Wednesday, November 27, 2019

Affirmative Action Essays (2272 words) - Social Inequality

Affirmative Action Essays (2272 words) - Social Inequality Affirmative Action Affirmative Action Affirmative action has been the subject of increasing debate and tension in American society. Affirmative action is the nations most ambitious attempt to redress the issues of racial and sexual discrimination. According to the University of Rhode Island, Affirmative action is defined as, the specific actions in recruitment, hiring, upgrading and other areas designed and taken for the purpose of eliminating the present effects of past discrimination, or present discrimination (www.riuniversity.edu , 8). This allows minorities and women to be given special consideration in education and many other areas. The need for affirmative action is essential to college admissions credentials. Institutions with affirmative action policies generally set goals for increased diversity and equal opportunity among minority students. Our society is not one of equality, but affirmative action provides a way that problems with inequality can be address to the public. Minorities such as African-Americans, Asians, and Hispanics live mostly in urban areas that have large populations. Therefore, many minorities normally attend lower quality schools. Colleges usually do not take into account that students come from different backgrounds and different quality schools. The students that have better intermediate and secondary schools have an advantage in college admissions, which exclude many minorities. Affirmative action helps students who come from a lower quality secondary school to have a chance to prove themselves in accredited college. Another advantage of affirmative action is that it provides an environment of diversity. Diversity is essential to colleges and students. As part of higher education, students learn from face-to-face interaction with faculty member and other students to work productively inside and outside the classroom. Racial diversity can enhance college atmosphere by improving communications. It can also develop understanding among individuals of different races. Affirmative action can help students overcome prejudices when students discover just how much they have in common with their peers from other races. The educational benefit of affirmative action is that majority of the students who has previously lack significant direct exposure to minorities, frequently have the most to gain from interaction with individuals. Diversity on college and university campuses may be something that helps people expand their mind, or be open to new opportunities. In the article Needed documentation of how affirmative action benefits all students, it discusses how it is essential t colleges and students to have minorities on the campuses (6). In the section, The Evidence for Diversity: Then and Now, it states: In Justice Powells opinion, Baake relied heavily on the Harvard Plan. The admissions policy of Harvard College include justification for considering race as one of many factors used in deciding whom to admit. The plan stated that of Harvard College is to continue to offer first rate education to its students, minority representation in the undergraduate body would be ignored (2). Justice Powell went on to support diversity plan, which was in 1978. I the seventies, the same things were happening as it is today. People were fighting to have their race or someone elses as a factor in college admissions. Although this happened at Harvard in 1978, it continues today all over the United States. The article goes on to state that twenty years later much has changed, yet we still rely on anecdotal evidence to support the claim that a racially diverse student body is essential to quality education (2). Affirmative action dealing with college is still trying to make campuses a more diverse place with a racially diverse student body. Admitting someone into college or a university because they are smart, not only gives them a chance to be someone, but it also allows that campus to be diversified. In the article, Diversity Fades on Campus, it says schools routinely make exceptions for jocks, the children of big donors and alumni, and friends of power brokers. So why shouldnt these same schools be allowed to make exceptions for minority students. Minority students need the same advantages as jocks or students of big donors to have an equal opportunity in school. Affirmative action gives the same exceptions that some students who arent minorities receive t get into college. According to Jackie Snow in the article The Positive Aspects of Affirmative Action the author states that minority and women remain economically disadvantage.

Saturday, November 23, 2019

Building an Effective Plan of Improvement for Teachers

Building an Effective Plan of Improvement for Teachers A plan of improvement can be written for any teacher who performs unsatisfactorily or has a deficiency in one or more areas. This plan can be stand-alone in nature or in conjunction with an observation or evaluation. The plan highlights their area(s) of deficiency, offers suggestions for improvement, and gives a timeline in which they must meet the goals set in the plan of improvement. In many cases, the teacher and administrator have already had conversations regarding the areas that need improvement. Those conversations have yielded little to no results, and a plan of improvement is the next step.  A plan of improvement is intended to provide the teacher with detailed steps to improve and will also provide critical documentation should it become necessary to terminate the teacher. The following is a sample plan of improvement for teachers. Sample Plan of Improvement for Teachers Teacher: Any Teacher, Any Grade, Any Public School Administrator: Any Principal, Principal, Any Public School Date: Friday, January 4, 2019 Reasons for Action: Performance Deficiencies and Insubordination Purpose of the Plan: The purpose of this plan is to provide goals and suggestions to help the teacher improve in areas of deficiencies. Admonishment: Area of Deficiency Instructional IneffectivenessUnsatisfactory Teaching PerformanceWillful Neglect of Duty Description of Conduct or Performance: I have formally and informally visited Mrs. Teacher’s classroom several times since the beginning of the school year. Most every time Mrs. Teacher has been sitting at her desk, students have been working on worksheets, writing spelling words, etc. I have seen very little teacher instruction occurring and when I have seen instruction it has been a review of previously learned concepts, rather than new information.During my observations, I have noticed that the students are not involved in learning. Most seem disinterested in the classroom proceedings, and many of them hardly bother to go through the motions of responding when called upon by Mrs. Teacher.On Wednesday, December 19, 2018, I walked into Mrs. Teacher’s classroom and noticed the students were left in there unattended. Mrs. Teacher left the classroom to grab a cup of coffee and to use the bathroom and did not have anyone watch her classroom.On, Friday, December 21, 2018, I visited Mrs. Teacher’s classroo m three times throughout the day with the visits lasting about 10-15 minutes each time. When I entered the classroom all three times, Mrs. Teacher was at her desk, and the students were working on worksheets. Many of the students seemed bored and disinterested with their work. On occasion, a student would go up to her desk for help, and she did get up on one occasion and walk around the room monitoring the students’ progress. Assistance: Mrs. Teacher must receive prior administrator approval before leaving her classroom while students are in the classroom.Mrs. Teacher will be given several articles that provide successful tips for classroom management, motivation techniques, and instructional strategies.Mrs. Teacher will be required to observe another designated teachers classroom for one hour on Monday, January 7, 2019, from 8:30 – 9:30 a.m. and again on Thursday, January 10, 2019, from 1:15 p.m. – 2:15 p.m. The other teacher is a veteran teacher and does a fantastic job motivating and instructing students.Mrs. Teacher must not leave any students without adult supervision during any part of the school day. Timeline: This plan of improvement will remain in effect for three weeks, beginning Friday, January 4, 2019, and ending Friday, January 25, 2019. Consequences: This is a plan of improvement that highlights your deficiencies as a professional educator. These are serious enough to admonish you and give notice of deficiencies in the areas listed above. Failure to correct these deficiencies will result in a recommendation for your suspension, demotion, non-reemployment, or dismissal. Delivery Time to Respond: This plan of improvement was delivered in a meeting with Mrs. Teacher on Friday, January 4, 2019. She has until Friday, January 11, 2019, to sign and return a copy of the plan of improvement. Formative Conferences: The initial conference to go over this plan of improvement will be on Friday, January 4, 2019. We will have a review conference on Friday, January 25, 2019. This conference will be used to review and discuss the progress Mrs. Teacher has made towards the provisions listed in this letter of admonishment and plan of improvement. Signatures: ______________________________________________________________________  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Any Principal, Principal, Any Public Schools/Date ______________________________________________________________________  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Any Teacher, Teacher, Any Public School/Date I have read the information outlined in this letter of admonishment and plan of improvement. Although I may not agree with the assessment of my supervisor, I understand that if I do not make improvements in the areas of deficiency and follow the suggestions listed within this letter that I may be recommended for suspension, demotion, non-reemployment, or dismissal.

Thursday, November 21, 2019

Damas Jewellery Coursework Example | Topics and Well Written Essays - 1500 words

Damas Jewellery - Coursework Example The prime objective behind implementation of the strategies is to amplify the productivity and market share of Damas Jewellery as compared to many other rival players. In addition, by evaluating the upcoming opportunities, the organization might plan its approaches in an efficient way so as to enhance its customer base and position that may restrict the entrance of other new players. Damas Jewellery has positioned itself as one of the reputed international Jewellery and watch retailer, being headquartered in the region of Dubai of United Arab Emirates. The organization came into existence in the year 1907 and within few years, it expanded itself in more than six countries such as UAE, Bahrain, Qatar, Kuwait, Oman, Saudi Arabia and others. It mainly specializes in artistic jewellery of gold, diamond and pearls as well as designed watches. Damas Jewellery includes various brands such as Ananya, Farasha, Hayati, Mira, spring, Farfasha, Fior, Legacy, Navaratna, Rangoli, as well as many international brands like Baraka, Givori, Utopia, Garrard and others. All the above mentioned brands are available in all the 300 stores of Damas Jewellery and it tries to offer them at best prices. Moreover, the organization also tries to design, develop as well as distribute gold and diamond jewelleries to different parts of the world and as the organization desires to sell the jewelleries directly to the customers with the help of jewellery galleries, art fairs, shows as well as online sites so its rate of accessibility is extremely high as compared to many others jewellery retailers. The company also tries to sell its designed goods through B2B retailer, franchises as well as distributors. Therefore, these types of selling strategies provide highest advantage to the organization that amplifies its total sales and profitability as compared to other rival players. Damas Jewellery became successful in amplifying its customer base as it

Tuesday, November 19, 2019

Motivation and job satisfaction Literature review

Motivation and job satisfaction - Literature review Example Pizam (2005) noted that process theories are based on certain theories that include expectancy theory (1964), goal-setting theory (1990), cognitive evaluation theory, equity theory and reinforcement theory (1974). The process theories assist in having adequate understanding about the factors accountable for motivations and determining cognitive processes of an individual (Pizam, 2005). The definition of motivation has been identified to be explained by different authors in different context. According to Singh & Tiwari (2013), term motivation is defined as a method, which accounts the intensity, direction along with determination of practices of an individual towards a postulated goal. According to the study, it has been perceived that the degree of motivation of any individual or group varies in accordance with various influencing factors such as type of practices and time. Theory of motivation comprehensively includes three key determinants, including intensity, direction and persistence (Singh & Tiwari, 2013). Moreover, the study of Brown & Sargeant (2007) also suggests that term motivation is often characterised into two major categories such as extrinsic and intrinsic motivation. The concept of extrinsic motivation denotes the rewards that are tangible, including monetary benefits, promotion, security and conditions among others. On the other hand, the concep t of intrinsic motivation significantly defines the intangible rewards such as psychological appreciation, promotional rewards along with various types of approvals and admirations among others (Singh & Tiwari, 2013; Brown & Sargeant, 2007). In a sociological context, the theory of motivation is defined differently than the other area of interest. In this context, Zalenski & Raspa (2006), motivation is defined as a way where an individual is satisfied by addressing his/her different types of basic needs in his/her day-to-day life. The

Sunday, November 17, 2019

Shark evolution Essay Example for Free

Shark evolution Essay Sharks, commonly referred to as fish are in fact quite different from the regular bony fish. Sharks have a cartilaginous skeleton, which is does not fossilize well, but despite this sharks have left a considerable fossil record. Shark evolution is in fact one of the most successful cases of phylogenic development. The evidence of sharks dates back to over 400 million years ago, almost 200 million years before the first dinosaurs, and before the evolution of any land vertebrates, in the Ordovician period, at the start of the Palezoic era. The only fossils of the oldest sharks are the scales and teeth, the teeth being quite durable and easily mineralized. The teeth in particular reveal that the oldest sharks were quite different from their modern descendants. And even through vertebrates like dinosaurs were eliminated centuries ago, sharks continue to exist today, with almost 1100 species. Among the most primitive sharks was the Cretaceous, discovered in Texas. The Cretaceous is believed to be about 65 million years old. The earliest life on earth dates back to almost 4 billion years ago, to a group called the prokaryotes, which includes the first bacteria. The prokaryotes did not even have a defined nucleus. The oldest eukaryotes, which were more advanced, and had specialized organelles evolved about 2 billion years ago. These included the famous amoeba. But the first multicelluar life form dates back to about 600 million years ago, to the â€Å"Edicarian assemblage† in Australia. Jawless fishes are believed to be the first vertebrates to have evolved, and date back to about 500 million years ago. Sharks then appeared about 450 million years ago. But even though paleontologists have considerable evidence, shark evolution posed many problems because of the fossils. With time, most of the evidence was eliminated. The scales are mostly very small in size, and have many impressions of soft tissues. But despite these drawbacks, studies reveal a rich history. The oldest shark scales go back to about 455 million years ago. But since they are quite different from those in modern sharks, most paleontologists agree that they are not from sharks. The first acknowledged fossil dates back to 420 million years ago in Siberia. These have been classified under the genus of Elegestolepis. Others, discovered from Mongolia have been classified in the genera Mongolepis and Polymerolepis. But apart for these almost classifications, little is actually known about these primitive sharks. But with the beginning of the Devonian period, shark record becomes quite varied. The first teeth of about 400 million years ago were discovered from Europe. These teeth belong to the ancient Leonodus. Leonodus had characteristic double cusped teeth. The oldest shark cranium was discovered in Australia, and dates back to about 380 million years ago, and is believed to be from a shark specie xenacanth. Earlier in fact the Leonodus and xenacanth were thought to be related because of their similar crown shaped teeth. The first partially fossilized shark shark was discovered by a geologist Gavin Young in Antarctica. But this fossil displayed an odd mix of features. Possibility exists that this too may be a xenacanth, but Young named it Antarctilamna. The Antarctilamna was 16-inches long, and was a diplodont, resembling the xenacanth. Antarctilamna’s fin though was directed dorsally. The xenacanth in contrast was exclusively a freshwater shark, and had a long fin directed rearward, just behind the cranium. But with the passage of time, sharks have endured tremendous changes of environment, and yet, have managed to survive. But like all other creatures, the species had to either adapt to the change, or end. Each time a large scale shift occurred; a number of species found the new environment incompatible and became extinct. Sharks though displayed immense diversity, and helping then expand into new habitats. â€Å"Such explosive increases in variety are termed ‘adaptive radiations[1]. ’† Over such a huge span of geologic time, sharks have has two adaptive radiations, and have survived up to five mass extinctions. Many also agree that since most shark fossils have been found either from Australia, or Antarctica, sharks may have originated in the southern hemisphere. The first radiation was in the Carboniferous period, roughly 30 million years ago. This was characterized by the flourishing of the stethacanthids. The second major radiation occurred in the Jurassic Period, about 170 million years ago. During this time both land and air was dominated by reptiles. This was the time when the hybodonts developed. Many believe that the hybodonts were the ancestors of all modern sharks, but evidence is scanty. While the hybodonts shows many obvious similarities to the modern shark, it has characteristic features not found in sharks today. One of these includes the horns behind the eyes. But now, the earliest known modern shark is believed to be the Mcmurdodus from the mid-Devonian time. The basis for this is the Mcmurdodus tooth. The tooth shows is of the same type found in modern sharks, but not in the ancient ones. But â€Å"there is a 190-million-year gap in the fossil record between the last Mcmurdodus and the first unquestionable cowshark [1]. † Even though research continues to unveil the evolution of this epic animal, a complete evolutionary record is difficult to draw. The earliest known sharks in fact were quite different from the modern counterparts. But in some respects they were very close to the modern sharks of today, having the same cartilaginous skeletons, replaceable teeth and multiple gill slits. And with time sharks have endured great geologic change, adapting to different environments, evolving to change, and have thus survived as one the most durable animals on the planet. References 1. Martin, R. Aidan. ReefQuest Centre for Shark Research. Biology of Sharks and Rays. Retrieved from (http://www. elasmo-research. org/education/evolution/evol_s_predator. htm)

Thursday, November 14, 2019

steves tees :: essays research papers

Steve decided to open his own tee- shirt shop, near a local university. He felt it was the perfect time to start his own business, due to the location and the fact that the summer Olympics were being held 55 miles away in Atlanta. Wow! What a great opportunity it was, for him to take initiative to become his own boss, gain exposure, and become profitable. The only problem was that Steve did not take into consideration any concerns with starting a business, which include: geography, a market for this product, competition/ who are the major competitors, uniqueness, etc. This all could have been done through generating information to aid in making marketing decisions. This process includes specifying what information is required, designing the method for collecting information, managing and implementing the collection of data, analyzing the results, and communicating the findings of their implications. In order to reduce the likelihood of failure, marketing research would provide the n ecessary information to reduce uncertainty. It helps to focus on decision making. So, prior to Steve opening the business, he should conducted exploratory research. Steve needed to acknowledge the situation, screen any and all alternatives, and discover new ideas to make his business stand apart from the competition. This research could have been conducted through focus groups, surveys, questionnaires, etc. The purpose of this marketing research is to narrow the scope of the research topic and to refine the problem into researchable form. Therefore, Steve would have been able to answer who, what, when, where, and how questions; identify the channels of distribution; and to target the market for advertising and promotions.   Ã‚  Ã‚  Ã‚  Ã‚  Promotion is one of the four elements of the marketing mix. It increases company sales by communicating product information to potential customers. Unfortunately, the advertising route Steve took did not help to generate sales. Steve should have recognized the four basic parts of any promotional effort, which include personal selling, advertising, publicity, and sales promotion. Steve solely focused on advertising in selected newspapers, but he failed to realize that everyone does not read the newspaper. If he wanted the business to appeal both to the college students and to the people of the town, he should have done several different types of promotions. He could have done direct promotions, where he and an employee would go into the community and pass out flyers to gain better exposure for the business.

Tuesday, November 12, 2019

Effect of supply and demand and gas in our lifetime Essay

Oil has been an integral socio-economic vehicle which within the corporate scene remains a highly competitive socio-economic driver. Due to vast uses and demand, oil has become controversial and elastic in socio-politics. Here we see it causing socio constraints in oil producing countries and collapsing political institutions. Socially oil has a significant contribution in our general lifestyle. It has a comparative role within the context of mobility and industrial function where it is used in factories as well as in institutions which use combustive machinery. It is a determinant of economic prowess of a country. It plays a major role in research and advancement of power generation and use of bio fuels to ease environmental pollution. Gas is valuable in our lives based on the fact that it eases the burden of power use in cooking and within many socio institutions especially within our families. Gas also has been highly competitive and still remains so with many countries seeking to sustain demand. Recently European countries grappled with Russian company Gazprom over supply of gas when the company threatened to cut supplies. This paper reflects on the major effects of oil and gas on our lives in various aspects of socio-economics and its profundity. This profundity establishes the oil and gas use and contribution to socio-economics and politics. This analytical review covers environmental, political and research contributions, so as to keep sustenance of the same at per with developments in the technological trends within our lives which drain energy resources and adversely effect socio-economic stability. Contribution to socio economics Economic growth is dependent on energy resources. Energy supply within the development perspectives of a nation deplete economic recession and create more apertures for industrial progression in the nation. The distribution of resources within this economic perspective contributes to social –economic growth due to the dissemination of the resources made and gained from the industrial progression. Socio-economic progress is what supports the constituents of the society, namely the family. Most families own vehicles, machinery and combustive equipment that require oil to run them. They own various oil consuming devices like generators which they use to get power and run their daily activities. This perspective of integrating resources based on oil based contribution and importance is indicative of the pivotal role oil plays in the economic progression of a nation and a community. On the negative aspect, oil has very diverse negative effects on social economic gains and has led to the disintegration of economic stability within the units of the society. Increase in oil prices leads to stifling of social economics due to constrained spending so as to meet the higher cost of fuel. This constraint forces individuals to over spend and increased prices of goods and services. The effect spreads within the society to the most unfortunate and stirs unrest due to the high prices. On the same aspect oil has been a very competitive socially owned natural resources which in as many countries has caused political divisions and social disintegration. Communities in developing nations have been embroiled in long civil wars like in Nigeria. Nations with superior industrial needs have sought after taking advantage of lesser nations to establish forced oil drilling concessions so as to have a monopoly in the production of oil and directly befit their economic needs while hurting that of the producing country. The performance of the portfolio might be measured by the effects of changes in energy costs and availability of energy on the economy. Another portfolio measure might be the effects of the mix of energy sources on the diversity and vulnerability of the supply. Generating Electric Power in the Pacific Northwest: Implications of Alternative Technologies Christopher G. Pernin, Mark A. Bernstein, Andrea Mejia, Howard Shih, Fred Rueter, Wilbur Steger 2002. p 15 Effect on Resources Drilling oil has led to dilapidation of natural resources like forested land, marine resources and agricultural land. The effect on these natural resources is basically destruction of their existence so as to create sufficient exploration and drilling acreage. To excavate gas or oil, exploration and seismic survey has to be conducted on very significant area of acreage which completely reduces this area to a wasteful land for many years. The long term effect is that, the existing resources and land itself becomes wasted and polluted due to activities involved to get the gas or oil out. However there are positive attributes that come along with oil and gas production. There creation of jobs on these areas benefits local and professionals who have relevant experience and knowledge on the activities related to drilling and producing oil and gas. Creation of infrastructure and connection to electricity grids become the positive effects on the resources which can be utilized within the region the drilling or production is on going. The resources, like agricultural activities directly benefit from these changes and developments. Existing coffee factories get a boost to revert from using diesel engines to electricity. Communities are connected to the electric grid and can access electricity. Industries come up and processing of natural resources become easier. Proved reserves are both drilled and un-drilled. The proved drilled reserves, in any pool, include oil estimated to be recoverable by the production systems now in operation, whether with or without fluid injection, and from the area actually drilled up on the spacing pattern in effect in that pool. The proved un-drilled reserves, in any pool, include reserves under un-drilled spacing units which are so close, and so related, to the drilled units that there is every reasonable probability that they will produce when drilled. Bruce C.  Netschert The Future Supply of Oil and Gas: A Study of the Availability of Crude Oil, Natural Gas, and Natural Gas Liquids in the United States in the Period through 1975: 1958. p 7 Development of alternative fuels Oil and gas have led to positive research on energy needs globally. Companies and researchers have been seeking best solutions to the waning supplies and deposits of gas and oil to curb the eminent collapse of the supply and demand. Discovery of coal mines, use of electric car and trains development of alternative oil are diverse developments all based on the oil and gas supply and demand agenda. According to arguments based on the global perspective on demand and supply of gas and oil, it is questionable and much worrisome ‘Are resources likely to be available during the next fifty years in the quantities necessary to satisfy projected demands without substantial increases in prices? If not, what price in- creases are likely to be necessary to close the gap between supply and demand, and what are the effects of those increases likely to be? Ronald G. Ridker & William D. Watson: To Choose a Future: Resource and Environmental Consequences of Alternative Growth Paths. 980. p 96. Negative effects of the demand and supply is mainly seen within the oil curtails and supply context. International oil curtails have a stranglehold on the oil and gas prices and the effect of alternative oils becomes less dynamic and progressive stifling efforts to stipulate best policies to use to achieve the required progress in alternatives is slow. Implementation of development of alternative oils and energy resources has been ongoing. Creation of biodegradable oils has resolved much of the fears that demand would become elastic. Environmental effects Global warming and environmental degradation consequences on the flora are as a result of a lot of oil and gas exploration activities. Secondly the use of oil and gas in industries and within the concepts of combustion has led to degradation of the environmental. Industrial effluent related to oil has destroyed the flora while gaseous emission like carbon emissions from vehicles and industrial machinery has destroyed the ozone layer resulting to global warming. There are literally no positive implications on the environment by oil and gas. However on the profound aspect of research advancing of technology to improve on the air and to maintain a level of complacency within the ozone layer has led to discovery and global use of green houses and introduction of policies which reflect on addressing how to stop global warming. Governmental and geo-political effects A lot of the current crisis within the global fronts is based on escalation of demand of oil and gas by major world like the United States. The demand for energy, especially based on oil supplies has become un-foreseeable, as such the need to have vast reserves of oil within proximity as insulation to the critical point of demand and elasticity of demand is important. Non-Marxist social science, needless to say, had to contend with the reality, where incidents of collective violence were taking place all around. Facing this contradiction between their theory and reality, a compromise was reached by which it was hypothesized that anti-systemic conflict was only a temporary situation. This situation, they argued, would be symptomatic of the Third World nations going through a structural change. Structural change caused by the introduction of â€Å"economic development† and a new production relationship calls for the end to the traditional social and economic relationship. Dipak K. Gupta: The Economics of Political Violence: The Effect of Political Instability on Economic Growth. 1990 p 31 The issue here is that political prowess has influenced a lot of political inclinations in various nations within the world. On the same context, government policies to curb oil prices and to have reserves for future use have become null and wavering. The community within these jurisdictions suffer fluctuating oil prices and there is no consistency in the pricing hence the problem of constantly adjusting to the new prices due to lack of legislation. Political problems have emanated from this point with extremist policies on invasion of natural resources and barrel prices becoming tools of stifling economic progress in the communities.

Sunday, November 10, 2019

An Introduction to the Im Profession and Ethics Paper

De La Salle University – Manila An Introduction to the IM Profession and Ethics Paper Presented to The Faculty of the College of Computer Studies De La University – Manila In Partial Fulfillment Of the Requirements for the Degree of Bachelor of Science of Information Systems By: Changcoco, Amos Dimla, Ysabel Nicole Ramchand, Pavan Tanchuling, Bianca Denise Tibayan, Jan Michael 1. 0 COMPUTER AND INTERNET CRIME 1. 1 Types of Exploits 1. 1. 1Virus It is a malicious code that is attached to a file or executable program that can hack the files of the victim’s computer and reformat, delete or modify the files.The virus is executed only when the file that contains the virus is opened or if the program with the virus is executed as well. It leaves infections as it travels from one computer to another. The spread of the virus relies on the users whenever users would use removable media devices, download or through e-mails. An example of a computer virus would be the Pikac hu virus which was the first computer virus directed to children. It was said that the virus started on June 28, 2000 from Asia or the Pacific Ocean region.The virus was an email titled, â€Å"Pikachu Pokemon† with the message, â€Å"Pikachu is your friend. † The email contained the image of the cartoon character, ‘Pikachu’ from the TV series Pokemon, with the message, â€Å"Between millions of people around the world I found you. Don’t forget to remember this day every time MY FRIEND. † The Pikachu virus infected only a few companies in the United States through Microsoft Outlook email attachments or through Microsoft’s Internet Explorer browser.The reason why only a few companies were harmed and why the virus was not as viral is that the virus was not coded properly and would ask the user if the virus can delete the files in the user. 1. 1. 2Worm A worm is a malicious code that is used for bringing down the computer system. A worm do es not infect files, however, it monopolies the computer’s CPU and operating system and is capable of deleting data and programs. It infects a computer by finding vulnerability in an application or operating system. A worm is self-replicating and uses a network to replicate itself to other computer.It does not rely on human interaction for spreading to other computers. An example would be the Morris Worm or also known as the Great Worm. Created by a Cornell University student named Robert Tappan Morris in the year 1968, the Morris Worm consisted of 99 lines of code. Robert Morris wanted to know how big the Internet was and made the worm to find the answer. It is noted that the creator did not have malicious intent in making this worm; however, the worm infected immense amounts of stability problems that made many systems unusable.The damage was over 6,000 infected UNIX machines which cost between $10,000,000 and $100,000,000. This example is an ethical dilemma because the cre ator did not have evil intentions in making the worm but did have bad effects on most people in America. This dilemma would be ethical based on the psychological egoism theory because Robert Morris acted on his selfish motive whether he should or not, which made him moral. Based on the hedonism theory, it was ethical of Morris because he was only doing his duty without knowing that his actions would bring upon negative effects. 1. 1. 3Trojan HorseNamed after the Trojan horse from Troy which was used to infiltrate the enemy’s territory through a disguise, the Trojan horse is disguised as something else (such as a program or file) but is actually a malicious code or may contain malicious code. Similar to viruses, a Trojan horse is executed when the file with the virus is opened or the program with the malicious code is executed also. A Trojan horse can do from light damages such as changing the desktop and the like, to threatening damage, such as deleting files, stealing data, or activating and spreading other malware, to the victim’s software.Trojan horses are also used to create a ‘back door’ in the operating system so that the hackers can access the system. However, the Trojan horse cannot duplicate itself nor it can self-replicate. It would need the user to spread to other computers. An example of a Trojan horse would be from the pirated version of Apple’s suite of software, iWork. iServices was the Trojan horse part of the pirated version of iWork, which would signal the hackers that the Mac is infected and the hacker has access to the system.This is an ethical dilemma because the people who buy pirated software such as the iWork do not know that there is a Trojan horse in the software. It was unethical of the sellers to place a Trojan horse in the software without the consent of their customers’ because deontology theory states that it was not the duty of the vendors to hack into the systems of their customers in th e first place. Another reason why it was unethical because of the theory of altruism because the interest of others was not thought about since many people will suffer due to the actions of the vendors.This is another reason why it is unethical, because of the utilitarianism, which is consequences-based. Lastly, the social contract theory states that the actions of the vendors were unethical because it is against the law to hack and infiltrate private property. Logic bomb is a type of Trojan horse that is triggered only by a series of specific events such as a specific sequence of keystrokes or a change in a file. 1. 1. 4Botnets A botnet is a network of infected computers that are controlled by bots.Named after the word ‘robot’, a bot is a type of malware that allows an attacker to take control of an affected computer. Criminal can take over the controlled computer such as sending out spam, spread viruses, attack computer and can even cause crime and fraud, without the owner knowing it. Bots are also called computer zombie because the computer has no control over its actions since hackers are in charge of its actions. 1. 1. 5Distributed Denial-Of-Service Attacks (DDoS Attacks) A Distributed Denial-of-Service Attack is when a malicious hacker controls computers through the Internet.It is an attempt in preventing the computer owner to use network resource or machine. It is composed of one or more people trying to disenable a certain host from being connected to the Internet. 1. 1. 6Rootkits The name rootkit comes from the two words ‘root’, which pertains to the point it attacks, which would be the administrator or the source or the root, and ‘kit’ because of the set of programs. A rootkit is a set of programs that enables its user to gain administrator level access to a computer without the user’s consent or knowledge.The owner of the rootkit is capable of executing files and changing system configurations on the tar get machine, as well as accessing log files or monitoring activity to covertly spy on the user's computer usage. It is hard to detect if a computer system has a rootkit malware. 1. 1. 7Spam E-mail spam is when e-mail systems send unsolicited e-mail to large numbers of people. Spam mostly comes off as cheap advertisements of strange products such as pornography, ‘get-rich-quick’ schemes and the like. Spam can also be used to deliver harmful worms or other malware. . 1. 8Phishing Phishing is an attempt to steal personal identity data by tricking users into entering information on a counterfeit Web site. 1. 2Types of Perpetrators 1. 2. 1Hackers and Crackers Hackers are people who test the limits of the system, find the â€Å"holes†, and check which data they could access. The knowledge that they get is actually obtainable in various media, usually the internet. They are not usually considered bad; but due to many of them who used such knowledge to cause harm to syst ems, the term became negative.A more appropriate term for these kinds of people is actually called crackers. 1. 2. 2 Malicious Insiders Malicious insiders are people who obtain goods, services, or property through deception or trickery, also known as fraud. In other words they lie to gain. 1. 2. 3 Industrial Spies Industrial spies are people who illegally obtain information from competitors for the benefit of their sponsor. The act is called industrial espionage and the opposite which is to obtain information legally is called competitive intelligence.In 1993, Opel accused the rival Volkswagen of industrial espionage after the former’s chief of production and seven executives moved to the latter company due to missing documents. (Julian, 2011) 1. 2. 4 Cybercriminals These perpetrators hack to the company’s system and will do anything with the information just to gain money. One of the most famous hackers of the world is Albert Gonzalez, who used hacking to steal and re sell millions of card and ATM numbers in a span of three years. He did this by attacking many systems which would eventually give him the information needed to steal the card numbers. Verini, 2010) Albert Gonzalez is in ethical dilemma because he used his skills to steal the information for money. Based on the deontological theory, it’s unethical because it is not the duty of hackers to steal information. Based on hedonism under the utilitarian theory, it is ethical because he found pleasure from the act. Social contract theory, however, makes this act unethical, and so does virtue theory. 1. 2. 5 Hacktivists and Cyberterrorists Hacktivists, combining the words â€Å"hacking† and â€Å"activist†, are people who hack to promote political ideology.Cyberterrorists attack to get the attention of the government as part of their political objectives. Anonymous is one of the most famous hacktivist groups due to their appearance on various media in which members appear wearing the Guy Fawkes mask. Their advocacy is to oppose the Internet censorship and surveillance, government corruption and homophobia. This is why they attacked several government sites. (Katich, 2013) The ethical dilemma the group faces is that they use hacking skills to infiltrate the systems yet they belong to the side of the people as their objective is to make the government hear their voice.This is ethical based on deontology because it is their duty to make the government listen to them their voice. This is also ethical based on the altruistic approach as more will benefit from their act. However, social contract theory states that it is unethical since this act has violated the law. 1. 3Laws for Prosecuting Computer Attacks 1. 3. 1Electronic Commerce Act of 2000 (RA 8792) 1. 3. 1. 1E-Commerce in Society The process of buying and selling goods electronically by consumers and from company to company through computerized business transactions.This act has the purpose of prote cting those who pursue business in electronic means through multiple communication networks through the Internet. 1. 3. 1. 2 Elements in the Law Electronic data messages – these are generally the information that is in every transaction of the business. Electronic document – these are the type of information specified with text, symbols, or other modes of written expression yet similar in nature with the electronic data messages. Electronic Signature – these are any distinctive marks that approve a transaction which are done by a person or an entity using electronic means. . 3. 1. 3Relation to other Laws Such laws that are affected with this are the Intellectual Property Rights, Copyrights Protection. These laws give protection to the parties involved in any business activities through electronic means. Fraud is also related as the government can charge you when you make accept payment illegally by disguising your site as a reliable option for payment. 1. 3. 1. 4 CASE in E-Commerce Censorship is very an essential tool to distinguish the moralities of websites and the cooperation of companies to acknowledge said moralities.In China, Google's operations created a storm of criticism when the company agreed to comply with the government's wishes and censor pro-democracy and other websites. In 2010, Google relocated its Chinese operations to Hong Kong, putting it outside China's censorship regime. Supporters of the decision say Google shouldn't cooperate with China's repressive policies, while critics say Google's withdrawal cut off millions of Chinese citizens from the company's services and weakens its presence in one of the world's largest markets. This case has very evident ethical issues including the move of Google to relocate its operations to Hong Kong.This made the jurisdiction of China’s censorship policy not reachable so that they can use their assets more freely. These however made the citizens of China that is inside the jur isdiction of the censorship policy long for their beneficial search engine. If seen in Google’s benefits this is a rather good trade for them to maximize the use of their services in a commercial area such as Hong Kong yet they could’ve served the citizens so they can keep up their reputation of improving life in the world and be consistent of the famous line â€Å"Don’t be evil†.I generally disagree with their decision to relocate as they could’ve followed the updated utilitarianism and give their services to those who would need them the most. Still they acted the ethical egoism to censor pro – democracy sites which are morally good to their perspective. 1. 3. 1. 5Another Example Including Google Google gathers incredible amounts of data on people who use its search engine. As of 2011, the company's website states that although it stores records of your searches as a tool to improve corporate efficiency, it renders them anonymous after nin e months and deletes cookies used to track visitors after two years.Governments could use Google's information to investigate individuals visiting particular websites, however, and Google Earth's photo collection also has raised privacy questions: In 2008, a couple sued on the grounds the online photos of their home violated their privacy, but a judge threw out the lawsuit the next year. This case is provides insight to how Google can be of every use to our society as they can help the government catch fugitives, suspects and criminals with their records of the searches of the every person using their search engines yet this leaves them to violate certain privacy issues when they abuse that kind of power.The lawsuit of the couple may be dismissed by a judge but their lawsuit are supported by ethical theories namely the rights – based theories which states that there are social contracts that should be acknowledged and that includes their right for privacy. They may be legal t o store records such as the photo from their Google Earth but they should have to limit their power to exercise their duty as they are also supported by the duty – based theories due to their daily or continual task of improving corporate efficiency as well as giving us access to unlimited knowledge. 1. 3. 2 Cybercrime Prevention Act of 2012 (RA 10175) 1. . 3. 1 Preliminary Provisions 1. 3. 3. 2. 1. 1 Brief History of RA 10175 Cybercrime Prevention Act of 2012 or also known as Republic Act No. 10175 was approved on September 12, 2012. This is first law in the Philippines which specifically criminalizes computer-related crimes. The Cybercrime Prevention Act in its current form is the product of House Bill No. 5808, authored by Representative Susan Tap-Sulit of the second district of Tarlac and 36 other co-authors. The final version of the Act was later signed into law by President Benigno Aquino III on September 12, 2012. 1. 3. 2. 1. 1 Declaration of PolicyThe main objective o f this Act is to protect the people from cybercrimes and also from the harmful effects associated with it. The state also aims to recognize the vital roles of information and communications industries in the country. The state also recognizes the need to protect and safeguard the citizens of the state, and also to protect the integrity of computers and its users. The state also wants to recognize the importance of providing an environment conducive to the development acceleration, and rational application and exploitation of information and communications technology. . 3. 3. 2. 1 General Provisions 1. 3. 3. 2. 2. 2. 1 Punishable Acts In this Act, there are 10 punishable acts indicated in the bill, and those punishable acts each have penalties that are associated. In the next sentences, the punishable acts will be discussed briefly. Offenses against the confidentiality, integrity, and availability of computer data and systems: A. Illegal Access – accessing a computer or a part of a computer without any right B.Illegal Interception – the interception made by the use of any technical device without any right of non-public transmission of datum to or from any computer system including electromagnetic emissions from a computer system carrying such data C. Data Interference – the intentional or any reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without any right including the transmission or transferring viruses into a system. One example is the ILOVEYOU message transmitted through electronic mail way back in the year 2000.D. System Interference – the intentional or any reckless hindering or interference with a functioning computer system, or a computer network by inputting, transmitting, damaging, deleting, deteriorating, altering, or supressing computer data or computer program without any right or authority in doing so. E. Misuse of Devices – the use of any material without any right of it. Acts like producing, manufacturing, selling, and distribution. F. Cyber-squatting – the simplest way is identity theft, using another individual’s identity to gain profit or scam other people in the internet.G. Computer-related Forgery – the illegal use of a computer into copying one’s work, and gaining illegal access to a computer to copy the content of a system or database. H. Computer-related Fraud – the unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system. I. Computer-related Identity Theft – the intentional acquisition, use, transfer, or possession of any identifying information belonging to another person, whether natural of juridical. Under these are Cybersex and Child Pornography. J.Libel –    defined as a public and malicious imputation of a crime, or of a vice or defect, real or imaginary, or any acts, omission , condition, status or circumstance tending to discredit or cause the dishonour or contempt of a natural or juridical person committed through a computer system or any other similar means which may be devised in the future. The above stated are the punishable acts by the law enforced and written in the bill, and these acts have corresponding penalties if have been proven to the court. The penalties include: imprisonment or a fine of at least two hundred thousand pesos (Php. 00,000. 00) up to a maximum amount commensurate to the damage incurred or both. Prison mayor is equivalent to imprisonment from 6 years and one day to twelve years. 1. 3. 3 Ethical/ Moral Dilemmas 1. 3. 4. 2 Situation A 16-year old male named â€Å"Josh Evans† was registered on the account used for bullying messages to a girl named Megan Mier. Lori Drew, the mother of Sarah, a former friend Mier, later admitted creating the MySpace account. She was aided by Sarah and Ashley Grills, an 18-year-old employee of the elder Drew.The senior Drew and several others ran the fake account, with an aim to get information about Megan and use that information against her and also for her to be humiliated. This caused spreading gossips about Megan, and thus creating a traumatic experience not only for her but also to her family. 1. 3. 4. 3 Analysing using the Four Major Ethical Theories A. Duty-based Theory According to the Duty-based theory, an act is considered ethical if it has good intentions. Given the situation, I can clearly state that it is not an ethical thing to do. Creating or spreading false rumours is not even close to be called as a good intention.Also, gathering information about a certain person is not ethical if it will be used against or be held against to a person. Using the Duty-Based Theory, I can clearly state that the situation of gathering information of Megan is not ethical because it does not serve a good intention. B. Utilitarianism According to the Utilitarianism Theory an act is only to be considered ethical if it produces desirable consequences or outcomes. The outcome of the situation stated earlier is that the experience Megan was traumatic not only for herself, but it also affected her family.Just by looking at this outcome, we can say that it is not also considered ethical in this theory, because of the outcomes that the actions of the group had caused not only their target but also the relationship of other people to Megan. C. Social Contract Theory According to the social contract theory an act is considered ethical if the act does not violate any rules or laws; according to the Civil Code of the Philippines: Persons and Family Relations, under Chapter 2 which is Human Relations the Articles 19, 20 and 21 discusses the different rights a person possesses and how a person should exercise his or her rights.Chapter 2 Article 19 presents the basic principles that are to be observed for the rightful relationship between human beings and the stab ility of the social order. Chapter 2 Article 20 presents that you are liable for any damage that you have caused to another person, whether wilfully or negligently. Chapter 2 Article 26 presents that right must never abused, the moment that it is abused, the moment rights are abused they ceased to right. D. Virtue According to the Virtue theory, the action that is considered to be ethical is when the action is came from a good moral principle.Looking to the situation, it is not an ethical thing to do because it does only harm the person involved but also the moral principles of the suspect is to be questioned. 1. 3 Trustworthy Computing 1. 4. 1 Microsoft’s 4 Pillars of trustworthy Computing The 4 Pillars of trustworthy computing help identify the key elements in computing especially in an organization with numerous employees to manage. Guidance is a key to help implement a good and stable system such as how the pillars guide not just Microsoft employees but users alike. 1. 4. . 1 Security Creation of a trust worthy environment for a safe computing environment 1. 4. 2. 2 Privacy The protection and confidentiality of design, development and testing in any organization is essential as to be part of the competitive market today. 1. 4. 2. 3 Reliability Working as expected or promised by the developers and their entity 1. 4. 2. 4 Business Integrity Being responsible and transparent in you duties and expectation as part of a work force that strives to be excellent a mistake is bound to happen.Admitting a mistake is the 1st step to a growing process of learning new things to come. 1. 4. 2 Risk Assessment It is the process of assessing security related risks to an organization’s computers and networks from both internal and external (Reynolds, 2011) A risk assessment is a process to identify potential hazards and analyse what could happen if a hazard occurs. (Federal Emergency Management Agency, 2013) The assessment would assure the IT security team that they will be ready when an attack comes because of the determined risk assessment they perform. 1. 4. 1 General Security Risk Assessment ProcessStep 1: Identify IT assets and prioritize ones that are of most importance Step 2: Identify the threats/risks that could occur Step 3: Assess the likelihood of threats Step 4: Determine the impact of each threat, how large to small is the impact if affected Step 5: Determine how each threat can be prevented/blocked Step 6: Which is the most effective prevention method Step 7: Perform cost benefit analysis before taking any action Step 8: Make the decision to implement or not to implement the decided risk prevention found through thorough research and development 1. 4. 3 Establishing a security policyDefines an organization’s security requirements, as well as controls and sanctions needed to meet those requirements. (Reynolds, 2011) A good security policy can possibly improve and provide a smooth flow of operations within an organizati on. NIST (National Institute of Standards and Technology) is a non-regulatory federal agency within the US department of commerce. The computer security division creates security standards for organizations to implement in their own system. 1. 4. 4 Educating the Employees, Contractor and Part-Time Workers Surveys show that most security problems come from negligence and unawareness of the security policies.Teaching good security practices like not giving out your passwords, making sure you do not meddle in different departments. Knowing the Dos and DONTs of everyday computing will help guide any workplace and direct them to the good ways of being a good user. 1. 4. 5 Threat Prevention The key to a threat prevention system are layers of security systems that challenge the perpetrator to hack into the system. Firewall – stands guard between an organization’s internal network and the internet Intrusion Prevention Systems – prevents an attack by blocking viruses, ma lformed packets and other threats from getting into a protected network.Antivirus software – should be installed on each user’s personal computer to scan a computer’s disk drives and memory regularly for viruses. User accounts that remain active after employees leave cause an uncertain threat to the company, IT staff must promptly delete and make sure to wipe out all the privileges of the former employee. The US-CERT (United States Computer Emergency Network Team) and SANS(SysAdmin, Audit, Network,System) Institute – regularly update a summary of the most frequent and high impact threats to a computer system specifically viruses and worms. . 4. 6 Security Audit An important prevention tool that evaluates whether an organization has a good security policy and if it is being followed. An example would be a requirement to change passwords every week or month with this in place a security for companies are much more protected compared to others without this r equirement. Basically to test, check and review the system’s security and look for loop holes and easy targets. 1. 4. 7 Detection The preventive measures made for a computer system is not always enough to protect important data.Intrusion detection system – is a software/hardware that monitors system and network resources, notifies a system admin when an intrusion occurs Knowledge based intrusion system – contains information about attacks and system vulnerabilities, then trigger an alarm (ex. Repeated login, repeated data events) Behaviour based intrusion system – compares users system behaviour with an admin created model that detects when a user is not following the required model, this would trigger an alarm. (Example: Unusual activity with an account in the HR department accessing the IT department’s data. 1. 4. 8 ResponseAn organization should be prepared for the worst, like a system attack that stops all operations and steals data from the co mpany. The top priority during an attack is not to catch the perpetrator but to regain control and save what is left. Who needs to be informed? And who not to notify? Reputation and credibility is at stake in any security breach. A company should document all details of a security breach and be able to review it after to assess and further study. Eradication of the damaged/breached information is essential but before everything a log is required to keep track 1. . 9 Ethical Moral Dilemmas You are a member of a large IT security support group of a large manufacturing company. You have been awakened late at night and informed that someone has defaced your organization’s website and also attempted to gain access to computer files containing a new product under development. What are your next steps? How much time would you spend tracking down the hacker? -Deontological 1. 5 References * (1999, 10). Electronic Commerce. StudyMode. com. Retrieved 10, 1999, from http://www. studymod e. com/essays/Electronic-Commerce-731. tml * THE ELECTRONIC COMMERCE ACT (R. A. 8792) AN OVERVIEW OF IT? S (INFORMATION TECHNOLOGY) IMPACT ON THE PHILIPPINE LEGAL SYSTEM(2005 006). ‘www. ustlawreview. com/pdf/vol. L/Articles/The_Electronic_Commerce_Act_RA_8792. pdf * What Is the Difference: Viruses, Worms, Trojans, and Bots? – Cisco Systems. (n. d. ). Cisco Systems, Inc. Retrieved from http://www. cisco. com/web/about/security/intelligence/virus-worm-diffs. html * What Is A Rootkit? (n. d. ). Internet / Network Security – Tips, Advice and Tutorials About Internet Security and Network Security.Retrieved from http://netsecurity. about. com/od/frequentlyaskedquestions/f/faq_rootkit. htm * Julian. (2011). 10 Most Notorious Acts of Corporate Espionage. Retrieved from http://www. businesspundit. com/10-most-notorious-acts-of-corporate-espionage/ * Katich, A. (2013). Anonymous (Annie Katich). Retrieved from http://socialactive. wordpress. com/2013/02/25/anonymous-annie- katich/ * Verini, J. (2010). The Great Cyberheist. Retrieved from http://www. nytimes. com/2010/11/14/magazine/14Hacker-t. html/

Thursday, November 7, 2019

Facts of Prayer in School essays

Facts of Prayer in School essays According to the First Amendment of the Constitution, Congress shall make no law respecting an establishment of religion or prohibiting the free exercise there of...(Patterson A-11). The writers of the constitution made it an important point in protecting freedom of religion. The writers then even stressed the importance of being able to be any religion that suited a person. The First Amendment removes government from the realm of religious belief and practice so that the state can neither subvert nor manipulate religion to serve secular, public ends(Keynes and Miller 177). It is pure ignorance for someone to think that one religion is accepted throughout the world. This very reason is why prayer should not be in school. When saying a prayer in an organized group at school, it is impossible to not discriminate against a persons religion. Allowing prayer in school is like losing a precious jewel that can never be found again. Prayer in school results in students losing their r ights, losing their sense of unity, and losing their strong beliefs of their faith. These are all things that once lost are difficult to find again. Students lose their religious rights when prayer is introduced in public schools. Many people dont understand the complexity of this issue and that it is not just about taking God out of school. As U.S. citizens, the First Amendment gives the freedom to believe in what people choose to believe in without being punished for their belief. The First Amendment was proposed to keep such occurrences such as prayer in school from happening. The Supreme Court has declared that the states can either compose a prayer or require school children to recite passages from the Bible or the Lords Prayer during the regular school day. Why should a Jewish child feel uncomfortable and humiliated in a school environment because of prayer? On June 20, 2000 the Supreme Court r...

Tuesday, November 5, 2019

Quotes for Thanking a Special Teacher

Quotes for Thanking a Special Teacher Just about everyone remembers some teachers more than others, and maybe one above all, who made an impact on not just what you learned, but who you are. Whether you see your favorite teacher every day or youve been out of school for many years, that teacher would for sure love to hear from you and know she is making or has made a contribution to your life. So go ahead, make a contribution to her life that is the verbal equivalent of an apple for your teacher. These quotes provide some inspiration, and at least one will fit the bill for your teacher and you.   Quotes for a Special Teacher Maya AngelouWhen you learn, teach. When you get, give. William Arthur WardFeeling gratitude and not expressing it is like wrapping a present and not giving it. Dan RatherThe dream begins with a teacher who believes in you, who tugs and pushes and leads you to the next plateau, sometimes poking you with a sharp stick called truth. Alexander the GreatI am indebted to my father for living, but to my teacher for living well. David O. McKayThankfulness is the beginning of gratitude. Gratitude is the completion of thankfulness. Thankfulness may consist merely of words. Gratitude is shown in acts. Henry AdamsA teacher affects eternity; he can never tell where his influence stops. Thornton WilderWe can only be said to be alive in those moments when our hearts are conscious of our treasures. Carl JungOne looks back with appreciation to the brilliant teachers, but with gratitude to those who touched our human feelings. The curriculum is so much necessary raw material, but warmth is the vital element for the growing plant and for the soul of the child. Charles KuraltGood teachers know how to bring out the best in students. Benjamin DisraeliI feel a very unusual sensation if it is not indigestion, I think it must be gratitude. Colleen WilcoxTeaching is the greatest act of optimism. Albert SchweitzerWe should all be thankful for those people who rekindle the inner spirit. Charles DickensNo one is useless in this world who lightens the burden of another. Marcel ProustLet us be grateful to people who make us happy; they are the charming gardeners who make our souls blossom. Victor HugoHe who opens a school door closes a prison. Marva CollinsThe good teacher makes the poor student good and the good student superior. William Arthur WardThe mediocre teacher tells. The good teacher explains.The superior teacher demonstrates. The great teacher inspires. Albert EinsteinIt is the supreme art of the teacher to awaken joy in creative expression and knowledge. Christa McAuliffe I touch the future. I teach.

Sunday, November 3, 2019

Risk management (casa study of British American Topacco Pls(BAT)) Essay

Risk management (casa study of British American Topacco Pls(BAT)) - Essay Example In the year 2009, the subsidiaries of the company enabled global governments to earn over  £26 billion in a financial year from taxes together with excise duty on their product. The subsidiary companies of BAT operate in 41 countries producing through 50 cigarette factories around 724 billion amounts of cigarettes. The company employs around 60,000 people globally. The organisational decisions are made keeping in view certain policies, strategies, standards, and delegated authorities. The benefit of local stakeholders to a business is the pivotal point in any organisational decision. The management of BAT is also conscious about their operating responsibilities as they produce products which pose risk related to the health aspects. The company works coherently with thousands of global tobacco farmers. These attributes have made the company a leading global giant in the tobacco industry. In this report, the inherent risks associated with any organisation will be analysed. Stakeholde rs’ benefit is a significant part of any business. They are generally concerned about their losses and gains from any business before investing in it. Therefore, the manager of any business has to try and mitigate any risks related to any business for shareholders to keep faith in the organisational business policies and initiatives and thus enabling them to consider making further investments into the business. The corporate governance process also is an integral part of any business organisation, as they have to carry out their financial activities as well as their organisational activities keeping in view the regulations of corporate governance (British American Tobacco, n.d.). Risk is an integral part of any business venture. Therefore, there is a need to properly manage risk in order to maximise the benefits from a business and reduce the damage which may be caused due to the risk associated with it. Risk management is a very

Friday, November 1, 2019

Environmental Pollution Scenario - Phoenix Area Essay

Environmental Pollution Scenario - Phoenix Area - Essay Example The essay "Environmental Pollution Scenario - Phoenix Area" discovers Environmental Pollution Scenario. Sustainability can only be ensured if all involved stakeholders are on board when decisions are taken and implemented. In order to take and keep all involved stakeholders on board, it would be necessary to keep their interests in view when taking and implementing such decisions. A total of seven measures have been proposed in order to deal with the pollution based problems faced by Phoenix, Arizona. However, not all of the proposed solutions are implementable within the constrained budget of $18 million. Therefore, only four of the proposed measures will be implemented in full swing while the remaining budget will be kept in place to cover contingencies such as escalation in costs or need for increased commitment. This proposal seeks to implement. The total cost for these measures adds up to $14.7 million and thus leaves $3.3 million for contingency measures. The first measure for pollution reduction will concentrate on encouraging alternative transportation measures in order to reduce the load on roads and to reduce the consumption of fossil fuels. The recent spike in car usage to commute around Phoenix is a major contributor to pollution in and around the district. Alternatively the focus could have been shifted to pollution control for point sources but these sources represent pollution creation that is comparable to the use of fossil fuels in vehicles. The inertia posed in point control would be too large.... Alternatively the focus could have been shifted to pollution control for point sources but these sources represent pollution creation that is comparable to the use of fossil fuels in vehicles (Newman & J., 1999). Furthermore, the inertia posed by affected businesses in point control would be too large to amount to something substantial. Hence, it was decided to vie for encouraging alternative transportation arrangements through a pervasive campaign based on public contact making. The next measure to reduce pollution is the promotion of fuel efficient cars. The contention here is to reduce the amount of fossil fuels being consumed in vehicles being used around Phoenix. In this fashion the amount of emissions produced by vehicles will reduce thus leading to reduced contribution for the greenhouse effect. In order to facilitate the transition to more fuel efficient vehicles, people buying more fuel efficient vehicles could be provided subsidies such as reduced taxes on fuel efficient ve hicles, reduced gasoline rates etc. There may be initial opposition from certain automobile dealers who deal with large gas guzzling vehicles but over time this is expected to subside. Moreover, the initial opposition to fuel efficient vehicles is expected to be insignificant compared to opposition for other measures (Nagurney, 2000). Also it is expected that automobile dealers will switch over to selling more fuel efficient vehicles once market demand for these vehicles rises. The third measure being planned is the development of green spaces or urban forestry in and around Phoenix in order to serve as natural barriers and filters for the pollution being produced. In addition the development of urban forested areas will ensure that the heat island effect is