Monday, September 30, 2019

The Virgin Group

Sam Yates-Smith Student ID: 000292201 CASE STUDY 6 THE VIRGIN GROUP 1. The corporate rationale of the Virgin group is to re-ignite static industries, with fresh ideas and developments, thus offering the consumer differentiation. Diversification is an extremely important attribute of Virgins rationale. Their SBU’s improve Virgin’s scope and therefore its existing markets and products. Virgin uses the ideology of ‘the corporate parent’ to add structure and guidance to its various business units, which in turn adds value due to the effective, disciplined approach that the rationale provides. . There are certain strategic relationships between businesses within the Virgin portfolio, these lie in ‘economies of scope’. This term refers to the notion that the Virgin groups have synergy amongst its SBU’s, therefore utilizing free standing tangible and intangible resources in order to fully comprehend and fulfill a particular new environment or m arket. This adds value to a new market whilst ensuring resources are not wasted. An example within Virgin would be their research into the global oil market and the search for greener fuels for its airlines. 3. Virgin as a corporate parent adds value to its group via the collective ambition and ideology which is ascertained via the strength of the Virgin brand. One aspect of Virgins Corporate parenting is the ideology of ‘envisioning’. Virgin provides ‘strategic intent’ by laying certain ideologies for its SBU’s to follow. This provides discipline and strong methodologies for the units to adhere too. Another element of ‘value adding’ via Virgins parenthood can be explained using the BCG matrix. The Virgin group’s portfolio shows high market share and strong growth within their markets. These positive denotations enable management to visualize the potential of concurrent markets and ensure growth is fully realized. 4. ‘’The greatest threat that the Virgin brand may become associated with failure’’ (Johnson et al, 2009). This signifies one of the issues facing the Virgin group. The larger the Virgin portfolio gets, the more issues they will face regarding the density of their diversification and therefore ensuring consumers are not undermined and loyalty is retained. Another issue is that of waning portfolio and growth which is susceptible to ‘slowing down’. Recognition of ‘Stars’ (BCG) turning into ‘Dogs’ is extremely important to ensure the correct visualization is atoned for and that growth is relative to the portfolio’s strength as a whole and not allowed to become complacent, leading to surplus resources and market share. 1

Sunday, September 29, 2019

Classification of Movies Essay

When it comes to movies, People have many different types of genres they prefer to watch. It is easy to assume almost everyone has a preference when it comes to movies, because there have been so many different types made to appeal to all viewers. There are three major categories that have wide appeal Romance, Comedy, and Horror. The romance, comedy and horror genres are the most popular in the movie industry. Wall Street Journal Doris Walsh says: â€Å"Romance, Comedy and Horror movies are the most popular to rent in every age group they have the most factors that intrigue and entice the viewer into the fantasy or documentary aspect of the movie†. The first genre of movies, are romance movies The Straits Times (Singapore) Yip Wai Yee says: â€Å"I’m a romantic at heart, but it’s not only because of that. Sometimes, you just want to feel more, to have your heart squeezed and get that rush of emotion that only these movies will give you.† The romance genre is more appealing to the female audience. New York Times Writer Bill Carter says: â€Å" Love at first sight, abandoned by Sunday afternoon companion, deceived by the best friend who became the mistress, women appeal to romance imagining themselves in the scenes from these relevant situations.† The fantasy and passionate story lines are so heart wrenching. Whether there is a happy ending or not the passion that’s illustrated becomes so realistic. Love and Basketball a well-known romance movie tops the charts: Baltimore City writer Tom Scocco says,â€Å"It’s conceived, essentially, as a three cornered love story, with a basketball holding down the third spot. It is a story of an African- American male and female who grew up together and share a love for basketball. The passion, heartache, struggle and support the characters have for each other reminds people of their relationships. The second genre is comedy. Wall street journal Denise Jackson says â€Å"Comedies have a way of lightening the mood.† The goals of this genre are to appeal to the viewer’s humorous side. â€Å"Comedies use humor to draw the audience attention through its characters and storylines.† Says D.Jackson. The most popular comedy genres are Anarchic comedy, Romantic comedy and slap stick comedy. Anarchic comedy refers to a sub-genre comedy that uses stream of consciousness humor. An anarchic film uses slapstick tendencies that tell a story, considered less physically violent. Romantic comedy great for new couples is a genre that catches the viewer’s heart with love and humor. Slapstick genre incorporates physical comedy into the story. Using visual action, harmless violence, horseplay and depict humor. Comedies give the opportunity to look at scenarios from a humorous perspective. Comedies although really entertaining use scenes that are unrealistic still are fun and enjoyable to watch play out. The third genre is Horror. Horror movies bring the same thrill seeking, danger and suspense t o the viewer. â€Å"Horror movies are meant to bring a fear to the audience and can either be fantasy or based on true events. â€Å"New York Times† a commentator named Jason Zinoman says scary movies are watched for the really intense emotional experience† and that you never feel more â€Å"in the moment† than when terrified at a horror movie. Horror movies bring the same adrenaline rush of emotions from the characters to the audience. In conclusion Romance, Comedy, and Horror films bring various imaginative feelings. Each person is there to gain or learn something different. Whether that be to entertain a new woman/man in your life, or to temporarily set aside personal problems or just to get that suspense feeling viewers tend to enjoy. The film industry goal is to give the viewers a chance to feel the story line and movies of the genres causes an audience to use their imagination to enhance the movie watchers experience.

Saturday, September 28, 2019

Using international entrepreneurship to drive a small business Dissertation

Using international entrepreneurship to drive a small business - Dissertation Example The concerned company which is now in consideration is Crave Outsourcing Group. A group of very professional individual which is a rapidly growing outsourcing firm specialized in providing integrated outsourcing solutions to small and medium sized businesses (SMB) and blue-chip clients in the UK, Nigeria and across the globe.This is founded in April in 2008 which is a largely growing private firm. There are three directors Femi Odunmbaku Alexander Ihebuzor Seun Akinpelu A three successful professional striving hard to achieve their goal in achieving the edge on others companies and off course they had suffered hard yet managed to cop up with the challenges they have faced during last year’s. As the rapid decrease has been seen in the sales of this firm. It is calculated that the turnover of this company for the year 2010 was UK - ?85,000 Approx (fiscal 2010). This company has managed to retain a god position still in the market by holding a valuable place in a commercial area in London as the company headquarters. The main objective to write this innovative report is to share the crises the company has faced and to identify the core issue and manage to find out the solution. The companies was in crises since 2010 the third year f its operational working company experience the disaster as tremendous change in the sale. Its sales low down up to a significant figure. in this report we will discuss all the features. Objectives: The biggest question and objective to run a successful business lies on the core question like How to effectively and successfully operate an organization. It requires an extensive amount of training, skills, knowledge and experience yet an intelligent investment. Although organizations over time have become very complex and competitive and using every mean to get an edge over others. The company managers must understand the concept of management in order to effectively run an organization. It takes a lot of savvy and skills to superv ise employees and run an organization. The company who faces crises up and cannot stand against those crises has the biggest reason in form of lack of management skills and timely correct decisions. Managers, Supervisors and skilled or technical staff are some of the most important individuals in an organization. As they set the tone and culture for an organization. They have to get the employees to buy into the culture and policy of the organization. Furthermore, the manager is responsible for solving problems and motivate the employees to achieve the target. They also have the responsibility to make sure that employees are working effectively. They must also strive to make sure the organization is profiting or providing a quality service. Supervisors should possess leadership characteristics. They must be able to recognize the strength and weakness in their followers. Also, a manager must be able to delegate responsibilities and motivate their employees. They should have good comm unication skills and know how to read their employees. "Nothing is more exciting than growing a prosperous business, but nothing is more dangerous for a prosperous business than growth." - Steve Meisenheimer The main objective of this report is to cover all and every aspect which evolves in making an organization. Like What should your new organization look like? What is the performance of the company? The yearly revenue generated by the company. What are the key factors involved in the success or failure of the policies The core factors evolve in the failure and lower revenue What are the successful strategies companies had or should have When should you add each new position? How will you manage the new hires? What education and skills should each of them have? What contribution should you expect from each employee? Can you afford all the new people you'll need? Even for those successful companies, answering these questions can be taxing, if not overwhelming. You might agree, howe ver, that these questions should be answered before you begin the

Friday, September 27, 2019

Teen Anti-Smoking Research Essay Example | Topics and Well Written Essays - 1000 words

Teen Anti-Smoking Research - Essay Example This paper outlines a proposal to study stop-smoking efforts among junior high school students at two institutions in California's Central Valley (note to student: you may want to change the location to one that is more relevant to where you are-but the rest of the paper should not have to be changed). The percentage of teens who call themselves frequent smokers has declined to about 14% (2001) from 17% (1999) (Society, American Cancer, 2002). Despite this encouraging drop, the number of teens who say that they have tried smoking still rests at 64%, although down from over 70% in the 1990's (Society, American Cancer, 2002). The hypothesis of this proposed study is that the greatest leverage on smoking will come from cessation and peer-pressure efforts in junior high school, at which point teens may be likely to be making their decision to become smokers on a regular basis. This hypothesis is supported by NEA data: According to the 1999 National Youth Tobacco Survey conducted jointly by the American Legacy Foundation and the CDC Foundation, cigarette use among middle school students was 9.2 percent, and more than a quarter of high school students were smokers (NEAToday, 2006). This study proposes to study the motivations behind teen's starting smoking in middle school, and what makes them decide to continue once they have tried smo... The reason for this split is the suggestion from previous research that African American students are less likely to start smoking than their White or Latin American peers (Kelder SH, 2003). There is a suggestion that White and Hispanic students' rates of smoking by the eighth grade is 2 to 4 times greater than that for African American students of the same age, although the rate of trial in the sixth grade is roughly equal for all three groups (Kelder SH, 2003). This study therefore seeks to understand the motivations behind (1) trying smoking, and (2) becoming addicted to smoking. Given that the rate of trial to addiction in high school is roughly 17/64, or 26%, the rate of trial to addiction in middle school may be the same or similar to this group's older counterparts. The study will therefore encompass three areas of study in order to understand the phenomenon in a better way: 1. Comparing the motivators behind trying smoking amongst the three ethnic groups. The primary tool for social research will be interviews of a meaningful number of students (n=60), with about 20 students per group. 2.Establishing through a search of the literature what programs are tried in the area in order to help stop teen trial and addiction to smoking. 3.Present the advertisements to the three groups in order to determine their reaction to the messages contained. In addition to the anti-smoking ads, the author intends to show pro-smoking advertisements for adults, and advertisements not related to smoking to teens, in order to judge their reactions and normalize their reactions to all advertising. In conclusion, this author believes that, although smoking is declining somewhat, it would be important to understand the

Thursday, September 26, 2019

Living in the Toxic Food Environment Essay Example | Topics and Well Written Essays - 500 words

Living in the Toxic Food Environment - Essay Example A toxin is a noxious substance formed within living cells. They can be small molecules or peptides that are proficient for causing infections on absorption by body tissues interrelating with biological macromolecules such as enzymes and cellular receptors. A toxic environment is the consequence of ubiquity of harmful, processed foods, increasingly inactive lifestyle which personals spend a lot of time watching TV than exercising, enormous detonation of fast food eateries etc whereas a toxic food environment can be termed as the unparalleled exposure to high-calorie, high –fat, heavily marketed, inexpensive fast foods and the sedentary lifestyle increasing in our everyday’s life.These unhealthy eating and living habits can lead to serious health issues in human beings. Exercises have always being known as the best remedy to burn down fats and calories in a normal human system. Our fatty tissues absorb a group of chemically-related multifaceted known as Dioxins which accu mulate the food chain. These Dioxins are highly lethal and can cause great reproductive and developmental problems, harm the immune system and can also lead to cancer. It could also cause skin lesions and changed liver performance.The best way to control and prevent dioxin exposure is by proper incineration of contaminated material and this process requires high temperatures.The best way to prevent or reduce human exposure is through source-directed measures such as severe control of industrial processes to condense the formation of dioxins.

Evaluate the importance of routine in a child's devlopment Essay

Evaluate the importance of routine in a child's devlopment - Essay Example Too much waiting begets wiggle, giggle, squirm and poke.† (p. 187). These routines are set periods that come one after the other that children learn to expect as they go about their day. â€Å"Routines are the backbone of classroom life. They facilitate teaching and learning† (Shalaway, 1997, p. 25). It structures the activities and help students know what to expect and how to behave during transitions. Scheduling routines is not just listing the activities one after the other just to fill the school day. It requires careful planning and consideration of the children’s developmental needs, attention span, the variety and balance of activities and even the time of day. Planning should include transition activities from one routine to another, as it is in transition times when children may slip into rowdy behavior if they are not managed well enough. The following routines observed in a class of 4-5 year olds shall be carefully analyzed and critiqued: At first glance, the routines seem to serve only the teacher’s understanding of what happens in her day, with knowledge of what goes on in each routine. The time blocks for â€Å"taught lesson† give the impression that it is much too long for the attention span of four and five year old children, because the lesson periods are assumed to be passive, â€Å"sit-down† time for children while they listened to the teacher deliver the lessons. The time allotted for playtime, which is only for fifteen minutes reflect that this class does not value play as much as lesson time. The routine at hand does not give enough information on what the children do the whole time. It is important for a schedule of routines to be more specific in its information, and cutting down the time to budget all planned activities that goes in each routine. For example, in the first part of the day, the first forty-five minutes may include more information on what goes on during the Assembly time. Are the

Tuesday, September 24, 2019

Moments of excitatory Essay Example | Topics and Well Written Essays - 250 words

Moments of excitatory - Essay Example Whereas I have always taken it as a family or religious obligation, it has never occurred to me that I was working for powerful masters. It is evident from the reading that definition of work can be as many as the people we have in the world. Although some obligations seem as voluntary, they actually qualify as work. For instance, church volunteer ship does not seem like work at first glance. However, the same qualifies as work although there may be lack of direct benefits. This makes us questions some of the things we do in life. For instance, is service to God work? Clergymen and other church leaders are paid for work although they are actually serving God. On the other hand, church members volunteer their service to God without pay. It may be confusing when we seek to determine who, among volunteers or clergymen, actually works. Despite many definitions of work, many questions arise when volunteer ship comes into play. It makes us question whether people such as mother Teresa were actually working or volunteering service. Further, we would be interested to deconstruct whether they were working for God or for the people. Work is an interesting concept and understanding of underlying ideas needs to be

Monday, September 23, 2019

E learning Thesis Example | Topics and Well Written Essays - 3500 words

E learning - Thesis Example s the administrative barriers and financial barriers, which are introducing several challenges for the primary public schools in Saudi Arabia and preventing in the implementation of e-learning in the primary public schools in Saudi Arabia. The aims of this particular research study are highlighted below: The prime aim of this particular research study is to determine how the primary public schools of Saudi Arabia are facing the problems in adopting e-learning. Based on these particular research aims, the different research questions have been framed, which are depicted below: The prime aim of the research study is to determine the technical, personal, administrative, and financial barriers, which are affecting the success of the e-learning process in the primary public schools of Saudi Arabia. Based on this particular research aim, a research framework has been formulated with the aim of having a better understanding about process based on which the research methodology will be conducted. The research framework is provided hereunder. A quantitative approach is a specific educational research method through which a researcher can decide about what to study and what to be analysed. Moreover, it suggests how to do the research more specifically by considering the research questions. In addition, it is highly essential to collect quantifiable data from the participants in order to have a better understanding of the research objective. This research approach also assists to identify the outcome of the research more accurately. Thus, during data analysis, it is highly essential to use SPSS program to conducts the inquiry in an unbiased manner. Rationally, it can be claimed that this particular research approach has been chosen for the study, as the research method seems to be quite reliable in nature. Apart from this, through the incorporation of this research method, several complexities of the research method can be reduced while conducting the research study. At

Sunday, September 22, 2019

Electronic Communications Privacy Act Essay Example | Topics and Well Written Essays - 1250 words

Electronic Communications Privacy Act - Essay Example , which require a legal framework to manage the workings of the new features created by the development in computer and internet sector (Matsuura, 2003). Ideally, the act seeks to ensure sanity and protection of privacy, but the rapid changes in the communication sector especially in the internet-based sector has rendered the act virtually ineffective while other laws such as the patriotic act have made it impossible to enhance privacy. In its present form, the ECPA has countless flaws owing to the dynamism of communication. The inadequacies of the act can be linked to its enactment. The ECPA was enacted in 1986 when the communication sector was not expansive or as specialized and innovative as it is today. As such, most of the concerns were addressed generally. Today privacy has become a major concern but back then, it was not a key concern. Fundamentally, the act seeks to enhance privacy but in light of other laws such as the patriotic act, it is ineffective (Electronic Privacy Information Center, 2012). The patriotic act granted the government huge leeway in compromising or breaching privacy in all the forms of electronic communications. The government can compromise the privacy of communications in the form of images, signs, writings and even oral communication due to the flaws of the law as revealed by United States v. Councilman. In the above suit, the defendant sought to block the government from accessing e mail in temporary storage prior to the recipient reading them. Nevertheless, on appeal, a full court of appeal revealed that e-mails on transit are not protected from surveillance (Packard, 2012). From the above, it is evident that despite having strict clauses on privacy ECPA is inherently inadequate. Surveillance is one of the most controversial issues in America owing to its extensive nature. The surveillance involves electronic data, which is protected by this act. Nonetheless, the government has seemingly unlimited access to electronic data. One of

Saturday, September 21, 2019

Playmobil Toysâ€the Secret to the Years of Toy Craze Essay Example for Free

Playmobil Toys—the Secret to the Years of Toy Craze Essay A little over a century ago, you wouldn’t believe that Playmobil, one of the most loved toy companies, started out as a lock and fitting company originally called Metallwarenfabrik. It was founded by Andreas Brandstatter, a locksmith in Zindorf, Germany. It had a few years of great track record and was not only manufacturing locks, they were even manufacturing cash registers, telephones and other various sheet metal products coincidentally to be used for toy establishments. In the 1950s, the current owner of the company, Horst Branstatter shifted the company into plastic manufacturing and joined in on the Hula Hoop Craze, which is incidentally the start of an international craze for Playmobil Toys. But one question comes to mind, why do kids and parents go crazy for these Toys? For one, the company’s ideal for toys stem from its roots of lock and metal fitting—collecting all the right pieces and fitting them together to complete a set. Its collectability is one of its greatest marketing strategy. Same for the kids, it is a matter of pride once you manage to complete a set. Typically, most toy sets would have one center piece for the set and have multiple accessories. Each and every piece would have its individual uniqueness. The fun of having a toy is being able to divulge into a world of imagination using it as a medium. A single piece has complete functionality to fulfil its role on the set’s storyline, having functioning parts that can interact with its fellow toy pieces. This allows children of all ages to use their imagination to its full extent, giving never-ending fun on the part of the kids and a satisfied smile on their parents’ lips.

Friday, September 20, 2019

The role of intelligence in aviation security

The role of intelligence in aviation security According to the Centre for the Study of intelligence (A unit under the United States Central Intelligence Agency, CIA), civil aviation, unlike defence (military) aviation, has mostly been in the centre of aviation security concerns for obvious reasons (Raffel, 2007). First, civil aviation has a high-value asset (Human capital, goods, property and wealth) which makes it attractive for criminals and terrorist. Ordinarily, high value asset should not, in itself, constitute a severe security threat, but significant concentration of high value asset attracts crime (Wheeler, 2005:7). In 60s and 70s, some aircraft were hijacked in the united state solely for the purpose of collecting ransom (Poole, 2008:9). Subsequently, an increase s hijacking (for ransom) attack led to the formulation of various aviation security policies and programs especially in America and Europe. So, criminals may seek economic benefit are likely to attack an aviation unit for that reason. On the other hand, terrori st seek economic loss through massive collateral damage. But, not all aviation security attacks are economically motivated. For example, 9/11 attacked was suspected to have been a socio-politically motivated. The severity of the attached is exacerbated by the massive human loss. It can be assumed that Al-qaeda figured the human loss as part of the objectives of their attack. Another example of massive human capital loss was caused by the attacks on Rome and Vienna airport in 1985 (Raffel, 2007). Then, it may be argued that criminals ( especially terrorist) in their bid to make cynical statements and increase the severity of their attacks take advantage of the high human traffic associated with civil aviation to cause massive human loss. The CIA calls this massacre ibid. Moreover, unlike defence aviation, traditional civil aviation systems (aircraft, personnel, airports) are not intrinsically designed with self-defence mechanisms, making them prone to (frequent) attacks. Given the vu lnerability of civil aviation to security attacks, aviation security and intelligence discussion focuses on civil aviation and its complex inter-relations makes multi-perspective discourse. Aviation Security Intelligence: Information Gathering, Sharing and Analysis Combating crimes and averting potential criminal and terrorist attacks is underpinned on well-versed understanding of the goals and resources of criminal and terrorist groups. Wheeler (2005: 37-38 ) explained intelligence procedure as mainly: covert gathering of information related to criminals and terrorist, a deep and broad centralized analysis of the information and a drawing a conclusion against previously known fact about the gang ( terrorist and criminal). Doing this, security operation will not only get a foreknowledge of terrorist but also be able to predict (to a degree of accuracy) their next move. However, there is an ongoing discussion on how to best to deal with security intelligence in civil aviation which according to Raffel CIA, (2007) is drawn-out, confusing and inconclusive. One can quickly associate and gain better understanding of Raffels assertions from the analysis of civil aviation and security threats previously discussed above. The question remains clear: How do we deal with information of a proposed attack? Answering this question requires a system wide, multi-stakeholder analysis which captures the views of the passenger, regulators (government) and the airline operators. Who should know what and when? Airport and airline operators do feel that up to date and appropriate information sharing could help them plan and handle security issues. In practical sense, vigilance can help reduce (if not eliminate) security risks. But in reality, most airline and airport operator do not have access to accurate, meticulously collected and analyzed information. Mostly, the available information or intelligence are too broad that they very difficult (perhaps, impossible) to employ in a specific airport or scheduled flight. This set-back is a flaw of the data capturing process; data is acquired on an informal basis instead of an organized, process driven method (Raffel, 2007). Besides the incongruity of available information and intelligence, there is a caveat on the source of such information. Technology has made all kind of information readily available and as such the accuracy of information and credibility of the source cannot be ordinarily ascertained. This is a dilemma for information analyst , including airport security analyst. Emphasis is placed on the source: general information on the public domain and confidential and sensitive intelligence which stealthy sourced and accumulated. As expected, classified intelligence are restricted, seldom available for open propagation. Security agencies control the dissemination of such information and place a strict need-to know requirement. In a separate argument, Wheeler (2005: 33) described the inhibition of information sharing as a culture, a phenomenon which characterized every human endeavour. How then would airport and airline operator be able access the much needed information (intelligence) given the strict rules on the availability? The absence of an information sharing framework is a potential risk factor in aviation security intelligence. The contest about privacy is another issue with aviation security. In 2004, National Commission on Terrorist Attacks upon the United States an inquiry on 9/11 attacks recommended that the US president determines the guideline for information sharing among government agencies, protecting the privacy of the individual of whom they share information about (Wheeler 2005: 132). Perhaps, this recommendation may have been suggested by the Classified Information Procedures Act (CIPA) of 1980 which ensures the protection of protecting national security while also protecting the rights of the suspected individual. (Berman and Flint, 2003:3) Wheeler (2005:32) identified a missing link between information gathering and information sharing which can cause a drawback in effective policing. The covert method of gathering and analyzing intelligence requires that these two phases (information gathering and sharing) makes this interconnection necessary. Terrorist and criminals can capitalize on the difference between knowledge centres in while planning for and executing attacks on their targets. Inquiries into September 11 showed that the incidence can be blamed on the intelligence failure the government failed to make good use of prior information it had gathered and failed to utilize available information sharing framework. Misguided targeting is another weak point of intelligence gathering. Accumulating vast amount of information (of which some could be irrelevant) without exclusive suspicion will not catch terrorists and criminals instead it could make worse this Berman and Flint ( 2003:2) Critique of Aviation Security Intelligence Programs Before September 11, 2001, aviation security intelligence was cantered around baggage screening (Poole, 2008: 17; Raffel 2007). But the 9/11 attack has set up a new atmosphere: The need to identify precarious passengers (on a flight) and persons (within the perimeters of an airport) so as to nip potential attack in the bud before they are hatched. Before now, there have doubts on the effectiveness of these intelligence program (British Medical Journal 2010), increasing the outcry after the failed Christmas day bombing attack. The question is how did the terrorist (Abdul Mutallab) pass through the walls of screening? Clearly, terrorist organizations are keenly abreast of the trends of aviation security and they are in a relentlessly pursuit to circumvent it. KhaleejTimes.com (2010) claimed that the little success of Christmas day attack should be blamed on failure of human side of intelligence, suggesting the need to revisit the framework of intelligence program, if they will ever pro sper. Computer Assisted Passengers Pre-screening System (CAPPS ) CAPPS (also Computer Assisted Passengers Screening CAPS) was first introduced in 1996, by an airline, as temporary measure to assist in passengers bag screening for explosives. Over time, it was reviewed. The later version (CAPPS II) was modified to classify all passengers into various class according to a risk assessment score allotted to the passenger. CAPPS II, depending on experimental data algorithm from various database (government and commercial), has a double sided central focus: scrutinizing high-risk passengers at the same time as reducing the harassment of low risk (innocent) passengers. Like the suspended US Defences Total Information Awareness program, it is designed at profiling innocent people. Should the TSA invest so much on profiling (innocent) people who do not pose any security threat? In addition to initial public scepticism about the effectiveness of this profiling program, there is a growing debate over the appropriateness and the privacy and security risks of such systems (EPIC 2007a). In 2003, TSA started the Aviation Security Records (ASSR) an information database containing financial and transactional data as well as almost limitless data from other public and private information centre which the TSA said it will allow government, public and private entities to access the records. The unrestricted access to the database raises concern about the privacy and the security of the database. Is it possible for criminals and terrorist to obtain seemingly classified information, under false pretence? How passengers can contest and redress risk score is another missing details in the program. Secure Flight Program and the Terrorist Watch list Soon after the TSA discarded the later version Computer Assisted Passenger Pre-screening System (CAPPS II) in August 2004, it started the Secured Flight Program which was aimed to match up passengers information contained in the Passenger Name Record (PNR) data by provided by passenger and the state maintained watch list. The program transcended beyond simply matching names on two list to a complex system of profiling persons in order to estimate the security risk which they pose (DHS, 2004). Although TSA performed test for the Secure Flight Program, the program faced some criticism which lead to its temporary suspension. According to GAO (2006), at point when the secure flight program was scheduled to commence in September 2005, it was faulted with an inconclusive risk assessment and 144 known vulnerabilities. TSA has a United State legislation backed mandate to keep a watch list of names of persons alleged to constitute a risk of air piracy or terrorism or a threat to airlines or passenger safety. The agencys watch list is categorized into two: no fly and selectee lists (EPIC, 2007). The airlines collaborate with TSA on this in that when a passenger checks in for a flight, they match the passengers identity with the record. Should the passengers name matches any on the no fly list, he or she is tagged a threat, and is refused to embark on the flight. Not only that, TSA is notified at once and a law enforcement officer is called to detain and interrogate the person. In case the persons identity is matches any name on the select list, the person is tag S and he or she receives stricter security screening. But, what if there is a case of mistaken identity when a person name is mistakenly matched with those on the watch list? Would an innocent passenger be disallowed from boarding a flight d espite his constitution guaranteed right to travel? There are Tens of thousands of application of persons seeking redress for been wrongly mismatched (EPIC, 2007b) Multi-perspective Evaluation of Aviation Security intelligence Program This section will attempt to provide an analytic and multi-dimensional view of the role of security intelligence in aviation, exploring the economic, technological and social perspectives leaving out the legal and human right issues. Economic (business) perspectives Civil aviation cannot be disconnected from business. This is self evident in that the industry is deregulated to encourage capitalists who seek profits. And the pursuit of profit is determined by the complexities of the aviation industry which include the impact of the aviation security intelligence on industrys economics that cannot be underestimated. An instance is the aftermath of September 11 which led to a down turn of aviation business. The industry recorded a steep decline of passengers booking (of about seventy four percent), several cancelled flights, reduction in route by some airline operator and consequently, loss of jobs, reduced share prices, and other business losses (Morrell and Alamdari, 2002:1). This change in the aviation business atmosphere was caused from the non-fly reaction from passengers. Passengers reaction cannot be overlooked because it is an indication that passengers (like other consumers) are capable of intelligence sourcing and sharing (Haugtvedt et al , 2004: 283) and responding based on their analysis. Whether analysis of passenger is accurate is another subject entirely. Given the extent at which technology have increase the flow of information and the loop holes in information security, one cannot assume that sensitive security information cannot (would not) slip into the hand of the passenger (that is the set of air traveller) and the consequent passengers reaction and its ripple effect on aviation business (and industry in general) cannot be predicted. There is another dimension to this: Terrorist knowing fully that passengers can react to fear factor just as they did after September 11 may explore this scenario and the weakness of existing information sharing framework to pursue an economic combat strategy simply by sparking panic within the system. Another side of the economics of aviation security intelligence is the massive and undisclosed cost of pursing an intelligence system. Poole (2008:2) argued that similar to other similar human endeavour where choices are to be made based resource constraints, aviation security is faced with the challenge of making a decision on how to invest scares resource for maximum benefit. As anticipated, this makes decision making pretty difficult, and decision are characterized with frequent trade-offs. And if such trade -offs are not properly analyzed or hinged on wrong assumptions, the eventual decision may contribute to insecurity (KhaleejTimes.com, 2010). Based on this premise, Poole (2008:2) developed a risk assessment framework for making choices as related to aviation security. Another effect of classified information is that the actual cost of aviation strategy is difficult to determine, especially if the costing model is extended to account to include themes like cost benefit analysis (Poole, 2008:3). Social perspectives Present Focus is emphasized on international flight overlooking (or disregarding the possibility) internally originated threats like those of London bombing. This leaves one to assume that some intelligence campaigns are based on prejudice and ostensible conclusions. Proponent of this view may not be entirely wrong; may not fault the assumption that international flights poses higher degree of aviation risk. Social (racial, and religious) discrimination concerns became more prominent when the United States government announced compulsory screening for all passenger from 14 countries (mostly Islamic) after the failed Christmas day bombing attempt (Zakaria, 2010). One can argue that intelligence efforts are socially biased (Persico, 2002:1472-73; Knowles and Hernandez-Murillo, 2004: 959 -60) Political perspectives Poole (2008:2) insists that changes in aviation security policies are motivated political imperatives to reassure frightened population of that the nations air space is still very safe. For example in the United State, through legislation, the government established the Transportation Security Administration- an institution with complete responsibility for the nations transportation security but a huge part of its budget is committed to aviation security as directed by legislation. In a move to increase intelligence gathering, Attorney General Ashcroft approved security (FBI) agents to attend and monitor political events and religious which might serve as hubs for terrorist activities Berman and Flint (2003 : YY), showing the an interconnect but these themes : Politics and Security Intelligence. Technological Issues: Open access Information and Biometric Data The debate on information sharing is incomplete without examining the impact of technology. One of such argument is the openness of sensitive information to the public. For instance, Airport Law Enforcement Agencies Network (ALEAN) information-sharing groups supporting airports do make available information and open source material which is intended for aviation security personnel (Raffel CIA, 2007). Mindful the fact that terrorist and criminal can take advantage of the easy and open accessibility of electronic information system, the reliability of this method remains shaky. In another campaign, there is an advocacy to leverage on technology to help strengthen the various passengers profiling program through the inclusion of biometric data (KhaleejTimes.com, 2010). Biometric data are so unique so much that incidence of identity mismatch is almost unlikely (if not impossible). Although, how this new method will be adopted remains on clear, but it shows a promise of resolving some o f flaws in existing program. Summary The drawback in information sharing has rendered most aviation security intelligence initiatives less effective. The present demands for intelligence is expected to increase can become more effective information sharing. In spite of the doubts that present regime of security intelligence on the effectiveness, they are building blocks for the future of aviation security). It remains unbeatable that intelligence affects the aviation security and the aviation industry in general, and that the various intelligences actions and inactions can shape the future. This review has attempted to identify various linkages between these arguments and highlight possible path for future discourse.

Thursday, September 19, 2019

Media Essay -- essays research papers fc

In the late Seventies, America became shocked and outraged by the rape, mutilation, and murder of over a dozen young, beautiful girls. The man who committed these murders, Ted Bundy, was later apprehended and executed. During his detention in various penitentiaries, he was mentally probed and prodded by psychologist and psychoanalysts hoping to discover the root of his violent actions and sexual frustrations. Many theories arose in attempts to explain the motivational factors behind his murderous escapades. However, the strongest and most feasible of these theories came not from the psychologists, but from the man himself, "as a teenager, my buddies and I would all sneak around and watch porn. As I grew older, I became more and more interested and involved in it, [pornography] became an obsession. I got so involved in it, I wanted to incorporate [porn] into my life, but I couldn’t behave like that and maintain the success I had worked so hard for. I generated an alt er-ego to fulfill my fantasies under-cover. Pornography was a means of unlocking the evil I had burried inside myself" (Leidholdt 47). Is it possible that pornography is acting as the key to unlocking the evil in more unstable minds? According to Edward Donnerstein, a leading researcher in the pornography field, "the relationship between sexually violent images in the media and subsequent aggression and . . . callous attitudes towards women is much stonger statistically than the relationship between smoking and cancer" (Itzin 22). After considering the increase in rape and molestation, sexual harassment, and other sex crimes over the last few decades, and also the corresponding increase of business in the pornography industry, the link between violence and pornogrpahy needs considerable study and examination. Once the evidence you will encounter in this paper is evaluated and quantified, it will be hard not come away with the realization that habitual use of pornographic material promotes unrealistic and unattainable desires in men that can leac to violent behavior toward women. In order to properly discuss pornography, and be able to link it to violence, we must first come to a basic and agreeable understanding of what the word pornography means. The term pornogrpahy originates from t... ...onse to Langton." Philosophy & Public Affairs. Summer 1992: 65-79. Jenish, D’Arcy. "The King of Porn." Maclean’s. 11 Oct. 1993: 52-56. "Did Sexy Kalvin Klein Ads Go Too Far?" Maclean’s. 2 Oct. 1995: 36. Kaminer, Wendy. "Feminists Against the First Amendment." The Atlantic Monthly. Nov. 1992: 111-118. Leidholdt, Margaret. Take Back The Night: Women on Pornography. New York: William Morrow and Company, Inc., 1980. Nicols, Mark. "Viewers and Victims." Newsweek. 10 Aug. 1983: 60. Russell, Diana E.H., ed. Making Violence Sexy: Feminist View on Pornography. New York: Teachers College Press, 1994. Webster’s Dictionary. Miami Florida. P.S.I. & Associates. 1987: 286. Weisz, Monica G., and Christopher M. Earls. "The Effects of Exposure to Filmed Sexual Violence on Attitudes Toward Rape." Journal of Interpersonal Violence. March 1995: 71-84. Whicclair, Mark. R. "Feminism, Pornography, and Censorship." Contemporary Moral Problems. ed. James White. Minneapolis/St. Paul, MN: 1994. White, Mary. "Women As Victim: The New Stereotype." Spin. Apr. 1992: 60-65.

Wednesday, September 18, 2019

What Did You Buy Into Today? Essay -- Advertising Media Papers

What Did You Buy Into Today? Take a look at your shoes. Check the breast of the shirt you are wearing. Don’t forget the ass of your pants. What about the food you ate for lunch or the computer you typed your paper on? There is no denying that we are living in a brand name life. People have become consumers whether they’ve wanted to or not. It is impossible to walk through life without being bombarded by image after image of a branded identity. From Nike to McDonald’s, Apple to Evian, the â€Å"brand† has worked its way into consumer consciousness on a level that has not been seen in the past. Humans strive for individuality, so how did we so willingly give ourselves over to the brands that now consume us? A common misconception about branding is that branding and advertising are both one in the same. This, however, is not the case. Advertising is only one key component that a company uses to create their own branded image; an image that encompasses everything the company wants the public to know about the meaning of its products. Advertising is just an outlet to get that message across. â€Å"Branding† is a by-product of a society that has too many similar products, a natural occurrence in a free-market capitalist country. The goal of branding is to separate one similar product from another by altering the way that a consumer feels about a certain product at a sub-conscious level. For instance, a marketing campaign common to almost all of us tries to create a distinction in our mind between Coke and Pepsi. To do this, brand makers will work to infiltrate their target market and create an image for the product that closely resembles the image of the target market, thus burning i n the idea that their product is an important aspect of so... ...Nike swoosh being altered to resemble a gun shooting the high soaring basketball player. The results are quick and effective, and spread to others outside your immediate sphere of influence. The more you expose the underlying meaning of the ads around us the more people will think about all the ads and marketing pushes that coincide with their life. It’s time to once again reclaim your life as your own. Question the images put before you. Urge others to do the same. Support independent retail outlets and companies that still produce the products that they are selling to you. If you must buy branded products, purchase them second hand. If there’s a mass exodus away from the cash registers of these branded pseudo companies then the tides will change and we’ll see our lives return to us as they once stood, uninterrupted and full with a passion for living once again.

Tuesday, September 17, 2019

Technology Then to Now :: History Machines Papers

Technology Then to Now Throughout time, machines, no matter how simple or complex, have played a vital role in the development of civilization into the future. In other words, machines have played a part into helping our culture develop into what it has become today. This dates back to the beginning of time when early man used a stick and a fulcrum (rock) to make a simple lever. Technology: The application of scientific knowledge to serve man in industry, commerce, medicine and other fields. Humans have always searched for a way to make things faster, stronger, smarter, better....for mankind. This, it was widely thought, would make life easier. With the advancements made in technology throughout the millennium, the way of living did get easier. In the thousands of years that had passed, man had gone from living in caves to living in houses, from speaking in grunts to having a formal written and spoken language, from hunting and teaching, to hunt for mere survival, to going to school and working in a place of some sort to provide for your family, from barter and trade to a formal monetary system, from clans to cities and states; yes mankind was on the up and up, and blazing trails at record speed. In the U.S., the period between 1820 and 1840 marked the introduction of the Industrial Revolution. The Industrial Revolution marked a significant technological change for Western Europe and the United States. It meant the big switch from an agricultural society to a modernizing society based on factory production. This switch obviously meant the introduction of machines into the workplace, and the transformation of labor to fit the operation of these machines. Although the machines would increase productivity significantly, they were not viewed as a Godsend by all. Groups such as the Luddites in England in the early 19th century feared these machines because they understood that this new technology would destroy their way of life. They were not entirely wrong. The technologies introduced into the early factory system profoundly disrupted the ways in which people worked and the rewards they received for their work. For example, new machinery introduced as labor-saving devices from the point of view of owners, eliminated certain artisanal skills and displaced other workers. Many of those fortunate enough to still be working in the factories with this ground-breaking technology viewed themselves as machine tenders (someone whose sole purpose was to make sure that the machine did not get off course.

Equality & Diversity Level 2 – As3

NCFE Level 2 Certificate in Equality and Diversity Unit 3: Working or Learning in a Place that Promotes Diversity 1. In relation to your chosen workplace / place of learning, provide examples of policies / codes of conduct that encourage and / or protect equality and diversity. My chosen workplace to study place a lot of emphasis on complying with Equality and Diversity, they not only have a comprehensive policy setting out their aims and what they wish to achieve with the implementation of the Policy but they have extensive Codes of Conduct for staff and partners to follow.Their policy sets out what they wish to achieve, examples being:- The firm are committed to developing a culture which values and respects people from all section of the community and the contribution each individual can make to the work of the firm. The firm aims to ensure equality and diversity objectives are incorporated and become an integral part of governance, management and the duties of every employee. The Policy also goes on to provide definitions for staff of different types of discrimination, explaining in very detailed terms exactly what the firm feels falls into each category, these include:- Bullying & Harassment ? Dignity ? Prejudice Further, the Policy also provides how a complaint is dealt with, by whom and the timescales involved. In terms of the Codes of Conduct every employee is provided with a copy that they must read and retain. The company have implemented a system whereby the final page is signed by the employee and returned to the Equality & Diversity representative so that the company has a record that everyone has seen and read the document. The Code of Conduct sets out:- Also read: Equality & DiversityUnder Awareness – Staff will be tolerant of individuals needs and cultural differences, help; to provide a pleasant working environment,. Have empathy, support and understandings for individual needs and cultural differences, be receptive and adaptable to change, be professional when deal with clients, colleagues and third parties, respect confidentiality, respect the feelings of others and do not stereotype, make assumptions or pre-judge based on someone’s appearance or culture.Further staff will not discriminate directly or indirectly against someone’s age, gender, sexuality, religion, race, special needs or culture. Under Accessibility – staff will respect, understand and meet the needs of different cultural beliefs, be adjustable and adaptable, be aware of your language (both verbal and body) when you are dealing with clients and colleagues, be aware of different meanings according to culture and to offer help with commun ication and translation (braille, audio or interpreter).The Codes of Conduct have further headings with similar statements including policy and Support to assist staff in fully understanding the entire policy and it definitions. 2. In relation to your chosen workplace / place of learning, describe what is expected of members of staff who have specific responsibility for equality and diversity. Include information about their job titles and describe their responsibilities. In my chosen workplace there are two members of staff are responsible for ensuring our Equality & Diversity Policy / Code of Conduct are complied with.This role is covered by a Senior Partner and the Office Manager (terms Equality and Diversity Representatives by the firm) who ensure that the Policy / Code of Conduct is up to date and that they are up to date on the Law / Regulations including Law updates, case Law and advances in enforcing Policies. Should there be a breach of the Policy either the Partner or Offi ce Manager are responsible for ensuring this is investigated fully and fairly on behalf of either staff members or clients whom feel a potential breach may have occurred.They are also responsible for providing all staff with on-going training either via conferences in the office, outsourced conferences or memo based updates. 3. Describe what is broadly expected of all staff in relation to equality and diversity. All staff are expected to treat everyone appropriately regardless of their age, disability, gender reassignment, race, religion, sexual orientation or marital status. They also expect that all staff engage in developing a culture which values and respects people from all sections of the community and the contribution that each individual can make to the workings of a firm.All staff are further expected to have a good awareness of the Code of Conduct and abide by the same throughout their role, specifically expecting all staff to be tolerant, provide a pleasant working enviro nment, be receptive and professional, respect others feeling and confidentiality and not to stereotype or pre-judge. All staff are expected to make themselves aware of the Policy and adhere to it at all times to ensure that each and every aspect of the firm complies with Equality and Diversity to the highest possible standard.All staff are also expected to ensure that breaches or potential breaches are brought to the Partnerships attention quickly so that investigations can be put into place. 4. Based on the work you have done in Question 1 – 3, write a short summary of what you have discovered in terms of the organisation’s work on equality and diversity. Within my workplace the Equality and Diversity Policy / Code of Conduct is thought of as pivotal to the firm. Great pride is taken in the fact the firm have such a comprehensive regulation system and great care is taken by the Partners to ensure that at every opportunity Equality and Diversity is considered.The compa ny have a Equality and Diversity Board , including partners, staff representatives and external service providers, who meet once a month and discuss any issues that may have been raised, whether these be complaints, alleged breaches or simply comments from individuals with regards the Policy (wording etc) or any other issues. The minutes from the meetings are published and a copy placed in a centralised folder with additional copies being sent to all staff via email so that everyone can be kept up to date.Furthermore periodically quizzes are sent round to staff (including partners) with ten questions asking for multiple choice answers to be completed. The Equality and Diversity Representatives make this fun by awarding prizes to the winners but if somebody fails to grasp the quiz additional fact sheets and work is undertaken with that person to ensure the Representatives are confident they appreciate what Equality and Diversity is and why it is held in such high regard at the office . 5. Describe how equality and diversity is monitored within your chosen place of work / learning.The staff with conduct of the Equality & Diversity Policy in the office (Partner and office manager) monitor equality and diversity. They are responsible for monitoring Recruitment and selection processes, promotion and transfer, training, terms and conditions of employment, work live balance policy, grievance and disciplinary procedures, resignations, redundancies and dismissals. Furthermore reviews of the policies are conducted regularly with the help of external experts who ensure that the policies incorporate the most up to date Law and Case law to ensure proper compliance. 6.Prepare a short report on how your chosen place of work / study promotes (communicates) policies and practices for equality and diversity to employees and external stakeholders (such as customers and the community). Provide specific examples. The company has many ways in which it tells external people of the eq uality and diversity policy. It is included in the firm’s website under a separate tab which explains in general terms our policy, advising those who read that we run in accordance with the policy and confirming that a full copy of the policy is available should they wish to read it, free of charge on request.Furthermore our Twitter and Facebook accounts give general information but if the policy changes or is affected by any legal changes these are specifically documented via updates. Internally quizzes are held to help staff keep updated and also regularly memos or training seminars (by internal and external agencies) are also conducted. 7. Describe the organisation’s punishments or sanctions for any breach in the policies / codes of practice / guidelines where equality and diversity are concerned.Individuals are expected to report all incidents of harassment, bulling or discrimination to their head of department, staff partner or manger. In return the company promis e to ensure all complaints are dealt with confidentially and with sensitivity ensuring that investigations are swift and discreet. Anybody who is found to have been acting in contravention to the Code of Conduct or policies or any member of staff that allows a breach to go ahead by turning a blind eye or encouraging the same will face formal disciplinary action.The firm has several outcomes for an investigation via disciplinary action. If a complaint is upheld the offender will be sat down and confidentially spoken to about their conduct and told the behaviour will stop. This will be recorded but taken no further so long as there is no repeat. The second step could be mediation where the offender and victim with a natural member of staff are given the opportunity to sit and discuss the matter. If they do not want to do this face to face a letter exchange will be agreed and monitored.Again the process will be recorded and documented. If the above steps cannot be completed or the brea ch is too serious formal disciplinary procedures will commence in line with the companies normal disciplinary procedures. This takes the form of a disciplinary meeting whereby the offender can put forward mitigation or defence and then the disciplinary partner will decide the next course of action – this can be verbal warning, written warning, suspension or dismissal – again depending on the seriousness of the breach and / or the offenders past disciplinary record.Throughout all of the above the victim is kept informed and the victim can ask that a certain procedure be undertaken – ie: if they do not want a fuss they can ask that instead of disciplinary a warning is given to the person or they can refuse to undertake mediation because they are concerned it will not work or has not worked in the past. If the complaint is not upheld a meeting will be had with offender and victim individually to advise them of the reasons why and the outcome confirmed in writing to them.As in all disciplinary matters if either party is unhappy with the outcome grievance procedures can be commenced, this being done by requesting the same within 21 days of the formal decision. 8. Describe why the creation and maintenance of an environment that promotes and ensures equality and diversity is desirable. Describe the advantages for the organisation and provide examples. The advantage for ensuring Equality and Diversity are complied with within an organisation in the most basic sense is a better place to work.It builds a fairer environment for both staff and the public whereby they know that their views and rights, no matter their personal circumstances, will be dealt with properly and without prejudice. Ensuring prejudice does not â€Å"creep in† to a workplace is essential as prejudice breeds discontent and can cause severe upset to individuals or groups of people. The workplace has people from any cultural and economic backgrounds and therefore enforcing g ood equality and diversity practices means that a happy and social workplace develops. . Describe the consequences for your chosen organisation of failing to create and maintain a diverse and equal environment. You should consider aspects such as: †¢ Legal †¢ Economic †¢ Social Should the employer not create and maintain a proper Policy / Code of Conduct the consequences can be far reaching. A firm known to not comply with any policy could lose clients or professional contacts as they do not wish to engage with a firm that does not comply with Equality and Diversity.This could mean lost revenue and it could also mean that filling staffing positions is harder as people may be cautious of working for someone who would not support them if their rights were breached. Again legally a firm could be pursued via employment law and sued if a complaint via the tribunal was upheld whereby somebodies rights were breached or could be breached and there were no safeguards to protec t them.

Monday, September 16, 2019

Providing a Method to Learning

The universal conceptualisation of love is a subject of many a poet and writer throughout history. As such, each is relevant to their specific periods and their specific value systems. This can be seen in the text; â€Å"Sonnets from the Portuguese† by Elizabeth Barret Browning, where Browning explores a Romantic vision of love and romance through the abandonment of the Petrachan sonnet from. Likewise, the text â€Å"The Great Gatsby† by F. Scott Fitzgerald, explores the turmoils of love in the 1920’s; a world obsessed with materialism and hedonism.Thus through the ways in which each author produces a narrative relevant to the values and contexts of their particular contemporaries we are able to discern how the theme of the transformative power of love and spirituality continues to be avid topics of literature today. In Sonnet 1, Browning conveys the Romantic idea of love and spirituality against the prudish rationalism of the Victorian era. Her Greco-allusion â €Å"How Theocractes had sung†¦Ã¢â‚¬  references the 3rd century BC Greek pastoral poet – mourning the lost ‘art’ of renaissance passion.The aural metaphor reflects how poetry as â€Å"a craft,† had been lost – the past tense reinforcing that love as spiritual and not materialistic is neglected by Victorian culture. This is echoed in the lines: â€Å"of the sweet years, the dear and wished for years†, in which Browning utilizes assonance to accentuate the repetition of â€Å"years†; rhymed in the line, â€Å"through my tears† to emphasize the Victorian’s shifting focus of love to a convention of marriage that relies upon dowries and status.The enjambment, â€Å"who by turns had flung / A shadow across me† is a metaphor illustrating her isolation and sadness in this context – the literal shadow cast by Browning â€Å"across† her is a simulacrum of Victorian conservatism. Her subversion of the pet rachan form is evident as the Volta is linked and the Iambic pentameter has been broken; conveying the challenge expressed by Browning toward the rationality of the Victorian mindset and her embrace of the Romantic idealism of love and spirituality, as Browning has progressed from a solipsistic interest in grief and isolation to an affirmation of love, firmly grounded in reality.In contrast F Scott Fitzgerald reflects the roaring 20’s distillation of love into pragmatism and materialism, forsaking traditional romanticisms such as spirituality and hope. Juxtaposed against the Victorian suppression of passion, the wildly liberalized and sexually expressive twenties are expressed by Fitzgerald to be detrimental to the development of love. â€Å"Chatter†¦ laughter†¦ innuendo†¦meetings between women who never knew each others names,† in which Nick’s observations become anecdotes of accepted social behaviour.Exemplars such as â€Å"Jordan was going to yield him up her person sooner or later† illustrates the same loss of the universal language of love that Browning laments for the Victorian, as hyper-sexualisation of relationships erode spiritual values of love. This awkward inability to understand love for its own sake can be observed in Nick’s indecisive tone â€Å"I wasn’t actually in love but I felt a sort of tender curiosity,† and his mechanical metaphor of his own emotions and passions, â€Å"But I am†¦ full of interior rules that acts as breaks.† The contextual idea that love and hope are no longer associated with romantic relations is lastly compounded in his admission that â€Å"I am one of the few honest people that I have ever known. † Illustration that even stripped of pretence and lust, he is unable to interpret love as anything other than hedonism. Browning reflects her strict Victorian patriarchal context through her exploration of the transformative power of love. Sonne t 14 is a subversion of the petrachan sonnets; conveying her assertive role in marriage.â€Å"For these things in themselves, beloved, may/ be changed, or change†¦Ã¢â‚¬  Here the persona challenges the petrachan tradition, which confronts the traditional conventions of Victorian women through the repetitive â€Å"I love her for her smile†¦her look†¦her way of speaking gently †, mocking gender expectations of womanly behaviour. The repetitive juxtaposition in â€Å"changed, or change†¦Ã¢â‚¬ , and the anadiplosis in â€Å"love so wrought /May be unwrought so†, highlights how easily love may come undone when it is based on transient qualities – by literally attaching prefixes to devotional connotations. The imperative tone ofcommand delivered in â€Å"neither love me for thine own pity wiping my cheeks dry. † This paradox of â€Å"neither† suggests her rejection of the feminine role of women. Her dismissal of the ephemeral attr actions of the physical is not only a rejection of Victorian female stereotypes, but also a statement to the transformative power of true love. In comparison to Browning, F Scott Fitzgerald’s The Great Gatsby explores the lack of the transformative power of love in prohibition America and the need for society to adopt moral values. The â€Å"Jazz Age’ see women as sexual beings and mainstreamed the idea that repression was self-destructive.This sexual liberation is personified in Jordan Baker; whose androgyny and lifestyle is summed up by her symbolic name as two automobiles. She is a dichotomy of the 20s, the freedom and destruction afforded by a period of rapid industrialization. Jordan is the antithesis to Browning, whose deliberate vocabulary seeks happiness within a restrictive setting – she is instead careless, selfish, and immoral. Nick describes her self-serving pragmatism â€Å"too wise to carry well forgotten dreams from age to age†¦Ã¢â‚¬  This indicates a lack of hope and spirituality in her philosophy of life, which is emphasized through the repetitive â€Å"age†.The foreboding tone created through the assonance in â€Å"turned abruptly away and ran up the porch stairs†¦Ã¢â‚¬  illustrates her selfishness towards a Nick who cannot satisfy her own need for careless happiness. Thus Jordan embodies the egocentric love feared by Browning – a love lacking all transformative power and instead focuses solely on self-pleasure. Thus through the analysis of poetic and narrative techniques we are able to see how both author’s are engaged by and through the worlds in which their narrative is produced as a result of their context and values.

Sunday, September 15, 2019

Goss V Lopez Brief

i. Case Citation Goss v. Lopez, 419 U. S. 565 (1975) ii. Facts Public school students from Columbus, Ohio brought this suit. They claimed that their constitutional right to due process was violated. The students were suspended without hearing prior to their suspension. They were suspended for destroying school property but principals can only suspend up to 10 days or expel them. If suspended they must notify parents without 24 hours and give the reasons. Students may appeal to the board of education. iii. Primary Issue Can students be suspended without due process? No iv. Decision or conclusion of the courtGoss established that due process is required when a student is suspended. It also established that you can’t suspend a student for more than 10 days and you have to notify the parent. Due process will be required depending on the severity of the consequences of the students. When it is a longer and severe case you usually are required witnesses. v. Reasoning Under Ohio law you have a right to public education. School has the authority to establish code of conducts however; authority is subject to constitutional limits. Students have a right to education under the Fourteenth amendment.The court reasoned â€Å"Having chosen to extend the right to an education to people of appellate class generally, Ohio may not withdraw that right on grounds of misconduct, absent fundamentally fair procedures to determine whether the misconduct has occurred, and must recognize a student's legitimate entitlement to a public education as a property interest that is protected by the Due Process Clause, and that may not be taken away for misconduct without observing minimum procedures required by that Clause. † Reference: http://en. wikipedia. org/wiki/Goss_v. _Lopez

Saturday, September 14, 2019

Area of Study †The Outsider Essay

How have the texts encountered in your studies enriched your understanding of The Outsider? â€Å"You don’t get to 500 million friends without making a few enemies. † An outsider is interpreted as someone who separates themselves from the rest of the society, intentionally or unintentionally. Sometimes, it is this outsider’s insecurities or physical appearance that contributes to this factor of their ‘isolation’. The play Othello by William Shakespeare and the 2010 film The Social Network directed by David Fincher are conclusive in portraying and analysing a significant outsider or group of outsiders through literary and cinematic devices, which enrich my understanding of this concept, later used to my benefit, demonstrated through my visual representation. Written by the famous English playwright William Shakespeare circa 1603, Othello explores the idea of ‘The Outsider’ through the two significant notions that enriched my understanding – insecurities and physical appearances, both of which are used to advantage and disadvantage the characters in the play. Othello is immediately introduced as the titular black general and the Moor of Venice, who has overcome racial prejudice to hold a renowned position in society and a marriage to a beautiful young woman, Desdemona, the senator’s daughter. The metaphor in the line, â€Å"†¦ an old black ram is tupping at your white ewe†¦ † indicates a sense of hostility that the other members of society have against Othello, using physical appearance and racist slurs to downplay the general, the majority of these comments being made by Iago, Othello’s advisor. Iago could be seen as an outsider in the play, but uses this characteristic to his advantage, being desperate for power and authority; he raises Othello’s suspicions about his wife’s fidelity. Iago is also known for foreshadowing events, as seen in the personification used in the line, â€Å"O beware, my lord, of jealousy; it is the green-eyed monster which doth mock the meat it feeds on†¦ † indicative of Othello’s future actions in the play. Othello, oblivious to Iago’s exploitations, undermines himself- an insecurity- seen in the pitiful tone, â€Å"Haply for I am black, and have not those soft parts of conversation that chamberers have†¦ † evident of his lack of self worth and vulnerability to issues relevant to his colour or race, enhancing my comprehension of The Outsider. The 2010 American film The Social Network- written by Aaron Sorkin and directed by David Fincher, strongly delves into the concept and deepens my understanding of the Outsider from the beginning. The protagonist, Mark Zuckerberg, like Othello, is instantly presented as a character who does not wish to interact with society directly and uses social networking to express his opinions, thereby the invention of Facebook. The lighting throughout the movie is an example of the many cinematic devices that are effective in demonstrating the different societal groups. As an individual, the dim lighting on Mark, in contrast to the bright lighting on the others in his group is indicative of Mark being an outsider, even within his own group. Also, the repetition of the word ‘asshole’ in several situations in the film is suggestive of how similar Mark’s character is to Othello’s – he allows himself to be looked down on. Erica Albright, Mark’s ex- girlfriend says at the start of the film, â€Å"†¦It’ll be because you’re an asshole,† and this is contrasted when Marilyn Derpy, the psychiatric nurse has her final statement at the end of the film, â€Å"You’re not an asshole, Mark. You’re just trying so hard to be. † Albright’s vindictive tone is representative of how an outsider can be portrayed when he or she is put down by others, further supported by Derpy’s somewhat sympathetic yet wary tone. Mark’s tolerance of being exploited further enhances my knowledge of the concept of the Outsider, especially through the characters that manipulate him the most – the biggest of these being Sean Parker, the founder of Napster and the first president of Facebook. Sean’s character is much similar to Iago’s, as he is as much as an outsider as he is an insider. The repetition of ‘cool’ as Sean defiantly says to Mark, â€Å"A million dollars isn’t cool. You know what’s cool? A billion dollars,† shows how using such simple socially acceptable terms can influence a person’s decisions, especially characters like Mark, whose insecurities play a massive role in creating the atmosphere of ‘The Outsider’. My visual representation is an amalgamation of the perceptions of the Outsider that I derived from analysis of Othello and The Social Network. Using the same template as the given image, I drew the figure and his surroundings on the inside of the room in black and white, also giving prominence to the central figure, outlining ‘him’ in a darker colour in contrast to the chair he is sitting on. The personage is looking outside, into a colourful world, of which I have used many different colours to show the difference between the inside world and the outside world. As in Othello, colour plays a major role in distinguishing between outsiders and insiders. Using colour, I represented the character to be the salient black and white figure in a black and white environment, but this is merely the ‘inside world’. I have chosen the persona’s gaze to lead the viewer to focus on the colourful outside world, demonstrating the differences between the inside world and the outside world. The individual is recognised as an outsider, not only in his own micro world, but in his larger macro world. Therefore, the conceptualisation of ‘The Outsider’ has been enforced through cinematic and literary devices used in the texts Othello by William Shakespeare, through the notions of colour and physical appearances and The Social Network directed by David Fincher, which reiterates how manipulation and downplay of colour and physical appearances can lead to being in a solitary state as an individual. My visual representation incorporates these ideas into a single ideology, evidence of how these texts have enriched my understanding of ‘The Outsider’.

Friday, September 13, 2019

Cultural Dimensions Assignment Example | Topics and Well Written Essays - 750 words

Cultural Dimensions - Assignment Example Students from both Japan and Austria were interviewed and data taken. The findings were made accordingly. Therefore, this section will explain the method used to collect relevant data. 2.1 A group of thirty students were selected for interview from Austria and Japan. These countries were chosen because they are situated in different continents: Japan in eastern Asia and Austria in central Europe. Thus, it was important to determine whether their cultures also differed due to their different geographical locations. Students were asked a number of questions using structured questions to provide an opportunity for wider answers. The reason for this is that the questionnaires had definite and very concrete questions, and were well prepared in advance to ensure that nothing was left out in terms of the cultural differences. A mixture of both open and close ended questions were used to ensure that every aspect of the emerging cultural difference between the two countries. The purpose of this research is to establish whether there exists a cultural difference between Austria and Japan countries. Students from both countries were interviewed using structured questionnaires to come up with the required data. 3.1 The data shows that Austria and Japan have differing cultural beliefs. Austria has the family as the basic unit. Their families are quite small due to the fact that they do not migrate. They devote weekends to family activities including various outdoor activities. They only believe in inviting only the close people to their groups meaning that they conduct informal communications here. Japanese also has the family as their basic society unit. They have high respect for their elders with the group being more important than the individual. This indicates that Japan is a collectivist culture since they believe in

Thursday, September 12, 2019

Why developed countries should take in more refugees Outline

Why developed countries should take in more refugees - Outline Example They have better economies to take care of the needs of refugees such as security, food, shelter, water, health care, and other needs (Bamgbose, 2008)†¢Ã‚  Developed countries have better infrastructure and refugee screening measures that would sieve out refugees who are not genuine (Lim, 2013; Wade, 2011). †¢Ã‚  Developed countries have an ethical obligation to help the less fortunate persons in developing countries (Davies, 2008)†¢Ã‚  Reducing mortality rates among the victims (Elie, 2010)†¢Ã‚   They have fledged, proven refugee policies and internal institutions (Elie, 2010)Disadvantages However, refugees’ entering developed countries could cause;   †¢Ã‚  Overcrowding and poor sanitation (Elie, 2010)†¢Ã‚  Heightened insecurity due to idleness (Davies, 2008)†¢Ã‚  Developed countries taking in refugees are implementing short-term measures to the problem of refugees in the world as many people will develop a culture of dependence (Davies, 2 008; Elie, 2010)†¢Ã‚  Taking in more refugees would justify more hostilities because perpetrators would be buoyed by the fact that victims will eventually leave (Davies, 2008)†¢Ã‚  In light of this, developed countries should alleviate the problem by taking in more refugees because they are better placed to provide the basic needs whenever necessary. †¢Ã‚  Preventive measures such as peaceful conflict resolution mechanisms in unstable countries is important †¢Ã‚  Facilitating stronger governance institutions, mediation and arbitration processes are equally important.

Wednesday, September 11, 2019

Terminologies Essay Example | Topics and Well Written Essays - 250 words

Terminologies - Essay Example Better communication is mostly the reason as to why there is improved patient outcome, it enhances continued care of the patients which is better understood and communicated with ease among nurses. Further, it is essential in the development of nursing as a body of knowledge which build up to the establishment of nursing as profession with autonomy. However, using standardized nursing terminologies has a great impact on the relationship between nurses and other professional while taking care of the patients. There is a disconnection in communication more so when other professionals go through nurses documentation on a particular patient. Thus, this to some extent is likely to affect patient outcome negatively. It necessitates the institution to utilize more resources to educate other professional on the nurse terminologies used while taking care of patients. For instance, the hospital has to print posters and put on strategic positions to enhance the other professional’s knowledge on the terminologies used by nurses (Wong, 2009). Moreover, it leads to much time wasted as one struggles to comprehend what the nurses are communicating thus compromising the patient care. Hardiker, N. R. (2011). Developing Standardized Terminologies to Support Nursing Practice. In Nursing informatics and the foundation of knowledge (pp. 111–120). Retrieved from http://usir.salford.ac.uk/17895/1/Mastrian_chapter_7_Hardiker_-_pre-print.pdf Wong, E. (2009). Novel nursing terminologies for the rapid response system. International Journal of Nursing Terminologies and Classifications†¯: The Official Journal of NANDA International, 20,

Tuesday, September 10, 2019

Nike advertisement Essay Example | Topics and Well Written Essays - 1000 words

Nike advertisement - Essay Example The advert persuades the viewers to buy the Mercurial vapors and its target is an audience of soccer players.   The music that is set to a slow beat and the calm blue background of the advert gives a viewer a peaceful state when watching the advert. The cleats are outstanding in the entire advert since they are bright orange in color. The outstanding color of the cleats is meant to excite the viewer. People will want to buy the cleats so that they can impress other with a powerful shot. The producer of the advert highly uses ethos successfully through use of the best player to show his weapon of choice, the Nike boots. Ethos means being able to convince through the character of the author. It is obvious that people believe those they respect more than anybody else. Use of somebody who is likeable and worth a lot of respect is a positive move for any advertisement. Christian Ronaldo is a product of effectiveness of the cleats. A viewer who sees his success in the field and links it to the boots will definitely purchase a pair.   Individuals will want to purchase the cleats to emulate his skill.   The unrealistic expectation makes individuals think that if they purchase cleats they can be able to play the same way as Christian Ronaldo plays. The use of the fastest car to compare with the best player makes the viewer get interested in finding out more about the advertisement.The author also makes an appeal to pathos in the advertisement. Pathos involves persuading the reader by appealing to their emotions.

Monday, September 9, 2019

Team Leadership Assignment Example | Topics and Well Written Essays - 1250 words

Team Leadership - Assignment Example Harnessing these and getting them to work in tandem is the most difficult thing as it involves convincing people to forego their differences for the good of the company. Not everyone can do this, and this is the reason why companies have different positions, which mandate occupants to mobilize those under them. Those assuming these positions are referred to as team leaders, team leaders are mandated with the responsibility of mobilizing team members. They should also work towards a defined goal which may be either the company’s goal or a means to a company goal. Team leadership, on the other hand, is not about an individual it is about a process, a process which can be led by either one of the team members or can also be led from the outside. In fact, there are four potential sources of team leadership; formal internal leadership, formal external leadership, informal internal leadership and informal external leadership. This brief insight into team relations and team leadership is important in evaluating the various problems facing Global-tech Company where I happen to work. In the past few months, there have been continuous wrangles within the company teams. This is alarming as the effects of these misunderstandings will soon spill over to the company performance. This is worrying because business has been exemplary given the ensuing economic conditions. The ones active and very motivated teams have slowed down and their morale has taken a dip; differences have emerged on what is wrong and what is right in regard to culture and communication. There are also technical differences like utilization of technological equipment. Well and beyond these challenges employees have also become selfish and all these challenges have made it impossible for people to relate well.

Sunday, September 8, 2019

What are the advantages and disadvantages of using participant Essay

What are the advantages and disadvantages of using participant observation - Essay Example Moreover, the concept of participant observation also requires maintaining a reasonable distance between the participants and the researchers so that the process of observation is not affected (Atkinson & Hammersley, 1994). Participant observation is a data gathering technique used to understand and examine the thoughts, feelings and views of the participants under their normal routine life (Adler & Adler, 1994; Wiersma, 1995). They are observed in their normal or regular milieu. The method involves the observation of participants’ behavior and requires the participant observer to look closely, listen carefully and ask sensibly (Lofland, 1971). The aim of this paper is to define participant observation in detail by describing the advantages and drawbacks of this method as a researching method. Moreover the paper suggests some possible steps to overcome the weaknesses of this method. Participant observation is widely known as a technique to collect qualitative data. The idea of participant observation is similar to other qualitative techniques which are based on the assumption that there are multiple perceptions about a particular issue in the associated population. Participant observation is always carried out in a community setting. The distinct feature of participant observation is that it does not distract the participants from their normal behavior. Other research techniques include surveys, interviews, questionnaires etc. All these techniques do not ensure the normal and actual attitude of people. People may answer the way the observer wants them or there may be a diplomatic response to the questions in the surveys and interviews. An example can be taken as a slight or considerable change in a person’s natural behavior due to the presence of television camera capturing him. However, the use of Participant observation ensures the correctness of the c ollected data if the observer knows how to tact situations and keep the observations away from

Saturday, September 7, 2019

Poverty in America Essay Example | Topics and Well Written Essays - 1500 words - 1

Poverty in America - Essay Example These figures imply that there are about 37 million people well below the poverty threshold as at end-2004. In view of the above, steps on how to alleviate poverty in the country must be efficiently programmed. In order to address the heart of this matter, legislators and private sector should have an understanding of key issues regarding poverty and the poor people in the US. The lives of those people bordering or below the poverty line are controlled by myriad factors which should be taken into consideration. This paper provides an overview of the profile of poor people and discusses how economic and social factors such as availability of job opportunities, prevailing wage levels, single parenthood, level of education, housing, health, mental illness and substance abuse among others affect the poor in America. The poverty line is defined by the Census Bureau as a threshold level of total money income, which includes wages and salaries, self-employment income, interest income, social security and welfare benefits, alimony and unemployment compensation, received by all family members on an annual basis. The threshold set varies depending on the number of adults and children in the family. As at end-2004, a family with two parents and two children required $19,157 to be above poverty line. A family headed by a single parent with two children needed $15,219 to elude poverty. On the other hand, a single elderly person needed $9,060 to answer day-to-day needs. Those who fall within the said levels are deemed poor. (Cadena & Sallee) As mentioned, poverty rate rose to 12.7% in 2004 from 12.5% in 2003. The increase in poverty is attributed to the decrease in real earnings. This means that, although relatively more people who wanted to work had jobs in 2004 than in the previous year, many have earned less after their earnings are adjusted for inflation. (Cadena & Sallee) The median earnings fell by 1.0% and 2.3%, for women and men working full time, respectively. The increase in poverty level is also considered to be concentrated among native-born non-Hispanic white Americans between the ages of 18 and 64. (Cadena & Sallee) Job Opportunities One of the primary factors affecting poor people is the availability of suitable employment. This is vital since it is mainly from the earnings gained from working that people are able to meet their needs and required sustenance. It is observed though that limited job opportunities as well as the prevailing low wages contribute to the persistence of poverty in America ("Hunger and Poverty in the United States"). The minimal wage for unskilled workers and some employment barriers for poor job seekers are deemed to perpetuate poverty (Mangum, Mangum & Sum). Albeit as much as 50% of all those considered living in poverty are actually working, their jobs pay minimal wages barely enough to cover their basic needs and that do not keep up with the rising inflation. In this regard, these people still fall under the poverty line. These conditions are aggravated by the fact that the working people in poverty are not able to receive social welfare benefits from the government as their earnings make them ineligible for government assistance. (Giddens) In order to make ends meet, some people are forced to get an extra job. Given the rising cost of living, one job may not be

Victor Frankenstein Essay Example for Free

Victor Frankenstein Essay He uses imagery to give examples for how he felt, like when he says I crept from my kennel as though he was a disgraced dog, and treated like an animal. At this point, the reader may have changed their views about the creation, but Frankenstein certainly hasnt. He knows about how well spoken the monster is and thinks of it as a trick, to lure people into keeping him company. He says to Robert Walton that the creature is eloquent and persuasive, and once his words had a power over my heart; but trust him not. Frankenstein still believes the creature is to blame. When Walton sees the creature for the first time, he believes what Frankenstein told him on his deathbed. He says I beheld a vision so horrible as his face, of such loathsome yet appalling hideousness. It shows the reader how the monsters appearance somehow overshadows the beauty of its speech. Finally, Shelley uses some archaic language to show the historical context of the book. She uses the word deamon when Frankenstein refers to the monster and this spelling of the word is no longer used. Shelley chose this word to describe the creature because it has connotations of the devil and evil ways. This links in with Shelleys society and religion because everyone was religious and using the word deamon would show just how much hate Frankenstein had for his monster. Frankenstein, by using this particular word for the creature, shows how he feels that he is the innocent one. When the monster speaks, his language is very fluent, smooth and flowing which links in well with the Romantic Movement, which was very much around at the time, the book was written. The structure of the book is very interesting as it starts at the end, then goes back in time to explain the story. This gives the reader a chance to hear Frankensteins side of the story as he tells it to Robert Walton. The first part of the book is written as epistolary. This means it is written as a form of letters put together into a story. First, there are letters from Robert Walton to his sister Margaret. These letters make it clear that he has an obsession, much like Frankensteins, about reaching the North Pole. He then mentions that he has met a stranger, and goes on to inform Margaret of Frankensteins story. We hear Frankensteins story, right up to where he reaches Waltons ship, and then it continues in the form of epistolary. The structure is very interesting, because Walton writes about his own story to Margaret and his story includes Frankensteins story which also includes the creatures story. So Walton who is writing to his sister (and the audience) communicates all three stories in his letters. The narrative structure is very clever, because I think the same end would have happened to Walton if Frankenstein hadnt have come along and informed him of the dangers of obsessions, it would have ruined his life, as the creation of the monster ruined Frankensteins. It was obviously morally wrong of Frankenstein to devote his life to his obsession, where his life was perfect before this fixation with natural philosophy. He shunned his friends, and if he had not done this to create the monster, they would not have all been killed. There are many points where the reader does not know whether he was morally wrong or not, and the best example of this is when he decides to make the creature. It would have been morally wrong to unnaturally create life in the 19th century, but there is more leeway today as there are so many different views on genetic engineering. Taken as a whole, I think that Victor Frankenstein was morally reprehensible. Even in the 21st century, where the creation of life is more frequent, I think it was morally wrong to take body parts from dead people. I think he should have realised the terrible consequences of his actions before he went ahead with the creation. He did so much research into natural philosophy and he should have realised from his study that he needed to learn from other peoples experiences. His obsession with being the first got in the way of him thinking straight. I think Frankenstein leaving the monster to fend for himself was also morally wrong. All human beings are cared for once they are born, so leaving the monster alone is suggesting that he isnt human and doesnt deserve to be treated as one. As the creature was often out in the open, this gave him a chance to be shunned and discriminated against by society which introduced the feelings of hatred and aggression which were used later on to destroy Frankensteins happiness. Frankenstein is really responsible, because if he were not so obsessed with natural philosophy and the death of his mother, he would never have developed a passion for saving life and would never have discovered that creating life was possible. He only had himself to blame for the destruction caused by the creature; not only to himself but to those he loved. Frankenstein never really admitted the responsibility, he said that God gave him the power, I found such astonishing power placed upon my hands, I hesitated a long time concerning the manner in which I should employ it and though he did take a long time to think about what to do, he reached never realised the full outcome of his decision. Although he realised his mistake at the end, and tried to put someone off making the same one, he never admitted the responsibility out loud. So, in conclusion to the title, Id say that Victor Frankenstein is a very morally reprehensible character. Show preview only The above preview is unformatted text This student written piece of work is one of many that can be found in our GCSE Mary Shelley section.