Wednesday, November 27, 2019

Essay on Painting and Philosophy

Essay on Painting and Philosophy Essay on Painting and Philosophy Essay on Painting and PhilosophyUnder the great impact of various brand-new ideologies that appear in the late 19th and earlier 20th century, the styles and the manners of art are changing and the cohesive group with previous art interests splits apart. The new mode of the artistic expression has begun to develop, an emphasis on decorative forms of artworks in place of the realistic representation gradually. Art as one of the most particular platforms empowers people to demonstrate the reality as well as to express the individual cognitive. In either way people treat arts as an efficient resource to define the term of â€Å"Reality†. Artists from late 19th and earlier 20th century manipulated naturalistic forms to reflect what they conceptualized to be â€Å"their realities†. The examination of decorative forms (colors, brushworks and Proportion/depth) that applied in specific paintings would provide the evidence of how artists interrupt the realities with their concept s and impression.Colors and Van Gogh  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Color is one of the most crucial components in the process of establishing the art style. According to Andrew and Markus’s theory of the Color-in-Context[1], color have 3 properties, which are hue, lightness and saturation. These three properties not only provide the aesthetic value of the color but also with the functional value. Basically, it means color shouldnt be seen as the simple representation of the reality but the ideology or the cognitive that people attempting to present. Vincent Van Gogh’s artworks always applied the dramatic colors, which demonstrate the representation of his emotional experience. â€Å"The night cafe† is one of his oil paintings from 1888 and the color tone of this painting is standing out because it got plenty of saturated and non-naturalistic colors assembled together. The title of the painting suggests the content suppose to associate with the part icular ‘Night’ time period. However, all the complimentary colors with heavy saturation mess around the reality. Van Gogh increased the intensity of the light in the night cafà © and created a new version of it with his imaginary and manipulation. Because of the bright yellow, saturated red and pure green, everything in the painting provides the spectator a feeling of horror and isolation. Refer to Van Gogh’s letter[2]:  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   â€Å"The general effect of beauty of color in nature may be lost in painfully literal imitation; it may be maintained by recreating a parallel spectrum of colorsmuch, everything, depends on my feeling for the infinite variety of tones of the same family†According to Bekker’s idea[3], Van Gogh focused more on the intensity level of his psychological emotion but obscured part of his sensory experience purposely. The inner motion of Van Gogh dominates his production process. He put his atten tion close to the beauty of color and exaggerated the great effect the color has. Also, Van Gogh did interrupt the reality with his individual feelings, and meanwhile, this individual concept empowers him to depict the idea of how he sees the world and in his words, to maintain â€Å"the beauty of color in nature†.Depth and Proportion  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In the journal â€Å"On the origin of the world: ‘Expressionism’†, Donald developed the idea about the expressionism that Matisse carried in his work is reflecting an individual creative process, which covered both the result of naturalistic and pictorial.[4] Through this creative process, color and brushwork definitely play the crucial roles but the proportion of the artworks is important as well. The oil painting â€Å"Joy of life† which was done by Henry Matisse from 1906 shows how he represents the nature instead of copying it in the aspect of Proportion.[5] â€Å"Joy of life† is the painting focused on the flatness of the space by compressing multiple levels into a single platform. Regarding to Werth Margaret’s analyze of this painting, she conceptualized the proportion of the painting is divided into three different bands and has â€Å"both triangular and circular† composition.[6] All the components and figures in the painting are organized to guide the spectator’s eye toward the opening centre in the painting. Matisse recreated the reality and interrupted his individual concepts into the nature to express â€Å"his reality† to the spectators.Brushwork is the index of artists’ manipulation  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Based on Michael Newall’s study[7], visible brush marks on the painting would always be the evidence to trace the artistic movement from the artist. In another word, brushwork has the same function as the beats in a piece of music, which acts as indexes to guide spectato r going through artists’ inner world. As one of the establishers of Fauvism, Henry Matisse abandoned the naturalistic style of art expression and applied the controversial movement in his works. â€Å"Woman with the hat† from 1905 is one of the earliest Fauvism painting which done by Matisse. There are two main components in the painting draws people’s attention a lot the harsh brushstrokes and the non-naturalistic color, which was studied in the previous section. In Lauren Tracy’s journal, â€Å"Matisse emphasized the depiction of idea and feeling rather than the representation of reality, and his works served as an important shift toward the highly abstract artistic movements looming on the horizon.†[8] The free-roaming brush works that applied on the painting presents the direction of the artist’s movement with hands and arms. Bold outline of the figure demonstrates less accuracy of the reality but more depict of Matisse’s idea and emotion. This painting’s background is basically created with several color layers, for example a patch of green simply attached with the pink color on the right side of the woman. Matisse didn’t keep his eye on the delicate transaction between different colors but leave them as the separated color palettes with wild brush marks. He is presenting the reality that he sees in the world.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   From Michael’s points of view: â€Å"That the action painter’s brushstroke was expressive of the painter’s mental state at the time of its application quickly became subject to the kind of objections that put paid to the expression theory of art.†[9] There are various ways for artists to express themselves but brush mark is the form could be identified with the dynamic movement that the artists made while they are creating artworks. Though those dynamic brushstrokes, the artists’ personalities and their mental stages could be presented and connected.Conclusion  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In the later 19th century and earlier 20th centuries, artists are facing the great changes from the previous art interests to the new art expression, which focus on using the decorative forms to demonstrate the particular points of view that artists have towards the reality. Specifically, colors, proportion and the brushwork in the painting are not only presenting the aesthetic value but the function value as well. Those components of decorative form connect the nature to the artists’ manipulation of the reality and show the spectator the emotional level of artworks.[1] Andrew J.Elliot, Markus A. Maier, Advances in Experimental Social Psychology, Chapter two- Color-in-Context Theory (Elsevier Inc. 2012) 61-125http://ac.els-cdn.com.myaccess.library.utoronto.ca/B9780123942869000020/1-s2.0-B9780123942869000020-main.pdf?_tid=0e7ab44e-6ee3-11e4-ab60-00000aacb362acdnat=1416288400_4aba50b 425480bde8c969ab4e9df7a4c[2] Bejjer, K G; Bekker, A Y, Color and Emotion- a Psychophysical Analysis of Van Gogh’s work. (University of Florida, 2009)http://search.proquest.com/docview/894124164?accountid=14771.[3] Ibid.[4] Donald E. Gordon, On the Origin of the Word Expressionism- Journal of the Warburg and Courtauld Institutes (The Warburg Institute, 1966) 371[5] Ibid. 370[6] Werth Margaret, The joy of life : the idyllic in French art, circa 1900, (2002),163[7] Michael Newall, Painting and Philosophy (Philosophy Compass, 2014) P.231http://journals1.scholarsportal.info.myaccess.library.utoronto.ca/pdf/17479991/v09i0004/225_pap.xml[8] Lauren Tracy, Woman With a Hat by Henri MatisseBeauty and the Wild Beasts (JAMA Facial Plast Surg, 2014) 81-82[9] Ibid. 232

Saturday, November 23, 2019

Angkor Wat Timeline

Angkor Wat Timeline At its height, the Khmer Empire that built Angkor Wat and the other marvelous temples near Siem Reap, Cambodia controlled much of Southeast Asia. From what is now Myanmar in the west to all but a thin strip of land along the Vietnamese coast of the Pacific Ocean in the east, the Khmers ruled it all.  Their reign continued for more than six hundred years, from 802 to 1431 CE. The Temples During that time, the Khmers built hundreds of gorgeous, intricately carved temples. Most began as Hindu temples, but many were later converted to Buddhist sites. In some cases, they switched back and forth between the two faiths numerous times, as attested by the different carvings and statues made at different time periods. Angkor Wat is the most wonderful of all these temples.  Its name means City of Temples or Capital City Temple.  When it was first constructed before 1150 CE, it was dedicated to the Hindu god Vishnu. By the end of the 12th century, however, it was gradually being transitioned into a Buddhist temple instead. Angkor Wat remains a center of Buddhist worship to this day. The Khmer Empires reign marks a high point in the cultural, religious, and artistic development of Southeast Asia. Eventually, however, all empires fall.  In the end, the Khmer Empire succumbed to drought and to incursions from neighboring peoples, particularly from Siam (Thailand).  Its ironic that the name Siem Reap, for the city nearest Angkor Wat, means Siam is defeated.  As it turned out, the people of Siam would bring down the Khmer Empire.  The lovely monuments remain today, though, testaments to the artistry, engineering and martial prowess of the Khmers. Timeline of Angkor Wat 802 C.E. - Jayavarman II is crowned, rules until 850, founds kingdom of Angkor. 877 - Indravarman I becomes king, orders construction of Preah Ko and Bakhong temples. 889 - Yashovarman I is crowned, rules until 900, completes Lolei, Indratataka, and Eastern Baray (reservoir), and builds Phnom Bakheng temple. 899 - Yasovarman I becomes king, rules until 917, establishes capital Yasodharapura on Angkor Wat site. 928 - Jayavarman IV takes throne, establishes capital at Lingapura (Koh Ker). 944 - Rajendravarman crowned, builds Eastern Mebon and Pre Rup. 967 - Delicate Banteay Srei temple built. 968-1000 - Reign of Jayavarman V, starts work on Ta Keo temple but never finishes it. 1002 - Khmer civil war between Jayaviravarman and Suryavarman I, construction begins on Western Baray. 1002 - Suryavarman I wins civil war, rules until 1050. 1050 - Udayadityavarman II takes throne, builds Baphuon. 1060 - Western Baray reservoir finished. 1080 - Mahidharapura Dynasty founded by Jayavarman VI, who builds Phimai temple. 1113 - Suryavarman II crowned king, rules until 1150, designs Angkor Wat. 1140 - Construction begins on Angkor Wat. 1177 - Angkor sacked by the Chams people from southern Vietnam, partially burned, Khmer king killed. 1181 - Jayavarman VII, famous for defeating Chams, becomes king, sacks Chams capital in reprisal in 1191. 1186 - Jayavarman VII builds Ta Prohm in honor of his mother. 1191 - Jayavarman VII dedicates Preah Khan to his father. End of 12th century - Angkor Thom (Great City) built as new capital, including state temple at the Bayon. 1220 - Jayavarman VII dies. 1296-97 - Chinese chronicler Zhou Daguan visits Angkor, records daily life in Khmer capital. 1327 - End of classical Khmer era, last stone engravings. 1352-57 - Angkor sacked by Ayutthaya Thais. 1393 - Angkor sacked again. 1431 - Angkor abandoned after invasion by Siam (Thais), although some monks continue to use the site.

Thursday, November 21, 2019

There should never be a strict liability element in a criminal law Essay

There should never be a strict liability element in a criminal law offence. There should never be punishment without fault. C - Essay Example Criminal liability is a stringent provision since the defendants are likely to be convicted even if they were truly unaware of one or the multiple factors that labelled their acts as criminal offense. The defendants therefore, may not be  culpable  or guilty, in actual sense, i.e. absence of criminal negligence, the minimum blameworthy status within  mens rea. Thus, one may argue that strict liability in a true sense is an inappropriate use of the criminal law which, owing to the grave implications that it have on a ‘wrongly’ convicted defendant, should be made permissible only for the regulating or governing serious crimes committed by the culpable miscreants. This article will critically examine various cases and analyse whether there should not be a strict liability element within a criminal law offence, and there should never be punishment without fault. Discussion What are strict liability laws and their applications: Strict liability laws enacted in the 19th century aimed at elevating the working conditions and establishing standard safety norms within factories. The necessity to ascertain mens reas against the factory owners was not easy which culminated in very few prosecutions. The strict liability offences were created so as to tackle the factory owners more effectively and to ensure that the rate of convictions increased. In the modern context, common strict liability offences today include the driving over the prescribed speed limit and selling of alcohol to underage persons. Although the contentious issue here pertains to the fact that a person’s state of mind with which he/she acts should be made extraneous to his/her criminal liability (as opposed to the notions of how to deal with a defendant should he be proven guilty) it however, does not represent the law. This aspect is particularly relevant in the case of ‘real crimes’ where defendants are generally not held as criminally liable, for their conduct, if they are innocent (Ashworth and Blake, 1997). In a large number of offences, however, a prosecuted may face convictions even though his behaviour was unintentional, was not aware, not reckless or negligent, as regards to a necessary element of the offence charged. In such cases, an individual is liable to face punishment though there may be a total lack or absence of any wrongdoing on his part, as per the elements in question, which come under strict liability laws (Lemon, 1979). The debate: These laws are applicable either in  Ã¢â‚¬Ëœregulatory offences’  that administer social behaviour, where the stigma associated with the convicted person is minimal. The laws are also applicable in cases where the society is concerned with the harm prevention and reduction, and wants to obtain high deterrent values for a certain offense. However, a closer look at the various cases will reveal that are chances that some of the imposition of strict liability may function unjustly in cer tain isolated cases. As for example, if we study the case Pharmaceutical Society of Great Britain v Storkwain  we will find that a pharmacist sold drugs to a patient who had produced a medical prescription that was a forged (Pharmaceutical Soc

Wednesday, November 20, 2019

Popular Culture (2-3) Research Paper Example | Topics and Well Written Essays - 750 words

Popular Culture (2-3) - Research Paper Example Myths continue to be told today and they are still part of the so called Modern world. The most important Myth that is currently on the minds is the 21st December 2012 Myth. No doubt that this topic is of huge interest to everybody and hence a huge amount of money is being generated by exploiting this interest. December 21st 2012 has been declared as a Doomsday in the Mayan calendar (â€Å"December† n.d. Para 1). Today we undoubtedly see wars, natural calamities, and destruction. Some say that these are the dark times and that these days were prophesied long ago in the Bible, the temples of Rome and the Pyramids of the ancient Maya. The newest version of the Doomsday prophecy comes from the Web.Bot project (â€Å"The web† n.d. Para 8 ). According to the Web.Bot the series of catastrophes reach their peak in the year 2010. What causes us to think more on this Myth or the Prophecy is the surprising similarities in the predictions. The Mayan Calendar: The Mayan calendar ceases to exist after December 21, 2012 (â€Å"2012† n.d. Para 5). The Mayans believed that history consisted of five ages and that each ends in a disaster before the world is reborn. And as per their calendar, we are living in the fifth and the final age which is due to end in December 2012. (D 2012: n.d.) Planet X or the Planet Nibiru: It is claimed that a certain planet Nibiru supposedly discovered by the Sumerians, is headed for the earth and that this will collide with the Earth in December 2012 (D 2012: n.d.). Planets align in a way that impacts Earth: According to the planetary alignment 2012, earth will be at the centre and sun will be present at the top (D 2012: n.d.). It is expected that the rising sun will come in a straight line with the black hole which is situated in the centre of the Milky Way (D 2012: n.d.). The rising sun will touch its lower orbit which can cause many changes in the position of the

Sunday, November 17, 2019

Opening remarks. President of ASO Essay Example for Free

Opening remarks. President of ASO Essay Good morning, Ladies and Gentlemen. First, let me warmly welcome you all to this meeting of the Associated Students Organization (ASO). I hope that my introductory remarks will help to give us all a sense of direction and a common purpose for our work within the guidelines set out in the ASO Charter of July 2005. Let me begin by briefly revisiting last year’s ARO sponsored career day: ï‚ · ï‚ · ï‚ · ï‚ · ï‚ · Over 7500 students attended 550 businesses had booths 15 distinguished speakers ( Steve Jobs, Colin Powell to name a few) All branches of services were represented 45 business development services offering workshops on starting businesses The responses last year were some of the largest we have ever seen even with this weak economy. The goal for this year is to aid our students to get hired before they leave for the day. I would like us to focus on more career planners and workshops to help these students plan for their life long career. When our students graduate, they are competing with a high unemployment rate, thus making securing the job as well as keeping it difficult. Business development can aid our business majors with the consideration of starting their own business and being their own boss, not to mention maybe if they are successful, they can hire others within their communities that need employment. Our challenges are tough, but I believe that we are successful if 80% of our graduates get hired as a result of this career day, we have been a success. Thank You.

Friday, November 15, 2019

Ever At Odds: The Conflict and Reconciliation of Science and Religion in Paradise Lost and The Blazing World :: Paradise Lost Blazing World

Ever At Odds: The Conflict and Reconciliation of Science and Religion in Paradise Lost and The Blazing World Throughout history, scientific theories and spiritual beliefs have often been at odds. Even today, most people are faced with the difficulty of reconciling their religious beliefs with modern science. In the 17th Century, when scientific thought was in its infancy and religion was the established source of knowledge about the universe, this conflict was of particular interest to writers and philosophers. Two similar but contrasting viewpoints on this issue can be seen in John Milton's Paradise Lost and Margaret Cavendish's The Blazing World. Milton and Cavendish both see science as a tool for exploring the world; however, while Milton feels that science can provide no deep insight into God's workings, Cavendish believes that science can potentially be a source of greater knowledge and understanding. Under the reign of Elizabeth I, England enjoyed a period of religious toleration. However, near the end of her reign, a growing religious minority, the Puritans, became increasingly critical of her policies, believing that she was still too close to Catholicism. These grievances were magnified when Elizabeth's successor, James I, a devout Anglican, proved to be far less tolerant and tactful. Furthermore, James was accused of abusing his royal authority by attempting to undermine Parliament. The growing tension between Anglicans and Puritans worsened under James' son, Charles I, who repeatedly angered a Parliament in which the House of Commons had gained a significant Puritan influence. In response, the Puritans, led by Oliver Cromwell, called for a reformation of the church, including the abolition of the Anglican Book of Common Prayer and a ban on bishops voting in the House of Lords. When Charles attempted to dispel the situation by arresting five Commons leaders, loyalties in the country split and the English Civil War began. Under Cromwell's political and military leadership, the Puritan forces gained organization and determination. His New Model Army won a major battle in Naesby in 1645, which ultimately lead to Charles' surrender. In January 1649, Charles I was executed and the Interregnum under Cromwell began. However, Cromwell's reign was not successful, and by 1653 he was forced to rule through military dictatorship. After Cromwell's death in 1660, Charles II was invited to return from exile to claim the English throne. His return to power is known as the Restoration (Chambers 478-85).

Tuesday, November 12, 2019

The Detrimental Effects Acid Rain

With scientists and so-called â€Å"experts† on the environment disagreeing on so many issues, it is easy for the public to be lost in the fray of what is truth and what is media hype. Though the term â€Å"acid rain† has been present in our society since the early 1970†³s, many people are not exactly clear on what it is what causes it, and the detrimental effects acid rain has on our environment. More confusing than all of the facts and scientific theories surrounding acid rain is the development of a suitable solution to reduce air pollution, which in turn leads to acid rain. Many experts do not agree that acid rain has in fact been caused by man made pollution because of the fact that rain is naturally acidic. This widespread disagreement delayed international action to reduce pollution for some time. However, with the coming of the 1970†³s an awareness of acid rain spread, and with that awareness, possible solutions were proposed. These solutions involved making environmental changes on the international, industrial, and personal levels. Just how does acid rain form, and what consequences does it pose to our environment? There are numerous theories as to the cause of acid rain. However, the most prevalent is the theory that electric generating plants, heating plants, and other industrial plants have been emitting an excess amount of sulfur oxides, nitrogen oxides, and volatile organic chemicals (VOC†s) into the atmosphere. Once these chemicals are in the air, they react with water to form acids and fall back to the earth as precipitation. People who believe acid rain is a natural phenomenon do so because of the fact that carbon dioxide in the air combines with water vapor and produces carbonic acid (Bolch 95). There are several environmental risks that come with acid rain. One of these is the acidification of lakes, resulting in the lakes† inability to sustain the aquatic life. In fact, Norway reported that 18,000 out of 85,000 of their lakes were acidified, and more than half of their fish population has disappeared (Brunee 23). Ground water can also become more acidic because of the way acid rain depletes the natural buffer system of the soil. Studies done in the early '70†³s indicate immense damage done to the forests, especially in Eastern Europe and in Germany. A sort of â€Å"tree disease† has been destroying a large percentage of the coniferous trees. The effect of acid rain on wildlife could include the contamination of the entire food chain by causing heavy metal accumulation in aquatic life. The effects that acid rain has on humans has not been effectively studied. However, scientists believe that occurrences of respiratory diseases such as asthma may be on the rise. Acid rain is also causing many historical buildings around the world to erode and decay at an increasingly higher rate. Since the early 1970†³s, many efforts have been made to reduce the air pollution that causes acid rain. The United States government passed the first Clean Air Act in 1972. This act established standards of air quality in order to protect public health. It also required states to submit plans for attainment of these standards. The second Clean Air Act passed in1990 took regulation of air pollutant emissions a step further. It called for a further reduction in car tailpipe emissions, as well as mandating the development of cleaner fuels to be used in metropolitan areas. It listed 189 specific toxic chemicals to be regulated as hazardous air pollutants, as well as establishing a new permitting program for stationary sites of industrial air pollution. These sources of air pollution were now required to have an EPA-issued operating permit that specified allowable emissions (Kraft 87). These governmental controls have effectively reduced air pollution in our country, but at what cost? Writer, Michael E. Kraft asks the question that burns in many of our minds. â€Å"How clean is clean enough? How safe is safe enough, considering available technology and costs? † Initiatives to help meet proposed air quality standards are extremely costly, and they impose substantial burdens on the state and local government. The level of spending on air pollution control in 1972 was $8 billion. By 1990 that figure has risen to $30 billion (Meiners 5). Many experts doubt that money was spent wisely by the government, and claim that the same amount of reduction in air pollution could have been attained using half of the money spent if the government was more efficient. Obviously the U. S. overnment has taken a stand against pollution, and has paid the extremely high financial costs. Many people are quick to point the environmental finger at less developed countries and ask why they are not going to such measures to reduce their own pollution. Like many other things, this too comes down to money. There is a drastic inequality among the rich and the poor nations. This has a large impact on the ability of those poorer countries to address environmental concerns. In 1991, the richest 20% of the nations received 85% of the world income, while the poorest 20% received only a mere 1. % (Sandler 20). In order to effectively solve any global problem, the nations who are most affected by the problem, and would benefit the most from a solution must take on an active role in the resolution of the problem. If these countries take an aggressive and public stand on fighting and reducing their own pollution, other countries will follow their lead (Sandler 148). A large group of nations are cooperating in order to solve a global problem; they form a sort of power, or clout that is effective in pressuring other nations to join the fight. Such cooperation and discussion between nations is crucial in olving an environmental problem like acid rain and air pollution because of the fact that one country†s pollution will often harm neighboring countries. If a couple of nations take a stand against pollution while the others sit idly and watch, what benefit will the efforts result in? The fact that the Earth†s population is increasing at a frighteningly high rate is no surprise to most of us. We have heard time and again about the inability of the earth to sustain such a high population. This constant increase in population is causing an extreme increase in energy needs, which is leading to more pollution. Some scientists claim that if the population increase does not stabilize, it will be almost impossible to effectively control and reduce pollution with our current technology and methods of controlling pollution (Sandler 21). Science and technology play an important role in the reduction of air pollution. When there is a better understanding of a problem it can be handled with a greater efficiency. Scientists claim that nitrogen oxide emissions can be lowered through improved efficiency and conservation, especially in residential and commercial uses. Installing low nitrogen oxide burners will reduce the nitrogen oxide emissions. Setting emission standards on vehicles can cut pollution from mobile sources. New vehicles can incorporate improved emissions technology. Sulfur emissions can be reduced through the use of low-sulfur coal and oil, as well as flue-gas desulfurization for power plants. The implementation and use of hydro electricity, solar power, tidal energy, geothermal energy, and wind power have all been proposed as possible solutions to the problem of air pollution. Reducing air pollution is a very complicated task because of the involvement and support it requires from foreign nations, and the industrial world. A much less recognized, but equally important level of involvement is that from the public. It is extremely easy for the public to point their fingers at big business and demand a change for the improvement of our environment, without properly examining their personal effect on the problem. Why is the public seemingly oblivious about the ways that they can help reduce this problem? It is possible that they have been confused by differing opinions, and left out of the process of implementing possible solutions, which has alienated. Consensus among scientists can speed agreement on how to respond to hazards† (Kraft 18). Though this consensus would be ideal, it is not often the case due to growing uncertainties about health and environmental effects. â€Å"A more promising alternative is to improve the way scientists conduct risk assessments and discuss them with the public and stakeholders. Credibility and trust are crucial ingredients in effective assessment and management of risks. Providing opportunities for thorough discussions of the issues at hand and consideration of public views will inspire confidence in any proposed action† (Kraft 18). While some people are simply unaware of the problem of air pollution by the public, others are simply lazy. An extreme dependence on modern conveniences has contributed to this. Driving cars to every possible destination, no matter how near, seems to be an epidemic in this country. Luckily, the cure is a simple one. Alternative forms of environmentally sound transportation are usually readily available to those who are willing to utilize them. Public transportation, car-pooling, bike riding, and walking are just a few ways to cut the pollution that the public sector is responsible for. If the government had not stepped in and taken a stand for the environment, pollution levels would undoubtedly be awful today. The industrial decision-makers are too often blind to the needs and concerns of the environment because of the financial burden that environmental protection entails. And while most of the air pollution does come from industrial sites, we all could and should do our own part to help resolve this problem. Sooner or later we have all got to realize that in order to save the environment from disaster, we are going to have to be willing to sacrifice some of the conveniences that we have become so accustomed to.

Sunday, November 10, 2019

Probation and Parole in the United States Essay

Abstract Employee security problems and high risk caseloads progressively will move agents away from customary probation ideas of casework in the direction of ideas lined up with control or disciplinary beliefs. This study analyzes how the role of probation and parole has altered and what the future will be like counting on how we respond to the alterations at hand. This study also reviews changes in the criminal policies that have transpired. Probation and Parole in the United States: Changes in the Correctional System since World War II Under Florida law, the Department of Corrections is to keep the public safe and out of harm’s way, supply a protected and friendly environment for employees and criminals; work in joint venture with the community to add programs and services to lawbreakers; and oversee criminals at a grade of security appropriate with the hazards they present (Florida Department of Corrections, 1992). These duties pose marvelous trials for the employee’s management of the Florida Department of Corrections and the corrupt justice system as a whole. To have an insignificant impact on these matters, the system must make some foremost changes in how corrupt justice is distributed. This is necessary as the crime rates continue to rise; as courts misplace their influence in deterring crime by equalizing quick, rigid sentences; as correctional organizations accept inmates today and let them go tomorrow to ease overcrowding; and as criminals become more dangerous. The penalties of our failure to arise the surge of crime are frightening. An article in USA Today (1991) stated: Probation agencies have become seriously under-staffed just as they are being depended upon more strongly than any issue in history; probation, rather than prison, is the most widespread pattern of punishment. Probation agents have become less and less engaged in  their usual function, more connected to communal work and are more absorbed with law enforcement, following down those who have defied the periods of flexibility. Regardless of an astounding increase in the number of institutional facilities, an exceptional number of criminals have been put under strict watch in the community. The Florida Department of Corrections has more than 100,000 felony criminals under supervision in Florida communities. If it were not for overcrowding, numerous of these criminals would be assisting long sentences in state organizations. Regulation enforcement, the court, the correctional system, and probation and parole have the same duties for the malfunction of the criminal justice system. The difficulties documented above are huge. To deal with these difficulties, much of what we do and how we do it will need to be different. Many inside and outside alterations currently have been made to respond to the individual safety concerns of probation/parole agents in Florida: adjustment of agencies to provide for larger employee security, soft body armor, and firearms. This study task calculates areas where change is required, as well as obstacles that stand in the way of change. According to Edward W. Sieh (1990), Over the past so many years, probation communities have grown to more than 18% compared to about 15% in jail and prison communities and almost 13% in the number of paroles. Close to 2/3 of the complete correctional community was under probation supervision in the community at the end of 1985. Sieh decided that huge alterations in the criminal community have led to alterations in sentencing, as well as in how officers are expected or needed to do their job. Twenty-five percent of convicted felony criminals get probation. Other judgments encompass complete supervision and shock probation. Sieh’s study recognized two essential forms for overseeing criminals—â€Å"remedy† and â€Å"justice†. The remedy model demonstrates customary  casework and rehabilitation, and assesses change within the system. Sieh attacked the remedy mode, showing that it is inherently violent and unjust. It supposes a power over the impulse of criminals, out of capacity to their incorrect doing; it ignores information about the communal rather than therapeutic basis of crimes, and it treats clients as absolute objects of disciplinary policy to manipulate at a whim. The justice standard deals with the increasing occurrence of punishment. Sieh accepts that the standard was made from public appeal for belief of punishment with the smallest risk to the community. In his description of the justice standard, the officer is not at all worried about assisting alterations in the criminal, court instructions become the direction for supervision. Criminal success or failure counts upon his/her agreement with the conditions of supervision, and not the blame of the officer or the system. Complete supervision, in his outlook, is a process of the justice standard. Sieh assumed that the system is moving firmly nearer to a disciplinary one—the justice standard. He questioned contemporaries in the field to gaze for equity. Harris, Clear, and Baird (1989) discovered that the probation system completely extends to support remedy beliefs. Morran and Linder (1985) were in unison. They found more considerably, that electronic devices, sophisticated drug and alcohol area testing kits, and computerized information of new arrests are assisting to a larger focus of the law enforcement duty. Many of the criminals who carry out crimes are presently under supervision. Collaboration between regulation enforcement and probation would increase effectiveness. At the same time, supply for larger security for probation officers who might otherwise be needed to make late evening calls to tough positions without backup would not hurt either. Ten years before, supervising the whereabouts of a criminal by the use of an electronic monitor emerged light years away. Cold War undercover operations employed the use of electrical monitoring apparatus. The Florida corrections  system has intensely cooperated in a supervising program for more than ten years. Today, 800 criminals are under electrical monitoring oversight. The courts have vigorously approved the use of the apparatus. It is expected that the electrical monitoring will be utilized at elevated rates in the future. Between 1984 and 1988 the probation caseload went higher from 1.74 million to 2.36 million individuals (Bureau of Justice Statistics, 1989). Numerous administrations have furthermore noticed that the probation populations are criminals who often begin with a high risk of threat to the probation agents (Guynes, 1988, Petersilla, Turner, Kahan, & Paterson, 1985; Snyder, 1986). It is without question very necessary that officers are supplied with an access of security to make sure that they don’t become victims. The future is ours to shape and change, or to just let it occur. Given a perception of much important advancement, we should start to increase the speed of some of the more attractive future anticipations and slow up those with less attractive anticipations. To adjust the course of unattractive purposes, the setting up of balancing standards and practices will be needed.

Friday, November 8, 2019

Free Essays on The Secret Sharer

The Secret Sharer Joseph Conrad’s The Secret Sharer, is a novella that tells the story of a ship captain who discovers a stow away and harbors him without telling his crewmembers. As the story goes on, the stow away, Leggat, explains that he killed a man and had run away. Although the captain knows that what Leggat did was wrong, he still allows him to share his space. The captain then refers to Leggat as the sharer of his room, the sharer of his clothes, the sharer of his appearance, and in some ways the sharer of his life. The plot of this novella focuses on the psyche of the captain in a way that reveals his need for another dimension to his monotonous life, and he lives this life through the experiences of another man. This story begins with the captain of a ship named the Sephora. When we are introduced to the captain, he is pondering the commands that he has issued to his crew. He doesn’t know much about anyone of them, and wonders if they trust him and if he is doing a fair job of running the ship. He feels to himself that he is doing less than what is expected and is somewhat disappointed in him. While on the poop deck he goes over to raise the ladder and discovers Mr. Leggat at the bottom. He allows him to come on board and gives him clothes and refuge. Leggat explains to him the circumstances surrounding the reasons why he ran away. He had killed a man out of rage on the neighboring ship and had been detained. After three weeks of being locked up he saw an opportunity to escape and did so. He was swimming in the ocean for quite sometime before he saw the lights of the Sephora and swam towards it, which ended him up where he was at the moment. The captain still hid Leggat. He looked at him as his twin, someone that could resemble him physically and someone whom he shared a special bond with. The captain of the neighboring ship came over, looking slightly distraught, to ask a few questions concerning Leggat. The capt... Free Essays on The Secret Sharer Free Essays on The Secret Sharer The Secret Sharer Joseph Conrad’s The Secret Sharer, is a novella that tells the story of a ship captain who discovers a stow away and harbors him without telling his crewmembers. As the story goes on, the stow away, Leggat, explains that he killed a man and had run away. Although the captain knows that what Leggat did was wrong, he still allows him to share his space. The captain then refers to Leggat as the sharer of his room, the sharer of his clothes, the sharer of his appearance, and in some ways the sharer of his life. The plot of this novella focuses on the psyche of the captain in a way that reveals his need for another dimension to his monotonous life, and he lives this life through the experiences of another man. This story begins with the captain of a ship named the Sephora. When we are introduced to the captain, he is pondering the commands that he has issued to his crew. He doesn’t know much about anyone of them, and wonders if they trust him and if he is doing a fair job of running the ship. He feels to himself that he is doing less than what is expected and is somewhat disappointed in him. While on the poop deck he goes over to raise the ladder and discovers Mr. Leggat at the bottom. He allows him to come on board and gives him clothes and refuge. Leggat explains to him the circumstances surrounding the reasons why he ran away. He had killed a man out of rage on the neighboring ship and had been detained. After three weeks of being locked up he saw an opportunity to escape and did so. He was swimming in the ocean for quite sometime before he saw the lights of the Sephora and swam towards it, which ended him up where he was at the moment. The captain still hid Leggat. He looked at him as his twin, someone that could resemble him physically and someone whom he shared a special bond with. The captain of the neighboring ship came over, looking slightly distraught, to ask a few questions concerning Leggat. The capt...

Tuesday, November 5, 2019

Information Security The Physical Security Factor

Information Security The Physical Security Factor Today, more than ever before, healthcare organizations are increasingly becoming dependent on computer-based systems to access critical patient data and provide treatment solutions remotely via virtual private networks (VPNs).Advertising We will write a custom essay sample on Information Security: The Physical Security Factor specifically for you for only $16.05 $11/page Learn More Consequently, any kind of disruption targeting these information systems may occasion consequences ranging from inconvenience to catastrophe (Loch, Carr Warkentin, 2002). But while research in both academia and industry has developed effective technological and software-based solutions to protect information systems against possible threats and attacks (Stajano Wilson, 2011), only a handful of the articles found in various databases pay close attention to the physical aspect of information security (Huigang Yajiong, 2010). This paper is devoted to outlining some of the fundamen tal steps that need to be considered for the physical security of computers used in an urgent care center to access patient data and their email system via a VPN. Stajano Wilson (2011) note that effective countermeasures against security threats to information systems depend on first strengthening the human element to make users understand how they can naturally fall victim to fraudsters. This therefore implies that users, in this case physicians and other health practitioners, need to be exposed to some form of training on how they can use the system without compromising the security aspect of the network. For instance, system users could be exposed to formal training on how to discard used electronic media containing sensitive patient information through available techniques instead of leaving the information on the computer drives.Advertising Looking for essay on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More Purging is one such technique that could be used by the practitioners to completely erase sensitive files which may have been deleted from the computer drives but not overwritten with other data (Walters, 2007). From a holistic security engineering standpoint, computers are often vulnerable to instances of theft and other possible attacks if the immediate physical environment is not secured (Stajano Wilson, 2011). This therefore implies that doors leading to the computer rooms must not only be secure, but must be kept under lock and key and windows adequately grilled to curtail any occurrence of unauthorized access to the computer rooms (Walters, 2007). Indeed, many organizations have a policy that restricts entry to the computer and server rooms to authorized personnel, in most occasions a systems analyst or administrator. It should be noted that this aspect of physical security is fundamentally important since all the other factors are dependent on how safe the computer or server room is from possible attacks and illegal access. Engaging trained security personnel and dogs to physically protect the information systems is yet another physical aspect of information security that is intrinsically important yet seldom considered by many organizations (Loch et al, 2002). Patient data is sensitive in nature, thus the need to engage all efforts that may be deemed necessary to protect the computers from theft or illegal access. Consequently, trained security personnel forms a critical aspect of the physical security of information security needed to secure the computer rooms and the immediate environment from possible attacks, which may result in the theft of computers and by extension the loss of critical data (Perrig, Stankovic Wagner, 2004). Dogs are always useful in repelling thieves from accessing the urgent care center.Advertising We will write a custom essay sample on Information Security: The Physical Security Factor specifically for you for only $16.05 $11/pa ge Learn More Access to computer areas and server rooms should be restricted through the use of identification badges or authorization cards to ensure that only the authorized health practitioners gain access to these critical areas (Perrig et al, 2004). For instance, the organization may invest in electronic identification badges that must first be accepted by the system or the door lock for them to gain access to the information stored in the computers. Research has demonstrated that identification cards and access control points inarguably decrease the possibility of attackers to physically tamper with information stored in computer systems or to even have access to areas where such computers may be located (Loch et al, 2002). Physical security of information systems cannot be complete without engaging the authentication processes via personal identification numbers (PIN), passwords, computer locks, and other devices that may be used to limit access to authorized users only. According to Renaud De Angeli (2009), â€Å"†¦authentication is required to verify that the user’s proffered identity is valid† (p. 135). It is only plausible for physicians and other health practitioners using the VPN to access sensitive patient data to memorize their PINs and/or passwords rather than writing them down on a piece of paper because such information could be accessed by other employees or external individuals harboring ulterior motives. Computer locks could always be employed to prevent other employees or strangers from gaining access to the data stored in the computer or from manipulating computer hardware configurations with the aim to steal data or remotely control the computer system (Stajano Wilson, 2007). Lastly, the environmental factors need to be effectively controlled to make the physical security of information systems a reality.Advertising Looking for essay on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More Instances of fire outbreak, flooding of computer areas and server rooms, extremely high temperatures, electricity variations and other environmental concerns need to be effectively managed to prevent loss of use and loss of productivity of the information systems (Perrig et al, 2004). For instance, flooding of the server room may occasion protracted dysfunctions of the server system, leading to loss of connectivity and subsequent loss of access to critical patient data even among the authorized users. Going by this example, therefore, the urgent care center should invest in an effective drainage system to prevent instances of flooding. Reference List Huigang, L., Yajiong, X. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 394-413. Retrieved from Business Source Premier Database. Loch, K.D., Carr, H.H., Warkentin, M.E. (2002). Threats to information systems: Today’ s reality, yesterday’s understanding. MIS Quarterly, 16(2), 173-186. Retrieved from Business Source Premier Database. Perrig, A., Stankovic, J., Wagner, D. (2004). Security in wireless sensor networks. Communication of the ACM, 47(6), 53-57. Retrieved from Business Source Premier Database. Renaud, K., De Angeli, A. (2009). Visual passwords: Cure-all or snake-oil? Communications of the ACM, 52(12), 135-140. Retrieved from Business Source Premier Database. Stajano, F., Wilson, P. (2011). Understanding scam victims: Seven principles for systems security. Communications of the ACM, 54(3), 70-75. Retrieved from Business Source Premier Database. Walters, L.M. (2007). A draft of an information systems security and control course. Journal of Information Systems, 21(1), 123-148. Retrieved from MasterFILE Premier Database.

Sunday, November 3, 2019

Health Care System Essay Example | Topics and Well Written Essays - 1000 words

Health Care System - Essay Example Even as the range of benefits has broadened, the program still contains what some see as gaps and others regard as areas in which private and state programs need to be strengthened. Either way, most people agree that long-term care represents a contingency for which most are psychologically and financially unprepared. Some suggest that the list of Medicare benefits should be expanded to include payments for nursing homes and other long-term care services. Social Security consisted of two sets of rules. One set governed the payroll taxes, and the other set described the benefits to which workers were entitled. Both the level of taxes and the amount and types of benefits changed over the years. In 1965, legislators raised the tax level and established a major new type of benefit. By adding hospital insurance to the array of Social Security benefits, they launched Medicare. In addition to the original retirement benefits for workers over 65, the new benefits included payments to the wives and children of retired workers and to the widows and children of workers who died before age 65. After 1939, therefore, Social Security included benefits to a worker's survivors (Ruskinm 2009). The second milestone occurred in 1950 when Congress decided to raise the tax rate, and, updating benefit levels for price changes in the 1940s, to increase substantially the level of payments to retired workers and the survivors of workers. Social Security--tha t is, the Old-Age, Survivors, and Disability Insurance program--is by far the largest American social insurance program, with the greatest impact on individuals and families. In 1992, for example, 132 million American workers and their employers paid Social Security taxes and about 41 million Americans received Social Security benefits each month (Peltz, 2008). As living standards improved, more Americans expected to retire, and retirement became widely perceived as a period of earned leisure. State welfare programs for the elderly provided real competition to the Social Security program in the 1930s and 1940s but declined as a threat to Social Security in the 1950s. Medical care became increasingly desirable as a good to consume in the 1940s and 1950s, and the supply of private health insurance increased exponentially in these decades (Ruskinm 2009). Modern Health Care System Medicare and Medicaid programs are based on early insurance programs and plans improved and redesigned by the government. Even so, many indirect infusions of general revenues are made into the program, including the revenue produced from treating a portion of Social Security benefits as taxable income. The second proposal would put Social Security financing on a pay-as-you-go basis. In this approach, Congress collects, through payroll taxes or some other means, only the amount of money necessary to sustain the program on a current basis. This approach, however, has the benefit of keeping taxes low, avoiding the difficult problem of how to preserve the supposed surpluses in the program (Staff 2009). This approach has the disadvantage of leaving the future to take care of itself, arguably bequeathing large burdens to future generations (Staff 2009). The government does not permit this activity to occur in

Friday, November 1, 2019

Explain the process of market segmentation. Why is it thought Essay - 1

Explain the process of market segmentation. Why is it thought necessary for a firm to target specific segments of the market - Essay Example In this era, there is no such thing as a standardized product which is suitable for use by all people. Hence, no firm seeks to target the whole market at large and it is highly difficult to target a large potential market with the same product and the same marketing strategies. No products except maybe staple foods such as fruits, vegetables, bread, butter, and other important dietary supplements are aimed at targeting the whole population of consumers and are standardized products. All other products or services are differentiated and conformed to the needs and wants of various target groups (Greenberg and McDonald, 1989, pp. 95-96). Differentiation refers to adapting the characteristics and marketing of your product/service to fulfill the needs and wants of a particular target market. In order to select the target market for product/ service, a firm must indulge in the process of market segmentation (Greenberg and Mcdonald, 1989, pp. 110-112). Market segmentation is the process of dividing the larger potential market into smaller groups according to similar characteristics. The segmentation can be upon the basis of several variables depending upon the product/service the business is offering and how it plans to target its potential audience. Several advantages of market segmentation enable a business to perform more efficiently and make the business’s selling/ marketing strategies more effective. The first advantage of market segmentation is that segmenting the potential market allows the business to be more focused upon a certain group of customers. This prevents duplication of resources and enables the business to directly target the segment that is more likely to be interested in their product/service offering rather than wasting time and resources upon targeting a massive market that may not be interested in the product/service at all (Yankelovich, 1964, pg. 75-77). Market segmentation allows the business to see the