Wednesday, July 31, 2019

Role of Insurnce in development and growth of economy

Economists have demonstrated that economic growth and insurance development are interdependent nd that a world without insurance would be much less developed and much less stable. How Insurance Sector promotes Economic Development Insurance including insurance brokers promote economic development through various channels: Insurance reduces the waste of country and brings a market confidence. Insurance reduces the capital firms need to operate. Insurance fosters Investment and innovation by creating an environment of greater certainty.Insurers are solid partners for the development of a workable supplementary system of social protection, In particular In the field of retirement and health provision. As institutional investors, insurers contribute to the modernisation of financial markets and facilitate firms' access to capital. Insurance promotes sensible risk-management measures through the price mechanism and other methods and contributes to responsible and sustainable economic deve lopment. Insurance fosters stable consumption throughout the consumers life.It will be more worth to describe that there are three (3) important pillars of any economy that provide and facilitate an economy with immense contribution like employment opportunities, major tax contributions and growth In GDP. However there are also other areas which will be worth appreciated by mentioning here but it will deviate us from our prime objective of explaining role of Insurance broking sectors. However, the three (3) Important pillars are Banks, Joint Stock Companies and Insurance companies.Moreover, In a global economy characterised by rapid social and demographic change and by the emergence of new risks (e. g. by climate change or technological developments) and new needs (health care, pensions), cooperation between private insurance and public institutions is essential. This cooperation can ring benefits in many fields, for example, health of the working population, accident prevention, co mpensation for agricultural risks, international trade (export credit insurance), etc.How Insurance sector fosters Economic Growth The insurance industry promotes economic growth and structural development through the following channels: Providing broader insurance coverage directly to firms, Improving their financial soundness. Fostering entrepreneurial attitudes, encouraging Investment, Innovation, market dynamism and competition. Offering social protection alongside the state, releasing pressure on public sector finance. Enhancing financial intermediation, creating liquidity and mobilizing savings.As channel them towards investment opportunities, facilitating companies' access to capital. Promoting sensible risk management by households and firms, contributing to sustainable and responsible development. Fostering stable consumption throughout life. Conclusion The role at Macro level: (1) To secure economic stability. (2) To safeguard economic and fiscal sustainability. (3) To pro mote a growth- and employment-orientated and efficient allocation of resources.

Monday, July 29, 2019

Business Practices of Woolworths and Wesfarmers

The Australian retail industry is dominated by big game players. There is no chance of a small retail brand to ever grow and prosper in the retail market of Australia. The big brands dominate the entire market with their ‘House products', the products labeled under their brand and exclusively available in their stores only (Gas price regulation for a retail market administrator 2004). The Australian retail market constitutes liquor sales, tobacco, and grocery retail. The big players dominate 60 per cent of the Retail trade, 50 percent of the tobacco trade and 80 per cent of Liquor and vintage alcohol sales. The promotion of their in-house products can be devastating for generic brands. The supermarket brands downgrade and run campaigns against generic brands. The supermarket brands have a huge impact on the flow of liquid cash from the hands of the wealthy to the poor segments. The supermarket brands have also been associated with the tag of highest growing grocery prices in th e entire world. The first brand that we have selected for this study and discussion is Woolworths and Wesfarmers. The brand has been dominating the retail trade since its inception. The Coles supermarket brand is owned by Woolworths and Wesfarmers. The Coles has the largest number of grocery retail outlets in entire Australia (Sinapuelas and Robinson 2008). This brand is a common name that we come across each and every day, but we do not pause to think and ponder about the downfall of the economy that this company and its counterparts have brought to our nation. This segment of the industry is dominated by the cash rich and big names who have been major players since their inception. The companies like Coles offer high degrees of resistance to small details and their products by motivating the customers to buy only their products. The second company we have selected for our discussion regarding its ethical pursuance of business is Metcash (AÃ…Â ¾man and GomiÃ… ¡Ãƒâ€žÃ‚ ek 2012). Metcash is a company which operates in the distribution and whole selling of grocery and retail. Besides, Metcash operates in the Automotive and luxury car servicing segment. The company has invested time and effort in agreeing to the policy of good packing and has been playing a key role in up keeping the deals made at the Australian Packaging Covenant signatory. The company has made an excellent reputation in the way they package their product. The company has been an outstanding player in upgrading themselves and their way of packaging to a level of utmost importance. The importance they give for their packaging of the product plays a key role for the customer at the final moment of the choice of buying is made. The company has been involved in many overseas trade agreements with many third world nations (Supply chain technologies – at Woolworths 2003). The commitments have been made regarding direct cooperation to technical knowledge transfer and consultation. The involvements in Bangladesh and Vietnam for direct purchase of their country made cotton and other products. The Uzbek Cotton commitment is one such agreement, the company ahs signed for a direct role in involvement and cooperation. Apart from this; the company has earned the ranking of 67.4 % from the Greenweek rankings. The score is an overall reflection of the environmental commitments and implementation that the company has been engaged in. The Woolworths and Wesfarmers have the largest number of poker machines in Australia. The company earns huge revenue from the sale of chips and gambling (Prospectus for the 1 for 8 Entitlement Offer of approximately 89 million New Wesfarmers Ordinary Shares at an Offer Price of $29.00 per New Wesfarmers Ordinary Share to raise approximately $2.57 billion 2008). The company has been accused many times of robbing the money of its countries' citizens by luring them to earn some money. The customers have complained that they always fail to win money. The company has earned a lot from the sale of poker chips country full. It's time the company makes some effort to stop robbing the people of their hard earned money by stopping these poker centers, and allowing only visitors of other nations to engage in this gambling activity.   The Australian legislature can also make some notable changes to stop this trade of poker and gambling. The Nepal government has restrictions in place which bars its countrymen and women from the casinos spread all over the city. The locals are allowed only on the New Years Eve, Christmas and other special days (Prus 2004). The casinos in Nepal are major revenue generators but only at the expense of foreigners. The Australian legislature may take heed of the matter. The company has been criticized by industry experts and public forums for misleading the customers on many matters.   The act of negatively influencing the customers has a significant disadvantage for the company and its brand perception. The company often urges the customers in their supermarkets to buy their particular products. This act affects the companies offering generic products or own products a significant loss of revenue and client base. The company has also been fined regarding the above matter. The company we must say has not yet learned to form its mistakes, and continue to embark on its current trend of misleading the consumers. The Coles have been criticized and fined huge amounts by the competent authorities for misconduct and bad behavior towards its customers. The company has had a reputation of mistreating its employees and customers on the premises and various grounds. There have been police investigations on many matters. The company has also been charged with a fine for anticompetitive product and conduct. There might be individual rivalries among many business groups, but the company has been fined for negative conduct. The company earns huge revenue from the direct sale of tobacco and alcohol. The company owned and operated about two-thirds of the total alcohol sales (Paynter and Edwards 2009). The negative health impact the company creates by promoting its alcohol sales and tobacco usage is very harmful to the overall growth and health of the society. This brand has also been getting awards consistently on its good packaging practices. The quality of the packaging has been lauded to be pretty good. The company is also a principal signatory of the Australian Packaging Covenant (Ahmed 2009). That marks the company to strictly adhering to its good packaging practices. The company signed the deal promising to supply packaging which is healthy for the customer’s yet environmental friendly when disposed of as garbage.   The company promotes the use of GE-free products in its retail lineup. The company has been using the GE free products before any company in the entire industry. The company believes in the goodness of the GE free products in edible items. The company bagged the Packaging Award of 2015 for the healthiest and safest packaging in all of their products. The company policy of Genetically Modified crops or products is quite satisfactory (Clow and Baack 2004). The companies’ commitment to the cause of the environment is also well known. The company must embark on a strategy of sustainable progress and development. The company cannot succeed in the long term without implementing the policies of the sustainable business. The aspects of the business which make the industry comment on the negative aspects of Metcash’s business practices are related to gaming. The causes of significant revenue for the company apparently come from the gambling industry. The company relies heavily on its gambling trade for its generation of major revenue annually. The trade is a major hit among the countries citizens. But the trade heavily drains out money from the pockets of the poor and middle class. The company owned and operated major casinos all over Australia. The citizens must not only be discouraged from gambling, but these broad casinos must be closed urgently (Revenue 2005). The downfall of the economy can be attributed by some to gambling and massive spending. The company also accounts for almost major tobacco trade. The company has been tremendously criticized for its direct involvement in tobacco and alcohol promotion. The company portrays the image of alcoholism and gambling along with smoking tobacco as a positive aspect of this culture, except that in reality it's not. The company is involved in the grocery. The company sources its palm oil from unreliable and uncertified sources. The palm oil cultivations in Indonesia and Java, Sumatra are done by burning forest tracts and cultivating on them. The lungs of South Asia, which are the tropical rainforests of these countries suck out significant carbon dioxide and greenhouse gasses (Jope 2012). The clearing of these forests for the cultivation of palm trees is harmful to the environment. Moreover, where palm trees are planted, the soil is rendered ineffective for any advancement in future times. The company must stop these unsustainable business practices at the earliest or must face destruction (Saharjo et al. 2006). The company cannot survive with all these negative criticism in the long run. The company must embark on the strategies of free trade and must promote competitive behavior among its contemporaries. It is high time, the company is made to realize this, and amend on its mistakes or it may suffer massive losses regarding the brand value and public perception. Ahmed, A. (2009). Good manufacturing practices.  ISBT Science Series, 4(1), pp.6-10. AÃ…Â ¾man, S. and GomiÃ… ¡Ãƒâ€žÃ‚ ek, B. (2012). Asymmetric and Nonlinear Impact of Attribute-Level Performance on Overall Customer Satisfaction in the Context of Car Servicing of Four European Automotive Brands in Slovenia.  Organizacija, 45(2). Clow, K. and Baack, D. (2004).  Integrated advertising, promotion & marketing communications. Upper Saddle River, N.J.: Pearson Prentice Hall. Gas price regulation for a retail market administrator. (2004). Adelaide: Essential Services Commission of South Australia. Jope, J. (2012). Special Edition: International Palm Oil Sustainability Conference 2012 Abstracts.  Palm Scent, 3(6), pp.51-74. Paynter, J. and Edwards, R. (2009). The impact of tobacco promotion at the point of sale: A systematic review.  Nicotine & Tobacco Research, 11(1), pp.25-35. Prospectus for the 1 for 8 Entitlement Offer of approximately 89 million New Wesfarmers Ordinary Shares at an Offer Price of $29.00 per New Wesfarmers Ordinary Share to raise approximately $2.57 billion. (2008). Perth, W.A.: Wesfarmers. Prus, R. (2004). Gambling as activity: Subcultural life-worlds, personal intrigues and persistent involvements 1.  Journal of Gambling Issues, 10. Revenue. (2005). Kuala Lumpur: Lembaga Piawaian Perakaunan Malaysia. Saharjo, B., Sudo, S., Yonemura, S. and Tsuruta, H. (2006). Greenhouse gasses produced during burning in the land preparation area using fire in peat area belong to the community.  Forest Ecology and Management, 234, p.S247. Sinapuelas, I. and Robinson, W. (2008). Entry for supermarket feature me-too brands: An empirical explanation of incidence and timing.  Marketing Letters, 20(2), pp.183-196. Supply chain technologies – at Woolworths. (2003).  Work Study, 52(1).

Sunday, July 28, 2019

Price Discrimination Essay Example | Topics and Well Written Essays - 1500 words

Price Discrimination - Essay Example According to the research findings, customers can benefit from research and development as a result of increased revenue that companies earn. In the service industry, some of the customers will benefit from the low price on off-peak time and the firms will benefit on the peak time due to high prices on services and products. Some of the firms will increase revenues and be able to be a going concern in business and even expand.According to the research findings, customers can benefit from research and development as a result of increased revenue that companies earn. In the service industry, some of the customers will benefit from the low price on off-peak time and the firms will benefit on the peak time due to high prices on services and products. Some of the firms will increase revenues and be able to be a going concern in business and even expand.Price discrimination may attract administrative cost when engaging in market segmentation and predatory pricing may be funded by the profi ts gained . Since P>MC, some of the higher prices charge may be allocated inefficiently to the unintended consumer. Some of the customers may be charged high prices. The high prices may be unintended for the rich but the poor may end up also paying that high price (Patel, 2012). In conclusion, the rationale of price discrimination on shelves in supermarkets would be influenced by the type, the strategies used in pricing and the methods that influence price discrimination. Products that are placed at the top of the shelves will have a different price to those at eye level and bottom shelves. Price elasticity of demand also influences the products placed on the shelves as those products place at eye level to have more demand at relatively cheaper prices. Also, certain reasons would influence price discrimination in a monopolistic market such as, service that involves specialization or professionalism and geographical distance. Lack of availability of information also has an impact on price discrimination.

Structure of Society and Social Policy Essay Example | Topics and Well Written Essays - 1000 words

Structure of Society and Social Policy - Essay Example The relevance of this trait to programs for the elderly is that the high percentage of young people shifts government policy priorities away from the needs of older persons (Schulz, 2005). Creating new jobs for young people is much more of a state problem than meeting the service needs of older people. Government attention in health care is also more focused on reducing infant mortality rates than in developing geriatric medical care. The family is the social unit with primary responsibility for the care. This is consistent with social, cultural, and religious mores. Although reliance on the family to care for elderly members has subsided in recent years, for reasons discussed later, there is a pervasive understanding that government policy should be designed to bolster the role of family care (LaVeist, 2002). Low class people often incur higher out-of-pocket costs for medical care and have fewer choices among health care providers. Theoretically critics accepts this to result in fewer health care contacts, far fewer of the routine examinations that are so important for early detection of potential problems, and greater delay in seeking care when ill. Research has found this to be true (Schulz, 2005). Considering the ultimate cost of poor health, it is also uneconomic. The issue of poverty, a major contributing factor to poor health and one that impacts more severely on poor people, is simply too far beyond our purview to treat here. However, it bears remarking that some of the recommendations, in fact, poverty reduction measures. For example, policies that would lead to a reduction in drug and alcohol abuse would also lead to a reduction in poverty, for just as substance abuse is partly a result of poverty, so is it also partly a cause. Even more effective as poverty reduction devices ar e policy proposals yet to appear. Although their primary purpose is to relieve other problems, measures such as family planning services, teen pregnancy prevention programs, parent training classes, infant stimulation programs and early childhood education all attack poverty at its roots. Good education and high paid job leads to social mobility and allows a person to maintain high standards of living and receive better medical help (Schulz, 2005). 2. Social class determines the level of medical care and dietary patterns available for people. Life span has long been the thermometer used to measure the health of the public. Only in this case, assuming quality of life is maintained, elevation indicates better health. We have come to expect greater longevity as one of the benefits of continued economic development. A fall in life expectancies is cause for alarm. Fortunately, this has happened only rarely. Poverty makes it more difficult to lead a healthy life. Shelter and diet may be inadequate. Neighborhood air quality may be poor. Life is generally more stressful. Few people consciously choose to live a life of poverty, but people can and do make unhealthy lifestyle choices. People who are poor and less educated tend to make them more often, perhaps because of lesser understanding of the possible consequences (Schulz, 2005). More likely it is because some of those choices provide considerable utility, particularly in the very sh ort run and particularly to persons whose long-run expectations are low. Poor nutrition can be deadly (LaVeist, 2002). The traditional diet,

Saturday, July 27, 2019

A comparison between the Japanese kimono and Chinese robe Research Paper

A comparison between the Japanese kimono and Chinese robe - Research Paper Example Dress materials and designs are the best indicators of the history of a particular region. It holds absolutely true when we say that by looking at the texture, designs, pattern and also the color of the dress material that was worn, one could easily decipher the culture of the people who wore it and also get to the know their way of life in general. Japanese kimono and Chinese robes have been brought into comparison as they resemble each other to a very great extent. There seems to be a cultural link between that of Japan and China which could be deciphered from their clothing. Japanese kimono and Chinese robes looks similar yet comes with their own uniqueness.The kimono came into being in the fifth century. A kimono robe is the typical sign of the Asian cultures. The garment has its long history entrenched in the hearts of the Japanese and Chinese culture. Later, the garment was made more contemporary to include kimono robes that are fundamentally all one size for both men and women . While silk kimonos are traditional garments in Japan, Chinese have Cheongsam as their traditional Chinese garment (Garrett, 1998). Both of these garments are very old and carry with it a long lost historical angle to it. Kimono, a piece of clothing, is not just a form of dressing among the Japanese but is also a clear-cut manifestation of how the Japanese history has evolved over time. The style of Kimono has been altered from one age to that of another and it has undergone changes throughout its history and has finally attained a form today. Goldstein-Gidoni (1997, p. 35) comments â€Å"The word kimono used in contemporary Japanese refers to the modern kimono, which â€Å"stems from the decorative festive clothing worn on special occasions† The inception time of the Kimono dates back to the time in Japan history pointed out as a specific period. That specific period is the Jomon period (Said, 1995). Kimono was in the form of a piece of clothing that was loosely draped ove r the body of the wearer. Those times, people did not pay much of attention to clothing as their major activity was to go for hunt and assembling. It was between the year 300 and 550 AD, Kimono dress patterns went for a change. Now the influence of the Chinese culture over the Japanese can be seen and the Kimono dress became a two-piece cloth. The arrival and the settlement of the Chinese in Japan brought about a huge change in their dressing patterns. Kimono was made in white color that was taken from the silk worm. Figure 2: Chinese White Women’

Friday, July 26, 2019

Addressing an Ethical Issue Assignment Example | Topics and Well Written Essays - 750 words

Addressing an Ethical Issue - Assignment Example During preparation of food products, it is vital that strong partnership is formed by all the parties in the production process. In this way, it will be possible for the parties to detect any issue that may result to ailment or even fatalities. A major ethical issue that faces Walmart is lack of adherence to food safety. Despite being a company that has diversified product portfolio, Walmart safety arrangements are not being upheld an aspect that is used by the competitors to face off Walmart in the market. The violations that are common in the company include expired food products, lack of proper use of sanitary cleaning equipments, and cross contamination among others. It is vital to note that despite the organization objective to increase the sales, Walmart should not do so at the expense of the consumer’s safety and health. Thus, the company should ensure that it maintains maximum safety for its products. Although it is the role of the management to ensure that the safety measures are followed by the employees among other stakeholders. Workers involved in handling, preparation and storage must ensure that they adopt food safety measures as outlined by the company policies (Unnevehr,  2003). In this way, the company will have put in place effective strategies to prevent their consumers from becoming ill. As indicated by World Trade Organization, firms dealing with food products should emulate four key strategies. First, they should prevent harming food products with pathogens spreading. Secondly, to prevent sullying the cooked products cooked and uncooked sustenance should be separated. Thirdly, a suitable life span with proper temperatures should be accorded during the cooking process to reduce the risks of pathogens. Fourthly, food should be properly stored using appropriate temperatures. A notable decision making model that I will adopt to deal with the issue of food safety is the ethics PLUS decision making model. According to this model, the firm

Thursday, July 25, 2019

Channel marketing Essay Example | Topics and Well Written Essays - 500 words

Channel marketing - Essay Example Nevertheless, this paper will assesses the service outputs supply of Wal-Mart and Costco in the food section, hence identify what the firms offers and their structures. Wal-Mart and Costco purchase products from manufactures and producers in large quantities and they are gradually broken down as they reach the consumers. The products of high value are squeezed in to small volumes, since it is cost effective to ship to end-customers compared to the cost of shipping a bulkier product (Perner, 1). Convenience has been identified as a significant factor used to influence the consumer food choices, by Wal-Mart and Costco, since they have changed ways in which the nature of products are provided in grocery stores, and the time consumed to prepare a meal. Wal-Mart focuses on responding to the demand by offering more in-store delis and ready to eat prepared foods such as chicken, salad and sushi, while Costco has introduced an increased selection of frozen and prepared meals for consumers seeking a quick meal from their grocery stores. Wal-Mart has made a substantial investment in information technology and logistics, which facilitates commitment in taking a risk of placing large orders in advance of customer, needs in order to focus on the reducing the waiting time and delivery time. On the other hand, Costco has developed an efficient distribution system, which is based on its information system and enormous demand, though they have short channels for perishable products. Moreover, Wal-Mart and Costco have to incur additional costs in order to ensure that merchandise is distributed quickly. Wal-Mart and Costco consolidate goods by carrying a wide assortment of goods from different manufactures to provide a breadth of assortment, whereby their stores carry different kinds of food from different suppliers. In this case, this makes

Wednesday, July 24, 2019

Why it is important for you to develop the philosophical mindset Essay

Why it is important for you to develop the philosophical mindset - Essay Example This is because those with the philosophical mindset not only evaluate claims, but arguments given to support claims. In this sense, philosophy has practical value for our everyday life. Many perceive philosophy as only having direct application within the university, where students contemplate the thoughts of long-dead intellectuals. But given the necessity of critical thinking and rational skepticism in all areas of life, including business, science, and politics, it seems philosophy is directly applicable to almost any kind of situation. Developing a philosophical mindset, however, is not limited to simply studying and doing well in philosophy courses. Rather, it is a matter of cultivating a general approach to life. Necessary to this general approach to life is having reasons (or empirical evidence) to support one’s knowledge and beliefs. To hold basic assumptions or opinions without evidence or without thought is the easiest way to base a life on

Tuesday, July 23, 2019

BLUE STEEL Essay Example | Topics and Well Written Essays - 1000 words

BLUE STEEL - Essay Example As Turner fights for her badge and cases helped by Detective Nick, she is trying to imagine her relationship with a murder. She decides to spend the night with Mann when she watches her best friend killed. Turner hunts for the killer and after a long confrontation and wounds that she manages to kill Hunt. There are many themes and lessons throughout this file as discussed below. Bullet with her the name of Megan is one most revealed theme in the movie. Eugene recreates the supermarket scene, terms the gun as a lucky object, and puts it in use. Hunt engraves Turner’s name on the bullets, which Hunt uses to kill his victims. If Hunt had no reason for this act then his acts are psycho behaviors yet the blue steel glory sequence connected Megan’s body with her gun’s blue steel. Megan is associated with the killings when Eugene assigns her name on the bullets used in the killings (Tasker, 1998). The film’s exchange of sexuality as illustrated Mann describes a m an cut off his penis in a cab by a prostitute and not her wife. This story reveals the construction of women’s role in men’s affairs when the man’s penis was misplaced. In the story where the hooker has a needle ever ready and skills of sewing reveals the womanly trope of intertwining and male wish for tamed whore. Passing back and onwards of someone’s penis shows the suitable and unsuitable use of phallic power. Exchange of guns at the start of the film connected to the back and forth at the end of the film. Both passing of bullets and penis represents the issue of inaccessible economies operating between both male and female and the care both genders ought to have for their phalluses. Hunt pisses off when he sees a woman shooting a man in the supermarket. Hunt finds in Turner a beautiful person who is able to serve a public violence and this is which is a form of over-recognition. This strange recognition shows the reliance of yuppie devil for his indiv iduality. Such psychotic characters as constructed towards gender of feminine heroes are evident in the film. As the film starts, Megan kills a man on her first day in job and a customer who is already troubled before the shooting started pockets the man’s gun. Curtis’ social life starts when Silver plans for a date but she does not suspect why he is up to her. Another scene is created when Curtis and her father leaves home when Silver comes whose characters are intelligent and sets things up such that Curtis is seen as the killer herself (Freud, 1995). Blue steel is a thriller that has a shock and afterwards a surprise. One feels dumb after moving through the scenes of the film. For instance, Megan meets unexpected horrors by Strode and sexually abused in a brutal rape and made a device of sexual bias and rejected by the whole society. Megan is a new cop and helps prevent theft in a store by shooting assailant who were armed. After the killings, since a customer pocke ted the gun of the assailant killed and therefore Megan is in trouble because the department terms him as unarmed person. Her department disowns her for killing innocent man and Hunt starts killing people in the streets with the bullets engraved with Megan’s name. Movies like this that indulge the psychology, provide more reasons on murderer’s behavior of anti-sociality. In addition, before Megan and Eugene had sex, Eugene asks her to take away the gun

Information About Strategic Teaching, Strategic Learning and Thinking Skills Essay Example for Free

Information About Strategic Teaching, Strategic Learning and Thinking Skills Essay Teachers, whether brand new to the classroom, or veterans of many years of service, are always looking for ways to make what they do more effective and more efficient. That even goes for students in teacher preparation programs, as well it should. Efficiency is a measure of what is obtained (results) in relation to what was expended (resources). Effectiveness is a bit more elusive. To be sure, effectiveness in anything, including teaching, can be difficult to describe and to measure. The following is a discussion about some fundamental principles that may lead to actual improvement of instruction. Please read on. In order to use any instructional technique effectively, anyone who teaches must, of necessity, understand the fundamental principles and assumptions upon which the specific technique is based. There is certainly no shortage of descriptions or labels for activities that may be classified as pertaining to instruction. From the ever-popular lecture method to complex student-teacher, student-student interactions, instruction encompasses a broad range of teacher behaviors. At one end (the lecture method) the teacher is an imparter of information, and the students are the intended recipients of the information the teacher imparts. At the other end of the range of teacher behaviors are methods in which teachers interact with students in vastly more complex ways. Most researchers and experts in the field are in agreement that the most permanent and meaningful learning takes place at this end of the range. Strategic teaching, and, concomitantly, strategic learning are techniques in which significant student-teacher interaction and resultant learning and thinking are at the high end of the scale. To learn strategic teaching techniques, and to foster the ability of students to engage in strategic learning, it is important to define some terms. In fact, one of the principles of strategic teaching is to define terms. Below are terms that are relevant to this process. Strategic teaching describes instructional processes that focus directly on fostering student thinking, but goes well beyond that. Strategic teaching and strategic learning are inexorably linked. A strategic teacher has an understanding of the variables of instruction and is aware of the cognitive requirements of learning. In such an awareness, comes a sense of timing and a style of management. The strategic teacher is one who: 1. s a thinker and decision maker; 2. possesses a rich knowledge base; 3. is a modeler and a mediator of instruction. Variables of instruction refer to those factors that strategic teachers consider in order to develop instruction. These variables, as the name implies, change, and therefore the teacher must be aware of the nature of change as well as the actual variables themselves. These variables are: 1. characteristics of the learner; 2. material to be learned (curriculum content); 3. the criterial task (the goals and outcomes the teacher and learner designate); 4. earning strategies (goal directed activities in which learners engage). In teaching content at the elementary, middle, or secondary level, the strategic teacher helps guide instruction by focusing on learning strategies that foster thinking skills in relation to the content. In connecting new information to what a student already knows, learning becomes more meaningful, and not simply retained for test-taking purposes. There are numerous strategies that teachers can develop that accomplish this purpose. To give one information is not difficult, but to help one be able to develop the tools to both know what information is relevant and the means to acquire it, is perhaps the most important function of any social studies teacher. There are numerous techniques for engaging students in thinking about content. Besides thinking skills, there are such practical matters as how best to present a lesson on weather, teaching map and globe skills, helping students work together in groups, how to question effectively, and how to answer student questions. The first and foremost criterion is that the teacher thoroughly know the content, the second criterion is that the teacher have a set of rules for classroom management that are understood and implemented, and the third criterion is that the teacher have the resourcefulness and knowledge to rehearse unfamiliar techniques, and more importantly, have the capacity to adjust any lesson plan to maintain academic focus. Many of these tasks are learned on-the-job. Nothing you can learn in any course is more valuable than learning what to do when you dont know what to do. When you can do that, you are well on your way to becoming a great teacher. Strategic Learning Strategic learning is, in effect, a highly probable outcome of effective strategic teaching. Reduced to its essentials, strategic learning is learning in which students construct their own meanings, and in the process, become aware of their own thinking. The link between teaching, thinking, and learning is critical. As a teacher, if you are not causing your students to think about what you are presenting, discussing, demonstrating, mediating, guiding, or directing, then you are not doing an effective job. You must be more than a dispenser of information. You must create conditions and an environment that encourages thinking, deepens and broadens it, and which causes students to become aware of how they think. The process of thinking about how we think is referred to as metacognition. In helping students create knowledge, it is useful to think of knowledge as occupying space that can be thought of as a pyramid. At the bottom of the pyramid is declarative knowledge, or knowledge of what is. Declarative knowledge is akin to awareness. One step up on the pyramid is procedural knowledge, or knowledge of how something works, or functions. At the top of the pyramid is conditional knowledge, or knowledge of when or why a particular procedure will work. Conditional knowledge is closely related to the predictive function of knowledge. When students develop a broad and deep system of conditional knowledge, they are able to predict more accurately, solve problems more efficiently, and in a sense, are more free because they can identify and articulate more options from which to choose. Strategic learning is a valuable system to help your students develop conditional knowledge. Content Connections The creation of knowledge is, in the most practical and profound sense, a primary and direct result of learning. As teachers, we must strive to assist our students to develop intellectual tools by which they can create knowledge. Any knowledge, once created, becomes a part of a larger system that enhances learning and is capable of integrating and accommodating new information with greater efficiency and reliability. Each person creates knowledge in similar, yet uniquely distinct ways. Connecting information provided or described by others in novel and personal ways is a key to learning and developing knowledge. The more one knows, the more one can know. The idea of content links or connections is not exactly new, but offers some unique opportunities to chart your own course, learn, and add to your knowledge system. Enter the idea of Constructivism. Constructivism is a philosophy as well as a psychology of education. Constructivism is about how knowledge is created.

Monday, July 22, 2019

Parallel Computer Architecture Essay Example for Free

Parallel Computer Architecture Essay â€Å"Parallel computing† is a science of calculation t countless computational directives are being â€Å"carried out† at the same time, working on the theory that big problems can time and again be split â€Å"into smaller ones†, that are subsequently resolved â€Å"in parallel†. We come across more than a few diverse type of â€Å"parallel computing: bit-level parallelism, instruction-level parallelism, data parallelism, and task parallelism†. (Almasi, G. S. and A. Gottlieb, 1989) Parallel Computing has been employed for several years, for the most part in high-performance calculation, but awareness about the same has developed in modern times owing to the fact that substantial restriction averts rate of recurrence scale. Parallel computing has turned out to be the leading prototype in â€Å"computer architecture, mostly in the form of multicore processors†. On the other hand, in modern times, power utilization by parallel computers has turned into an alarm. Parallel computers can be generally categorized in proportion â€Å"to the level at which the hardware† sustains parallelism; â€Å"with multi-core and multi-processor workstations† encompassing several â€Å"processing† essentials inside a solitary mechanism at the same time â€Å"as clusters, MPPs, and grids† employ several workstations â€Å"to work on† the similar assignment. (Hennessy, John L. , 2002) Parallel computer instructions are very complicated to inscribe than chronological ones, for the reason that from synchronization commence more than a few new modules of prospective software virus, of which race situations are mainly frequent. Contact and association amid the dissimilar associate assignments is characteristically one of the supreme obstructions to receiving superior analogous program routine. The acceleration of a program due to parallelization is specified by Amdahls law which will be later on explained in detail. Background of parallel computer architecture Conventionally, computer software has been inscribed for sequential calculation. In order to find the resolution to a â€Å"problem†, â€Å"an algorithm† is created and executed â€Å"as a sequential stream† of commands. These commands are performed on a CPU on one PC. No more than one command may be implemented at one time, after which the command is completed, the subsequent command is implemented. (Barney Blaise, 2007) Parallel computing, conversely, utilizes several processing fundamentals at the same time to find a solution to such problems. This is proficiently achieved by splitting â€Å"the problem into† autonomous divisions with the intention that every â€Å"processing† factor is capable of carrying out its fraction â€Å"of the algorithm† concurrently by means of the other processing factor. The processing† fundamentals can be varied and comprise properties for example a solitary workstation with several processors, numerous complex workstations, dedicated hardware, or any amalgamation of the above. (Barney Blaise, 2007) Incidence balancing was the leading cause for enhancement in computer routine starting sometime in the mid-1980s and continuing till â€Å"2004†. â€Å"The runtime† of a series of instructions is equivalent to the amount of commands reproduced through standard instance for each command. Retaining the whole thing invariable, escalating the clock occurrence reduces the standard time it acquires to carry out a command. An enhancement in occurrence as a consequence reduces runtime intended for all calculation bordered program. (David A. Patterson, 2002) â€Å"Moores Law† is the pragmatic examination that â€Å"transistor† compactness within a microchip is changed twofold approximately every 2 years. In spite of power utilization issues, and frequent calculations of its conclusion, Moores law is still effective to all intents and purposes. With the conclusion of rate of recurrence leveling, these supplementary transistors that are no more utilized for occurrence leveling can be employed to include additional hardware for parallel division. (Moore, Gordon E, 1965) Amdahl’s Law and Gustafson’s Law: Hypothetically, the expedition from parallelization should be linear, repeating the amount of dispensation essentials should divide the â€Å"runtime†, and repeating it subsequent â€Å"time and again† dividing â€Å"the runtime†. On the other hand, very a small number of analogous algorithms attain most favorable acceleration. A good number â€Å"of them have a near-linear† acceleration for little figures of â€Å"processing† essentials that levels out into a steady rate for big statistics of â€Å"processing† essentials. The possible acceleration of an â€Å"algorithm on a parallel† calculation stage is described by â€Å"Amdahls law†, initially devised by â€Å"Gene Amdahl† sometime â€Å"in the 1960s†. (Amdahl G. , 1967) It affirms that a little segment of the â€Å"program† that cannot be analogous will bound the general acceleration obtainable from â€Å"parallelization†. Whichever big arithmetical or manufacturing problem is present, it will characteristically be composed of more than a few â€Å"parallelizable† divisions and quite a lot of â€Å"non-parallelizable† or â€Å"sequential† divisions. This association is specified by the â€Å"equation S=1/ (1-P) where S† is the acceleration of the â€Å"program† as an aspect of its unique chronological â€Å"runtime†, and â€Å"P† is the division which is â€Å"parallelizable†. If the chronological segment of â€Å"a program is 10% â€Å"of the start up duration, one is able to acquire merely a 10 times acceleration, in spite of of how many computers are appended. This sets a higher bound on the expediency of adding up further parallel implementation components. â€Å"Gustafsons law† is a different â€Å"law in computer† education, narrowly connected to â€Å"Amdahls law†. It can be devised as â€Å"S(P) = P ? (P-1) where P† is the quantity of â€Å"processors†, S is the acceleration, and ? the â€Å"non-parallelizable† fraction of the procedure. â€Å"Amdahls law† supposes a permanent â€Å"problem† volume and that the volume of the chronological division is autonomous of the quantity of â€Å"processors†, while â€Å"Gustafsons law† does not construct these suppositions. Applications of Parallel Computing Applications are time and again categorized in relation to how frequently their associative responsibilities require coordination or correspondence with every one. An application demonstrates superior grained parallelism if its associative responsibilities ought to correspond several times for each instant; it shows commonly grained parallelism if they do not correspond at several instances for each instant, and it is inadequately equivalent if they hardly ever or by no means have to correspond. Inadequately parallel claims are measured to be uncomplicated to parallelize. Parallel encoding languages and parallel processor have to have a uniformity representation that can be more commonly described as a â€Å"memory model†. The uniformity â€Å"model† describes regulations for how procedures on processor â€Å"memory† take place and how consequences are formed. One of the primary uniformity â€Å"models† was a chronological uniformity model made by Leslie Lamport. Chronological uniformity is the condition of â€Å"a parallel program that it’s parallel† implementation generates the similar consequences as a â€Å"sequential† set of instructions. Particularly, a series of instructions is sequentially reliable as Leslie Lamport states that if the consequence of any implementation is equal as if the procedures of all the â€Å"processors† were carried out in some â€Å"sequential† array, and the procedure of every entity workstation emerges in this series in the array detailed by its series of instructions. Leslie Lamport, 1979) Software contractual memory is a familiar form of constancy representation. Software contractual memory has access to database hypothesis the notion of infinitesimal connections and relates them to â€Å"memory† contact. Scientifically, these â€Å"models† can be symbolized in more than a few approaches. Petri nets, which were established in the physician hypothesis of Carl Adam Petri some time in 1960, happen to be a premature effort to cipher the set of laws of uniformity models. Dataflow hypothesis later on assembled upon these and Dataflow structural designs were formed to actually put into practice the thoughts of dataflow hypothesis. Commencing â€Å"in the late 1970s†, procedure of â€Å"calculi† for example â€Å"calculus of† corresponding structures and corresponding â€Å"sequential† procedures were build up to authorize arithmetical interpretation on the subject of classification created of interrelated mechanisms. More current accompaniments to the procedure â€Å"calculus family†, for example the â€Å"? calculus†, have additionally the ability for explanation in relation to dynamic topologies. Judgments for instance Lamports TLA+, and arithmetical representations for example sketches and Actor resultant drawings, have in addition been build up to explain the performance of simultaneous systems. (Leslie Lamport, 1979) One of the most important classifications of recent times is that in which Michael J. Flynn produced one of the most basic categorization arrangements for parallel and sequential processors and set of instructions, at the present recognized as â€Å"Flynns taxonomy†. Flynn† categorized â€Å"programs† and processors by means of propositions if they were working by means of a solitary set or several â€Å"sets of instructions†, if or not those commands were utilizing â€Å"a single or multiple sets† of information. â€Å"The single-instruction-single-data (SISD)† categorization is corresponding to a completely sequential process. â€Å"The single-instruction-multiple-data (SIMD)† categorization is similar to doing the analogous procedure time after time over a big â€Å"data set†. This is usually completed in â€Å"signal† dispensation application. Multiple-instruction-single-data (MISD)† is a hardly ever employed categorization. While computer structural designs to manage this were formulated for example systolic arrays, a small number of applications that relate to this set appear. â€Å"Multiple-instruction-multiple-data (MIMD)† set of instructions are without a doubt the for the most part frequent sort of parallel procedures. (Hennessy, John L. , 2002) Types of Parallelism There are essentially in all 4 types of â€Å"Parallelism: Bit-level Parallelism, Instruction level Parallelism, Data Parallelism and Task Parallelism. Bit-Level Parallelism†: As long as 1970s till 1986 there has been the arrival of very-large-scale integration (VLSI) microchip manufacturing technology, and because of which acceleration in computer structural design was determined by replication of â€Å"computer word† range; the â€Å"amount of information† the computer can carry out for each sequence. (Culler, David E, 1999) Enhancing the word range decreases the quantity of commands the computer must carry out to execute an action on â€Å"variables† whose ranges are superior to the span of the â€Å"word†. or instance, where an â€Å"8-bit† CPU must append two â€Å"16-bit† figures, the central processing unit must initially include the â€Å"8 lower-order† fragments from every numeral by means of the customary calculation order, then append the â€Å"8 higher-order† fragments employing an â€Å"add-with-carry† command and the carry fragment from the lesser arr ay calculation; therefore, an â€Å"8-bit† central processing unit necessitates two commands to implement a solitary process, where a â€Å"16-bit† processor possibly will take only a solitary command unlike â€Å"8-bit† processor to implement the process. In times gone by, â€Å"4-bit† microchips were substituted with â€Å"8-bit†, after that â€Å"16-bit†, and subsequently â€Å"32-bit† microchips. This tendency usually approaches a conclusion with the initiation of â€Å"32-bit† central processing units, which has been a typical in wide-ranging principles of calculation for the past 20 years. Not until in recent times that with the arrival of â€Å"x86-64† structural designs, have â€Å"64-bit† central processing unit developed into ordinary. (Culler, David E, 1999) In â€Å"Instruction level parallelism a computer program† is, basically a flow of commands carried out by a central processing unit. These commands can be rearranged and coalesced into clusters which are then implemented in â€Å"parallel† devoid of altering the effect of the â€Å"program†. This is recognized as â€Å"instruction-level parallelism†. Progress in â€Å"instruction-level parallelism† subjugated â€Å"computer† structural design as of the median of 1980s until the median of 1990s. Contemporary processors have manifold phase instruction channels. Each phase in the channel matches up to a dissimilar exploit the central processing unit executes on that channel in that phase; a central processing unit with an â€Å"N-stage† channel can have equal â€Å"to N† diverse commands at dissimilar phases of conclusion. The â€Å"canonical† illustration of a channeled central processing unit is a RISC central processing unit, with five phases: Obtaining the instruction, deciphering it, implementing it, memory accessing, and writing back. In the same context, the Pentium 4 central processing unit had a phase channel. Culler, David E, 1999) Additionally to instruction-level parallelism as of pipelining, a number of central processing units can copy in excess of one command at an instance. These are acknowledged as superscalar central processing units. Commands can be clustered jointly simply â€Å"if there is no data† reliance amid them. â€Å"Scoreboarding† and the â€Å"Tomasulo algorithm† are two of the main frequent modus operandi for putting into practice inoperative implementation and â€Å"instruction-level parallelism†. Data parallelism† is â€Å"parallelism† intrinsic in â€Å"program† spheres, which center on allocating the â€Å"data† transversely to dissimilar â€Å"computing† nodules to be routed in parallel. Parallelizing loops often leads to similar (not necessarily identical) operation sequences or functions being performed on elements of a large data structure. (Culler, David E, 1999) A lot of technical and manufacturing applications display data â€Å"parallelism†. â€Å"Task parallelism† is the feature of a â€Å"parallel† agenda that completely dissimilar computation can be carried out on both the similar or dissimilar â€Å"sets† of information. This distinguishes by way of â€Å"data parallelism†; where the similar computation is carried out on the identical or unlike sets of information. â€Å"Task parallelism† does more often than not balance with the dimension of a quandary. (Culler, David E, 1999) Synchronization and Parallel slowdown: Associative chores in a parallel plan are over and over again identified as threads. A number of parallel computer structural designs utilize slighter, insubstantial editions of threads recognized as fibers, at the same time as others utilize larger editions acknowledged as processes. On the other hand, threads is by and large acknowledged as a nonspecific expression for associative jobs. Threads will frequently require updating various variable qualities that is common among them. The commands involving the two plans may be interspersed in any arrangement. A lot of parallel programs necessitate that their associative jobs proceed in harmony. This entails the employment of an obstruction. Obstructions are characteristically put into practice by means of a â€Å"software lock†. One category of â€Å"algorithms†, recognized as â€Å"lock-free and wait-free algorithms†, on the whole keeps away from the utilization of bolts and obstructions. On the other hand, this advancement is usually easier said than done as to the implementation it calls for properly intended data organization. Not all parallelization consequences in acceleration. By and large, as a job is divided into increasing threads, those threads expend a growing segment of their instant corresponding with each one. Sooner or later, the transparency from statement controls the time exhausted resolving the problem, and supplementary parallelization which is in reality, dividing the job weight in excess of still more threads that amplify more willingly than reducing the quantity of time compulsory to come to an end. This is acknowledged as parallel deceleration. Central â€Å"memory in a parallel computer† is also â€Å"shared memory† that is common among all â€Å"processing† essentials in a solitary â€Å"address space†, or â€Å"distributed memory† that is wherein all processing components have their individual confined address space. Distributed memories consult the actuality that the memory is rationally dispersed, however time and again entail that it is bodily dispersed also. â€Å"Distributed shared memory† is an amalgamation of the two hypotheses, where the â€Å"processing† component has its individual confined â€Å"memory† and right of entry to the â€Å"memory† on non-confined â€Å"processors†. Admittance to confined â€Å"memory† is characteristically quicker than admittance to non-confined â€Å"memory†. Conclusion: A mammoth change is in progress that has an effect on all divisions of the parallel computing architecture. The present traditional course in the direction of multicore will eventually come to a standstill, and finally lasting, the trade will shift quickly on the way to a lot of interior drawing end enclosing hundreds or thousands of cores for each fragment. The fundamental incentive for assuming parallel computing is motivated by power restrictions for prospective system plans. The alteration in structural design are also determined by the association of market dimensions and assets that go with new CPU plans, from the desktop PC business in the direction of the customer electronics function.

Sunday, July 21, 2019

Issues In Ethical Hacking And Penetration Testing Information Technology Essay

Issues In Ethical Hacking And Penetration Testing Information Technology Essay In this fast growing business world the growth of Information Technology is sky-scraping. Information is a business asset, therefore it is very important to protect the Business Intelligence and the confidential information. It may protect its availability, privacy and integrity. Information Security is more than protecting computer data security; it is the process of protecting the intellectual property of an organization which engages with Network Security. The availability of access to stored information on  server  databases has increased to a great extent. Most of the companies store their business and individual information on their computer than ever before. Many businesses are exclusively stand on information stored in their data centers. Personal staff details, client lists, salaries, bank account details, marketing, sales information and more importantly their research and development secret recipe or marketing strategies may all be stored on a database. If they lack this information, it would directly affect the business operations. Therefore powerful Information security systems needed to be executed to protect this information. The biggest threat to businesses may be the people who make a living from  hacking  or breaching through information security systems. By using their technological skills, they are brave enough to break into computer system and access secured information. Hackers can even turn your home computer into a bomb (Randy Jefferies, 2005). Firewalls, which are intended to prevent access to a computer network, can be easily bypassed by a  black hat namely a hacker with the right tools and skills. The breach can result a heavy loss of crucial information, or a virus could be planted and delete all secured information as an intruder. So that is why Information Security Professionals plays a vast role in this Business Industry, because of this, there is an important position for ethical hackers, who can defend and protect the organization against cybercriminals and even they are capable of penetrating their own system for the testing purposes .When the question arise that, is hacking actually bad? Or is it possible  that there are times when hacking can be seen as good? Before addressing  these scenarios, the term hackers and ethics needs to be defined. So this is where ethical hacker comes in. Ethical Hacking and Penetration Testing Ethical Hacking can be defined as hacking a network or a system to seek and test vulnerabilities that a hacker could exploit and take advantage of the system. This implies, doing it for the betterment of the firm. This process is done to secure and defend the system from cybercriminals known as black hats with a legally authorized way. The people who involve in ethical hacking are called as white hats who are professionally trained security experts. Most of the firms employ one these White Hats to protect their information systems whilst some firms hires. The Computer crime is where the computer is  the place of the crime and the criminal activities can range from  fraud, theft, and forgery. Businesses who try to approach the problem  have independent computer security professionals who attempt to break  into the computer systems and penetrate as mentioned above. Both of these people, crackers and  professionals are ethical hackers, but they have different ethics. Negative observation of hacking, When is hacking bad? In recent news, a certain hacker who claims to be  known as Gwerdna hacked into a Mac computer, He even made comments on  how easy it was for him to hack into the security and he has stated to break into that library machine he only took 10 minutes. (Micheal Harvey, 2006). The term Ethical Hacking can be addressed as penetration testing. This is a method of evaluating the network or computer system by simulating an attack from a malicious source, a White Hat Hacker but act as a Black Hat Hacker (Wikipedia, 2010). These ethical hackers use these methods which can be identified and clarified as malicious softwares namely Buffer Overflow, Logic Bomb, Parasite, Sniffer, Spoof, Trojan Horse, Virus, Worms. Importance and Benefits of Ethical Hacking As mentioned above the reason for conducting an ethical hack, obviously, is to keep information assets secure. One survey conducted by Rick Blum, stated that It (ethical hacking) is very important and helps save you money and reputation in the long run. (Rick Blum, 2009).Network testing is the most important type of ethical hack, because it is obvious the hacker can easily break the firewall and get into the network. So network should be highly secured. Thats a reason why it is considered as a very important fact for organization because of the rising cyber crime rates and the high growth of cyber criminals. Since computer technology has developed, the crime rates also increased. The intellectual hackers have made mass destructions and losses for many companies and they have damaged their database and leaked information. Had exploited the brand image of most of the firms and damaged their trust on their clientele. Hackers have transferred millions of dollars without any awareness of the banks and their involvement. Even hacked into police departments emergency help desks. For example a group of hackers called Vandals hacked the New York City Police Departments voice- mail system and replaced the usual polite announcements with You have reached the New York City Police Department. For any real emergencies, dial 119.Anyone else were a little busy right now eating some donuts and having coffee. It continued You can just hold the line. Well get back to you.Were little slow, if you know what I mean. Thank You. The bogus messages continued for 12 hours before they were investigated and corrected by ethical hackers (Donald Pimkins, 2000) Some time ethical hacking will not reveal vulnerabilities of a network or a system. But there are a number of consequence benefits that can be derived from an ethical hacking process. The picture below will give a clear idea of what are the benefits available in this process and how it can be prioritized. Ref: http://www.isaca.org/Images/journal/jrnlv2-06-red-teams-audit-tool-2.jpg The size of the threat depends on the type of the business and how its fits with hackers motives. Therefore to prevent these kinds of issues and threats in future firms employ ethical hackers. The term ethics will be clearly structured in the following paragraphs with the support of ethical principles, ethical issues, ethical dilemmas and ethical theories. Business Ethics According to the study Business ethics can be defined as a form of applied ethics that examine ethical principles and moral or ethical problems that occur in a business environment (Gwendolyn Cuizon, 2009). Many businesses have gained a bad reputation just by being in business. By not being stick to business ethics policy firms may fall in trouble, if a business is damaged by an ethical disaster it affects the bottom line which implies profit. It is agreed that IT systems are put in place to support the strategic planes of an organization which would be in lined with business ethics. So that is why organizations see ethics as, a bringing competitive edge to their business. In my point of view in business, the perspective view of stakeholders are different , they see theres whats illegal, whats legal but unethical, ethical but against company policy, not against policy but not in the clients best interests, and finally whats not really opposite to the clients best interests but isnt really going to benefit them moreover. Which can be understood by the below image. http://www.gryphonshafer.com/blog/2008/08/business_ethics.png Ethical Principles and Ethical Issues Ethical principles can be defined as the foundation of ethical behavior. An ethical principle arrives from the social Context, from religious beliefs, and from ethical theory. These ethical principles can applied to computer technologies that have an impact on peoples daily lives where they interacts in government, in education, at work, at play ground and workout) (Penny Duquenoy, 2010) Some general ethical principles can be listed as Respecting others Consider others as equal Keep promises Respect the property of others Act honestly The principles can be addressed as below which relevant to Information Systems professionals and related technologies officers. The Royal Academy of Engineering, in collaboration with Engineering Council (UK) and a number of the leading professional engineering institutions, has developed a Statement of Ethical Principles to which it believes all professional engineers and Information Professionals should follow. à ¢Ã¢â€š ¬Ã‚ ¢ Accuracy and Rigor à ¢Ã¢â€š ¬Ã‚ ¢ Honesty and Integrity à ¢Ã¢â€š ¬Ã‚ ¢ Respect for Life, Law and the Public Good à ¢Ã¢â€š ¬Ã‚ ¢ Responsible Leadership: Listening and Informing (Engineering Ethics, 2007) Ethical issues can be addressed as whatever threatens or breaks an ethical principle is an ethical issue. For example ethical principle Respect the property of others Ethical Issue Hack someones computer without their permission and steal information and destroy it by sending a virus or a worm So by understanding this example an ethical issue can be clearly understood. And to assess these kinds of ethical issues in different perspectives ethical theories should be applied. Ethical Theories As discussed above an ethical issue can be identified and evaluated by using ethical theories .These theories can be used as tools for making ethical decisions, and they may also helpful in providing a basis for critical thinking. An issue can be taken in different perspectives and formed opinions with helpful of ethical theories. There are two main ethical theories, Kantianism Consequentialism Kantianism The Kants theory can be defined summarized without going in deep. Kant says that how we behave ethically comes from within us, and the things that we decide are good or bad are based on whether we could imagine everyone doing them. (Immanuel Kant) So for example, it would be logically conflicting to say that breaking a promise is good because if everyone broke their promises there would be a loss of trust in promises, and the whole nature of a promise would be lost. Therefore, he says, that certain things cannot be universalized which means they would not work if everyone did them, and those things are wrong. Examples are: killing others, lying, stealing, breaking promises. Moreover, in Kants point of view, things that we view as wrong are essentially wrong that is, they are always wrong and there is never any reason situation where they would be right. This conflicts directly with the theory of consequentialism, which will be addressed next. Consequentialism Consequentialism theory can be defined as, a theory which deals with consequences of actions rather than the actions themselves .So, and for example, it could be argued that stealing could sometimes be the right action to take provided the outcome is for the good. Theory says that a good outcome is that which brings the greatest benefit to the greatest number of people. Therefore stealing, for example, is a morally acceptable act if it brings greater benefit to the greatest number. For example, if a king has a warehouse full of food when most of the people in the country are starving. In this instance stealing the food to distribute it to the starving people would be the right thing to do. So by this act a great number of people get benefited. So in this case according to consequentialism theory stealing is not bad while it fully contradicts with Kantians theory. Ethical Dilemmas Ethical dilemmas can be addressed as moral dilemmas. An ethical dilemma is a situation where in moral principle or ethical obligations conflict in such a way as to make any possible resolution to the dilemma morally intolerable. In other words, an ethical dilemma is any situation in which guiding moral principles cannot determine which course of action is right or wrong. Can simplified as you will have issue and you will have a solution which will leads you to an unethical way.(Lee Flamand, 2007). Ethical, Legal, Professional, Social and Cultural Issues in Ethical Hacking When we discuss about ethical hacking there are many issues which can be listed, which will arise in many circumstances. For evaluating these issues and come up with a good solution or opinions the above discussed, structured ethical principles and ethical theories can be taken off. This will obviously give a clear picture to the reader. In this study for further more analysis two important incidents will be assessed by me using the both ethical theories. A Dutch hacker who copied patient files from a University of Washington medical center (and was not caught) said in an online interview that he did it to publicize the systems vulnerability not to use the information. He disclosed portions of the files to a journalist after the medical center said that no patient files had been copied. (Sara Baase, A Gift of Fire, 2003.) If we critically evaluate the above scenario, it is obvious that the hacker has committed a cyber crime and he should be punished according to the Kantianism theory which tells some actions are always wrong. Even though the Dutch hacker didnt misused the copied files he has break into the network and penetrated it. So its ethically wrong when we see in the perspective of Kants theory. But if we evaluate this using Consequentialism theory it will completely contradict with Kantianism theory. Though the hacker was not get caught he has came to an online interview to announce that there is vulnerability in University of Washingtons medical centres network which can be easily attacked. So this good behavior of the hacker shows that he has came to this decision concerning about the betterment of the patients. which direct the theory an action is good If the consequences bring greatest benefit to number of people .If he has published all the copied files through the internet the both parti es will be get affected, the patients and the University. The files may contain confidential information of patients and which they never want to expose. So although this act can be identified as ethically correct whilst its legally wrong. Therefore by this action the Medical centre gets a chance to secure and defend their systems from future attacks. But a according to the statement A solution to an ethical issue can raise another issue Anonymous. May be this act is ethically correct according to the theory of Consequentialism. But what if the hacker found some medical information about his friend? Which information is a kept secret? What if he tells him? What if the friends get to know that his confidential medical information has got leaked through the internet? These kinds of issues can arise which will sometimes take into an ethical dilemma. If we move to the next case which is, A 17 year old hacker know as YTcracker, who penetrated several government and military web sites (including those belongings to the Bureau of Land Managements National Training Center, NASAs Goddard Space Flight Center and the Defense Contracts Audit Agency) said he routinely sends messages to government web site administrators insisting that they address vulnerabilities and adopt Unix or other more secure systems can be penetrated, but the messages largely go ignored. YTcracker said in his defacement of website he targeted systems the government would look at and take seriously and secure it. (Federal Computer Week, 1999) Though this case is Similar to the above discussed one, it provides a different idea. The hacker who has penetrated all these sites called YTcracker has only one intention that is to alert and notify the government organizations to protect their valuable informations, Which can be easily breached and gained access. If critically evaluate this case according to the Kantianism theory. The act of YTcracker is ethically wrong as it threatens the ethical principles go beyond the theory. But according to the point of Consequentialism theory the act is ethical. Because the hacker hasnt done any damage to the government organizations using their web sites. He has only warned and notified them to make them more secured. So greater amount of people gets benefited, because there are most sensitive informations are available in government sites such as National Security, Military and NASA. So if the hacker leaks the information from their databases what will happen there are would be a huge problem for the US government. But both of these incidents are illegal according to the Computer Misuse Act 1990 even they are ethical according to the theories. Because the hackers have offended unauthorized access to computer material (Misuse Act 1990) Ethical Concerns and Professional Issues When implementing an ethical hack in an organization there are ethical issues which engages with information systems professionals can be addressed as, Ethical Hackers have to break the organizations security policy and procedures. Violating the code of conduct. Privacy of the employer and employees Secret Business strategy, Marketing Strategy and product recipe leakage If we further analyze above ethical issues a question may arise, Does ethical hacking is ethical? Before address the issues, we are tend to find a solution for the above question so if, we evaluate the question by putting into Kantianism theory somehow its breaking the rules and regulation, braking the firms security policies and procedures, penetrating the code of conduct. So this act of ethical hacking can cannot be ethical. Even though the professional hackers do it legally it can be unethical, According to Kants point of view. Considering with view point of consequentialism theory this process can be identified as ethically correct, because its all done for the betterment of the organization. So there is no way of criticizing it. Firms do these to seek the vulnerabilities and defend the entire network there should be a testing procedure. So this can be taken as that. In this point of view we can decide its all ethically correct, even though they break their own code of conduct. As information systems professionals point of view ethical hacking can be identified as a complete mess. Because they have to stick to a code of conduct. Then only they are professionals. But when they are being forced to violate these terms when they involve in penetration tests there are in trouble as professionals. Therefore as professionals who are expected to comply with local laws, sometimes they may have to assess and evaluate ethical and legal issues against their personnel values. There can be privacy invasion takes place when they do a ethical hack. Most of the firms hire an ethical since they dont employ one. So when he penetrate their systems and network he can get whatever the information he needs from the organizations databases and networks. All confidential employee and partner documents and information can be seen. The ethical hacker is able to view all the weak points of the firewall. If the ethical hacker is not a professional he may attack the organization later when he needs. Or he will be a big threat. So these issues may arise. And even the secret marketing and business strategy of a leading company leaks the hacker can sell it for the competitors. So this would be a threat for some firms to conduct and penetrations test using an Legal Issues and Laws When considering about legal aspects, the issues which was discussed in the above paragraphs can be brought up since it involves legal issues. Even though those incidents were ethical, its completely illegal, because it breaks the Computer Misuse Act 1990. This Act will be clearly discussed below, The Computer Misuse Act 1990 The  Computer Misuse Act 1990  is an Act of the  UK Parliament. The Bill eventually became the Computer Misuse Act in August 1990.The Act introduced three new criminal offences: Unauthorized access to computer material Unauthorized access to computer material with the intent to commit or facilitate commission of further offences Unauthorized modification of computer material.(Statuelaw, 1990) What if an ethical hacker pretends to be an inside intruder? He who knows the entire network and secrets of a company. So he can easily damage and destroy the entire information system. When these situations occur according to the misuse act legal issues can be identified. For an example a disgruntled computer technician at Reuters in Hong Kong detonated logic bombs at five investment-bank clients, causing 36 hours of downtime in networks providing market information crucial for trading. The banks switched immediately to alternative services and reported no significant effects on their work; however, Reuters was deeply embarrassed by the incident (Financial Times Limited, November 1996) so looking into these factors the organization should be fully aware of these kinds of threat which can be aroused. Sometimes Internal politics may force the ethical hacker to make huge losses for the firm. When they employ for and public company. There are so many people in a director board. So what if the ethical hacker gets an order from higher management to plant a logic bomb or do a parasite for important information of the firm and put the blame on another person. For the ethical hacker this job is not that much difficult. Even they may ask him to steal other companies confidential documents. This might cause legal issues which will entirely damage the firms reputation. These kinds of issues can arise without the awareness of the management. Social and Cultural Concerns It is agreed that in business ethics there are loads of issues as deeply addressed in above paragraphs and social and cultural issues can also identified as one of them. Social issues are about to impact on the society. IT depends on the societys reaction and behavior. According to the ethical principles firms should negotiate with the society. If an Information System of a Hospital or a School got hacked, there would be huge issues in the society. As their sensitive information contain on those Information Systems. Similarly this case may occur in a firm. So when an ethical hacker gets involved in this process he has to keep the trust on them if not the blame can be put on him by the society. So both parties get affected. The brand image can be get spoilt in the society when their informations get leaked out. They will lose the trust and faith on their employer. And when the ethical hacking process gets leaked out there are chances of affecting the companys culture. If there is a culture there are certain values to be respected. And if this values get exploited by the penetration testers issues may arise. And when they design these IS system they should respect the values without harming it. For e.g. Pornography. Conclusion From the clearly structured study, it is understood ethical hacking consideration is crucial to maintaining a verifiable level of information security. Even though there are lots of issues in certain aspects of Ethical hacking; it is a critical component of our overall security program which keeps the internal, contracted security. Ethical hacking is a necessity in order to protect company assets and stay close to the reality of unethical hacking. It ethical hacking is very important and helps save you money and reputation in the long run. Ethical Hacking is the best way to assess the network from an outsiders perspective. To reduce the addressed issues above organizations can have their own ethical hacking team or hacker to prevent outside information leakage and to get rid of the fear of that. I think ethical hacking is a must have for any serious organization today in this fast moving business world. It should be a critical part of any proactive organization in todays global competitive market.

Saturday, July 20, 2019

Recreational Center for the Handicapped :: essays research papers

The Janet Pomeroy Center â€Å"The Recreational Center for the Handicapped† Descriptions   Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"The Janet Pomeroy Center†, also known as â€Å"The Recreational Center for the Handicapped† has been serving the residents of the San Francisco community for over 50 years. Founded by Janet Pomeroy on November 18, 1952 it has enriched the lives of over 17,000 individuals. It is a multi service center conveniently located off of Skyline Boulevard, over looking Lake Merced and directly behind the San Francisco Zoo. With a wide range of services offered, â€Å"The Janet Pomeroy Center† strives to provide recreation and vocational opportunities for the mentally and physically challenged, so as to create and instill independence, personal achievement, and a means for self expression for the disabled population. Having a variety in age from the youth to the elderly, RCH’s clients also have a wide range in the levels of physical and mental disability. They range from being mildly to severely mentally challenged. There are clients who can easily communicate verbally and others who rely on other methods to express themselves. These individuals also range in their physical disabilities. Some are in need of a wheelchair, where as others are able to easily get around. There are clients who violently have seizures, as well as those whose seizures are generally mild. â€Å"The Recreational Center for the Handicapped† is unique in the fact that it also provides services to those who have had a head trauma. In collaboration with St. Mary’s Hospital and the Department of Mental Health, RCH has started SF TBI NET, which stands for â€Å"San Francisco Traumatic Brain Injury Network.† Imagine the tremendous impact it must be living one moment able-bodied, then the next moment, disabled. Imagine the impact an event like this would have on your loved ones. The individuals who benefit from the program were once able-bodied like us, but because of a brain injury, they now need help relearning their motor skills and being able to function in daily life. SF TBI NET also recognizes the strain a traumatic event like this can have on the entire family and provides help and relief to its members. Rather than focusing on their weakness, the staff focuses on their client’s strengths. Through the different recreational activities and services this multi service center provides, the interests and talents these individuals have are further nurtured. For example, having access to art supplies and instruction is a great benefit to those clients who are interested in further developing their art skills.

The Rights of a Political Prisoner versus the Rights of a Terrorist :: September 11 Terrorism Essays

The Rights of a Political Prisoner versus the Rights of a Terrorist         Ã‚  Ã‚  Ã‚  Ã‚   In this essay I will discuss why political prisoners are often categorized as terrorists ever since September 11, 2001, also I will examine what rights political prisoners have to that of terrorist. In this essay I will have the contents of first my reasons for why political prisoners are categorized as terrorist. Secondly, I will make the objection to the rights. Lastly, I will respond by explaining my position in which I believe that in any case that in any form a political prisoner who looks to takes in any actions of any form to infringe against my right to live life and to enjoy it should be categorized as terrorist.    Several reasons come into of why political prisoners are categorized as terrorist. Before the tragic events of September 11, 2001, we have had a right to safe society meaning the right to live freely in this America with no interruption with an orderly society free from interference from outside influences. In this case on September 11, 2001 those rights got infringed upon with the attack on America. This showed that for one day in 2001 that America was not so superior. The right of living in a safe society was now a fore gone formality. The right to work was not the same as well meaning in reference to those who were working that morning of the attack. Just when I thought it was safe to go to work I was wrong  Ã‚   with one day that changes my life. I wrestled with this profiling of all actions of the political nature.    A web site called the ABC federation, which supports political prisoners as a totally autonomous unified group, which looks to grow collectively on struggles against government policies. They informed me that Political Prisoners act to carry out support of legitimate struggles for self-determination or for opposing the illegal policies for the government along with its political sub-divisions. In the Common Dreams New Center web site reported a study on what a terrorist was. It explains to me that a terrorist is one who acts or engages in an act of terrorism.

Friday, July 19, 2019

The Investment Industry :: essays research papers

The Investment Industry   Ã‚  Ã‚  Ã‚  Ã‚  The investment industry is composed of a wide variety of firms. The main players include independent full line brokerage firms, investment bank subsidiaries of chartered banks, and discount brokers. Independent full line brokerage firms offer a wide range of services, including underwriting, trading of stocks, advice and research. In essence, the full service brokerage subsidiaries of chartered banks offer the same services, however, banks' brokerage firms may have a larger pre-established clientele. Finally, the discount brokers are basic stock brokers that perform trades for clients who do not want investment advice. Usually, this service is targeted toward the sophisticated investor who does his/her own research to incur minimal commission fees.   Ã‚  Ã‚  Ã‚  Ã‚  Banks entered the investment industry in 1987, whereby they took over full-service brokerages, introduced mutual funds to the banking industry and became part of discount brokering. From this time on, chartered banks have expanded their dominance in the industry by acquiring key players in the industry or branching off into full brokerage services. For example, the brokerage firms for CIBC, Royal Bank, Toronto Dominion Bank, Bank of Nova Scotia and Bank of Montreal are Wood Gundy, RBC Dominion, Evergreen, Scotia McLeod and Nesbitt Burns respectively. In addition, the aforementioned chartered banks have also branched into the discount brokerage sector.   Ã‚  Ã‚  Ã‚  Ã‚  As of December 1994, the Securities Industry as a whole included 158 firms, directly employs over 24,000 people, has operating revenue of $5.1 Billion and operating profit of $1.2 Billion (Appendix A). Within this industry the largest firms ranked by revenue are: RBC Dominion Securities ($1 Billion), Midland Walwyn ($480 million), Burns Fry ($416 million) and Nesbitt Thomson ($335 million) (Appendix B). It is evident that the industry is highly concentrated in a small number of companies. The top 4 leaders in the industry accounted for 44% of revenue, while the top 8 was 51%.   Ã‚  Ã‚  Ã‚  Ã‚  Industry information from 1993 displays further segregation, between retail, institutional and integrated firms. Integrated retail-institutionalized firms (RBC Dominion Securities, Scotia McLeod, Nesbitt Thomson, Wood Gundy) made up 66% of the industry's revenue, while strictly institutional firms (First Marathon Securities, Gordon Capital Corp. and Loewer Ondaatje McCutcheon Ltd.) made up 21% and Retail firms (Green Line Investor Services Inc.), 15% (Appendix C). The following analysis will outline the investment dealer's industry, specifically the life cycle, critical success factor, strengths, weaknesses, target markets and profitability. Life Cycle   Ã‚  Ã‚  Ã‚  Ã‚  The demand for investment financial services is expanding. This becomes evident by examining the average increase in revenue which has occurred over the 1990-1994, 5 year span. This amounts to a 114% increase in revenue, ($2.4 Billion and $5.13 Billion), (Appendix A). An additional indication of growth in the investment industry is the fact that the number of firms in the industry has

Thursday, July 18, 2019

A Comparative Essay between “Disabled” and “An Unknown Girl” Essay

Moniza Alvi reflects on India as her hand is hennaed by â€Å"an unknown girl† â€Å"in the evening bazaar†. The predominantly upbeat mood of this poem contrasts with the pessimistic mood in â€Å"Disabled† written by Wilfred Owen, a soldier in the First World War, stating his anti-war view through a poem on the life of a young soldier â€Å"sewn short at elbow†, crippled by war. In his poem, the difference between past and present allows Owen to reveal the regret and disappointment felt by the persona whereas, although Alvi portrays India as a magical, beautiful place where she experiences freedom, the ending reveals she will never be completely included. As such both poems illustrate longing but Alvi is longing for her identity whereas Owen is longing for his past life. To begin with, there is a difference in mood between â€Å"An Unknown Girl† and â€Å"Disabled† as Alvi creates an optimistic mood whereas Owen creates a predominantly depressing mood. Owen creates this by suggesting a theme of isolation felt by the persona which is implied in the first stanza when Owen says â€Å"mothered them from him†. The word â€Å"mothered† has caring, kind connotations but when used with â€Å"from†, it implies that he is not given the love and is actually an outcast which creates a strong negative mood as we can feel his seclusion. Similarly, â€Å"Espirit de corps† is said in an ironic tone which emphasises the fact that he is an outcast and that war does not leave you with glory or pride. This inspires pathos as everything has been taken away from him and he is no longer included, an idea which is further emphasised by the iambic pentameter in the first stanza, communicating the dull monotony of his life due to the isolation as he has no one to share anything with. Finally, the question at the end of the poem â€Å"Why don’t they come?† shows that he is literally waiting for someone to â€Å"put him into bed† as he is not able to do this himself. We can tell that he is waiting for night and the cyclical routine that repeats each day although he could be waiting for death as he has â€Å"a few sick years in Institutes† left which creates a powerful sorrow as he is still young. As this is the end of the poem, we are left with the image of him isolated and abandoned which is very striking. Owen further creates the pessimistic mood by suggesting the disappointment and lack of pride the persona has been left with after the war. Owen declares â€Å"no fears of Fear came yet† describing the persona before the war which groups all the fears and makes them seem overwhelming. This may suggest the persona is afraid of being a coward as he must appear strong and the personification of â€Å"Fear† makes him seem weak inside. This is emphasised by the use of â€Å"yet† as the persona now feels these fears after the horror of war. Later in the poem, the long stanza of hopes such as â€Å"For daggers in plaid socks; of smart salutes; And care of arms† contrasts with the short stanza for reality such as â€Å"Only a solemn man offered him fruits† revealing that his hopes for war were not met and he has been left with very little. This contrast is emphasised by the reaction of the people as he is â€Å"thanked† by â€Å"a solemn man† showing us that this â€Å"pity† makes him feel mocked. A miserable mood is portrayed as he has not received the celebratory â€Å"cheer† or â€Å"giddy jilts† he was expecting instead men â€Å"inquired about his soul† which portrays that the persona feels that these â€Å"cheers† are wrong therefore the man is making a mockery of him. The phrase â€Å"carried shoulder-high† depicts a glorious image to the reader as the persona recalls the excitement after a game of football. This excitement must have been similar to his expectations of war and when contrasted with the inglorious impression of life during and after war, the reader once again is forced to feel the sorrow and regret felt by the persona as Owen has effectively provided us with images and emotions. Furthermore, the persona appears bitter about going to war as he says â€Å"Smiling they wrote his lie† indicating their deception as they dropped â€Å"hints for young recruits† which is an exaggerated glorious image which Owen portrays as a lie. â€Å"Smiling† gives this a sinister feeling which emphasises the fact that he has been tricked and lied to in a bitter, uncaring way. We feel pathos as we can feel how powerful his bitterness is. Alternatively, to create an optimistic mood in â€Å"An Unknown Girl†, Alvi creates a theme of the magic that surrounds her in India. The repetition of the word â€Å"hennaing† emphasises the fact that it is external and decorative like a â€Å"shadow-stitched kameez†. This implies a beauty and since both objects are traditionally Indian, Alvi shows the reader that this is the overwhelming impression of magic she feels in India. The repetition of the word â€Å"neon† appeals to the visual sense as well as making the image it is used to describe seem more extreme with brighter, more defined colours. It seems almost too bright and colourful which creates a surreal and dreamlike atmosphere which portrays to the reader how enthralled Alvi is by the beauty of India she is witnessing. By describing her hennaed hand as â€Å"soft as a snail trail†, Alvi creates a magical mood by showing her astonishment. The word â€Å"soft† makes us feel comforted which is what the persona feels when in India. The sibilance in â€Å"soft† and â€Å"snail† creates a mysterious feeling which contrasts to the beauty of India, creating the longing Alvi feels for her identity. This is effectively emphasised by the childlike innocence portrayed to the reader through the words â€Å"balloons† and â€Å"icing†. In general, balloons are vividly coloured and could be used to symbolise the happiness and colour in the persona’s surroundings. The connotations we associate with â€Å"icing† are sweet and decorative which strongly suggests the happiness that Alvi is trying to portray. A â€Å"bazaar† is usually busy and crowded but Alvi foregrounds the colours and vibrancy to create a magical impression of the setting. This forces the reader to feel the magic Alvi is indicating. The image of a â€Å"peacock† is repeated as well as an â€Å"amber bird† which seems both magical and also beautiful and these are thing Alvi relates to India and the reader is forced to relate these as well. This is an intense image but could also be used to show that as a peacock can spread its tail, Alvi wishes to reveal a deeper truth about her identity. This very striking image is effective. Furthermore, the words â€Å"hushed†, â€Å"sleep† and â€Å"soft† subtly suggest to the reader the tranquil calm that Alvi feels while in India. This is contrasted with â€Å"firm† and â€Å"furious† to suggest exhilaration and happiness felt by Alvi as India has many different levels that we have been shown effectively throughout the poem. In contrast to the theme of isolation in â€Å"Disabled†, Alvi creates the impression of inclusion and reassurance that contribute to the upbeat mood. Alvi has written this poem to portray her search for personal identity as she was taken from her home in Pakistan while she was young so reassurance allows her to reconnect with the country of her heritage. The persona indicates her reassurance by creating a soft mood through the phrase â€Å"curtain cloth and sofa cloth canopy me† which is emphasised by the repetition of the word â€Å"cloth†. We also feel the inclusion Alvi is portraying as â€Å"canopy† gives the persona somewhere to hide and be protected so she is embraced. We feel this powerful yet soft inclusion throughout the poem. Alvi accents her inclusion with â€Å"I have new brown veins† as the verb â€Å"have† creates a tone of certainty. The implied pride allows us to feel that she does feel embraced by India and the reader feels embraced as well which allows us to join the lively mood. While having her hand hennaed, the persona depicts a â€Å"satin-peach knee† which relates to the skin or clothing of the Indian girl. The soft â€Å"s† sound in â€Å"satin† forces the reader to feel the calm, gentle atmosphere as well as depicting it as luxurious. Alvi implies that she relates these things to India which we then do and we feel a striking sense of her reassurance. Lastly the persona describes having her hand hennaed as â€Å"a peacock spread its lines† which shows that the India part of her identity is spreading itself too and she is becoming more at home. Although we do not feel at home, the reader can see the stunning beauty and can understand Alvi’s inclusion. Another difference in mood is the freedom created by Alvi contrasted with the dull gloom portrayed by Owen. Alvi displays a sense of freedom that originates from the beauty of India. There is no clear structure throughout the poem which to the reader may seem wild and chaotic but Alvi is powerfully trying to portray that this is part of her freedom. The short sentences create a fast pace which can be used to emphasise the emotion such as longing or desperation attached to longer sentences but also portrays a lively, excited feeling almost suggesting a sensory overload especially which is very effective as the reader too feels excited by the descriptions of India. The persona is trying to take in and communicate as much as possible. This is emphasised by the unequal line lengths which allows images such as â€Å"I am clinging† and emotions such as â€Å"are hushed† to be forced on the reader. These images and emotions are all subtly different as Alvi shows her freedom in India. The contrast between these further emphasises the freedom Alvi is portraying subtly. The dummies â€Å"tilt and stare† which contrasted with the dummies we consider normal creates the impression of disorganization which relates to all of India. Alvi feels this is her freedom and in this case, it is effective. On the other hand, Owen portrays the dull gloomy mood through the enjambment in the third and fourth line of the first stanza. It indicates how long the personas empty days are and is contrasted with the simple â€Å"play and pleasures† enjoyed by the young boys to create a dull atmosphere surrounding the lonely persona. This is very effective as the reader can feel this mood themselves. In the same stanza the phrase â€Å"saddening like a hymn† is used to create a gloomy atmosphere. In addition to the obvious connotations of saddening, Owens use of â€Å"hymn† suggests a solemn and mournful mood almost as though a part of him has died. By forcing the reader to feel these emotions, Owen has powerfully portrayed the persona’s melancholy. Due to his injury, the persona must now do what â€Å"the rules consider wise† which shows the persona no longer has freedom as â€Å"rules† have connotations of being strict which contrasts to the freedom and fun he experienced in the past. The word â€Å"wise† could also reflect on the fact that he has gained wisdom from the war due to bad decisions but this wisdom has come at the price of his happiness. This contrast shows the boring nature of his current life and the reader can feel his regret more powerfully with the image of his past happiness. The persona is described as wearing a â€Å"ghastly suit of grey† so the word â€Å"ghastly† forces the reader to think of a terrible image of the lonely man and then used with â€Å"grey† to make that image dull and lifeless. Overall this creates a gloomy visual image which is emphasised by the lack of emotion attached to the words creating an image which inspires sympathy from the reader. Finally Owen uses â€Å"shivered†, â€Å"cold and late† and â€Å"queer disease† to show how the despair is affecting the persona. He is literally cold although he may also feel cold inside as he has nothing left and is now isolated and alo ne. We can feel his sorrow which allows these words to effectively portray the dull mood to the reader. Owen also reveals a contrast inside â€Å"Disabled† as an alternate lively mood is portrayed in the past. The persona has â€Å"lost his colour† which is literally referring to the colour of his skin as he is now pale and he would have been flushed after playing football but additionally he has lost the bright glow of his youth during the war. The superficial meaning gives us a physical contrast between past and present but the alternate meaning allows the reader a glimpse at how his soul was affected. Owen distinguishes between this past excitement and the present day gloom. The persona is â€Å"waiting for dark† which is contrasted with the bright, colourful excitement felt in the past, portrayed in the second stanza. The word â€Å"waiting† implies that he is lonely because he has nothing left in his life which contrasts with â€Å"girls glanced lovelier† and romantic excitement from his past and is emphasised by the use of â€Å"dark† to suggest that he is waiting for night and the continuation of the cyclical routine that happens each day. The persona could also be waiting for death as this is a connotation of â€Å"dark†. These effective contrasts show his longing for the past and his dull life which inspires pathos from the reader. The reader also feels pathos because of the extreme contrast between past and present. Owen says â€Å"Town used to swing so gay† and the personification of â€Å"Town† gives it human emotions such as happiness that the reader is allowed to feel briefly. This creates a lively and upbeat mood in the past which is emphasised by â€Å"gay† but â€Å"used to† show the reader that this was in the past as it is written in past tense. This powerful contrast between past and present forces the reader to suffer the emotions the persona feels. Owen creates the impression of the excitement felt by the persona in the past through the contrast between leaving for war with â€Å"drums and cheers† and returning from war with â€Å"only a solemn man†. This contrast between his expectations and reality makes his past life seem exciting as he was popular but upon return, the persona feels bewildered by the lack of celebration. The difference between past and present shows us that this excitement was strong but short-lived and more pathos is inspired by that fact he feels pitied. Finally Owen says â€Å"Now, he is old;† which shows that the energetic past has gone. The word â€Å"old† is used to show that although his body is still young, the persona has physiologically aged and, in his current state, he is ancient. This contrast to his bright youth effectively makes us feel significant amounts of pathos. One of the main contrasts between these poems is within the theme of longing as Alvi portrays her persona longing for her identity whereas Owen suggests regret and longing for the past. Having been taken from her home whilst she was young, Alvi reveals that she longs for a home and to discover her personal identity in India through the repetition of â€Å"unknown†. Alvi implies that she needs to discover or recover the Indian part of her identity but additionally it is implied that she wishes to find her Indian blood so that she can reveal her full identity. This is powerful as we too feel the longing for her unknown identity and it is revealed further by the change in pace of â€Å"Now the furious streets are hushed† from fast to slow showing that she can’t hold onto the ever-changing India and her identity. This is emphasised by the use of â€Å"clinging† as this shows her desperation and the fact that India is constantly eluding her. This is very effective as we can feel her longing and have images to help. The â€Å"Dummies in shop-fronts† are described by Alvi using a tone of admiration illustrating a simple thing that clearly shows the intensity of her emotions and we too feel this intensity and passion for India. Lastly â€Å"float up† is implying a positive mood with â€Å"up† and a sense of freedom but it also shows that her identity keeps escaping and India keeps eluding her. Alternatively, Owen expresses the feeling of regret that comes from his longing which is emphasised by his realisation that his injury is his own fault although Owen depicts the persona’s anger towards the military which is similar to his own as Owen wrote most of his poetry whilst injured from war. Owen articulates â€Å"He thought he’d better join – He wonders why† and the pause after â€Å"he’d better join† shows that he is struggling to remember why he decided to fight in the war so therefore he is questioning his reasons. The phrase shows the insignificance of his reasons and leads to the persona regretting his decision. Similarly, the asyndeton in stanza five focuses on all the glorious things he briefly considered and indicates that he didn’t think about the effects of war, effectively portraying the impression of regret. Owen forces the reader to contrast the short time taken to make the decision with the lifetime he will have to suffer the consequences which evokes pathos as he does regret his choice. Owen describes the war as a â€Å"hot race† which provides a sense of chaos and disorder associated with the war by the reader. This gives the reader the strong feeling of exhilaration felt by the persona whilst fighting but the reader also gets the impression that this is different from the excitement and glory that the persona was expecting from war. This difference in emotion emphasises that the persona feels regret and the word â€Å"race† shows that although he will live with the consequences, the war was over quickly. This is very effective as we are forced to feel these emotions such as regret and exhilaration. The phrases â€Å"Poured away† and â€Å"threw away† show that the persona considers the choice he made wasteful sacrifice which emphasises the fact he feels regret for the foolish decision. The word â€Å"Poured† is foregrounded so he feels that he has done this to himself. This is very effective as we feel his regret strongly. Owen associates â€Å"giddy jilts† with going to war therefore showing that he was drunk and disorientated when he made the decision so he did it for foolish reasons and he now lives with regret. Ultimately the rhyme pattern that continues regularly throughout the poem could suggest that his decisions, made in the past, will carry on like the lines even after they have been made. Owen emphasises this regret by the longing created for the past. Owen contrasts â€Å"One time, he liked a blood smear† with the persona’s real injury to emphasis the fact that the persona is now â€Å"legless† but in those days he enjoyed the glorious side of injuries. This shows the powerful longing for the past but also indicates that the persona was more naà ¯ve in those days from the ironic tone. This is emphasised by â€Å"in the old times† as the tone is happy and warm but the use of â€Å"old† shows us that this was in the past and he no longer has these caring feelings. This illustrates the longing for the past although pathos is also created. The phrase â€Å"younger than his youth, last year† indicates that the persona wishes to have his past life back as his youth was the time of excitement and happiness and he no longer feels these things in the present. The pause shows he is struggling to compare the past and present which emphasises the fact the he wishes he could have his previous life back. This is a strong emotion and inspires much pathos from the reader. Finally the persona sees how the women’s eyes â€Å"Passed from him to the strong men that were whole† showing his longing for the past as he is comparing the way they look at him now to how they used to â€Å"glance lovelier†. This contrast shows how incomplete the persona feels as well as portraying to the reader that he is alone and deserted. This direct contrast between past and present allows the reader to feel precisely how strong the persona’s longing for the past is and how lonely he now feels. Although both Owen and Alvi both create an excited mood, there are different emotions created by the different types of excitement. The contrast between excitement and calm especially in the phrase â€Å"longing for the unknown girl in the neon bazaar† in â€Å"An Unknown Girl† allows Alvi to see both sides of India which makes her feel at home. The yearning showed by â€Å"longing† and â€Å"unknown† creates a calm atmosphere which is contrasted with â€Å"neon† to show both sides of India and give Alvi the feeling of her full identity. Alvi manages to force us to feel both the calm and excitement and we can almost feel the sense of belonging. In contrast, all the excitement in â€Å"Disabled† such as â€Å"he’d drunk a peg† and â€Å"he was drafted out† is used in the past tense which is then contrasted within the poem with the gloomy mood in the present to create a longing for the past and regret as well as the isolation of the persona. This inspires pathos as the images allow us to see how lonely the persona is and feel his regret. So therefore we can tell that the sensory overload that causes Alvi to feel such excitement and allows her to included in India contrasts with the past excitement making the persona in â€Å"Disabled† feel alone. But another way of looking at it is that this excitement pushes both persona’s away from the thing they desire; Alvi who desires to find her identity but is eluded due to the excitement in India and Owen who wishes for past enjoyment but now has a lack of vitality due to foolish excitement. However, one of the most striking differences between â€Å"An Unknown Girl† and â€Å"Disabled† is the persona’s choice and control of the situation. In â€Å"Disabled† Owen says â€Å"he asked to join† showing that not only was the persona given a choice but he chose to do the wrong thing although he was in control. This illustrates to the reader that it was the persona’s own fault and his decisions lead to his injury. He can’t blame the military for being â€Å"legless† although â€Å"smiling† and â€Å"lie† indicate his bitterness towards the commanders. Alvi portrays an image of the persona â€Å"hands outstretched† which shows that she is longing for this and is not in control although she is fighting from having her identity evade her again. She was not given a choice. This contrast makes Owen’s persona appear wasteful as he threw away his youth whereas Alvi has lost something she cares about. Alvi creates a subtle amount of pathos throughout the poem whereas we feel pathos for the persona in â€Å"Disabled† as he is having the realisation and it is already too late.