Thursday, October 31, 2019

Summary, analysis and response paper for Media studies Assignment

Summary, analysis and response paper for Media studies - Assignment Example Students even Google during lectures if they listen from teacher something unknown. It really is an information age where we are free t o learn without borders, thank to open course ware regime and free resources like Wikipedia, Khan Academy, etc. Prof. Sherry Turkle, Director, MIT Initiative on Technology and Self, says that MIT hosts brightest students in the world. But there’s something wrong with them as they think that multitasking can serve them best which is not right. Mr. David Jones, Associate Professor with MIT also says that students are multitasking and they are â€Å"distracted by everything† that’s why they are not performing as much as they should be due to these distractions that could be a laptop, a phone and etc. This attitude of students is also affecting the teaching method of teachers. A study conducted by NASA on chronic multitasking youths shows that at a time, people can do one task better than more than one task. Multitasking affects the productivity of individuals. Another concept is the affects of multi task to brain. Another study at University of California reveals that there is a 2 fold increase in use of brain while searching on Google than reading a book. In this video a chapter is reserved for providing information about the youth of South Korea. Gaming craze has resulted in addiction in South Korea that government is seriously concerned about the psychological changes on the youth. This video also emphasizes on teaching with technology. Technology has made it easy to teach students with state of the art technology. Although interviews conducted in this video shows students who believe that they can do multitasking with equal required attention but a teacher at MIT observed that the level of intellect is decreasing in new tech savvy generation. With a lot of types of entertainment in their hand, these students are not concentrating on their studies. Our mutual

Monday, October 28, 2019

Liberal Reforms Essay Example for Free

Liberal Reforms Essay By the early twentieth century the Liberal Government was worried that Britain’s military capability and general military power was not as strong and it once was. Therefore, the Government’s concern over national security definitely influenced the decision for the reforms. However, there are three main factors that also need to be taken into account when deciding if concern over national security was the real reason for the reforms: the Social reasons, concerns for Britain’s Empire and the Political motive. The Social reasons played a large part in persuading the Liberals to reform. The detailed reports of Booth and Rowntree, and the evidence which was brought to light, highlighted that nearly a 1/3 of Britain’s population lived in poverty. This needed to be addressed by the Government. In addition, criticisms of the Poor Law effectively put pressure on the Liberals. The Boer War shone light on the ineffective and malnourished British Army. Britain’s embarrassing performance and recruitment in the War raised concerns over Britain’s overall military capability and the general health of Britain’s populace. In addition to this, the Liberal Government was concerned that Britain was losing its status as a major industrial power. Political motives for reform include the changing attitudes within the party, New Liberalism, the fear of the ever increasing popularity of the Labour Party and the party advantage which the Liberals would have received from introducing reform. In 1899, Britain became involved in a war, known as the Boer War, in South Africa, which was part of the British Empire at that time. As a result of Britain having a relatively small army, volunteer recruits were needed to increase the army size. However, the British Government became alarmed when almost 25% of the volunteers were rejected because there were physically unfit to serve in the armed forces. This figure was even higher among volunteers from the industrial cities. Politicians and the public alike began to ask if Britain could survive a war, or protect its empire against a far stronger enemy than the South African Boers, if the nation’s fighting stock of young men were so unhealthy. The national reforms introduced a variety of bills which would hopefully solve this problem. The 1906 Bill was passed, allowing local authorities to provide school meals to children. In 1914 this was extended to becoming compulsory to offer school meals. This bill meant that poorer children, who previously could not afford a proper nutritious meal, were now receiving regular, healthy food. This would hopefully improve the health of Britain’s army as in the long term, the children who would eventually make up Britain’s army, would be nourished, fit and able to serve their country. The 1907 Bill made the medical inspection of schools compulsory. Doctors had to the Board of Education on their findings which resulted in the introduction of the 1912 bill which saw to the establishment of school clinics. The improved lifestyle and eating habits of Britain’s youngsters, combined with the introduction of medial inspections for them were the result of the Liberal reforms. Therefore, the Liberals concern over national security played a major role in achieving reform which would effectively benefit the country as a whole. However, there are still other reasons which influenced the Government’s choice to reform. Through the Poor Law of 1845 (1834 in England), local rate-payers provided â€Å"poor relief† for destitute people. This help was often provided in a poorhouse. Conditions in these poorhouses were designed to be very harsh indeed. Conditions in poorhouses were extremely harsh because it was to deter people who were just lazy and thought of the poorhouses as the â€Å"easy option†. Glasgow had three poorhouses: One in the city centre, Barhill in Springburn and Govan. The percentage of the public relying on the Poor Law relief, by 1900, was 2. 5%. This may seem very little but this figure does not represent the number of people in Britain who were in poverty. Destitute people who accepted help from the Poor Law became â€Å"paupers† and automatically lost many civil rights such as the right to vote. By 1900 many critics of the Poor Law believed that it failed to deal with poverty adequately. In addition to criticism of the Poor Law, the evidence discovered from both Booth and Rowntree’s studies concluded that there was a large percentage of Britain’s population living in poverty. Charles Booth, a London businessman who doubted the claims of socialist that a quarter of the population lived in extreme poverty. Working with a team of researchers from 1886-1903, Booth’s work was based on hard, statistical facts, and not opinion. His book, â€Å"The Life and Labour of the people of London†, consisting of 17 volumes, showed that 25% of London’s population lived in extreme poverty. Much more than the socialists claimed. The second investigation into poverty was carried out by Seebohm Rowntree, in the city of York. After two years of research, he published a book in 1901 which showed that almost 30% of York’s population lived in extreme poverty. If York had such poverty problems as a â€Å"typical English city† then as did other cities in Britain. The reports of Booth and Rowntree produced solid evidence to suggest that sections of society-regardless of hard work- would never pull themselves out of poverty. The reports showed poverty to have causes and the cities were beyond the individual efforts of the poor. The concept of â€Å"deserving poor†, an ideal created by Rowntree, was important and took root, becoming an important theme of the Liberal Reforms. Finally, evidence which suggested that the scale of poverty in Britain was much larger than the figure of 2. 5% suggested by Poor Law Records, indicated to politicians that the Poor Law was not working. When the Liberals came to power they had a majority of 400. In the elections in 1910 this majority dropped to 2. The Labour Party threatened the Liberals hold onto power. Labour promised pensions, action against unemployment and other welfare reforms. Following voting reform from 1980 the majority of voters were working class. Liberals worried that Labour would win working class support and threaten the position of the Liberals. In 1900, the Labour Party formed with 2 seats in parliament, by the 1905 election, Labour had increased this to 29 sears. It was becoming more increasingly aware that the Labour Party was a direct threat to the Liberals. In 1907 the Liberals lost 2 ‘safe’ seats in Jarrow and Colne Valley to Labour. David Lloyd George recognised the need for welfare reforms for political survival and to maintain working class support. In addition to the fear of the Labour Party, the Liberals also faced the problem of trade unionism and radical socialism. Radical Socialism called for the destruction of capitalism. From 1910-14, there was a wave of miners’ and dockers’ strikes. Liberals realised welfare reforms could prevent political unrest. Historians argue that the sudden increase in the Labour Party’s popularity and the problems the Liberals faced regarding trade unionism and radical socialism persuaded the Liberals to introduce pensions the next year, and furthermore, encourage the Liberals to reform. Before 1905, many Liberals believed in ‘Lassiez-faire’. However, new groups in the party believed that it was the duty of the Government to take action to help Britain’s poorer citizens. This group was called â€Å"new liberals†. It included David Lloyd George and Winston Churchill. Churchill aimed â€Å"to draw a line below which we will not allow people to live and labour. † The Liberals, wanted to help the deserving poor out of social conscience but they recognised the political advantages it could bring too. The Labour Party was offering such reforms that would bring them political success. This could be soon through their increased popularity. Therefore it is likely that the Liberals reformed due to the pressure put on them by the ideal of New Liberalism. In conclusion, the Liberal reforms came about as the result of many influences from both different areas of the Government and the public. On one hand, the embarrassing performance by the British army in South Africa and the lack of able volunteers to increase Britain’s army’s capability was definitely a main influence why the Liberals introduced the reforms when they did. On the other hand however, the evidence brought to light by Rowntree and Booth cannot be disregarded as not being an influence to the introduction of these reforms. In addition, other factors such as the Liberal’s fear of losing votes to the new Labour Party and the political readiness to pass reforms influenced by new ideas about New Liberalism made the reforms a more pressing necessity. Overall, it cannot be seen that concern over national security was the only reason for the Liberal reforms, as there were other influences which encouraged the Governments decision.

Saturday, October 26, 2019

Cyber Terrorism Poses Threat to National Security

Cyber Terrorism Poses Threat to National Security Terrorism has relocated from the traditional world to the cyber world. Terrorism has entered a new age where a combat zone has emerged in cyberspace. The health, wealth and security of nations such as the United States of America is in jeopardy as critical infrastructures are targeted by terrorists through cyberspace to bring terror to the nation. Cyber terrorism has made terrorists to be more vibrant and less suicidal: there is now no need for travelling long distance with explosives, chemical and biological weapons that might put their lives in danger. This research paper aims to outline reasons behind terrorism relocating to cyberspace, how terrorists intend to use cyberspace to bring terror and the advantages that cyberspace has given them. Traditional tools of terrorism are often regarded as a one step forward and two steps back method as traditional tools are sometimes suicidal and their destination might not be reached. Cyber terrorism is thus a stepping stone for terrorists as they can destroy, hack into systems, alter information and their attacks cannot always be anticipated. Accordingly, this research focuses on how cyber terrorism poses a threat to national security. Based on this threat several aspects of national security espionage will be outlined. Information about economic espionage will be discussed where the economic intelligence is under threat of cyber terrorists. Information warfare will be touched on for example how television and radio transmission can be hijacked and the leakage of sensitive information be used to sabotage stock exchange. Cyber warfare will also be covered to see how cyberspace is used to target the military operations and its facilities. In conclusion, types of cyber terrorism groups that target national security will be discussed. Statistics on cyber terrorist threats will be looked at and ways to stay safe from those types of threats. Introduction Cyber terrorism has been defined in many ways but the main objective is to bring terror by the use of cyberspace. Terrorists have found a comfortable and much safer environment to launch their attacks. Cyberspace has become a training ground, recruitment and training agency, a meeting place and a marketing tool for terrorists. Cyber terrorism causes great discomfort to national security as terrorist organisations, foreign governments, criminal organisations and individual hackers develop new ways to attack critical infrastructures, the military and the government. Cyber terrorism tools has made cyberspace to be the head-quarters for terrorists. Cyber terrorism has become the new weapon of mass destruction for terrorists where their cyber attacks may go unnoticed or at the time of notice, the response time may be limited. Cyber terrorism has given terrorist reason of attacking national security at any given as cyberspace is more advantageous than traditional methods. National security is said to be the requirement to maintain the survival of the nation-state through the use of economic, military and political power. The greater the capacity national security has of holding sensitive information and trade secrets, the greater the capacity to feel pain from cyber terrorists. Now the national security needs to protect the survival of the nation state and also its survival from terrorists attacks. Since well national security cannot fight cyber terrorism on its own they are agencies such as the National Security Agencies (NSA), the Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI) which help national security fight cyber terrorism. Cyber terrorism if not challenged head on will cause great deal of damaged terrorists relocated to cyberspace after seeing an opportunity that military power in not that dominant in cyberspace. In cyberspace terrorists have privileges of launching an attack at any time with no fear or doubt that it might not succeed or reach the designated area. Cyber terrorism is a trial and error method if the attack did not succeed u can try again mot like traditional method where as if u failed its either you die or end up in jail. Cyber terrorism takes many forms. One of the more popular is to target national security which is taken to be national security espionage. National security espionage ranges from economic espionage to information warfare and cyber warfare. Cyber terrorism stats show that every year enormous amount of money is lost due to cyber terrorism, cyber terrorists target critical infrastructures for making money or they fundraise in cyberspace to raise funds for attacks. Cyberspace has given terrorists a free way of launching their attacks we may fare for the worst as everyday terrorists manage to recruit and train its own army of terrorists the various number of available cyber terrorism tools has to the level of terrorism to an advanced level. We may ask ourselves if the world will ever be ready for a full length cyber terrorism attack. Where will the attack hit and will it be detected in time to respond to the attack? Background Cyberspace has become a combat zone The relocation of cyber terrorists from traditional tools to cyberspace has established a much safer and comfortable environment for terrorists to launch their attacks. In the process their relocation has triggered a robust and dangerous war, this war if fought between national security and cyber terrorists. The battleground has being set in cyberspace, Nation states have created cyber-warfare units, this unit will be known as USCYBERCOMM which is headed by Keith Alexander. Richard Clark said at the RSA conference China and Russia are stealing petabytes of information he also said that the government of China and Russia are successfully engaging in daily activities of stealing anything worth stealing and the United State government and private industry are not stopping them. Terrorists seek to harm the survival of the nation, harm the economy and target critical infrastructures of regions they are targeting. The survival of the national security might be left in shambles if a full scaled cyber attack may be launched against them. Although terrorists have not successfully launched a substantial cyber attack, the threat is there and grows bigger and bigger with every small cyber terrorism attack. With this small cyber attacks, cyber terrorists are gaining more experts and experience. A que stion may come to mind why are terrorists launching these weak attacks? What is the bigger picture that they are trying to painting? Will the answer to this question be that they are trying to find loop holes in systems to be targeted? We will never know until that time comes. National security depends on military power for security but the military is not dominant in cyberspace as it is dominant on surface land and in the sea. Military have limited resources to take on cyber terrorism. Terrorists seek to attack through cyberspace where their attacks have the potential to reach the destination originally targeted simply because the line of defence is not that powerful. Cyber attacks cannot be anticipated, they are no radars to track incoming attacks in cyberspace. Targeting critical infrastructures The move of terrorists to cyberspace has left the world in shivers as the world depends on critical infrastructures for survival and making earns meat. Targeting national security will reduce the ability of protecting the nation; if the ability of protecting the world is reduced terrorists can strike in ways that we cannot image. People are not safe in their homes as gas pipelines pass under their houses cyber terrorists can cause a major gas pipe line burst of regions they are targeting the terror of September they 11 may be relived with the use of pipelines this time. Advantages of cyber terrorism Cyber terrorism is much safer than traditional tools; cyber terrorism has made terrorists to be lee suicidal. Terrorists can cause greater damage at less risk of being caught in the crossfire. Recruitment, teaching and fundraising is simple, they can recruit people make a lot of money in a short space of time. They is no need for terrorists to travel long distance with biological weapons and bombs, attacks can be made remotely from anywhere in the world. Their attacks cannot be anticipated can cause great impact. No check points to go through for terrorists to reach their destination. Cyber terrorism is cheaper than traditional methods. National security espionage National security espionage can be defined as the use of cyberspace by terrorists to penetrate national security systems to try and steal critical information, trade and government secrets and target critical infrastructures. National security protects the nation through the use of economic, military and political power. Cyber terrorists seek to exploit the fact that national security holds sensitive and dangerous information which can harm the survival of national security and the well being of the nations. National security espionage can take many forms which ranges from economic espionage to information warfare and cyber warfare here is an overview of the three types of national security espionage which are mentioned above: Economic espionage Economic espionage also known as industrial espionage is known as the use of cyberspace by under developed countries, commercial or industrial enterprises to gain information of trade secrets which are not available on open channels. Cyber terrorists target Europe and the United States of America as they posses power in the market areas, they have top companies and they are fully developed. Types of cyber terrorism groups that cause terror to national security They are various types of cyber terrorism groups, but the one which cause great deal of panic is those that target national security being for political purpose, industrial espionage or cyber warfare. Whatever the target may be towards national security, the outcome of the attack will be enormous. Groups like: The Osama bin Laden Crew This is a group of cyber jihadists which was found in the year 2000 by Abdullah Quraischi. Al-Qaeda Cyber terrorism tools and techniques The biggest tool for terrorists has become the internet. The internet is an immeasurable digital library, anything about any organisation can be found in the internet. Terrorists use various tools in cyberspace to bring harm, they use tools like: Distribution Denial of Service (DDoS) This is an attempt of denying services, making computer resources not to be available to the intended users. Sniffers Sniffers are used to get passwords of systems (spying of passwords). Rootkits(Musk intrusion) Rootkits are utilities installed in a victims machine to ensure that a cracked system remains available to the intruder. Rootkits are difficult to trace as the system will work as its being working before. Network Analyzers (SATAN) Spoofing (smurfing) Worms Worms are programs which makes copies of itself and copies to other computers trough out the network. Trojan Horses Is the software program which runs on the victims machine and can run secretively BackDoor Backdoors allows hackers to enter systems again at a later stage without being noticed Botnet (zombie army) Botnets are malicious softwares which runs automatically on computers which are hacked.

Thursday, October 24, 2019

The Good vs. The Bad in The Road: Which Would You Do? :: Literary Analysis, Cormac McCarthy

Imagine a desolate and dismal world that deteriorated with scarce supplies of food and shelter and there is only a few survivors left--including yourself and one of your family members. In hopes of survival, what measures would you take? Would you go to the extreme by cannibalism or committing suicide? On the other hand, would you choose to be on an ethical route by grasping on life delicately? In the midst of the unflinching and empty world with virtually no hope, the father and son in the novel, The Road by Cormac McCarthy, choose to be the â€Å"good guys† by staying alive and refraining from cannibalism and thievery. They tried desperately to remain alive by roaming as nomads looking for shelter, edible foods, and avoiding the â€Å"bad guys† from preying on them for food. The unconditional love between the father and son sustained their struggle to live and try to stay ethical as possible. The father and son search for shelter and food in idle commercial stores and the son encounters many dead bodies and questions whether if they were also going to die. The boy is paralyzed by the adversity and suffering he had faced throughout his ruthless journey with his father. The boy questions their fate. He is implying that he is worried for the future. When the boy woke up from his tranquil sleep, he innocently asked his father if â€Å"[they] were going to die† (11). His father retorted, â€Å"Sometime but not now† (11). The father bluntly answered the question, knowing that he could not hide the inevitability of death. However, the father insisted that they shall strive to stay alive regardless of how poor the circumstances will entail. The father wants to hold on to life delicately, even in the midst of a dangerous and isolated world. The father’s motive to stay alive is to spend time with his son and not to lose hope. The father was very adamant about keeping the fire alive and keeping hope to stay alive. The son believes his father and follows his ideals of keeping the determination. His mother, unfortunately, lost the hope. In the midst of contemplating on suicide, the mother states that â€Å"sooner or later they will catch [them] and they will kill [them]. They will rape [her]. They'll rape [the boy]†(101). The mother confidently states that they will be raped and killed by the blood-hungry thugs.

Wednesday, October 23, 2019

Comparing”Cask of Amontillado” with “The Rats in the walls”

Compare the narrator in Poe's â€Å"Cask of Amontillado† with the narrator of â€Å"The Rats in the walls.† The style and mode of narration in any story determines how appealing a narrator becomes to his or her readers. Additionally, this has much to do with the size of readership that the narrator garners. It is worthwhile that a narrator chooses a narration style that reflects the context of the story, captivating and which gets the reader engaged and involved throughout the narration. This narration will have significant implications for the reviews as well as comments that the reader will make which translate to more or fewer people seeking to read the narrators story. The narrators in â€Å"Cask of Amontillado† and â€Å"The Rats in the Walls† share much in common about their styles, approaches, themes, and appeal to the reader although they differ substantially in some respects. â€Å"Rats in the Walls† is narrated by the last survivor of Delapore family who moves from Massachusetts to his ancestral homeland, Exham Priory in England. On multiple instances, the Delapore and his cats hear the scurrying sounds of rats behind the ways and upon investigation find a city below the subcellar of his home, which has existed for centuries and the dwellers of this underground city fed on human flesh (Lovecraft 4). The narrator in â€Å"The cask of Amontillado† is Montresor, seemingly a gentleman, but in reality, a vindictive and vengeance filled person. (Poe 1). Montresor commits a murder and is unrepentant and guiltless of his deed because he thinks that all, he did and does is right. Most of the time, Montresor is dedicated to his viewpoint which is quite cold, vengeful, brutal, and conniving. He lures his friend, Fortunato, to tunnels and tombs underground, drugs him and locks him in chains, walls him and leaves him in his position to die slowly (Poe 5). Montresor and Delapore exhibit a great deal of quality in their narration style. The tales are given from their points of view and involve crimes, and horrendous acts that get the reader aroused and somewhat scared. They keep a great deal of suspense to maintain the reader and ensure he or she follows to the end. Both narrators, however, could be questioned regarding reliability although they have various levels of any security that could be noted (Lovecraft 8).They seem to have some mental problems which make them act in ways unnatural and do things that would naturally be abominable to sane people. The fact that we have difficulties trusting the narrators question their reliability. Montresor, first, tells the story of the crime he commits fifty years later saying that he was never caught for this. Now, trusting someone telling things that happened many years ago can be difficult because in many cases, things surface a short time after they have been done. Confessions are made, or details unveiled not very long after. Walling his friend and leaving him to die with little to no remorse characteristically defines the possibility of soundness implying that he could probably not be entirely sane. This could make him be considered unreliable (Poe 8). Delapore, similarly, exhibits a high level of unreliability. He presents the story in a way that the things happen in the supernatural realm. This elicits fiction rather than reality, and the details raise many questions because few readers would be accustomed to the nature of things that unfold throughout the narration. Eating human flesh would be an act expected of animals or an unbalanced mind. There is an element of mental issue with the narrator, and this would make him unreliable (Lovecraft 10). Constant sounds of rats in the walls which are never found raise questions as to whether substantial evidence can be gathered to support the points raised in the narration. The default the tone by the narrators is one that conveys abject panic, fear, and impending doom. The mood they employ precedes or supersedes events which could reasonably justify it. Mostly, they share much in common in the narration technics, emotions, feelings, and atmospheres. However, they also differ in some ways. Delapore narrates in a setting of a family background rich in mystic scenarios. This is evident in the declaration of the finding of bones in the underground of the Priory(Lovecraft 14). Montresor narrates from a setting of being insulated which leads him to revenge (Poe 1). The motivations behind the narration are entirely different Delapore is motivated by the desire to unravel a family background which influenced him to act and behave in the way he did. Montresor is affected by the desire to resolve the dampness of his surroundings which exert pressure on him to react in a manner to repay for what has been done against him. The levels of the unreliability of the stories also differ. Delapore is somewhat fictitious in his narration and to some extent narrates from an insane person. Delapore is profoundly unreliable because the details are hard to prove in the real world from which the readers view the content of the narration (Lovecraft 16). Montresor can be termed unreliable, but the extent is not as deep because there are actual details which offer significant proof of turn of events with a human element. While for the most part, he remains unrepentant and self-justifying of the crime he commits, there is a portion where he notes his heart grew sick after he had only a brick left to seal Fortunato forever. However, he withdraws from guilty and accuses his surroundings instead. The narration is better regarding reliability as compared to Delapore. The narrative by Montresor is mostly a revenge mission which happens in the real world giving greater credit to the details (Poe 14). For Delapore, the narration based on the occult is something that questions the credibility and reliability of the details. Overall, however, there is much held in common with a few differences inherent for the narrators the nature of narration and story details. Works citedLovecraft, Howard Phillips. The Rats in the Walls. New York: WS via Publish Drive, 2018. PrintPoe, Edgar Allan.  The Cask of Amontillado. Publisher Not Identified, 2016.

Tuesday, October 22, 2019

Civil Inattention essays

Civil Inattention essays Every time we enter a public place we engage in some sort of social interaction. This is a part of our everyday life. Certain public settings are even created for the sole purpose of social interaction. The Study Hall bar in Isla Vista is one such place. Most people go to this bar to get drunk, and to interact with friends or among the unacquainted. Throughout my many visits to the Study Hall, I observed multiple kinds of social transmissions. These interactions between bar patrons varied from positive to negative discussions and were influenced by not only gender but social status also. In the following pages to come I will discuss and analyze social interactions between certain individuals and analytically breakdown some of the conversations that were occurring during my visits. The following analysis will explain what sorts of interactions take place inside of a bar, and will examine the effects that alcohol has on a person engaging in conversation with the known and unkno wn. Many concepts will be used to explain and analyze the social transmissions at the Study Hall. After observing many different situations and interactions at the bar, I was able to apply concepts that were used in lecture and throughout the readings. I will begin by analyzing the forming of a relationship and work all the way into breaking down the actual conversation itself which all occurred at the Study Hall. The process begins with an initial interaction between two individuals who are meeting for the first time. Civil Inattention and Anonymous Relationships It begins with a young male coming to the bar to meet his friends to watch a game. As he enters, a female sitting at a table with two other women notices him. As he passed, he glanced at the table of girls at which time female #1 (the girl who first noticed him) happily made eye contact with him and gave a little smile. It would only be a matter of time before the two would en...