Tuesday, December 31, 2019

The Conflict Between The Rwandan And Tutsi Ethnic Conflict

In Rwanda, the Hutu has come into much conflict since the 1990s. As the Germans and the Belgians colonized Rwanda, the favoritism of the colonizers created great ethnic divides within the country. These partitions ultimately became so profound that a violent genocide took place, turning countrymen against each other. The Congo was a nearby place for the violence between the Hutu and Tutsi to continue, while also becoming an important economic factor to the wealth of other nations. The colonization, genocide, and conflicts in the Congo all contributed to the major issue of racial segregation faced by the modern Hutus. The early colonization of Rwanda by the Germans and Belgians created the major internal conflict between the Hutu and the Tutsi. At the time of the Europeans arrival, Rwanda was made up of 85% Hutu, who were farmers, 14% Tutsi, who were cattle herders, and 1% Twa, the aboriginal people (Chrà ©tien 69). In 1890, Rwanda first became a colony of Germany, lasting until the end of World War I, when power was transferred to Belgium. Both of these colonies favored the Tutsi population (Staff  ¶2), because they believed that the Tutsi were more Caucasian and therefore superior in intelligence to the Hutu (Jones 17). During this time, the Belgians oversaw a land reform process by the Tutsi, which seized control of farmland that had been under the control of the Hutu, without providing them with substantial compensation (Prunier 28). This favoritism planted the seed for theShow MoreRelatedMovie Analysis : Hotel Rwanda1519 Words   |  7 Pagesfactors at the center of the violence, leading to popular opinion of the Hutu population as barbaric and uncivilized and the Tutsi as innocent liberators. The film is historically accurate with respect to its representation of the physical similarities between both populations, as well as its depiction of the Hutu and Tutsi living in harmony prior to the assassination of the Rwandan president. Despite these accuracies, Hotel Rwanda fails to capture the true matrix of economic, political and historicalRead MoreConflict Is A Old As Mankind1230 Words   |  5 Pages Conflict is as old as mankind. The root of conflict lays in the development of insecurities arising out of jealousy, disagreement, injustice, discomfort, competition in the relationship of two or more groups or persons. According to the Dictionary meaning Conflict refers to some form of friction, disagreement, or discord arising within a group when the beliefs or actions of one or more members of the group are either resisted by or unacceptable to one or more members of another group. When weRead MoreA Look at the Rwandan Genocide Essay1014 Words   |  5 Pagescountry until the Civil war started. Belgium then took over Rwanda and put the Tutsis in charge of the government because they had more European characteristics like the Belgium population (Anderson 1). This upset the Hutus, so the Hutus then blamed the Tutsis for the president’s assassination. The Rwandan genocide then started on April 6, 1994. It lasted for 100 brutal days. The Hutus then began to slaughter the Tutsis because there was no government control, so it was a perfect time to rebel. ThereRead MoreAnalysis of Hotel Rwanda directed by George Terry1178 Words   |  5 Pagesgenocide occurred between people with different tribes. The film by George Terry also shows whether the role played by the international organization which is United Nations (UN) is effective in order to control the conflict that has killed a lot of people and the concern of the world about the incident. The history and relationship between Hutu and Tutsi As we look back to the 14th century of Rwanda, the indigenous people of that region composed of Hutu and another ethnic group which isRead MoreCase Study: Rwanda Genocide Essay1563 Words   |  7 PagesStudy: Rwanda The conflict in Rwanda is probably the most well known and documented case of genocide since the holocaust. Through years of discrimination based on ethnic and class based differences, the population of Rwanda has been constantly entrenched in periods of fighting, refuge and genocide. In the following essay we will explore the background of the conflict. Specifically the historical implications, the parties involved the reasons for the fighting and the result of conflict. Next we willRead MoreGhosts of Rwanda Essay1374 Words   |  6 Pagesin Rwanda in 1994 was due to years of built up hatred between the Tutsis and the Hutus along with many other occurrences. The Rwandan Genocide is no exception with many variables contributing to the horrific events that took place. According to the documentary Ghosts of Rwanda, in 1994, Rwanda experienced a premeditated, systematic and state sponsored genocide with the aim of exterminating those who were ethnically identifiable as Tutsi. Between 500,000 and 800,000 people were killed in a period ofRead MoreThe Rwandan Genocide : A Perspective Analysis Through Media1166 Words   |  5 PagesJordon Jones Genocides in Comparative Historical Perspective 01:090:292:01 Professor Douglas Greenberg Final Paper 6 December 2015 The Rwandan Genocide: A Perspective Analysis Through Media â€Å"The Tutsis are collaborators with the Belgian colonists. They stole our land. They whipped us. Now they have come back, these Tutsi rebels. They are murderers. They are cockroaches. Rwanda is our Hutu Land. We must squash the infestation. This is RTLM, Hutu Power Radio. Stay Alert. Watch your neighborsRead MoreWhat was the Cause of the Rwandan Genocide?1116 Words   |  5 PagesPlan of Investigation What was the cause of the Rwandan Genocide? The assassination of the president of Rwanda, Juvenal Habyarimana on April 6, 1994, was the event that started the 100 Day massacre of the Tutsis by the Hutus, known as the Rwandan Genocide. The objective of this investigation is to find out the root of the cause of the Rwandan Genocide. The body of evidence will investigate the history of the conflict between the Hutu and Tutsi ethnic groups and the events leading up to the genocideRead MoreThe Conflict Of The Rwandan Civil War889 Words   |  4 Pagesin ethnic cleansing of the weaker group. Kenneth J. Campbell, Associate Professor Emeritus at University of Delaware, claims that â€Å"In 1992, Rwanda’s population was about 9.2 million with 83 percent Hutu and 17 percent Tutsi. However, half the Tutsi population was in exile† (73.) My claim is that the Rwandan Civil War was a fault line conflict and catalyzed the genocide between the two ethnic groups of the Hutu, and the Tutsi. The Belgian colonial power influence that was left for the Rwandan peopleRead MoreThe Conflict Of The Rwandan Civil War887 Words   |  4 Pagesin ethnic cleansing of the weaker group. Kenneth J. Campbell, Associate Professor Emeritus at University of Delaware, claims that â€Å"In 1992, Rwanda’s population was about 9.2 million with 83 percent Hutu and 17 percent Tutsi. However, half the Tutsi population was in exile† (73.) My claim is that the Rwandan Civil War was a fault line conflict and catalyzed the genocide between the two ethnic groups of the Hutu, and the Tutsi. The Belgian colonial power influence that was left for the Rwandan people

Monday, December 23, 2019

Economic Networkingâ€Exploring Alternatives for Promoting...

Economic Networking—Exploring Alternatives for Promoting Sustainable Development in Africa INTRODUCTION The history of European aid intervention in the African, Caribbean and Pacific (ACP) states has traditionally acted to reinforce the hierarchical distinction between the â€Å"developed† and the â€Å"developing† world. The series of Lome Conventions which granted preferential trade agreements between these groups of countries have proved ineffective in encouraging economic sustainability in the ACP states, and although the ACP includes most of the Least Developed Countries (LLDCs) in the world, the agreements have been criticized as being unfair in the global context. Under pressure to negotiate a new ACP-EU agreement that would be†¦show more content†¦The end of World War II, the formation of the United Nations and increased sense of nationalism worldwide prompted the end of colonialism. During the surge of independence movements in the late 1950s and early 1960s, Kwame Nkrumah led 32 African nations to form the Organization of African Unity in May 1963 (â₠¬Å"Creation of the OAU). The OAU aimed to promote unity on the continent in order to support the political and economic autonomy of the newly independent African countries and ensure that Africa had a strong voice in the global arena. Around the same period, the formation of the European Economic Community (EEC) and the ACP introduced channels for international collaboration (See Figure 1). The first official move by the EEC to develop a consistent strategy for allocating aid to ex-colonies was enacted in the Yaonde Convention of 1963, which targeted African countries. The first Lome Convention of 1975 addressed the larger group of ACP states (See Figure 2). Although the notion of economic reparations was offered as partial motive for negotiating these agreements with the newly independent states, one of the main incentives for European countries was the establishment of a consistent source of raw materials and a stable market for the export of mining machinery andShow MoreRelatedThe Impact of Agricultural Sector on Economic Growth in Nigeria18675 Words   |  75 PagesAgricultural Economics of Nigeria: Paradoxes and Crossroads of Multimodal Nature Professor Eric C. Eboh Professor of Agricultural Economics University of Nigeria CONTENTS 1.0 ACKNOWLEDGEMENT 2 2.0 CONCEPTUAL APPROACH OF THIS INAUGURAL LECTURE 6 REFLECTIONS ON THE STRATEGIC ROLE OF AGRICULTURAL ECONOMY 8 3.0 4.0 5.0 AGRICULTURE FROM THE LOOKING GLASS OF MAN’S ECONOMIC HISTORY 16 AGRICULTURAL ECONOMY FROM PARADIGMATIC VIEWPOINTS ABOUT THE STATE VIS-A-VIS MARKET 21 6.0 NIGERIAN AGRICULTURERead MoreAll About Peace Education13195 Words   |  53 PagesALL ABOUT PEACE EDUCATION *Dr. Ajay Kumar Attri, Lecturer; Department of Education, MLSM College ; Sundernagar; Mandi (H.P) âž ¢ INTRODUCTION: Education shall be directed toward the full development of the human personality and to the strengthening of respect for human rights and fundamental freedoms. It shall promote understanding, tolerance and friendship among all nations, racial or religious groups and shall further the activities of the United Nations for the maintenance of peace.Read MoreItc Ltd. a Full Case Study10991 Words   |  44 Pagesexemplar in sustainability practices is manifest in its status as the only company in the world of its size and diversity to be carbon positive, water positive and solid waste recycling positive. In addition, ITCs businesses have created sustainable livelihoods for more than 5 million people, a majority of whom represent the poorest in rural India. HISTORY: The company was founded as  Wills, Watkins Co.  by Henry Overton Wills I and his partner Watkins, who opened a shop in Castle StreetRead MoreTrade Reforms Policy Impacts on Non-Oil Exports in Nigeria11960 Words   |  48 Pagesexchange requirements of the country. From the mid 1970’s, the Nigerian economy became monoculture, having shifted from an economy that was dependent on agricultural export to one heavily dependent on crude oil for growth and sustenance. A major development in the export sector in the 1970’s was the oil price shocks of 1973-1974 and 1979, which resulted in large receipts of foreign exchange by Nigeria and subsequent neglect of agriculture. This was the major cause of the Nigerian’s â€Å"Dutch disease†Read MoreAn Impact Assessment of Science and Technology Policy on National Development of Nigeria61708 Words   |  247 PagesAN IMPACT ASSESSMENT OF SCIENCE AND TECHNOLOGY POLICY ON NATIONAL DEVELOPMENT OF NIGERIA BY ABUBAKAR ABDULLAHI October, 2 0 0 4 ii AN IMPACT ASSESSMENT OF SCIENCE AND TECHNOLOGY POLICY ON NATIONAL DEVELOPMENT OF NIGERIA BY ABUBAKAR ABDULLAHI (MATRICULATION NO. 3081) A Dissertation Submitted to St. Clements University in Partial Fulfillment of the Requirements for the Award of Doctor of Philosophy in Management St. Clements University October, 2004 iii DECLARATION I declare thatRead MoreDebonairs Pizza Product-Market Expansion Growth Strategies27204 Words   |  109 PagesRe-marking of assignments 8.1.12 Assignment cover sheet 8.2 Assignment submission dates 8.3 Assignment questions - Human Resource Management - Management Information Systems - Marketing Management - Operations Management - Quantitative Methods - Economics 21 21 21 22 22 22 22 23 24 24 24 24 24 24 24 25 25 26 26 27 28 – 31 32 32 32 32 – 34 34 34 34 35 35 35 35 35 35 35 36 37 37 – 39 40 – 44 45 – 49 50 – 54 55 – 57 58 – 59 8. MANCOSA – MBA Year 1 2 Course and Assignment Handbook – JulyRead MoreCase Study148348 Words   |  594 PagesInstructor’s Manual Exploring Strategy Ninth edition Gerry Johnson Richard Whittington Kevan Scholes Steve Pyle For further instructor material please visit: www.pearsoned.co.uk/mystrategylab ISBN: 978-0-273-73557-1 (printed) ISBN: 978-0-273-73552-6 (web) ï £ © Pearson Education Limited 2011 Lecturers adopting the main text are permitted to download and photocopy the manual as required. Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated CompaniesRead MoreInternational Management67196 Words   |  269 PagesThe global financial crisis and economic recession have challenged some assumptions about globalization and economic integration, but they have also underscored the interconnected nature of global economies. Most countries and regions around the world are inextricably linked, yet profound differences in institutional and cultural environments persist. The challenges for international management reflect this dynamism and the increasing unpredictability of global economic and political events. ContinuedRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 Pagessocioeconomic circumstances and dynamics rather than standard but arbitrary chronological break points. In the decades that followed the Great War, the victorious European powers appeared to have restored, even expanded, their global political and economic preeminence only to see it eclipsed by the emergence of the Soviet and U.S. superpowers on their periphery and a second round of even more devastating global conflict. The bifurcated international system that resulted from the cold war standoffRead MoreExample of Product Strategy13854 Words   |  56 Pagesgenerate large scale direct and indirect employment. Since then ITCs Hotels business has grown to occupy a position of leadership, with over 90 owned and managed properties spread across India. In 1979, ITC entered the Paperboards business by promoting ITC Bhadrachalam Paperboards Limited, which today has become the market leader in India. Bhadrachalam Paperboards amalgamated with the Company effective March 13, 2002 and became a Division of the Company, Bhadrachalam Paperboards Division In 1985

Saturday, December 14, 2019

Old Chinese Gender Selection Method Health And Social Care Essay Free Essays

Methods: This was a longitudinal descriptive survey. Pregnant adult females ( Civilian non entitled ) holding full term gestation labeled bringing instances and admitted in officer ‘s household ward of Pakistan Navy Ship Shifa infirmary Karachi Pakistan from 31 March 2010 to 11 June 2010 were included in the survey. Consequences: Entire topics observed in the survey were 100. We will write a custom essay sample on Old Chinese Gender Selection Method Health And Social Care Essay or any similar topic only for you Order Now The average age of the adult females was 27.44 old ages with standard divergence of 4.35. Out of 100 delivered babes 42 were misss and 58 were male childs and 50 % .were right predicted with misss. sensitiveness of 45.23 % and specificity of 53.44 % . and sensitiveness of 53.44 % and specificity of 45.23 % .The positive predicted values calculated for foretelling boys baby was 57.40 % and for miss babies 41.30 severally. Decision: This survey remained focused on cognizing its truth after construct and revealed same consequence of truth of 50 % as with chance of tossing a coin but it did happen better sensitiveness for foretelling male as compared to female. Bing non invasive, this trial can give better and new consequences if practiced under the supervising of a confer withing household doctor particularly on good educated pregnant adult females. Cardinal Wordss: Mother ‘s age, Last catamenial Period, Month of Conception, sex anticipation, Sex planning, Chinese Method. — Introduction The ultimate purpose of every married adult female remains to be a female parent. Marital life starts with guess and planning of kids, their Numberss and sex. Fertility, which refers to holding construct or existent kid bearing, becomes the foremost desire. Gender of the pick is a natural desire of a adult female. However on first gestation this desire remains hibernating in the supplications. During initial phases of gestation suspense remain in cognizing the sex of an unborn babe. Assorted scientific methods are available for the anticipation of the sex of the foetus. These include Chorionic villus sampling ( CVS ) , amniocentesis and ultrasound. Other methods used to foretell the sex of foetus after construct are Old married womans narratives, foetal bosom rate trial, draino trial and Chinese lunar calendar ( CLC ) method etc. The most popular method is extremist sound which is best done between 18 and 26 hebdomads of gestation but its truth depends upon several factors: babe ‘s cooperation, gestational age, technician ‘s ability, etc ( 1 ) . Once the twosome have the babe of either sex and wants to hold the babe of their ain pick, they go for gender choice or planning of methods which provide counsel for following steps before construct. There is a broad prevailing tendency among pregnant adult females of developing states of holding a penchant for male child babes. In states like China, India, and Korea socio-cultural environments do be which contribute to boy kid prejudice in attitude and action ( 2 ) . A societal study on gender penchants prepossession sex choice among pregnant adult females in Karachi, Pakistan revealed that 27.6 % Pakistani adult females do demo a statistically important penchant for male childs over misss ( 3 ) , In Egypt a survey found 1.4 overall boy penchant index ( 4 ) Among the United States general population harmonizing to a cross-sectional web-based study, 39 % of respondents liked their first kid to be a boy, and 19 % liked their first kid to be a girl ( 5 ) .However on big graduated table, prepossession sex choice for non medical grounds raises of import lesson, legal, and societal issues and it can take to a socially riotous instability of the sexes. The methods which provide the option of planning of sex of the babe before construct include the Shettles method and Chinese lunar calendar method. Shettles method named for Dr. Landrum Shettles, based on timing of sexual intercourse in relation to ovulation, sexual place and adult females orgasm ( 6 ) . The Chinese lunar calendar chart ( Table – 1 ) has the advantage of utilizing it for planning of sex of the babe before construct and foretelling the sex even after construct. Harmonizing to fable, the Chinese birth gender chart is based on statistics taken from adult females inside the out metropolis during the China dynasty. This chart was discovered by a Chinese scientist around 700 old ages ago buried in a royal grave. Original transcript of the chart is now placed in the institute of scientific discipline of Beijing China. Accuracy of this chart is claiming to be 99 % and is based on female parent ‘s age and month of construct which are converted into their lunar eq uivalents ( 7 ) . Globally really few surveies have been conducted on this method but in Pakistan no such record were found. The purpose of this survey was to prove the truth and prognostic value of Chinese calendar method in a sample of pregnant adult females admitted for hospital bringing at PNS Shifa Hospital Karachi. SUBJECT AND METHODS This was a longitudinal descriptive survey in which truth of the Chinese method of foretelling sex of unborn babe was noted in the conceived adult females. Pregnant adult females holding full term gestation labeled bringing instances and admitted in officer ‘s household ward of Pakistan Navy Ship Shifa infirmary from 31 March 2010 to 11 June 2010 were included in the survey. Civilian non entitled ( CNE ) class of the adult females was included as compared to services forces households sing their better socio economic conditions, instruction and better place of remembering the day of the month of last catamenial period ( LMP ) . Inclusion Standards: All CNE pregnant adult females 15 -45 old ages of age holding singleton gestation. Exclusion Standards: All pregnant adult females belonging to Pakistan Armed Forces. All CNE pregnant adult females A ; lt ; 15 old ages and A ; gt ; 45 old ages age and holding multiple and premature bringings. A Performa was drafted to observe indispensable bio informations of topics including name, age, day of the month of last catamenial period, expected day of the month of bringing ( EDD ) , existent day of the month of bringing, sex of delivered babe and observed truth of the trial. The month of LMP was correlated with the age of each pregnant adult females and anticipation of gender was done against each severally. This consequence was tested on the twenty-four hours of bringing of the babe and truth of the trial was compared. Consequence Entire topics observed in the survey were 100.The average age of the adult females was 27.44 old ages with standard divergence of 4.35. Minimal age was 18 and maximal age was 38 ( Figure -1 ) . The average gestational age was 36 hebdomads. Out of 100 delivered babes 42 were misss and 58 were male childs. Among 42 miss babes 19 were right predicted, hence the method holding a sensitiveness of 45.23 % and specificity of 53.44 % . Out of 58 male childs babes 31 right predicted with a sensitiveness of 53.44 % and specificity of 45.23 % ( Figure – 2 ) . .The positive predicted values calculated for foretelling male childs was 57.40 % and for misss 41.30 severally. Discussion Family / Community physicians like accoucheurs while covering with a pregnant lady normally encountered the inquiry about anticipation of sex of foetus. The concerns of twosome remain on top peculiarly when they already had series of kids of either sex particularly misss. In an eastern developing state like Pakistan where there is a male-dominancy and broad prevalent female illiteracy led to penchants for male child babe. Here even the life of adult females may stay on interest because of the menaces by hubby / female parent in jurisprudence or due to seeking an illegal abortion. The Chinese lunar calendar method is a non -invasive cheap method to foretell the sex of the foetus. With simple counsel and follow up by household doctor it is possible to acquire coveted consequences. Our survey being the experimental survey remained focused on acquiring the information pertaining to age, last catamenial period ( LMP ) day of the month, full term period of gestation and consequence of the bringing. Although CLC method holding no information on the principle or biological footing, we were funny in cognizing the consequences in Pakistani adult females. In our survey truth found was 50 per centum.Same consequences were obtained by two other international surveies ( 8, 9 ) .However in our survey trial sensitiveness was higher for male childs babies ( 53.44 % ) as compared to girl babies ( 45.23 % ) and therefore the positive predictive values for male baby was high ( 57.40 % ) Versus female babies ( 41.30 % ) . Decision The Chinese lunar calendar method offers two manner uses of planning of sex of babe before construct and anticipation of foetus sex after construct. This survey remained focused on cognizing its truth after construct and revealed same consequence of truth of 50 % as with chance of tossing a coin but it did happen better sensitiveness for foretelling male child as compared to girl babies. This survey can give better and new consequences if practiced under the supervising of a confer withing household doctor for the intent of be aftering babe ‘s sex before construct particularly on good educated pregnant adult females. How to cite Old Chinese Gender Selection Method Health And Social Care Essay, Essay examples

Friday, December 6, 2019

Section Leader and Drum Major free essay sample

I am applying for both section leader and drum major because I have a lot to offer in both positions in the band. I am a great leader, with a lot of maturity and know when it’s time to be serious, and when it’s time to joke around. Every day, I grow more and more with this band and leading this band as drum major, or leading the saxophones as section leader, would be an amazing accomplishment for me and I know I can do the job well. First of all, I will be putting all of my heart into this job, I’ve been in band for seven years, and I have grown with this band for two years. I know the band can reach new heights if we work hard enough. With all the changes we are making next year, we are going to need strong leaders to aid the incoming freshman and to lead the entire band throughout the year. We will write a custom essay sample on Section Leader and Drum Major or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page As drum major, conducting requires a certain kind of insight and an understanding of music, which is something that I have started to develop during my seven years of playing an instrument. Addition to my experience with music as a whole, I also have three years of marching band experience. Second, I am determined to succeed, and to improve myself and the band as a whole. It’s not good enough to be satisfactory, I want to exceed expectations. I believe in hard work, and never giving up; I believe in making a little improvement every day, because there’s ALWAYS room for improvement. We had an amazing year this year, getting two superiors, but we can’t just rest. We have to keep working, thrive to be the best we can be. I want to be that person to lead this band, and push them to be the best. Lastly, my philosophy on leadership is simple: lead by example, always help, and never quit. Quitting is out of the question for me. Using excuses instead of giving your best, giving up on something (or someone), or abandoning your responsibilities are things I absolutely do not believe in. Promoting excellence in others starts with promoting it in yourself. I have found from being in the marching band that each member wants respect. I intend to give respect first and in doing that I believe I will receive it from my piers allowing this whole experience to be a perfect one.

Friday, November 29, 2019

How Do Psychologists Attempt To Explain The Origins Of Prejudice Essa

How Do Psychologists Attempt To Explain The Origins Of Prejudice? HOW DO PSYCHOLOGISTS ATTEMPT TO EXPLAIN THE ORIGINS OF PREJUDICE? DO THEY OFFER SOCIETY ANY HOPE THAT IT MAY BE REDUCED? BY JON SALECLEMENTS. Ethnocentrism is the tendency to assume that ones culture or way of life is superior to all others. Prejudice is a negative attitude toward an entire category of individuals. Discrimination is behaviour that excludes all members of a group from certain rights, opportunities or privileges. A range of international events have recently focused attention on the issue of prejudice; increasing ethno-nationalistic tensions in former Eastern block countries, racial conflict in the Middle East, Africa and intergroup conflict related to race debates in Europe, The U.S.A and Australia. Psychology is the only discipline, which over the past century has consistently and systematically investigated the issue of prejudice and race. Social psychology has a long tradition of empirical and theoretical research in this field and currently there are many social psychologists in Australia engaged in significant and timely research. This is no accident given the regions long and chequered history regarding race relations with the treatment of the Australian Aborigines has been likened to genocide. Currently there are a number of theoretical and conceptual psychological approaches, which both define and explain prejudice. Personality theories primarily locate race and prejudice within the intro-psychic domain of the individual. From this perspective, authoritarian-rearing practices, intolerance and intro psychic defence mechanisms are isolated as casual agents to a significant problem. There are several theories as to why people are prejudiced. The exploitation theory keeps a racial group in a subordinate social position. The scapegoating theory says that prejudice people believe that they are societys victims. In this sense, exploiters abuse others and scapegoats feel they are being abused. Dr. Vance Locke and Dr. Lucy Johnston at the University of Canterbury have recently published papers on the issues of social cognition and stereotyping . Personality approaches have been challenged by the dominance of social cognitive perspectives. These view prejudice as inevitable consequences of normal and functional cognitive processes such as categorisation and stereotyping. Our limited cognitive capacities, it is argued, make the simplification and generalisation of social information necessarily adaptive, so that a groups tendency to view outgroup members as all alike is not surprising. Cognitive mechanisms are thus viewed as the essential foundations to stereotyping and prejudice. Martha Augoustinos and Katherine J Reynolds of the Australian National University have said that since the 1920s, when prejudice emerged as a construct of significant interest to psychologists, there have been several distinct stages of theoretical and empirical development, i.e. white superiority and minority backwardness, human irrational and faulty cognitive processes, unconscious psychological defences, individual personality structures and expressions of group interests and intergroup relations . The psychodynamic approach which Freud spawned many psychodynamic theories of human personality. The main one lies in the view that early childhood experiences crucially affect an individuals later personality. This was taken by Adorno et al (1950) and more recent the non-pyschodynamic derivatives of authoritarianism. Adorno et al argues that the authoritarian personality has its origins in childhood. Where parents adopt an excessively harsh and disciplinarian regime in order to enforce on their children emotional dependence and obedience, children develop a love/hate relationship with their parents. This conflict between love and hate is stressful and there is a need to resolve it. The hatred is repressed through fear and guilt and finds its outlet through displacement on to those who are weaker, while the power and the authority of the parents is idealised and generalised to all authority figures. This theory rested upon Adorno et al original work. The most dominate theoretical and empirical approach to prejudice is social cognition (Fiske s tendency to stereotype out group members and to perceive them as homogeneous is an inevitable by-product of our cognitive hard-wiring. While cognitive models of prejudice are currently dominant, researchers are emphasising the role that

Monday, November 25, 2019

Cloud Computing Security Issues in Enterprise Organizations

Cloud Computing Security Issues in Enterprise Organizations Introduction Cloud computing has started to move beyond hype and into the fabric of businesses today. Small and Medium Businesses have discovered by utilizing cloud services, they can gain significant benefits including access to novel business application and state of the art infrastructure resources.Advertising We will write a custom thesis sample on Cloud Computing Security Issues in Enterprise Organizations specifically for you for only $16.05 $11/page Learn More Although Enterprise Organizations are gaining valuable insight into the potential benefits of cloud, IT directors still have concerns about the security of their corporate data in the cloud. There are three major security issues inherent in cloud computing that make implementation in Enterprise Organizations a challenge. These issues are: Loss of control over data and Dependence on the Cloud Service Provider (CSP) Spying These three issues can lead to a number of legal and security concerns re lated to infrastructure, identity management, access control, risk management, regulatory and legislative compliance, auditing and logging, integrity control as well as Cloud Computing provider dependent risks (CEPIS, 2011). This paper will set out to show that while there are significant security threats that an enterprise faces when it migrates to the cloud, there are solutions that can be implemented to mitigate these threats and ensure that the enterprise is able to benefit from the numerous advantages of the cloud without exposing itself to unnecessary risks. Defining Cloud Computing The concepts behind cloud computing have been applied for over two decades (CEPIS, 2011). However, the widespread implementation of cloud computing services has only become prevalent over the last 7 years. The National Institute of Standards and Technology defines cloud computing as a model for enabling ubiquitous, convenient, on demand network access to a shared pool of configurable computing reso urces that can be rapidly provisioned and delivered with minimal management effort or service provider interaction (Chirag et al., 2013, p.562). Cloud computing offers a number of significant benefits, therefore making it attractive to many enterprises. To begin with, cloud computing utilizes a pay-per-use model, meaning that the organization only gets to pay for the services that it uses. Chirag et al. (2012) document that cloud computing present businesses with the ability to increase their IT capabilities on demand and without having to invest much in new infrastructure or training of personnel.Advertising Looking for thesis on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More The enterprise is therefore allowed to focus on its core business concerns instead of dealing with technical IT issues. According to Chirag et al. (2013), many of the organizations in the US and Europe that have migrated to the Cloud en vironment have done so in order to exploit the advantages or cost reduction. Skendrovic (2013) reaffirms this observation by noting that most enterprises acknowledge that using a cloud solution is integral to maintaining future organizational growth and productivity. Concerns In spite of the widespread enthusiasm for cloud computing, there still exists significant apprehension about migrating to the cloud. Cloud computing brings about risks that an organization would not be forced to face if its applications were run in-house. A number of significant and valid security concerns have caused this apprehension. Loss of Control over Data When an enterprise makes use of cloud services it, in essence, relegates the control of data and applications to third parties. An enterprise that migrates from the traditional in-house environment to a cloud environment immediately relinquishes its control over the networking infrastructure. The cloud service provider (CSP) is in control of infrastruct ure including servers, log files, and incident reports. The first issue that arises is that the enterprise does not have control over the physical infrastructure where its data is stored. Chirag et al. (2013) assert that a reality for organizations that choose to make use of cloud computing is that their data will be stored off-site. Since the servers, storage space, and application programs are provided by external service providers, the organization will have a loss of control over the infrastructure. Enterprises expose themselves to a higher risk of facing unauthorized access when they use a cloud system as opposed to the traditional network system. Cloud service providers store data for various organizations at the same location. This stored data (data at rest) needs to be protected from physical and electronic compromise. A non-authorized user who is able to access the shared environment has access to the private data of the organizations that use the particular cloud computing service provider. The distributed nature of cloud system resources makes it hard to ensure data security and privacy (Qaisar Khawaja, 2012).Advertising We will write a custom thesis sample on Cloud Computing Security Issues in Enterprise Organizations specifically for you for only $16.05 $11/page Learn More This risk is high since the cloud system typically has a high number of administrators and users. Malicious users can successfully attack a cloud control interface and gain control of an enterprise’s account. When this happens, the intruder will have access to the data stored in the account. Enterprises are likely to be co-tenants with attackers on the Cloud (Juels Oprea, 2013). This jeopardizes the enterprises data since the malicious co-tenant is well placed to carry out a successful attack. Since the enterprise does not own or control where the data is stored and processed, there is a threat of theft or misuse. If the cloud provider does not provide solid physical or logical security, the organizations data might be stolen. The organizations data may also be used in a way that the client has not agreed to. Cloud providers might use the data for different purposes from those originally notified to and agreed with the consumer. Pearson and Yee (2012) document that cloud service providers may gain revenue from unauthorized uses of client data such as resale of detailed sales data to competitors. Enterprises that make use of cloud services do not have control over the lifecycle of their data. Organizations that maintain data onsite have data lifecycle plans that determine how long the data will be retained and when it will be destroyed. When using a cloud service provider, the enterprise cannot be guaranteed that its request for data deletion will be honored. The organization might issue a command to delete data using its application program, but the service provider might continue to store the data without the knowledge o f the organization. Dependence on the Cloud Computing provider As previously noted, employing cloud computing services means that the enterprise will be using the computing resources of a third party; the Cloud Service Provider. This reliance on a third party to provide critical services might lead to a number of problems. To begin with, the organization is not in control of the availability of the computing services it requires. Since the services are provided through the internet, there is a possibility that temporary or permanent loss of services might be caused by Denial of Service attacks. Vulnerabilities in the network have a direct negative effect on the security of the Cloud. Chirag et al. (2013) declare that the network is the backbone of Cloud computing since it is the most crucial component of Cloud services.Advertising Looking for thesis on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More Enterprises that make use of the cloud might suffer from access limitations. Since data and information flow occurs through the service provider, it is not possible to ensure that an organization can access its data at all times. The power to limit access control lies with the service provider who has overall control of the communication infrastructure. The enterprise is therefore at risk of having its data locked in by the CSP for a number of reasons including orders from the government. In addition to this, use of cloud services presents a transparency issue. Users are often abstracted from the details of how the applications run on the Cloud and in most cases, the organization is kept in the dark concerning issues such as the exact location where the data is stored and who owns it or what will be done with it. This lack of transparency means that organizations are at risk of having their data used in ways that they did not authorize. In addition to relying on the Cloud service pr ovider to make the computing resources available, enterprises have to rely on the cloud provider to provide adequate security for the data at rest. The enterprise has to depend on the CSP to notify it of any security breaches that might occur on its data or applications. Since the enterprise does not control the data, it might be unaware of any security breaches that occur. Pearson and Yee (2012) state that there are uncertainties about notification, including of any privacy breaches that occur in the cloud. The organization will find it difficult to know if any breach has occurred since the cloud service provider might be reluctant to reveal such information since it will damage the image of the provider. It is also hard to determine whose fault it is in case of a security breach since the comprehensive security logs are maintained by the cloud service provider. Spying Spying has become an issue of significant concern over the last two years. The issue of electronic surveillance ha s gained a lot of interest following the revelations that the US National Security Agency is engaged in rampant data collection. Use of CSP increases the risk that an organization might be spied on. To begin with, cloud services are provided through the internet creating an opportunity for government agencies to intercept data as it is transferred from one location to the other. Saroj (2014) suggests that this risk would not be there is an organization made use of an intranet where all the data was processed in-house. The relationship between the major technology companies that serve as CSPs and intelligence agencies increases the level of spying that enterprises face. Hamilton (2013) reveals that in the US, there is cooperation between technology companies such as Microsoft, Google, and Amazon and intelligence agencies. There have been reports of the NSA and the FBI being provided access to data from the cloud storages of these companies. When the CSP provides government agencies w ith access to its data, the organization’s information is open to illegal scrutiny by the government entities. The risk of spying increases when the data has to cross over geographical boundaries that are subject to different laws. Different countries have varying data protection laws. An organization that is storing personal data with a CSP operating in a different country might find itself subjected to different data protection laws in the host country. Saroj (2014) confirms that due to the exposure of the high level of espionage activities conducted by the NSA, most enterprises are likely to invest more to on-premise solutions for their technology needs. Solutions Coming up with solutions to the security issues inherent in cloud computing is integral to the future success of cloud computing. Undoubtedly, the pooled computing resources and multi-tenancy model utilized by cloud computing introduces new security challenges that call for novel techniques to address them. Witho ut feasible solutions to the challenges, organizations will continue to demonstrate reluctance to migrating to cloud computing. Solutions to Loss of Control Most organizations would like to ensure that they do not lose control of their data. This outcome can be achieved in a number of ways. Enterprises can enter into contracts to ensure that their data and especially intellectual property rights are protected even in the cloud (KPMG, 2013). Ownership of intellectual property should remain with the organization at all times. As such, intellectual property attached to the data or generated by applications that is hosted in the cloud should belong to the user of the cloud. The enterprise can increase control over its data by negotiating a customer-oriented contract with the CSP. Priya and Ward (2013) state that such an agreement should increase the liability of the CSP in the event of a security breach and increase the rights of the organization over its data. Ensuring that the CSP can only use the organization’s data in ways that the organization has stipulated is important. Many organizations are keen to ensure that unauthorized secondary usage or their data do not happen. Pearson and Yee (2012) warn that at the present, there are no technological barriers to such secondary uses and as such, the cloud service provider might misuse company data. However, this risk might be mitigated by developing legally binding agreements as to how data provided to the CSP can be used. Solutions to Dependence on the CSPs The problems of availability that are caused by the high dependency on the cloud computing provider can be solved in a number of ways. Enterprises can make use of multiple providers to ensure continuous availability. Most CSPs provide the data proliferation function which entails having data stored or processed at different data centers. Replicating data in multiple data centers ensures full-time availability since it is unlikely that all data centers wi ll be experiencing problems at the same time. Juels and Oprea (2013) state that distributing data across multiple cloud providers provides redundancy therefore ensuring that reliable cloud services can be obtained from unreliable components. The enterprise can increase their protection against data loss due to damage to the cloud infrastructure by maintaining backup storage. Organizations should demand that the service provider maintains an off-site data backup that can be used in case the cloud infrastructure collapses. The provide should also have a standby disaster recovery and continuity plan that will ensure that the clients are able to resume normal functioning in the shortest period of time after a catastrophic failure (Zissis Lekkas, 2010). Chirag et al. (2013) confirm that it is hard to prevent all the attacks to the Cloud network due to the distributed nature of the cloud. However, implementing security solutions such as firewalls, anti-malware and strong encryption techn ology will mitigate these threats. In addition to protecting the data from online attacks, it is important to ensure that physical security of the cloud computing infrastructure. This security can be assured by ensuring that the servers are located in a secure location where there is constant surveillance. Nkhoma and Dang (2013) notes that most CSPs make use of the best security technologies such as biometric screening to ensure that only authorized staff have physical access to the company’s servers. Saroj (2014) confirms that majority of the cloud data centers offer great security than on-site data centers. The safety of organizational data is therefore better secured in the cloud that it would be if the company stored the data on its own premises. The higher than average security is possible since most cloud providers have the resources and expertise to implement the best security technologies available in the market. Solution to Spying The ability of spying agencies to ac cess organizational data can be inhibited by encrypting data before transmission. Researchers agree that the greatest risk for data being transmitted to or from the cloud is poor encryption technology. Hamilton (2013) observes that organizations such as the NSA find it easy to spy on organizations since they access the data in raw text or they are provided with keys that make it possible to successfully decrypt data. Organizations should ensure that their data is always encrypted before it is transmitted over the network. Using strong encryption standards during data transmission will increase the user confidence that the data is not prone to attacks from opportunistic hackers or government intelligence agencies. In addition to this, the enterprise should demand for its data to be stored in encrypted form in the CSPs storage facilities. This would ensure that even if spying takes place, it would require significant effort to decrypt the data. The threat of spying is exacerbated if t he CSP allows government agencies free access to its databases. Cloud service providers should be able to tell their clients if the data in the cloud is being accessed by any government agency. This transparency will enable the enterprise to make an informed decision on whether to store their data on the cloud. Addressing the spying problem is critical for enterprises to have confidence in cloud solutions. Most US cloud service providers are aware of the negative effect that the NSA spying could have on this industry. In recognition of the damage that spying might have on the cloud business, many companies are enforcing security measures intended to ensure that governments are not able to illegally spy on users. Google enforces mandatory encrypting of all the data stored on its cloud on behalf of the clients. Organizations that make use of the Google cloud are allowed to manage their own encryption keys, therefore increasing the level of security. Conclusion This paper set out to di scuss the issues that an enterprise might face when it makes use of cloud computing providers as well as the solutions to these problems. It began by highlighting the increasing interest that organizations have shown to cloud computing due to the benefits that this technology offers. It then highlighted some of the major issues inherent in cloud computing. The paper has demonstrated that security remains to be the primary factor preventing most organizations from migrating to the cloud. From the facts presented in this paper, it is clear that these fears are valid since the cloud infrastructure has some major vulnerability that could lead to problems for the enterprise. It should be noted that most of the threats inherent in cloud computing are not unique to the cloud environment. Problems such as data loss, unauthorized data access and spying can occur even when the data is maintained by the organization on-site. The problems inherent in Cloud Computing can be mitigated by implemen ting the solutions proposed in this paper. References Chirag, M., Dhiren, P., Borisaniya, B., Avi, P., Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing. Journal of Supercomputing, 63(2), 561-592. Council of European Professional Informatics Societies (CEPIS) (2011). Cloud Computing Security and Privacy Issues. Retrieved from: cepis.org/media/CEPIS_Cloud_Computing_Security_v17.11.pdf. Hamilton, D. (October 11, 2013). Leaked Documents Implicate Microsoft in Giving Government Agencies Access to Cloud, Email, VoIP Data. Web Host Industry Review (WHIR). Retrieved from: thewhir.com/web-hosting-news/leaked-documents-implicate-microsoft-in-giving-government-agencies-access-to-cloud-email-voip-data. Juels, A., Oprea, A. (2013). New Approaches to Security and Availability for Cloud Data. Communications of the ACM, 56(2), 64-73. KPMG (2013). The cloud takes shape. Retrieved from: https://www.kpmg.com/Global/en/IssuesAndInsights/ArticlesPu blications/cloud-service-providers-survey/Documents/the-cloud-takes-shapev2.pdf. Nkhoma, M.Z. Dang, D.P. (2013). Contributing Factors of Cloud Computing Adoption: a Technology-Organisation-Environment Framework Approach. Proceedings of the European Conference on Information Management Evaluation, 2(1), 180-188. Pearson, S., Yee, G. (2012). Privacy and Security for Cloud Computing Computer Communications and Networks ITPro collection. NY: Springer. Priya, D., Ward, C. (2013). Cyber-Security Threats and Privacy Controls for Cloud Computing, Emphasizing Software as a Service. The Computer Internet Lawyer, 30(3), 20-24. Qaisar, S., Khawaja, F. (2012). Cloud Computing: Network/Security Threats and Countermeasures. IJCRB, 3(9), 1323-1329. Saroj, K. (January 8, 2014). NSA Spying Will Hurt Cloud Computing Software Spending in 2014. Cloud Times Retrieved from: http://cloudtimes.org/2014/01/08/nsa-spying-will-hurt-cloud-computing-software-spending-in-2014/. Skendrovic, D. (2013). Growin g pains in the cloud. NTT Communications Retrieved from: eu.ntt.com/fileadmin/NTT-Europe/media/PDF/Research_Reports/NTT_Research_Report_Growing_Pains_In_The_Cloud_FINAL.pdf. Zissis, D., Lekkas, D. (2010). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592.

Thursday, November 21, 2019

Analytical Report on a Marketing Communications Approach Assignment

Analytical Report on a Marketing Communications Approach - Assignment Example The second option seemed more favorable to Samsung because it is most profitable and because of the trend that is presently associated with mobile phones as more people differentiate themselves by the type of mobile phones they use ("Adweek." Adweek. N.p., n.d.) The success of Samsung Galaxy S3 required a well-balanced market mix. Any electronic device requires calculated marketing mix ingredients; otherwise the product might be too good for its value or not good at all (Fill, 2011, pg 23-26). Samsung Galaxy S3 required a good marketing mix for it to attain the anticipated success during the final sale of the product ("Adweek." Adweek. N.P., n.d.) This paper will discuss Samsung Galaxy S3 marketing mix as depicted from the ad and further discuss the implication of the four P’s of Samsung Galaxy S3 marketing mix and show the relations of Samsung’s products marketing mix. The launch of Samsung Galaxy S3 came at the right time when people were waiting for a smart phone tha t could provide more than what other mobile phones were providing, with its functionality surpassing customer expectations. The current Samsung’s image is that it provides reliable phones, however, Samsung Galaxy S3 was initially perceived as a phone like any other. The difficulty faced by customers is that they did not know that Samsung had introduced a phone with Samsung Galaxy S3 capabilities. The main strategy of overcoming the marketing communication barrier was for Samsung to create a stronger image for Samsung Galaxy S3, by creating public awareness, and putting Samsung Galaxy S3 at the top of consumers’ minds in the target group, with the objective being achievable through marketing communication (Laudon & Traver, 2010, pg 45-50). For Samsung to implement this marketing plan in their Samsung Galaxy S3 product, and achieve the objective, Samsung had to place the Samsung Galaxy S3’s price at a mid range of the market, with the gadget’s price being s lightly lower than that of its competitors. This clearly showed that Samsung aimed at selling Galaxy S3 to young people within the market segment. MARKET MIX According to the ad, the new Samsung Galaxy S3 had the following specifications; concerning networks the gadget had the capability of running 3G (HSPDA/CDMA), 4G (LTE/HSPA+) and Edge/2G (GSM/GPRS) using Android operating system version 4.1. The product used TouchWiz user interface and retailed at a price of $99 with contract and $549 without contract (Stuart, www.cim.co.uk). The Samsung’s software featured in Galaxy S3 aimed at impressing users with several great displays, though most of them suffered from poor executions; however, a customer can still skip the complicated part of the software and enjoy the hardware. With the Galaxy S3, Samsung managed to offer top-line performance with the product being more capable than any other phone (Gay & Charlesworth, 2007). With a great phone, a question at hand would have been t he right marketing formula for the Galaxy S3 (Strauss & Frost, 2011, pg 67-70). The marketing formula is like a recipe, that much for A and that much for B and in the end is a combination that tells a success story or a complete failure of a product, the combination constitutes a marketing mix. Prior to developing Galaxy S3, the company needed to consider the quality of the product required, in order to determine

Wednesday, November 20, 2019

Worldview defended Essay Example | Topics and Well Written Essays - 2250 words

Worldview defended - Essay Example My worldview does not allow me to go deep within the same-sex marriage ideology as it is not only different but also vehemently opposed by my ancestors who have brought solid reasoning in front of me. Even though marriages bring couples in close association with one another, the most basic point that must be understood is that of empathy – to understand where the couples are coming from. My worldview framework is thus set from the perspective that marriages bring human beings together and thus there must be a basic pattern upon which marriages must last. It will help resolve the ambiguities if traditional marriages are encouraged as these bring out the best amongst both men and women. Same-sex marriages do not bring any sanity to the related ranks and only make things look gloomier than they are within the world. My worldview is therefore in complete favor of a traditional form of marriages because they bring results which are long-lasting and positive for the family. The same -sex marriages are inherently different from traditional marriages because either of them comes up with divorce in the end, and there is more reason why same-sex marriages lead to such breakups from a strategic perspective. I am hopeful that if the worldview has to change for the better for the people who live near to me, then there is a requirement that same-sex marriages should be bolstered with people who have a good perspective towards life and who want to be successful at building their relationships in a very pragmatic manner.

Monday, November 18, 2019

Genetic, Biological and Environmental Influences on School-Age Crack Research Paper

Genetic, Biological and Environmental Influences on School-Age Crack Babies in Dealing with Multiple Stimuli and Forming Close - Research Paper Example Research has shown that almost one million infants born in the USA have been at one time exposed to one of the many illicit drugs while in utero. The social effects associated with these infants or crack babies when normally present themselves clearly when these children reach age of going to school. In most cases, the stimulation process becomes very erratic and such children are faced with difficulties of dealing with these multiple stimuli and have issues when it comes to having close attachments with people around them such a teachers and other pupils (McNichol & Tash, 2001). Dealing with multiple stimuli and forming close attachments Research has shown that we have a permanent developmental, neurological and behavior consequences which could be directly attributed to the exposure on drug use by parents. One notable thing has been that parents and even academic institutions are still quite unprepared in dealing with this problem effectively (McNichol & Tash, 2001). Given the envi ronment in which such children are exposed to at an early age, it becomes difficult for them to integrate fully with the society around them. It is a known fact that children do inherit certain genetic components from their parents. The drug use interferes with a child’s development. ... Close observations made on these children have shown that they are normally persistently withdrawn from their environment and enjoy personal space more than keeping company of others. It has also been noted that these crack babies are normally prone to some sudden snaps and episodes of violent behavior as compared to other children. These have been attributed to the fact that their parents exposed them to drugs in their prenatal stage. Research has shown that infants exposed to cocaine during the prenatal stage exhibit increased risk of having motor dysfunction (Schneider & Chasnoff, 1992). Also, the risk of having intra-venicular hemorrhages is increased. Questions still abound as to the exact effect of hemorrhages when it comes to the development process. The exposure has been noted to majorly affect the central nervous system causing abnormalities to these children (Doberczak, 1988). Fulroth, Phillips and Durand (1989) noted that a number of babies who have been exposed to cocaine in their prenatal stages show signs of withdrawal from the society or the environment around them. However, some researchers did dispute this basing their argument to the fact that the duration after birth matters and that the children normally normalize after the ages of 1 to 2 years. However, 30 to 40% of those children studied showed that they experienced language development problems which were compounded by attention problems that went through their fourth year of growth (Schneider & Chasnoff, 1992). Other studies have also shown that many of the children who have been borne out of drug abuse related mothers have numerous cognitive and behavioral difficulties. This has been attributed to the environmental influences. Other studies such

Saturday, November 16, 2019

Threats Of The Film Industry

Threats Of The Film Industry The main threat for the film industry now-a-days is PIRACY. Where hackers sell the duplicate CDs and DVDs. Online piracy has also come into action and every illegal download cost to the film industry is huge. It is obvious that people get attracted to the internet as it is free. Online piracy is could impact the film industry losing up to $460m (275 million pounds) annually according to leading motion picture studios and distributors report. Technology is playing a key role where things became more easy and simple. A recent report estimated around 144,000 films is downloaded every day across the world. The main piracy is done with the help of camcorders in the theatres. The recent box office hit AVATAR was the most grossing film in the cinema industry as well as the most pirated film. AVATAR was downloaded 500,000 times in its first two days in theatres and almost 1 million times in first week of release. (www.torrentfreak.com ) To prevent this threat for film industry government is taking necessary steps with the FEDERATION AGAINST COPYRIGHT THEFT (FACT) . It was established in 1983. The primary purpose of FACT is to prevent the UKs film and broadcasting industry from being infringed. FACT closely works with UK police, HM Revenue Customs, UK border agency, Serious and organised crime agency and the other agencies. FACT assess, analyse and report the threats. It plays a key role in ensuring that the awareness is created among people about the growing piracy. FACT works in three key areas: Online Piracy This focuses on distribution of illegal films. Prevention of recordings in theatres Over 90% of piracy is originated from copy recorded in theatres. Hard goods piracy http://www.guardian.co.uk/business/2003/oct/21/film.filmnews http://www.fact-uk.org.uk/site/about/index.htm Question 2: SWOT ANALYSIS: SWOT is a tool which is used to evaluate Strengths, Weaknesses, Opportunities and Threats of an organisation. Strengths and Weaknesses are considered to be internal factors of the organisation and Opportunities and Threats are considered to be external factors. This method identifies internal and external factors which are favourable or unfavourable in achieving an objective. http://en.wikipedia.org/wiki/SWOT_analysis INTRODUCTION OF IKEA: IKEA (Ingvar Kampard Elmtard Agunnaryd) was founded in 1943 by a 17 year old Ingvar Kampard in Sweden. He grew up in a farm called Elmtaryd in a village called Agunnaryd. IKEA comprises of initials of the founders name and the place where he grew up. In 1920s Kampard started selling match boxes to his neighbours by buying them in bulk at Stockholm and reselling them at very low cost. It later expanded by selling flower seeds, Christmas tree decorations, pencils and pens. In 1940s he discovered furniture designs with self assembling concept and now IKEA is the worlds largest furniture company which is famous for its flat-pack designs at low prices. It is sells Accessories, bathroom and kitchen items. IKEA has also actively participated and has partnerships with social and environmental projects. http://www.ikea.com/ms/en_US/about_ikea/the_ikea_way/history/2000.html http://en.wikipedia.org/wiki/Ikea SWOT OF IKEA OF IKEA HELPING TO DEVELOP SUSTAINABILITY: IKEAs business strategy is based on sustainability and environmental design. To attain its goal of sustainability IKEA has launched a new business plan which combine social, economic and environmental issues. SWOT analysis will help IKEA to reach its objectives by identifying and evaluating Strengths and Weaknesses which are within the control of IKEA like production, marketing, finance, human resources areas of the organisation. Opportunities and Threats which are out of control of IKEA like social, economical, political, technological, environmental issues outside the industry. If IKEA is able to create opportunities by countering the threats and by addressing its weaknesses with the help of its strengths then it will achieve the goal of sustainability. http://www.ikea.com/webapp/wcs/stores/servlet/DisplayPage?layout=memberOffersstoreId=7langId=-20catalogId=10103localStore=12003 http://www.thetimes100.co.uk/case-studyswot-analysis-sustainable-business-planning110-368-3.php STRENGTHS OF IKEA: Any aspect which adds value to product is considered to be a strength of the business. IKEAs Strengths are as follows, Its vision to provide better life for its customers and employees. Its promising global brand value and range worldwide. Its strong concept of providing wide range of products at low prices. IKEA has strong customer confidence level to buy IKEA products from any store. IKEA extracts chemicals and substances which are harmful to the environment and people. IKEA is completely against child labour and also keep an eye on its suppliers to avoid child labour by doing frequent visits without information. IKEA is working together with UNICEF to save the children and provide them with education and better future. IKEA has introduced an IKEA FAMILY CARD which benefits its customers with which they get discounts on the products like furniture, mobile phones and also reductions in restaurants. As a member of FAMILY CARD customers can save up to 60% on mobile phones purchase and get offers in restaurants like free Tea and coffee. This range of offers and products in IKEA makes customers visit them again and again. WEAKNESSES OF IKEA: http://www.clik2complaints.co.uk/Ori-others/ikea3.htm http://www.thetimes100.co.uk/case-studyswot-analysis-sustainable-business-planning110-368-5.php Any organisation should identify and acknowledge its weaknesses will improve the product or service of the company. This also helps the organisation to set objectives and create new strategies. IKEAs Weaknesses includes, IKEAs concept of offering low price products should be balanced with its quality. It should constantly concentrate on quality in every step of production. It should always differentiate its products from its competitors. Its global business makes it difficult to control quality and standards worldwide. It should always try to keep good relation with its stakeholders and consumers which again is a difficult task because of its size and scale. There are complaints from the customers that their orders include items which are not necessary for them. Items of wrong material, size and fabric are delivered to the customers. A poor customer services and improper staff coordination. The complaints from customers are spoil the reputation of the company. IKEA has to concentrate on improving its services by appointing right staff in right place. Orders need to be taken with all the specifications and confirmed by the customer before delivering the order. OPPORTUNITIES OF IKEA: Opportunities arise with the strengths of the company. IKEA focuses on environmental based business. IKEA educates its customers to support recycling and reusing of the products and also aims that recycled products are not used in developing a new product. IKEA wants to give its customer a sustainable life. Advantages of Opportunities of IKEA through its sustainability, The demand for greener products which do not harm the environment is growing. Demand for products with low price is growing because of the current financial conditions. Customers prefer trading in cheaper price. Being sustainable is IKEAs image which helps to keep good relationship with stakeholders, consumers and press. IKEA sources the products from countries like China, India and Pakistan which enables IKEA to offer products at competitive prices. IKEA plays a major role in supporting for charities like world wildlife fund and UNICEF. IKEAs aim to reduce energy use and carbon footprints and use more renewable energy has a growing demand. THREATS OF IKEA: For any organisation, competitors and new entrants to the market are the main threats. Threats are always external like political changes, environmental and economical. IKEA can use a particular strength and overcome the threat. There are many other companies in the same market and IKEA should try to attract the customers with special offers and reduced prices when compared to others. IKEA should make better use of technology and resources to gain economies of scale which gives them competitive edge and also enables to offer products at lower prices and puts barriers for new entrants entering the market. IKEAs biggest strength is offering products at cheaper prices which create strong customer base in tough financial times and depressed retail market. Its products are also famous in the market for its good quality among the higher budget markets. CONCLUSION: IKEAs strengths offering products at low prices, impressive designs and use of technology and resources can counteract any weakness or threat and create opportunities in the market. IKEA belief in doing good business makes it a sustainable business in creating better everyday life for its customers and employees. Question 3: IKEA TO FULFILL SOCIAL RESPONSIBILITY IKEA took part in several projects for development of society. Most of the projects were related to children welfare. In association with UNICEF, IKEA initiated child rights program in India. The aim of this project was to prevent child labour by addressing root causes like poverty and illiteracy. IKEA also supported UNICEF in emergency programmes like earthquake in Pakistan and 2004 Tsunami affected countries like India, Pakistan, Sri Lanka and Maldives. IKEA supported UNICEF in providing immediate needs like food, bowls, sleeping bags, towels and bed sheets. It also took initiative for earthquake affected children in providing quality education and safe drinking water. Nearly 10,000 earthquake-affected boys and girls between 6-11 ages were benefited with education and hygienic facilities. These are some social activities of IKEA as a global brand and have good command on social responsibilities. In addition, IKEA also actively participates in addressing environmental issues as a responsibility. It believes in creating healthy society. As part of this it encourages its customers to support them for recycling or reusing the used products. It pays attention on less usage of water and carbon footprints. IKEA can continue its partnership with UNICEF and try to help whenever needed. It can show its concern in every possible and fulfil its social responsibility http://www.unicef.org/corporate_partners/index_25092.html TASK 2: Question 1: INTRODUCTION: Charles Lazarus is the founder of ToysRUs. In 1948, he turned his dream of creating children oriented business into reality. He started a baby furniture store, Childrens bargain town in Washington. On public demand he started selling toys. The first toy that he started selling was cradle gym. Later he expanded to tricycles, books and other toys. After 10 years, Charles opened his own store in a supermarket model which helped the customers to pick products of there own choice. In 1980, he opened his second store and named it as ToysRUs which attracted parents and kids. In 1984, the company began to expand internationally. It started opening the stores in countries like Singapore and Canada. Later more than 700 stores were opened in 33 countries outside United States. The company branched out into childrens clothing business and opened the first store in Paramus, New Jersey and Brooklyn, New York named KidsRUs. Although it closed its branches in 2003, it still remained committed to app arel business and continues selling designer and private label boys and girls clothing through BabiesRUs stores. http://www2.toysrus.com/about/ourHistory.cfm

Wednesday, November 13, 2019

Essay --

The indigenous rights in the America colonization Rights are the set of rules that regulate social coexistence and resolve interpersonal conflicts. Laws of Indies or Indigenous rights began since Europe is attracted by the exploration. A group of Spanish explorers’ representatives of the Catholic monarchs, commanded by Christopher Columbus began to travel for search of new routes of commercialization. In 1492 Columbus arrived for the first time in America and he was certainty that he had arrived to Asia. Then, more expeditions started since they found a very diverse ground and also began the first relationship with the Indians. Before the â€Å"Laws of Indies† were created, already were some entities, rights and responsibilities for the indigenous society in the conquest. The first right created for the new World was based on three principles: â€Å"Tierra De Nadie† that means the land of no one, was the right to the allocation of territories ignorance of indigenous property when it had,  ¨Tierra para la Cristianidad ¨ (land to Christianity) this was about spreading Christianity in America and the last one was  ¨Conquista de derechos ¨(conquest of the rights) that were the rights of European States on all native cultures. The American society was based on these three rights at the beginning of the conquest. As Spain, was a very conservative and Christian land, the people who came from Spain took the responsibility to promote Christian culture to the indigenous however the greatest responsibility that the Spanish people took with those rights was taking care of the relationships with the indigenous because they needed to progress their trade and business in this new resourceful land. In the second expedition to America, Columbus brought to Spai... ...cials, or persons without title of conquest; the limitation for the huge amount of taxes that satisfied the encomenderos; the abolition of any form of slavery that could be, and any other category of forced labor. The new Viceroy came to America with express orders that these laws were fulfilled, but this new laws was so devastated and created a war in Peru between the encomenderos and the loyalists. Unfortunately, the New Laws were not fully implemented. In Peru, they were taken as an excuse for a serious revolt, led by Gonzalo Pizarro, and this, coupled with pressure from various power groups, made Charles I eliminate the hereditary nature of the charges. This caused the Encomienda survived until 1791 in some areas.  ¨The Ordinances of Alfaro ¨ came that were rights and definitive regulations for all the Indies, it proposed a series of rules and that ended slavery.

Monday, November 11, 2019

How can a company’s knowledge base be protected in an event of a natural disaster Essay

Due to the advent of globalization, the industries and organizations all around the globe are expanding and there is an increasing development across national barriers. As the businesses are becoming more competitive, so are the labor markets. Knowledge is of the essence and it is one of the most valuable source competitive edges of a business over others. A knowledge base is knowledge management system. It is similar to a database which is basically a collection of tables that hold the data in an organized manner. It is used in companies where data usage is integrated and shared. Most companies use databases to record all kinds of information that is confidential to outside parties. Databases make data management more efficient and effective. It provides an integrated view of the organizations operations and reduces the probability of inconsistent data. This paper would focus on the venture of knowledge base and how can it be protected in an event of natural disaster. Discussion Knowledge base holds all kind of strategic, tactic and operational information that could be used by upcoming employees. In today’s highly competition markets, knowledge is of the essence. Companies need as much information as they need in order to aware and agile of their environment and the markets. Due to the competition in the labor market, there is constant change among the workers in organizations; employees tend to skip from jobs to jobs looking for new opportunities and better offers. This leads to the transaction of information that the employees hold. As the employees are valuable assets of the organization. (Trochim, 2001) We live in a rather knowledge driven economy where knowledge holds great importance, whether it be of the global environment, about internal organizational processes or about the historical proceedings that have brought about change. This knowledge management process is better known through business continuity planning or knowledge asset protection planning. Knowledge continuity management is a growing process that focuses on the preservation of information and knowledge regarding the business that is possessed by the various stakeholders of the business. This knowledge is preserved so that it can be made accessible to those that follow in the organization. (Krishna, 1992) Knowledge present within the organizations systems is valuable to the existing as well as the upcoming leaders, employers and volunteers of the business. Hence, its protection holds the utmost importance. The occurrence of natural disasters and other catastrophic events is rather inevitable and the possibility of a natural disaster hitting the organization must, at all time, be taken into account. Vital information that would be used to rejuvenate the business after a natural disaster should assessed as to avoid the organization from halting. On regular basis, all knowledge and data must have backup restorations at different locations. This helps in accessing information if the original source gets destroyed or corrupted due to viruses, intrusions or natural occurrences. Back up data allows the business to function normally even if its system gets hacked or is out of order as copies of the knowledge base and databases are kept elsewhere. There are various knowledge asset protection planning programs that help ensure organizations to have access to their knowledge assets in the event of a natural catastrophe. These programs have various sources through which the knowledge base can be regained after a disaster making it easy for the organization to reinstate its standard activities. This knowledge protection system allows the organization to be prepared to face any kind of hindrance, it protects the valuable information of the organization, also prevents any obstruction and impediment due to the loss of valuable information that has been carried on for years. Moreover, when the knowledge base of the organization is safe from intrusions it is easier for the company management and upper level employees to be more unperturbed and stress-free and hence, can concentrate on other areas of growth. Conclusion In the end it is important to understand that with the increasingly knowledge dependent economies, organizations need to be active and agile at all times. Without sufficient knowledge it would become difficult for organizations to keep up with the competition and antagonism in the global markets. The sharing and integration of knowledge in organizations can drive innovation and increase productivity. Hence, the management of knowledge is a new imperative leadership as it has now become a valuable asset.

Friday, November 8, 2019

Sentence Structure The Basics of Word Order

Sentence Structure The Basics of Word Order Sentence Structure: The Basics of Word Order A grammatical sentence is more than just the sum of its parts. All those parts have to be in the correct order, too. Using an incorrect word order, on the other hand, may lead to errors or a lack of clarity. Thankfully, the basics of word order are easy to remember if you use the initialism â€Å"SVO.† Subject + Verb + Object (SVO) The minimum required for a grammatical sentence is a subject (i.e., the person or thing that is doing or being something) followed by a verb (i.e., the action or state of being). You can see this in the table below: Subject (S) Verb (V) Steve†¦ †¦dances. The sentence above has only two words: the proper noun â€Å"Steve† and the verb â€Å"dances.† This is enough to create a grammatical sentence, but only if we use those words in the order shown. If we were to reverse the word order here, it would not make sense (â€Å"Dances Steve†). Any sentence with a transitive verb will also require a direct object after the verb. This â€Å"object† is the thing being acted upon in the sentence. For example: Subject (S) Verb (V) Object (O) Sally†¦ †¦kicks †¦the ball. In the sentence above, the subject (â€Å"Sally†) acts upon (â€Å"kicks†) the object (â€Å"the ball†). Any order other than subject + verb + object here would be ungrammatical with adding extra words. And as such, this basic word order is often the clearest, most concise option available. Indirect Objects If you’re feeling a little braver about word order now, you might be ready to tackle indirect objects. An indirect object is the thing that receives the direct object in a sentence, such as in the following: Subject Verb Direct Object Preposition Indirect Object Jimmy†¦ †¦gave †¦the present †¦to†¦ †¦his grandad. To break this down a bit, in this case: â€Å"Jimmy† is the subject. The verb is â€Å"gave.† The direct object is â€Å"the present.† And â€Å"his grandad† is the indirect object. As you can see, then, when following a preposition like â€Å"to† or â€Å"for,† we place the indirect object after the object in the sentence. However, if we omit the preposition the sentence, the indirect object would go before the object (making the correct order subject + verb + indirect object + object): Subject Verb Indirect Object Direct Object Jimmy†¦ †¦gave †¦his grandad †¦the present. This distinction is key, so it’s always worth checking whether your sentence contains a preposition if you’re unsure about the correct word order. Summary: The Basics of Word Order The basic word order in English is captured in the initials SVO: Subject + Verb + Object Each of these plays a specific role in the sentence: Subject (S) – The person or thing that enacts the verb in the sentence. Verb (V) – The action or state of being described. Object (O) – The direct object is the person or thing being acted upon. The minimum required for a grammatical sentence is a subject plus a verb. But any sentence with a transitive verb will have a direct object as well. The word order may be slightly more complicated in a sentence that includes an indirect object (i.e., the recipient of a direct object in a sentence). In this case, the correct word order depends on whether you’re using a preposition. If you are using one, the correct order is: Subject + Verb + Object + Indirect Object If the preposition is omitted, the sentence should be ordered: Subject + Verb + Indirect Object + Object Finally, don’t forget that proofreading is a great way to ensure that your writing is free from grammatical errors. And our expert editors are always here and ready to help, so why not submit a document today?

Wednesday, November 6, 2019

Jean Jacques Rousseau essays

Jean Jacques Rousseau essays If you try to justify why human society goes from a wonderful and positive state of nature into a mostly uncontrollable political state, it is virtually impossible. Rousseau feels that when we enter into this political state, or society, that it is an inevitable. Humans will reach their potential, however at the same time society takes us away from our natural state and corrupts us. In this state of nature, humans are basically good. Rousseau thinks that nature should educate because it educates according to necessity. Throughout time, human society has evolved into a society educated by man. In the past, man has learned off of nature and his environment only to do and have what was necessary to get by. For the reason that man knew of no other life other than his own, man was happy. However, in todays society, man knows of many ways of life. There are many more ways to live, things to learn about, and possessions to own. In this aspect, man needs more than natures education in order to live in this society in which we have created. Todays education changes day to day in order to adapt to daily challenges. Nature does have an important role in the education of an individual, however in order for a person, in todays society, to be able to live a mentally and physically healthy and happy life, he or she must learn not only through nature, but also by man. The three main educative forces, Rousseau talks about, are nature, men, and also things. The education of nature consists only of what the human body is born with. Nature teaches us boundaries, while balancing our power and will. With too much power or will, we are not able to realize the one that is being overpowered. Thus causing us to exceed the lessor of the two, and forcing us to balance our expectations with our abilities. The second educative force is that of man. Man shows us how to use our body that we are born with. This education...

Monday, November 4, 2019

Water Conservation Essay Example | Topics and Well Written Essays - 250 words

Water Conservation - Essay Example While most natural disasters, like tsunami, happen comparatively fast that there is little time to prepare, droughts occur relatively slowly over a period of time. No single universal word can define when a drought begins or ends. However, the influences of drought can be initially felt by the amount of annual rainfall. Spontaneously, the impacts of drought increase with the time of a drought as supplies in lakes and groundwater are depleted. California has experienced a severe drought for four years now. The drought is characterized by very high temperatures and very low precipitation. With a high population and a deepening drought problem, competition for water between nature, farms and cities in California is acute. A future El Nino prospect presents opportunities for California to shore up its water security. Harvesting of El Nino rain water is necessary so as to ensure that California is water secure. Currently, water conservation is a priority for California residents because the state cannot afford any water wastage owing to its acute severe drought situation. The severe California drought has impacted water use and the government is also striving to overcome the drought situation. The state government has been at the forefront of encouraging residents to cut back on their water use. In April 2015, Governor Jerry Brown ordered urban residents to cut their water use by 25 percent. Communities that record high per capita use are most affected as government authorities are forcing them to reduce their daily water use by as much as 36 percent.

Saturday, November 2, 2019

Short story that is character driven Essay Example | Topics and Well Written Essays - 1250 words

Short story that is character driven - Essay Example My mother used to say it, my teacher at school said it, but nothing in my life bore this out’, I paused to check if she was with me. She was listening intently, leaning forward a little. ‘Go on, Roy, it’s something I’ve always believed in†¦Ã¢â‚¬â„¢ ‘Then you have got to hear this’, I cut in and settled back heavily as the sofa springs creaked in protest. My eyes glazed over to that day six years back. *** The rain had been falling in a steady torrent through the night. Whether it was the thunder that had raged night-long or the steady thumping of my adrenalin, I had been able to sleep barely a wink. My head pounded with thoughts of what I would say at the meeting: ‘Yes sir, I am a qualified chef†¦.. been to the best catering school in the country†¦. I have the training and the experience†¦.. have been saving up for this break†¦.. give it to me†¦..give it to me†¦.. oh, give it to me†¦Ã¢â‚¬â„¢ The wor ds raced through my mind, sometimes reaching my lips, sometimes dying away as new thoughts leapt up. Would they think me good enough to make the investment? What if I fumbled? Was I stepping too much out of a comfort zone? What if I lost the initial deposit, my life’s treasure, if I didn’t bag the deal? At this, I jerked out of bed and felt the sweat trickle down the back of my T-shirt. I walked over to the tiny kitchenette and switched on the light. As warm light flooded my little nest, my nerves steadied and I glanced at my reflection in the cut-glass framed mirror in the passage. Bright eyes, a determined mouth and a springy shock of dark hair stared back at me. My teacher’s words came back, ‘Roy, you are the best I ever saw. You are not just a great chef, you have in it you to be an entrepreneur†¦. Go for it my boy’. I had gone to see Mr. Dias when I saw the ad in the newspaper. 50,000 dollars deposit, catering school background, proven exp ertise, a go-getting spirit and the drive to set up and manage an international catering franchise in Mumbai. The company, Great Grub, was an international chain looking for a young person with the above qualifications to set up their first venture in India. Besides the 50,000 dollars that I had to put up to enter the fray, they would take pick up the tab on the entire rigmarole – real estate, marketing, staffing, kitchen operations, everything. Woo hoo, it was a dream come true. Tailor-made, answer to all my prayers, the one thing I needed to jumpstart my career to the big league. As I put water to boil for that cup of coffee I so needed, I remembered the wrench I had felt those two months back when I had to finally dig into the bank deposit that my mother had begun the day I was born. ‘When you need it for your studies or something big, it will be there for you’, she would say. In those carefree growing-up years those words had meant little and the first time t he existence of that tidy sum registered was when her lawyer handed me the papers on my eighteenth birthday, a year after she was gone. As I sipped my coffee pensively, I recalled how much she had wanted me to make it big, how she had stood by me like a rock when I wanted to follow my heart to catering school, how she had rebuffed all those who had scorned my choice of career as too ‘girly’. ‘This one is going to be for you, mom’, I whispered. The day began to break in, as it normally did – a little sliver of light crept in from the east window, picking out first the chintz covered sofa and then the antique center table in

Thursday, October 31, 2019

Cadbury plc UK division- Global Strategy analyses Case Study

Cadbury plc UK division- Global Strategy analyses - Case Study Example The present opportunities for Cadburry UK Division chocolate sector and its possible growth are considered and evaluated with the competitors'. This also examines the competitive and technological advancement threats the company receives from its rival competitors. SWOT Analysis Using the SWOT analysis and the SFAS matrix, the subsequent TOWS Matrix relating to the company's strategies in significant internal and external factors that poses effects to its performance and position in the chocolate market are as indicated below. This also includes the strategies the firm should adapt to leverage in order to achieve current and future growth and get a better position over its rivals. Internal Factors Strengths Weaknesses Strategies for Strength Opportunities Strategies for Weakness Opportunities Opportunities Maximize production to optimize on the benefits of the raising market. Integrate company brand for expansion and growth in emerging markets. Achieve growth through new acquisitions and mergers with other companies. Optimize the benefit of increasing market and increase sales by reducing prices of best selling products. Increase profits through new and up coming markets Target on research and development to reduce cost and increase profits Increase profit margin via Innovations and fresh products Threats Strategies for Strength Threats Leverage to differentiate Brand Venture into innovations to target higher profit margin Invest in research and innovations to produce new products attractive to customers. Optimize production in high selling products while reducing production of law market products. Strategies for... Looking at everything that has been stated above the company has a very strong portfolio of products. And each of the products and the product lines is in a different stage of the product life cycle, thus making it extremely necessary for the business to understand each of the different products, their markets and their potential thoroughly. This is necessary because the unique nature of the portfolio calls for different strategies to be adopted for the different products in the portfolio. As seen in the BCG matrix, the Ansoff and GE/McKinsey Matrix, the organization can undertake a host of different strategies to increase the profits that are reaped from the product lines and also to reinvest and in different activities such as research and development activities that will help the organisation to develop newer products to replace others that are now spent and in the decline stage and also to ensure that the present products that are bringing in the profits will increase their marke t share, or defend their market share in a manner that would only increase the future profits of the organisation. In summary the outlook for Cadbury’s internal and external environment is very good. The strengths of the organisation are very good when compared to the weaknesses and likewise the macro environmental conditions that are prevalent are very conducive to the company even in these difficult economic times.

Tuesday, October 29, 2019

The US as a Sole Superpower Essay Example for Free

The US as a Sole Superpower Essay During the Cold War that happened after World War II, there are distinctions that happened between and among countries all over the world. There is the First world countries which is composed of the United States and its allies, the Second world which is composed of the Soviet Union countries and the Third world countries which represents most Asian countries. This phenomenon has evolved to be the politics of development. Countries classified as first world or developed countries have managed to claim victorious their stance as superpower nation. History attests to the efforts of many developed countries, particularly the United States to impose their own generic formula of development to less developed countries. The Western influence of primarily the United States has embodied their character as the fast rising superpower of the universe. Yes, the West led by the United States is emerging as the country which will claim to be the sole superpower of the world in more years to come. The United States as a sole superpower will cause jealousy, corruption and anti-Americanism. The United States as a sole superpower will cause jealousy because being the sole superpower means that one has it all. And when one has it all, everybody will want to have a taste of what you are having. Jealousy transcends to insecurity and envy. When the U. S becomes the sole superpower, it is inevitable that the countries that once has pledge their loyalty and alliance will question their own capabilities to become a superpower country. In that realization, they too will aspire to share the seat of the U. S. When jealousy arises, more attempts to destroy the U. S as a leading superpower will come about. Different nations aspiring to become the superpower will devise their own tactics and plans to seat out the U. S in their hope to replace the U. S. Call it destabilization plots, military tactics to get into the head of U. S leaders and uncover the secrets in achieving such great success. Jealousy entails that one country is determined to destroy what the U. S has and envision his country to replace the stance of the U. S. The United States as a sole superpower will cause corruption. To quote Lord Acton, a 19th century British politician and academician, the aphorism â€Å"Power tends to corrupt, and absolute power corrupts absolutely† exemplifies what will happen in the U. S when they become the superpower of the world. (Hofstede, 2002b) Judging from other countries, poor countries tend to have higher corruption rates because of poverty and the need to survive. But such in the case of the U. S when it experience such wealth and resources, will cause corruption in their own turf. And this is not caused by the need to survive alone, but rather greed. The U. S as a superpower will cause corruption in its own government because leaders would want to benefit for what they have contributed to the country. Everybody would want to reward themselves with what the U. S have because it is their deemed right to do so. And that speaks of corruption. The power of the U. S will cause corruption because judging from history, almost every nation who had experienced unopposed level of power has fallen because they have abused it. Different empires since the Greeks have exemplified this downfall and absolute power shall tend to corrupt the U. S too once they emerge to become the sole superpower. (Messerrli, 2006) The United States has begun to demonstrate this action when they try to impose their own developmental formula to other countries and imposing it as a humanitarian effort to help third world countries. This action is clear when they tried to impose democracy in the Iraqi regimes without any concern for the world treaties imposed by the International Criminal Court or the United nations. The abuse of power will certainly lead to more invasions, and reenact what old invasion of the Greeks and Persians demonstrated in the earlier centuries. It will then prove to become a vicious cycle wherein the most powerful nation in the world will come to pursue other territories and own every resource to maintain their position being a sole superpower. The U. S as a sole superpower will cause Anti-Americanism in almost all ways possible. From our logic, when jealousy and corruption persist, more countries will tend to hate the U. S for the wealth they are experiencing. More so, they will hate Americans for the great boost of morale they have being number 1. (Messerrli, 2006)They will hate the Americans for imposing in them the idea that they are the leading race of the world and they have the power to command other nations and race in their actions. They will hate the Americans for always characterizing success with their country. Being number one entails that you are placed under scrutiny all the time, and criticized for every action that you take. The United States will embody what every other nation aspires to be. Even if the U. S envisions helping other poor countries, people from those countries will see otherwise. (Hiro, 2007)They will imply other hidden motives other than pure and ideally trusting action of the U. S in helping them, rather they will think that the U. S is planning to conquer the world. Terrorism will be recorded at an all time high. (Messerrli, 2006) And the U. S will not only strengthen their own economy but along with that comes great regard for the protection and security of its military forces to keep the position of number 1 all over the world. U. S leaders will prioritize their military forces to ensure that the 9/11 attacks will remain to be a history and that the U. S will remain to be the sole superpower. Even if the U. S maintains to fight the dictators of most countries as they believe greatly in democracy of a country and its people, many natives and nationalist of those countries will side their leaders and refuse to adhere to the U. S intention to liberate them. In the end, the only thing that will be seen is a powerful nation â€Å"bullying† other smaller nations. Despite all these negativity seen if the U. S becomes a sole superpower, fact remains that the U. S has mass resources it can use to help other countries alleviate poverty and hunger. It can also urge other progressive countries to help in this effort by improving other civilizations than just strengthening their military defenses. The U. S can serve as a protector of those countries needing help and can influence other wealthy nations to help with its social programs for other nations to benefit. The U. S is the embodiment of democracy and liberty. No other nation can brag of more equal opportunities for women and minorities than the U. S. The country can serve as a great example to other striving nations to achieve a country that is diverse and which upholds the dignity of every individual. Human rights is very well protected in the U. S and when the U. S becomes a sole superpower, and every other nation will try to imitate its standard, then ideally the other countries are imitating a quality standard of success. Also, the rights entailed by the Constitution of the United States give power to the greater American public. Freedom of speech is practiced and people, through the First Amendment can openly criticize the government for violating any human rights or abusing the authority of the government. Transparency and accountability is practiced as all times. Democracy which entails power of the people to decide on matters of the states will somehow prevail than the greed and abuse of power of some politicians. The economy of the U. S can also influence other economy-driven countries to format theirs as well. The strength of the U. S lies with its influence on other currencies, how the U. S dollar becomes the standard currency that influences other economies all over the world. This power can be a factor to regulate and stabilize other economies as well. With its intention to have a healthy diplomatic relations among other countries, the U. S cannot and will not afford to destroy that knowing that abusing its own power can lead to the destruction of its own economy as well. If the provision of the future entails the United States as the sole superpower of the world, there will always be two sides of the coin. With its great resources and ideal view of democracy, and can bring a new sense of civilization, stability and prosperity among other nations. But this strength can also result to other country striving to become better than the U. S, other country aspiring to unseat the number 1 country, and people of those nations hating the U. S because of jealousy and envy. As a conclusion, it all depends on the future leaders and the morals they hold being the leader of the sole superpower of the world. There will come a time that abuse will be realized, corruption practiced, and jealousy prevailing. But with a leader who has all the right and moral intentions to do well, and use the success of the U. S as a catalyst for social change, the world will be better off with a superpower such as the United States. Let us all just hope that their intention to hold the ideal concept of democracy and respect to the human rights of the people will prevail, or else, the world will only see two distinctions: the United States and its conquests, or the United States and the developing countries. Reference: Hiro, D. (2007).The Sole Superpower in Decline: The Rise of a Multipolar World [Electronic Version]. TomDispatch. Retrieved December 9, from http://www. zmag. org/content/showarticle. cfm? ItemID=13586 Hofstede, G. (2002b). The economic and cultural dynamics of corruption 2001 data. The Universal and the Specific in 21st-Century Global Management, 28(1), 34-43. Messerrli, J. (2006). Is it good for the world to have the U. S. as the sole superpower? [Electronic Version]. Retrieved December 9 from http://www. balancedpolitics. org/sole_superpower. htm