Thursday, October 31, 2019

Aspects of Connected Speeech one page, Terminology-Analysis 2 pages Research Paper

Aspects of Connected Speeech one page, Terminology-Analysis 2 pages - Research Paper Example The noun with the third most repetition is ‘ways’ which appears 15 times, being 5.7% of the total noun count. The total number of nouns is comprised of 88 different terms. There are a total of 97 adjectives comprised of 43 different terms found within this text which represents 15% of the entire text. The three adjectives showing most use are ‘cultural’ which was repeated 14 times, ‘social’ which was repeated 8 times, and ‘linguistic’ with a repetition of 7. A total of 38 verbs are evident within this same text, representing only 5.9% of the total word count; these 38 verbs included 25 different terms with the most widely used verb being ‘to speak’ (speak/is spoken). As would be expected within a text discussing language and culture the most often replicated utterances were in reference to the topic and included ‘language’ and ‘culture’ (nouns), ‘cultural’ and ‘linguistic’ (adjectives), and the verb ‘to speak’. A total number of 385 words make up this text (policy on climate change) which includes 70 nouns, accounting for 18% of the text. Within the score of 70 nouns there are 48 different terms, with the most often used nouns being ‘greenhouse gas’, ‘atmosphere’, and ‘warming’ which were all used 4 times. A particular occurrence in this text is the use of chemical terms such as ‘GtC’ and ‘GtCO2 ’. A total number of 583 words make up this formal text comprised of 140 different terms which make up 24.5% of the total text. The word ‘shall’ appears 28 times and although not in reality a term it is frequently used in such legal documents. Another feature is the use of ‘thereof’ and ‘herein’ which are also evident in legal documents such as this, together with a few other formal/legal terms such as the verbs ‘vested’ and ‘chuse’, and phrases such as ‘term of

Tuesday, October 29, 2019

Inovation In Tourism In Response To Global Concerns Essay

Inovation In Tourism In Response To Global Concerns - Essay Example Natural resources such as water are being strained by the need to use the resources to generate energy for use in the tourism areas. Forests are being torn down to pave the way for the construction of hotels and resorts to be used by tourists, hence devastating entire landscapes. Political instability in a country or adverse natural disasters such as floods, famine and tsunami are also seen to adversely affect the global tourism industry (Conrady, Buck, Viehl, & Tittel, 2011, p. 157). The effects of political instability were clearly seen in Russia in 1991 when the country’s tourism declined by approximately 10 times as a result of the cessation of subsidies given to the industry by the union (Renard et al., 1997, p. 138). â€Å"In some countries, the industry is experiencing a huge backlash as a result of the repercussions of the global economic slowdown that affected the entire world. Some major markets such as Greece and Spain are still suffering from the 2009 global slowdown. The backlash was more pronounced in countries that rely on mainly Europe and America as their main traditional markets as these were the hardest hit by the recession† (African Development Bank, 2009, p. 437). The recent terrorism activities have caused heightened security and safety concerns in the tourism industry. A reduction in tourism spending within a country due to security concerns generally leads to weakened local economies which might have the effect of placing the affected government under a lot of stress. This can have the effect of causing the country to experience general destabilization throughout all its sectors and, hence, help in the attainment of terrorism’s main agenda of destabilization (Henderson, 2012). The increased fuel costs have caused the cost of travel to greatly increase to levels where most ordinary people are

Sunday, October 27, 2019

Environmental Factors for International Marketing

Environmental Factors for International Marketing A Key Challenge For International Marketers Is To Develop A Good Understanding Of The International Business Environment. Identify The Key Environmental Factors That Are Of Importance To The Success Of International Marketing And Discuss Their Impacts On International Marketing Decisions. 1. Introduction Due to technological advances and rapid economic growth, the level of world trade has increased considerably over the last four decades. Merchandise exports, for instance, grew from a value of $160 billion in 1963 to almost $16,000 billion in 2008 (WTO, 2009). Motivated by the many rewards and opportunities international exchange offers, more and more countries and companies have become largely involved in international marketing. However, the implications entailed in this â€Å"process of planning and conducting transactions across national borders† are rather different to those companies usually have to face when conducting domestic marketing (Czinkota Ronkainen, 2007, p.4). Differences in cultures, economic conditions, and governmental systems amongst countries mean that the marketing activities of companies taking their operations outside national borders are affected by a new series of environmental factors. In order to be successful at international marketing, it is vit al that marketers attain a thorough understanding of these factors as they impact the international business environment and take them into account when carrying out decisions on marketing activities (Hollensen, 2007). Consequently, this essay aims to identify both these fundamental environmental factors and the effects they have on the international marketers decision making. The essay will firstly consider the factors that derive from culture, such as language and religion. Secondly, the economical elements that influence the international business environment will be examined. Finally, the essay will take into consideration legal and political factors. 2. Cultural Environment According to Hofstede (1980), culture is â€Å"the collective programming of the mind which distinguishes the members of one human group from another†. Given that culture affects consumers behaviour, understanding cultural dissimilarities is crucial for the success of international marketing (Usunier Lee, 2009). Hall (1976) states that there are high context cultures, such as the Japanese one, where the context is equally as important as the words used, and low context cultures, such as the North American one, where communication is often solely conveyed in words. Companies need to be aware of and adapt their marketing concepts to these differences as otherwise it can easily lead to misinterpretations in communication. They need to take into account the element of language which consists of a verbal (the words used and how they are spoken) and a non-verbal part (e.g. gestures and eye contact). The challenge for them is to attain both a thorough understanding of the language in terms of its technicality and the context in which it is used (Hollensen, 2007). In Japan, for example, IBM changed the classification number of its series 44 computer as the pronunciation for the word four is similar to the word death (Czinkota Ronkainen, 2007). A further important source of culture is religion. Marketers need to be aware of the differences between the main types of religion as well as the variations within them (Hollensen, 2007). In Hinduism, for example, peoples capacity of consumption is determined by their status. Companies need to take this into account when making planning their marketing strategy. Also, as the main holidays are linked to religion marketers need to consider when they take place when planning marketing programs. The exchange of Christmas gifts, for example, occurs on 6th December in the Netherlands, whereas in other countries they are opened on 24th or 25th December (Czinkota Ronkainen, 2007). Also, companies need to take into account the values and attitudes of countries. The more these shared beliefs or group norms are embedded into the culture the more care companies have to take when implementing marketing activities (Blackwell et al., 2005). Societies that place a high value on tradition are more reluctant to change and may perceive foreign companies with scepticism (Hollensen, 2007). In Japan, for example, many bureaucrats feel that the consumption of foreign products is disloyal to their country (Czinkota Ronkainen, 2007). Another element of culture is aesthetics which determines what people find appropriate and what not. This can differ considerably from one culture to another meaning that marketers need to be aware of them and adapt their marketing concepts accordingly (Usunier Lee, 2009). Henkels FA soap, for example, modified its advertisement spot for the North American market by having the model wear a bathing suit instead of being naked, as in the ad for the European market (Czinkota Ronkainen, 2007). Furthermore, it is important that managers understand the different manners and customs of countries (Usunier Lee, 2009). General Foods orange juice Tang, for example, is marketed as a breakfast drink in the United States, whereas in France it is positioned as a refreshment as there is no habit in drinking orange juice at breakfast (Czinkota Ronkainen, 2007). There is also the element of education that needs to be taken into account. When designing products or services, for example, companies need to be aware of the level of intelligence of the consumer so they can adapt the complexity of the product or the service to the user (Hollensen, 2007). According to Dallas (1995), the best way for companies to overcome these cultural obstacles is to embrace the local culture. They need to take a localised approach by adjusting products to the markets, building relationships with locals and employing them. This allows marketers to gain information and experience at firsthand, attain an in-depth understanding of what influence consumer behaviour in the market, and cooperate efficiently with employees, the government, and other local partners (Usunier Lee, 2009). This would also allow companies to avoid accusations of cultural imperialism, which happens when marketing approaches are seen as too radical. McDonalds and Coca-Cola, for example, have been accused of forcing American standpoints into other cultures and consequently had to deal with boycotts from consumers (Czinkota Ronkainen, 2007). 3. Economic Environment International marketers equally need to be aware of economic factors when undertaking marketing decisions (Hollensen, 2007). Population figures provide a basic indication of the attractiveness of the market in terms of size and potential growth by looking at life expectancy, age distribution and population growth. They allow marketers to identify the segments and the geographical areas they should target (Czinkota Ronkainen, 2007). Low population growth rates, for example, usually characterise highly economically developed countries with good disposal income (Bradley, 1999). Also, income levels need to be taken into account as they provide an indication of the purchasing power of the market and allow companies to adapt their marketing concepts accordingly (Hollensen, 2007). A packaged goods company, for example, brought out a more economic version of its product in countries that have lower income levels by using cheaper raw materials. Nonetheless, marketers should not greatly rely on this indicator as there are certain types of products that because of the high value they create for the consumer are not affected by income levels. In China, for example, due to being a good upgrade for bicycles and a cheap alternative for cars, sales of motorcycles are high in the country despite the fact that the price of the product represents a high proportion of salary (Czinkota Ronkainen, 2007). Besides, marketers need to consider consumption pattern which allow them to identify the proportion of income that consumers spend on necessities, including food and rent, and consequently the proportion that is left to spend on less important areas of consumption, such as household goods and leisure (Bradley, 1999; Hollensen, 2007). Given that purchases in these areas can be cancelled or postponed unexpectedly, companies can determine the level of confidence in the market (Czinkota Ronkainen, 2007). Another important economical element is inflation as it strongly affects consumers buying habits and ability to buy. In markets with high inflation rates companies need to modify their product making it less expensive to produce so that they can lower their prices to respond to customer needs and sustain demand (Hollensen, 2007). In addition, marketers need to consider the availability and quality of local infrastructure. Transportation, communication, and energy networks have an important effect on the companys functions. They also provide an indication for the demand of industrial products and services (Bradley, 1999; Hollensen, 2007). The fact that two billion people live without electricity and that the access to a telephone is very limited in Asia, for example, informs industrial products and services companies that there are important marketing opportunities for them there (Czinkota Ronkainen, 2007). Furthermore, companies need to consider regional economic integrations as they can create both opportunities and benefits, and threats and problems for them. The European Union, for example, provides many benefits to companies operating within Europe, such as economies of scale thanks to the large single market. For non-EU companies, however, this integration may create problems (Hollensen, 2007). With the aim of protecting European farmers, for example, the EU has now and again imposed restrictions on the inflow of certain agricultural goods from the U.S. (Czinkota Ronkainen, 2007). A thorough understanding of these factors allows companies to obtain a good assessment of the market and reduces the possibility of implementing marketing concepts that could have disastrous results (Czinkota Ronkainen, 2007). 4. Political And Legal Environment The political and legal environment of the companys home country, its host country and the general international environment also has important effects on the marketing activities of international companies (Hollensen, 2007). The politics and regulations of the companys home country can determine its opportunities outside national borders (Hollensen, 2007). One of the main types of regulation that international marketers need to be aware of are embargoes and sanctions which are used to distort the free flow of trade. They need to know where they are applicable and take them into account when planning marketing activities so that they do not breach them and face subsequent sanctions (Czinkota Ronkainen, 2007). Governments also employ export and import control systems. Export controls prevent or delay companies from selling their products in certain countries whilst import controls are used to protect and stimulate the domestic market. Marketers need to take them into account so they know where the company can do business and where it can obtain its supply from. Finally, governments may induct special measures to ensure that their companies behave in a correct manner in the international business environme nt. One of the major areas concerned is boycott, which is when companies reject to conduct business with someone (Hollensen, 2007). The governments control in this area can force companies to decide whether to stop transactions and lose profit or to continue trading and pay charges. The Arab nations, for example, have blacklisted a number of companies who conduct business with Israel. In response, the United States imposed several laws to prevent U.S. companies from complying with the Arab boycott as it has political ties with Israel. Companies may lose out to firms whose home country does not employ such measures (Czinkota Ronkainen, 2007). Nonetheless, according to Czinkota and Ronkainen (2007), it is best to avoid adopting inappropriate behaviour as it may lead to damages to the companys reputation, boycotts by consumers and cancellation of transactions. This might cost the company more money than it gained through adopting such behaviour. Companies are also affected by the legal and political environment of the host country. Marketers firstly need to determine the level of political risk, i.e. the likelihood of political changes that could adversely affect the company, by looking at the host countrys government, its political actions and its stability (Czinkota Ronkainen, 2007). U.S. companies, for example, who are a major target for terrorist attacks because of their home countrys actions and capitalistic image, need to particularly take into account the stability of the host country (Harvey, 1993). Marketers also need to be aware of the actions of the host countrys government. Price controls, for example, which are used by the government to respond to inflation, can put international companies into a difficult situation where it has to decide whether to stop their operations or to carry on in the hope that the controls will be changed and they can regain the sacrificed profits (Frank, 1984). Companies also need to be familiar with the laws of the host country and the restraints they place on their operations. In France, Canada, Brazil, and Indonesia, for example, there are laws that restrict imports of U.S. entertainment to protect and preserve their cultural industries (Czinkota Ronkainen, 2007). However there are also laws that are aimed at assisting companies with their international operations, e.g. subsidies (Hollensen, 2007). Shortages of regulations can also create problems for companies, e.g. the lack of intellectual property rights in China (Czinkota Ronkainen, 2007). Therefore, companies need to attain a good understanding of how the countrys legal and political systems work to reduce the impact of the problems they cause. By undertaking in-depth research on the countrys history, culture and political setting before entering it allows companies to avoid making investments that could have disastrous outcomes. An in-depth knowledge of the country would also allow the company to anti cipate, plan and adapt into the local community. Hiring locally, undertaking local charity work and joint ventures with local businesses show the government that the company cares about the local community and does not just see it as an object it can exploit. This reduces the amount of interference by the government giving the company more freedom in its operations (Czinkota Ronkainen, 2007; Hollensen, 2007). Marketers must also consider the overall international business environment. Relations between countries and governments have important effects on the operations of international companies. The U.S. governments differences with South Africa, for example, forced U.S. companies to leave their operations in the country. Relations between home and host countries are governed by bilateral agreements, as well as by multilateral ones between sets of countries (Hollensen, 2007). Marketers need to continuously monitor the international political environment keeping up to date with political affairs so that they can anticipate changes and plan and modify their marketing strategy accordingly. In terms of the legal environment, managers need to be aware of certain laws and treaties which because of the respect they receive from many countries have a strong influence on the way companies operate (Czinkota Ronkainen, 2007). The World Trade Organization, for example, gives an outline on the behavi our that it finds acceptable from its member states (WTO, 2010). 5. Conclusion International marketers are faced with quite many and quite a range of factors in the international business environment that can have profound effects on their marketing activities. They need to be aware of the main sources of culture, such as religion, language, education, values and attitudes, aesthetics, and customs and manners. Given that they are embedded into societies and individuals it is necessary for companies to adapt their marketing activities to the market and not force a different standpoint on the consumer. International marketers also need to consider economical factors, such as population, income, inflation, economic integrations and infrastructure. They allow them to assess the attractiveness of the market and identify the segments and the geographical areas they should target. This reduces the risk of investing money in marketing activities in markets that are unprofitable. Finally, companies need to take into account the legal and political factors affecting the home country, the host country, as well as the overall international business environment. They need to be aware of the different governments, their political actions, their stability, and their relation with other countries, and constantly monitor them by keeping up to date with economic affairs around the world. This allows them to determine the level of political risk so that they can anticipate and plan for threats and take advantage of opportunities political changes offer them. 6. Bibliography Blackwell, R. D., Miniard, P. W. and Engel, J. F. (2000). Consumer Behaviour. London: Thomson-South Western Bradley, F. (1999). International Marketing Strategy. London: Prentice Hall. Czinkota, M.R. and Ronkainen, I.A. (2007). International Marketing. London: Thomson-South Western. Dallas, S. (15 May 1995). Rule no. 1: Dont diss the locals. Business Week [online]. Available from: http://www.businessweek.com/archives/1995/b342416.arc.htm [Accessed 10 February 2010]. Frank, V. H. (1984). Living with price control aboard. Harvard Business Review, Vol. 62, March-April, 137-142. Hall, E. T. (1976). Beyond Culture. Doubleday: Anchor Press. Harvey, M. G. (1993). A survey of corporate programs for managing terrorist threats. Journal of International Business Studies [online]. Vol. 24, No. 3, 465-478. Available from: JSTOR [Accessed 19 January 2010]. Hollensen, S. (2007). Global Marketing: A Decision-Oriented Approach. London: Prentice Hall. Usunier, J. C. (2009). Marketing Across Cultures. London: Prentice Hall. WTO (2009). International Trade Statistics 2009. WTO. Available from: http://www.wto.org/english/res_e/statis_e/its2009_e/its2009_e.pdf [Accessed 19 January 2010]. WTO (2010). Understanding the WTO. WTO. Available from: http://www.wto.org [Accessed 10 February 2010]. Short Course in International Marketing Blunders : Marketing Mistakes Made by Companies that Should Have Known Better (3rd Edition)

Friday, October 25, 2019

Phytoliths and Archaeology; An Amazing Field That Never Gained Populari

Phytoliths are a durable floral microfossil formed by silica absorbed by a plant during its life. Although the usefulness of phytoliths in archaeology has been known for nearly a century, the field (independently) has not attained much popularity. Despite the fact that the yields of evidence and information from phytoliths are truly amazing, the field itself is at times more tedious than dendrochronology, causing a delay in the development of the use of phytoliths, as well as the lack of recognition. Phytoliths have been proven to be useful in a number of studies, ranging from paleo-environments, ancient agriculture, ancient technology, even the diet of particular cultures and their livestock. The largest problem with phytoliths tends to be the inability to identify certain phytoliths or the need to correlate the phytoliths with a different chronologies or reference collections. With all of the uses phytoliths have, these problems seem to be recurrent. However, in order to understan d the use of phytoliths, one must first come to a better understanding of what they are.   Ã‚  Ã‚  Ã‚  Ã‚  Numerous sources have different terms for phytoliths, and even go so far as to separate phytoliths into two groups (Schiffer 1983: 227). This is not the case in this paper. The term phytolith will refer to a general definition that is broad and encompasses both of these groups; a phytolith is an opal or silica plant cell (Rapp and Hill 1998: 93). No source is completely sure of the biological purpose of the silica in the plant cells. Phytoliths occur from silica in ground water being absorbed through plants roots and integrated into the living plant (Hertz and Garrison 1998: 55). This silica fills the spaces in the cell and hardens. These cells can endure long after the life of the plant, even through decay and burning (Renfrew and Bahn 2004: 249). However, phytoliths are susceptible to highly alkaline soils, erosion, corrosion, mechanical wear (ploughs) and water damage (Schiffer 1983: 234). The general cell morphology, as well as density and cell wall thickness can affect the durability of phytoliths (Schiffer 1983: 235). Phytoliths first were realized for their usefulness in 1908 by Schellenberg, who noticed phytoliths in archaeological soils from North Kurgan (Herz and Garrison 1998: 55), however it was not again recognized until the 1950’s with Helbaek’s and... ..., D.M., and M.K. Trimble. 1984 Identifying Past Agricultural Activity Through Soil Phytolith Analysis: A Case Study from the Hawaiian Islands. The Journal of Archaeological Science 11 (2): 119-131. Piperno, Dolores R. 1985 Phytolith Taphonomy and Distributions in Archaeological Sediments from Panama. The Journal of Archaeological Science 12 (4): 250-264. Piperno, Dolores R., and Deborah M. Pearsall. 1993 Phytoliths in the Reproductive Structures of Maize and Teosinte: Implications for the Study of Maize Evolution. The Journal of Archaeological Science 20 (3): 337-342. Powers, A.H, J. Padmore, and D.D Gilbertson. 1989 Studies of Late Prehistoric and Modern Opal Phytoliths from Coastal Sand Dunes and Machair in Northwest Britain. The Journal of Archaeological Science 16 (1) : 27-42. Renfrew, Colin and Paul Bahn. 2004 Archaeology: Theories, Methods, and Practice. 4th ed. Thames and Hudson Ltd., London. Rip (Rapp), George Jr., and Christopher L. Hill. 1998 Geoarchaeology: The Earth-Science Approach to Archaeological Interpretation. Yale University Press, USA. Schiffer, Michael B. (editor) 1983 Advances in ARCHAEOLOGICAL METHOD AND PRACTICE vol. 6. Academic Press, New York.

Thursday, October 24, 2019

Counter-terrorism

What is counterterrorism? Why is it important to understand the motivations behind terrorism efforts? What kind of general motives might you find among terrorists in this country and abroad? Counter-terrorism is a combination of practices, strategies, techniques and practices that the various governments, police departments and the military service units use to stop terrorism acts with both the response to completed acts and the detection of potential terror acts included in counter-terrorism.The techniques and practices used in counter-terrorism aim at preventing or stopping certain terrorism acts, with the strategies usually offensive in operation. One major reason why the motivations behind terrorism efforts need to be understood is its great role in the development and implementation of effective counter-terrorism strategies. Since counter-terrorism measures depend on the nature of the terrorism act being mitigated, it is vital to identify how and why certain terrorism act is und ertaken in order to also combat it successfully.Understanding the motivation behind terrorism efforts forms the base for the development of an effective countering action where lack of a clear understanding of all the issues surrounding a terror act, makes the possibility of curbing the act properly and effectively almost impossible (Bolz. F et al. 2001). In addition, understanding the motive behind terrorism efforts allows the appropriate government organizations to select amongst the many, an effective action to counter a terrorism act that seems like an isolated event.This kind of understanding promotes good intelligence which forms a very vital component of preparing an effective counter-terrorism strategy. Another reason why identification of terrorist motives is vital is the huge role it plays in hunting down hard-core terrorist. It is through proper knowledge of a terrorist’s motives, that a government can isolate the hard-core terrorists and cut them off from external supplies. This makes it possible for the terrorists to be referred to as criminals, making it easy to hunt terrorists according to the law and with popular support.When a government or an organization plans and implements a counter-terrorism strategy, there is need to understand how terrorism efforts violate the human rights. This in turn enables the governments to develop effective measures that ensure that severe and appropriate actions are taken against the terrorists who are viewed as human rights violators, a situation that may repel others from participating in terrorists’ activities.Counter-terrorism experts are able to eradicate any terrorist organization if they correctly and accurately understand the terrorists’ motives, where one is able to understand the terrorists’ thoughts so that one can anticipate their next move correctly to stop it on time. In the USA and other countries, terrorist’s motives are many and they vary (Crank, J. et al.. 200 5). In the USA, Some of the general motives that might be found in terrorists include, political motives, fighting for the injustice of a given group of people, economic superiority as well as the creation of fear and a sense of insecurity in the American citizens.When they view themselves as the underserved underdogs on a mission, the terrorists use the strategy of using the weak to weaken the strong and to strengthen the weak. Question 2 Is counterterrorism a tactic of warfare or crime-fighting? What role does due process play in either context? What are the implications when terrorists can be characterized as the â€Å"enemy† rather than mere criminals? Counterterrorism can be used as both a warfare tactic or as a crime fighting tactic. However, in the United States counterterrorism is usually used as a crime- fighting tactic.For instance, the computer and the Internet are used to undertake warfare actions through the cyber space. Counter terrorism as a warfare tactic is t hen used and can be used to stop people from using terrorism tactics against a given nation or organization. In such a case, comprehensive tools can be used to deal with possible terrorist incidents and can further be used to repulse attacks that have been directed against a nation. As a crime fighting tactic, counter terrorism is used by the law enforcement authorities to hunt down terrorists who have been labeled as criminals.The authorities normally cut off hard-core terrorists from external sources of supply so as to label terrorists as criminals, and then use the law to easily hunt the terrorists down (Combs. 2005). When terrorists are referred to as â€Å"enemy† instead of â€Å"criminal,† it encourages more terrorist’s attacks or strengthening of terrorist organizations. For example, it leads to the recruitment of more followers in the terrorist organizations because those who are recruited have developed great desire to become fighters against their enem y.The labeling of terrorists as an enemy serves as a motivation for every group to strengthen itself to attack another group they view as â€Å"enemy†. It further encourages terrorism behavior of solidarity, loyalty and self protection even when the group faces difficult times. The members get convinced that they need to protect themselves from a group that views them as an â€Å"enemy’. Finally, referring to terrorists as ‘enemy’ instead of criminals makes it very hard for the concerned organization or government to hunt down the terrorist according to the law.In addition, the organization lacks the popular support to hunt down the terrorists (Crank. J et al.. 2005) because they are seen as just revenging against other people with an unjustified reason. The terrorists cannot be tracked down in pursuit of justice which makes it difficult to use force against hard-core terrorists with the use of brutal force generating more terrorism and terrorists. Questi on 3 How has surveillance changed from the â€Å"traditional† to â€Å"new surveillance†? Are these changes potentially problematic for civil liberties in any way in the United States?Should law enforcement be permitted to use all technological resources available to accomplish its mission including in the fight against terror? Are there limits? Traditionally, counterterrorism strategies and techniques against terror acts were hugely the responsibility of the military force, and the level of surveillance not as intensive as it is in the new strategies of surveillance. The major reason for this is that in the past, terrorism acts were not as many as they are in the modern world.Traditional institutions approved surveillance only when it was seriously necessary to do so, as compared to new surveillance which has been blamed for overstepping the bounders. The ever increasing terrorist attacks against certain states in the world have demanded the development of many and ef fect counter terrorism measures through surveillance, in comparison to the traditional surveillance. In new surveillance, building of the counterterrorism plans has integrated all the segments of the society or government agencies (Mahan, S and Griset, P. 2007).New surveillance has seen the development of counterterrorism strategies that have increased both the standard of the police as well as domestic intelligence. While traditional surveillance involved the interception of communication and tracing of the suspected terrorists, new surveillance has expanded its ways of operation due to the advancement in technology. For instance, new surveillance has managed to expand the range of both the law and the military enforcement operations. The direction of domestic intelligence at specific groups that is based on origin and religion is a feature of the new surveillance.Mass surveillance is also done in new surveillance where an entire population is investigated. In the United States, ch anges in the surveillance have raised concerns based on the civil liberties. One good example is the mass surveillance which involves the surveillance of an entire population, an issue that has been objected since it is considered to defy civil liberty of the citizens (http://www. usatoday. com/news/washington/2006-05-10-nsa-x. htm). The surveillance defies the citizen’s liberty in that mass surveillance is done whether or not there is the consent of those being surveyed.Furthermore, surveillance is done whether it serves or it does not serve the citizen’s interest. For instance, use of a network of secret police informers is considered a new surveillance abuse. In the United States, the government has been accused of illegally cooperating with the National Security Agency to monitor the US citizens’ phone records. Further allegations that the government has conducted electronic surveillances of domestic phone calls without warrants are an issue that has been sa id to go against the civil liberty.However, the law enforcement organizations should not be fully allowed to use technological resources to fight terror. This is because uncontrolled use consequently may result to severe negative effects. For instance, there have been some instances where technological measures against terror have resulted to the abuse and violation of the human rights. The return and extradition of people within countries and restriction of freedom of citizens are some of the examples that violate human rights during the process of counterterrorism.Invasion of people’s private lives through technology-advanced tools need to be stopped by limiting how far the law enforcement bodies should go to fight terror. Lack of a boundary within which technology can be used poses a great risk, where the authorities may undertake counterterrorism practices while they violate the human rights at the same time. Question 4 What is the FISA court? Explain how it works. What a uthorities can it grant law enforcement? How is it different from traditional courts? What concerns exist about expanding the use of FISA?A FISA court refers to a secret court in the USA that has the responsibility of approving the wiretaps that target the terrorists. It was established and has been working since 1979 to ensure that terrorists and foreign agents are monitored. The FISA court was established under the 1978 US Foreign Intelligence Surveillance Act. The court has approved domestic wiretaps and has continued to handle very sensitive domestic wiretaps in the US national security investigations| (media filter. org/CAQ/cqq53. court. html). The FISA court operates through a process that is based on probable cause.An application to a FISA court judge is normally made by the FBI (Federal Bureau of Investigation) if it believes that it can show probable cause that the target of the surveillance is either a suspected terrorist or a foreign agent. The application should contain 4 documents; a request for a wiretap, FBI directors’ or executive branch official’s certification that information cannot be acquired through the normal investigative tactics, and an FBI supervisory affidavit with a statement of fact about the target of surveillance.This is then followed by the submission of the documents to the Justice Department for the Justice Department attorneys’ review. The application is then forwarded to the FISA court and presented to a federal judge. There are 10 federal judges in the FISA court who sit on the court on a rotating basis. The FISA court grants authority to the law enforcement authorities based on the probable cause presented to them. It gives warrant to the authorities to conduct surveillance on a suspected target, if enough evidence is provided in the court to justify why a suspect should be surveyed.It receives an application if the FBI director certifies that there is need to obtain information above the normal invest igative tactics. Clear indication of facts about the target of surveillance is also demanded by the FISA court before they give the authority and the judges often demand for more details about the targeted communication to authorize or approve a wiretap. It maintains a high rate of secrecy where a judge can make an ultimate decision to approve a wiretap (FISA orders 1979-2004)The FISA court is different from the traditional court in its secret nature of operation where the court makes approval of the applications in secret. Furthermore, the FISA court is considered to have acquired expanded authority than a traditional court to approve surveillance applications made, after President’s Clinton signing of the Executive Order 12949. Unlike in the traditional courts, the FISA court evidence can be used in criminal trials after the 1995 expansion as compared to the traditional courts where the evidence could only be collected and stockpiled only for intelligence purposes.The FISA court has expanded powers and it has the authority to allow both the electronic and physical searches due to its expanded powers. The expansion of using the FISA court in the USA has raised great concern. One concern of the FISA court expansion is the possibility of government’s extreme intrusion into people’s private lives. Because the court operates secretly, government measures that may intrude into people’ lives unnecessarily may result. Another great concern is the fact that, it promotes surveillance that defies people of their liberty.For instance, the expansion of the FISA court has made it able to give legal authority to approve black-bag operations, that authorize the Department of Justice to conduct both electronic and physical searches without an open court warrant. Furthermore, the subjects are not notified and an inventory of seized items not provided. Sometimes the surveillance allowed by the FISA court is considered to be unconstitutional. The Civ il liberty lawyers in the United States have stated that some searches that have been conducted are unconstitutional.It is a great worry that under the FISA court cover of secrecy, the court is likely to exceed its own broad legal mandate. The expansion of the court has been argued to have been motivated by the governments need to conduct searches they would not have been allowed to undertake under the nation’s national provisions. For instance, the US government may attempt and fail under the traditional constitutional argument to secure a search warrant, but it would go to FISA court and secure approval for a search by converting the case into a national security investigation. Question 5 How has aviation security changed since 9111?What were the provision of the Aviation and Transportation Act? Did this Act change Aviation security in a dramatic way? What role does racial and religious profiling play in securing the aviation industry and its consumers? What role should it play? Before the 9/11 terrorist attack, the aviation security in the USA was the responsibility of the Federal Aviation Administration within the Department of transportation. However after the 9/11 attack there was great urgency in securing the US nation’s entire transportation systems. The federal agencies concerned with transport security were transferred to the Department of Homeland security (www.encyclopedia. com/doc/iG2-34033000149. html). The need to increase aviation security after the 9/11 led to the enactment of the Aviation and Transportation Act on Nov 19, 2001. This saw the creation of the TSA (Transportation Security Administration) within the DOT (Department of Transportation). The Act permits the existing authorities to permit the TSA to flexibly manage and deploy the workforce to carry out important security work where the national security is concerned. The act mandates the increase in the number of federal air marshals and has placed the US airport securit y screeners under federal control.All the screeners were required to be US citizens, though the provision was later changed by American Civil Liberties Union. It was the Act’s provision that all the bags in the airports to be first screened and then matched to the passengers. Another provision of the Act was the $1. 5 billion award to the airports and private contractors so that the direct costs of meeting new security requirements were met. Checks for baggage in the airports was made necessary with screening recommended by use of explosive detection machinery or manual methods.The Act allowed the Transportation Secretary to authorize airports to use all the necessary equipment for the chemical and biological weapons detection. The Act did change the aviation security dramatically. For instance, before the 9/11 attack, the civil aviation security was handled by the Federal Aviation Administration (FAA). After the creation of the Act, the civil aviation security was put under the Transportation Security Administration (TSA). There were also changes in the federal statutes that covered aviation security (contained in title 49 of the Code of Federal Regulations Chapter XII).The provisions that were made by the Act changed security practices in the airports with the airports implementing changes in the checking and screening procedures, where tight security procedures were and are still being developed. The placement of the airport security screeners under federal control made changes when all screeners were required to be US citizens and the matching of bags to passengers was made necessary with new security requirements adopted in airports. Racial and religious profiling in the US Aviation Security practices has been seen by some as illegal and inconsistent with American values (travelsecurity.blogspot. com/2007/09lantos-warns-tsa-against-religious. html). Furthermore, this profiling is detrimental to the national security. Civil liberties of some religio us groups have claimed that TSA employees conduct secondary screening for passengers wearing ‘religious’ clothing. For instance, TSA employees have discriminated the Sikh by ordering Sikh Americans to remove their turbans, which defies their faith. There have been an estimated 50 incidents of religious discrimination since the institution of the new policy. Racial and religious profiling has led to discrimination and humiliation of people including the ordinary Americans.The practice leads to stereotyping of some citizens as terrorists and provokes a sense of fear against innocent citizens. The racial and religious profiling should instead promote changes that will prevent discrimination and humiliation of travelers. The profiling should not be used as a means of abuse but instead should be used with respect for the civilians. Exposing people to extra screening procedures simply because they belong to a certain race or religion should be done away with, but instead ever yone subjected to the procedures to promote equality. References Bolz, F. , Dudonis, K. and Schulz, D.(2001). The Counterterrorism Handbook: Tactics, Procedures and Techniques. Second Edition. CRC Publishers Crank, J. P. , & Gregor, P. E. 2005. Counter-Terrorism After 9/11: Justice, Security and Ethics Reconsidered. Cincinatti: Anderson Publishing Colangelo, P. The secret FISA court: Rubber Stamping on Rights. Covert Action Quarterly. Online at: media filter. org/CAQ/cqq53. court. html. Retrieved on June 26, 2008 Combs, (2005). Terrorism in the 21st Century, 4th Edition. Prentice Hall. FISA orders 1979-2004 Judson, K. Civil Aviation Security United States. Encyclopedia of Espionage, Intelligence andSecurity. 2004. Available at: www. encyclopedia. com/doc/iG2-34033000149. html. Retrieved on June 26, 2008 Lantos, T. US representative from California. Lantons Warns TSA Against Religious Profiling Insensitivity Sept 7, 2007. Online at: travelsecurity. blogspot. com/2007/09lantos-warns-t sa-against-religious. html. Retrieved on June 26, 2008 Mahan, S and Griset, P. 2007. Terrorism in Perspective. Sage Publications, Inc USA TODAY Com – NSA has Massive database of American’s phone calls http://www. usatoday. com/news/washington/2006-05-10-nsa-x. htm. Retrieved on June 26, 2008

Wednesday, October 23, 2019

“A Gospel of Wealth” Essay

Carnegie starts out his article stating, â€Å"The problem of our age is the proper administration of wealth, so that the ties of brotherhood may still bind together the rich and poor in harmonious relationship.† (Carnegie, 1) He begins by explaining how the people of our society enjoy wealth to a much greater level. He quotes, â€Å"What were the luxuries have become the necessaries of life.† (Carnegie, 2) He proves this by taking the laborer to the landlord and proving the landlord of our day has more than a King of the times before. The society we live in today has much more opportunity and competition and Carnegie feels that if you have money, it is under your control to use it to help out the less fortunate and not to use it for just your own good. Carnegie believes there is three ways in which people can use their money after they pass. The first one is passing money on through generations of the family. This he feels is â€Å"†¦misguided affection,† (Carnegie, 24) and that this will only hurt the children of the rich and also be bad for the state. The second way is through public purposes. Carnegie thinks this is just a way for the rich to be remembered and to create, â€Å"†¦monuments of his folly†(Carnegie, 25). Through public purposes is seen as a last resort since money cannot be taken with them in the after life. The third and way is to be administered. He believes that taxes should be taken from a dead man to help our society as a whole. Carnegie sees money as a charitable act as suspicious because you do not know exactly where the money is going. He uses an example of a beggar and describes how the money was used improperly, proving this is not enough. Carnegie believes in the virtues of Laissez Affairs and individualism, which the government should not be in control of where someone’s money goes. It is the rich peoples responsibility to improve our society as a whole. He also says that we should follow Christ’s spirits and, â€Å"†¦doing for them better than they would or could do for themselves† (Carnegie, 27). Overall, our times biggest obstacles is charity and we should, â€Å"†¦help those who will help themselves† (Carnegie 28), and will be rewarded in heaven for doing so. Overall Carnegies does not believe in dying rich, as he quotes, ‘The man who dies rich dies disgraced’ (Carnegie, 29).

Tuesday, October 22, 2019

Pepsi Corporation History and Major Problems Essays

Pepsi Corporation History and Major Problems Essays Pepsi Corporation History and Major Problems Essay Pepsi Corporation History and Major Problems Essay I. PEPSI CORPORATION HISTORY The Pepsi-Cola story began in a drugstore in New Bern, North Carolina, USA in 1896. Caleb Davis Bradham, a pharmacist, owned a drugstore named Bradham Drug Company in downtown New Bern. Like many of the drug stores at the time, Bradham’s store also housed a soda fountain. Here, Bradham offered his own soda concoctions which attracted most of the small-town folks. On August 28, 1898, Bradham invented a new recipe, blending kola nut extract, vanilla and â€Å"rare oils. This soda drink, initially known as Brad’s Drink, gathered so much popularity not only for its delicious and refreshing taste but people believed it helped them by aiding digestion and boosting their energy. Bradham likened the effect to digestion to the enzyme pepsin, even though it was not used as an ingredient. By combining the terms pepsin and cola, Bradham renamed his recipe Pepsi-Cola. Pepsi’s early growth was less significant than that of Cokes, and its real stre ngth as a competitor to Coke began after became CEO in 1950, a time when Pepsi was nearly bankrupt. Bradham was expected to liquidate the Pepsi-Cola Co. Instead, he made it his goal to beat Coke (, 2003). Pepsi spread to Canada in 1906, and the year after that, it was registered in Mexico. By 1908, Pepsi had upgraded their transportation delivery services from horse-drawn carts to automobiles. Pepsi seemed to be becoming successful in such a short time. But there is still a problem. By the time Pepsi Cola came out, Coke had already made its mark among the public and the newcomer Pepsi found it hard to find a consumer base. In the 1920’s, the company released the ad Drink Pepsi. It will satisfy you. However, despite industrious efforts, the Pepsi Company still fell into bankruptcy due to the fall of the sugar market. After seventeen years of success, Caleb Bradham lost Pepsi Cola. He had gambled on the fluctuations of sugar prices during W. W. I, believing that sugar prices would continue to rise but they fell instead leaving Caleb Bradham with an overpriced sugar inventory. Pepsi Cola went bankrupt in 1923. It suffered several years of losses before it was sold to Loft Inc. , a giant candy company. Loft was what Pepsi was waiting for. The company began to regain its former success. 1936 saw the formation of Pepsi Limited of London, and in 1938, the Pepsi logo was trademarked in the Soviet Union. The company sold the drink in 12 oz. bottles and launched the advertising campaign of Twice as Much for a Nickel. In 1993, Pepsi-Cola found itself in a crisis situation when a man in Tacoma, Washington claimed he had found a syringe inside a can of Diet Pepsi. Soon after the story hit the news, claims surfaced all over the country. People claimed to find objects from bullets to crack cocaine vials. Pepsi-Cola knew that the foreign objects had been inserted by people outside the company who had tampered with the product. Pepsi-Cola decided to use a defensive strategy, claiming its innocence in the matter. Proving the company’s innocence would be pivotal in protecting further damage to Pepsi-Cola’s brand name. Pepsi employed a variety of strategies to deal with the problem. PepsiCos India operations were met with substantial resistance in 2003 and again in 2006, when an environmental organization in New Delhi made the claim that, based on its research, it believed that the levels of pesticides in PepsiCo (along with those from rival Coca-Cola Company), exceeded a set of proposed safety standards on soft drink ingredients that had been developed by the Bureau of Indian Standards. PepsiCos usage of water was the subject of controversy in India in the early and mid 2000s in part because of the companys alleged impact on water usage in a country where water shortages are a perennial issue. In this setting, PepsiCo was perceived by India-based environmental organizations as a company that diverted water to manufacture a discretionary product, making it a target for critics at the time. Pepsi-Cola came to the Philippines through John Clarkin, a native of Minnesota, USA, who came with the American forces at the close of World War II. On October 16, 1946, Clarkin acquired a franchise to bottle Pepsi in the Philippines. He consequently founded the Pepsi-Cola Bottling Company of the Philippine Islands Ltd. and became its president and general manager. As of January 2012, 22 of PepsiCos product lines generated retail sales of more than $1 billion each,and the companys products were distributed across more than 200 countries, resulting in annual net revenues of $43. 3 billion. Based on net revenue, PepsiCo is the second largest food beverage business in the world. Within North America, PepsiCo is ranked (by net revenue) as the largest food and beverage business. II. MAJOR PROBLEMS 1. COMPETITORS â€Å"Pepsi’s early growth was less significant than that of Cokes, and its real strength as a competitor to Coke began after someone became CEO in 1950, a time when Pepsi was nearly bankrupt. Bradham was expected to liquidate the Pepsi-Cola Co. Instead, he made it his goal to beat Coke (, 2003). Pepsi spread to Canada in 1906, and the year after that, it was registered in Mexico. By 1908, Pepsi had upgraded their transportation delivery services from horse-drawn carts to automobiles. Pepsi seemed to be becoming successful in such a short time. But there is still a problem. By the time Pepsi Cola came out, Coke had already made its mark among the public and the newcomer Pepsi found it hard to find a consumer base. 2. FINANCIAL PROBLEM/BANKRUPTCY â€Å"In the 1920’s, the company released the ad Drink Pepsi. It will satisfy you. However, despite industrious efforts, the Pepsi Company still fell into bankruptcy due to the fall of the sugar market. After seventeen years of success, Caleb Bradham lost Pepsi Cola. He had gambled on the fluctuations of sugar prices during W. W. I, believing that sugar prices would continue to rise but they fell instead leaving Caleb Bradh am with an overpriced sugar inventory. Pepsi Cola went bankrupt in 1923. 3. PUBLIC RELATIONS CRISIS â€Å"In 1993, Pepsi-Cola found itself in a crisis situation when a man in Tacoma, Washington claimed he had found a syringe inside a can of Diet Pepsi. Soon after the story hit the news, claims surfaced all over the country. People claimed to find objects from bullets to crack cocaine vials. Pepsi-Cola knew that the foreign objects had been inserted by people outside the company who had tampered with the product. Pepsi-Cola decided to use a defensive strategy, claiming its innocence in the matter. Proving the company’s innocence would be pivotal in protecting further damage to Pepsi-Cola’s brand name. Pepsi employed a variety of strategies to deal with the problem. † 4. SAFETY STANDARDS â€Å"PepsiCos India operations were met with substantial resistance in 2003 and again in 2006, when an environmental organization in New Delhi made the claim that, based on its research, it believed that the levels of pesticides in PepsiCo (along with those from rival Coca-Cola Company), exceeded a set of proposed safety standards on soft drink ingredients that had been developed by the Bureau of Indian Standards. 5. WATER USAGE â€Å"PepsiCos usage of water was the subject of controversy in India in the early and mid 2000s in part because of the companys alleged impact on water usage in a country where water shortages are a perennial issue. In this setting, PepsiCo was perceived by India-based environmental organizations as a company that diverted water to manufacture a discretionary product, making it a target for critics at the time. †

Monday, October 21, 2019

Technology and the Evolution of Communication Essay Example

Technology and the Evolution of Communication Essay Example Technology and the Evolution of Communication Essay Technology and the Evolution of Communication Essay Technology and the Evolution of Communication Technology, driven by innovation, provided people with the ability to communicate with other people all over the world. Some would say this technology helped the masses to become more introverted as it has the potential to separate individuals from the neighbors across the street. The online environment was once used infrequently as cyberspace remained relatively unknown to the public. Individuals received their bills in the mail and in turn, wrote a check to pay the amount due, added a stamp to the return envelope, and returned it through the mail service. In 1990, Tim Berners-Lee and Robert Cailliau created the World Wide Web while working on hypertext systems (Groff Pollermann, 1992). Technology by definition, is the means or activity by which man seeks to change or manipulate his environment (History of technology, 2010). As long as man has existed on earth, advancement has been accomplished by some type of technology. Dating back to the stone age, it is evident that technology existed in the simplest form as a spear or bow and arrow, which were used throughout most of the populated earth. Innovation provided a way for the weapons to be sharper and faster. Evidence of these innovations exists in the form of cave paintings spanning from Australia to areas in southern France and northern Spain. Although the date of the invention of the potters wheel, the bow drill, and the pole lathe is unknown, some speculate that it was in the Late Neolithic Period. These invented and refined items helped the people of that period to fish, hunt game, and gather food. These people developed basic tools and weapons created by using the raw materials they had at their disposal. These weapons were then used to hunt for food, and the tools were needed to help with the development of food production. The basic need to eat generated innovations through the years and the gathering of food meant there was a need for planting, harvesting, and creating an irrigation system that worked to water the crops. Technology was at work as they created tools to help them plant, grow, and harvest their crops (History of technology, 2010). Giving consideration to these facts, humans moved forward in history. From the beginning stages of technology and the events during the Stone Age, to what people presently know and use in the world of technology, historians recognize that there may have been phases when technology developed at a diminished pace. Even through all this, the evolution of the concept was never completely halted. In the 19th century, the industrial revolution had a direct affect on the economic development of the United States as well as Britain and Europe. Four major inventions developed during this time, set the stage for future events. These included improvements made in the manufacturing processes within the textile industry, the invention of the telephone, the harnessing of electricity, and the expansion of transportation across the country into areas that previously took days and weeks to reach (Kelly, 2010). As one of the most recognized times for technology pushing innovation, this period in history provided man with the understanding and capability to invent new and faster ways of producing, developing, and traveling. During this same period, three inventors made a lasting change on the way in which people continue to communicate, even today. Thomas Edison was the first of the most recognized inventors of the time. His inventions, which included the phonograph, the light bulb, and the motion picture, had a direct affect on Americas growth as well as its history. The second of the inventors, celebrated for his lasting contributions to communication, was Samuel F. B. Morse, recognized for how he changed the public communication system through the use of the telegraph. Morses invention revolutionized the transmission of messages, not to mention the means and distance by which they were sent and received. It allowed the public to move information at a much more rapid pace than they had previously experienced. Finally, the heralded inventor of the telephone, Alexander Graham Bell, deserves equal credit among the inventors for his powerful invention that, again, altered the realm of communication (Kelly, 2010). The importance of these inventions celebrated during the industrial revolution remains apparent. The modes of communication and social interaction that began in the 19th century laid the foundation for the social networking cycle that would rapidly evolve throughout history. In reviewing the timeline below (Table one), it is apparent that there has been an on-going push for advancement within the realm of communication. Table one Hewlett Packard (HP) foundedCompuServe introduces online serviceE-mail introducedComputers introduced to publicCyberspace term coinedWorld Wide Web introduced to publicE-mail becomes more popular than postal mailWeblogs begin to appearMySpace is foundedFacebook is foundedYouTube is foundedSocial networking is one of the most influential modes of communication 193919691972197719841991199619982003200420052010 Computers enable the public to utilize the world wide web as a social networking tool Note. History timelines of events, 2006, history-timelines. org. uk/events The article, Social Networking (Coyle, Vaughn, 2008), supports the ideas that social networking has evolved at a rapid pace. This type of communication has been used for many reasons and has slowly and steadily evolved over the years to include such things as basic networking, discussion of common hobbies, and finding lost friends and loved ones via the computer. Over the course of many years, technology, and thus the very civilization, has progressed from the introduction of more advanced and challenging online services, to the World Wide Web of social networking. In this arena, the average individual can expect to quickly and easily conduct everyday business that may include such luxuries as online work meetings or alternate methods for paying bills. With these advancements in technology, e-mail steadily became more convenient and gradually gained popularity, replacing services once provided by the postal service. In considering the goods and services readily available to ordinary people via the World Wide Web, not to mention the ease and convenience of such services, one must marvel at the evolution of technology and what it has afforded us, all in such a short timeframe. Most recently, innovations in the world of social networking have made it a giant in the world of advanced online communications. As the public gains familiarity with cyberspace, the popularity of these available resources has become more prominent in the everyday world. The year 2010 has seen social networking become one of the most influential modes of communication. MySpace, introduced in 2003, remains one of the most visited sites on the web today, with sites such as Facebook and Twitter close on its heels and rapidly gaining popularity. Even with the obvious advancements and advantages technology offers everyday individuals, skepticism remains. Many believe that the evolution of technology has been a necessary component when addressing advancement and considering new ways to live our lives. Critics contend that, even with the convenience and practicality associated with the use of the innovations and technology, pitfalls exist. Sherry Turkle raised concerns pertaining to the Internet. She invested considerable time and energy engaged with her team in observations and studies focused on the negative aspects of technology and the important place that it holds in our society. Based upon their findings, Sherry and her team concluded that too many people are spending too much time online creating imaginary identities, living in a virtual reality, and spending too many hours living in parallel worlds. Sherry believes that we need to take a second look at the consequences of living in virtual worlds and how individuals can quite possibly lose their identity. She contends that we must step back and consider these dangers before aggressively moving into the future. In addition to arguments that contend that we have become victims of parallel worlds, there exists the reality that schools and classrooms have access to the Internet and have been affected by the ease and availability of technology and communication. Some would caution that the information available on computer programs and the Internet, though helpful for students living and working in today’s society, may have its disadvantages. An example of this type of concern is found when one considers such media as a PowerPoint presentation used in today’s classrooms. Although the creation of this format lends itself to more effectively presenting information, it is also a means that limits the challenge a student is afforded. One study found that although this format was successful in presenting the necessary information for students, the bullet-point outline seemed to discourage the amount of give-and-take during discussions (Turkle, 2003). One may consider that we have quite possibly become too caught up with these computer generated programs, and argue our society has gone past the point of no return. Is this the point of no return, or are we learning to live in an Internet based, computerized generation? Both our future and the future of technology are hinged on the necessity to comprehend and master cyberspace. This includes the World Wide Web and all its qualities, both good and bad. People looking for an escape or trying to find a new reality can easily find it on the web. The Internet provides a wide range of resources spanning from basic gaming to running a business. Each person who logs onto the Internet has the choice between meaningful and trivial content. This is one of the freedoms afforded us through the World Wide Web. Social networking sites are gaining popularity for their convenience and ease, making life less complicated for many. Table two Note. Top five Social Networking Sites ranked according to Retention Rate, April 2006 Source: Nielsen//NetRatings, May 2006 Table two shows the gaining popularity of social networking and the retention rates achieved up to April 2006. The chain of events that has led up to our societys ability to lose themselves online began with an invention. The invention of the computer was the beginning of the information age. This invention, followed shortly thereafter by online service, public access to the Internet, and finally, the development of the World Wide Web, were steps in a progressive chain that would eventually take people into the future. Once the public understood how to access the web, communication took on a new look. E-mail became a major communication tool, weblogs became a venue for people to chat and speak their minds, and then websites such as MySpace, Facebook, and YouTube began to catch on as people used these sites to communicate as well as locate one another. The negative aspect of this new venue seems to be the amount of time spent on their computers and less time interfacing with other humans. Technology and innovation are necessary for humans to advance. Although some would argue that this is creating a society of introverts, I would argue otherwise. The technology that we use today is driven by innovation, and innovation is the key ingredient necessary for people to recognize a need, and then fill it. One could argue that they go hand-in-hand. The leaders of tomorrow will be mastering this very technology. We are not creating introverts, but merely reaching out and grasping what tomorrow will bring. References Coyle, C. , Vaughn, H. (2008). Social networking: Communication revolution or evolution?. Bell Labs Technical Journal, 13(2), 13-17. Retrieved February 7, 2010, doi:10. 1002/bltj. 20298. Groff, J. , Pollermann, B. (1992). World wide web (WWW) history Software engineering, artificial intelligence and expert systems for high energy and nuclear physics. La LondelesMaures, France (retrieved February 10, 2010). History of technology. (2010). In Encyclop? dia Britannica. Retrieved February 10, 2010, from Encyclop? dia Britannica Online:    britannica. com/EBchecked/topic/1350805/history-of-technology  History timelines of events. (2006). Retrieved February 16, 2010, from Google: istory-timelines. org. uk/events-timelines/index. htm. Kelly, M. (2010). Top 10 significant industrial revolution inventors (American History). Retrieved Feb 16, 2010, http://americanhistory. about. com/od/industrialrev/tp/inventors. htm McMillin, K. (1999, April 1). Technology advancements driven by scientists or artists. Retrieved February 16, 2010 from Offshore,59, 3/8. Turkle, S. (2003). Technology and Human Vulnerability. Harvard Business Review, 81(9), 43-50. Retrieved February 16, 2010, from Business Source Complete database.

Sunday, October 20, 2019

A power amplifier

A power amplifier Introduction: A power amplifier is an electronic device that changes the magnitude of a signal. It is usually used to transfer high power to a low output load such as speakers where there load is about 8 ohms [1]. The relationship between the output and input is called the transfer function. An important aspect of the amplifier is the gain. The gain is the ratio between input and output whether this input is current, voltage or power. Therefore, the gain does not have a unit. The quality of the amplifier is determined by many aspects, which are gain, bandwidth, efficiency, linearity, noise and others. As one of these characteristics increase the others may decrease. Therefore, the amplifier will be designed to meet the required specifications determined by the application for which it will be used for. The various designs of the amplifiers are classified into many types which include A,B,C,D and some other types derived by combining the basic ones such as class AB which is obtained from class A and class B pertaining to their efficiency and linearity [1]. Ideally, power amplifiers are supposed to deliver 100% of the power to the load. However, as some of the power dissipates in the components of the amplifier, hence we do not have ideal power amplifiers. It is found that the linearity has an inverse relationship to the efficiency of the amplifier. The classes A, B and C power amplifiers are considered inefficient but linear whereas the other types are considered efficient but more complex than the basic types. Class A power amplifiers are least efficient than the others. The efficiency of class B is much higher than class A, however, class C has the highest efficiency level compared to class A and B [2]. The scope of this paper is to discuss class B power amplifier in details. Class B power amplifier: This class of amplifier was developed in order to improve class A power amplifiers, which have low efficiency rating. [1-3] shows and explains the internal desig n, the efficiency, the advantages and disadvantages, and the applications of class B power amplifiers. Internal circuit and operation: To get a sufficiently good amplification of the input waveform in the output, a push-pull class B power amplifier configuration must be used. This configuration is based on two transistors. The term push-pull comes from the fact that two transistors in a class B amplifier conduct in alternating half-cycles of the input [1]. Moreover, there are two types of push-pull configurations, one with transformers and one without transformers [2]. A balanced centre tapped input transformer is used to split the incoming waveform signal into two equal cycles that are 180 degrees out of phase with each other. Another center-tapped output transformer is used to recombine the signals. If the transformer is ideal we can get two collector currents that flow in opposite directions, hence no magnetization of the transformer core takes place which in turn minimizes the d istortion in between the two signals. Both transistors used are of NPN transistor type where their emitter terminals are connected together [2].

Friday, October 18, 2019

Perception Of Nurses Regarding Self-Harming Patients Literature review

Perception Of Nurses Regarding Self-Harming Patients - Literature review Example The people that have self-harmed them are found to be devoid of the needed sympathy and care from the medical staffs and nurses on being admitted to the emergency units. Nurses tend to avoid them on account of wrong perceptions making them feel more desolate. This in turn again contributes in enhancing his or her self-farming behaviour which sometimes turns out to be fatal culminating to suicide (Cleaver, 2006, p.148-151). The paper would tend to use research based articles tends to focus on the attitudes and attributes of the nurses pertaining to the self-harming patients and also on the process of bring about attitudinal changes in the nurses involved. Further it would also endeavour in using specific statistical techniques relevant to the topic to help enhance the understanding and also cites recommendations pertaining to the issue taken. Cleaver (2006) observes that the act of self-harm constitutes such actions where the person, either a male or a female either tends to position, bruise or burn oneself. In that, the person focuses on injuring his or her own body as a mark of punishment rendered on oneself. This sense of punishment alleviates and culminates to the act of self-harm where the individual feels that such act would help him or her to regain their position in the society. More specifically, the people rendering self-harm tend to suffer from a huge burden of desperation. They, in order to evoke the sense of fear in the minds of others or to reinstate their position tend to act in such forceful manner. Observation shows, that this act of self-harm gains more prevalence pertaining to people in their teenage years and also in adults. Children, though quite rare become the silent victims of self-harm. Again, the phenomenon of self-harm is more noticeable regarding women folk than in men. Men are more prone to acts of suicide than ceasing to causing only self-harm like in women. Thus, owing to the variance reflected in the above cases the nurses working in the emergency units are required to act accordingly to render effective services. Herein, Cleaver (2006) states that some nursing staffs feel the zeal to take to such challenging assignments that includes a large amount of variations. Nursing staffs need to be trained in subjects pertaining to psychoanalytic and risk assessments to effectively function in such traumatic departments. The nurses and palliative care staffs need to understand the potency of the risk associated in dealing with such patients and

The Problem of Leadership in Cuba, Mexico and Brazil Essay

The Problem of Leadership in Cuba, Mexico and Brazil - Essay Example 2. Cuba The Cuban tale of independence was preceded by two more important events namely the independence of Haiti in 1791 and the call for independence from Spain in the 1820’s. The Haitian revolution had proven beyond doubt that people from various racial and ethnic backgrounds could operate together to subdue not one but three colonial powers to claim their independence. The Cuban revolution and its constituents resembled the Haitian insurgents in racial composition as the call to arms was taken up by blacks, mulattos and whites alike. Previously the Cuban domain had remained faithful to Spain even though other nations were claiming their independence. Cuba was given the motto â€Å"The Always Most Faithful Island† by the Spanish Crown although small plans for insurgency had been unearthed throughout the 1830’s and 1840’s. The loyalty towards the Spanish Crown stemmed from dependence on Spain for trade as well as protection from pirates and unease at the rising power of the United States. The actual insurgency was initiated by Carlos Manuel De Cespedes who was a sugar plantation owner. Carlos freed his slaves and declared that any slaves who were presented for military service would be freed. The conflict emerged in 1868 and became known as the Ten Years War with the emergence of a new government supported by blacks, mulattos and white men. Throughout the struggle race was nearly dismantled as a classification as white men served under blacks and blacks and mulattos rose to prominence as colonels, generals and the like. The newly formed government was not recognised by the United States though other European and Latin American governments recognised it. The war ended in 1878 with the Pact of Zanjon as Spain promised greater autonomy to Cuba. In the following year another insurgency was initiated by a Cuban patriot better known as Calixto Garcia. This effort was labelled as the Little War but it received little support. Slavery was abolished generally in Cuba following these events and abolition was completed in the 1880’s. The next conflict in Cuba emerged in 1895 with forces led by Jose Marti who was finally killed in the battle of Dos Rios on May 19, 1895. The large Spanish army outnumbered the insurgents as local people were forced into concentration camps by the military governor of Cuba. The final end of the war in 1898 placed leadership in the hands of the influential whites and some mulattos. Following independence Cuba saw social and political corruption along with short regimes that boomed and waned in rapid succession till the socialist revolution. 3. Mexico Mexico was ruled by a republican general Porfirio Diaz who took over Mexico during the French intervention. Porfirio was in charge of the country from 1876 to 1880 and then from 1884 to 1911 through five consecutive reelections and the period became known better as Porfirio. This era was characterized by large progress in economics as wel l as the arts and sciences though economic disparity was on the rise along with political repression. Election fraud associated with Diaz’s fifth election instigated the Mexican Revolution of 1910 which was led by Francisco I. Madero forcing Diaz to resign in 1911. However Francisco was overthrown only two years later in a coup by the conservative general Victoriano Huerta which put the nation into another civil war

John Maynard Keynes Essay Example | Topics and Well Written Essays - 2750 words

John Maynard Keynes - Essay Example He initiated the "Keynesian Revolution" which split economics into two divergent paths; one away from a traditional laissez faire economic system and toward an economic theory that saw the government as an essential player in maintaining growth within a capitalist economy. The following paper will review the economic policies of Keynes. Firstly, a review of his contribution to the USA recovery form the Great Depression shall be given. Secondly, a discussion of Keynes contribution to the global economic recovery following World War II will be presented. Thirdly, the use of Keynesian theory during the Conservative Era in the USA will be outlined. A conclusion will summarize the main points of the paper. The Great Depression was a global event of economic downturn that was initiated in 1929 and spanned across a decade until 1939. As such it is the longest and most harrowing depression that the industrialized world had known. Beginning in the USA, the Depression resulted in significant reductions in output, widespread unemployment and poverty, and acute deflation worldwide (Romer 3). At the time, the gold standard provided almost a global network of fixed currency exchange rates, and it has been stated that this was a core reason that the economic downturn in the USA swept through other national economies. In the USA, the Depression has been described as the second worst socio-cultural event since the Civil War. The actual causes of the Depression are still contentious issues today among economist and academia. Although it is generally agreed upon that there was a multitude of contributing factors; declines in consumer demand; financial panics; and misguided government policies (Calo moris 5; Romer 4). The recovery from the Great Depression was enabled by fundamental changes to national economic approaches, macroeconomic policy and the theory of economics itself. Keynes played a key role in the recovery with his advocating of interventionist government policies, which required the government to draw on fiscal and monetary sources to buffer the detrimental effects of the present Depression, as well as future potential recessions and booms. Keynes stressed the need for the government to intercede occasionally and exert force on the market economy (Romer 3; Skidelsky 5). Previous to this time, economists had simply believed that an economy would continue to grow and develop; it was thought that a market failure would be a temporary situation that could fix itself if given time. This laissez-faire approach was developed by the economist Adam Smith. It was argued by Smith that if the market was left alone it ("the invisible hand") would run itself (Skidelsky 15).In fact, many approache d an economic crisis as a state that would stimulate new opportunities to make a profit. Keynes, though presented a theory wherein the economy could become stagnant, and remain so, regardless of the amount of unused resources. He postulated that capitalism had no intrinsic ability to maintain growth regardless of external circumstances (Romer 7). Such a dramatic shift from the present approach to economics was revolutionary; that during times of severe depression the government was the only hope for an economic recovery. In this way, Keynes became known as the father of

Thursday, October 17, 2019

Ensure a safe workplace Essay Example | Topics and Well Written Essays - 5750 words

Ensure a safe workplace - Essay Example It also gives procedures for risk management at workplace and other important considerations regarding workplace health and safety. Table of Contents Content Page Title Page 1 Abstract 2 Table of Contents 3 List of Tables 4 Introduction 5 Assignment 1 5 Report on Proposed WHS Management System 5 Employer’s Responsibilities 6 Portfolio of Evidence 9 Amended WHS Policy to Apply Nationally 9 Political Policy Considerations 10 Policy Considerations on Implementation 11 Assignment 2 13 WHS Risk Management Policy 14 Risk Management Procedure 15 WHS Action Plans 18 Role Play Dialogue 23 Assignment 3 24 Recommendations for Safest Workplace Conditions and Compliance 25 References 31 List of Tables Table Page Table of Resources 11 Risk Management Procedure Table 15 Role Play 21 Description of Implementation plan for WHS Recommendations 27 Typical training/safety induction Schedule 29 Safe Workplace Introduction Workplace health and safety has in the present times become one of the great concerns at workplaces. This has seen legislations and policies being formulated to help ensure safety and sound health are maintained in every workplace or work environment. This paper gives details on issues relating to Workplace Health and Safety (WHS) with regards to a case of the Australian Hardware. The paper gives reviews on different scenarios relating to the hardware while also identifying areas which need implementations in ensuring there are enhanced standards of health and safety at workplaces. Assignment 1 Report on Proposed WHS Management System The proposed Workplace Health and Safety Management System (WHSMS) will look into many issues which are of concern as far as safety and sound health are in the working environment. This is processed so as to ensure that there are minimized rates of risk due to injuries or even cases of illness. These are supposed to be put in place by the employers at any given workplace environment and with particular reference to organizatio nal settings. The WHSMS was therefore accomplished by way of identifying, evaluating, assessing, monitoring and putting control measures of risks and hazards to workers with respect to all operations at workplaces. The complexity and scope of this WHSMS will have variations depending on the kind of workplace as well as the nature of operations and activities being carried out. This is because different work practices command different health and safety needs relative to what they are involved in in terms of operations, equipment, nature of work and the environment within which it is carried out in. A number of concerns as presented below have to be considered in WHSMS through employers. Employer’s Responsibilities One of the key consideration which the WHSMS focused on was responsibilities of the employer ate the workplace, for this case a hardware scenario in Australia. As an employer one is required and obliged by law to ensure that he protects his workers’ health, s afety and welfare (INCOSE, 2010, p. 216). The same should be ensured to other people who gain access to the workplace who can be adversely affected following work operations and activities carried out at the workplace therein. These considerations have to be under and guided by Work Health and Safety Act as stipulated by legislation in place. According to PMI (2008), as an employer, one is responsible for providing adequate

Trailing in Pennsylvania Term Paper Example | Topics and Well Written Essays - 500 words

Trailing in Pennsylvania - Term Paper Example In U.S. Presidential primaries, the Democratic and Republican parties (the largest political parties in the United States) nominate an official candidate to run during the general election; which takes place on the first Tuesday in November. From January through June every four years, each of the 50 states hold elections (also known as primaries or caucuses) to determine how many delegates (party representatives) each candidate receives. Delegates are determined by the percentage of the popular vote received by each candidate; with each state and party having different allocation rules. Senator John McCain (Arizona) is the presumptive nominee for the Republican Party. (Candidates are officially nominated by the delegates at the national party conferences which usually take place between July and September.) Accordingly, Clinton and Obama currently receive most of the media attention as they are still fighting for the nomination. With the Pennsylvania primary on April 22, this New York Times article examines the tactics used by the Democratic candidates.

Wednesday, October 16, 2019

Summarizing three parts of a book chapter on research methods Term Paper

Summarizing three parts of a book chapter on research methods - Term Paper Example Variations on these criteria do occur, often when it is not practical to meet them fully, and in these cases the research can be classified as quasi-experimental. The classic experiment is described. A control group and an experimental group are pretested, the experimental group is subjected to the independent variable, and the two groups are tested again, to see if there is now any difference in the two groups that can be attributed to the independent variable. In social work there are ethical and practical issues which may prevent a researcher from conducting a true classic experiment. Typical objections are listed and appropriate responses suggested. It is true that human beings should not be denied services because of a research project, or treated as objects to be experimented on, but on the other hand it is unethical to offer services without knowing what their effects are likely to be and who is most likely to benefit from them. By putting appropriate safeguards in place, and by using waiting lists for random assignment, it is possible to design research that is both ethical and experimental. Informed consent is, however, absolutely es sential, even if it has negative effects on the research in question. Research can interfere with the normal working of social services, but staff should be made aware of the aims and potential benefits of research and their views and suggestions should be sought early in the research process. The Solomon four-group research design is described, showing the advantage of using a pretest with two groups and no pretest with the other two. The intervention is then administered, to one group in each set, and all four groups are posttested. This method allows the researcher to see very accurately what effect has been caused by the intervention. Matching can improve the accuracy of quasi-experimental design, but it is not as good as true randomisation because it only matches

Trailing in Pennsylvania Term Paper Example | Topics and Well Written Essays - 500 words

Trailing in Pennsylvania - Term Paper Example In U.S. Presidential primaries, the Democratic and Republican parties (the largest political parties in the United States) nominate an official candidate to run during the general election; which takes place on the first Tuesday in November. From January through June every four years, each of the 50 states hold elections (also known as primaries or caucuses) to determine how many delegates (party representatives) each candidate receives. Delegates are determined by the percentage of the popular vote received by each candidate; with each state and party having different allocation rules. Senator John McCain (Arizona) is the presumptive nominee for the Republican Party. (Candidates are officially nominated by the delegates at the national party conferences which usually take place between July and September.) Accordingly, Clinton and Obama currently receive most of the media attention as they are still fighting for the nomination. With the Pennsylvania primary on April 22, this New York Times article examines the tactics used by the Democratic candidates.

Tuesday, October 15, 2019

A Woman’s Place and a Man’s Duty Essay Example for Free

A Woman’s Place and a Man’s Duty Essay The author Maria Del Carmen Triana explains the vast difference between the wage income gap over the years between men and women, and how it plays an important role in today’s competitive society. Gender income gaps have become a hot debate topic for many. Gender income gaps can affect a marriage and family as well as cause friction in the work place. Sexual discrimination also plays an important role in Gender income gaps as well. In most Corporate and White Collar jobs, stereotypes and wage earner status have an effect on men and women. Triana explains what she calls â€Å"home related spillover discrimination† which is, women being primary wage earners in households. Triana also goes on to explain that a major wage difference between men and women could be a new form of sexual discrimination. Because this is one of the first studies showing stereotyping roles, it can only be an assumption. According to Triana, research in the work place are being penalized thru wage earning for gender role playing. (Dipboye 1985; Heilman 1983). Triana Proposes that the idea of what feminine and masculine behavior in the work place should be can actually work against the female primary wage earner. She feels that this gender behavior could influence people to â€Å"under- award† the female to keep them from succeeding too far ahead of their husbands. Gender Deviance and Household Work In this article about Gender Roles, Daniel Schneider reports that couples spending a substantial amount on housework such as repairs around the house, shopping, cooking and cleaning could be defined as â€Å"Gender Work.† Housework was once referred to as a â€Å"Woman’s job.† Studies show that men are stepping into the position to help in the home and watch the children while the mother fulfills her job requirements in Corporate America. The author claims that â€Å"predictions† have been focusing on wives that earn more than their husbands, which stereotype the bread winner as normality. The author refers to this as â€Å"Gender Deviance.† According to his research, married couples have been known to neutralize the gender deviance by dividing the work load at home. An example of this would be: men washing dishes, folding cloths cooking and cleaning, while providing less income and women working long hours at work to provide the majority of the income for the family. Schneider also argues that what men and women do in the job market may very well affect household work and hours. Schneider goes on to state that men who work in occupations stereotyped to be feminine could be seen as a form of gender deviance as well. Schneider uses data gathered from the National Survey of Families and Households (NSFH2) to conduct his research. He goes on to explain that gender deviance is the† product of social doings of some sort,† and that if women did not gender themselves some actions would not make any sense. Over a period of time women have reduced the amount of time spent on housework and increased social activities with the kids to help balance of a parent being absent from school events. Studies also show an increase in the men actively participating in parent/teacher conferences and after school practices while the women are in the work force. References Schneider D. Gender deviance and household work: the role of occupation. American Journal of Sociology, January 2012; 117(4) (p. 1029-1072.) Triana C. del M. (2011). A womans place and a mans duty: how gender role incongruence in ones family life can result in home-related spillover discrimination at work. Journal of Business and Psychology, 26(1), (p. 71-86.)

Monday, October 14, 2019

Coases Theorem of Coase and Cattle

Coases Theorem of Coase and Cattle After familiarizing myself with Ronald Coases theory of economic efficiencies in economic externalities, I have discovered that Coases theorem is greatly debated amongst scholars who study law and economics. I have discovered the two schools of legal thought which are torn apart because of their opinion on the validity of Coases theorem. Basically, Ronald Coase declared that when there are no transaction costs, bargaining between neighbors will lead to an efficient outcome, regardless of the laws on property rights. The theorem is saying that when the transaction costs are low and somebody trespasses onto anothers property, in this case, cattle, neighbors are more likely to resolve the dispute by forgiving the trespass or by repaying the trespassed with a small reward. Since he has made it clear that this theory works when transaction costs are low, I agree absolutely with Ronald Coase. Ronald Coases theory that, when transaction costs are minimal, bargaining powers of people will re sult in an efficient outcome is correct. In Robert Ellicksons article, Of Coase and Cattle, he mentions a story about Frank Ellis and Larry Brennan. Larry Brennan lost approximately seven tons of baled hay to Frank Ellis cattle while they were roaming in open range. Brennan could have taken Ellis to court to reclaim a monetary value of approximately $500, but instead, he decided to notify Ellis of his cows wrongdoing. Ellis offered to give Brennan some of the hay that was baled in his barn, but Brennan declined the offer. Instead, Brennan knew that it would be in his favor in the future to have Ellis indebted to him, incase a situation arises where Brennan would need a favor performed. Since the transaction costs were pretty low and there was close proximity between Brennan and Ellis, the situation was resolved with efficiency. This is pretty common in rural areas since people of the small townships and farming communities live by the motto â€Å"live and let live.† The people who repeat this motto know they should p ut up with small imbalances in their accounts because they perceive that their future interactions will provide adequate opportunities for settling old scores. The fourth chapter of â€Å"Economic Foundations of Law,† by Stephen Spurr, has a great analogy of the Coase theorem that relates it to a Pareto-optimal efficient outcome. The example describes a conflict between a cattle rancher and a farmer who have adjoining properties. Since they have adjoining properties in an open range system, the cattle owned by the rancher are more than likely going to wander around within the farmers property—since it is almost impossible to tell which direction or how far cattle are going to migrate in the open range. With the herd of cattle grazing and walking around on the farmers crops, the farmer sustains a loss. However, the Coase theorem would make it simple for the farmer and rancher to come to terms and decide a remedy for the farmers loss. Stephen Spurr says, on page 67, â€Å"The socially optimal number of steers is the number that maximizes total social benefit minus total social cost, that is, the profit to the cattle rancher min us the damage to the farmer.† Essentially, this is saying that damage could be controlled by controlling the amount of head are in a herd of cattle which will in turn reduce transactions costs by reducing the amount the farmer will lose in damaged crops. From the pair of examples above, it is fairly easy to understand the Coase theorem. However, in Of Coase and Cattle: Dispute Resolution Among Neighbors in Shasta County, lies a vast story about a dispute between Frank Ellis, a new cattle rancher, and Doug Heinz, another cattle rancher. Since Frank Ellis was in an open range ordinance, he let his huge herd roam free. Ellis herd consisted of thousands of head of cattle and his property was approximately 15,300 acres, making it easily the largest farm in Shasta County at the time. Ellis hired a group of Mexican cowboys to take care of his handiwork, which included tending to the herd and doing whatever necessary farm tasks were required. Since his herd was situated on an open range, his cowboys â€Å"deliberately crossed the unfenced private lands of others, but also used those lands as free pasture,† as quoted by Ellickson. His exploitation of the laws of the open range sent anger flowing throughout the community, eventually enr aging a man named Doug Heinz. Doug Heinzs farm was situated right next to Ellis property, so the two were technically neighbors. While Heinzs farm was greatly smaller, approximately only 12 acres, Ellis herd was always destroying the fence that Heinz constructed in order to keep other cattle off of his land. When Heinz noticed some of Ellis cattle breaking through his fence, he decided to call Ellis and complain. To make a story short, Ellis sent a few of his cowboys out to retrieve the cattle. Their method of retrieving the cattle ended up destroying more of Heinzs fence and damaging even more of the crops. The cowboys took off more quickly than they came and Heinz never saw any sort of repayment for the damage done to his property. This caused Heinz to protest to the county supervisor and round up signatures on a petition to make the area, coincidentally around Ellis land, closed range. However, Heinzs petition to make the region closed range was never passed and Heinz was never r ewarded for the damage done to his property and had to suffer from more abuse at the hands of Ellis herd. Due to Heinz not receiving just compensation for his trouble, the Coase theorem cannot be applied here. The transaction costs were very high, with most of it coming from the damage done to Heinzs property, and the rest coming from the time that was spent circulating a petition to close the range. A Pareto-optimal resolution was not reached either, which is why Of Coase and Cattle attempts to explain the flaws in the Coase theorem. However, the author of Of Coase and Cattle does not take into account the transaction costs of the Ellis-Heinz conflict. The article also discusses conflicts between Traditionalists and Modernists, both of which are styles that ranchers use to take care of their herd. In Shasta County, California, these two neighboring styles are the scene of many conflict and episodes which convert the open range ordinances into closed range. The open range favoring Traditionalists believe their cattle can roam freely without any interruption in the land because they shouldnt have to fence in their cattle to remain on their property. The Modernists believe exactly the opposite; that ranchers should keep their cattle behind fences to prevent damage to neighboring property owned privately. The Traditionalists follow the practices of cattle ranching that were predominant in Shasta County in the 1920s. Traditionalists in the county believe that a rancher shouldnt fence his property because during the summer months, it would take an inefficient amount of land to make sure a herd as little of 200 cattle would be able to be nourished. Thus, the ranchers would let the cattle roam freely as to find nutrients around the mountainous regions of Shasta County. Just by stating that doesnt paint the entire picture, though. Traditionalist ranchers purchase grazing leases through the United States Forest Service and the Bureau of Land Management, as well as timber companies. The inefficiency of this is that a Traditionalist with a herd of only 100 cattle would need to lease a forest equal to the area of the city of San Francisco. Traditionalists would also need to construct fences to keep their cattle within the boundaries of the grazing lease areas, but since harsh winter storms and intense summer heat destroy their fences; its obvious that the most cost effective way to combat the phenomenon is to not erect a fence. The Modernists, who are typically younger than typical Traditionalists, see the Traditionalist way of ranching as primitive and out dated. The Modernist view is that their cattle do not belong on other peoples property, and vice versa; other peoples cattle do not belong on theirs. Not only do they wish to reduce the risk of damage done by their herd on anothers property, they also see it easier to administer nutrients, protect their herd from being impregnated by bulls, protect their herd from predators, and to watch over their herd during the dangerous winter months. The fenced boundaries are more of a sign to â€Å"stay out,† which adds privacy and value to the land. However, the cost of fencing off the boundary of an entire property by Californias standards is very costly. The statute that defines a legal â€Å"fence† efficient enough to house cattle calls for three tightly stretched strands of barbed wire stapled to posts situated approximately one rod, or 16 and one half feet, apart. Since Shasta County residents typically use four strands of barbed wire and steel posts instead of cedar, the cost of the fence has gone up. Ellickson gave the quote of the materials necessary to construct a four-strand barbed wire fence in the year 1982 as $2,000 per mile, which doubles if private firms are called in to perform construction. If, for example, Doug Heinz wanted to fence off his property, it would have cost him $18,000 for materials and another $18,000 for labor in the year 1982. A total cost of $36,000 in the year 1982 to enclose ones own property does not seem as efficient as being able to dedicate some of your time to help your neighbor replant damaged crops. Period maintenance on fences may also prove to be costly, especially in the weather of S hasta County. The point of comparing Traditionalists to Modernists is summed up by the first story of Ellis and Brennan. Modernists are willing to spend tens of thousands of dollars to make sure theyre investment, which could be the herd of cattle or the rest of their property, is slightly protected. The illusion of safety and security is heavily present in their ideology, which always isnt the case. Traditionalists believe they could remedy whatever problems arise by offering their assistance in fixing whatever damage takes place, whether it is to re-fence an area of land or to replant crops that were damaged by stampeding herds. It is much more cost effective to live the way of the Traditionalists. However, there are two sides to every story. One could consider Ellis to be a Traditionalist since he let his herd graze in open range. But, since a typical rancher in Shasta County does not have nearly the amount of cattle that Frank Ellis had, we can consider it an anomaly. Ellis caused thousands of dollars of damage and tallied up huge transaction costs in the effort that it took to circulate petitions by both parties, Ellis and Heinzs. Traditionalists can also solely be blamed for provoking Shasta County to enforce closed range policies in different areas. The stories discussed in Of Coase and Cattle not only prove the Coase theorem to be correct, but also proves Ellickson wrong. Ellickson wanted to prove Coase wrong by performing a tremendous amount of research in a county in California that has its problems when it comes to property law. Ellickson describes many different scenarios, all of which can easily be determined to be efficient or non-efficient. Ellickson simply states that Coase is wrong in his theory, but does not take into account the transaction costs for any of the stories. He may present the costs to each party involved in an incident, but he does not deduct that the costs arent necessarily high or low. To break this down further, we can reexamine Ellis versus Heinz and Ellis versus Brennan once more. Ellis versus Heinz was not Pareto-optimal because the transaction costs involved in resolving the incident were extremely high. If transaction costs arent defined simply in monetary terms, they could be described as stress and time spent on resolving a situation. In other words, transaction costs could also have the same definition as opportunity costs. Ellis herd cost Heinz tens of thousands of dollars that were never repaid, and thousands of dollars to other farmers which were also never repaid. However, the costs dont end there. Heinz and his allies spent a lot of time, grief, and money to go out and find people to sign his petition to get Ellis ranch on a closed range ordinance. Ellis did the same, to spend time to find people to sign a petition to keep his range open. The transaction costs in this example are extremely high since Ellis spent a lot of time and grief in attempt to fight Heinz and vice versa. To make the case even more interesting, Ellis was forced to fence off his land, which didnt benefit him in the long run. Therefore, the Coase theorem doesnt apply to this situation. At the same time though, Ellis versus Brennan resulted in an efficient outcome, since Brennan refused to take up Ellis offer of replenishing his supply of hay. There are a few schools of thought who think Coase was wrong in his theory. But, after reading Of Coase and Cattle, it becomes obvious that Ellickson was incorrect in his thesis that Coase was wrong. He is incorrect for a number of reasons, with the main one being that he doesnt take into account the transaction costs for the conflicts that he reports on. The main element of this paper was about Ellis versus Heinz, which proves that Ellickson was incorrect. When the transaction costs are low, the Coase theorem is 100-percent accurate. Ellis versus Brennan is a good example of that, as well as the quotes from ranchers in Shasta County. â€Å"I dont believe in lawyers [because there are] always hard feelings [when you litigate]† was said by Owen Shellworth, a Shasta County rancher. Another quote, by Tony Morton, states â€Å"being good neighbors means no lawsuits.† It is clear that neighbors would be more willing to settle conflicts on their own when the transaction costs are small. However, if the transaction costs are high, as in Heinzs case, the outcome will be inefficient. Of Coase and Cattle is a great read if you want to learn about property rights, dispute settlements, and the Coase theorems application to modern times. Of Coase and Cattle proves that with minimal transaction costs and defined property rights, the Coase theorem is accurate in predicting outcomes.