Saturday, August 31, 2019

A new media and its impact Essay

The more time you spend in India, the more you realize that this country is one of the world’s greatest wonders a miracle with a message. And the message is that democracy matters†. India is one of such paradises on earth where you can speak your heart out without the fear of  someone gunning you down for that, or, it has been until  now. Article 19 of the Indian Constitution provides freedom of speech as the fundamental right embodied in part III. This Art. give fundamental right to every citizen to enjoy freedom of speech without hurting the other. Even if the situation of Indians is a lot better than that of their fellow citizens of other nations, the picture is not really soothing or mesmerizing for Indians any more. This observation is being made with regard to the exercise of the right of freedom of speech and expression in the context of social media. Social media in present world have become an important part of individual’s life. Almost all the people in the world are becoming part of social media even judges have also been influenced by this social media. This Social media sometime affect the judgement of court. Judge as a human being also use social media i.e. Facebook, Tweeter blog etc. Fundamental right to speech and expression has been hampered by the arbitrary use of the so called cyber laws of the nation,  particularly Section 66A of the Information Technology Act, 2000. This section gives arbitrary power to police to arrest person by interpreting this section for their use. Because of this arbitrariness the section 66A of IT act is unconstitutional and should be stuck down by the court of law. Before delving into the issue in details, it is but desirable to first understand the concepts of social media and freedom of speech and expression. SOCIAL MEDIA Social media comprises primarily internet and mobile phone based tools for sharing and discussing information. It blends technology, telecommunications, and social interaction and  provides a platform to communicate  through words, pictures, films, and  music. Social media includes web- based and mobile technologies used to turn communication into interactive dialogue. Andreas Kaplan and Michael Haenlein define social media as â€Å"A group of internet -Based application that build on the ideological and technological foundation of Web 2.0, and allow the creation and exchange of user- Generated context. † â€Å"Web 2. 0† refers to Internet platforms that allow for interactive participation by users. â€Å"User generated content† is the name for all of the ways in which people may use social media. FREEDOM OF SPEECH AND EXPRESSION Freedom of speech and expression is broadly understood as the notion that every person has the natural right to free ly express themselves through any media and frontier without outside interference, such as censorship, and without fear of reprisal, such as threats and  persecutions. This  is  because  freedom  of  expression is not absolute and carries with it special duties and responsibilities therefore it may be subject to certain restrictions provided by law. The following are some of the most commonly agreed upon definitions of freedom of expression that are  considered as valid international standards: â€Å"Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers. †1   â€Å"Everyone shall have the right to hold opinions without interference. Everyone shall have the right to freedom of expression; this right shall include freedom to seek, receive and impart information and ideas of all kinds, regardless of frontiers, either  orally, in writing or in print, in the form of art, or through any other media of his choice. †2 Similarly, Article 19 (1) (a) of the Constitution of India also confers on the citizens of India the right â€Å"to freedom of speech and expression†. The freedom of speech and expression means the right to express one’s convictions and opinions freely by word of mouth, writing, printing,  pictures  or  any  other  mode. In the light of Moon’s argument, the importance of freedom of speech and expression while using social media can be better understood. FREEDOM OF SPEECH AND EXPRESSION AND SOCIAL MEDIA/INTERNET The Internet and Social Media has become a vital communications tool through which individuals can exercise their right of freedom of expression and exchange information and ideas. In the past year or so, a growing movement of people around the world has been witnessed who are advocating for change, justice, equality, accountability of the powerful and respect for human rights. In such movement, the internet and social media has often played a key role by enabling people to connect and exchange  information  instantly  and  by creating a sense of solidarity. Emphasising the importance of internet, the UN Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression in his Report, which was submitted to the Human Rights Council, stated that the internet has become a key means by which individuals can exercise their right to freedom and expression and hence, internet access is a human right. Report further stressed that States should ensure that internet access is maintained at all times, even during times of political unrest. Describing new media as a global network to exchange ideas and opinions that does not necessarily rely on the traditional mass media, the Committee stated that the States should take all necessary steps to foster the independence of these new media and also ensure access to them. Moreover, Article 19 of the Universal Declaration of Human Right and Article 19(2) of the International Covenant on Civil and Political Right also provides for freedom of speech and expression even in case of internet and social  media. Thus, it is seen that freedom of speech and expression is recognized as a fundamental right in whatever medium it is exercised under the Constitution of India and other  international documents. RESTRICTIONS ON FREEDOM OF SPEECH AND EXPRESSION The freedom of speech and expression does not confer on the citizens the right to speak or  publish  without  responsibility. It  is  not  an  upbraided  license  giving  immu nity  for  every possible use  of language and  prevents punishment  for those  who abuse  this freedom. Article19 (3) of the International Covenant on Civil and Political Right imposes restrictions on the following grounds: (a)For respect of the rights of reputations of others (b) For protection of national security, or public order, or public health or morals. As per Article 19(2) of the Constitution of India, the legislature may enact laws to impose restrictions on the right to speech and expression on the following grounds: (a) Sovereignty and integrity of India Security of the State (c) Friendly relations with foreign States (d) Public order (e) Decency or morality (f) Contempt of court (g) Defamation (h)   Incitement to an offence CYBER LAWS OF INDIA AND SOCIAL MEDIA Although there is no specific legislation in India which deals with social media, there are several provisions in the existing so-called cyber laws which can be used to seek redress in case of violation of any rights in the cyber space, internet and social media. The legislations and the relevant provisions are specifically enumerated as under: The Information Technology Act, 2000 (a) Under Chapter XI of the Act, Sections 65, 66, 66A, 6C, 66D, 66E, 66F, 67, 67A and67B contain punishments for computer related offences which can also be committed through social media viz. tampering with computer source code, committing computer  related offences given under Section 43, sending offensive messages through communication services, identity theft, cheating by personation using computer  resource, violation of privacy, cyber terrorism, publishing or transmitting obscene material in electronic form,material containing sexually explicit act in electronic form, material depicting children in sexually explicit act in electronic form, respectively. Section 66A of the Information Technology Act, 2000 Of all these provisions, Section 66A has been in news in recent times, albeit for all the wrong reasons. Section 66 A of Information Technology Act 2000 which provide for the punishment for sending offensive messages through communicatio n service provide three years punishment and fine or both for sending message of grossly offensive or menacing character. For example: Fake profile of president by imposter, fake profile had been made by imposter in the name of formal President Hon’ble Pratibha Devi Patil, on social networking website, Facebook . In another case of Bomb Hoax mail case, A 15 year-old teenage of Bangalore in 2009 was arrested by the cyber-crime investigation cell (CCIC) for allegedly sending a hoax e-mail to a private news channel. 66A. Punishment for sending offensive messages through communication service, etc. Any person who sends, by means of a computer resource or a communication device,— (a) any information that is grossly offensive or has menacing character; or (b) any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently by making use of such computer resource or a communication device, shall be punishable with imprisonment for a term which may extend to three years and with fine  shall be punishable with imprisonment for a term which may extend to three years and with fine. Section 66A which punishes persons for sending offensive messages is overly broad, and curbs freedom of speech and expression and violates Articles 14, 19 and 21 of the Constitution. Justice Bhagwati in Maneka Gandhi case3 said that a law should be just, fair and reasonable. Formal Chief Justice Altamas Kabir and Justice J. Chelameswar, noted that the wording of Section66A is not satisfactory. It is made very wide and can apply to all kinds of comments. The fact that some information is â€Å"grossly offensive† (s. 66A(a)) or that it causes â€Å"annoyance† or â€Å"inconvenience† while being known to be false (s. 66A(c)) cannot be a reason for curbing the freedom of speech unless it is directly related to decency or morality, public order, or defamation (or any of the four other grounds listed in Art. 19(2)). There is no clear explanation of those words in this section. The expressions used in the Section are â€Å"vague† and â€Å"ambiguous† and that 66A is subject to â€Å"wanton abuse† in view of the subjective powers conferred on the police to interpret the law. It give excess power to administration for example: On February 6, 2013, Sanjay Chaudhary was arrested under section 66A of the Information Technology (IT) Act for posting ‘objectionable comments and caricatures’ of Prime Minister Manmohan Singh, Union Minister Kapil Sibal and Samajwadi Party president Mulayam Singh Yadav on his Facebook wall. However, the incident that rocked the nation was the arrest last November of two young women, Shaheen Dadha and her friend Renu Srinivasan, for a comment posted on Facebook that questioned the shutdown of Mumbai following the demise of Shiv Sena Supremo Bal Thackeray. Looking at the construction of that word of Sec 66(A), it unintentionally prevent organisations from using proxy servers. Furthermore, it may also prevent remailers, tunneling, and other forms of ensuring anonymity online. This doesn’t seem to be what is intended by the legislature. According to Government of India, section 66A, introduced in the 2009 amendments to the IT Act, has been taken from Section 127 of the U. K. Communications Act, 2003 it has already read down by HOUSE OF LORDS on the grounds that Parliament of U. K. could not have intended to criminalise statements that one person may reasonably find to be polite and acceptable and another may decide to be ‘grossly offensive and regard that section as U. K. ’s worst provisions MEANING OF TERM â€Å"GROSSLY OFFENSIVE† In Director of Public Prosecutions v. Collins4 case before House Of Lords, arising out of racist references in messages left by a constituent on the answering machine of a British MP, the House of Lords laid down a seminal test for determining whether a message is ‘grossly offensive. ’ Justices must apply the standards of an open and just multi-racial society, and that the words must be judged taking account of their context and all relevant circumstances. † The House of Lords added that â€Å"there can be no yardstick of gross offensiveness otherwise than by the application of reasonably enlightened, but not perfectionist, contemporary standards to the particular  message sent in its particular context. † Most importantly, the House of Lords held that whether a message was grossly offensive did not depend merely on the degree of offence taken by the complainant but on whether it violates the basic standards of an open and just multi-racial society. DIFFERENCE BETWEEN SEC. 127 OF U. K. COMMUNICATION ACT, 2003 AND SEC. 66A OF I T ACT Section 66A (a) refers to the sending of any information through a communication service that is ‘grossly offensive’ or has ‘menacing character’. In the U. K., Section 127(1)(a) makes the sending of ‘matter that is grossly offensive or of an indecent, obscene or menacing character’ an offence. The punishment for the offence in Section 127(1) is a maximum of six months’ imprisonment or a fine of ? 5,000 while Section 66A imposes a much more serious punishment of imprisonment up to three years and a fine without limit. Therefore, Section 66A(b) of the IT Act is not the same as Section 127(1)(b) of the U. K . Communications Act, 2003 in terms of scope of the offence or the punishment. PUNISHMENT – ARTICLE 14 ; 21 OF INDIAN CONSTITUTION Punishment under this act appeared to be violative of Article 21 (right to life) and Article 14 (non-discrimination/equality). This law is not consistent with the notions of fairness while it imposes an equal punishment for different intensive offence. Section is unreasonable and arbitrary in nature. Punishment for this purposes disparate belonged together in a single clause is quite astounding and without parallel (except in the rest of the IT Act). That’s akin to having a single provision providing equal punishment for calling someone a moron (â€Å"insult†) and threatening to kill someone (â€Å"criminal intimidation†). There is no countervailing interest in criminalizing false and persistent â€Å"insults†, etc. , that will allow those parts of this provision to survive the test of ‘reasonableness’ under Art. 19(2). Constitution of India is much stronger than that of the unwritten constitution of United Kingdom. In India, Judiciary has the power of judicial review, whereas in United Kingdom parliament is consider supreme. Putting those two aspects together, a law that is valid in the United Kingdom might well be unconstitutional in India for failing to fall within the eight octagonal walls of the reasonable restrictions allowed under Art. 19(2). That raises the question of how they deal with such broad wording in the UK. SECTION 66A – ARTICLE 19 OF INDIAN CONSTITUTION Section 66A of IT act violates Art. 19 of Indian constitution. This section is against the fundamental right to speech and expression. Right under Art. 19 is not absolute right. Art. According to the government, section 66A is the reasonable restriction that is imposed on freedom of speech and expression but Under Article 19(2), restrictions on freedom of speech and expression are reasonable if they pertain to any of the listed grounds, such as sovereignty and integrity of India, etc. But under Section 66A, restrictions have been placed on freedom of speech and expression on several other grounds, apart from those mentioned in the Constitution. Therefore it is violates Art. The current equivalent laws in USA is US Federal Anti-Cyber-Stalking law, this law prohibit harassment or stalking legislation. This act awards punishment up to one year or fine of up to $ 1000. In Australia, the Stalking Amendment Act (1999) was introduce to include the use of any form of technology to harass a target as forms of â€Å"criminal stalking. † In Poland Stalking, there is Polish Criminal Code 2011 which including cyber stalking as a criminal offence, this act awards six month punishment SOCIAL MEDIA – JUDICIARY Improved communications technology and social media, such as Twitter, Google + and Facebook, are changing the face of journalism. Media like affecting all the institutions of the Government also affect the Judiciary. It completely overlooks the vital gap between an accused and a convict keeping at stake the golden principles of ‘presumption of innocence until proven guilty’ and ‘guilt beyond reasonable doubt’. Media itself does a separate investigation, builds a public opinion against the accused even before the court takes cognizance of the case. By this way, it prejudices the public and sometimes even judges and as a result the accused, that should be assumed innocent, is presumed as a criminal leaving all his rights and liberty unredressed. Results in characterizing him as a person who had indeed committed the crime, it amounts to undue interference with the â€Å"administration of justice†, calling for proceedings for contempt of court against the media. Other than this, Twitter, Facebook, and other forms of social media are causing difficulties for judges who are trying to administer fair trials. For example, what rules should there be, if any, on whether judges tweet during a case? Should courts be able to monitor the social-networking contacts of attorneys during a trial, and what about witnesses or even parties? Should there be limits on all use or just limits on what is said? The questions seem endless, and the answers certainly are not easy. Should judges or their campaigns be able to use Facebook and have â€Å"friends† that may be potential parties before the court or attorneys appearing in court? Is it appropriate for judges to have a personal Facebook page separate from a professional one, or is that activity unbecoming the judiciary?. Right now there is a patchwork of rulings on these issues but, for the most part, no definitive rules exist. If there are no rules, it can become a treacherous terrain for media-savvy judges to navigate. Some of the people are totally against the blog of judges but some other advocate that and see it as a way to educate the public about the court function. CONCLUSION It is clearly evident that social media is a very powerful means of exercising one’s freedom of speech and expression. However, it is also been increasingly used for illegal acts which has given force to the Government’s attempts at censoring social media. Where on the one hand, the misuse of social media entails the need for legal censorship, on the other hand, there are legitimate fears of violation of civil rights of people as an inevitable consequence of censorship. What is therefore desirable is regulation of social media, not its censorship. However, the present cyber laws of India are neither appropriate nor adequate in this respect. An analysis of the existing IT laws shows that there is unaccountable and immense power in the hands of the Government while dealing with security in the cyber space. Even then, it is not sufficient to check the misuse of social media. Section 66A certainly does not engage in the delicate balancing required to pursue the legitimate objective of preventing criminal intimidation and danger through social media without going no further than required in a democratic society to achieve that end. The drafters of Section 66A(b) have equated known criminal offences in the real world with acts such as causing annoyance and inconvenience that can never constitute an offence in the real world and should not be offences in the virtual world. Therefore, the legislative restrictions on freedom of speech in Section 66A (b) cannot be considered as being necessary to achieve a legitimate objective. Section 66A should not be considered a ‘reasonable restriction’ within the meaning of Article 19 of the Constitution and must be struck down as an unconstitutional restriction on freedom of speech. If political speech, that is, criticism of politicians and exposure of corruption continues to be punished by arrest instead of being protected, India’s precious democracy and free society will be no more. Hence, a specific legislation is desirable to regulate social media. However, there are many practical difficulties which may arise while doing so. There is a very thin line which demarcates the enjoyment of one’s right and the violation of the enjoyment of else’s right in the process. In social media, the exercise of freedom of speech and expression by one may result in the invasion of privacy and defamation. The provision should be made in accordance with the reasonable restriction provided under article 19(2) of Indian Constitution. While persistent false communications for the purpose of annoying, insulting, inconveniencing, or causing ill will should not be criminalized (if need be, having it as a civil offence would more than suffice), doing so for the purpose of causing danger or criminal intimidation should. A provision is needed to penalise hoax bomb threats, then the provision clearly should not be mentioning words like â€Å"annoyance†, and should not be made â€Å"persistent†. The act should define the punishment according to the malic intension of the offender, less punishment should be awarded for less intensity of offence. Media should not be allowed to call a person as an accused before a court of law held that person as an accused. A blog or a Facebook account should be made in the name of Courts, to provide information on legal issue.

Friday, August 30, 2019

A Grain of Wheat Essay

A Grain of Wheat is a novel by Kenyan novelist Ngugi wa Thiong’o. The novel weaves several stories together during the state of emergency in Kenya’s struggle for independence (1952–1959), focusing on the quiet Mugo, whose life is ruled by a dark secret. The plot revolves around his home village’s preparations for Kenya’s independence day celebration (Uhuru day). Former resistance fighters General R and Koinandu plan on publicly executing the traitor who betrayed Kihika (a heroic resistance fighter hailing from the village) on that day. First of all, Ngugi use many characters to express the aim of the story as an African man the protagonist of this story is the loner Mugo, a hero of the British concentration camps where he led a hunger strike and he also tried to stop a village guard from beating a pregnant woman to death. Although he is thought to be a hero through the whole book, he is the traitor of Kihika betraying him to the British in a selfish act to save himself. Also Gikonyo, an ambitious carpenter and business man who’s married to Mumbi. He confessed to taking the oath of the resistance while in a concentration camp, securing an early release only to find that his wife had borne a child with his hated rival Karanja while he was away. another character is Mumbi, the wife of Gikonyo and sister of Kihika. While Gikonyo was imprisoned she slept with Karanja who had been appointed village chief by the colonial power. Also, Karanja, a collaborator with the British and widely suspected to be the traitor who betrayed Kihika. In addition toKihika, a resistance fighter who conquered a police station and killed the hated District Officer Robson before being caught and hanged after being betrayed by Mugo. and John Thompson, an early British settler and administrator of Thabai, who believes in the ideals of colonial imperialism and persecutes black Africans. A Grain of Wheat is about the events that lead up to the Kenyan independence, or Uruhu. The setting is a Kenyan village. When the characters Gikonyo and Mumbi get married, are in love and just started their lives, Gikonyo is sent to detention. When he comes back after six years, Mumbi had his rival’s child. They cannot find the words to talk about the past, and a wall is created between them. Mumbi’s brother gets captured and hanged and after loads of events, the town realize that the one they thought to be the hero, was actually the betrayer.

Thursday, August 29, 2019

Nuclear Power Vs Coal Burning Environmental Sciences Essay

Nuclear and coal discharged power Stationss provided about half of the electricity generated in the UK in 2007. Figure 1 shows a dislocation of the parts made by all of the beginnings of fuel used to bring forth electricity in that twelvemonth. Figure 1: Fuel used for UK electricity coevals on an end product footing in 2007 [ 1 ] . Coal is an cheap fuel that is comparatively easy to mine and the UK still has big militias. In 2001 the universe militias of recoverable coal were 1083 billion metric tons which is adequate to last over 200 old ages at current World ingestion degrees. [ 2 ] Unlike oil and gas, the bulk of which is concentrated in the politically sensitive country of the Middle East, the largest militias of coal are in North America, Russia, China and India. Nuclear power Stationss use comparatively little sums of fuel compared to char, so uranium can be easy stock piled. Known uranium stocks are merely plenty for approximately 50 to sixty old ages at current ingestion degrees. However, much of the U is available from less sensitive parts such as Australia, Canada and the United States, { see Appendix 1 } . Nuclear workss are powered by enriched uranium pellets. To guarantee continuation of electricity supply, up to 100 dozenss of pellets may be stored at each reactor at any clip. Each one inch pellet can bring forth the same sum of energy as one ton of coal [ 3 ] . This is because power station class coal has a calorific value of about 26 GJ/tonne and U has a calorific value of between 420,000 and 672,000 GJ/tonne i.e. about 20,000 times as big. [ 4 ] The mean thermic efficiency for atomic workss in the UK in 2005 was 38 % [ 5 ] . The newest coal engineering can accomplish about 48 % efficiency [ 6 ] . For comparing, typical efficiencies for the assorted ways of bring forthing electricity in the UK are shown in Appendix 2. Nuclear and coal discharged power Stationss work in much the same manner. Water is heated to do steam which turns turbines connected to generators which produce electrical power. The difference is that in atomic power Stationss a concatenation reaction is used to do the heat alternatively of firing coal. Nuclear power workss create heat through the fission of U atoms that are split by slow traveling neutrons bring forthing tremendous sums of energy. Figure 2 shows the basic designs of ( a ) dodo fuel workss and ( B ) atomic workss. Figure 2 Comparison of typical designs of fossil fuel and atomic workss [ 7 ] With coal fired Stationss the immediate pollution job is air borne atoms. The ash produced in the burning chamber besides presents a major waste control job because of the immense sums created. For illustration, a 1000MW coal fired station produces about 400,000 metric tons of ash per twelvemonth [ 8 ] . Whereas, 12,000 metric tons of waste is generated by all of the universe ‘s atomic reactors per twelvemonth. [ 8a ] Nuclear power workss do non bring forth the air pollution associated with coal, but the spent fuel is a risky waste that can stay a radioactive menace for 1000s of old ages. The fact that the atomic station needs a containment edifice to envelop the reactors highlights the possible danger of atomic power. The containment edifice has a strengthened concrete shell lined with steel which acts as a radiation shield to forestall any release of radiation in the event of an accident. It is designed to be strong plenty to defy temblors, aircraft impacts and sabotage efforts. The three major events that have slowed the advancement of the atomic industry worldwide are the Windscale fire of 1957, the Three Mile Island partial reactor meltdown in 1979, and the more serious Chernobyl reactor meltdown in 1986. The incidents showed the demand for a containment edifice because with the Three Mile Island accident the radioactive dust was successfully contained. Whereas, the Chernobyl and Windscale reactors did non hold a containment edifice which resulted in big countries of the environing countryside being contaminated by radioactive dust. The Windscale incident was on a much smaller graduated table than Chernobyl with a thousand times less radioactive Iodine 131 being released. [ 9 ] In all of the incidents hapless on the job patterns, faulty or unequal equipment and complacence about safety issues were involved. These incidents and the tremendous cost of decommissioning the reactors has meant that for many old ages at that place have been no programs to construct any more atomic reactors in the UK. Coal fired power workss have been associated with smog, acerb rain and planetary heating. They besides release metals such as quicksilver, arsenic, Be, Cd, lead and Se which can be deposited on dirt, in lakes and in watercourses where they become long term environmental pollutants. Gass associated with firing coal include C dioxide, the chief nursery gas blamed for planetary heating and clime alteration ; sulfur dioxide which can do acerb rain ; and N oxides which are responsible for ground-level ozone. Particulate affair, which includes dust, carbon black, nitrates and sulfates is besides emitted doing respiratory jobs and asthma onslaughts. Natural coal besides contains trace sums of radioactive U and Th. This is non a job until coal is burned bring forthing fly ash, which concentrates the original degrees of U and Th by a factor of 10. Surprisingly, ‘the fly ash emitted by a power works carries into the environing environment 100 times more radiation than a atomic power works bring forthing the same sum of energy ‘ . [ 10 ] The environmental jobs associated with coal have led to a push for ‘clean coal ‘ steps to restrict emanations and to capture the CO2. For illustration, fluke gas desulphurisation systems can take up 99 % of the sulfur dioxide. The procedure besides produces gypsum which is used in the building industry. Nitrogen oxides are controlled utilizing particular burners which cut down the O supply to the hottest portion of the burning chamber where the coal is burned. Electrostatic precipitators can take more than 99 % of the particulates from the fluke gas by making a charge on the atoms which are so attracted by aggregation home bases. Fabric filters and wet particulate scrubbers are besides used. As CO2 is a nursery gas the proposed method is to capture the gas and shop it underground before it can get away to the ambiance. Figure 3 shows an illustrations of how a CO2 gaining control system might be used.Key1. CO2 pumped into obsolete coal Fieldss displaces methane which can be used as fuel 2. Carbon dioxide can be pumped into and stored safely in saline aquifers 3. CO2 pumped into oil Fieldss helps keep force per unit area, doing extraction easier Figure 3 Options for informations gaining control and storage The construct of C gaining control and storage has been proven by little scale systems but commercially feasible large-scale systems have non yet been developed. Coal mines can be unsafe and soiled topographic points and unfastened dramatis personae excavation in peculiar can go forth an unpleasant landscape. Coal mineworkers can be affected by pneumonoconiosis, or black lung disease, and emphysema if they breathe in excessively much of the coal dust. Transporting coal by lorry and train from the mine to the power station causes pollution. As the older coal fired and atomic power Stationss reach the terminal of their utile lives, determinations will hold to be made about their replacing. Should atomic or coal be considered for the following coevals of power Stationss in the UK? In an ideal universe the reply would likely be no ; but in the existent universe the concerns of authoritiess are energy security and supplying a uninterrupted supply of electricity at a sensible monetary value. Therefore, it is likely that one or both will play a important portion in the proviso of base burden electricity for the foreseeable hereafter because feasible options are non yet available. The instance for atomic power must get down by sing the fact that installed safety systems have non prevented three major atomic accidents in the last 50 old ages. No 1 could give a 100 % confidence that a major catastrophe will non go on in the hereafter ; but the atomic industry has been scrutinised more than any other industry in history and hence the safety steps are as near to state-of-the-art as possible. Progresss in nanotechnology may bring forth better control and feeling devices to farther better safety steps. In recent old ages ‘while the agreements for storage have proved to be satisfactory and the installations have been operated without major jobs, it is by and large agreed that these agreements are interim, that is, they do non stand for a concluding and lasting solution ‘ . [ 12 ] However, work on atomic transubstantiation, that can potentially cut down the clip that the waste is unsafe from 1000s of old ages to possibly five hundred old ages, [ 8a ] , may do it more toothsome. Nanotechnology research into disassemblers may bring forth applications in atomic risky waste direction. Coal generated power is a good established engineering that people are familiar with. However, it has a repute for being a dirty industry that can be unsafe for its workers and bring forth a visually unpleasant environment. In recent old ages the clime alteration argument has intensified and coal, which produces the most greenhouse gases of the fossil fuels, has been targeted as a major cause of planetary heating. The efforts to clean up the industry will potentially cut down the job but will be dearly-won and may take many old ages to demo any betterments. One factor that may work in its favor is the recent discrediting of scientists look intoing clime alteration. Allegations were made that ‘climate scientists had doctored informations to show that worlds are responsible for planetary heating ‘ and ‘the universe ‘s most of import administration for supervising clime alteration claimed that the Himalayan glaciers would vanish by 2035 without the backup of peer-reviewed research ‘ . [ 11 ] This has allowed advocates of coal fired Stationss to propose that the instance for planetary heating has been overstated and that coal and other dodo fuelled power Stationss may be acceptable after all. China, India and other developing states are likely to be constructing 100s of coal fired power Stationss in the close hereafter. If the clime alteration anteroom has got it right it would look irresponsible for the UK to add to the job. Furthermore, a new coevals of atomic power Stationss would assist the UK authorities to run into its mark of cutting nursery gas emanations by 80 % by 2050. There is grounds that determinations are being made within authorities to unclutter the way for new atomic power Stationss. [ ] hypertext transfer protocol: //www.guardian.co.uk/environment/blog/2010/jul/27/decc-carbon-calculator } } . The trust on imported gas from some of the universe ‘s most unstable parts is considered unacceptable and favorable remarks associating to atomic power coevals have been made. The most recent grounds is EDF Energy uncovering programs to pass ?1billion in 2011 on new contracts and readying work for the Hinkley Point atomic power station in Somerset. [ ] { 13/02/11 Mail on Sunday Tom McGhie } After due consideration, I would give probationary support to a revitalized atomic industry in the UK working under the strictest of examination. I would trust that the major technological jobs with the handling of risky atomic waste will be solved in the close hereafter. Besides, if atomic power coevals receives more public credence, research into the fast breeder reactors and the long term end of power from atomic merger may have a encouragement. These developments would ease the waste job and do atomic power more sustainable in the long term.Appendix 1Table 1 Known recoverable resources of uranium [ 3a ] The top portion of the tabular array shows the â€Å" sensible assured resources † and â€Å" inferred resources, † at cost less than $ 130 per kilogram of U, as of 1 Jan 2005. These are the estimated resources in countries where geographic expedition has taken topographic point. There is besides 1.3 million dozenss of low uranium sitting about in reserves, a byproduct of old uranium activities.Appendix 2Source – Eurelectric hypertext transfer protocol: //www.mpoweruk.com/energy_efficiency.htm

Final Coursework Example | Topics and Well Written Essays - 2500 words

Final - Coursework Example In order to determine the feasibility of a project and to allow for comparisons between those that are mutually exclusive several very useful and highly recognised techniques are available. They include: I. Net present value (NPV) II. Internal rate of return (IRR) III. Accounting Rate of Return (ARR); and IV. Simple payback There are three (3) machines that the firm is considering as an investment. They are the Alumier which it currently uses; Big EZ and Cial. The objective of evaluating these investments is to determine which would be more beneficial to the firm. Evaluating Capital Budgeting Tools The NPV, IRR, ARR and simple payback. The advantages and disadvantages of using these methods are noted weaknesses and the relevant calculations to aid in the decision process are noted. Net Present Value (NPV) The net present value takes the time value of money into account and so the cash flows are discounted over the useful life of the asset. A NPV of zero means that the cash flow from the project would be sufficient to repay the initial investment only but would not contribute anything extra. A NPV that is less than zero (negative) would indicate that the funds generated from the project cannot generate sufficient funds to repay the initial investment and therefore should not be undertaken. On the other hand a positive NPV indicates that the project would be able to repay the initial investment and also allow some returns to shareholders (Brigham and Ehrhardt 2005). A positive NPV therefore means that the project under consideration is a worthwhile investment and should be undertaken. This method is very popular but has a number of shortcomings. Titman et al (2011) indicates that in case of capital rationing the NPV is not the deal method as choosing the projects with the highest profitability but not the highest NPV overall when compared to a number of smaller projects. Additionally some of the budget may be left unused. The formula for calculating the NPV is: N PV = CF0 + ((CF1/(1 +

Wednesday, August 28, 2019

Race Essay Example | Topics and Well Written Essays - 500 words

Race - Essay Example the features of a quadroon in the baby and ultimately abandons his wife and the child only because he thinks Desiree does not have a pure white inheritance: It is also important to note the significant line which defines the entire theme of the story: â€Å"Moreover he no longer loved her, because of the unconscious injury she had brought upon his home and his name (Choplin 664)†. Moreover, the high handed emotional reactions incited by racialism is echoed by poems of yore such as Let America be America Again by Langston Hughes. Strong laments over their fate for being black can be seen in such works: However, the question that still seems to persists is whether the dream of letting â€Å"America be America Again† is now fulfilled. Whether or not the dream of seeing America in its original beauty and Letting â€Å"†¦America be the dream the dreamers dreamed/ Let(ing) it be that great strong land of love/ Where never kings connive nor tyrants scheme† has been fulfilled (Huges 6-8). Perhaps it has. The America that we look at today is the America of diversity, democracy and racial multiplicity. There is perhaps not a single race of this earth that hasn’t walked the street of New York. There is no race that has not had the privilege of calling itself an American. That is because there is no more an identity associated with being an exclusive â€Å"American†. People are African-American, Japanese-American, Chinese-American, Indian-American and numerous others. Whatever country or race we add as prefix to â€Å"American† is an American! The question of apartheid is now almost dead. Being read in the eyes of the world as one of the most diverse civilization of this earth, America is in its best today as far as its wholesome nature of unification and equality is concerned. That is because, there is no culture of this world that America does not have. African is one of them. And any instance of even slight consideration of blacks as primitive to white seems to be a

Tuesday, August 27, 2019

Privately Owned Critical Infrastructure Assignment

Privately Owned Critical Infrastructure - Assignment Example It is important to note that the type of hazards that different facilities are exposed to vary from one state or local jurisdiction to another. As such, it is important for a proper analysis to be carried out on the hazards that are particular to a given region to lay measures for the management of the various hazards. It is important to not only establish the kind of hazards that a facility is at risk of experiencing but also to determine the likelihood of occurrence of such hazards as compared to other possible hazards (Krausmann, Cozzani, Salzano, & Renni, 2011). In the assessment of the natural hazards that a chemical facility dealing with natural gases is likely to face, it is important to note the inherent risks. Incidents that involve chemical releases, fires, or explosions due to internal causes such as sabotage or accidents, or external causes including meteorological, hydrological, or geographical events, or terrorist attacks are likely to be faced (Krausmann, Cozzani, Salzano, & Renni, 2011). The two major gases manufactured by the facility include Arsenic pentafluoride and boron tribromide, which are highly toxic. These gases are stored in high quantities in insulated tanks. Given the location of the chemical facility, variations in the atmospheric stability and the wind speed form part of the meteorological conditions that may expose it to various hazardous accidents. Other natural disasters that the facility may be exposed to include earthquakes and floods. It is important to note that such natural hazards are of great concern due to their impact as some of them may initiate other events that may lead to even further damage. For instance, earthquakes result in other events such as ground failure, surface faulting, fires, landslides, and a release of hazardous materials such as the toxic gases into the environment may occur. One of the terrorist risks that the

Monday, August 26, 2019

Strategic Plan Essay Example | Topics and Well Written Essays - 1000 words

Strategic Plan - Essay Example Generally, groupthink is illustrated in organizations such as the military, fraternities/sororities, and cults. This theory, although characterized to have a strong organizational cohesion, is considered as a negative characteristic because it does not promote progressive thinking among its members, therefore stunting the organization's development. Social comparison theory, meanwhile, provides a pragmatic view of organizational cultures. In this theory, cultures are assessed based on their differences, and relative development against each other. Social comparison theory provides the venue for organizations to look into their culture, and create changes or modifications in it for the improvement of the organization's operations and processes and members' improvement and efficient performance. In effect, social comparison theory, although it increases the distinction between or among cultures, also develops organization culture towards better and improved development. Combining both groupthink and social comparison theories, the suggested change by the CEO can be implemented. Through the mix of groupthink and social comparison theories

Sunday, August 25, 2019

Managing Conflicts in Organizations Term Paper Example | Topics and Well Written Essays - 1250 words

Managing Conflicts in Organizations - Term Paper Example It would not be unfair to say that conflict is inevitable amongst human beings. The constant struggle to get hold of status, resources, power etc amongst humans often results in a form of social interaction called conflict. Thus, conflict can formally be defined as: â€Å"A process which begins when an individual or group perceives differences and opposition between itself and another individual or group about interests and resources, beliefs, values, or practices that matter to them.† (Digirolamo) In the same way that conflicts are inevitable in everyday life, they are also inevitable in organizations. Especially in modern organizations wherein factors such as constant change, employee diversity, team based structures etc make conflict an ever-present. Conflict, however, is not necessarily a bad thing and can help get the best out of individuals within the organizations. Organizations must therefore make sure that they do not discourage conflict but rather manage it smartly s o that it can work to its advantage. Thus, conflict can be looked at in different ways in organizations: Conflict as war – When parties treat conflict as a must-win war. Conflict as opportunity – When parties use the conflict as an opportunity to be more creative, to grow and to improve on what they already are. Conflict as journey – When parties use the conflict as a search for common ground. The first view of conflict is a win-lose situation. Such a situation is not good for the organization in any way because such conflict is destructive. The other two views on the other hand are constructive in nature and are desirable for organizations because they create win-win situations and help the organization get the best out of its employees. (Kreitner & Kinicki, 2008). Organizations should therefore make sure that its employees treat conflict in the right manner and it is for this purpose that they employ conflict management practices. Conflict management practices involve many different strategies which can be used by organizations to manage conflicts effectively. Some of these strategies are discussed below. The first technique that managers can use is fostering functional conflict. Functional conflict can be defined as the kind of conflict which is beneficial to the organization’s interest. (Kreitner & Kinicki, 2008) Managers looking to infuse their decision making teams with creativity and passion very often look towards stimulating functional conflict. There are two ways of doing this. The first method is to fan the naturally arising conflicts between different parties. This method, however, is very unreliable and may end up stimulating dysfunctional conflict. The other method is to employ programmed conflict. Programmed conflict can be defined as â€Å"conflict that raises different opinions regardless of what the managers personally feel about the issue.† This method requires disciplined role playing by everyone involved (Kreitner & Kinicki, 2008). The two best methods of programmed conflict are devil’s advocacy and dialectic decision method. Devil’s Advocacy is the technique in which someone is assigned the role of a critic and is told to air all possible objections to an idea. (Kreitner & Kinicki, 2008). Dialectic Decision Method simply requires fostering a debate of opposing points of views prior to making a decision in order to better understand the whole issue (Kreitner &

Saturday, August 24, 2019

My Ethical Theory Essay Example | Topics and Well Written Essays - 750 words - 1

My Ethical Theory - Essay Example Consequentialist ethics â€Å"holds that the moral rightness of acts, which holds that whether an act is morally right, depends only on the consequences of that act or of something related to that act, such as the motive behind the act or a general rule requiring acts of the same kind† (Standford Encyclopedia of Philosophy 2011 a). This is not utilitarianism which â€Å"generally held to be the view that the morally right action is the action that produces the most good† (Stanford Encyclopedia of Philosophy b 2011). It is not also virtue ethics because it does not mean to do just for the sake of being good. Considering the potency of the drug curing many social ills and making people happy, it would be dangerous to keep It secret. One way or another It will leak out and when it does, It will be blown out of proportion. Worst, if It falls into the wrong hands, it would be misused and will only be used for profit and personal gain. The only benefit of keeping the drug secret is that the one who manufactures it will not have to answer a lot of questions. Keeping the drug open will invite a lot of curious questions. It can be tiring but when these inquiries are handled properly, they can actually illuminate and foster understanding and appreciation of the drugs. The negative consequence of bringing the drug into the open is that there may be businesspeople that would become interested in the drug and would use inappropriate means to have it. The ethical principle in my system that would be applicable in judging whether I should use the drug or not is the determination of whether the use of it will do me good or not. The drug has already been scientifically proven that its users felt happy, never violent, never depressed, always in a good mood, quick to laughter and, in general, of  a positive outlook.  

Friday, August 23, 2019

Nihilism, Provisional Existence, Forfeiture of meaning Research Paper

Nihilism, Provisional Existence, Forfeiture of meaning - Research Paper Example The tribes of these stories are considered as nihilists, because they lack spiritual maturity and focus on the meaninglessness of life; they desire provisional existence, because they lack meaningful future goals and empathy for others; and they have forfeited spiritual meaning, since they have given up hope in changing their lives and enhancing their spiritual development. Tribalism affects nihilism by enforcing collective obedience to authority, thereby sacrificing their pursuit of spiritual maturity. The lottery is viewed as a joint ritual, where all people, young and old alike, participate in its processes and outcomes. People know how their prosperity is hinged on one human being's suffering every year, but they have looked away from their ritual's hideous process and result. Instead, they rationalize that the lottery is required for their existence, wealth, and continuity. Old Man Warner underscores that the lottery cannot be eliminated, like the other towns did, because  "there's always been a lottery† (Jackson). He desires for the continuity of traditions. He further focuses on the benefits of the lottery: â€Å"Lottery in June, corn be heavy soon† (Jackson). He fails to morally analyze this ritual that he has embraced, since he can participate in it. He stands for the moral stagnation of his tribe. In The Ones Who Walked Away from Omelas, people assert that their happiness and development are products of one â€Å"child's abominable misery† (LeGuin). Without this child's suffering, the â€Å"prosperity and beauty and delight† (LeGuin) of Omelas will no longer exist. As a whole, these tribes follow the laws and conventions that enable them to enjoy a â€Å"good† life. The main problem here is that through blind obedience to authority, they are sacrificing their spiritual growth. By denying to embrace suffering as a whole and transferring it to a single person, they fail to accept their suffering and find meaning in it. But these tribes no longer believe that there is value in collective suffering. Instead, they would rather accept a person's suffering to replace their own. Nihilism, moreover, does not reflect on outcomes and Frankl rejects this kind of life: â€Å"We must not despise our lives and treat our lives as if they were of no consequence at all† (Breakthrough Writing â€Å"Man's Search†). These tribes, nevertheless, reject the consequences of their actions as meaningful. They simply accept their rituals as it is, because â€Å"it is.† Tribalism, furthermore, develops nihilism, because these tribes no longer regard the meaning of life. Frankl believes in the value of being â€Å"worthy† of one's â€Å"sufferings,† for it provides â€Å"spiritual freedom† that makes life worth living for (72). The people in The Lottery does not see any meaning in life, as demonstrated in how they exist each day for rudimentary needs. The men focus on materialis tic affairs, while women are relegated to the domestic domain and follow gender-stereotyped roles: â€Å"...men began to gather, surveying their own children, speaking of planting and rain, tractors and taxes...women, wearing faded house dresses and sweaters...exchanged bits of gossip as they went to join their husbands† (Jackson). No one gives a second to reflect on the morality of their actions, because they are focused on their daily survival. Everyone treats this day as any ordinary day with a sense of â€Å"disenchantment of the world†

Thursday, August 22, 2019

Synthesis and Purification of Acetylsalicylic Acid Essay Example for Free

Synthesis and Purification of Acetylsalicylic Acid Essay Synthesis and Purification of Acetylsalicylic Acid (ASA or Aspirin) Background Salicylic acid is a phenol as well as a carboxylic acid. It can therefore undergo two different types of esterification reactions, creating an ester either with the hydroxyl or with the acid. In the presence of acetic anhydride, acetylsalicylic acid (aspirin or ASA) is formed. Correspondingly, an excess of methanol will form methyl salicylate, which is also an analgesic. In this experiment, we shall use the former reaction to prepare aspirin. Salicylic acid will not react significantly with acetic acid to produce aspirin. Acetic acid anhydride, however, is more reactive than acetic acid because the acetoxy group (-O2CCH3) is a much better leaving group than the OH- of acetic acid. The reaction has one complication, however, in that an esterification can occur between the phenol and acid portion of adjacent salicylic acid molecules. Further, more molecules can bind to the remaining free substituents on these molecules to create a macromolecule, or polymer. The polymer is formed as a by-product. Acetylsalicylic acid will react with sodium bicarbonate to form a water-soluble sodium salt, whereas the polymer remains insoluble. This difference can be used to purify the aspirin product. The most likely impurity in the final product is salicylic acid, which can be either unconsumed reactant, or the result of hydrolysis of the aspirin product. Salicylic acid is removed during the purification steps as well. Salicylic acid, like most phenols, forms a highly colored complex with ferric chloride, and is easily detected. Aspirin does not form the colored complex because the hydroxyl has been acetylated. Provide tabulated and experimental MP’s for product. Report mass and moles for the reactant and product, and calculate yield % on a molar basis. Mechanism The mechanism is called nucleophilic acyl substitution. It is similar, but not identical, to the hydrolysis on pg 802. The entering nucleophile is salicylic acid, not water. On the resulting tetrahedral intermediate, the H from salicylic acid moves to the middle O on the anhydride. Finally, the leaving group is acetic acid, not chloride. No base is involved. Provide structures of all intermediates in your lab report.

Wednesday, August 21, 2019

The Sin Tax Bill How Its Affect the Bar Industry in the Philippines Essay Example for Free

The Sin Tax Bill How Its Affect the Bar Industry in the Philippines Essay In 2011, there was a tax increase on alcoholic beverages. The tax increase depended on the alcohol content and the net retail price of the beverage. This however had little effect on bars/pubs in the Philippines because the tax increase was not significant. Many consumers did not feel the price change too much because of the relatively high mark-ups at bars/pubs. PROSPECTS In 2011, the Philippine government was reviewing a bill which proposes to increase alcohol and tobacco taxes quite significantly in the Philippines. If the bill is passed, this may negatively impact sales in bars/pubs in the Philippines. The higher prices of alcohol may result in less alcohol consumption by consumers when they dine-in at bars/pubs. INTRODUCTION MANILA, Philippines—A sin tax on cigarettes and alcohol dampened the New Year party spirit when it was introduced in the Philippines Tuesday, as part of a government bid to boost finances. Many stores started selling tobacco and drink at inflated prices before midnight, ahead of the official implementation of the tax hikes on January 1, 2013 hitting partygoers in the pocket. Tax on cigarettes will gradually be raised to P30 ($0.72) per pack by 2017, roughly doubling the current price to around 52 pesos. Duty on alcohol will also increase gradually until 2017, increasing the price of a bottle of beer by 23.50 pesos, with varying levels for other drinks including wine and spirits. It will be further increased by four percent each year thereafter. The new prices compared to countries like Singapore, for example, are still low, but for the ordinary Filipinos they are expensive, said Laudemer Angeles, a 33-year-old shop owner in the town of Bacoor, south of Manila. Many of my customers were complaining about the higher prices and were not too happy when they bought their booze and smokes for their parties last night. Anti-smoking campaigner Emer Rojas said he hoped the new taxes would lead to a gradual decline in the number of people suffering from tobacco-related illness. I think the sin taxes should even be raised higher, he told AFP. But we commend President Aquino for showing his resolve in signing the law. The government has said that the country of 100 million has the highest incidence of smoking in the region, with tobacco-related diseases costing the country P177 billion ($4.3 billion) last year. The new taxes aim to raise P33 billion ($800 million) this year alone, gradually increasing over the coming years. A large percentage of the money will go towards the government’s healthcare program. The government first asked Congress to raise taxes on â€Å"sin† products as early as 1997, but a strong lobby by tobacco manufacturers stifled change. The lobby included members of Congress representing tobacco-growing regions as well as powerful cigarette companies that enjoyed one of the lowest tobacco taxes in Southeast Asia. Published on Tuesday, January 1st, 2013 Link: http://www.euromonitor.com/cafes-bars-in-the-philippines/report http://newsinfo.inquirer.net/333451/philippines-sin-tax-introduced-dampens-new-year-fun

Impact of E-Banking in the UK

Impact of E-Banking in the UK Abstract This research paper will compare and contrast the characteristics of the traditional banking and e-banking. Additionally, research will identify the similarities and differences between the virtual and the real-world banking industry customers. Distinguish the difference between the world of e-banking and the real world in terms of customer communications. Determine which traditional customer communications can and cannot be successfully ported to the world of e-banking. Assess what new communications techniques are uniquely available in the world of e-banking. And demonstrate how the use of multimedia technologies creates effective e-banking websites. Discussion of customer communication strategies and real-world examples will be presented. Chapter 1-Introduction 1.1 Internet Banking in the United Kingdom and Europe In the United Kingdom, Internet banking services are available and provided by twelve Internet banking services providers. The Egg, for example, is an Internet banking service provider (exclude current account features) that has more than 150,000 customers visited their web site during October 1998 to July 1999. The Internet banking services providers in the U.K. have encountered an increasing demand for cross boarder payment transactions for smaller amount of cash and payment over the Internet. Many banks continue to develop and launch new banking services on the Internet in order to satisfy and meet their Internet-based customer requirements in term of time, ease of use, security and privacy in the U.K. (Birch and Young, 1997; Mathew and Dagi, 1996; Gandy and Brierley, 1997). In June 1999, the U.K. and eight other western European countries: France, Spain, Portugal, Germany, Switzerland, Holland, Luxembourg, and Scandinavia have become leading nations in providing Internet banking services in Europe. Germany also has been rated as the nation that has the highest number of Internet banking services providers in Europe (Blue Sky International Marketing, 1999). Although the UK has smaller number of Internet banking sites on the Internet than in Germany, but it has been rated as the highest quality and functionality at no additional charges to their customers in Europe. However, there are two banks in the U.K. that charge additional fees for Internet banking services, Nat west and NPBS In Scotland, the Bank of Scotland does not provide 24 hours Internet banking services via the web site. Customers can not access to Bank of Scotland web site between 1:00 a.m. and 5:00 a.m. during weekdays and between midnight and 5:00 a.m. during weekends. During the bank web site is not accessible, a daily back office operations and maintenance is performed to assure accuracy and security according to local restrictions, rules and regulations. Most of customers in the U.K. and European countries use Internet banking services to inquire about their outstanding balances in saving and checking accounts, and details about their latest or last transactions for their daily reconciliation. The frequency to access the customers account per day is quite high. Many banks, therefore, have provided many view only features for customers to inquiry and view the information on their accounts as often as they want per day. As a result, the banks have reduced both operating costs and work hours for their staffs at call centers and local branches for frequently asked (FAQ) and repetitive transactions. 1.2 E-banking security provokes fear or indifference for the British public A recent study by analyst Forrester Research has unearthed conflicting views about the safety or otherwise of online banking. The survey of 11,300 UK net users found that while many online banking consumers are complacent about security, a large minority have given up online banking as a direct result of security fears. Most UK net users are aware of security threats like phishing and keystroke logging but are unfazed by these risks and expect their banks to deal with the problem, even though these attacks are thrown against the consumers PCs rather than a banks own systems. Ideally users want banks to supply a blanket guarantee against fraud. Based on responses to its survey, Forrester concludes that an estimated 600,000 from a total of 15m subscribers have ditched online banking as a direct result of security fears. Forrester reckons that users are confused and banks need to step up their efforts to educate customers about online fraud. Measures to restrict the functionality of some accounts (for example controlling how much money can be transferred on any day), stronger internet banking authentication and improved customer profiling are also needed to defend against security threats, it advises. In addition to people who plan to drop net banking accounts as a result of security fears, another fifth of net users say that security fears will stop them ever banking online. 1.3 UK Consumers shy away from e-banking Customers still value direct contact with real people in their bank branch. A vast majority of bank customers thinks that an online banking service is not important for their relationship with a bank. According to a survey one third of customers rate e-banking as an important service, and of those only 22% actually use it. Even more unwelcome news for many banks will be the poll finding that more than 30% of customers do not even know whether their bank provides online services at all. The findings contrast starkly with the market expectations among banking executives. In an earlier Deloitte survey, financial services executives had predicted that customers would be eager to do their banking on the web. 1.3.1 Cutting costs, not customer care Julian Badcock, retail financial services analyst at Deloitte, said customers were certainly not rating the internet or interactive services as a key factor in measuring their satisfaction with their banking service provider. A responsive service and the feeling of being treated as a valued customer were much more likely to make consumers feel happy with their bank. And more than 50% think it is important to have quick and easy access to a local branch. The findings of the report make bitter reading for backers of internet banking pure plays like Virgin and Egg. Julian Badcocks conclusion: 90% of customers at present [are] showing no interest in obtaining financial services from new entrants. Established players, meanwhile, have to worry whether their huge investment in online banking is money well spent. The need for expensive customer care does not sit nicely next to the cost-driven move to online banking. 1.3.2 Educating customers Long-term hopes for cost savings will only materialize, if consumers can be persuaded to use the services. A recent survey by consulting firm Cap Gemini Ernst Young had found that currently just 4% of all bank transactions in Europe are done online, a number expected to rise to 25% by 2003. In the United States just 3% of transactions are done online, and there growth prospects are more modest, with the share of online transactions seen to reach 12% within three years. Such growth rates, however, can only happen if banks begin to educate their customers about the benefits of online banking, Deloittes analysts say. Chapter 2-Literature Review 2.1 Executive Summary How secure is online banking for the regular and not so regular internet user? The internet is becoming a more globally known form of communication around the world these days and its used largely in conjunction with personal/business tools to expand the horizons of e-commerce. As many small to large business follow the trend, looking for soaring profits, by placing their business online, they are left to find a threat in the online world in terms of security issues. This can be extensive in regards to online banks and financial institutions that provide the businesses with their transactions, along with the present threats of personal privacy and protection flaws associated with banking online. Online banking is not just about viewing accounts online, or paying bills. It has more to that, it include transferring of funds, shopping online etc. As a proven fact, felonies consisting of fraudulent behavior have attacked national Australian banks and are currently in legal dilemma over the astounding issue. Presently, uncertain of the root of the crime, banks have been forced into an unacceptable situation in regards to customers bank accounts. With alarming issues of security online, there are a few steps that can be taken in order to prevent such matters from arising or basically in order to avoid hackers into your private life. 2.2 The internet and its benefits As todays busy world is immensely changing in the depth of telecommunications whilst advancing in the technological age, we are left to find minimal time to do the basic necessities such as shopping, banking relaxing. So along came e-Shopping, and e-Banking. Online banking is for you if it will save you time and money. E-commerce plays a major role in how the internet is used in terms of a consumer business, or B2B relationship, but there just isnt enough security online. 2.3 What is online banking about? nline banking may be considered just as a system where you view your accounts and pay bills, but it is not just about that. Online banking is about shopping online, transferring funds, viewing transactions histories, servicing your accounts online and getting in contact with your bank around the clock. As shown by the statistics, lenience to banking online can be proven handy. The convenience can be dominant, since not only is travel time reduced, but ATM machines, telephone banking or banking by mail are often unnecessary. Technology continues to make online banking, easier for the average consumer. Not only regular consumers, but also many small, medium and large businesses are finding it rather efficient. Bankrate.com (28-10-2005) In the past, online banking consisted largely of banks partnering with large software companies such as Microsoft, to provide the online banking services within their personal finance software. Microsoft.com (1996) this led to the first of two approaches referred to as the client-based system, allowing customers to use the money management software and their own computers to access the bank via a modem and a phone line. The second approach is that of the newer Internet-based systems which allow customers to simply dial in using any computer and use the banks software. From a business perspective, they actually have more danger associated to their business, than a consumer may. Home PCs are, as confirmed by all IT Security vendors and specialists, the least protected albassera.com (21-06-2002). Ocp.co.uk (No Date) describes best the implications businesses could face with the threat of online security: Financial savings that online banking has to offer. Increasing supply power by reaching a more global target Attract new customers And therefore the disadvantages that may occur to a business: Level of learning for each customer may vary, or may even be too difficult to do online transactions. There a potential threat of the site being hacked Lost information or errors in banking can lead to a loss of business Not all clientele may be happy with making purchases online. Initial set-up costs and on-going cost can be rather expensive to keep the site up-to-date. Proven by the disadvantages list, there are a lot of threats placed on a business in order to consider a place in the e-market. 2.4 Internet Banking Banks are not the only commercial organizations locked in a love hate relationship with the Internet. On the one hand, cheap and ubiquitous, the Internet offers a potentially attractive way to serve customers without the heavy costs associated with the traditional bricks and mortar business model. On the other hand, the Internet is fundamentally open and insecure. It is the very antithesis of the private networks that industry and commerce have entrusted with carrying transactions and other critical information. Despite the dichotomy, the Net continues to grow ever more rapidly in importance to the commercial world. From books and airline tickets to share trading and the filing of corporation tax returns, new users for the Net are proliferating. In most cases, the incentives of Internet Banking are either the need to meet competitive challenges and customers demand or the need to cut costs. As reported by The Times of UK on Internet banking, a banking transaction action at a Bank costs around $1.07, $0.27 via an ATM and just one-cent on the Internet. The decision to use the net is rarely a technical one. Banks have opportunities in the new payments gateway in areas such as purchasing platforms, certification, trade services and trade finance, electronic bill presentment and payment, consumer Internet payments and also plethora of competition. There are five main reasons for going online. Firstly, Internet banking removes the need for physical presence in new territories a web site gives global presence without in-country set up and ongoing infrastructure costs. Secondly, success carries few penalties because growth can be accommodated centrally, without recourse to building and operating new service centres (bank branches in retail terms). Thirdly, the time to market new products and services is dramatically reduced due to the standardized technology that characterizes the Internet. Fourthly, there is the chance to preach to the converted. Marketing costs in this medium can be concentrated on creating an effective Website that attracts potential clients. Finally, the Internet fits well with the characteristics of Corporate banking where thousands of transactions which can be conducted daily and multiple updates provided, individuals can work easily from different locations and there is a growing belief that security fear s will be resolved by evolving techniques and technology. For internet banking to work effectively, it needs to address the key issue of security. In conventional banking we use written references or prior knowledge to assure ourselves that we know who are doing business with us. We use controls to ensure that non parties are not party to a confidential deal cannot see or tamper with paper based information that is stored and in transit. And we use pen on paper signatures as an irrevocable sign of our agreement. Banks have long used encryption devices to scramble inter-branch links and communications with corporate customers. More recently firewalls and password tokens have been introduced to provide access control. In addition to security, quality of services is another key area in providing successful e-banking. Any customer is only a click away from a competitor elsewhere, so it is imperative that the e-banking experience reflects an optimal encounter each and every time. As simple as this sounds, developing the network management capabilities to assess and respond to the end user experience is no trivial matter. Much of the discussion so far has focused on e-banking as provided over the Web but the Web is only a beginning. The changing shape of Internet banking in the future will be fascinating to watch. Internet banking is a robust and highly practical solution but has delivered something of a surprise too. As Internet banking becomes more common, potential customers have increasing choice. The more informed among them are shopping for service not just on the basis of obvious criteria such as interest rates and functionality, but also on the quality of the security being provided. For those banks still debating the best Internet approach, the advice is to start small but start as early as possible. The number of customers and services should be limited initially while the potential of the technology is learned and the security and services levels are assured. 2.5 Online banking security Nowadays, online banking is used primarily through the internet-based system of customer/business to bank. All online transactions should be governed by an SSL (Secure Socket Layer) encryption. Gelman (1998, pg 39) states that information sent over the internet may pass through dozens of different computer systems on the way to its destination. This basically means the information being sent is to be encoded before transmitted from the destination computer to the banks computer. Knowing that your bank account details are being passed on to many other computers in order to reach its destination, doesnt exactly make you feel safe and sound about using online banking. A customers password or pass code serves as the first level of protection and is digitally sent separately for security purposes. This is also accompanied by the issuing of a Logon ID, which is a unique membership number. Currently online businesses and financial institutions face great danger as online banking can lead to fraudulent behavior. Atansov (2001) Credit card generators are readily available to download The impact of such a fact has left many internet users wondering about the security issues in regards to their personal information, their banking details and most of all their internet surfing privacy. From a recent survey it was shown that a massive 30% of regular internet users were too nervous to use online banking. 2.6 Current online banking security issue As it may have come to recent concern, most of the banks were beaten by an unknown source luring its customers to accidentally reveal their account details. An email was sent out to customers stating that their account details needed renewing and that if they followed simple steps provided they could renew their accounts adequately. Some Net Bank customers have been deceived into providing their Net Bank client number and password as a result of a spam email which was widely circulated in UK. As none of the customers were aware that such a scam could happen, they gave their Login IDs, Passwords and account information away to very deceitful criminals. 2.7 An outcome about online banking security and its future In the analysis for online banking security, many precautions can be taken in order to prevent trouble occurring in regards to account details, personal details and security information. Customers of online banking must play their part in securing online banking by helping to safeguard information, which can be done by protecting their Logon ID and Password from misuses. These may include things like not telling other people their Login ID and/or Passwords, not using public computers to access their bank account information and being able to tell the difference of a secure and non-secure website. The future can only hold a solution for the current problem of online security, which can be solved in many different ways. Its best to avoid internet banking for the current moment and wait until there is an upgrade on its security. As many consumers are still nervous about using the internet for banking, the issue of security will be a thing of the past, just at this particular moment it shouldnt be overlooked. Chapter 3-Research Methodology 3.1 Evaluation of five E-Banking Sites in the UK There are two distinct models of E-Banking sites: Pure Cyber banks; e.g. in the UK, Cahoots, Egg, First Direct and Smile, which only have an Internet presence; Traditional banks that provide E-Banking to complement retail banking, e.g. In the UK, Barclays, Nationwide and HSBC are some of the traditional banks that have an Internet presence to complement their brick and mortar branches. Not all the banks offer the full range of services on the Internet; banks in both the aforementioned groups offer a wide range of services. These include personal banking, commercial banking for both small businesses and large corporations, loan application services. Financial services such as applying for an Individual Savings Account (ISA), opening an E-Account, applying for a mortgage, etc. 3.2 Methodology for Evaluation of E- Banking sites: I chose five E-Banking sites: Egg, First Direct, and Smile in the pure cyber bank variety, and E- banking sites of Nationwide and Barclays, which also have physical branches. Aims and objectives: To determine the ease of applying the evaluation instrument based on the e-SERVICE framework; To demonstrate that an E-Commerce environment should not only have a usable Web site in conventional HCI or Usability terms, but should provide service quality that meets or exceeds the customers expectations. 3.3 Research Method The research method involved conducting heuristic evaluations of the E-Banking sites. Heuristic evaluations involve inspecting the user interface to check its conformance against a set of heuristics or design principles (Nielsen, 1993). The heuristic evaluations involved two steps: 1. First of all I conducted usability heuristic evaluation. We applied an evaluation instrument consisting of several sub-heuristics of the usability heuristics approach. Provide an effective home page are: Ensure intuitive access and logical progression to key user tasks; Integrate clear yet usable branding; Ensure visual elements do not compromise usability; Terminology should relate to the users tasks and not marketing speak; Provide appropriate Metaphor for navigation from the home page; Simplicity or busy is either appropriate? The heuristics in Table 2 and the sub-heuristics in the usability evaluation instrument (which is available from the authors) were derived from several sources in the literature and Web sites (e.g. www.usableweb.com, Nielsens www.useit.com, IBM Web guidelines). The list of heuristics was also refined and updated during the authors experience of conducting usability evaluations of E-Commerce sites as a part of their consultancy activities. 2. Secondly I conducted heuristic evaluations of the five sites with respect to the e-CRM heuristics using the e-SERVQUAL evaluation instrument. (Based on the e-SERVQUAL framework). Table 2: Usability Heuristics Provide an effective home page Design a natural and manageable structure Provide an aesthetic minimalist Design Enable easy and intuitive navigation Ensure Consistency Support the User I considered the customer task scenarios listed in Table 3. The customer task scenarios presented here describe key situations of customers interaction with an E-Banking environment. Task scenarios are realistic, concrete and specific and help to guide the evaluator through heuristic evaluations. The evaluator (usability expert) interacts with the E- Commerce site to role-play a stereotypical customer and conducts the customer task scenario. While walking through the scenario and navigating through the site, the evaluator checks for the sites conformance against the heuristics, and makes a note of situations in the scenario where the E-Commerce environment does not adhere to the heuristics. Chapter 4- Research Findings 4.1 Internet Banking Internet, a global system of computer networks, first appeared in 1969 under the name Advanced Research Projects Agency Network in the United States (PBS Online, 2003). At present, about 13 millions serves are linked to the Internet across the globe, 99 per cent of which are located in advanced countries (CSE Online, 2003). Many banks use the Internet to offer services for both domestic and foreign consumers. At an advanced level, Internet banking is called transactional online banking, because it involves provision of facilities such as accessing accounts, funds transfer and buying financial products or services online (Karjaluoto, Mattila and Pento, 2001, p. 348). The Internet also helps banks penetrate other financial markets without requiring their physical presence in those markets. Miklaszewska (1998) identified four roles for the Internet in a modern banking industry. First, it facilitates financial transactions between banks and their consumers. Second, it gives financial institutions permanent access to financial information. Third, the Internet connects a banks head office to its branches. Finally electronic banking lets customers check their account information, pay bills, transfer funds between accounts, and perform other functions. Customers will soon have access to additional services such as online stock and bond trading (Miklasewska, 1998, p. 283). The Internet gives financial institutions various opportunities to conduct their various financial transactions. It enables banks to introduce international payments. It also helps banks cut time, money and risk. Many transactions can be done through the Internet. Availability of data through the Internet helps both banks and consumers reduce risk-taking in their financial transactions. Usually banks use Internet for publicity purposes, which include informing the public about the characteristics of financial products (e.g., commission rate, type of accounts available within the bank, interest rate on lending and borrowing, etc.). Large banks such as Citibank offer On-line LC issuance services to traders and cross-border finance facilities to foreign investors. Respondents noted that the response to those Internet services is high. Internet improves banks delivery system. But, the branch remains the main channel for delivering banking services in developing countries. Individuals still prefer face-to-face banking rather than buying financial services via the telephone or the Internet. The removal of barriers on the use of new technologies would encourage banks to invest in e-commerce and TV banking. The Internet improves two essential factors in global banking businesses: time and location (Oxford Analytical Citibank, 1999). The time needed to access bank services through the Web is extremely short. The Internet is also available everywhere in the world. As a result, Internet technology has globalised the banking industry; many banks use e-banking to expand their market share abroad. This section has shown that the Internet is a means to penetrate new markets without a physical presence in the host country. It enables banks cut their costs and to provide large packages of services in short space of time. The result is an increase in banks output levels and boost in their profit margin. 4.2 Advanced Information Technology and Banking Efficiency The Internet increases banks efficiency by helping them reduce the cost of producing and delivering financial services. The Internet alters the pricing strategy of the banking product. Banks price their products at the right level for the ‘electronic market. The price of financial services is usually lower via the Internet than in the branch (Jun and Cai, 2001); this has made the Internet an attractive banking environment for clients. As profit margin decreases, new products are delivered through new channels, retail services and securities being the main areas of change. Global banks also use the Internet to expand their activities and to earn new market share (Oxford Analytical Citibank, 1999). The Internet enhances competition in the banking sector as many non- banking institutions offer their services through Internet channels. Banks also face severe competition on the lending side from global markets. Financial service clients have access to all information about products (e.g. pricing and characteristics) through the Web. This has increased transparency and reduced the cost of financial instruments. Therefore, banks have to apply different mechanisms for pricing their products. As shown in Table 1 the number of banks branches will decrease as electronic distribution channels become more popular. Internet also enhances the delivery of large range of financial products. These improve banking efficiency by facilitating payment processing. The goal is to attain high value-added products. The Internet plays a vital role in the key challenges facing Financial Services Institutions today. It provides a tremendous opportunity for Financial Services Institutions to reduce transaction costs, exploit new markets and roll products much faster than was possible via traditional channels (Banker, 2000, p. 4. Bank managers stressed that the Internet enhances the global competitiveness of financial institutions by increasing their output levels.4 The Internet is also a means to manage business-to-business5 or business-to-customers transactions effectively. A strong Internet infrastructure is necessary to allow banks improve their electronic data interchange.6 Co-operation between telecommunication firms and financial institutions facilitate the modernization of online banking. Increased capital investments and clear rules for online banking also fosters the growth of e-business activities and enhance market transparency (interview notes, 2003). Finally, bankers surveyed in this research believe that the Internet is a means to boost the relationship between providers and users of financial services in the marketplace. The Internet allows market participants to access all the standard banking services at a low price. This motivates individuals and investors to purchase large packages of banking services via the Internet. 4.3 Problems Associated with the Advances in Information Technology The major problem facing Internet banking is the physical delivery of cash. Clients regularly receive financial information through banks Web sites. Nevertheless, it is impossible to make a physical delivery of cash through the Internet. Clients also require instant access to products prices and financial information. The very concept of the end-of-day is meaningless in the world of e-commerce, where customers may be anywhere in the world and demand consistent and instant levels of services (Banker, 2000, p. 6). Banks should promote innovation to become more competitive. The Website must also complement branch services, meaning that products offered via the Internet have to describe how they supplement or replace services available inside the branch. Advantages of e-banking: Low costs (particularly fixed costs); Cross-border expansion; High franchise value; Strength link with customers; Market share growth; Financial information potential; Simple to access. Disadvantages of e-banking New competitors; Complicate services valuation; Development costs; Low security. Source: Salomon Smith

Tuesday, August 20, 2019

Gerard Manley Hopkins (1844â€89). Poems 1918, Spring and Fall: To a young child :: essays research papers fc

Gerard Manley Hopkins (1844–89). Poems 1918, Spring and Fall: To a young child Mà RGARÉT, à ¡re you grà ­eving Over Goldengrove unleaving? Leà ¡ves, là ­ke the things of man, you With your fresh thoughts care for, can you? à h! à ¡s the heart grows older 5 It will come to such sights colder By and by, nor spare a sigh Though worlds of wanwood leafmeal lie; And yet you wà ­ll weep and know why. Now no matter, child, the name: 10 Sà ³rrow’s sprà ­ngs à ¡re the same. Nor mouth had, no nor mind, expressed What heart heard of, ghost guessed: It à ­s the blight man was born for, It is Margaret you mourn for. Gerard Manley Hopkins was an innovator whose poetry was not published until decades after his death. Hopkins was born in Stratford, Essex, which is near London. He attended Balliol College, University of Oxford. While attending the university, Hopkins was sporadically occupied with verse writing. His passion for religion becomes clearly evident during this time through his poems. His poems revealed a very Catholic character, most of them being abortive, the beginnings of things, ruins and wrecks, as he called them. (Gardner 6) In 1866, he converted to Roman Catholicism, during the Oxford movement. John Henry Newman received him into the Roman Catholic Church. He left Oxford to become a priest, and entered the Jesuit Order in 1868. This is the time when Gerard Manley Hopkins presented a conflict of a man torn between two vocations, religion and the aesthetic world. He also presented a heroic struggle of a man who was so dedicated to one profession that he deliberately sacrificed anoth er profession based on the belief that God willed it to be so. Hopkins is well known for his creation of the term inscape. Inscape can be considered as an individual distinctive beauty. The sensation of inscape, any vivid mental image, is known as instress. (Gardner 11) For Hopkins, inscape was more than sensory impression. It was an insight; by Divine grace into an ultimate reality by seeing the pattern, air, and melody as it were God’s side. (Gardner 27) In "Spring and Fall", Hopkins demonstrates a separation between humanity and nature and a separation between humanity and God. His use of imagery and his sympathetic tone allows the readers to make both distinctions and similarities between adult and child, nature and man, and conscious and intuitive knowledge. The poem is addressed to a child.

Monday, August 19, 2019

Last Of The Mohicans Essay -- essays research papers

The book begins in the middle of the French and Indian War in upper New York State near the Hudson River and Lake Chaplain. General Webb has just gotten word from an Indian that Moncalm and the French are going to attack Fort William Henry and that Colonel Munro will not be ale to keep the fort because he only has one thousand men and that he (Webb) needs to send reinforcements immediately. Upon hearing this, he ordered fifteen hundred men to be ready to march at dawn and has Cora and Alice Munro sent to their father at Fort William Henry accompanied by Major Duncan Heyward on horseback. They went along an Indian path which was to get them to Fort William Henry faster and they were lead by an Indian runner, from the time they left Fort Edward the two sisters were suspicious of their Indian Guide, Le Renard Subtil. A little while into their trip, they meet the singing master David Gamut who asked to accompany them to Fort William Henry. Not to far away in the same forest, were an Indian and a White man talking about their race’s existence in the "New World." The Indian was Chingachgook, the chief of the Mohicans, and the White man, Hawkeye; this was the name given to him by the Indians. They talk for a while and then decide to eat. Uncas kills them something for dinner and shortly after, The Party on it’s way to Fort William Henry runs into them along the path. They stop for a while and talk and then ask for directions to Fort William Henry. Hawkeye is suspicious of their guide and ask to see him to find out if he is an Iroquois, Hawkeye looks and discovers he is. Learning this, Duncan goes to keep their guide there so that Chingachgook and Uncas can do something about him. As Duncan was staling, Chingachgook and Uncas jumped out of the foliage and accidentally chased him away. They chase after him for a while and wound him but in the end, he is to fast for them and they return to Duncan and his party. Feeling that they were still not safe, Hawkeye offers to help them at no cost. They boarded Hawkeye’s canoe and they head for safety. Chingachgook and Uncas offered to lead the horses up stream to where the others were going by canoe. They go to and island at the foot of Glenn’s Falls for safety. Once everyone was one the island torches were lit and they went down into a cavern. At the break of dawn, the Iroquois began their attack. The attack laste... ...uois and when that time came, they went to rescue Cora. They find out that Cora has been hidden in a cave on the side of a mountain so that’s where they go. The Iroquois chief and two of his braves try to fight off Hawkeye, Duncan, and Uncas. The chief uses Cora as a shield. The chief then pulled out a knife and asked Cora if she wanted to die or be his wife. She didn’t answer so he killed her. Uncas froze in horror and the chief took this opportunity and killed him too. The chief then ran up the mountain. Hawkeye stopped and aimed his rifle at the murderer. Having gotten a good deal above Hawkeye and Heyward now the chief pushed a large rock down towards them from above and then attempted to jump to a ledge where he could not be reached. As he jumped, he fell short of his target and just managed to grab hold of a bush growing from the side of the mountain. Seeing this opportunity Hawkeye shot him and the chief fell to his death. There was a lot of mourning over Cor a’s and Uncas’ death and there were funerals for both of them. For many years afterward, Hawkeye and Chingachgook prowled the forest together and never forgot the ties of brotherhood that had taken root on Uncas’ grave.

Sunday, August 18, 2019

Contrasting Silkos Yellow Woman and Chopins Story of an Hour :: comparison compare contrast essays

Contrasting Silko's Yellow Woman and Chopin's Story of an Hour On the surface, the protagonists of Silko's "Yellow Woman" and Chopin's "Story of an Hour" seem to have little in common. Yet upon closer inspection, both stories relate tales of women who are repressed by the social tenets that define their roles as wives. From the viewpoint of Western society, the narrator of "Yellow Woman" might be considered immoral for her willing sexual encounter with a stranger. However, the stories related by her grandfather of the Yellow Woman demonstrate within her culture a more accepting attitude of her brief interlude: "Yellow Woman went away with the spirit from the north and lived with him and his relatives. She was gone a long time, but then one day she came back and brought twin boys."(188) Her grandfather certainly liked telling the stories and seems to have admired the Yellow Woman on some level. Other societies do not share the Western idea of moral sexual behavior. The Egyptian ruling class, for example, sometimes married brother to sister, and other cultures have incorporated fertility rites into their belief systems. Even within our own society, marriages to cousins, which are considered wrong today, were not uncommon in past centuries. Given that her attitude regarding sex and marriage might diff er from the Western norm, the central conflict of the story seems to be the narrator's desire for freedom to choose her own destiny versus her more Westernized view of her role as wife and mother, a role that is traditionally subservient to the husband in Western society. There is the sense that she finds her daily life dull, though perhaps not unhappy, and when a chance encounter turned sexual, she again takes on a subservient role to a male. Her inability to make sense of her conflicting feelings causes her to appear weak and lacking in character and portrays her in a negative light. By contrast, Louise Mallard, the protagonist in Chopin's "Story of an Hour", is a moral woman and loving wife, at least by Western standards. Her life is defined by the accepted social ideal of a husband's will as final. She is so inured to this concept that only upon hearing the news of his death does her true feeling of something "too subtle and elusive to name" (199) come forth. What she acknowledges to herself is that her marriage is not happy for her and she often resents her subservient role and "a kind intention or a cruel intention made the act seem no less a crime".

Saturday, August 17, 2019

1984 Skeleton Outline Essay

â€Å"I used to think that cyberspace was fifty years away. What I thought was fifty years away, was only ten years away. And what I thought was ten years away†¦ it was already here. I just wasn’t aware of it yet†. Bruce Sterling (www. brainyquote. com) Technology has helped society achieve great strides in the world today. It has helped us to walk on the moon and find cures for certain cancers. However, technology can also have horrible and devastating effects. This is best illustrated in Orwell’s novel, 1984. Orwell’s novel has been adapted by Michael Radford who captured Orwell’s technologically inclined society through a visual medium. See more: Social process essay Radford’s film portrayed Orwell’s idea of 1984 more effectively. This will be proven through examination of additions and deletions of scenes, cinematography, and casting. Radford’s additions and deletions leave the audience questioning his choice. At the end of the film Radford leaves the audience with unanswered questions, whereas in the novel, Orwell had clear visual clues the answered the questions. â€Å"But it was all right, everything was all right the struggle was finished. He had won the victory over himself. He loved Big Brother. (Orwell 311) An affective addition Radford included in his 1984, was towards the end of the film, Julia and Winston were planned to meet up with each other. In the novel, they had not planned to meet and just so happened that they bumped into each other. â€Å"Actually, it was by chance that they had met. It was in the Park, on a vile, biting day in March, when the earth was like iron and all the grass seemed dead and there was not a bud anywhere except a few crocuses which had pushed themselves up to be dismembered by the wind. He was hurrying along with frozen hands and watering eyes when he saw her not ten metres away from him. It struck him at once that she had changed in some ill-defined way. † (IBID 304) Make sure that you state why this quote is significant in proving that Radford was better at depicting Orwell’s vision. In the novel when Winston goes to meet O’Brien to get the Newspeak dictionary Julia was there with him. In the film when Winston goes to meet O’Brien to get the Newspeak dictionary Julia was not there, Radford has this addition included to emphasize how much Julia did not care about the Party. Radford`s interpretation of 1984 of additions and deletions was very affective. Radford’s use of cinematography was well done based on Orwell’s vision. With the help of color or if you look at it another way, a lack of colour, the film was meant to be shot in a dull and dreary setting. Radford was able to get across to the viewers, the sense of depression. * (put a quote in here of anything that describes any way that they dress or any of the colors that are described in the novel) Consider the opening couple of paragraphs. You could also talk about the scene in the film where his mother died and compare that to another scene to show how times have changed. Radford used bland and mechanized colors such as grey, navy blue and black. In Radford’s 1984 there was a scene shown of Hurt walking home from work and there was no color but greys, and a small amount of a dull navy blue. The actors in the film were too wearing dull navy uniforms and that was it. This was a perfect representation of the way Radford emphasized how dull the film was. The characters in the film, more specifically, John Hurt and Suzanna Hamilton, were also physically grey looking. Their skin was dead looking and physically sick which helped Radford set the theme of the film. (Use the description of the golden country are they the same in the novel and the film? ) If so how? If not how are they different ? Radford’s character selection was very effective that helped to portray Orwell’s vision. Radford’s 1984 was well cast. John Hurt acted just the way he was described in the novel. Although he did not speak much, Hurt used excellent facial expressions in order to get his point across and to communicate with others. â€Å"Winston Smith (John Hurt) is 39, but he has the skinny, wizened look of a perpetually chilled, undernourished child, whose face is that of an old man. † (www. ovie. nytimes. com) Julia, Suzanna Hamilton, was better depicted in the film than in the novel. â€Å"She brings a captivating freshness and warmth to her role, a little reminiscent of a young Harriet Anderson. Her pale, wiry, broad-hipped body has a simple, unaffected, almost archetypal beauty, and in the film’s more intimate moments, she radiates all the tactile sensual grace of a Munch or Degas nude†. (www. IMBd. com) Hamilton helps to portray Julia being a very rebellious character. In the film, Julia was an upfront kind of character whereas in the novel Julia seemed very closed yet didn’t really say much. Radford’s film adaptation of 1984 does effectively portray Orwell’s vision. This was proven by characters, additions and deletions, cinematography. Radford’s cinematography is an excellent adaptation of Orwell’s plot. The characters were well cast and Orwell’s vision was seen. The additions and deletions are very effective in portraying the vision of 1984. Overall Radford’s film does Orwell’s novel justice. Maybe for your conclusion keep the compare and contrast going. So for example Orwell made many choices about where to place characters in the novel but Radford adding or deleting them was a better choice for the vision as a whole.