Saturday, August 31, 2019

Ecriture Feminine

Ecriture feminine, literally â€Å"women's writing,†[1]  more closely, the writing of the female body and female disparity in language and text,[2]  is a strain of  feminist literary theory that originated in France  in the early 1970s and included foundational theorists such as  Helene Cixous,  Monique Wittig,  Luce Irigaray,[3]  Chantal Chawaf,[4][5]  and  Julia Kristeva,[6][7]  and also other writers like psychoanalytical theorist  Bracha Ettinger,[8][9]  who joined this field in the early 1990s. [10]  Generally, French feminists tended to focus their attention on language, analyzing the ways in which meaning is produced. They concluded that language as we commonly think of it is a decidedly male realm, which therefore only represents a world from the male point of view. [11] Nonetheless, the French women's movement developed in much the same way as the feminist movements elsewhere in Europe or in the United States: French women participated in consciousness-raising groups; demonstrated in the streets on the  8th of March; fought hard for women's right to choose whether to have children; raised the issue of violence against women; and struggled to change public opinion on issues concerning women and women's rights. The fact that the very first meeting of a handful of would-be feminist activists in 1970 only managed to launch an acrimonious theoretical debate, would seem to mark the situation as typically ‘French' in its apparent insistence on the primacy of theory over politics. [12] Helene Cixous  first coined  ecriture feminine  in her essay, â€Å"The Laugh of the Medusa† (1975), where she asserts â€Å"Woman must write her self: must write about women and bring women to writing, from which they have been driven away as violently as from their bodies† because their sexual pleasure has been repressed and denied expression. Inspired by Cixous' essay, a recent book titledLaughing with Medusa  (2006) analyzes the collective work of Julia Kristeva, Luce Irigaray, Bracha Ettinger and Helene Cixous. [13]  These writers are as a whole referred to by Anglophones as â€Å"the French feminists,† though Mary Klages, Associate Professor in the English Department at the University of Colorado at Boulder, has pointed out that â€Å"poststructuralist theoretical feminists† would be a more accurate term. [14]  Madeleine Gagnon is a more recent proponent. And since the aforementioned 1975 when Cixous also founded women's studies at Vincennes, she has been as a spokeswoman for the group Psychanalyse et politique and a prolific writer of texts for their publishing house, des femmes. And when asked of her own writing she says, â€Å"Je suis la ou ca parle† (â€Å"I am there where it/id/the female unconscious speaks. â€Å")  [15] American feminist critic and writer  Elaine Showalter  defines this movement as â€Å"the inscription of the feminine body and female difference in language and text. [16]  Ecriture feminine places experience before language, and privileges non-linear, cyclical writing that evades â€Å"the discourse that regulates the  phallocentric  system. â€Å"[17]  Because language is not a neutral medium, the argument can be made that it functions as an instrument of patriarchal expression. Peter Barry writes that â€Å"the female writer is seen as suffering the handicap of having to use a mediu m (prose writing) which is essentially a male instrument fashioned for male purposes†. 18]  Ecriture feminine thus exists as an antithesis of masculine writing, or as a means of escape for women,although the phallogocentric argument itself has been criticised by W. A. Borody as misrepresenting the history of philosophies of ‘’indeterminateness’’ in Western culture. Borody claims that the‘black and white’’view that the masculine=determinateness and the feminine=indeterminateness contains a degree of cultural and historical validity, but not when it is deployed to self-replicate a similar form of gender-othering it originally sought to overcome. 19]  In the words of Rosemarie Tong, â€Å"Cixous challenged women to write themselves out of the world men constructed for women. She urged women to put themselves-the unthinkable/unthought-into words. †[20] Almost everything is yet to be written by women about femininity: about their sexuality, that is, its infinite and mobile complexity; about their eroticization, sudden turn-ons of a certain minuscule-immense area of their bodies; not about destiny, but about the adventure of such and such a drive, about trips, crossings, trudges, abrupt and gradual awakenings, discoveries of a zone at once timorous and soon to be forthright. 14] With regard to phallocentric writing, Tong explains that â€Å"male sexuality, which centers on what Cixous called the â€Å"big dick†, is ultimately boring in its pointedness and singularity. Like male sexuality, masculine writing, which Cixous usually termed phallogocentric writing, is also ultimately boring† and furthermore, that â€Å"stamped with the official seal of social approval, masculine writing is too weighted down to move or change†. 20] Write, let no one hold you back, let nothing stop you: not man; not the imbecilic capitalist machinery, in which the publishing houses are the crafty, obsequiou s relayers of imperatives handed down by an economy that works against us and off our backs; not  yourself. Smug-faced readers, managing editors, and big bosses don't like the true texts of women- female-sexed texts. That kind scares them. [21] For Cixous, ecriture feminine is not only a possibility for female writers; rather, she believes it can be (and has been) employed by male authors such as  James Joyce. Some have found this idea difficult to reconcile with Cixous’ definition of ecriture feminine (often termed ‘white ink’) because of the many references she makes to the female body (â€Å"There is always in her at least a little of that good mother’s milk. She writes in white ink†[22]) when characterizing the essence of ecriture feminine and explaining its origin. This notion raises problems for some theorists: â€Å"Ecriture feminine, then, is by its nature transgressive, rule-transcending, intoxicated, but it is clear that the notion as put forward by Cixous raises many problems. The realm of the body, for instance, is seen as somehow immune to social and gender condition and able to issue forth a pure essence of the feminine. Such essentialism is difficult to square with feminism which emphasizes femininity as a social construction†¦Ã¢â‚¬ [23] For Luce Irigaray, women's sexual pleasure  jouissance  cannot be expressed by the dominant, ordered, â€Å"logical,† masculine language because according to Kristeva, feminine language is derived from the pre-oedipal period of fusion between mother and child. Associated with the maternal, feminine language is not only a threat to culture, which is patriarchal, but also a medium through which women may be creative in new ways. Irigaray expressed this connection between women's sexuality and women's language through the following analogy: women's  jouissance  is more multiple than men's unitary, phallic pleasure because  [24] â€Å"woman has sex organs just about everywhere†¦ feminine language is more diffusive than its ‘masculine counterpart'. That is undoubtedly the reason†¦ her language†¦ goes off in all directions and†¦ e is unable to discern the coherence. †Ã‚  [25] Irigaray and Cixous also go on to emphasize that women, historically limited to being sexual objects for men (virgins or prostitutes, wives or mothers), have been prevented from expressing their sexuality in itself or for themselves. If they can do this, and if they can speak about it in the new languages it calls for, they will establ ish a point of view (a site of difference) from which phallogocentric concepts and controls can be seen through and taken apart, not only in theory, but also in practice. 26] ————————————————- [edit]Notes 1. ^  Baldick, Chris. Oxford Concise Dictionary of Literary Terms. OUP, 1990. 65. 2. ^  Showalter, Elaine. Critical Inquiry, Vol. 8, No. 2, Writing and Sexual Difference, (Winter, 1981), pp. 179-205. Published by: The University of Chicago Press. http://www. jstor. org/stable/1343159 3. ^  Irigaray, Luce,  Speculum of the Other Woman, Cornell University Press, 1985 4. ^  Cesbron, Georges, † Ecritures au feminin. Propositions de lecture pour quatre livres de femmes† in Degre Second, juillet 1980: 95-119 5.   Mistacco, Vicki, â€Å"Chantal Chawaf,† in Les femmes et la tradition litteraire – Anthologie du Moyen Age a nos jours; Seconde p artie: XIXe-XXIe siecles, Yale Press, 2006, 327-343 6. ^  Kristeva, Julia  Revolution in Poetic Language, Columbia University Press, 1984 7. ^  Griselda Pollock, â€Å"To Inscribe in the Feminine: A Kristevan Impossibility? Or Femininity, Melancholy and Sublimation. †Ã‚  Parallax, n. 8, [Vol. 4(3)], 1998. 81-117. 8. ^  Ettinger, Bracha,  Matrix . Halal(a) – Lapsus. Notes on Painting, 1985-1992. MOMA, Oxford, 1993. (ISBN 0-905836-81-2). Reprinted in:  Artworking 1985-1999. Edited by Piet Coessens. Ghent-Amsterdam: Ludion / Brussels: Palais des Beaux-Arts, 2000. (ISBN 90-5544-283-6) 9. ^  Ettinger, Bracha,  The Matrixial Borderspace  (essays 1994-1999), Minnesota University Press, 2006 10. ^  Pollock, Griselda, â€Å"Does Art Think? â€Å", in:  Art and Thought  Blackwell, 2003 11. ^  Ã¢â‚¬Å"Murfin, Ross C. †Ã‚  http://www. ux1. eiu. edu/~rlbeebe/what_is_feminist_criticism. pdf 12. ^  Moi, Toril, ed. French Feminist Thought. Basil Blac kwell Ltd, 1987. (ISBN 0-631-14972-4) 13.   Zajko, Vanda and Leonard, Miriam,  Laughing with Medusa. Oxford University Press, 2006 14. ^  a  b  Klages, Mary. â€Å"Helene Cixous: The Laugh of the Medusa. † 15. ^  Jones, Ann Rosalind. Feminist Studies, Vol. 7, No. 2 (Summer, 1981), pp. 247-263. Published by: Feminist Studies, Inc. http://www. jstor. org/stable/3177523 16. ^  Showalter, Elaine. â€Å"Feminist Criticism in the Wilderness. †Ã‚  The New Feminist Criticism: essays on women, literature, and theory. Elaine Showalter, ed. London: Virago, 1986. 249. 17. ^  Cixous, Helene. â€Å"The Laugh of the Medusa. †Ã‚  New French Feminisms. Elaine Marks and Isabelle de Courtivron, eds. New York: Schocken, 1981. 253. 18. ^  Barry, Peter. Beginning Theory  : An Introduction to Literary and Cultural Theory. New York: Manchester UP, 2002. 126 19. ^  Wayne A. Borody (1998) pp. 3, 5 Figuring the Phallogocentric Argument with Respect to the Classical Greek Philosophical Tradition Nebula: A Netzine of the Arts and Science, Vol. 13 (pp. 1-27) (http://kenstange. com/nebula/feat013/feat013. html) . 20. ^  a  b  Tong, Rosemarie Putnam. Feminist Thought  : A More Comprehensive Introduction. New York: Westview P, 2008. 276. 1. ^  Helene Cixous, Summer 1976. 22. ^  Klages, Mary. â€Å"Helene Cixous: ‘The Laugh of the Medusa. 23. ^  Barry, Peter. Beginning Theory  : An Introduction to Literary and Cultural Theory. New York: Manchester UP, 2002. 128. 24. ^  Murfin, Ross C. http://www. ux1. eiu. edu/~rlbeebe/what_is_feminist_criticism. pdf 25. ^  Irigaray, Luce. This Sex. 26. ^  Jones, Ann Rosalind. Fem inist Studies, Vol. 7, No. 2 (Summer, 1981), pp. 247-263. Published by: Feminist Studies, Inc. http://www. jstor. org/stable/3177523. ————————————————- [edit]External links

Friday, August 30, 2019

Causes and Prevention of Poor Health Essay

In many countries, especially the United States, behaviors leading to poor health start early in life. The three â€Å"leading causes of preventable death in the United States are smoking, obesity, and alcohol abuse† (Science Daily, 2006). Along with these problems, â€Å"a lack of exercise, drug abuse, and sexually transmitted diseases were prominent in young adults† (Science Daily, 2006). Some reasons for these problems are children and young adults spending more time inside playing video games and watching television instead of going outside to play or to participate in a sport. Often young adults are left to take care of themselves after school and during the summer vacation, and their diets tend to suffer. Smoking, alcohol use, and drug use are all glorified in movies and on television, and some young people feel that they need to copy those actions to make themselves â€Å"cool† in the eyes of others. Insufficient sexual education at home and at school contributes to disease and unwanted pregnancy. To change these behaviors, more must be done to teach children to take care of their bodies. Even a small child can be taught to enjoy good foods, at the very least in school lunches, and can be taught that playing is more fun than watching television. Because some children live in areas where outside play is limited, schools and non profit organizations should step in and offer plenty of physical education and after school activities. After school activities and school vacation programs can also help with the drug, alcohol, and smoking problems. Having good role models demonstrate clean lifestyles and teach the dangers of harmful activities may cause some children to never start them. Finally, sex education must be provided in some form before children feel the urges to become sexually active. Programs that teach young people how difficult it is to care for a child and how devastating a sexually transmitted disease can be, and in some cases how deadly they can be, need to start early and be carried through all the years of schooling. Children must be made aware of how special their bodies are, and how they can carefully tend to them to make them strong, healthy, and last for a long time. The earlier they can be taught this, the less poor health there will be in the United States.

Thursday, August 29, 2019

Hijab and Islam Essay

There are so many topics in Islam that fascinate me but the one that always inquires my desire to learn more is the topic of women and Hijab. There are many views with regard to Hijab in Islam from the Muslims themselves. The issue of Hijab can be analyzed from several perspectives. Firstly, the Islamic view on Hijab, the importance and benefits to society at large and the world view of Hijab and the women wearing Hijab living in the Western hemisphere. However, some Muslim women believe that the wearing of the Hijab is the right and the choice of the Muslim woman. They are not forced or pressured to wear a veil and they are not forced to cover their hair when they are around men that are not their Mahrrams (men that they are able to marry). Muslim women believe that Allah has ordered all females after the age of puberty to wear the Hijab and that it is an obligation from the Lord. As any other obligation in Islam such as praying five times a day, fasting in the month of Ramadan, pilgrimage to Mecca, wearing the Hijab also is compulsory on all women. There are no excuses or allowances for certain women to wear or not to wear. The issue of choice is not entertained by these Muslim feminists. Sometimes what happens is that when a woman decides to wear the Hijab, there are members in the family that disagree. The main reason for disagreeing is the fact that these family members feel that these women will be tormented in society and that they will not find a good job or husband. Little do these ignorant people know. I say to them, please have faith in the All Merciful and All Knower, he will take care of those that strive to get closer to him. Allah enjoins on His believers tasks that He knows are not beyond their capacity a nd endurance. He knows that a strong and dedicated Muslim woman will put all her effort in trying to wear the Hijab and will try and support herself in this wonderful religious act that she alone chose for the only purpose of pleasing her Lord. Every Muslim woman wearing or starting to wear the Hijab should equip herself with the right information in order to answer to inquisitive questions from non-Muslims. Often times many Muslim sisters in Islam are not properly encouraged once they begin to observe the requirements of Hijab. It may be that a sister has been obliged to wear the Hijab without truly pondering over its superiority. Perhaps she has reached the age of puberty and her Wali (guardian) has instructed her to wear it. Perhaps she has  recently reverted to the Islamic religion and her Muslim friends have informed her of the importance of Hijab or even more common is perhaps her husband has commanded her to wear Hijab. What ever the issue or reason behind this endeavor, a Muslim woman who does not truly know the superiority of Hijab will always remain jealous of the women of the Kuffar. Why? Because they see these misguided women looking beautiful for all to see. Hence, the Muslim woman then compares herself to that woman which causes her to feel ashamed of her own Hijab. Therefore, Muslim women need to encourage each other and remind each other that they are indeed beautiful and above all protected from the evil eyes of the Non-Muslims and particularly the men. These Muslim women need to remember that they are struggling but that they are beautiful and Allah will reward them in this world and also more importantly in the Hereafter. However, to the West, the Muslim women wearing Hijab, to them, is a sign of oppression. The West believes that the religion is forcing the women to lose their identity and their independence by having them cover up and dress modestly and beautifully. But we, as Muslims, say that the women are liberated and gain even more independence by wearing the Hijab and by respecting their religious duties. Women in Islam can work, study, start a business and perform or engage in any work or leisure activity while beautifully dressed in her Hijab. Therefore, Muslims don’t need pity from any one; they don’t need understanding or a should to cry on simply because they are independent, happy, strong women that chose to follow the teachings of their religion. Because of this decision, the non-Muslims should at least respect that much in these women and give them credit of being steadfast and determined. To promote the overall well being of the Muslim woman, some contemporary educators and scholars such as Qasim Amin, a pro-Western Egyptian journalist, lawyer, and politician in the last century wanted to bring Egyptian society from a state of â€Å"backwardness† into a state of â€Å"civilization† and modernity. He strongly objected to the hijab. He said that it is because of the Hijab that Muslim women are ignorant, superstitious, anemia and even premature aging of the Muslim women. He believed women should get away from this backward form of living and become modernized by removing the hijab and conforming to society at large. He  insisted as much on the woman’s right to mobility outside the home as he did on the adaptation of shar’i Islamic garb, which would leave a woman’s face and hands uncovered. Women’s domestic seclusion and the face veil, then, were primary points in Amin’s attack on what was wrong with the Egyptian social system of his time. Muhammad Abdu tried to restore the dignity to Muslim woman by way of educational and some legal reforms, the modernist blueprint of women’s Islamic rights eventually also included the right to work, vote, and stand for election-that is, full participation in public life. He separated the forever-valid-as-stipulated laws of ‘ibadat (religious observances) from the more time-specific mu’amalat (social transactions) in Qur’an and shari’a, which latter included the Hadith as one of its sources. Because modern Islamic societies differ from the seventh-century umma, time-specific laws are thus no longer literally applicable but need a fresh legal interpretation (ijtihad). What matters is to safeguard â€Å"the public good† (al-maslah al’-amma) in terms of Muslim communal morality and spirituality. Shaykh Muhammad al-Ghazali in his book Sunna Between Fiqh and Hadith said that those who claim that women’s reform is conditioned by wearing the veil are lying to God and his Prophet. He expresses the opinion that the contemptuous view of women has been passed on from the first jahiliya (the Pre-Islamic period) to the Islamic society. Al-Ghazali’s argument is that Islam has made it compulsory on women not to cover their faces during the pilgrimage and prayers, the two important pillars of Islam. If women in these two very important rituals do not cover their faces, then how is it that they are to do so for other mundane things? He went on to say that all the aspects of Islam that emphasizes that women stay home and not be part of society are the remains of the time of ignorance or ‘Asr Al-Jahiliya. Al-Ghazali says that during the time of the Prophet women were equals at home, in the mosques and on the battlefield. Today true Islam is being destroyed in the name of Islam. Another Muslim scholar, Abd al-Halim Abu Shiqa wrote a scholarly study of women in Islam entitled Tahrir al-mara’a fi ‘asr al-risalah: (The Emancipation of Women during the Time of the Prophet). In his study, Abu Shiqa agrees with al-Ghazali about the discrepancy between the status of women during the time of the Prophet Muhammad and the status  of women today. He says that Islamists have made up sayings which they attributed to the Prophet such as ‘women are lacking both intellect and religion’ and in many cases they brought sayings, which are not reliable at all and promoted them among Muslims until they became part of the Islamic culture. Abu Shiqa also commented that in many third world countries, sayings of the Prophet are fabricated in order to provide support and evidence that are important to that particular society. He argues that it is the Islamic duty of women to participate in public life and in spreading good (Sura Tauba, Aya 71). He also agrees with Zin al-Din and Ghazali that hijab was for the wives of the Prophet and that it was against Islam for women to imitate the wives of the Prophet. If women were to be totally covered, why did God ask both men and women to lower their gaze? (Sura al-Nur, Ayath 30-31). Islam is a religion that believes in fairness and justice. Islam does not only look at women as the ones that need to be protected, but Islam makes it compulsory that the men also lower their gaze when walking near Muslim women that are not their mahrams. This also enjoins on the men to respect the women and to treat them with dignity and respect. Islam’s desire is to protect women from bad situations such as female infanticide, unlimited polygamy etc and to uphold the dignity and respect for the Muslim woman. However the main purpose is to establish the equality of man and woman in the sight of God who created them both in like manner, from like substance, and gave to both the equal right to develop their own potentialities. Thus Islam is a religion that wants all the Muslims, men and women, to become free, rational people. Thus the Qur’an liberated the women from the indignity of being sex objects into persons. In turn the Qur’an asks the women that they should behave with dignity and decorum befitting a secure, Self-respecting and self-aware human being rather than an insecure female who felt that her survival depends on her ability to attract or cajole those men who were interested not in her personality but only in her sexuality. One of the verses in the Qur’an protects a woman’s fundamental rights. Aya 59 from Sura al-Ahzab reads: O Prophet! Tell Thy wives And daughters, and the Believing women, that They should cast their Outer garments over Their Persons (when outside): That they should be known (As such) and not Molested. Although this verse is directed in the first place to the Prophet’s â€Å"wives and daughters†, there is a reference also to â€Å"the  believing women† hence it is generally understood by Muslim societies as applying to all Muslim women. According to the Qur’an the reason why Muslim women should wear an outer garment when going out of their houses is so that they may be recognized as â€Å"believing† Muslim women and differentiated from streetwalkers for whom sexual harassment is an occupational hazard. The purpose of this verse was not to confine women to their houses but to make it safe for them to go about their daily business without attracting unwholesome attention. By wearing the outer garment a â€Å"believing† Muslim woman could be distinguished from the others. In societies where there is no danger of â€Å"believing† Muslim being confused with the others or in which â€Å"the outer garment† is unable to function as a mark of identification for â€Å"believing† Muslim women, the mere wearing of â€Å"the outer garment† would not fulfill the true objective of the Qur’anic decree. In conclusion, it is very clear that Islam is a religion of just, peace and fairness to all the believers. Hijab in Islam is compulsory and is required for all women after the age of puberty. It is a scarf or head gear that is a symbol of Islam but is also a symbol, to Muslim women, of independence, respect and freedom to live in any society. Islam places women on a pedestal and protects their rights and position in Islam. Women are not forced to cover nor are they second-class citizens in Islam. However, Muslims associate the hijab with all that is positive, strong and respectful.

Japan's Culture vs. United State's Culture Research Paper

Japan's Culture vs. United State's Culture - Research Paper Example In comparing the cultures of Japan and the United States, it is clear that the differences provide for very different outcomes in relationship to economy and success. The central government is involved in the success of their school systems. School systems are the same throughout the nation with moves from one region to another meaning that a child will not be in a different state of educational advancement in one place compared to another. Equity is achieved through the centralized control of the education system. Communities are not responsible for defining their own education system, but rather there is a high quality of standardization that exists though out the country (Berger, 2009). Children spend longer days, longer weeks which include Saturdays, and a longer period of the year in school. School systems are only shut down for one month out of the year. Three fourths of the children attend supplemental public school which is called juko (Berger, 2009). Japanese children routinely score higher on science and mathematics tests. One criticism, however, is that so much time is spent on rote learning that concept of meta-cognitive skills are not as well developed. Learning discipline through memorization is emphasized while thinking skills are not fully developed to the capacity that could be achieved. In 2002, the Japanese government made changes in order to create more relaxed learning in order to maximize controlled curriculum at 30% with the rest of the curriculum being devoted to teaching children how to think (Berger, 2009). Family life in Japan, therefore, is based upon the importance of the group dynamic. Georges (2009) shows that the ideal family relationship is one in which â€Å"a feeling of oneness† exists to the point that the members of the family understand one another without having to discuss anything. Contrasting to American ideas of teenage life, when polled on how much teenagers believed that their family

Wednesday, August 28, 2019

Government Contract Law Assignment Example | Topics and Well Written Essays - 1000 words

Government Contract Law - Assignment Example One of the commonest systems used to enforce the existence of propriety and fairness is the code of ethics. There is the code of ethics are enshrined in rules and regulations of companies at the local level. There are others that are put in place laws and policies such as Federal Acquisition Regulation (FAR). PrintMark Publications is the new firm specializing in publishing and printing that is seeking to investigate how the code of ethics would impact its activities and programs. Evaluating the Raytheon Code of Ethics and relating it to the publishing organization, it can be said that the codes are very effective in avoiding any conduct that may even appear to be unethical. There are two major reasons why this position is taken. In the first place, the Raytheon Code of Ethics is very universal in nature. What this means is that the code identifies all person within the organization and what they are expected to do to avoid conduct that may appear to be unethical or inappropriate. Bowie (2002) lamented that there are organizations that refuse to accept the fact that codes should cover those at the top as well as those at the bottom. Consequently, such organizations only make codes to cover those at the bottom. In such situations, chances that acts of conflict of interest will be engaged in by senior management members are higher. The Raytheon Code of Ethics, however, covers both leaders and employees. The other rationale for saying the code is effective is tha t the code has been structured in such a way that it incorporates Government Accountability Office reports and decisions. This means that adopting such code would ensure that the organization’s ethics fit into the larger public ethical expectation in publishing. As explained earlier, the clauses selected from the Raytheon Code of Ethics will solve the specific ethical issue of the unlawful use of information as has persistently existed in the publishing industry. Within the publishing industry, there seems to be a very huge ethical dilemma when it comes to the interpretation of freedom of information law. There are many who tend to think that because of the existence of the freedom to information law, they can go every extent to access information from other people. Most of the time broadcasters feel that by becoming the first to break news they would become the most preferred destinations for news by the public.  

Tuesday, August 27, 2019

Emergency Operations Centers Essay Example | Topics and Well Written Essays - 500 words

Emergency Operations Centers - Essay Example The EOC to get used to manage the flash floods in Evergreen, Colorado should be an efficient and effective facility that will get used to coordinate emergency response actions. The EOC will get used to conduct operations, meetings, and training. Due to budgetary constraints, Evergreen’s EOC will be a designated building that gets modified to an EOC during the crisis. The size and physical configuration of the EOC will be dependent on the staffing and functional requirements as well as the equipment and resources needed during the occurrence of a flash flood disaster (PEP 43). The physical design of the EOC will encompass the aspects of security, flexibility and open architecture, communications, survivability, and redundancy. The alternate location identified for the EOC will have communications equipment and back up power to ensure that operation get maintained and continued. The alternate location also gets located away from natural and man-made hazards. The Evergreen fire r escue facility can offer an alternate EOC location (Evergreen). The incident command system-ICS refers to a systematic tool that gets used to control, command, and coordinate emergency response. An ICS entails policies, facilities, procedures, personnel, and equipment that get integrated into a communal organizational structure that is designed to uplift emergency response. The ICS is structured to guide activities under five major areas; finance, command, planning, operations, and logistics. It provides an organizational structure for disaster management (FEMA 16). Using the ICS guideline policies, emergency teams and agencies may use the EOC to coordinate their disaster management plans. The ICS structure views the EOC as a resource facility that should get mobilized to mitigate the effects of the disaster. The EOC falls under the wings of the ICS in terms of a resource facility. Through the ICS policies, the Incident Commander and EOC team discuss on how

Monday, August 26, 2019

Week 3 Assignment Essay Example | Topics and Well Written Essays - 500 words - 1

Week 3 Assignment - Essay Example The book ‘Global issues in intellectual property law’ is a section of the GLOBAL ISSUES SERIES. Every book in the series has materials designed to assist the introduction of transnational, international, and comparative legal issues into courses of some schools. The aim of the series is to guarantee that every student has an adequate familiarity with the effect of non-domestic basis of law, and the increasing potential for transnational legal disputes and transactions, to work in this era of increasing globalization. Additionally, introduction of transnational, international and comparative law information can enhance a student’s comprehension of domestic law. The book is very important to this paper since it offers additional information pertaining to domestic laws on intellectual property. The book provides information on current issues in regard to intellectual property. Hansen, S., & VanFleet, J. (2003). Traditional Knowedge and Intellectual Property: A Handbook on Issues and Options for Traditional Knowledge Holders in Protecting their Intellectual Property and Maintaining Biological

Sunday, August 25, 2019

Domestic violence and human rights reserch Research Paper

Domestic violence and human rights reserch - Research Paper Example Children are likewise thought to be mishandled about as frequently as spouses. The elderly also compose an identifiable group of abuse victims whose rights are violated and neglected. Often they are targets of the frustrations of family members who are presumed to care for them. In this regard, the essay is written with the objective of presenting relevant issues about domestic abuse as a human rights violation. Likewise, the discourse would discuss proposed ways to address and possible prevent this dilemma. Definition of Terms According to UNICEF (2000), â€Å"The United Nations Declaration on the Elimination of Violence against Women (1993) defines violence against women as "any act of gender-based violence that results in, or is likely to result in, physical, sexual or psychological harm or suffering to women, including threats of such acts, coercion or arbitrary deprivation of liberty, whether occurring in public or in private life† (UNICEF, 2). The same source defines dom estic violence as â€Å"violence perpetrated by intimate partners and other family members, and manifested through: physical abuse, sexual abuse, psychological abuse, economic abuse and acts of omission† (ibid.). ... ed, fear of and control over female sexuality, belief in the inherent superiority of males, and legislation and cultural sanctions that have traditionally denied women and children an independent legal and social status† (UNICEF, 7). Situations where imposition of inequality of power towards another person deemed to possess weakness either in physical strength, educational achievement, economic status, or perceived demographic factors (age, race, culture) have increased tendencies for domestic violence. Consequences The most crucial effect of domestic violence as revealed by various studies is the denial of human rights (UNICEF, 8). Further, domestic violence creates damaging repercussions to victims in the form of physical health injuries, mental health dilemmas and even fatal outcomes, such as death or contracting HIV/AIDS. There are also socio-economic cost identified to be associated with domestic violence, such as medical costs for treatment, law enforcement costs, lower l abor productivity, and decreased quality of life (ibid, 13). Prevention Strategies Due to the delicate nature and scope of the dilemma, domestic violence should be addressed with stringent vigilance and immediate action. The hesitation to report domestic violence due to fear, lack of resources or support systems, or ignorance exacerbate the ability of community workers and government institutions to apply the necessary strategies and interventions to prevent these abusive incidences. The Study Coordinator for WHO, Dr. Claudio Garcia Moreno averred that "domestic violence can be prevented and governments and communities need to mobilize to fight this widespread public health problem" (WHO, par. 10). The fact remains that women, children and the elderly have kept their silence about domestic

Saturday, August 24, 2019

Myspace.com Essay Example | Topics and Well Written Essays - 750 words

Myspace.com - Essay Example One example Webb uses to illustrate this point regards recent news stories about sexual predators and cyber bullies whose goal is to target innocent victims. Webb suggests that users who post sexually suggestive photos and outrageous comments are attracting attention to themselves, thereby making it easier for the criminal faction to find their prey. He concludes that it is MySpace itself which is responsible for the problems outlined in the article. It is my opinion, however, that while users who ignore online safety tips when posting information on MySpace could be putting themselves in danger, this is not the fault of the social networking site itself. Actually, use of the MySpace site can be advantageous as far as encouraging communication, but users must take proper precautions in keeping certain personal information private in order that sexual predators and other criminals are not given easy means to find their victims. While many worry about Myspace as a venue for criminals, its proper usage will ensure it is not inherently dangerous. As UC Berkeley researcher Danah Boyd asserts, "It's a hyped up fear" (from Poulsen, 2). Regardless of age, Myspace users who exhibit some caution in what information they are posting online will prevent predators from easily finding them. The responsibility for exercising caution rests with the users themselves, and not Myspace. Kevin Poulsen, in his article, "Scenes From the Myspace Backlash", announces this startling statistic, "Connecticut Attorney General Richard Blumenthal announced...seven underage girls in one region of the state were fondled or had consensual sex with adult men they'd met through the site, and who had lied about their age. MySpace is a 'parent's worst nightmare'." Apparently the impetus for these crimes could be traced back to communication between online predators and the teenagers via Myspace. But is it proper to blame the website, or shoul d the blame actually lie with the users themselves Oftentimes, teenagers post personal information on their profiles, allowing the public at large access to such data as their home address, phone number, and place of employment (Wilkins). Personally, I have maintained a Myspace page for years and I would never consider it dangerous; however, this is due to the fact that I don't post personal information. My own motivation for becoming part of this online community was due more to the fact that I could find new friends and others who shared my interests. Certainly, I do not wish anyone to know my home address and show up unexpectedly at my home. MySpace has exhibited due diligence in advising users not to post real information regarding personal addresses and places of employment, etc. so that online predators are able to track them down. My profile is in accordance with the suggestions of the site and therefore I have never had concern regarding my own safety. Ultimately, it the fau lt of the teenagers themselves for using the site irresponsibly and posting information in direct contrast to the advice of Myspace managers. MySpace may be the biggest, most popular social networking site but it is not the only one. There are a whole host of other websites which market themselves as social networking

Friday, August 23, 2019

Use SOSTAC to prepare a strategy document on how Gold Reef City Assignment - 1

Use SOSTAC to prepare a strategy document on how Gold Reef City (casino) could take the Rewards Programme from a functional experience to an emotional experience - Assignment Example A lot of time and resources go into running a business. Casinos, in particular, are a very tricky business to venture into because they require constant scrutiny, and if the owners are not cautious enough, the business may go bankrupt. Individuals frequent casinos to enjoy themselves while at the same time trying to make some money. Gambling is the primary activity that occurs within casinos and has brought both good and bad fortunes to the people who frequent casinos. Numerous numbers of people have lost billions of dollars in these casinos while quite a number of people have gained wealth from casinos. Some unscrupulous dealers operate some casinos and fleece their customers of their hard-earned money. It is, therefore, important that the authorities investigate these casinos for malpractice and fraud. The Gold Reef City Casino has to conduct a situation analysis before it can commence its operations. A situation analysis is a collection of methods that the organizations management uses to analyze its influences to better understand the organization`s capabilities, business environment and customers. A situation analysis consists of two areas namely micro and macroeconomics. Microeconomics refers to the study of business and individual decisions while macroeconomics refers to the study of higher decision makers, for example, the government. Macroeconomics looks at the external forces and factors that affect the business. The Gold Reef City casino has also conducted a situation analysis, and the recommendations were divided into two categories Micro and macroeconomics. The microeconomics include the new developments and upgrades that are well underway and the soon to be completed. The casino has invested in a new gaming area that is expected to bring in more customers and consequently more revenue. The incorporation of a new gaming system, which has

Thursday, August 22, 2019

Educational and Cultural Experience Essay Example for Free

Educational and Cultural Experience Essay In research undertaking the methodology section is one of the crucial areas to be tackled in a proposal document. This is due to the fact that it forms the basis of the results of research findings. A research can be faced with big challenges due to a wrong choice of the method to be used. To avoid this good planning of the method is essential and more in order to get reliable results. The issue of reliability establishes that a research should have the ability to show consistency in the results even after a study is done by different researchers repeatedly. Reliability in research study can also be enhanced through good structure of the methodology. When the correct data collection methods are used, proportional samples are collected and the correct method of analysis is used in a research can achieve validity. In a research, the research problem forms the basis of research (Morgan et al. ,1980), and this is where the study should focus on. The methodology can take on either the positivist approach also known as the quantitative, or take the post positivist approach also known as the qualitative approach. The qualitative approach is a more detailed than the quantitative approach as it lays more emphasis on the finer details of the data and in most cases, it involves a researcher’s judgment and interpretation. Quantitative approach deals more with quantification like calculating the population sample, population size among others. The choice of the researcher on either the qualitative or the quantitative approach depends on whether the research/study is inclined to the natural sciences or the social sciences (Finch, 1986); (Easterby-Smith et al. 1991). 3. 1 Role of the Researcher The role of the researcher is an integral part of the evaluative process in the qualitative research. I am a certified teacher of mathematics, music and elementary education. Prior to the classroom, more than ten years were spent in insurance investigative claims work. The occupation included extensive ‘on-the-job’ training in organization, communication and interviewing skills. I was also deployed to Kuwait and Afghanistan, respectively, and have over 15 years in the United States military acquiring certain proficiency as a planner, liaison, administrator and human resource specialist. Co-operative inquiry involves at least four different kinds of epistemology; in other words, ways of knowing. Presentational knowing results from experiential knowing and provides the first form of expression through narratives and various expressions of art. Presentational knowing is expressed through ideas and theories. Practical knowing is modeling how to do something and is portrayed in a skill or competence. These epistemologies are compatible with each other. If knowing is grounded in experience, expressed through stories and images, understood through sounds ideas, and expressed in worthwhile action in one’s life, then knowing will be ‘more valid’ (Reason, 1999). 3. 2 Research Design To appropriately analyze the participant’s stories, the research will employ a narrative framework that serves as a screen through which the story of the participant may be examined. This method also becomes an avenue for which the participant may critically reflect on his own perspectives in order to construct or reconstruct meaning in his own life world. The considerable narrative analysis approach requires a level of scholarship and sensitivity which I am preparing to employ. This approach involves a human science observer that is a sensitive of the subtleties of everyday life. Ardent reading of relevant texts of the humanities, history, philosophy, anthropology and the social sciences as they pertain to the domain of interest is a main ingredient to the effectiveness of this proposed research (van Manen, 1990). For this study, the researcher actively participates in examining the experiences of a translator in the delivery of translation of language and culture amidst the socio-political challenges of the past. Qualitative research is exploratory in nature and is best suited for understanding phenomena. The approach should remain pragmatic for the researcher in order to remain in a tentative state with regard to applicable variables or desirable themes which may enable appropriate examination of the individual’s experiences. 3. 3 Data Collection Methods During my 12 month deployment as a liaison officer, I commenced amicable communication with each of the translators who accompanied me to the daily meetings. During my tenure, I engaged in many open discussions concerning cultural and social differences, nuances in communication and language disparities. After a few months, I presented some of my proposal ideas and opened discussion to the possibility of participation in a study I was contemplating. Several of the translators asked me to serve as their advocate in order to petition for the United States Special Visa. So, over the last year, many of these translators have since relocated to various communities in the United States. Both secondary and primary data sources will be used. The triangulation method of data collection will involve the use of interviews, literature review and case studies (Zikmund 2003, pp. 1-745). The primary data method that was used is the questionnaire method of data collection. Questionnaires were distributed among the Afghan officials, Liaison officers, and interpreters. There were also case studies that were conducted for other three countries to know about the experiences of interpreters in the other countries compare with the ones in Afghanistan. This also drew an insight of the various experiences of interpreters in other countries. There was the use of literature review in order gather information on the educational and cultural experiences of interpreters generally. The literature in this research included research journals, books, articles and sources from university libraries (Dick, 2000). Interviews also form pertinent component data collection methods. This enabled the getting of a clear picture of the plight and livelihood of Afghan interpreter, their mode of operations, factors affecting them and future predictions on their cultural and educational experiences. The four categories of quality management in research were highly considered. They include; validity, reliability, ethics and rigor (Zikmund, 2003). Reliability of a research is its ability to have consistence in results. This was done through controlling the sample by stratifying the population to get a more representative sample. Validity is the ability of a scale to measure what it is intended to measure but not going beyond the topic of the study. The triangulation method was used to control this aspect in research. Ethics involves adherence to the norms accepted in gathering of information. This was ensured by providing secrecy on the information collected from the subjects. The rigor of the research was directed towards efficient sample size in a critical facet in any investigation. The main purpose a researcher will utilize a sample is to reduce the charges and collect important data faster (Zikmund, 2003). The key purpose of data collection was to ensure a rich set of description was obtained. To achieve this, the interviews were transcribed in real time by the interviewer. The responses were then reduced and analyzed by adopting principles of data codification and clustering (Miles et al, 1994). 3. 4 Sources Researches normally rely on secondary data to enable them gain initial insight into the research problem. The classification of secondary sources of information is on the basis of internal or external sources referring to information acquired within the organization or outside the organization. The secondary sources are liked for their cost saving aspects and time saving. Secondary sources of information are supposed to be searched prior to conducting primary research, and usually for the literature review section of a research. This is because secondary information provides useful background that identifies main questions and all other issues that will need to be tackled by the primary research (Steppingstones, 2004). The disadvantages that are associated with the use of the secondary sources range from the unavailability of pertinent information on the research topic, to the integrity, accuracy, and reliability of some secondary sources. Other disadvantages associated with secondary sources arise where data is available in a format other than that required by a researcher, and the age of the information particularly where the information is several years old and may not reflect the present circumstances. This makes it necessary to limit secondary information to sources which are not more than six years old (Steppingstones, 2004). The data gathered for this research is from a wide range of documentary sources relating to the cultural and educational experiences of interpreters in general as well as those specifically relating to the plight and livelihood of the Afghan interpreters. These mainly included policy documents, academic and the non-academic documents. First, journals on livelihood of Afghan interpreters were searched. Second, electronic databases were searched using key words like ‘interpreters’, ‘translators’ ‘Afghan interpreters’ and ‘experiences of Afghan interpreters’. Third, Afghan government website for International communication and the website for the International Security Assistance Force were searched. Literature review included both conceptual and empirical works with about 25 articles reviewed for this study. 3. 5 Interviews Interviews in a research are useful in getting information behind a participant’s experiences. This is particularly important because an interviewer may be able to pursue in-depth information regarding the topic of study, and also the fact that interviews serve as follow-ups to responses obtained from questionnaires. Qualitative research interview should seek to give a description and meaning of central themes regarding the experiences of the subjects, by seeking to cover both the factual and meaning level. It was important that a guided interview approach was adopted so as to ensure that same general areas of information are gathered from each interviewee (Valenzuela et al. , 2004). The interviews dwelt on the following areas: †¢ Educational and cultural background of interpreters. †¢ The relationship between educational background and cultural background of the afghan interpreters. †¢ How the educational and cultural backgrounds shape the livelihood and experiences of the afghan interpreters. †¢ What the future hold for the afghan interpreters and their plight given the limited educational background as well as the rigid cultural backgrounds. Once the data is collected through the open-ended interview process, the documents will be transcribed. After transcription, to ensure a correct analysis of the data, the participant will be shown the transcription and asked if what is written is aligned with their viewpoints. The data will then be analyzed from the transcription. Qualitative research is exploratory in nature and is best suited for understanding phenomena. The approach should remain pragmatic for the researcher in order to remain in a tentative state with regard to applicable variables or desirable themes which may enable appropriate examination of the individual’s experiences.

Wednesday, August 21, 2019

Stereotypes prejudice Essay Example for Free

Stereotypes prejudice Essay Please complete the following exercises, remembering that you are in an academic setting and should remain unbiased, considerate, and professional when completing this worksheet. Part I Select three of the identity categories below and name or describe at least 3 related stereotypes for each: ?Race ?Ethnicity ?Religion ?Gender ?Sexual orientation ?Age ?Disability Category Stereotype 1 Stereotype 2 Stereotype 3 Disability People think disability is a sickness People think they are a mence to others and society Disabled people are different and are not fully human. Gender Female role of taking care of the kids Male role of being the breadwinner androgyny, which is the blending of feminine and masculine attributes in the same individual. Age Ageism Senile or Demented Unproductive and uncreative Part II Answer each question in 50 to 100 words related to those stereotypes. Provide citations for all the sources you use. ?What are the positive aspects of stereotypes, if any? Some aspects of stereotyping can be GOOD, BUT I HAVE YET TO SEE ANY THAT I WOULD CONSIDER GOOD. STEREOTYPING IS A WAY FOR US TO CATERGORIZE A PERSON OR GROUP INTO SOMETHING WE CAN NOT FEEL BAD FOR NOT LIKING. ?What are the negative aspects of stereotypes? Negative aspects of stereotyping play a big Copyright  © 2012 by University of Phoenix. All rights reserved. Stereotypes and Prejudice Worksheet ETH/125 Version 8 2 ROLE ON A PERSON. STEROTYPING PEOPLE IN A NEGATIVE MANNER HAS A LASTING DETRIMENTAL IMPACT ON THOSE WHO EXPERIENCE THE PREJUDICE. PEOPLE PERFORM POORLY IN SITUATIONS WHERE THEY FEEL THEY ARE BEING STEREOTYPED. Part III Answer each question in 50 to 150 words related to those stereotypes. Provide citations for all the sources you use. ?Define stereotypes and prejudice. What is the difference between stereotyping and prejudice? Use examples to illustrate the differences. ?A stereotype is a belief about a certain group of people. Prejudice is a feeling about a person based on their membership in a group. Both stereotypes and prejudice can be either positive or negative. Discrimination is an action that denies the rights of a person due to their membership in a group. ?What is the relationship between stereotyping and prejudice? Prejudice- ignorantly judging based on[stereotypes] pre conceptions. Pre- Judging someone before having the knowledge of who they are. Ex. I have a prejudice towards all teenaged mothers, because I assume they all slept around to get pregnant, because thats what my sister did. ( which doesnt make every ones situation the same. stereotypes- classifying groups of people based on race, gender, religion, creed, ethnicity, etc. Then believing all people who belong to that group are the same Ex: All homeless people arent educated. Iggnorance is what is the realtionship between the two of them. People being ignorant and making assumptions is found in both prejudice and sterotypes. ?What can be done to prevent prejudice from occurring? Here are some examples that I think would help with preventing prejudice. It may not stop it all together, but it would help the situations from being uncomfortable. . Celebrate holidays with extended family. Use such opportunities to encourage storytelling and share personal experiences across generations. Invite friends from backgrounds different from your own to experience the joy of your traditions and customs. Be mindful of your language; avoid stereotypical remarks and challenge those made by others. Speak out against jokes and slurs that target people or groups. Silence sends a message that you are in agreement. It is not enough to refuse to laugh. Copyright  © 2012 by University of Phoenix. All rights reserved. Stereotypes and Prejudice Worksheet ETH/125 Version 8 3 Copyright  © 2012 by University of Phoenix. All rights reserved.

Analytical Techniques for DNA Extraction

Analytical Techniques for DNA Extraction Development of DNA sensors for highly sensitive detection of sequence specific DNA has become crucial due to their extensive applications in clinical diagnosis, pathogen detection, gene expression studies, and environmental monitoring.ref Along with complementary base-pair hybridization between long oligonucleotide for DNA detection, several DNA sensors employ short oligonucleotide (à ¢Ã¢â‚¬ °Ã‚ ¤10 base pair) to this goal. Ref Easley and co-workers constructed the electrochemical proximity assay (ECPA) for highly sensitive and highly selective quantitative detection of protein, where target-induced DNA hybridization between 5, 7, or 10 complementary base system brings redox tag close to the sensor surface resulting direct electrochemical readout. To date, numerous analytical techniques have been established for DNA detection, such as electrochemistry, fluorescence, surface plasmon resonance, chemiluminiscence, quartz crystal microbalance and so on. Ref Among these methods, electrochemical DNA (E-DNA) sensors have attracted much attention owing to their reliability, simplicity, rapid response, low cost and portability, low sample consumption, ability to work in complex-multicomponent samples and remarkably high sensitivity and selectivity.ref The basic principle of E-DNA sensor is based on immobilization of single stranded DNA probe, a selective biological recognition element, on a sensor surface followed by incubation with sample containing the target biomolecules. When a target-induced molecular recognition event (hybridization) takes place the sensor translates that to a measurable electrochemical signal which is directly correlated to the target concentration. In recent years, numerous research groups have studied the perf ormance of these sensors by investigating the effect of immobilized probe structure and probe surface density, nature of the redox reporter used, target length, ionic strength of buffer and modifying the frequency of the square-wave voltammetry employed. ref Nevertheless, distance dependence of the redox tag relative to the electrode surface to achieve maximum signal has never been explored. As solid-phase hybridization is very distinct from that in solution-phase in terms of kinetics and thermodynamics, ref sensor performance may be sensitive to the location of the redox reporter because surface charge would likely alter the hybridization rate of negatively charged DNA which, in turn, alters the signaling properties of E-DNA sensors. Especially for short oligonucleotide (à ¢Ã¢â‚¬ °Ã‚ ¤10 base pair) hybridization near surface the effect may lead to very à ¢Ã¢â€š ¬Ã‚ ¦ due to their low binding energy which is not sufficient to overcomeà ¢Ã¢â€š ¬Ã‚ ¦. Here, we describe a detailed s tudy of the extent to which the location of the redox reporter can be varied to achieve maximum signal within shorter response time in effort to design efficient E-DNA sensors with improved sensitivity. Prior to this work, these electrochemical DNA (E-DNA) and electrochemical, aptamer based (E-AB) sensors have been reported against specific DNA and RNA sequences,2 proteins,3,4 small molecules,5-7 and inorganic ions.8,9 Because all of the sensing components in the E-DNA/EAB platform are covalently attached to the interrogating electrode, the approach requires neither exogenous reagents nor labeling of the target. Likewise, because their signaling is linked to specific, binding-induced changes in the dynamics of the probe DNA (rather than changes in adsorbed mass, charge, etc.), these sensors function well when challenged with complex, contaminant-ridden samples such as blood serum, soil extracts, and foodstuffs.5,7,9,10 These attributes render the E-DNA/E-AB platform an appealing approach for the specific detection of oligonucleotides and other targets that bind DNA or RNA.11-13 In the above methods, electrochemical biosensors are much popular because of their simple instrumentation setup, low sample and reagent consumption as well as high sensitivity and selectivity (Wenetal.,2012; Lu etal.,2012; Wenetal.,2011; Farjamietal.,2011; Xia etal.,2010; Xiang andLu, 2012; Pei etal.,2011; Farjamietal.,2013; Liu etal.,2013b). Electrochemical methods,1,11 being simple, portable and low-cost, are particularly attractive for DNA detection.12à ¢Ã‹â€ Ã¢â‚¬â„¢16 Electrochemical methods have been used extensively in DNA detection assays, as summarized in recent review articles.15,16 Among these protocols, the electrochemical biosensors have attracted particular attention in different fields owing to its small dimensions, easy operation, rapid response, low cost, high sensitivity and selectivity [10,11]. Among these techniques, the electrochemical techniques have received great interests owing to its superior characteristics of rapid response, low-cost, small-size, simple operation, and good selectivity [13-16]. Among these approaches, electrochemical methods have been shown to be superior over the other existing measurement systems,11 because electrochemical transduction possesses a potential allowing the development of rapid, simple, low-cost, and portable devices.12-14 As an alternative to conventional techniques, electrochemical DNA biosensors have attracted considerable interest owing to their intrinsic advantages, including good portability, fast response, and remarkably high sensitivity (Sun etal.,2010). More importantly, a number of DNA biosensors have been developed and extensively applied for the determination of biomarkers (Huang etal.,2014). Microfabrication technology has enabled the development of electrochemical DNA biosensors with the capacity for sensitive and sequence-specific detection of nucleic acids.1-5 The ability of electrochemical sensors to directly identify nucleic acids in complex mixtures is a significant advantage over approaches such as polymerase chain reaction (PCR) that require target purification and amplification. Electrochemical DNA sensors are reliable, fast, simple, and cost- effective devices that convert the hybridization occurring on an electrode surface into an electrical signal by means of direct or indirect methods. the electrochemical DNA (E-DNA) sensor is one of them. This sensor platform, the electrochemical equivalent of optical molecular beacons, exhibits notable sensitivity, specificity and operational convenience whilst also being fully electronic, reusable and able to work in complex, contaminant-rich samples [4-6]. Compared with other transducers, electrochemical ones received particular interest due to a rapid detection and great sensitivity. Combining the characteristics of DNA probes with the capacity of direct and label-free electrochemical detection represents an attractive solution in many different fields of application, such as rapid monitoring of pollutant agents or metals in the environment, investigation and evaluation of DNA-drug interaction mechanisms, detection of DNA base damage in clinical diagnosis, or detection of specific DNA sequences in human, viral, and bacterial nucleic acids [2-8]. The determination using electrochemical biosensor methods has attracted much interest because of their simple instrumentation, high specificity, sensitivity, rapid, and is inexpensive with potential for applications in molecular sensing devices. Amongst the electrochemical transducers, carbon electrodes such as glassy carbon, carbon fibre, graphite, or carbon black exhibit several unique properties. Recent engineering advances have enabled the development of electrochemical DNA biosensors with molecular diagnostic capabilities (2, 8, 18, 33, 47). Electrochemical DNA biosensors offer several advantages compared to alternative molecular detection approaches, including the ability to analyze complex body fluids, high sensitivity, compatibility with microfabrication technology, a low power requirement, and compact instrumentation compatible with portable devices (18, 48). Electrochemical DNA sensors consist of a recognition layer containing oligonucleotide probes and an electrochemical signal transducer. A well-established electrochemical DNA sensor strategy involves sandwich hybridization of target nucleic acids by capture and detector probes (5, 7, 46, 50). First reported in 2003, electrochemical DNA (E-DNA) biosensors are reagentless, single-step sensors comprised of a redox-reporter-modified nucleic acid probe attached to an interrogating electrode.1 Originally used for the detection of DNA2à ¢Ã‹â€ Ã¢â‚¬â„¢9 and RNA10 targets, the platform has since been expanded to the detection of a wide range of small molecules,11,12 inorganic ions,13,14 and proteins,12,15à ¢Ã‹â€ Ã¢â‚¬â„¢17 including antibodies,18,19 via the introduction of aptamers and nucleic-acid-small molecule and nucleic-acid-peptide conjugates as recognition elements (reviewed in refs 20 and 21). Irrespective of their specific target, all of these sensors are predicated on a common mechanism: binding alters the efficiency with which the attached redox reporter approaches the electrode due to either the steric bulk of the target or the changes in the conformation of the probe.1,12,18 Given this mechanism, these sensors are quantitative, single-step (washfree), and selective enough to perform well even in complex clinical samples.12,15 They are likewise supported on micrometer- scale electrodes22 and require only inexpensive, handheld driving electronics (analogous to the home glucose meter23), suggesting they are well suited to applications at the point-of-care. Among these, the electrochemical detection of DNA hybridization appears promising due to its rapid response time, low cost, and suitability for mass production.11,12 The E-DNA sensor,13-16 which is the electrochemical equivalent of an optical molecular beacon,17-20 appears to be a particularly promising approach to oligonucleotide detection because it is rapid, reagentless, and operationally convenient.21,22 The E-DNA sensor is comprised of a redox-modified stemloop probe that is immobilized on the surface of a gold electrode via self-assembled monolayer chemistry. In the absence of a target, the stem-loop holds the redox moiety in proximity to the electrode, producing a large Faradic current. Upon target hybridization, the stem is broken and the redox moiety moves away from the electrode surface. This produces a readily measurable reduction in current that can be related to the presence and concentration of the target sequence. Both E-DNA sensors13-16 and related sensors based on th e binding-induced folding of DNA aptamers23-28 have been extensively studied in recent years. Nevertheless, key issues in their fabrication and use have not yet been explored in detail. Electrochemical biosensors, combining the sensitivity of electroanalytical methods with the inherent bio-selectivity of the biological component, have found extensive application in diverse fields because of their high sensitivity with relatively simple and low-cost measurement systems.1 For example, by assembling artful target-responsive DNA architectures on the electrode surface, a series of electrochemical bioanalysis methods have been proposed for the sensing of specific biomarkers, such as DNA and proteins.2-5 The typical sensing schemes of these designs involve the immobilization of an efficient probe on the electrode surface, incubation with target biomolecules, and measurement of the output electrochemical signal.6,7 A wide variety of nanomaterials including metal nanoparticles, oxide nanoparticles, quantum dots, carbon nanotubes, graphene and even hybrid nanomaterials have found attractive application in electrochemical biosensing, such as detection of DNA, proteins and pathogens and the design of biological nanodevices (bacteria/cells).14,15 Electrochemical transducers offer broad opportunities in DNA sensor design due to simple experiment protocols, inexpensive and mostly commercially available equipment. Among various detection methods, the electrochemical approach attracted much attention due to its rapidness, low cost, high sensitivity and compatibility with portability [10,11]. The E-DNA sensor [12,13], an electrochemical method derived from the optical molecular beacon[14,15], is particularly promising because it is reagentlessness andoperation convenience. In brief, the E-DNA sensor is composed of a redox-modified hairpin-like stem-loop DNA probe that is immobilized on the electrode surface. Without a target, the stem-loop structure holds the redox probe close to the electrode surface, pro-ducing a large current. Upon hybridization with a target, the stem is opened and the redox label moves away from the electrode surface and the current is decreased. This current change is directly related to the target DNA concentration. Many different versions of the E-DNA sensor have been reported to date [7-9]. A popular construct of this type of sensors is a folding-based E-DNA sensor comprised of a redox-labeled DNA stem-loop probe covalently attached to a gold disk electrode. In the absence of a target, the stem-loop conformation holds the redox label in close proximity to the electrode, facilitating electron transfer. In the presence of and binding to a complementary DNA target, hybridization forces the redox tag farther from the electrode, impeding electron transfer and producing an observable reduction in redox current [4-6]. In this approach, a single-stranded DNA (ssDNA) probe is immobilized on a surface and exposed to a sample containing the specific complementary target sequence, which is captured by forming a double-stranded DNA(dsDNA) molecule. This recognition event (hybridization) is then transduced into a readable signal. In this strategy, the target is anchored to the sensor surface by the capture probe and detected by hybridization with a detector probe linked to a reporter function. Detector probes coupled to oxidoreductase reporter enzymes allow amperometric detection of redox signals by the sensor electrodes (28, 34). When a fixed potential is applied between the working and reference electrodes, enzyme-catalyzed redox activity is detected as a measurable electrical current (11, 16, 27). The current amplitude is a direct reflection of the number of target-probe-reporter enzyme complexes anchored to the sensor surface. Because the initial step in the electrochemical detection strategy is nucleic acid hybridization rather than enzyme-based target amplification, electrochemical sensors are able to directly detect target nucleic acids in clinical specimens, an advantage over nucleic acid amplification techniques, such as PCR. Electrochemical methods are typically inexpensive and rapid methods that allow distinct analytes to be detected in a highly sensitive and selective manner [22-25]. Although electrochemical DNA sensors exploit a range of distinct chemistries, they all take advantage of the nanoscale interactions among the target present in solution, the recognition layer, and the solid electrode surface. This has led to the development of simple signal transducers for the electrochemical detection of DNA hybridization by using an inexpensive analyzer. DNA hybridization can be detected electrochemically by using various strategies that exploit the electrochemistry of the redox reaction of reporters [26] and enzymes immobilized onto an electrode surface [27], direct or catalytic oxidation of DNA bases [28-31], electrochemistry of nanoparticles [32-35], conducting polymers (CPs) [35-37], and quantum dots [38]. E-DNA sensors, the electrochemical analog of optical molecular beacons [e.g.,1-4], are based on the hybridization-induced folding of an electrode-bound, redox-tagged DNA probe. In their original implementation, the concentration of a target oligonucleotide is recorded when it hybridizes to a stem-loop DNA probe, leading to the formation of a rigid, double stranded duplex that sequesters the redox tag from the interrogating electrode [1]. Follow-on E-DNA architectures have dispensed with the stem-loop probe in favor of linear probes, leading to improved binding thermodynamics and, thus, improved gain [5], as well as strand-invasion, hairpin and pseudoknot probes producing signal-on sensors [6-8]. Because E-DNA sensors are reagentless, electronic (electrochemical) and highly selective (they perform well even when challenged directly in complex, multicomponent samples such as blood serum or soil) [e.g., 9], E-DNA sensors appear to be a promising and appealing approach for the sequence-s pecific detection of DNA and RNA [see, e.g., 10,11]. E-DNA signaling arises due to hybridization-linked changes in the rate, and thus efficiency, with which the redox moiety collides with the electrode and transfers electrons. To design efficient DNA-electrochemical biosensors, it is essential to know the structure and to understand the electrochemical characteristics of DNA molecules. Motivated by the potential advantages of the E-DNA sensing platform, numerous research groups have explored their fabrication and optimization over the past decade. Specifically, efforts have been made to improve the platforms signal gain (change in signal upon the addition of saturating target) by optimizing the frequency of the square-wave potential rampemployed,11 the density with which the target-recognizing probes packed onto the electrode,11,24 probe structure,25 the redox reporter employed,26 and the nature of the monolayer coating the electrode.25 Contributing to these studies, we describe here a more comprehensive study of the extent to which the square-wave voltammetric approach itself can be optimized to achieve maximum signal gain. Specifically, we have investigated the effect of varying the square-wave frequency, amplitude, and potential step-size on the gain of E-DNA sensors, evaluating each parameter as a function of the others as well as of the structure of the E-DNA probe, its packing density, the nature of its redox-reporter, and the monolayer chemistry used to coat the sensing electrode. E-DNA sensors are a reagentless, electrochemical oligonucleotide sensing platform based on a redox-tag modified, electrode-bound probe DNA. Because E-DNA signaling is linked to hybridization-linked changes in the dynamics of this probe, sensor performance is likely dependent on the nature of the self-assembled monolayer coating the electrode. We have investigated this question by characterizing the gain, specificity, response time and shelf-life of E-DNA sensors fabricated using a range of co-adsorbates, including both charged and neutral alkane thiols. The signaling mechanism of E-DNA sensors is linked to a bindingspecific change in the flexibility of the redox-tagged probe; upon hybridization, the relatively rigid target/probe duplex hampers the collision of the electrochemical tag thus decreasing the observable amperometric signal [5,12]. This, in turn, suggests that E-DNA signaling may be sensitive to changes in surface chemistry which, due to surface charge and steric bulk effects, would likely alter the dynamics of a negatively charged DNA probe. However, despite rapid growth in the E-DNA literature [reviewed in 13] the extent to which surface chemistry affects E-DNA signaling has not been established; all previous E-DNA sensors were fabricated using hydroxyl-terminated alkane thiol self-assembled monolayers (SAMs) [e.g.,1,3,5,7,9]. Here we address this question and describe a study of E-DNA sensors fabricated using co-adsorbates of various lengths and charges in an effort to further optimize E-DNA performance. For example, while it is likely that the signaling properties of these sensors depend sensitively on the density of immobilized probe DNA molecules on the sensor surface (measured in molecules of probe per square centimeter) [see, e.g., refs 5 and 29-36], no systematic study of this effect has been reported. Similarly, while it appears that the size of the target and the location of the recognition element within the target sequence affect signal suppression,24 this effect, too, has seen relatively little study. Here we detail the effects of probe surface density, target length, and other aspects of molecular crowding on the signaling properties, specificity, and response time of the E-DNA sensor. However, the sensitivity is one of the most important limiting factors for the development of electrochemical DNA biosensors.

Tuesday, August 20, 2019

The Moonstone Essay :: essays research papers

The Moonstone Essay The Moonstone, written in 1868 by Wilkie Collins is a mystery novel about a gem called "The Moonstone". The moonstone is somewhat a symbol of what everyone strives for, beauty and power. In the book, justice plays a huge role in terms of doing what is fair and morally right through action and attitude. Although the moonstone is overbearingly beautiful and breathtaking, like all beautiful things, it has a history "..that crime brings its own fatality with it" (Ch. IV). With such great beauty, the moonstone almost takes power and control over people, making them act out in such ways just to get their hands on it. The Moonstone does not come from England. Herncastle, the uncle of Rachel Verinder steals the gem while in battle. Before Herncastle takes possession of the Moonstone, the stone has already passed through the hands of a number posseors. During the first narrative, the gem is explained as a symbol of wealth and power that no man should ever possess, even though so many wish to get their hands on it. And with such demands for people to stay away from it, lures all to want it crave even more. In a way, the moonstone symbolized the conquering that Herncastle did while in India, allowing the moonstone to almost become a trophy of his doings. This is not just at all, it was known that the invasion on India was to make them less barbaric, when in reality, what the English were doing to India was forcing their beliefs and culture on them, in an obviously not mannerable way. "... "the shrine of Hindoo pilgrimage, and the wonder of the eastern world" (Ch. II of the prologue ). The moonstone was rightfully a part of India that was stolen after Herncastle kills many people, a trophy for murder has to carry some consequences with it, and so; it did. After his death, Herncastle leaves the moonstone,aware of the seriousness of the stone, to his niece Rachel Verinder to get back at the family that excluded him. He puts it in the hands of Mr.Franklin Blake to deliver the stone to Rachel. When Mr. Blake arrives at the Verinder house, there were words about Indiains that were disguising themselves as jugglers and magicians in order to try and get information on the whereabouts of the moonstone in hopes of getting it back and returning it to it's rightfully owners, the Indians themselves.

Monday, August 19, 2019

John D. Rockefeller: Turning Obsessive-Compulsive Disorder Into Success :: Biography Biographies Essays

John D. Rockefeller: Turning Obsessive-Compulsive Disorder Into Success John D. Rockefeller, the Standard Oil magnate who, by the time of his death in 1937, was probably worth close to a billion dollars, is perhaps one of the best historical examples of an obsessive-compulsive. An obsessive-compulsive is one who is driven to an act or acts, generally being asocial. By his own fixations and by nature of his peculiar psyche he must balance these actions with others more socially acceptable. There are abundant examples of Rockefeller's deeds fitting these clinical characteristics, and John D. Rockefeller is today generally regarded as an obsessive-compulsive. The roots of this disorder are traceable back to his childhood. While much of Rockefeller's business history remains a mystery today, it is apparent that much of his success is attributable to his obsessive-compulsive disorder. Franz Alexander and Louis B. Shapiro's description of the obsessive- compulsive disorder from their book Neuroses, Behavior Disorders, and Perversions0 is a frequently used summary of the commonly agreed-upon characteristics. It states: "Full blown cases of obsessive-compulsive states present a dynamic equilibrium in which obsessive preoccupation with ego-alien fantasies... are precariously balanced by rituals representing an exaggeration of social standards, such as cleanliness, punctuality, consideration for others. The dynamic formula is similar to bookkeeping in which on the one side of ledger are the asocial tendencies which the patient tries to balance precisely on the other side with moralistic and social attitudes... Every asocial move must be undone by an opposing one..." The term "ego-alien" refers to thoughts, emotions or material which are consciously detestable to the patient (though not he may not necessarily be conscious of the reason). This summary is important, and we will return to it later. Rockefeller was born in 1839 and raised in a troubled, then broken, home. His father, who sold quack "quick-heal" ailment medicines, was often away for months at a time. Rockefeller was raised essentially by his mother. Eventually his father consummated a bigamous marriage with a teenage Canadian and left Rockefeller and his mother and siblings. At an early age, it became apparent that young John was not quite like the other children. For instance, he adamantly refused to play with other children unless he could choose the game. In almost every description of him as a child, he is often described as "thinking". He married Laura Celestia Spelman, a girl who was strikingly similar to his mother, which is never a good sign; and when he decided to go into business, he borrowed $1000 from his father- at ten percent interest.

Sunday, August 18, 2019

The Black Cat: A Comparison Between The Movie And The Book :: essays research papers

The Black Cat: A Comparison Between The Movie and The Book   Ã‚  Ã‚  Ã‚  Ã‚  There are major differences between the film we saw in class and The Black Cat by Edgar Allen Poe. The film had added effects to get the viewer's attention. The film also let out important parts that were in the short story. The short story gave the reader a better background for character analysis. Although the story was much more enticing because the reader knew the main character better.   Ã‚  Ã‚  Ã‚  Ã‚  In the short story the man(abusive husband) is described as a loving and caring husband, who is very fond of animals. He describes to the reader how his obsession with alcohol is like a disease. He gets more irritable everyday because his cravings for alcohol become greater and greater. He was often physically abusive to his wife. One night the man came home very drunk and violent so Pluto(the black cat) scratched him out of fear. then the man lost his temper and cut out the cat's eye with his penknife. One morning the man hanged the cat from a tree limb with a noose around its neck. That night his house burnt to the ground. In the morning he found a petrified white cat with a rope around its neck in the charred remains. A few days later the man saw a black cat with a white chest and he liked it so much he let the cat follow him home. The cat made itself at home but the man avoided it because of a sense of shame for his former deed. The next day the man noticed that the cat was missing an eye just as Pluto. His wife pointed out that the white spot on its chest resembled the Gallows! The cat made the man trip in his basement one day. So he picked up an ax to kill the cat, and his wife stepped in the way and he put the ax through her brains. The man decided to hide the body and the cat behind a bricked up wall in the basement. The police came and looked at everything. Just before they left, they heard a noise from the basement wall. So they tore the bricks down. Thus they discovered the body and the black cat.   Ã‚  Ã‚  Ã‚  Ã‚  The film hints that the man was once a loving and caring husband. The wife told her husband he was not the same man she married. The film shows how the alcohol made the man abuse his wife for more drinking money. There is no The Black Cat: A Comparison Between The Movie And The Book :: essays research papers The Black Cat: A Comparison Between The Movie and The Book   Ã‚  Ã‚  Ã‚  Ã‚  There are major differences between the film we saw in class and The Black Cat by Edgar Allen Poe. The film had added effects to get the viewer's attention. The film also let out important parts that were in the short story. The short story gave the reader a better background for character analysis. Although the story was much more enticing because the reader knew the main character better.   Ã‚  Ã‚  Ã‚  Ã‚  In the short story the man(abusive husband) is described as a loving and caring husband, who is very fond of animals. He describes to the reader how his obsession with alcohol is like a disease. He gets more irritable everyday because his cravings for alcohol become greater and greater. He was often physically abusive to his wife. One night the man came home very drunk and violent so Pluto(the black cat) scratched him out of fear. then the man lost his temper and cut out the cat's eye with his penknife. One morning the man hanged the cat from a tree limb with a noose around its neck. That night his house burnt to the ground. In the morning he found a petrified white cat with a rope around its neck in the charred remains. A few days later the man saw a black cat with a white chest and he liked it so much he let the cat follow him home. The cat made itself at home but the man avoided it because of a sense of shame for his former deed. The next day the man noticed that the cat was missing an eye just as Pluto. His wife pointed out that the white spot on its chest resembled the Gallows! The cat made the man trip in his basement one day. So he picked up an ax to kill the cat, and his wife stepped in the way and he put the ax through her brains. The man decided to hide the body and the cat behind a bricked up wall in the basement. The police came and looked at everything. Just before they left, they heard a noise from the basement wall. So they tore the bricks down. Thus they discovered the body and the black cat.   Ã‚  Ã‚  Ã‚  Ã‚  The film hints that the man was once a loving and caring husband. The wife told her husband he was not the same man she married. The film shows how the alcohol made the man abuse his wife for more drinking money. There is no

Saturday, August 17, 2019

Audit Proposal Essay

There are many different types of audits including internal, external, and information technology. Companies should be familiar with the types of audits that may possibly be used on an Accounting Information System (AIS). Knowing the different types of audits and where they are used will help a company be ready for an audit and make the process much smoother. There are some circumstances where auditing through a computer is not always beneficial. Auditors want to make sure they are completing their audits fully and appropriately to the best of their abilities. Types of audits used for each process Attestation, SAS 70, SAS 94, and Findings and Recommendations are four main types of Information Technology (IT) audits. If Kudler wants the auditor to provide assurance for each part of the system, an attestation audit could be used. An attestation audit can assist Kudler by issuing reports on examinations, reviews, or agreed-upon procedures. An attestation audit can provide Kudler with independent assurance on the reliability or validity of information related to the four systems under review (KPMG, 2011). A Findings and Recommendations audit can provide Kudler with other information about each system. This kind of audit includes the following: system implementations, security reviews, database application reviews, project management, IT infrastructure, and IT internal audit services. If Kudler chooses to use the Findings and Recommendations audit, this type will not produce an opinion, only a summary of the audit for each of the systems (Hunton, Bryant, & Bagranoff, 2004). An SAS 70 audit is to provide assurance about the effectiveness and existence of the company’s internal controls around a service provided to others. Kudler is not a service  provider. However, Kudler does transmit data to the Electronic Payment Clearing House for automatic submission of the credit card transactions to the applicable financial institutions. An SAS 70 could be beneficial because it is a way to prove that adequate controls are in place to protect the consumer through e-commerce. SAS 94 audits are performed with a financial statement audit and focus on the client’s AIS. It addresses the effect of IT on internal controls in a financial statement audit. Kudler will need a much broader assessment than an SAS 94. Most appropriate audit for each process There are many routes to perform an IT audit. This audit is internal and will look at both Information Technology General Controls (ITGC) and Application Controls. Specifically, the audit will focus on these categories: systems and applications, information processing facilities, management of IT and enterprise architecture, client/server, telecommunications, and intranets/extranets. The audit style will be via Findings and Recommendations as management will have to consider recommendations and the ultimate decision to make changes according to priority and budget. The audit will verify the systems and applications for efficiency and controls to ensure validity, integrity, and security of data and transactions. Kudler will need the completion of an audit on information processing facilities to assess physical conditions of the main housing units and the offsite locations to support the company’s Disaster Recovery Plan (DRP). This type of audit will evaluate the organizational structure and procedures to ensure that an efficient, controlled environment is in place. These relate to any telecommunication controls between client and server, the entire network, and any servers communicating eternally including firewalls. Auditors will assess two types of controls: security controls and access controls. Each of these types should include all three sub-controls: preventive, detective, and corrective. The AIS has an imperative need for controls to address any risks that may exist for every process and transaction. Security access controls are in place to protect data from being stolen, lost, or damaged. Access controls protect data from being released to non-authorized users, hackers, and other intruders. How the audits are conducted Kudler will conduct an information system audit by examining and evaluating  their present hardware and software. They will also examine their IT controls, systems security, risk management, and the adequacy of their current systems. They can carry out their marketing audit by evaluating the effectiveness of their marketing program and examining its capabilities. It will evaluate their functions in respect to their goals, mission, vision, and their values of Kudler, which is done externally. Kudler will examine their faculty, and their deficiencies will be identified. Another suggestion is equipment be audited, the maintenance, and an examination to determine if it’s being operated at the designed levels, safety set-up, security, and access issues. Their audit will be done by an external auditor who will examine their accounts, vouchers to support, financial information tests, evaluation of their financial statements, and also examine the internal control and make comments f or improvements. Events that prevent reliance on auditing through the computer Using computer-based accounting systems does have its disadvantages, such as certain laws pertaining to confidentiality, the requirement to protect against the loss of data through power failures, the infection of viruses, and the abundance of opportunities for hackers to steal data. Computer fraud is also a major worry; the need to initiate internal controls for all those who have access to the business’s information, particularly confidential customer information. An event that Kudler may run into with the need of stronger controls is a security breach, which entails stolen data. Kudler management can be held liable for the loss of personal customer data (University of Phoenix Virtual Organization Portal, 2013). Another event is a computer-based system with feeble controls over the data input procedures and processing, this requires the need for more thorough testing of financial transactions. The incorrect input of data can not only cause misrepresentation of financial statements in the form of incorrect asset valuations but because a mistake in data entry will give Kudler false analytical data such as sales and inventory. Lastly, an auditor will have to assume that auditing through the use of their computer-based method that their CPU and other hardware are operating properly (Bargnoff, N.A., Simkin, M.G, & Strand, C., 2008). Conclusion It is important for companies to stay positive throughout the audit process. There are many different audit processes such as Attestation, SAS70, and  SAS94 which are all effective audit strategies that may be used when auditing the company. Companies being audited should be familiar with these audit processes as well as how the audits are conducted to ensure that the process will be as smooth and stress free as possible. References Bargnoff, N.A., Simkin, M.G, & Strand, C. (2008). Core Concepts of Accounting Information Systems (10th ed.). The KPMG Survey of Corporate Responsibility Reporting 2013. 2014 KPMG International Cooperative. Retrieved July 10, 2013 from: http://www.kpmg.com/global/en/issuesandinsights/articlespublications/corporate-responsibility University of Phoenix Virtual Organization (2013). Kudler Fine Foods Intranet. Retrieved from: https://ecampus.phoenix.edu/secure/aapd/CIST/VOP/Business/Kudler2/intranet/index.asp

Friday, August 16, 2019

Historical and Current Issues Going on Between North and South Sudan in Africa

Historical and Current issues going on between North and South Sudan in Africa Sudan and South Sudan have signed a â€Å"non-aggression† pact over their disputed border following talks in Addis Ababa where African Union-led negotiations between the two sides are being held. The deal was signed by Thomas Douth, the head of South Sudan's intelligence bureau, and Mohammed Atta, Sudan's director of national intelligence and security. The two countries agree to non-aggression and co-operation,† Thabo Mbeki, the chief negotiator and former president of South Africa, told reporters on Friday. According to the pact, the two sides agreed â€Å"respect for each other's sovereignty and territorial integrity† and to â€Å"refrain from launching any attack, including bombardment†. The countries' disputes center on four issues: demarcation of the oil and mineral rich disputed border between the two countries, the price the South will pay the north to move southern oil through the northern pipeline to Port Sudan for shipment, surreptitious support by both governments of rebellious groups in each other's territories, and final implementation of provisions of the two countries' peace agreement to resolve peacefully the governance of Blue Nile Province, the Nuba Mountains, and the Abyei region. Nearly two years have passed since the governments of Sudan and South Sudan started negotiations. The negotiation teams first met in July 2010 to sign the guiding principles for South Sudan’s referendum and secession process; however, progress has been slow. Today this stalled negotiation process threatens the peace and stability of the two Sudans and the region at large. Therefore, its successful conclusion should be a priority for both governments and the greater international community. The outbreak of violence in South Kordofan in June 2011, and in Blue Nile in September 2011, has undermined the already tenuous security environment and blocked progress on critical outstanding negotiation issues. The conflicts in South Kordofan and Blue Nile are central to the negotiation process. The Government of Sudan has called for South Sudan to stop its alleged support of the Sudan People's Liberation Movement-North, or SPLM-N, and for security to be established along their contested border. The north-south border area has been militarized for several years; this ominous military buildup by both countries brings them one step closer to war. A year ago the Southern government stopped all oil production about 70 percent of historic Sudan's known oil reserves are in the South when it discovered the Khartoum government was diverting oil, selling it on the spot market, and taking all of the revenue.

Volcano

The evaporating of harmful gases, earthquakes, and some evidences from the manhole are the manifestations showed that an underground volcano was forming under the city. This means that there was already lava under the city and the ground cannot take the pressure anymore so it formed a volcano. The physical changes in the movie are the breaking of glasses from buildings, breaking of buildings, cracking of the ground, boiling of water from the pond, injured people, the melting of metal, and the falling down of some properties. The chemical changes are the burning of trees and people, formation of the volcano and its eruption, the ashfall, and the lava turning to rocks when mixed with water. These changes are driven by some factors in the environment such as the formation of gases underground, and the eruption of the volcano. The eruption affected the place by destroying buildings and properties, injuring people, loss of lives, and the panicking and crying of the citizens. I learned that we should always be alert, caring, trustworthy, and we should have teamwork and cooperation. We should be alert so that when disasters like this happen to our community, we’ll know what to do and we can evacuate safely. We should be trustworthy so that other people will believe us and we should trust one another. We should be caring and concerned to each other and other people. In disasters like this, we can do small heroic acts which can save lives of millions of people that means very big to them. We should do heroic acts not because we want to be recognized but because it came from our heart. Last but not the least, we should have teamwork and cooperation so that problems can be solved quickly and we can aim for success.