinas peace rise strategy. Wendt also find the constructive approach to describe the undergoing situation of China in East Asia. He(1999) promotes three kinds culturesHobbesian culture, Lockean culture, Kantian Culture with dominant roles of enemy, rival, and friend respectively to illustrate the tendency of an anarchic system. Since Hobbesian is naturally related to the realism theory of a hard world (b2,259) and the high level coherence in Kantian culture (there is no need for any discussion if China and other East Asian countries are already morally good friends), Kantian Culture is applicable in East Asia, furthermore, Wendt himself also agree the status quo is implicit in such culture(279). It is a shared idea for every East Asian country recognise others sovereignty, life and liberty(279),even for small countries like those ASEAN members, sovereignty and rights are recognised by others, however, there is no guarantee in East Asia that violence will disappear, especially concerning the territory disputes between China-Japan on Diaoyu Island and South China Sea Dispute. Rivalry also admits the uncertainty of Others but denied the realist approach to prepare for the worst because they are not enemies. The reactions of China and neighbour countries just reflect Wendts policy implication of Lockean culture. The avoidance of hot conflict with Japan and dispute suspend, development policy with ASEAN members are examples for behave in a status quo toward each others sovereignty and High-risk aversion(282). On the other hand, military power is still important, this is could be seen from Chinas deep-blue navy development and more frequent Japan, Philippines joint military exercise with the United States since 2010. As Wendt notes, rivals limit rather than delete violence. Projecting Chinas new identity and Changing East Asians Structure The section above has defined China as a big developing power with unique Chinese characteristics and a status quo country in the region. This kind of image would more or less provide confidence for East Asians future, as Wendt argues, even though it is too difficult to reach Kantian Culture, the situation will not go backward. In fact, China and its East Asian neighbours do put effort for a better regional system. To be specific, the constructivism task is to à §Ã‚ ¼Ã‚ ©Ãƒ ¥Ã‚ °Ã‚  identity gap(45à ¤Ã‚ ¸Ã‚ ­Ãƒ §Ã… ¡Ã¢â‚¬Å¾Ãƒ §Ã‚ ¬Ã‚ ¬42à ¦Ã‚ ³Ã‚ ¨Ãƒ ©Ã¢â‚¬ ¡Ã…  Ãƒ ¯Ã‚ ¼Ã¢â‚¬ ° and then promote a collective identity. à ¥Ã‚ ®Ã… ¡Ãƒ ¤Ã‚ ¹Ã¢â‚¬ °Ãƒ ¯Ã‚ ¼Ã‚ Ãƒ ¯Ã‚ ¼Ã‚  Shared knowledge, material resources and practices are the three components of a social structure (34), this norm reflects the society is composed of both objective and subjective knowledge and more importantly, it is a dynamic process of change. Mearsheimer gave one site on the change logic how social structure effect actions by constituting actors with certain identities and interests and Wendt add another site of interaction and reproduction of structures. Wendt thinks that there is much slack in the international structure which encourages policymakers work toward peaceful change. To sum up, Identity and structural change is a matter of micro and macro level. New identity of one country would cause the collective identity change in that region, usually by way of foreign policy and interaction. This kind of common in-group identity and we-feeling would ultimately create a new regional structure. China has been projecting a new national identity since the came out of reform and open-up grand policy in 1978 when jieji douzheng à ©Ã‹Å" ¶Ãƒ §Ã‚ ºÃ‚ §Ãƒ ¦Ãƒ ¤Ã‚ ºÃ¢â‚¬ ° is replaced by à ¥Ã‚ ®Ã… ¾Ãƒ ¤Ã‚ ºÃ¢â‚¬ ¹Ãƒ ¦Ã‚ ±Ã¢â‚¬Å¡Ãƒ ¦Ã‹Å" ¯ and development, it is corresponding to the national political and economic development. In general ,more actions are made from the 1990s when Overseas Propaganda Department under the Party Central Committee and a new Information Office under the State Council were established, there are many white papers with subjects of human rights, environment protection published, for example 1992 Tibet — Its Ownership and Human Rights Situation, 1996 Environmental Protection in China and 1999 National Minorities Policy and Its Practice in China.(40) The change from avoidance or ignoring such issues to engagement indicates that China is beginning to think about the soft power development. Cultural and media communication event is another method to promote Chinese new image and the hiring of a American firm in the 2008 Olympic Game is a case in this point. A research by Hongying Wang(à ¤Ã‚ »Ã¢â‚¬ ¹Ãƒ §Ã‚ »Ã‚ Ãƒ ¤Ã‚ ½Ã…“à ¨Ã¢â€š ¬Ã¢â‚¬ ¦Ãƒ ¯Ã‚ ¼Ã¢â‚¬ °shows that China’s self-conception in international affairs consist with These four national images — a peace-loving nation, victim of foreign aggression, anti-hegemonic force and developing country. Though there is still difference from others perception, this project does makes China à ©Ã‚ ¡Ã‚ ºÃƒ ¥Ã‹â€ Ã‚ ©Ãƒ §Ã… ¡Ã¢â‚¬Å¾ in foreign affairs.(40) Good neighbour policy(41) is the core theme for East Asia. In the 1950s, though Chairman Mao had adopted leaning to one side as grand foreign policy, Five Principles of Peaceful Coexistence was proposed as the main doctrine in Asian affairs especial with third world countries. During the 1990s to 2010s, the main period of Chinas rise, China adopted Deng Xiaopingsâ€Å"Tao guang yang hui, you suo zuo wei † to active defence of China’s interests†¦ and not try to be either a hegemon or challenger to one as well as to be a participant or co-builder that contribute to the construction of a New International Order.(41) After established the diplomatic relations with neighbour countries like Indonesian, Singapore and South Korea, China gradually find the importance on multilateral means for the common interests. From the late 1990s, China has been promoting the democratisation of international relations in the New international Order. Accord with Wendts emphasise of verba l communication, terms like shelve difference, common grounds, peaceful, multi-polar are frequently seen from Chinese foreign policy papers. Apart from foreign policies, China has been passion about participating in regional activities. For Southeast Asia, China formalised its interaction with Association of Southeast Asian Nations (ASEAN) in 1991, and became a regular dialogue partner in 1996 which led to ASEAN plus Three (Japan, India and China) and ASEAN plus China. Joining in China-ASEAN Free Trade Area and ASEAN Regional Forum reflects increasing economic and political interaction. For Northeast, efforts put on both bilateral relationship with Japan and South Korea, as well multilateral relations on whole region, the Six-Party Talks and the â€Å"Track II† Northeast Asia Cooperation Dialogue (NEACD) strengthen its involvement in Northeast Asian affairs(41). The effort and interaction would significantly influence the future of East Asia. Besides the huge economic gains and the general peaceful environment, on the constructivism aspect, the interactions would cause a collective identity of We in East Asia that has more confidence in dealing regional affairs peacefully. Countries are more interdependent which could be seen from the data and interaction facts above. Chinas engagement in East Asia would also create the common fate with its neighbours because it is impossible for China to escape from any international events, especially the for non-traditional security problems. Nevertheless, there is also fear of exploitation, just as skeptics judging Chinas peaceful rise is buying time, however, in the long term, the worry can be overcomed since the gain is reduced compared with a high level of interdependence and states has already internalised the collective identity at that time. (b2,349). In order to be more accepted by neighbour countries during communication, China has been working on eliminating the regime differences in proper areas. Under the principle of 1982 Constitution (socialist country led by Chinese Communist Party) and general domestic stability, more authority is distributed to local units as well as marketised several areas of economy aligned with the international market. These efforts are building the homogeneity or alikeness to other countries that China is, the same as any else, a developing country needs a peaceful environment. Homogeneity would have à ¦Ã‹Å" ¾Ãƒ ¨Ã¢â‚¬Ëœ-à ¥Ã…“ ° effect on military development which decrease the uncertainty for Chinas bullying action (even though China will never do that). The trend of a Kantian Culture in East Asia also benefits for everyone, to say that if the cooperation now is coloured with much material interests in Realism, but would change in a long period. The impact of structure on the agent could be seen from the ASEAN involvement of China in the very early stage. (32) When China became the candidate of regional hegemony, ASEAN posed a wide range of diplomatic initiatives contrary to realist way to intensify the dilemma that welcome China as a friend. Even though met many difficulties in the multilateral approach, significant achievement is undeniable. The structure change in East Asia is not as simple as we thought and we should consider the following points. First, the historical stereotype. For a big power, national identity à §Ã‚ ´Ã‚ §Ãƒ ¥Ã‚ ¯Ã¢â‚¬  Ãƒ ¨Ã‚ Ã¢â‚¬ Ãƒ §Ã‚ ³Ã‚ » with its historical legacy.(45) Wendt (34) also notes history matters. It is quite hard to breakdown old identity and emerge new identity (b2,228) and (38) agrees it is a long-term proposal. In modern political society, the socialism China spent about forty years establish a national identity of exclusive (especially towards capitalism countries), assertiveness (both inside and outside). This situation began with Maos leaning to one side to Soviet Union in the early Cold War and à ©Ã‚ «Ã‹Å"à ¥Ã‚ ³Ã‚ ° in the Culture Revolution. After reform and open-up, China has been confronting with double difficulties of China Threat view in west world as well as breaking the former identity. These encourage China be intelligent in its friendly foreign policy but enhance its material power simultaneously. Second, regime differences. China as the biggest socialist country in the world, its political and economic regime is till mysterious to many countries. Though China tight center control is gradually understood and accepted based on Chinas achievements, so called none-democratic society is usually accused meeting sensitive cases, which makes it the biggest barrier for a homogeneity. On the contrary, Japan went through a better situation for its political revolution in the U.S. occupied period (45). However, this does not deny Japans other efforts of unmilitarisation, international assistance, etc. A westernised democratic regime helped it accepted easily psychologically. Based on the content above, China should keep on its process of reform domestically and externally. Peaceful rise is the only way in so that new national identity could be internalised to every countries and a co-existence East Asia is built. Conclusion The understanding of Chinas rise is a combination of realism, liberalism and constructivism. In the 2008 financial crisis, Chinas soon recovery makes it stronger economic power and the assistance for neighbour countries also contribute to a country of responsibility and kindness. Constructivism also helps explained why East Asia is generally peaceful with numbers of disputes. Apart from the economic lose in liberalism view; the shared norm of mutual trust and peace-loving plays an important role. Chinas peaceful rise strategy is the achievement made by both China itself and other countries in the region. Their transforming attitude toward China form hostility to acceptance is a core condition for Chinas proactive engagement. Finally, in the East Asian society, the entire process of Chinas rise is a Spiral Model (b1,198) that countries generate norms in the increasing interaction, and new norms and identities would result in a new regional structure that encourage the formation of interdependence, common fate and homogeneity. Even though there are obstacles, East Asian countries are à ¥Ã…  Ã‚ ªÃƒ ¥Ã…  Ã¢â‚¬ ºÃƒ §Ã… ¡Ã¢â‚¬Å¾ towards it.

Friday, October 25, 2019

Essays --

Identity is defined as one’s personal characteristics or attributes and their membership of a social category. In today’s society it is important to note how social media impacts upon our individual identities. To begin with, we technically are not born with identity; it is a socially constructed attribute. Identity is a transient thing, which changes over time as we grow and mature. The self-concept, which is our own personal understanding of who we are, combines with self awareness to cultivate a cognitive representation of the self, called identity (Aronson, Wilson, & Akert, 2010, p.118). In other words, who we are is controlled by internal and external factors that combine to make us who we become. Bring new media outlets into the equation, such as the internet, and media is now regarded as an "extension of everyday life and a tool of cultural change" (Singh, 2010). Thus, identity formation, as a social concept, is being transformed in new and even more global ways. When we talk about social media and identity, what comes to mind? We all know they have a pretty complicated relationship, but how exactly is social media related to identity? In exploring the connections between social media and identity, we have realised there has been a gradual but obvious transition within the social media- identity relation. Within this essay I am going to take a look at how the linkage between social media and identity has evolved over the course of my studies. Whether consciously aware of what is being displayed or not, media plays a substantial role in influencing consumption patterns and lifestyle. Researchers noted television's power to influence even people who are illiterate. Smith-Speck and Roy (2008) explained that even individua... ... by creating alternative personas –her different facebook profiles serving as a manifestation of the life she wished she could have had; media was a way out. The television series of this show â€Å"Catfish† shows us that there are many individuals out there like Angela, who create completely fabricated identities, for many different reasons. Whether it is malicious or a release for the person; It is an escape from reality in most cases. This alerts us to the dangers of social media, and makes us wary of meeting new people online, as all may not be what it seems. In a way, this creates a suspicious environment in the world of social media. If we don’t know the individuals we befriend on social media sites personally, how are we to know if they are real people or fictional characters produced out of the mind of someone else. In this way, a sense of identity is destroyed. Essays -- Identity is defined as one’s personal characteristics or attributes and their membership of a social category. In today’s society it is important to note how social media impacts upon our individual identities. To begin with, we technically are not born with identity; it is a socially constructed attribute. Identity is a transient thing, which changes over time as we grow and mature. The self-concept, which is our own personal understanding of who we are, combines with self awareness to cultivate a cognitive representation of the self, called identity (Aronson, Wilson, & Akert, 2010, p.118). In other words, who we are is controlled by internal and external factors that combine to make us who we become. Bring new media outlets into the equation, such as the internet, and media is now regarded as an "extension of everyday life and a tool of cultural change" (Singh, 2010). Thus, identity formation, as a social concept, is being transformed in new and even more global ways. When we talk about social media and identity, what comes to mind? We all know they have a pretty complicated relationship, but how exactly is social media related to identity? In exploring the connections between social media and identity, we have realised there has been a gradual but obvious transition within the social media- identity relation. Within this essay I am going to take a look at how the linkage between social media and identity has evolved over the course of my studies. Whether consciously aware of what is being displayed or not, media plays a substantial role in influencing consumption patterns and lifestyle. Researchers noted television's power to influence even people who are illiterate. Smith-Speck and Roy (2008) explained that even individua... ... by creating alternative personas –her different facebook profiles serving as a manifestation of the life she wished she could have had; media was a way out. The television series of this show â€Å"Catfish† shows us that there are many individuals out there like Angela, who create completely fabricated identities, for many different reasons. Whether it is malicious or a release for the person; It is an escape from reality in most cases. This alerts us to the dangers of social media, and makes us wary of meeting new people online, as all may not be what it seems. In a way, this creates a suspicious environment in the world of social media. If we don’t know the individuals we befriend on social media sites personally, how are we to know if they are real people or fictional characters produced out of the mind of someone else. In this way, a sense of identity is destroyed.

Thursday, October 24, 2019

Kite Runner – Chapter 9

ENGLISH LITERATURE COMMENTARY THE KITE RUNNER The paragraph shows the moment of epiphany as it is the moment where Amir realizes that Hassan know that Amir had hide behind the alley when the incident happened. Amir discovers Hassan’s love for him is endless and accepts his flaws despite after everything that has happened shows in the phrase â€Å"led to another understanding: Hassan knew†. Hassan proves that his love for Amir is so great that he forgives Amir and willing to cover up for Amir once again.Hassan knows that Amir has betrayed him and yet he still takes the blame. â€Å"My heart sank† shows that Amir is shock that Hassan is willing to sacrifice again and take the blow. However it will be â€Å"Hassan’s final sacrifice† as it will be the ultimate sacrifice of Hassan and break the pain they both are undergoing. The situation isn’t the same anymore after the incident happened as their friendship is broken already and with Hassanâ€⠄¢s final sacrifice it puts down the curtain down to what happened in the alley.The connotation of the ‘snake’ shows that it is Amir who is responsible for everything and the sneaky evil. The simile also interjects the fact Amir is not loyal. â€Å"The monster in the lake† refers the dream that Hassan had before the kite competition but in this reference Amir is telling that monster do exist and he compares himself to a monster in which he is cruel and a wicked person who is liable for the whole event. â€Å"I wasn’t worthy of this sacrifice. I was a liar, a cheat, and a thief.And I would have told, except that a part of me was glad† shows that Amir realizes all his drawbacks and that he wasn’t worthy of Hassan’s sacrifice but at the same time he is glad that everything will be over. He is glad that maybe he would be able to move on and continue to his normal life again without having to think about his mischief because so far everythi ng reminds him of the incident. â€Å"I wanted that, to move on, to forget to start with a clean state.I wanted to be able to breathe again† conveys a message that after the incident he is not able to breathe properly because he always recall the bad memories and how he feels so desolate. He believes the only way to start a new clean state is for one of them to leave and with the presence of Hassan it is harder for Amir to erase the guilt and memory from his mind and he wants the memory to stop haunting him like a ghost. He wants to be able to breathe again and with the fact that Hassan is leaving he thinks that the pain would at least be over, his guilt will lessen, he wont be haunted anymore.

Wednesday, October 23, 2019

“Demon in the Freezer” A Book Report Essay

â€Å"Demon in the Freezer† by popular virus expert Richard Preston is the third book in his ‘trilogy of death.’ After zooming in on the dangers of Ebola virus in his best-selling book â€Å"The Hot Zone,† and bioengineered monkey pox in â€Å"The Cobra Event,† Preston shifts the focus to the lurking threat posed by the deadly smallpox virus in the event that it becomes the new weapon of choice among terrorists dabbling in chemical warfare.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The book is premised on an alarming but very real possibility – the vulnerability of America and the rest of the world to biological weapons at the hands of terrorists.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   It all begins on the events of September 27, 2001, a Thursday, nearly three weeks after the terror attacks on the Twin Towers of the New York World Trade Center and the Pentagon. Photo retoucher Robert Stevens begins to feel unwell and suffers from flu-like symptoms after he takes his family hiking in North Carolina. He starts to vomit profusely and soon develops a high fever, convulsions, and slips into a coma before succumbing to a fatal breathing arrest. Medical experts diagnose the cause of death as inhalation anthrax, alerting Army officials into action. More poisoned letters are discovered and the victims are rushed into bivouac units, forcing authorities to confront the worst – could the anthrax, non-communicable and treatable with early diagnosis, be laced with something far more deadly – the fatal smallpox virus?   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   After narrating the anthrax attacks on Sen. Tom Deschle’s office in October 2001, Preston makes a temporal jump (one of several in fact) to cover a smallpox outbreak in Germany back in 1970, courtesy of the man Peter Los, who in his youth has gone traipsing halfway around the world in Afghanistan, India and Pakistan in pursuit of the hippie ideals of the ‘60s. Preston then proceeds to describe the prehistoric origins of smallpox as far as the early river valley civilizations of Egypt and Mesopotamia.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Then he propels back to the ‘70s as he retells the smallpox eradication campaign led by medical doctor Donald Ainslie (DA) Henderson, then director of the World Health Organization’s Smallpox Eradication Unit from its inception (1966) to 1977, just before the last known reported case occurred.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Henderson is passionate about getting rid of the virus: â€Å"What we need to do is create a general moral climate where smallpox is considered too morally reprehensible to be used as a weapon. That would make the possession of smallpox in a laboratory, anywhere, effectively a crime against humanity. The likelihood that it would be used as a weapon is diminished by a global commitment to destroy it. How much it is diminished I don’t know. But it adds a level of safety (Preston, 2002, p. 54).â€Å"   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   A Soviet epidemiologist also deserves credit for jump-starting the modern effort to eradicate smallpox – Viktor Zhdanov – who called for its global eradication at the 1958 World Health Assembly annual meeting. This was subsequently endorsed by President Lyndon Johnson in 1965 in a political move to improve American-Soviet relations, and D.A. Henderson found himself heading the World Health Organization’s new Smallpox Eradication Unit. And the rest of the eradication campaign became one of the greatest feats in public health history.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Preston now turns to an examination of the Soviet biological weapons program in 1989, after Soviet biologist Vladimir Pasechnik defected to Britain and confirmed that the USSR had biological missiles targeted at the United States. This infuriated then British Prime Minister Margaret Thatcher and US President George Bush, who confronted Soviet leader Mikhail Gorbachev. In response, Gorbachev allowed a small, secret team of weapons inspectors to tour the Soviet’s bio-warfare facilities for their Biopreparat program. These American and British inspectors were alarmed by what they discovered: Russian scientists were testing and experimenting with smallpox at their bioweapons facility at the Vector virology complex in Siberia, in violation of the WHO rules. This was denied by Soviet authorities.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   For top UDAMRIID scientist Peter Jahrling, the demon in the freezer has been set loose, with illegal stocks of the smallpox virus in possession of rogue states like Iraq and North Korea almost a certainty. The thought of biologists in secret labs creating new strains of the virus into a ‘superpox’ variant resistant to all vaccines is enough to sent chills down virologists’ spines. Jahrling is leading a team of scientists in controversial experiments with live smallpox to develop vaccines and help counter what the bioterrorists might be cooking up.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The author views the subject of bioterrorism as a very real, urgent and alarming threat to national security, and the fate of humanity on the whole, given today’s mobile world where a smallpox outbreak could spread as fast as wildfire across countries all over the globe.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Following the events after 9/11 and the anthrax terror, Preston highlights the new world order: the urgency to safeguard civilization from these new menaces. Smallpox is recognized as the new supreme bioterror menace, given the disease’s potential to cause human agony, its capability for fast and easy transmission, and ultimately its lethal character. Anthrax pales in comparison as direct contact is unnecessary for smallpox to spread – all it takes is for the virus to travel through a ventilation system. Immunity from the disease through vaccines introduced decades ago effectively vanishes, and if released in today’s very mobile world, it would easily overwhelm mankind in dreadful waves. Preston succinctly captures the menace of smallpox, without resorting to hyperbole: â€Å"Smallpox is explosively contagious, and it travels through the air. Virus particles in the mouth become airborne when the host talks. If you inhale a single particle of smallpox, you can come down with the disease†¦ Then the illness hits with a spike of fever, a backache, and vomiting, and a bit later tiny red spots appear all over the body. The spots turn into blisters, called pustules, and the pustules enlarge, filling with pressurized opalescent pus. The eruption of pustules is sometimes called the splitting of the dermis. The skin doesn’t break, but splits horizontally, tearing away from its underlayers. The pustules become hard, bloated sacs the size of peas, encasing the body with pus, and the skin resembles a cobbled stone street. †¦The pain of the splitting is extraordinary. People lose the ability to speak, and their eyes can squeeze shut with pustules, but they remain alert. Death comes with a breathing arrest or a heart attack or shock or an immune-system storm, though exactly how smallpox kills a person is not known (Preston, 2002, p. 44).†   Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The sociological consequences on account of the issue of bioterrorism are manifold and far-reaching. There is of course the issue of power relations among nations, particularly in the case of the arms race between the United States and the USSR during the Cold War which brought to the fore the threat of nuclear annihilation and bio-chemical warfare. Though the Soviet bloc has crumbled, other rogue states, e.g. North Korea, Cuba and Iran, are more than ready to threaten and challenge the United States for military supremacy, and might even be developing new weapons of mass destruction no longer limited to nuclear warheads but utilizing as well deadly pathogens and viral strains.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Preston spends much time in the book discussing current efforts of the American scientific community to research smallpox in the hope of better combating bioterrorism. It is important to note, as Preston does, that the people leading the fight to destroy smallpox, though well-trained, was still mostly a ragtag group of scientists and medical doctors with the firm conviction that smallpox could indeed, and should be annihilated from the face of the planet.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Perhaps his discussion of the current research on smallpox would prove more relevant as he provides a detailed description and analysis of the conflicts and controversies surrounding the project – from securing approval and the go-ahead signal from top government officials to the personal conflicts and issues the personalities involved in the research have had to face. The primary concern centers on the perceived lax security at the two worldwide biomedical installations, one in Atlanta and the other at Siberia, and their conviction on the very real threat of bioterrorism which could strike anytime and claim so many lives, given the state of unpreparedness to counter such an attack.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Preston successfully connects the past (the impetus for eradication of the disease) to the future (current concerns on how to counter the virus). As situated within the new-world context of post 9/11, there is a pressing need for vaccine stockpiling, long advocated by top government virologist Peter Jahrling who had initially feared the lacing of the mailed anthrax spores with smallpox. He comes into conflict with D. A. Henderson, the current head of the Office of Public Health Preparedness, as he argues for the development of an antiviral agent for those who cannot receive the smallpox vaccine. Henderson thinks that Jahrling’s experimentation with smallpox in laboratory monkeys is a largely futile step in the wrong direction. The dean of John Hopkins School of Public Health Al Sommer has joined the fray, believing that Jahrling’s work provides an impetus for other countries to conduct their on experiments on smallpox, thereby â€Å"We could start an arms race over smallpox†¦ (Sommers as quoted by Preston, 2002).†   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   More disturbing is the revelation of the creation of a genetically engineered mousepox virus to which mousepox-resistant rodents are highly susceptible, intensifying the fear that unscrupulous scientists might have already created a ‘smallpox supervirus’ immune to current vaccines. Preston (2002) leaves us with this dire warning: â€Å"The main thing that stands between the human species and the creation of a supervirus is a sense of responsibility among individual biologists†¦The international community of physicists came of age in a burst of light over the sand of Trinity in New Mexico. The biologists have not yet experienced their Trinity.†   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The book’s main strength is that is a well-researched piece, and Richard Preston has proven himself a skillful writer with his vivid narration and matter-of-fact style allowing him to dispense with hyperbole.   The book succeeds in frightening its readers as it covers many interesting episodes. Although some may find the message of â€Å"Demon in the Freezer† grim and uncomfortable it nonetheless awakens readers to the true significance of chillingly real concepts, i.e. â€Å"weapons of mass destruction† and â€Å"bioterrorism.†   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   On the weak side, the temporal jumps in the narration give one the feeling of a disjointed read, as the two stories on anthrax and smallpox do not quite flow as smoothly and coherently as one might wish – the author fails to weave the story in such a way that there is an effectively riveting and seamless momentum – though each part is fascinating. At some point, there is also too much details to grasp and absorb, and to that extent the reader have to grapple with information overload, halting the usually rapid fire story-telling.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The main bias of the author is that he is of course writing from the American perspective, as the USA proves to be the eminent target of terror attacks. Thus, â€Å"Demon in the Freezer† appears to be an attempt to inform and warn Americans of the dangers they are currently facing from the threat of bioterrorism, and to some extent to influence authorities and make them realize the horrors – a global viral epidemic which could wipe out the world’s population – which might arise from inaction on the part of government and the scientific community:   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   â€Å"A vaccine-resistant smallpox would be everyone’s worst nightmare come true†¦ We could be left trying to fight a genetically engineered virus with a vaccine that had been invented in 1796 (Preston, 2002).†   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   General Russell had this to add: â€Å"If smallpox really got going, people should be most concerned about a lack of effective leadership on the part of their government (quoted by Preston, 2002, p. 60).â€Å"   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   On a happy note, â€Å"Demon in the Freezer† provided the timely opportunity for me to get acquainted with the issue of bioterrorism and its related concepts – biological warfare, weapons of mass destruction, etc., which are obviously pressing concerns for humanity burdened with the threat of nuclear destruction and annihilation in a not-so-distant future. However, this remains to be the only experience I have so far with the issue of bioterrorism and specifically smallpox and anthrax, for that matter.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In terms of the need for further research, I think it should focus more on determining and mapping out the states which really have illegal strains of smallpox virus in their possession, in order to effectively prepare for any possible worse-case scenarios in the advent of a smallpox terror attack. Aside from smallpox, it might prove helpful in the long-run if scientists also map out other possible biological agents which might pose future threats to human security, and to explore the possibility of developing vaccines and other counter-measures. All of these proposed researches need to be conducted in the most stringent, up-to-standard manner possible, with adequate empirical grounding and in the most morally and ethically acceptable ways.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   I think in many ways (though it might be indirect), the reviewed work does relate to Sociology, with the latter in turn covering a wide array of fields involving human interaction and dynamics in the context of groups and societies. Political institutions and the ensuing dynamics and power relations governing these are discussed by Preston in the book, together with the issue of ethics in research, i.e. the controversy surrounding experiments with smallpox and other viral agents.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Perhaps it would prove useful if material from the book would be incorporated into class lectures, particularly the ethical aspects of research and experimentation with life –threatening organisms, the actual existence and lingering threat of biological warfare and terrorism, and how it is being met by existing social institutions.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Overall, I did found â€Å"Demon in the Freezer† an interesting read, though at times I had to really struggle with understanding all the concepts and trains of thought Preston had introduced in his narratives. It was informative at the same time, though at some point you would really realize how frighteningly real is the scenario the author is trying to relay to his audience. Reference: Preston, Richard (2002). â€Å"Demon in the Freezer.† New York: Random House.

Tuesday, October 22, 2019

St. Patricks Day Creative Writing Prompts and Other March Ideas

St. Patricks Day Creative Writing Prompts and Other March Ideas Even though the first day of Spring occurs in March, it often still feels like winter in many parts of the country. The following writing prompts for each day of the month can be a great way to incorporate writing in the form of warm-ups or  journal entries. Feel free to use and modify these as you see fit. March Holidays Womens History MonthNational Craft MonthAmerican Red Cross MonthNational Nutrition MonthIrish-American Heritage Month Writing Prompt Ideas for March March 1 - Theme: Peanut Butter Lovers DayChunky or smooth? With or without jelly? How do you like your peanut butter, if you like it at all? In a few sentences, describe the experience of eating peanut butter without an accompanying drink. If you have never tasted peanut butter, then instead describe the experience of eating saltines without the benefit of a drink.March 2 - Theme:  Dr. SeussWhich is your favorite Dr. Seuss book? Why?March 3 - Theme: Alexander Graham Bells BirthdayHow would your life be different without the invention of the telephone?March 4 - Theme: Womens History MonthDescribe the most courageous woman you know. This can either be someone you have met or someone you have read about.March 5 - Theme:  Boston Massacre  and PropagandaPaul Reveres engraving of the Boston Massacre was an extraordinary piece of propaganda. Explain why should we be wary of eyewitness accounts of major news stories?March 6 - Theme:  Oreo CookiesWhat is your favorite way to eat an Or eo cookie? Do you separate them, dunk them, pop them whole in your mouth, or avoid them altogether? Explain why you answered as you did. March 7 - Theme: World Maths DayWorld Maths Day is the first Wednesday in March. What is your opinion about math? Do you like the subject or is it one you struggle with? Explain your answer.March 8 - Theme: National Craft MonthDo you consider yourself a crafty or artistic person? If so, whats your favorite type of craft? If not, why?March 9 - Theme: Barbies BirthdayIs Barbie a good role model for girls? Why or why not?March 10 - Theme: Genealogy DayDo you have an interest in learning about your familys heritage? Why or why not?March 11 - Theme: First Basketball GameWhat are your thoughts on basketball as a sport? Is it one you follow or one you dont care about at all? Explain your answer.March 12 - Theme: Role of the US President (Date of FDRs first fireside chat)During the Great Depression, Franklin D. Roosevelt took to giving fireside chats as a way to help Americans connect with the presidency and the government. Today, whenever a national disaster or event of great significance o ccurs, the president makes a statement or gives a speech. In your opinion, how important is this for you as an American citizen? Explain your answer. March 13 - Theme: Uncle SamWhat do you think of Uncle Sam as a symbol of the United States? Do you think it serves a purpose to have a fictional character such as this as a symbol? Explain your answer.March 14 - Theme: Albert Einsteins Birthday and Pi DayAlbert Einstein  said, We cant solve problems by using the same kind of thinking we used when we created them. What do you think he meant by this statement? Do you agree with it?March 15 - Theme: Ides of March The tale of Julius Caesars warning to beware the ides of March  and his impending assassination was dramatized by William Shakespeare. What is your opinion of Shakespeares plays? Do you find them entertaining, confusing, or something else altogether? Explain why you have this opinion.March 16 - Theme: Freedom of Information DayDo you think that the government should share more information, even if it is possibly damaging to the presidency and Congress? Explain your answer.March 17 - Theme: St. Patricks DayWhat do you think of St. Patricks Day? Do you celebrate St. Patricks Day by wearing green? Do you have any ancestors from Ireland? If you dont celebrate it, why not? March 18 s of tall tales include Johnny Appleseed, Pecos Bill, and Paul Bunyan.March 19 - Theme: National Nutrition MonthWhat is your opinion of vegetables? Do you like eating them? What are your favorite vegetables? Why?March 20 - Theme: First Day of SpringWrite a short piece of prose or poetry about spring. Make sure to appeal to all five senses in your writing.March 21 - Theme: World Poetry DayGive your thoughts about poetry. Do you like to read it, write it or avoid it? Explain your answer.March 22 - Theme:  Artifical IntelligenceTechnology moves rapidly. We must consider the impact of artificial intelligence. What do you think are the benefits or concerns of artificial intelligence (AI) for the future of the world?March 23 - Theme: Patrick Henry and Liberty SpeechOn March 23, 1775, Patrick Henry made his famous speech that included the line, Give me liberty or give me death. Which of the freedoms that the US Constitution and Bill of Rights provide for do you feel is the most i mportant for preserving personal liberty? March 24 - Theme: Harry Houdinis BirthdayWhat do you think of magicians? Have you ever seen one perform? Describe that experience. If not, explain why you think people are so fascinated by magic shows.March 25 - Theme: National Waffle DayWhat is your favorite breakfast food? What do you like about it?March 26 - Theme: Make Up Your Own Holiday DayIf you were to create a holiday celebrating anything, what would it be? How would the celebrations include? Have fun and provide details.March 27 - Theme: Volunteering (American Red Cross Month)Explain what you believe the benefits of volunteering your time and talents would be to an organization of your choice.March 28 - Theme: Respect Your Cat DayWhich is the better pet? A cat or a dog? Maybe another pet? Or maybe no pet at all?March 29 - Theme: Coca-Cola InventedSome cities have tried to regulate the size of sodas sold for consumption. Do you think there should be laws to tell you what you can and cannot drink or eat in this manner? Defend your answer. March 30 - Theme: Game Shows (Jeopardy Premiered on NBC)If you were to appear on a television game show, which would it be? Why?March 31 - Theme: Summer PlansWrite a poem or a short piece of prose about your summer plans. Bonus: St. Patricks Themed Creative Writing Topics Here is a list of teacher-tested creative writing topics to use with your St. Patricks Day theme.   I found a pot of gold. What would you do if you came across a pot of gold?I found a four-leaf clover. What would you do if you found a found a four-leaf clover?Dear Leprechaun†¦ Write a letter to a leprechaun, tell him about yourself, and ask him any questions you may have.Do you have a good luck charm? Describe your lucky keepsake and how it brings you luck.The legend of the lucky leprechaun. Create a story about the lucky leprechaun.At the end of the rainbow, I found a†¦ Describe what you saw when you got to the end of the rainbow.What is your favorite lucky number? Why do you feel this number is lucky for you?A leprechaun visits your school and gives you a magical item. What is it? What happens to you when you touch it? What does your family do for St. Patricks Day? Do you eat anything special? Describe your family traditions.What would you do if you woke up and found that everything that you touched turned to green? Describe how you would feel and what everyone would say when they saw what you could do.If you could trap a leprechaun, how would you catch him? What would you do with him once you caught him? Would you let him go? Would you keep him? I feel lucky because†¦ Describe why you feel lucky.If a leprechaun gave you three wishes, what would they be?Once I gave a four leaf clover to my friend and they†¦ Describe what happened after your friend received a four leaf clover.I once had shamrock shoes and†¦ Describe what happened to you. Where did you get them? Were they magical shoes?Describe a typical day as a leprechaun. Pretend you are a leprechaun and describe all the things that you encounter.On your way to school, you see a rainbow and its close enough for you to touch. Describe what happens when you touch it. Do you go to another world? What happens?On your way to school, you see a leprechaun and he gives you a magical shamrock shake to drink. What happens to you when you drink it?Leaping Leprechauns   My leprechaun lost his magical powers! Describe how it happened and what you did about it.How to catch a leprechaun. Describe step-by-step how you plan to catch a leprechaun.

Monday, October 21, 2019

Fate in Romeo and Juliet

Fate in Romeo and Juliet A definition of fate would be the power that is supposed to settle ahead of time how things will happen. Romeo and Juliet, the two young lovers in William Shakespeare' s Romeo and Juliet, ended up becoming a large part of what could be called fate. Fate seemed to control their lives and force them together, becoming a large part of their love, and the ending of their parent's hatred. Fate became the ultimate control power in this play, and plays a large part in modern everyday life, even if we don't recognize it. Maybe we don't recognize it because we choose not to, or don't have faith like we used to, but the fact remains that fate controls what we do throughout all of our lives. A large part of the beliefs for both Romeo and Juliet involve fate. They believed in the stars, and that their actions weren't always their own.Romeo and Juliet, Act I-Scene_3. Lady Capulet and ...Romeo, for example, 1.4.115-120, he says, Some consequence yet hanging in the stars...by some vile forfeit of u ntimely death. But he that hath the steerage over my course Direct my sail. He's basically saying to his friends that he had a dream which leads him to believe that he will die young because of something in the stars, something that will happen. He ends with ...he that hath steerage over my course... which implies that he does not have control over his life if he looks to another power above himself to direct him. He does not feel that he is the one who makes decisions, it is all a higher purpose, a different power. We're all sort of like the puppets below the puppeteer. He's asking for that puppeteer to direct his sail, or his life, in the right direction. Fate directs us all...

Sunday, October 20, 2019

Pre-College Summer Programs Should You Go

Pre-College Summer Programs Should You Go SAT / ACT Prep Online Guides and Tips If you're contemplating your summer plans, you may want to consider pre-college summer programs. These programs offerhigh school students the opportunity to live and learn on a college campus. In this article, I'll explain the different types of programs and let you know the benefits and drawbacks of attending them. Furthermore, I'll let you know if doing one of these programs can help you get into college. What Is a Pre-College Summer Program? A pre-college summer program offers high school students the opportunity to take classes at a college and experience college life during the summer. Many programs offer a residential and commuter option. Students can stay in dorms with their peers, or they can commute from home if they live close to the college. Typically, these programs range anywhere from one to eight weeks. During these programs, not only are students able to take classes from college professors or visiting scholars, but they’re also able to listen to lectures from alumni and participate in social activities. Many selective private colleges, including Stanford, Harvard, and Columbia, offer pre-college summer programs for high school students. Some of theseprograms are open enrollment (anyone can attend), and others require admission through an application process. The selective programs typically require teacher recommendations, application essays, and standardized test scores. Check a specific program’s website for its admissions requirements. Possible Benefits of Pre-College Summer Programs Spending part of your summer studying at college or a university may not sounds like the most fun, but it canoffer a number of potential benefits. Prepare for College Life For many students, adjusting to college life can be very difficult. A pre-college summer program enables you to spend time on a college campus and take classes from college professors. These programs can help ease the transition to college life when you go to college. You’ll be more familiar with the expectations of a college class, and you’ll be more comfortable navigating a college campus. Explore Your Academic Interests Pre-college programs allow you to take classes in subjects you’re interested in, or you can discover new interests. You can take courses in a wide variety of subjects like computer science, theater, economics, and philosophy. Enhance Your College Resume Colleges do like to see that you’re taking advantage of your summers to participate in meaningful activities. By attending a pre-college summer program, you can demonstrate your interest in academics and show that you’re motivated to do more than what’s required to pursue your academic passions. Exposure to a Specific College If you're strongly considering attending a certain college, going to its summer program can help you figure out if it's the right place for you. You'll get a feel for the campus and its location, and you may get the opportunity to interact with current students and professors. You'll come away with a better sense of whether you can see yourself thriving in that environment. Make New Friends You shouldn’t discount the social benefits of attending these programs. You can meet people from around the world and form meaningful relationships that will last beyond the program. Keep in mind that there are potential costs of attending these programs. Possible Drawbacksof Pre-College Summer Programs Though many students really enjoy attending these programs, there are some issues to consider. Cost Pre-college summer programs are expensive. For example, an 8-credit course at Harvard’s seven-week secondary school summer program costs $5,900 for tuition and $5,400 for housing. That doesn’t even include transportation costs if you don’t live near Harvard. However, Harvard does offer some financial aid that covers partof the tuition forstudents with outstanding academic records who demonstrate financial need. The all-inclusive cost for the three-week Stanford Pre-Collegiate Summer Institutes is $6,300. That includes room and board and transportation between Stanford and San Francisco International Airport. These Programs May Not Help You Get Into College Many college experts believe that going to a pre-college summer program may in fact hurt your chances of getting into a selective college. If you go to a summer program at Brown and you apply to Cornell, Cornell may assume that you’re more interested in Brown. Also, due to the cost of pre-college programs, some admissions counselors believe that these programs are basically summer camp for wealthy students. Many advise students tofind more creative and low-cost ways to explore their passions. For example, you can volunteer to do research with a local college professor or work at an art museum. However, there are summer programs that will undoubtedly impress college admissions officers. Free, highly selective summer programs like Research Science Institute and the Young Engineering and Science Scholars will greatly enhance your college application because they only admit a limited number of exceptional students. Perfect Zero/Flickr Is a Pre-College Summer Program Right for You? I won't advise you whether or not you should do a pre-college summer program. That's your decision. However, if you can afford to attend one of these programs and feel like it would be a good option for you, I recommend tailoring it to your interests. Take courses that are related to your intended college major, or go to a program at a college that you may want to attend. Also, I don't think that doing a costly program will substantially hurt or help your college applications. However, it can be helpful if you excel in the program and get an outstanding recommendation from a professor. Additionally, if the program stimulates an academic interest or prepares you to do well in school, it can indirectly help your chances of gaining admission to the most selective colleges. What Are Some Well-Known Pre-College Summer Programs? If you do decide attending one of these programs is a good choice for you, here are some popularoptions to check out: Duke TIP Duke TIP serves students as young as 4th grade. It's meant to provide opportunities for academically gifted students. We've written articles on Duke TIP 7th grade Talent Search and Duke TIP SAT requirements. Stanford Pre-Collegiate Summer Institutes and High School Summer College These are two different summer programs at Stanford. At the High School Summer College, you can take a quarter of Stanford classes with Stanford students. The Pre-Collegiate Summer Institutes offer a three-week residential program for students to live in Stanford housing and take a class not often given at the high school level. Summer Institute for the Gifted This program is conducted at colleges across the country. It is designed for gifted and talented students from 5-17 years of age. There are residential and commuter programs. Summer@Brown Summer@Brown offers nearly 200 courses that range from 1-4 weeks. They are designed to reflect Brown's liberal arts curriculum, and they're taughtat the level of first-year college courses. To find the right program for you, there are a number of factors to consider: your budget, the length of the program, the available courses and credit options (some programs offer courses for college credit), and the location of the program. If there's a college that really intrigues you, check the school's website to see if it offers a summer program. You can use the Summer Program Finder to identify a program that fits your needs and interests. You can spend your summer at the beach or college. Or both. Recap Pre-college summer programs provide you with an opportunity to experience college life, explore your academic interests, and make friends. Even though these programs can help prepare you for college, just going to one won’t significantly impact your chances of getting into a selective college. If you’re interested in a pre-college summer program, you can find one at colleges across the country. You’ll be able to take classes in many subjects that aren’t usually offered at the high school level. What's Next? Find out what you need to get into Ivy League schools and the most selective colleges. Are you still uncertain if a pre-college program is right for you? Get some more ideas onhow you can spend your summer. If you're going into your senior year of high school, maybe your summer plan should include preparing for the SAT/ACT. Want to improve your SAT score by 160 points or your ACT score by 4 points?We've written a guide for each test about the top 5 strategies you must be using to have a shot at improving your score. Download it for free now:

Saturday, October 19, 2019

Human Resource Management Assignment Example | Topics and Well Written Essays - 4250 words

Human Resource Management - Assignment Example nvolved (A Managers Responsibility and Liability in Health and Safety, 2008) Having an effective leadership team and effective workforce management will help the organization in protecting and safeguarding the interest of the employees. The indispensable and critical principles are- An effective leadership management team who play an active role towards assimilating strong health and safety management. Workforce involvement in promoting and achieving high safety conditions in work environment Frequent follow-ups, monitoring, and reviewing the performance of the safety measures (Health safety executive, n.d) Effects of poor health and safety measures- In 2006, approximately 30 million working days were lost due to poor health conditions and physical injuries to the employees. Approximately 200 employees are killed each year due to poor and negligent health and safety measures at work places in companies Many employees reported each year with respiratory diseases and cancers due to occ upational illness (Health safety executive, n.d) Benefits of good health measures: Reduced cost and reduced risks Low employee turnover and employee absence which improves productivity indirectly Corporate responsibility among clients, partners Do you think managers should be held liable for health and safety violations? Protecting the health and safety of the employees should be one of the main focuses of the risk management team in any organization. Health and Safety plays an integral and fundamental part of the organization’s success. Management, board members and the leadership team who do not show any focus in this area would never be able to achieve the highest achievement of health and safety management and should be penalized. Failure on the part of the management to incorporate... This essay focuses on the analysis of the Human Resources department, that usually helps in organizing and deals with any issues related to compensation, safety, policies, wellness settlement, general administration, training and development. The researcher mentiones that they are also expected to add value to the employees. Health and safety law basically safeguard the welfare of employees and the general public. This law holds the person, company or organization liable for any employee injured through accident at work or death of any employee. The Health and safety team can execute a criminal prosecution against the company, which may result in penalty or imprisonment against the company management and human resources department. The affected employee can also seek for damages in the civil court. The role of the human resource team should have a health and safety program clearly defined and stated. Some of the areas that human resources should examine and supervise are management a nd employee training on health and Safety measures to prevent work related injuries and illnesses and ensuring workplace safety culture is being driven to ensure safety of the employees working onsite. The researcher then concludes that having an effective Health and Safety department has become very important from a commercial and a governmental viewpoint of the company. Many high profile safety negligence cases over the last few years have been mostly caused by bad management team in the company.

Friday, October 18, 2019

Comparison of Governmental Policies of India and China Regarding Essay

Comparison of Governmental Policies of India and China Regarding Economic Progress and Social Wellbeing - Essay Example This essay is one of the best examples of comparative economic analysis of the government involvement in promoting economic growth in China and India from 1950s to 2010s. Efforts to improve the social, economic and political systems in the countries around the world lies on the hands of the political leaders representing these sovereign states. However, this responsibility does not lie solely on one specific regime of leadership. Instead, it depends on the historical context of issues and policies that a series of governments in the countries put into place. The most successful economies around the globe affiliate their economic stability with the strategic devoted participation of the past government institutions in the countries’ history. Perfect examples of countries with improved economic status are China and India. However, the extents and strategies employed in these states differ. Similarly, the social well-being of the citizens of each of the named countries differ substantially. China and India have long economic histories. A series of challenges posed by the international economic forces may have played a paramount role in the development of counter-strategies in the two countries. Chinese government has been very active in ensuring that the social welfare of the citizens becomes a priority. For instance, the Indian government facilitated the slow progress of the economy despite increased propositions by renowned economies. The rate at which two governments facilitated industrial development differs substantially.

Password Cracking Systems Research Paper Example | Topics and Well Written Essays - 5000 words

Password Cracking Systems - Research Paper Example The research paper "Password Cracking Systems" discusses the password cracking systems in detail. Password cracking is a process of accessing a computer system, network or resource with or without making use of software applications to open a resource that has been locked with a password. E-authentication (Electronic authentication) is a way of authenticating the client identities offered to an information system via electronic means. However, the e-authentication can create a technological issue for the reason that this procedure engages the remote or distant verification of particular people by using a digital communication network, intended for the idea of electronic administration and business. In fact, this idea offers practical directions to the corporations to authorize a single person to distantly confirm his/her uniqueness to a Federal IT arrangement. However, this way of management tackles simply customary, extensively applied techniques intended for remote verification based on secrecies. Moreover, through these techniques, the person who has to be authenticated verifies that he or she recognizes or possesses a number of confidential data and information. In this scenario, the majority of verification systems are basically dependent on secret passwords. But unluckily, the uncertainty and extent of user selected secret passwords to turn out to be permanent even after a long period. In difference, a hardware development continually provides attackers growing computational control. Thus, password methods like that customary UNIX user-authentication structure are becoming unsuccessful with the passage of time (Provos & Mazieres, 2002). Password cracking is a way of trying to access or crack passwords in an attempt to enter into a computer system or a communication network. In addition, crackers usually make use of a range of scripts, tools or cracking software to break a communication system password. In this scenario, the prime objective of the cracker is to perfectly get the password of server (UNIX) or other system and for Windows and NT. Moreover, the process of password cracking starts by matching each protected dictionary word with information stored in the system secret password file so that a match could be found (Webopedia, 2011) . Security management is one of the major concerns in this age of technology. However there is a large number of technology based applications those are breaking and disturbing such security settings. Password cracking systems are one of such systems those are used to breach the security of any system (Nash, 2000) and (Snyder, 2006). In the upcoming sections this paper will analyze such password cracking systems and their possible functioning. TECHNOLOGY EVOLUTION After the evolution of technology based systems microprocessors developed quickly, so does the pace of cryptographic digital software. In this scenario, speedy cryptographic technique offers a lot of chances for making application system safer. It makes encryption exploitable for a broad variety of systems. In addition, it offers superior standards of adjustable protection metrics like that secrete key length. However, growing security limitations make it very difficult to crack cryptography (or at any rate super-polynomia lly), dwarfing a number of advantages quickly hardware can present invaders. However, there is a security challenge in way of its implementation that is the extent and uncertainty of client selected passwords does not level in any way with computing control. Despite the fact that many systems need users to choose secret passwords for verification, some in fact acclimatize their algorithms

Environment and society Essay Example | Topics and Well Written Essays - 250 words

Environment and society - Essay Example However, this may not affect the general public. Unhealthy AQI, 150 t0 200 (red), has an association with health effects upon the general public. Here, sensitive group members suffer more severe effects than others. Very unhealthy AQI, 201 to 300 (purple) comes with emergency conditions health warnings. This seems to affect the entire population. Maroon color (hazardous AQI- 301 TO 500) means health alert that can come with health effects upon all people. The current AQI, Friday November 01 2013 at 5:00 AM EST is good but with some moderate AQIs in some states. There are also negligible spots of â€Å"Unhealthy for sensitive groups† AQI (AirNow 1). We also have unhealthy AQI as a spot around Spokane. The forecast AQI is good with some spots of moderate AQI. The factors that could be responsible for the differences between the current National AQI and the forecast AQI could be particulate matter content of the air and the prevailing winds. The AQI loop shows a general green, good AQI with the extreme western part showing moderate AQI. The colors keep changing from time to time, but the general good, green AQI is maintained. The loop for ozone is green showing that the lower atmosphere is free of harmful ozone. PM loop although covered by green, good AQI, keeps changing in some parts. The observed difference is because ozone disruption or changes take a long time to be noticed. The AQI for Philadelphia is good with a value of 33 (AirNow 1). Current conditions are moderate with the health message to unusually sensitive people to avoid prolonged exertion. The map for ozone shows a general good condition with stability. The current PM for Philadelphia is good, but with moderate conditions to the western and southern parts. The process of carbon capture and sequestration takes place through three steps. These include capture of carbon dioxide from industrial processes and power plants (EPA 1). The captured carbon dioxide is then

Thursday, October 17, 2019

Stanley kubrick Work of Art Essay Example | Topics and Well Written Essays - 1250 words - 1

Stanley kubrick Work of Art - Essay Example invented relatively unique technique that an artist or a film producer uses in their work to make it distinctive to the audience and to the artistic field. On the other hand, cinematography is an artistic creation of motion pictures photography using imagery and other stylistic techniques. Sequentially, the focus of this essay is to give an in depth analysis on four of Kubrick’s marvelous films in terms of the Mise-en Scenes and the cinematography aspect in each film. For Stanley, he implored the use of visual effects to try to portray the imaginative and scientific features. In addition, the film portrayed the director’s ardent love for science and science related themes. It was collaboration between science fiction writer Clarke Arthur and him. The movie also showed Kubrick’s fascination in the existence of life beyond planet earth implying that other planets could support human existence. In a remarkable blend, Kubrick infused classical music in to this film that mostly became the opening songs in this film. He also invoked contemporary music by natives of other countries to serve as introductory tracks in his movie. The classic music depicted the reality of the scenes that were actually fictitious. The musical background also provided a basis for the viewer to connect with the storyline. It characterized the serenity of events hence portraying harmony and piece within the movie For instance; he facilitated Gyorgy Ligeti in to co ming in to the lime light by building on his fame and popularity. The Mise-en-Scene aspect in this movie was the use of acutely little dialogue that made it stand out. For instance, the characters engage in few conversations all through the movie to emphasize on the need for its audience to follow through the movies events. The movie’s fast and last scenes are without any conversation that also reflects during the film. In between the film, there are long breaks in between conversations. On the other hand, the color aspect is

Wednesday, October 16, 2019

Financial Markets Assignment Essay Example | Topics and Well Written Essays - 1500 words

Financial Markets Assignment - Essay Example sk and return of different types of investments, it should be noted that past returns are no guarantee of future performance, especially with respect to expected returns, even over time intervals as long as several decades. However, past returns over very long time horizons can be informative. For instance, a 1987 study by Jones and Wilson indicated that $1 invested in 1870 Would have grown over the next century (by 1985) to $13,264 if invested in U.S. stocks, $340 if invested in U.S. long-term bonds, and $260 if invested in U.S. short-term money market debt (in the meantime, consumer prices had risen so that it took $8.40 to buy what $1.00 bought in 1870). Although equity returns have greatly exceeded debt returns over the entire time interval, bond returns matched those of stocks over time intervals as long as 60 years (e.g., 1872 to 1932). In another study (by Siegel in 1992), it was found that bond returns exceeded those of stock returns over another 50+ year period, from 1802 to 1861, although a dollar invested into stocks in 1802 would have grown in value to $955,000 by 1990 compared to only $5770 for long-term bonds, $2680 for short-term bonds, and $15.80 for gold (it should be mentioned that it took $11.10 in 1990 to buy what $1.00 bought in 1802). Thus, although stocks tend to average higher returns than bonds over the very long term, there is substantial risk of stocks underperforming bonds even over fairly long time horizons. On the other hand, commodity investments like gold tend to be very poor investments over long time horizons (even though they do tend to keep up with inflation) Although the return to real estate was not measured in these studies, most believe that average real estate returns have been close to that for stocks. However, many analysts...The value of any asset is a function of the cash flows expected from the asset. These cash flows can be valued by discounting them at an appropriate interest rate. The appropriate discount rate is the minimum expected return that is required on assets with similar risk (and with other relevant characteristics). Discounting the expected cash flows by the required returns yields a value, which if paid as the price for the asset, would result in an internal rate of return (IRR) equal to the minimum required return. Victor A. Canto and Arthur B. Laffer Theory and common experience postulate that general economic factors impact stock prices in the aggregate. These same factors can have substantially different effects, depending on the size, location, and the industry groups being considered.Over the past decade, research at A. B. Laffer, V. A. Canto & Associates has focused on developing a portfolio strategy that would identify differential performance based on overall economic environment, location, and size.

Stanley kubrick Work of Art Essay Example | Topics and Well Written Essays - 1250 words - 1

Stanley kubrick Work of Art - Essay Example invented relatively unique technique that an artist or a film producer uses in their work to make it distinctive to the audience and to the artistic field. On the other hand, cinematography is an artistic creation of motion pictures photography using imagery and other stylistic techniques. Sequentially, the focus of this essay is to give an in depth analysis on four of Kubrick’s marvelous films in terms of the Mise-en Scenes and the cinematography aspect in each film. For Stanley, he implored the use of visual effects to try to portray the imaginative and scientific features. In addition, the film portrayed the director’s ardent love for science and science related themes. It was collaboration between science fiction writer Clarke Arthur and him. The movie also showed Kubrick’s fascination in the existence of life beyond planet earth implying that other planets could support human existence. In a remarkable blend, Kubrick infused classical music in to this film that mostly became the opening songs in this film. He also invoked contemporary music by natives of other countries to serve as introductory tracks in his movie. The classic music depicted the reality of the scenes that were actually fictitious. The musical background also provided a basis for the viewer to connect with the storyline. It characterized the serenity of events hence portraying harmony and piece within the movie For instance; he facilitated Gyorgy Ligeti in to co ming in to the lime light by building on his fame and popularity. The Mise-en-Scene aspect in this movie was the use of acutely little dialogue that made it stand out. For instance, the characters engage in few conversations all through the movie to emphasize on the need for its audience to follow through the movies events. The movie’s fast and last scenes are without any conversation that also reflects during the film. In between the film, there are long breaks in between conversations. On the other hand, the color aspect is

Tuesday, October 15, 2019

Single Life Essay Example for Free

Single Life Essay Group member: Li Ruixuan, Chen Yi, Ai Huanyu, Jin Peiyao, Wu Jindi. Research method: This case talks about Slavery in the chocolate industry. They treat children as slavery, and force them to do hard work. The reason by various factors, we can discuss form systemic, corporate and individual ethical issues. Such as systemic, economic systems should be taken into consideration. Cocoa bean prices had declined, between 1996 and 2000, the price control by the global market but farmers had no control. Farmers turned to slavery to try to cut labour cost for their survival in this situation by the low prices. Slavery on farms is illegal in the Ivory Coast but the law is rarely enforced. But the government from their country has their own situation, a shortage of enforcement officers, the willingness of local officials etc. The case information we found it by some website: http://www.foodispower.org/slavery_chocolate.php http://vision.ucsd.edu/~kbranson/stopchocolateslavery/index.html And we also got some useful information from the book in page 64-67. Division of labour and schedule including presentation preparation: We followed the question below the case from the book to division of labour. Each question was answered by one or two group member, the number decides by question. Presentation follows the report, which part of report you did, then which part of presentation you do. Initial findings: After read the case and discussed, in our view, the situation made by the basic reason of our consumer, like us who buy chocolate from these company. The most of consumers did not know about this situation, they just know something good about chocolate and did not know something bad. Affect global market through our consumer, and made a good plan to solve the situation. Media’s power is great. Some company said if they did not used coco beans from these areas, then it will make these poor areas What a systematic, corporate, an individual and ethical issues raised by this case? The systematic ethical issues raised by this case include economical, political, and legal questions. Let us first look at the economical repercussions. Would it be economically logical not to do any business with these countries? The answer is no, considering close to half of the world’s chocolate is made from the cocoa beans that are grown in the Ivory Coast and Ghana. If we were to refuse to do any business with these countries or the people associated with these countries, the costs of the products may be un-affordable to consumers. As far as political issues, I’m sure we’re not the only country who does business with these other countries, and if we stop doing business with the ivory coast and Ghana the other countries that also do business with them may stop doing business with us. The last systematic issue raised is legal. As stated in the article slavery on the farms is in illegal in the Ivory Coast. Whether it is or how well the laws are enforced is for the most part out of our control. In your view, is the kind of slavery discussed in the case absolutely wrong no matter what, or is it relatively wrong, i.e., if what happens to live in a society like ours that disapproves of slavery? I feel slavery of any kind is wrong whether the society approves or disapproves of it. However, throughout history slavery has been a common practice of most societies across the world. If the young boys in this case had been treated better, for example better working conditions, better sleeping conditions, better living conditions, and better treatment in general would this article ever have appeared? Probably not, I think the major moral issue here is the treatment of the boys. Who shares in the moral responsibility for the slavery occurring in the chocolate industry: African farmers? African governments? American chocolate [continues]

Monday, October 14, 2019

Features of Internet Banking

Features of Internet Banking 2.0 Overview Based on previous chapter, this study examines the factor influencing undergraduate student adoption of internet banking. In order to gain a clearer better understanding, it is meaningful to explore the related literature regarding adoption internet banking. Section 2.1 will discuss about the basic of electronic banking. Section 2.2 understanding about internet banking, section 2.3 conception of internet banking, section 2.4 traditional banking versus internet banking, section 2.5 will discuss the characteristics of internet banking, section 2.6 Technology Acceptance Model, section 2.7 in Malaysias internet banking and section 2.8 factor influencing undergraduate adoption of internet banking. 2.1 Basic of Electronic Banking The term of electronic banking is almost generic in its nature and therefore it is mostly used without any further definition or explanation. Electronic banking is not equal to the term of internet banking although the latter is most widespread type of it. Electronic banking is a construct, which consists of several distribution channels. Electronic banking is a bigger platform than just banking via internet. Although, most general type of electronic banking in our times is banking through internet or internet banking. Electronic banking this term can defines in many ways. Most simple form is mean the provision of information or service via a bank to its customers by a computer, television, telephone, or mobile phone. Electronic banking includes several traditional services like telephone banking, credit cards, debit cards, ATMs. Burr (1996), for example, describe of an electronic connection between bank and customers in order to manage, prepare and control financial transactions. Internet banking also allows their customer access bank accounts for doing their banking transactions. At another progression level internet banking called transactional online banking, because of it involves the provision of facilities such as transfer of funds, view account balances and transaction, buying financial products or service online. Now a day internet is the main channel of electronic banking. Electronic banking is also known as electronic fund transfer (FET) and basically is simple the use of electronic means to transfer fund directly from one account to another account.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  In addition, electronic banking is said to have three different mean of delivery: PC, telephone and the internet. From Daniel (1999) there, he already introduces four types of channels for electronic banking: PC banking, internet banking, managed network and also TV-based banking.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The most important is to know that internet banking is dissimilar from PC Home banking. The apparent difference is that internet banking is browser-based, whereas PC Home banking requires customers to install the software package assigned by the bank on their PC. Furthermore, PC Home banking allows customers to do their banking services only on PCs that have been installed the assigned software package.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Telephone banking, TV-based banking and managed network do not play such role in banking today. However, in the future delivery platform is expected to shift from wired internet connection to wireless mobile technologies. 2.2 Internet banking Internet banking defines as banking services such as transfer of fund, loan application, account balance inquiry, fixed deposit placement and view transaction histories provided by bank via internet. (Pikkarainen, Pikkarainen, Karjaluoto, and Pahnila, 2004, p.224) defines internet banking as an internet portal, through which customers can use different kind of banking services ranging from bill payment to making investment. Now a day, banking services really give many types of service through internet; it is also another stage for banking industry goes to higher levels. Beside that cash withdrawal, internet banking gives undergraduate customers many types of banking transaction can be done through at the click of mouse only. Undergraduate student using mouse to click already can be done several banking transaction compare to traditional banking. To be sure, use of new alternative channel for distribution of financial services has become a competitive necessity instead of just a way to achieve competitive advantage with the advent of globalization and fiercer competition. All banks using internet as an additional channel or a bank using only the internet as the delivery channel are now equal footing to offer their banking services on the internet and to complete for customer around the world.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Internet banking has the advantage for bank to maintain competition, to save costs, to enhance mass customization, marketing and communication activities, and to maintain and attract consumer. The primary advantage of internet banking is to save time and cost. Indicated that internet banking allows the consumer easier access to their bank accounts with lower services changes and also time saving. Moreover, showed that internet banking had a low transaction cost and a high speed of service when compared to other banking services. 2.3 Conception of internet banking   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Internet banking is conducting banking transaction via internet, such as fund transfer, account balance inquiry, history transaction, loan application and so forth. In terms of banks ideals are as below: Provided with ICT equipment such as notebooks and internet connection, the user can access anywhere anytime. (e.g. home, hotspots zone, workplace and so forth) It required basic software from PC such as Internet explorer which allows users to sign-in into their e-banking services from the websites. All transactions done through website will store in banker server from internet. Banking services are ready can anytime. Users can print the bank statement or check the transaction history or observe the incoming fund anytime. Meanwhile we should alert that the differences among internet banking and PC Home banking. Internet banking is through browser-based, but PC Home Banking needed to install a software package assigned by the bank. 2.4 Internet banking versus Traditional banking   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Many years ago, when a user wanted to open a bank account, he or she must be presented to bank branches. And, the business transaction, automatic teller machine (ATMs) and customer services also provided by face to face basis which so called traditional banking. Traditional banking offer real life people to people interaction. Fixed schedule, inconvenient locations and limited financial products offer are caused some of users drawback from traditional banks.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  For internet banking, the easiest way to open a saving account or internet checking is by linking to an existing account. Business transactions can be carrying out by just a click. Without any verbal communications and no long queue at the counter, the users still can manage any accounts by staying at home. Internet banking is more convenience; 24 hours in 7days of banking service and flexibility are the main advantages of internet banking. It can provide the undergraduate students on all banking services convenience anywhere. Thus, internet banking is probably our benefits. 2.5 Characteristics of internet banking Internet banking is beneficial for both the provider and the customer. Stated that rationales of banks usage of the internet banking technology from the bank perspective are mainly to saving cost. Banks use internet banking is because it is the cheapest delivery channel for banking products. This kind of services can save time and money of the bank with an added benefit of minimizing the likelihood of committing errors by bank tellers. Internet banking offer services to their customers to use at their conveniences. Mostly, undergraduate students are like conveniences, easy and fast, somehow internet banking usage for undergraduate still not so much. From the figure is show that age 16-24 is lower compare to age 25 onward. While younger peoples continue to make up the greater part of online users, due to internet banking users greater proportion of new internet banker is age 55. (Karjaluoto et al. 2002, p.261) argued that banking is no longer bounce to time and geography. Customers over the world have relatively easy access to their account, 24 hours per day and seven days a week. This author argue that, with internet banking services, customers branch banking took too much time and effort are now able to make the transaction using click of their fingers. Competition is yet another important rationale with increasing competitive pressures from existing firms and new entrants in the market. At the same time, internet banking strategy has been an interesting way to retain existing customers and attract more new customers. The use of internet banking become an alternative channel has also been allowing banks to target different demographic segment more effectively. (Robinson, 2000) believe that supply of internet banking services enable bank to establish and extend relationship with customers. Benefit for the users are numerous as well and include convenience of the services, lower cost of transaction and more frequent monitoring of accounts among others.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The basic characteristics of internet banking are: To help bank perspective to save costs. To save time and money. To minimize the likelihood committing errors. To fulfill undergraduate students convenience. To lower the transaction costs. 2.6 Technology Acceptance Model   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Technology Acceptance Model (TAM), are introduced by Davis 1989. Goal of Technology Acceptance Model (TAM) is determinants of able of defining user behavior across a wide range of end-user computing technologies and computer acceptance. A key intent of Technology Acceptance Model (TAM) provides a basic of trace the affect of external factor on attitudes and intention.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Technology Acceptance Model (TAM) which has been extend and applied to different information technologies and end users. In TAM, Davis proposes that the influence of other variables on technology acceptance in mediated by two individuals belief: perceived ease of use (PEU) and perceived useful (PU). Technology Acceptance Model (TAM), suggest that a prospective users overall feelings or attitudes toward using a given technology based on system or procedures represent major determinants to use the system. Technology acceptance model (TAM) proposes that attitudes predict intention, and intention predict behavior. Adoption behavior is determined by the intention to use a particular system and intention is determined by attitude, which in turn is determined by the perceived usefulness and perceived ease of use of the system.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Perceived usefulness is defined as using a particular system will improve on job performance. Perceived ease of use defined as using a particular system will be free of effort. Offer instance of external variable may affect an individuals perceived usefulness. Two computer programs are given, which are equally to use and will produce better quality or improve users productivity will have a higher affect on an individuals perceived usefulness ,regardless of ease of use equality. 2.7 In Malaysia   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  All banking services and financial services in Malaysia is regulated by Central Bank; Bank Negara Malaysia (BNM). June 2000, internet banking was introduces in Malaysia when Bank Negara Malaysia (BNM) allow local banks to offer internet banking service in Malaysia. This facility was extended to foreign owned banks during 2002. Until Jan 2008, there were 23 banks offering internet banking in addition to their traditional services. Bank Negara Malaysia (BNM) provided Minimum Guidelines on the Provision of Internet Banking Services by Licensed Banking Institution (MGIB) 2000 after the BCBS recommendations. Bank Negara Malaysia (BNM) defines internet banking as product and services offered by licensed institution on the internet through access devices, including personal computer and other intelligent devices.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Banking institution are legal entities licensed under the Banking and Financial Institution Act (BAFIA) 1989. The aim for Minimum Guideline on the Provision of Internet Banking Service by Licensed Banking Institution (MGIB) is main purpose is to protect both consumer and the bank themselves from the risk associated with such banking. 2.8 Factor influence Internet Banking 2.8.1 Security   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  According to the main factors that determining the decision of undergraduate students using internet banking is security. (ABF, 1997) shows that undergraduate student and banker will keep away from internet banking are security concern. More undergraduate students and households will be willing to conduct their banking transaction via the internet, unless improvement of security. US banks believe that security concern is main barrier for internet banking is concluding by the banks. Main reason for slow growth of internet banking were discover by the security concern, this is conducted by study in Australia. New innovation of the level of the security or risk associated will influence the acceptance and adoption. Where internet banking has been long set up, the main significant factors that will slow down the progress of this new innovation is the main concern for security over the financial transaction via internet. Most of peoples including undergraduate student, they will first considered secure and safe of the internet banking.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Initially, as an undergraduate student they will think whether this banking transaction through internet isnt secure enough for doing the transaction. Lack of security and reliability of transaction via internet is the main reason for they agree to refuse to use the internet banking. Security and privacy issues are concern by individual because they are still reluctant to use.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  (Sathye 1999), concern about the security and safety of the banking transaction via the internet, Australian consumer are reject to adopt internet banking. Due to also found out that substantial reason that influence internet banking in Malaysia security anxiety. Security failure at a banking institution may cause large losses could generate lack of confidence in banking innovation.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Tan and Teo (2000) establish that risk will be the main factor, Ndubisi et.al. (2004) also agree the importance of adequate of security in order to raise the confidence of public to utilize the system.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Banks ability is to manage internet-based transaction through undergraduates confidence. Poor security is inadequate to protect customers personal data. Computer privacy and security issues are those undergraduate students concern about. Internet banking service must be more responsive security requirements only can attract more and more undergraduate users. 2.8.2 Trust   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  (Mayer, Davis Schoorman, 1995) Trust is defined as a willingness to be susceptible to the action of the others. Define trust as an necessary components in a relationship especially whenever risk and uncertainty exist. Say that when an individual trust a person, will expect in that person will not take advantage of reliance upon him or her.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Context of internet banking, trust has been suggested to be the one of the barrier that will hinder individuals from adopt the technology say by. Security issues will indirectly have further influence undergraduate students trust level of internet banking.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  (Moorman et.al, 1992) Defined trust as a willingness to rely on an exchange partner in whom one has confidence and perception of confidence in the exchange partners reliability and integrity say by. These both directly underline in the exchange partners reliability in the conception of trust. Normally undergraduate student do not trust Internet Technology for these three reasons, first is security of the system, second is distrust of the provider and third is reliability of internet service.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Trust in the internet increase long term internet usage in the adoption decision. Trust will give undergraduate student guarantee safety for using internet banking. Undergraduate student attitude toward internet banking system may be related with trust on judgment on the security and privacy also. One of the important reasons is lack of trust make undergraduate student do not using internet banking, so must improve application security and privacy only can give undergraduate student confidence for using internet banking. Trust is an antecedent of perceived usefulness, also perceived ease of use is an antecedent of trust. Trust has a directly and indirectly effect on behavior intention to use. Determinants of perceived usefulness is trust, particularly in an online environment, part of guarantee that undergraduate student will sense the expected usefulness from the website. Trust will have a positive effect on perceived usefulness, while trust allow undergraduate to ensure they gain the expected useful services. 2.8.3 Privacy protection Defined privacy as the protection of personal information so it is not reveal to or used by others. Undergraduate normally aware of the privacy issues, including whether personal information would be used by the banks or third parties to market new services to them. Privacy has been an important factor in the choice not to use internet banking. Effective privacy protection laws will consider the internet environment will help to build trust and confidence. To improve privacy issues, first banks must provide consumer reassurance and information, ensure consumer information would not disclose to other or third parties. Banks need to improve the application security and privacy and ensure bank information security and privacy. To assist consumer in development secure internet banking practice and risk management procedures. 2.8.4 Attitude Define attitude as person positive and negative feeling about internet banking adoption. Age will affect the attitude of individual toward internet banking. Attitude toward adoption and use of internet banking might give undergraduate student a positively image assuming security of internet transaction is safety enough. Positive technology attitude enable faster diffusion of internet based services.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Attitude build received its first serious attention from Darwin 1872. Darwin defined attitudes as a physical expression of an emotion or motor concept. According to defined attitudes as an individuals positive and negative feeling to perform a target behavior. defined as a persons general feeling of favorableness and unfavorable for that recommends that different dimension of attitudinal belief toward innovation appraise by five perceived attributes. Five attributes are relative advantage, complexity, compatibility, observability, and trialability. At the same time behavior intention to use internet banking is highly related to attitude. Personal banking experiences will affect attitude toward internet banking.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Internet to users banking needs to relate to the advantage the mount up to the user of the technology. show that relative advantage is very important factor to influence adoption of new innovation. Commonly, perceived relative advantage is positively connected to the rate of adoption. According to defined complexity as degree to which an innovation is measured comparatively is hard to understand, found and use it to negatively affect the adoption of internet. Shows that complexity is view the accurate opposite of ease of use, that have been establish to directly crash the adoption of internet. Stated that, system requires less operational effort and technical skills will more probable to adopt it. Found that an innovation was more possible to be adopting when it was compatible with individuals value system and job responsibilities. Privacy is an important view to performing internet banking and therefore observing individual performing internet banking is not only hard also hard to unacceptable. found out observation and description analysis of undergraduate internet banking users, the problem such as slowness and so forth. Stated that trialability got the potential adopter of new technology, and who will allow to test it, whether will comfortable to be more likely to adopt it. Attitudes combine with these five innovations, these five innovations will directly and indirectly affect undergraduate student to adopt internet banking as well. 2.8.5 Perceived ease of use   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Defined perceived ease of use as degree to which person believes that adopt internet banking would be free of effort. Define ease of use as one of important characteristics from undergraduates perspective for adoption of innovation services. A study has been conducted by a company called Cyber Dialogue has revealed that as many as 3.1 million USA adult have discontinued their use of internet banking because of they feel the services was too complicated or were dissatisfied with the level of customer services. Propose that it is essential for the internet to be ease of use to increase the adoption rate of internet banking. Function of internet banking ease of use, it will be attract more undergraduate students adopt it. Now a day, undergraduate student really got the potential to help grow the rate of adopt internet banking rate. To help success implementation internet banking, banks must make sure that the service of the system are simple, ease and of sufficiently high quality to confirm undergraduate level satisfaction in order to maintain undergraduate usage.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Show that general computer self efficiency considerably influence the perceived ease of use at all the time, while the usability of system will directly influence undergraduate users perception after they have experience with the system 2.8.6 Awareness   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Explanation of Awareness can be the acceptance and continued to use the service, product or idea. show that undergraduate go via a series of process in knowledge, decision, conviction and confirmation before they are ready to adopt new service or products. The adoption or rejection of an internet banking start when the undergraduate becomes aware of the internet banking. Consumer must become aware of new service or new product is emphasizing by. Normally when come out one new services or new product consumer will not dare to try or buy it.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Lack of awareness is the most common and important factor that negatively influence adoption of internet banking stated by. This is situation; we are able to argue that if the undergraduate student not adopting internet banking service due to the unawareness of the availability of such a service. Lack of awareness of internet banking and its benefit, here some recommendation suggest by. To attract more undergraduate student attention to internet services through a better marketing, let undergraduate better understand the process. Try to inform the undergraduate student about the features, advantage and the benefit of internet banking, for undergraduate student they normally are more prefer everythings conveniences. Reduce the undergraduate concern about technology and support.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Lack of internet awareness is due to the internet banking services are still unaccepted. It is believe that undergraduate are not fully confidence with using internet banking. Greater awareness could show them the benefit and also encourage them to adopt internet banking services provided from banker. Awareness of internet banking services is necessary in the early adoption stages, as internet banking services is consider new in Malaysia. 2.8.7 Cost and Accessibility   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Stated that cost as a characteristics of internet banking. Price or cost is one of the important factors that will affect the undergraduate adoption of innovation. Two types of costs are involved in the internet banking, first is bank charge and cost, second is the normal cost that associated with the internet activities. Before adopting internet banking, undergraduate will concern about the cost, to help in increase the rate of adoption of internet banking. Banks must lower the transaction cost, to help undergraduate student save costs.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  If want to attract more undergraduate student to use new technologies, then first the technologies must be reasonable priced relative to alternatives. All price charged must be reasonable, with a reasonable price undergraduate just willing to adopt internet banking or else the acceptance of the new technology may not be viable from the point of view of the undergraduate. Being on the internet has allowed banks to cut costs on transaction, by the way banks also can improve their image on the market.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Point out that internet banking is very beneficial to undergraduate because of the savings in cots, time and space it offers; and also it is quick feedback to all the complaints. It also can build undergraduate identification of internet banking to emphasize the benefit of internet banking services; such as low cost service, conveniences, information availability and time saving. Saving transaction cost can improve customer service, increasing market reach and reducing costs are now basic expectation of internet banking services.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Availability of access to computer or internet is a precondition for adoption of internet banking. Show that the more widespread the access to computer or internet then the greater possibility of use of internet banking adoption. found that lack of access to computer as one of the reason for slow adoption of internet banking.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Show that accessibility to computer or internet will affect the decision to adopt internet banking. Relationship between the accessibility and internet banking is important and the outcome show that accessibility has a positively relationship with internet banking adoption intentions.