Monday, December 30, 2019

The Iran Contra Scandal Was A Shocking And Nefarious...

The Iran-Contra Scandal was a shocking and nefarious governmental affair which occurred during the executive administration of President Ronald Reagan. The affairs involved many people in the United States government and their dealings with other nations, and the congressional hearings which were held to expose the secrets and find the truth behind the scandal to determine who was involved and who would be deemed guilty of atrocious crimes (Vile). President Reagan arranged a deal with Iran, secretly selling weapons to the Iranians for their ongoing war being fought against the nation of Iraq, in exchange for the American hostages who were being held by the Iranians (â€Å"The Iran-Contra Affair†). The United States’ relations with Iran were†¦show more content†¦It was later found that the United States government had not received all of the money Iran had paid for the weapons which they had received (â€Å"The Iran-Contra Affair†). â€Å"While probing the question of the arms-for-hostages deal, Attorney General Edwin Meese discovered that only $12 million of the $30 million the Iranians reportedly paid had reached government coffers† (â€Å"The Iran-Contra Affair†). Lieutenant Colonel Oliver Laurence North of the United State’s National Security Council (NSC) had sent out a significantly large portion of the money from the Iranians to the Nicaraguan Contras, under the presum ption that the President had approved of this act but without actually having received the direct approval of President Ronald Reagan (Fredriksen). Prior to North sending money to the Nicaraguan Contras, Congress used one of their many constitutional powers, the power to manage foreign affairs, which allowed them to have control over the nation’s relationship with the Nicaraguan Contras, so they had written the Boland Agreement of 1984, in order to restrict the United States in their support for these Contras (Fredriksen). â€Å"Congress

Sunday, December 22, 2019

Stalins Corruption - 1564 Words

I believe in one thing only, the power of human will said Stalin once. He certainly did have cause to believe in the power of a humans will as he experienced it in himself firsthand, having had extraordinary willpower and perseverance (He didnt call himself Man of Steel for nothing, folks), rising up from the lowly station of alcoholics son in Georgia to one of the biggest monsters in human history, supposedly killing more than Hitler. Exactly how did he do this? Why? And how did his corruption reach such extents as to do all this for power? Josef Stalin (originally named Josef Djugashvili) was born in Gori, a violent town in eastern Georgia, on the twenty-first of December, in 1878, to his parents Ketevan Geladze and Besarion†¦show more content†¦By acting as if his words were indirectly Lenins, Stalin could say almost any number of things with the people agreeing out of respect for Lenin. This relates to the propaganda technique Testimonial. There were other ways that he took advantage of how Communism was--the omnipotent and omnicompetent boss was still the norm in a society so recently under Czarist authority (Pereira, 5). Because of this, Stalin could easily claim supremacy over the people of Russia, because they were used to this. Part of what helped Stalin attain so much power and therefore get so corrupt was all of this taking advantage of not completely set rules. But why did he want to take advantage of this for power? He did this because of his power-hungry personality. Stalins having a power-hungry personality is a big part of what made him corrupt, and is also a part of his corruption. Not many will dispute this, especially once faced with evidence--Stalins craving for power is evident in many areas. He certainly had a lot of will-power to do as much as he did! One such example of this is accentuated by him opportunism and likeness to a chameleon; he would do almost anything to attain power, not having scruples or paying attention to ideals (although he harnessed those of the people to gain power!) : Stalin performed his great turn-about in late 1927 and took over the left analysis (Pereira, 5). This is interesting because Stalin had been on theShow MoreRelatedAnalysis Of The Book Bitter Watters 921 Words   |  4 Pagesexperiences under Stalin’s Soviet Union. Andreev-Khomiakov (the author) talks about his everyday life during the years of 1935 to 1941. From the point of being imprisoned in a labor camp in till he has to leave Moscow because of World War II. In the book Andreev-Khomiakov talks about how the Stalin system works daily, and expresses his own opinions about it. He explains how controlled he and his coworkers are by the Soviets. This primary source is helpful to feel what it was like under Stalin’s Soviet UnionRead MoreJoseph Stalin And Vladimir Putin1062 Words   |  5 Pagesto spy on citizens and urged citizens to spy on each other. Additionally, he enforced freedomless press and speech; violators of his laws were sent to Gulags, labor camps . After promises to build Russia into a strong market economy and to end corruption, Vladimir Putin was elected as president of Russia in 2000, was re-elected in 2004, and was re-elected once again in 2012 . However, there is much skepticism about the legitimacy and impartiality of the 2004 and 2012 elections. Experts state thatRead MoreSquealers Role in Animal Farm Essay example1184 Words   |  5 Pagesreceiving whatever they desire with minimal opposition. br brSquealer is used by Orwell to symbolize the Pravda, the Russian newspaper directed and organized by the government during the administration of Joseph Stalin. Orwell presents the corruption of the Soviet command and authority in his critique of the propaganda employed to overpower probable combat from the populace. The exclusive possession of the media, is also criticized by Orwell. br brSquealer was the bearer of news for ManorRead MoreEvaluation Of Animal Farm By George Orwell1101 Words   |  5 Pagespublished in 1945, and the context when it was written plays a huge role in shaping it. It was after the Russian Revolution in which we see Joseph Stalin became the new leader of the Soviet Union. Stalin’s idea and leadership clearly doesn’t impress George Orwell, as this book shows the dark side of Stalin’s system through a group of fictional characters, the animals. Not only that, the book was also able to foresee the situation every government in the world is facing: the lethal side of power. TheRead MoreAnimal Farm, By George Orwell1243 Words   |  5 Pagescommunism and Stalin’s rule. An author shows his or her purpose through the text’s hidden meanings, the structure of the text, the sequence of events, and the diction of the text. One way the author conveys his or her purpose is through the use of hidden meanings. A story’s plot is somehow based on the author’s real life, and the author writes the story to convey these events. For example, although the book Animal Farm is completely fictional, it is based on the events that occurred during Stalin’s rule inRead MoreCritical Analysis of a Document Essay example817 Words   |  4 Pagesbut what had to be done to keep their own life. As Kopelev’s extract goes on we see with it the fading of this initial blind enthusiasm for a communist dream, and an emergence of deeper sentiments conveying bitterness towards the corruption and treacherous institution to which he’d complied with. Such jaded attitudes become evident through his admissions of having to ‘still my doubts the way I had learned to’ proving perhaps that of all the harm imposed by such a partyRead MoreThe Silent Genocide Of Ukraine : Holodomor 1932-19331247 Words   |  5 PagesUnion from 1932-1933 that killed millions of Ukrainians. This cruelty of a slow death by starving was a purposeful act by Joseph Stalin and the leaders at that time. To cease further genocides in our world today, it is imperative to know how this corruption and disaster starts, so it can be prevented in the future. By understanding the Soviet leader’s motives and the lives affected by this famine, this will lead to further comprehension about power and communism. Power corrupts those who are givenRead MoreAnimal Farm By George Orwell1698 Words   |  7 Pagessignificantly is a satirical look at the history of the Soviet Union, beginning with the Russian Revolution in 1917. The rebellion at Manor Farm mirrors the Russian Revolution of 1917 and although meant to liberate the workers, became a tool for Stalin’s oppressive and brutal dictatorship. Stalin, like Napoleon, his ant hropomorphic counterpart, quashed any opposition, denying people the freedom to express their political views. Although Animal Farm is an attack on a specific government, its generalRead MoreKarl Marx s Interpretation Of Communism1148 Words   |  5 Pagesa once powerful nation, now crumbling down, focused exclusively on the Soviet Union as a starting point for a revolution with his â€Å"Socialism in one country†, thus putting a stop to Lenin’s ideas of world revolution (Wood, week 5, slide 7). Joseph Stalin’s obsession with security greatly influenced his world view. In truth, this could be one of the reasons why Stalin signed a non-aggression pact with Hitler in 1939. When the latter broke the pact and invaded his country, Stalin made sure that HitlerRead More George Orwells Nineteen Eighty-Four 1984 Essay1030 Words   |  5 Pagesmental. Orwell also shows how the state has more subtle methods for imposing its authority, such as the manipulation of language and propaganda as they are used to achieve the goal of absolute power for the system. A key parallel between the Party and Stalin’s Communism is the use of technology and communication to control the economic, social, and personal aspects of life. nbsp;nbsp;nbsp;nbsp;nbsp;Stalin and Big Brother achieved total control, not only of social and economic aspects of the state

Saturday, December 14, 2019

The recent increase in agricultural productivity Free Essays

In the recent times the agricultural productiveness has been increased two times while the country of the cultivated land is increased by merely 10 percent.But the job is how to manage the inauspicious effects of clime alteration on agribusiness productiity.Incrasing populations at high rate I is besides a serious concern, harmonizing to FAO the universe population will make 9 billion by 2050 which is presently 6. We will write a custom essay sample on The recent increase in agricultural productivity or any similar topic only for you Order Now 7 billion.It is estimated that the universe agricultural nutrient demand will be increased to 70 % , and at the same clip clime alteration is expectrd Ro cut down the agricultural productivity.The function of developing states is critical and they should must transform their tradional patterns to modern techniques.To guarantee the nutrient security in future FAO has proposed figure of valueable ways through which the agricultural production will increased with minimising the consequence of utmost clime conditions.The proposed methods are soi and alimentary direction in this methods smallholders can profit the most by the usage of manure and harvests residues to increase production.Management of H2O in harvests prodution is besides of import, today irrigation is practiced in merely 20 % of the agricultural land in the devloping states but are genearting 130 % more yields.Smallholders should follow the efficeint methods or H2O use.Cliamte alteration has increased the effects or plagues and diseases impacts on the harvests which in consequence has decreased the outputs leval.Resilence othe ecosystems is of import as ecosystem can assist in many ways in prolonging the cliamte and cut downing the degree of GHGs emissions.Harvesting and supply ironss of the harvests should be efficient and advanced so that the station crop losingss should be minimized.Processing and storage of agricutral merchandises besides helps in cut downing the losingss of excess food.Use of advanced engineerings improves the production degree but at the same clip, in some instances the job of ecological harm, resource development and plague and diseases are noticed.These all patterns are making good in different developing states under the guidline of FAO but still there are still so me information spreads which consequences in the faliure of practical application of these production systems and patterns. Rice is one of the most cardinal nutrient point used in most underdeveloped states and about 3 billion people eat rice daily.Due to the utmost waether conditions H2O logging and irregular rainfall enchantments has adversly effact the end product of rice crop.Differnt methods are proposed to command these effects.Croping forms are changed and embankments are built to construct t protect rice farms from inundations and drouth, tolerant and resistent varities of rice are being introduced.Different researches are being done on rice cultivation and urea deep arrangement UDP engineering has been developed.In bagladesh these this pattern has shown 60 % nest eggs in urea usage and output additions of about 1 ton per hacter.Differnt extenuation and version techniques are being used by different states e.g usage of natural fertilisers, variegation of harvests nad no cultivated land. Conservation agiculture is another pattern which is proposed by FAO it has three steps.Managemant and usage of fertilisers in such a manner that more is produced with less usage of fertilizers.Rotation of harvests and usage of legums workss for nitrogen arrested development and avoidence of tillage.It reduces the vulnerabilty of harvests by version to cliamte alteration and besides better the nutrient security in sustainable way.agroforestry is another pattern by which the issue of milliliter and nutrient security can be minimized.It is the usage of trees an vitamin D bush in agricutural harvest and in land managemnr systemTrees can better the dirt birthrate, particularly the N repairing legume trees.In Africa this system has increased corns end product from 1.3 to 1.6 tons.It is besides one of chief beginning of C sequestartion of the universe CO2 emissions.It is of import for two hundred extenuation. Urban and semi urban agricuture is besides impotant to adress the issue of nutrient security and turning demand.50 % of universe population is populating in metropoliss but they can non run into their demand of nutrient so they rely on rural agri products.In metropoliss agriclture production can be parcticed in diffent topographic points like schools, infirmaries roof tops and Windowss boxes etc and these are go oning in some countries.But there are different sorts of hurdlings like the deficit of H2O, land issue, envirnomental impacts of urban agri consequence the populace and make diseaes and wellness concerns.therefore mor advanced tecnolgies are required and metropoliss be aftering should back up the urban agri activities.The demand of more advanced production system is besides needed which can besides carry through the smallfamers enregy needs.Biofules shuold be produced from the residue of different harvests. How to cite The recent increase in agricultural productivity, Essay examples

Friday, December 6, 2019

Hospitality Industry and Property Management-Samples for Students

Question: If you were starting a small Boutique Hotel, would you decide to use a Cloud-based or local server-based Property Management System? Justify your decision with reference to the academic literature. Answer: Property management system: The essay discusses the chief courses for property management. For a small boutique hotel, the management can use a well-travelled and familiar route of software that is locally installed or an increasingly explored way through the cloud (Rodrguez-Antn et al. 2012). Could computing has become a trend and it is expanding largely across industries from tourism to technology. Opting for local: The most important component of the system is the data server where guest, reservation as well as accounting data have been stored. The researchers usually recommend that the server must be dedicated to only PMS as additional appliances that run on the same server may slower overall performance of system. Multiple server may be required according to the size of the property. Systems that provide integrated Web booking module requires additional server for managing concurrent reservations. These are then saved in main server. Centralised as well as virtual management also need terminal servers. Technical requirements: Computer or workstations- These need to conform or follow to the operating system like Microsoft windows supported by PMS and to all the programs needed by the interfaces. Beside this, Data servers, Terminal server, operating system, Network cards and Removable back-up systems are also required (Cohen and Olsen 2013). The property authority must consider the existing hardware and check whether they are current and can meet optimum requirement of the system. Advantages: As the internet is widespread, the properties from isolated locations can also easily access which is one and only rare situations where Cloud-based PMS cannot be the best solution. As the local server based systems do not need internet connection, accessing the system needs no internet connection. This is also an advantage of local server based systems that it can avoid concerns for the internet security. Over internet there is always threat associated with viruses, system hacks and malwares. Security concerns must be considered as sensitive data especially the guest data are stored through a PMS. The managers can contain data on site and keep eyes on them through a local server based system (Mo Kwon, Bae and Blum 2013). It is a safer option where the owner need no concern for security as well as maintenance measures. The private networks must be secured, server rooms locked up, computers and back up servers must be ready all the time, power generators optional and disaster recovery must be ready for perfect operation. The successful outcome also need an experienced IT staff. Disadvantages: The chief disadvantage of local server based PMS affect keenly to the small, middle sized as well as independent properties. As they have meagre budget for requirements of the systems, maintenance and upgradation. The local server-based PMS can cost $ 10,000 which is a big amount for expenditure. Beside this, initial costs include software licencing and hardware. Maintenance cost are steep that include the replacement of hardware, upgradation and energy costs for running the machineries and payments of IT personnel (Law et al. 2013). The disadvantages of the local server PMS are- They require complex hardware that are expensive They are expensive as well as complicated for maintenance These are time consuming and need trading and software installation Additional cost for web enabled features Responsibility of data as well as system comes on the owner IT expert required for attending problems. The local server based systems are expensive as well as complicated that need to keep updated software. The upgradation often needs to be purchased which are expensive yet less frequent. These upgradations are more time consuming than that of the cloud based software. This huge investment and upgradation costs of local server based systems often discourage the management therefore, they do not upgrade obsolete systems (Verma, Stock and McCarthy 2012). This decreases the systems operational efficiency and inhibits the competitive edge of the property. Inefficiency in management in daily basis offends the guests and has great impact on revenue. Along with the expensive cost of hardware and system in the local server based property management system, the property has to take the technical responsibility of hardware. The vendors of the system are responsible only for PMS software (Okumus 2013). Such technical accountability becomes pressure for the property manager. Therefore, the employment of an IT professional is a mandatory for the local server based systems. The property is also responsible for data security and back up along with system access and safety. They are responsible for database security, system access protection, manual data back-up procedure, hardware damage aa well as theft and disaster recovery protocol for ensuring the system secured. Opting for cloud-based system: The cloud based PMS are deployed over internet. The property management system software is not installed in the computers of the hotel but can be avail through internet. And accessed via a browser. The software and the PMS data are located on the remote servers that are securely stored in the databases of the vendors. Technical requirements: The chief technical requirements of the cloud-based PMS are- Workstation or computer Internet connection and a back-up connection In the cloud-based PMS the user feels the system to be program in their computers though the software can be located remotely as well as data are saved remotely (Boutaba, Zhang and Zhani 2013). The system and data can be accessed through any computer that is connected to the internet and even through tablet or smart phone. The technical resources needed for the cloud-based PMS are maintained by the vendor. The clients can use these resources that are provided on the basis of demand through the internet. The vendor charges its clients accordingly. The clients pay for what they use. This model is therefore, called as SaaS or software as a service. Advantages: The chief benefit of the cloud-based property management system that it does not need expensive hardware and system software therefore the hotel can tremendously save the IT costs. The hotel does not need to invest on the servers, backup drives and network cable. It only needs to have computers and internet connection (Wei and Blake 2013). Therefore, the management do not need to take responsibility for the hardware the all the technical responsibilities associated with it. There is no need of IT professional as the vendors are experienced and qualified to take care of all the technical upkeep. For cloud-based property management system, the setup is easy and less time consuming. Whereas the local sever PMS requires more time for taring and installation, the cloud-based needs no time for installation (Jung and Sim 2012). The training is usually conducted vial online tutorials or live. The cloud-based PMS gets ready within a week as SaaS products have centralized as well as communal nature. The problem of upgradation and of systems can be handled effortlessly by all users and often without any cost. After the property grows the local server systems need additional licenses but in cloud-based PMS, the system adapts with the growth of the property. The hotel management do not need to purchase new server instead they request the system vendor for increased room inventory allotments (Gorgoglione, Dekorsy and Fettweis 2014). The vendors supply it through data downloads and additional storage. Beside this, the users can access the system with no extra cost. For its centralized management with multiple location facility, clod-based system has become more popular. Customizability as well as scalability of the functions enables the users to turn on and of any features. Property-specific customizations have been deployed via a virtual switch by the individual property. Cloud-based PMS is an attractive option for the property managers who need a convenient off-site access, seasonal property managers who take reservations at the time of closure and businesses that have satellite offices (Xiao, Song and Chen 2013).This handy feature enables the users in case of computer crashes and staffs can access the system from another computer or from their smartphones. Integrated web reservation engines as well as mobile applications are natural components of this PMS. Online bookings are directed to hotels central database that results in integrated reservations data. Therefore, eliminates need for separate allocation of inventory for bookings and manual upgradation of main reservation database. Disadvantages: The cloud-based system needs examination but the system vendors offer expertise in data and system security. This system largely depends on the reliability of the internet therefore, the cloud PMS vendors need to invest more powerful resources, infrastructures and procedures for protecting against all online security threat like viruses as well as malwares and most importantly connection loss. Concerns for connectivity loss and system security are chief disadvantages of cloud-based PMS (Mishra et al. 2012). Despite the fact that internet failure is a rare these days, the vendors ensure that system remains online via redundant Internet connections. Therefore, the researchers recommend that the hotel must set up an alternative connection and back up plans. Therefore, from the above analysis it can be concluded that the small hotel management needs to discuss about the property circumstances and their goals while taking decisions regarding the selection of PMS for their property. Usage of cloud-based systems fits logically in this increasing online world with its swift technical movements and highly sophisticated features. Cloud-based PMS offers an affordable reality therefore has been applied in small and mid-sized properties. References: Boutaba, R., Zhang, Q. and Zhani, M.F., 2013. Virtual machine migration in cloud computing environments: Benefits, challenges, and approaches.Communication Infrastructures for Cloud Computing, pp.383-408. Cohen, J.F. and Olsen, K., 2013. The impacts of complementary information technology resources on the service-profit chain and competitive performance of South African hospitality firms.International journal of hospitality management,34, pp.245-254. Gorgoglione, M., Dekorsy, A. and Fettweis, G., 2014. Benefits and impact of cloud computing on 5G signal processing. Jung, G. and Sim, K.M., 2012. Location-aware dynamic resource allocation model for cloud computing environment. InInternational Conference on Information and Computer Applications, IPCSIT(Vol. 24, pp. 37-41). Law, R., Leung, D., Au, N. and Lee, H.A., 2013. Progress and development of information technology in the hospitality industry: Evidence from Cornell Hospitality Quarterly.Cornell Hospitality Quarterly,54(1), pp.10-24. Mishra, M., Das, A., Kulkarni, P. and Sahoo, A., 2012. Dynamic resource management using virtual machine migrations.IEEE Communications Magazine,50(9). Mo Kwon, J., Bae, J.I. and Blum, S.C., 2013. Mobile applications in the hospitality industry.Journal of Hospitality and Tourism Technology,4(1), pp.81-92. Okumus, F., 2013. Facilitating knowledge management through information technology in hospitality organizations.Journal of Hospitality and Tourism Technology,4(1), pp.64-80. Rodrguez-Antn, J.M., del Mar Alonso-Almeida, M., Celemn, M.S. and Rubio, L., 2012. Use of different sustainability management systems in the hospitality industry. The case of Spanish hotels.Journal of Cleaner Production,22(1), pp.76-84. Verma, R., Stock, D. and McCarthy, L., 2012. Customer preferences for online, social media, and mobile innovations in the hospitality industry.Cornell Hospitality Quarterly,53(3), pp.183-186. Wei, Y. and Blake, M.B., 2013, March. Adaptive service workflow configuration and agent-based virtual resource management in the cloud. InCloud Engineering (IC2E), 2013 IEEE International Conference on(pp. 279-284). IEEE. Xiao, Z., Song, W. and Chen, Q., 2013. Dynamic resource allocation using virtual machines for cloud computing environment.IEEE transactions on parallel and distributed systems,24(6), pp.1107-1117.

Thursday, November 28, 2019

William Faulkner Essays (952 words) - Modernist Literature

William Faulkner Biography of William Faulkner William Faulkner was an enormous man in literature despite the fact that he stood less than five foot six. He reshaped the way in which the world views literature today. Faulkner was one of the greatest influences to American culture of his time. In fact, his influence spread throughout many years to come. Faulkner started out as a child with a dream, and with this dream he redefined the literary society of America. William Cuthbert Faulkner was born on September 25, 1897, in New Albany, Mississippi. Faulkner was the son of Maud and Murry Faulkner. He was the eldest of four sons, and was named after his great grandfather, who was a bestselling writer of The White Rose of Memphis. When Faulkner was young, he showed an artistic talent for drawing and writing poetry. Estelle Oldham and Phil Stone were acquaintances of him while in his youth who would become important figures in Faulkners future. Stone found great interest in Faulkners poetry, which soon caused him to recognize Williams unmistakable talent. He set out to advise Faulkner and give him models for his study of literature. He said that Always dream and shoot higher than you know you can do. Don't bother just to be better than your contemporaries or predecessors. Try to be better than yourself. (William Faulkner). It was in this way that he conducted his literature, for the rest of his life was sloppy and indulgent. He worked as a postmaster and a scoutmaster for Boy Scouts, and in both he was asked to resign for drinking, and poor work. He dropped out of both high school and college in favor of partying, but during his stay in college, Faulkner was able to create many short stories and poems which were featured in the school newspaper and the yearbook. Faulkner may have been irresponsible and incompetent, but his writings proved to be extravagant works of art that redefined American literature for centuries to come. William Faulkners work was defining to the culture of America during the early 1900s and beyond. Faulkner invented characters to create a saga such as the series of literary works which involved an imaginary county known as Yoknapatawpha. Those works theme was the decay of the Old South, as represented by the Sartoris and Compson families, and the emergence of ruthless and brash newcomers, the Snopeses. (www.olemiss.edu). The New Orleans culture he lived in influenced much of his writing. Many of his great works, including Soldiers Pay, Mosquitoes, and the New Orleans Sketches Collection were written at that locale. He went on to write Sartoris, which he considered to be extremely good but could not get it published. He began writing The Sound and the Fury for fun. That was at the time his writing career was at rock bottom because of his lack of money. It turned out that both of these novels got published. The structure of The Sound and the Fury was revolutionary. It was divided into four parts, and when put together they created a large image of the slow demise of a once- powerful and prominent southern family. The theme of their demise is especially exhibited with the gradual decline of Cady Compson, and her eventual disappearance. Another novel that he had written in 1929, Sanctuary, was one which Faulkner claimed to be simply a moneymaker. Unfortunately, because of its subject, the novel was immediately turned down by the publisher although he eventually got it published. Faulkners writing during these years revolutionized literary culture. Later in his life, Faulkner slowed down in his writing. He moved to Hollywood to be a screenwriter. Faulkner became good friends with Howard Hawks, and his efforts in Hawks scripts granted him on-screen credit. One of the first movies directed by Hawks and which he received credit in was Today We Live which was based on Faulkners short story Turn about. In June 1930, Faulkner married Estelle Oldham. A year later they had a daughter, Alabama, who died after only a few days of being born. In June of 1933, Estelle gave birth to Faulkners only surviving daughter, Jill. In 1949, Faulkner was awarded a Nobel Prize for literature. "His powerful

Monday, November 25, 2019

Hca 430 Final Assignment Essays

Hca 430 Final Assignment Essays Hca 430 Final Assignment Essay Hca 430 Final Assignment Essay Running Head: JOB DESCRIPTION 1Debra L. ImmelHCA 311 Human Resources ManagementBusiness PlanInstructor: Volante HendersonJuly 22, 2013JOB DESCRIPTION 2Job Description The purpose of an accurate job description is exactly what it sounds like it is. An accurate and concise job description prepared by the well-informed human resource manager would give a prospective employee an idea of what the job would require at a minimum level to fulfill the needs of the specific job. This job description is describing the position of a registered nurse case manager of hospice patients. The following areas will be described are tasks, tools and technology, knowledge, skills and abilities and finally educational requirements. This detailed paper would be useful for high school students in the planning of college and career choices, as its primary function is to increase the understanding of the role described in the prospective job position.Summary Report for:Registered Nurse Hospice Case ManagerThe role of the registered nurse hospice case manager includes administering nursing care to the dying patient, assessing the hospice patients and their family members’ health strengths and weaknesses, develop, assess, implement and evaluate care plans. This role includes maintaining the medical record and provides overall management of the caseload. This position requires a Registered Nurse Licensure in the State of Wisconsin. All candidates will provide a sample for drug screen.TasksMonitor all aspects of the patient’s care, including medications and treatments.JOB DESCRIPTION 3Instruct and educate the patient, caregivers and

Thursday, November 21, 2019

Is it morally right thing to do is always the thing which will produce Essay

Is it morally right thing to do is always the thing which will produce the greatest happiness for the greatest memebers Kant vs. Mill - Essay Example The ideology of metaphysics was a major avenue of study followed by Immanuel Kant. Metaphysics is the philosophical study of a person’s know how and being. (Kant, 98). It is evident that Kant’s idea of morality relies on the occurrence of metaphysics as an individual science. â€Å"The law effected by the uniformed forces should be absolutely necessary so as to have moral implications.† In fact, scholars have identified this statement as a basic maxim of Kant’s philosophical ideas. According to Kant (2008), there should a group of truths referred to as necessary truths, for there to be morality. These truths define a person’s incentive to fulfill his/her duties and enhance psychological growth through the act of seeking moral worth. Moral worth in turn has its consequences based on happiness in action or satisfaction of the greatest number. Consequently, people decide to take various actions in accordance with duty; thus making it a moral choice. The will to perform duty or take action is classified as good or bad. Kant notes that if action is based on bad will, then all the externalities point towards immoral intent. To understand the aspect of satisfaction of the greatest number, we need to ask ourselves; what are the necessary truths? Kant states â€Å"he should not act otherwise so that his maxim can become universally accepted.† (698) In interpretation, people owe their obedience to their social duty. In obedience to duty there exists the basis for morality and if anyone tries to make an immoral idea wholly accepted, there will be contradiction. For example if one decides to kill anyone who offends him, then everyone will do the same leading to extinction of the human race. While quoting Kant’s work, Gert (2007) argues that it is necessary to avoid double-standards between the actions we take and those that we

Wednesday, November 20, 2019

Political subdivisions of police governmental powers per federalism Essay

Political subdivisions of police governmental powers per federalism - Essay Example Several countries like the United States, Canada and Australis follow this system of governance. In effect there are two separate sovereignties both having their own powers and as remarked in the case of Gibbons v. Ogden (1824). While the federal government is very powerful, it can never be all-powerful because the states have continued to have their own judicial system which covers and controls every department which is not linked to the central government and operates within the state’s territory. In this essay I shall start by defining the term federalism and political subdivisions. Then I shall move on to explain the police governmental powers per federalism and explain the historical context of Constitutional clauses establishing such powers. In doing this I intend to aid my essay with examples of the case law before concluding it. Federalism refers to a government system where each province concerned is administered by two government levels. As a general rule the commanding central government takes care of the issues which affect the nation in general while the problems related to state territories are controlled by their respective governments. The federal governance system prevalent in the US is also based on the same concept. There is a central government and various subdivisions of state governments. The constant power struggle between the state and the central government lead to various legal conflicts affecting the smooth administration of key departments operating under both the government divisions. The British government's oppression and tyrannical political and economic road map for American colonies led to the American Revolution. It caused the Americans to greatly distrust the centralized governmental powers. As a result only very little authority was bestowed upon the central government when the C onstitution was initially formed in 1781. The Articles of Confederation created during this period assured unlimited power to each state government to the extent of each state having their own court system. This form of government became too complex to control and a ‘Great Compromise’ was established in 1787 to implement uniform administration throughout the US. This compromise was reached to make the governance process easier, ensure fast economic growth and maintain a standard judicial system throughout the country. Most of the policies drawn in the ‘Great Compromise’ were based on the federalist ideologies. This was condemned by several opponents who called federalism a ‘folly’ and accused the pact of reducing the state government’s power and failing to clarify its actual role in the governance of the country. They also added the Supremacy Clause weakened the power of the state governments. Changes made in the constitutional provision s ensured only the states having a close relationship to the government will be granted the prerequisites for their growth projects. It is a commonly accepted fact that practical conciliation was the only reason to encourage constitutional federalism, then. People speaking in defense of the ‘Great Compromise’ argue that state governments have the power to vote and elect the central government. Hence, their rights are guarded and they are the ones controlling the central government, not vice versa. Political subdivisions on the other hand indicate the states present in the

Monday, November 18, 2019

Applied Marketing Management Essay Example | Topics and Well Written Essays - 250 words

Applied Marketing Management - Essay Example Since macro-brewed beers are likely to be less expensive than craft beers because of the traditional processes (Canestorp), craft beers would most likely attract beer aficionados who are more adventurous, and thus willing to spend more for beer. The craft-beer industry is steadily growing (McKinney) which is why it would be favorable to exploit local markets effectively while taking competition into consideration (15). SWOT Strengths Strong start-up (establishing local presence in a booming industry) Highly differentiated products Initiative for an online presence Weaknesses Weak brand image since it is still a small growing brew pub Inadequate promotional tactics Less experienced with food Only caters to a certain demographic type Opportunities Exploit the Internet and such other technological advances to strengthen the market presence Exploit other local markets Entrepreneurial spirit to explore on other product options Weakening industry for macro-brewers Threats Cash flow may not be strong enough for product exploration Growth of competition in the craft brewing industry Price competition Competition with established and highly profitable macro-brewing companies Government intrusions Works Cited Canestorp, Dustin. â€Å"Hawking the Wares – How Bartenders Sell Craft Beers.† ArticleBase. ArticleBase, 8 Jan. 2011. Web. 21 Feb. 2011.

Friday, November 15, 2019

Case Study of PTSD in Ghana Armed Forces Personnel

Case Study of PTSD in Ghana Armed Forces Personnel CHAPTER ONE INTRODUCTION 1.1 Background to the Study According to The League of Nations was the first major organisation established after the First World War for conflict resolutions. Following the failure of the League of Nations to avert the Second World War, the United Nations Organisation (UNO) was established in 1945 to replace it. The United Nations (UN) is an international organisation, which among other things, aims to maintain international peace and security and to take collective and preventive measures to ensure global peace ( Rikhe, 1983). The need for peaceful co-existence and resolution of conflicts and wars necessitated the introduction of third party involvement in conflict resolution mechanisms in the nineteen century. The third party approach to settlement of conflicts and wars is practiced primarily by the UN, regional and sub-regional organisations through Peacekeeping Operations (PKO). Peacekeeping is defined as â€Å"the process of mediation, conciliation, negotiation and the management of conflict in a bid to bring peace in an area of conflict, violence or hostilities†. Peacekeeping involves the deployment of a neutral force (UN, Regional or Sub-regional body) in the field, with military, civil police and civilian personnel, in order to stabilize or dampen a conflict situation and provide viable opportunities for pacific resolution of conflicts. It entails peace-making and peace-building (Maj Agyemang-Bioh, 2000). In peace-making, an effort to settle the conflict through mediation, negotiation, concil iation and other forms of peaceful settlement is made using diplomatic action. Peace-building on the other hand, is â€Å"action-like†; it includes the identification and support of all measures and structures which will promote peace and build the needed trust and healthy interactions among former enemies; in order to avoid a relapse into conflict or recurrence of the hostilities. Thus peace-building is a social change through socio-economic development, rehabilitation and reconstruction; it actively seeks to eliminate the likelihood of direct or indirect violence in the conflict area, with the object of preventing further war and then to obviate any distress signal in the community (Ibid). The complex nature of modern conflicts and approaches to dealing with such conflicts gave birth to the term Peace Support Operations (PSO). Peace Support Operations are multifunctional operations in which impartial military activities are designed to create a secure environment and to facilitate the efforts of the civilian elements of the mission to create a self sustaining peace (Institute of Security Studies, 2000).  Ã‚   The concept of PSO refers to ‘the military, diplomatic, economic and humanitarian activities carried out in order to achieve long-term peace settlement and reinstate political and socio-economic stability to   a conflict or disaster situation (United Kingdom Joint Warfare Publication, 3-50). The terms Peacekeeping and Peace Support Operations are however, used interchangeably in this paper since both terminologies refer to the same concept. Additionally, the role of the peacekeeper has not changed significantly with the shift from PKO to PSO.   The first UN conflict resolution in Africa was in 1960 following the crisis in the Congo, now Democratic Republic of Congo (DRC).   Thereafter, the UN focused attention on all troubled spots in order to check crises before they escalated. It also encouraged the formation of regional and sub-regional bodies such as the Organisation of African Unity (OAU), now the African Union (AU), Economic Community of West African States (ECOWAS) and Southern African Development Community (SADC) to complement her efforts. This is in line with Article 53 of the UN Charter on regional organisations, which states that, ‘the Security Council should encourage associations or agencies that promote peace at regional level (Rikhe, 1983). Since its initial intervention in Congo in 1960, the Ghana Armed Forces has been involved in complex peacekeeping operations; from the civil wars in Rwanda, the Liberian and Sierra Leonean conflicts and the Ivorian conflicts, almost all commencing within the 1990s. All these conflicts were characterised by extreme cases of human rights violations and other violent crimes which have claimed so many lives and caused so much pain and suffering. In Liberia, Ghana was among the five leading member states of ECOWAS which deployed troops before the UN Security Council belatedly sanctioned it (Erskine (Lt Gen), (2000). Currently, the Ghana Armed Forces is providing contingents for United Nations peace support operations in Cote dIvoire, Liberia, the Democratic Republic of Congo, Sudan, and Lebanon.   A total of 3,250 troops are deployed for peace support operations in the five listed missions. As at 2008, Ghana was the sixth largest contributor of uniformed personnel to UN Peacekeeping (Un ited Nations Factsheet, 2008). Participation in these operations exposes military personnel to traumatic incidents. Since the twentieth century, a lot of changes have taken place in both the manner in which peacekeeping operations are executed and the circumstances to which the peacekeeping soldier is exposed to risk. Firstly, not only has peacekeeping operations increased in terms of frequency but they have also undergone a metamorphosis with regard to the manner in which they are conducted. It has been argued that previously peacekeeping soldiers were responsible for monitoring and observing cease-fire agreements between formally belligerent states (Liebenberg et al, 1997). Others contend that the 1990s witnessed conflicts where parties did not comply with peace agreements and/or disobeyed the rules of war (Olonisakin, 1998). He also refers to situations where peacekeeping soldiers themselves were viciously attacked. The nature of conflict also changed. In the pas,t conflict was characterised by being mainly inter-state, but today intra-state conflict is more prevalent (Nkiwane, 2000; Cilliers, 1999). Another indication of the changing nature of peacekeeping is illustrated in the roles that todays peacekeeping soldiers have to fulfill. The classic roles of the peacekeeping soldier to monitor the implementation of an honourable agreement between two or more parties in conflict; to act unarmed and guard a distinctly marked observation post, or to patrol a demilitarised cease-fire line, have become the exception rather than the rule (Potgieter, 1995). Thus, the evolving nature of peacekeeping duty in itself suggests that today peacekeeping soldiers are faced with new psychological challenges (Litz et al, 1997), and that it is no longer unusual for contemporary peacekeeping missions to include exposure to traditional war-zone experiences (Orsillo et al, 1998). The above conditions have the effect of increasing the stress levels of the peacekeeper. The ability to cope with stress is intrinsically related to psychological and material resources (Lazarus and Folkman, 1984), which are likely to be adversely affected by repeated traumatisation experienced during conflicts. Experience and appraisal of trauma tends to be related to both poverty (Muldoon, 2003) and social identity (Haslam et al, 2004). The most common psychological consequence of war and conflict is post-traumatic stress disorder (PTSD). The resulting stress has beenassociated with reduced cognitive, emotional, and behavioralperformance (Mitchell and Dyregov, 1993) and may negatively affect work performance (Paine, 1992).These findings have implications for both the career path ofthe worker and the efficiency and productivity of organizations. From the social identification perspective, the world may appear to be a frightening place and the trauma victim can feel powerless, helpless and incompetent. But in the interpersonal realm, the family is really affected. Post-t raumatic stress can cause the sufferer to become emotionally withdrawn and distant from family members. People affected can become overly needy and dependent, or outrageously demanding and impatient. Most of them can revert back to old habits like smoking or drinking, or become a newly hatched adolescent and engage in reckless, sometimes life threatening hobbies. PTSD is an anxiety disorder that can develop after exposure to a terrifying event or ordeal in which grave physical harm occurred or was threatened (Muldoon, (2003). Traumatic events that may trigger PTSD include violent personal assaults, natural or human-caused disasters, accidents, or military combat. These traumatic experiences could be caused by reasons such as near-death, serious physical injury, serious accident, violence, war, torture, any event that causes extreme fear, a horrifying event, or when one feels an extreme sense of helplessness (Ibid). PTSD can be categorized into four types depending on the length of time it takes for the disorder to appear and the amount of time it is present. These include; firstly, Acute Stress Disorder, symptoms of these occur within four weeks of the traumatic experience and lasts between two days and four weeks; secondly, Acute Post-Traumatic Stress Disorder, with symptoms lasting for more than four weeks; thirdly, Delayed Onset Post-Traumatic Stress Disorder, where symptoms appear years after the traumatic experience; and finally Chronic Post-Traumatic Stress Disorder where symptoms last for over three months with the symptoms disappearing for a few days and then reappearing. The major symptoms of PTSD include: exaggerated startle response, loss of memory (forgetfulness), sleep disorders (nightmares and waking up suddenly during the night), flashbacks or images of the traumatic incident that keeps coming back to haunt you, hyper vigilance (very similar to, but not paranoia), hypersensitivity, extreme irritability, anger over petty issues with violent outbursts, possessiveness, extreme nervousness and anxiety, muscle aches and pains for no apparent reason, unexplained fear, low self-esteem and lack of confidence (Mitchell and Dyregov, 1993). PTSD is categorized as Intrusion when the symptoms appear suddenly and happen when memories of a past traumatic incident keep coming back as flashbacks. These flashbacks could be induced by a variety of triggers such as smell, sight, or sound. Once the flashback is triggered, it is almost impossible to stop because the incident seems real with all the emotions involved. Nightmares are a good example of this. PTSD is categorized as Avoidance when a PTSD sufferer consciously or unconsciously tries to prevent remembering anything related to the traumatic experience. This may involve avoiding those close to you, or those you work with, causing misery to yourself and those close to you. PTSD is categorized as Hyper arousal when the symptoms are as a result of stimulated nerves and hormones. One could experience severe insomnia, and not remember the entire traumatic experience. During this phase one will have very poor concentration and will get irritated easily (Thompson and Gignac, 2000a ). PTSD can be treated. However, if left untreated, PTSD could remain lifelong, damaging ones relations with others and causing one several ailments, both physically and mentally (Solomon et al, 1996). 1.2 Statement of the Problem Post Traumatic Stress Disorder (PTSD) is common among people who have served in the military or any of the security or law enforcement agencies. The involvement and exposure of military personnel to combat and combat related situations expose them to risks which tend to affect them physically, mentally and emotionally. Some military occupations are more likely to witness traumatic events than others and thus be at greater risk. These occupations include frontline combat unit, combat engineers and medical personnel. It is often these same professionals or trades that are tasked repeatedly for peace support operations (Gignac, 2000). The fundamental components of combat power of the Armed Forces include the equipment and the personnel who carry out the combat roles. Therefore, it is important that all armed forces maintain a high state of personnel readiness (United Kingdom Doctrine for Joint and Multinational Operations-JWP 0-10). However, participation in combat and combat related activities exposes the military to stressful conditions. Over the years, the Ghana Armed Forces (GAF) have been exposed to battlefield hazards through their participation in peace support operations including the   Economic Community of West African States Monitoring Group (ECOMOG) operations in Liberia, The United Nations Mission in Sierra Leone (UNAMSIL), the United Nations Interim Force in Lebanon (UNIFIL), the United Nations Mission in Liberia (UNMIL), the United Nations Mission in the Democratic Republic of Congo (MONUC), the United Nations Mission in La Cote IVoire (UNOCI), and until recently, the United Nations Mission in Chad (MINURCAT). Exposure to such hazards of war in most cases result in mental and emotional tensions, injuries and death.   These situations usually result in what is referred to as stress on the part of the service personnel. It is therefore necessary that serious attention is paid to the problem of stress among participants of peace support operations. This research will therefore investigate and examine so cial identification and post-traumatic stress symptoms among participants of peace support operation, with the GAF as a case study. 1.3 Justification of the Study The military plays an important role in a nations development. They provide a congenial atmosphere for the overall development of a nation. Military personnel as a core element of the security services therefore need sound mind and body to be able to perform their duties effectively and efficiently. It is therefore important that attention is paid to the psychological and emotional needs of the military. Effective handling of post-traumatic stress related problems among personnel of the GAF will enhance their efficiency and productivity both at home and during peace support operations outside the country.The study will help come out with relevant information and recommendations that will help in assisting personnel who are affected by post-traumatic stress in the course of discharging their duties. It will also help reduce the incidence of PTSD among peacekeepers. This will help boost the morale of the personnel of the GAF both at home and on international peace support operations. 1.4 Research Questions The study will attempt to find answers to the following questions: What are the symptoms of post-traumatic stress disorders among personnel of the GAF? What are the effects of peace support operations on post-traumatic stress disorder and social identification? Which are the populations that are affected by post-traumatic stress disorders in the GAF? Is there a relationship between post-traumatic stress and the strength of social identification? 1.5.Methodology This research which is a case study of Social Identification and Post-Traumatic Stress Symptoms among personnel of the Ghana Armed Forces is a   qualitative research project hence the researcher largely employs the use of qualitative research design to include both primary and secondary data. Qualitative research is exploratory in nature and encompasses a range of philosophies, research designs and specific techniques including in-depth qualitative interviews; participant and non-participant observation; focus groups; document analyses; and a number of other methods of data collection (Pope and Mays, 2006). The primary data was collected from live interviews, focus group discussions and questionnaire administration. A total sample size of two hundred (200) was used for the study.   This comprised of interviews with thirty individuals, thirty persons in focus groups of six and one hundred and forty questionnaire which were administered to randomly selected personnel of the Ghana A rmed Forces. The secondary data were gathered from books, journals, articles, dissertations, and published and unpublished thesis.   1.6 Objectives of the Study The study has four-fold objectives. These are to: Identify and examine the symptoms of post-traumatic stress disorders among personnel of the GAF; Examine and analyze the effects of peace support operations on post-traumatic stress disorder and social identification; Examine and analyze the prevalent group of post-traumatic stress disorders in the Ghana Armed Forces; and Examine and analyze the relationship between post-traumatic stress and the strength of social identification. 1.6 Hypothesis The research hypotheses used in this study is tailored to suit a qualitative methodology that is interpretative rather than statistical. 1.6.1 Alternative Hypotheses There are symptoms of post-traumatic stress disorders among personnel of the GAF. Peace support operations have effect on post-traumatic stress and social identification. Post-traumatic stress disorders affect people of a particular group in the GAF. There is a relationship between post-traumatic stress and the strength of social identification. 1.6.2 Null Hypotheses There are no symptoms of post-traumatic stress disorders among personnel of the GAF. Peace support operations do not have effect on post-traumatic stress and social identification. Post-traumatic stress disorders affect every group in the GAF. There is no relationship between post-traumatic stress and the strength of social identification. 1.5 Limitations The research was limited in terms of data collection. Military personnel are generally sceptical about accepting their stress situations, largely due to the existing stigmatization associated with combat stress and PTSD. Nevertheless, the researchers status as a member of the GAF provided an insight into some of the issues relating to social identification and PTSD. The researcher further interacted with colleagues and other military personnel involved in post peace support operations to gain further insights into issues raised in the research. 1.6 Organization of Study The study is organized into five chapters. An introduction of the entire study is captured in Chapter one. Chapter two presents a review of the relevant literature. Chapter three outlines the methods of data collection while an analysis and interpretation of data and results is covered in chapter four. The fifth chapter is devoted to the summary of findings, conclusions and recommendations. CHAPTER TWO LITERATURE REVIEW 2.1Introduction This chapter provides the theoretical framework for the research.   It considers the views of some writers on Peace Support Operations and how they impact on social identity, stress and related concepts.   The study of these concepts will help in understanding the social identification and post-traumatic stress symptoms in post peace support operations among Ghanaian peacekeepers. 2.2 Social Identification and related Theories 2.2.1 Social Identification Social identification is the process by which an aspect of self- image is developed based on in-group preference or ethnocentrism and a perception of belonging to a social or cultural group. (APA, Thesaurus of Psychological Index Terms, 8th ed). 2.2.2 Theories of Social Identification Several theories have been formulated to explain how threats or stress affect social identification. Three of the well known theories are explained below: 2.2.2.1 The Integrated Threat Theory The theory of Integrated Threat was first identified by Walter and Cookie Stepan, when they attempted to explain how a groups prejudiceswere created by threats from other groups. These threats are said tobe present anytimeone groups actions, beliefs, or characteristics challenge the goal attainment or well being of another group (Riek, Mania, Gaertner, 2006).An individual group may feel threatened by another which is utilizing resources it needs to achieve its goals or to sustain its status as a group. These resources may be tangible, such as money or materials, or intangible, such as status, power or knowledge (Ibid). When resources are scarce, the group whichis threatened by the lack of resources finds itself motivated to compete for the resources in order to maintain its identity as a group or to achieve its goals (Ibid). This competitionpromotes negative attitudes towards those in the group utilizing the resources (Aberson Gaffney, 2008). The two groups in competition over resources can be described as the in-group and the out-group. The in-group can be described as the group of people with whom an individual categorizes himself/herself with. Members of an in-group feel a sense of commitment to the group and gain greater esteem from their sense of belonging to the group (Redmond, 2010). The out-group can be described as any group outside of an individuals in-group and a group that can be a potential rival/competitor for resources (Ibid). The in-group is the group which feels threatened, and the out-group is the group which is posing a threat to the in-group (Kendall, 1998). Intergroup threats contribute to conflict because they influence behaviors, perceptions, and emotions. An appraisal of threat can evoke strong negative emotions, including that of fear, rage, anger, resentment, frustration, contempt and insecurity. In addition, perceptions of threat reduce emotional empathy for members of the out-group. All of these negative emotions combined with the lack of empathy felt for the other group, can literally bring people to a breaking point. 2.2.2.2 Social Identity Theory Social Identity Theory focuses on the relationship between self-concept and group behavior (Hogg and Terry, 2001). The social identity theory was proposed by Henri Tajfel as a result of work he was doing in the 1970s concerning categorization and social perception, intergroup behavior, and the pursuit of social psychological understanding of the causes of prejudice and intergroup conflict (Abrams and Hogg, 1999). He believed that there was discontinuity between how people behaved when they related to others on an intergroup basis as opposed to an interpersonal or individual basis and sought to explain the behavior of people in group situations (Abrams and Terry, 2001). Tajfel identified three components of social identity, self-conceptualization, group self-esteem, and commitment to the group, which when met, lead a person to feel connected to their in-group. As a result, all other groups become out-groups and are rivals for status and resources as well as a source for comparison. Th is can lead to discrimination in favour of the in-group or against other out-groups as well as stereotyping and prejudice when a perceived threat occurs (Redmond, 2009). According to the Social Identity Theory, social identity and intergroup behavior is guided by the pursuit of evaluative positive social identity through positive intergroup distinctiveness, which in turn is motivated by the need for positive self-esteem (Hogg Terry, 2001). In other words, a persons behavior will be affected by their positive association with their in-group, when their self-esteem and/or status are elevated by that association. Central to this theory are three components identified by Tajfel: self-categorization, group self-esteem, and group commitment. 2.2.2.2.1 Self-Categorization Self-categorization refers to a persons belief that he/she belongs to a group. A person must categorize or identify him or herself as a member of a group in order to have their self-esteem elevated through association with the group. According to this theory, categorization sharpens intergroup boundaries by producing group-distinctive stereotypical and normative perceptions and actions and assigns people, including self, to the contextually relevant category (Ibid). In addition, self-categorization can reduce uncertainty about themselves and others and about how they and others may or ought to behave in specific social contexts (Ibid). The core of an identity is the categorization of the self as the occupant of a role (Stets Burke, 2000). By assigning roles to individuals that are self-categorized as being part of a group, individuals can derive meanings and expectations associated with their roles, and as a result, are able to create values based standards that motivate and guide b ehavior. 2.2.2.2.2 Group Self-Esteem Group self-esteem refers to the positive self-esteem or self-identity gained through membership in a group. In order to categorize ones self as a member of a group, membership in the group must hold some value for the person such as improvement in their status or positive personal identity through the association with the group. The theory suggests that people have a need to see themselves in a positive light in relation to relevant others (Hogg and Terry, 2001) and that this can be achieved in a group context through making comparisons between in-group and relevant out-groups in ways that favour the in-group (Ibid). 2.2.2.2.3 Group Commitment Group commitment refers to the strength of the commitment a person feels to their in-group. This is important because if an individual believes they can move into a higher status group, this person will be unlikely to show much solidarity or engage in much direct intergroup competition and will instead attempt to disidentify and gain psychological entry to the dominant group (Ibid). When a person identifies him or herself with a group, gains a positive self-esteem through the group, and feels committed to the group, the person will be motivated to maintain the group and their memberships in the group (Redmond, 2009). There can also be adverse consequences, however, to an individual over-identifying with a group. When a person becomes too attached to a group, it can lead to stereotyping and the degradation of out-groups as well as overdependence, antisocial behavior, decreased creativity, and a decreased sense of self for the individual (Hogg Terry, 2001). As a result of being too attached, the lines that once separated the individual identity from that of the group may become blurred. If this loss of individuality takes place, it may result in a decreased ability to create an independent self concept apart from the group. 2.2.2.3 Social Dominance Theory The Social Dominance Theory originated in an attempt to combine the more classical theories of social behaviour such as Marxism, and more contemporary theories such as Social Identity Theory into a unified behavioral model to explain bias in group behavior (Sidanius Pratto, 1999).The Social Dominance Theory is based on the idea that in virtually all societies, group-based hierarchies are formed in which both dominant and subordinate groups co-exist. As is naturally the case, the dominant group(s), referred to as having positive social value in the group structure; has access to rights and privileges that are denied to subordinate group(s) because their (negative) social value and ability to bring to bear power and resources are limited (Ibid). A principledistinction between Social Dominance Theory and similargroup-based social theories, such as Social Identity Theory, is that group members are not only motivated to protect the group to preserve their social status, but feel compelled to justify their group behavior (dominant or subordinate) through ahierarchicalsystem represented through the following omponents:Legitimizing Myths, Trimorphic Structure, and Social Dominance Orientation (Redmond, 2009). 2.2.2.3.1 Legitimizing Myths Dambrun, et al.(2009)upholds Sidanius and Prattos contention that both dominant and subordinate groups strive to sustain group-based hierarchies by the development of opposing ideologies that promote, or attenuate group inequality and domination; otherwise referred to as legitimizing myths. In other words, social groups play off each other through social policies to maintain the group hierarchy but are motivated to do so for different reasons. The differences between these reasons are referred to as behavioral asymmetry (Redmond, 2009). Asymmetry occurs when the dominant group wishes to maintain their positive social status, yet the subordinate group wishes to climb the proverbial ladder and participate in the myriad advantages of the dominant social group. As selfish as we are, social groups are not fully inclusive. These groups seek to maintain their social status by justifyingbehaviors through mitigating perceived gaps in social status. This is accomplished through legitimizing myths in the form of perceived negative stereotypes, values and beliefs against the opposing groups. â€Å"Legitimizing myths consist of attitudes, values, beliefs stereotypes, and ideologies that provide moral and intellectual justification for the social practices that distribute social value within the social system† (Sidanius and Pratto, 1999). Legitimizing myths can be broken down into two distinct groups: hierarchy-enhancing legitimizing myths (HELM) and hierarchy-attenuating legitimizing myths (HALM). HELMs not only organize individual, group, and institutional behavior in ways that sustain dominance, they often lead subordinates to collaborate with dominants in the maintenance of oppression (Pratto et al, 2006). 2.1.2.3.2. Trimorphic Structure of Group-Based Hierarchies Our predisposition to join groups is an essential element of Social Dominance Theory that assumes a trimorphic structure of group-based social hierarchy in which members are stratified into social groups based on characteristics related to the following three structures (Sidanius and Prato, 1999): Age A biologically-based system where adults are classified as socially higher (valued) than younger people. Gender Another biologically-based system in which males are classified as socially higher than women. Arbitrary set -Group-based hierarchies determineits orderbased on a virtually limitless set of factors including personal preferences, religion, beliefs, class, ethnicityor values.The age and gender systems are fixed in terms of their applicability to social groups. In other words, these stratification systems extend to all social systems as members invariably fall into a range of either group. The inclusion (or exclusion) of membership within the arbitrary set system however, is dependent upon the factor(s) applied to the group. For example, a social group based on ethnicity or religion will include a very specific subset of participants to the exclusion of all others. For these reasons, the arbitrary set system represents the most dynamic group-based social hierarchy. This system has the potential to be the most inclusive (and positive) in terms of being socially constructive, as well as the most exclusive, or socially destructive. 2.1.2.3.3.Social Dominance Orientation To better predict social group bias, Social Dominance Orientation (SDO) was developed to measure the extent to which individuals manifest discriminatory behaviors(Sidanius and Prato, 1999). SDO is defined as the degree to which individuals desire and support group-based hierarchy and the domination of inferior groups by superior groups (Ibid). 2.2. Concepts of Stress and Post Traumatic Stress Disorder 2.2.1. Combat/Traumatic Stress Stress is a word that is often used to cover a whole range of feelings and emotions. There are many varying definitions of stress. Some researchers distinguish between eustress (when something changes for the better) an

Wednesday, November 13, 2019

Terrorism - Foreign Students do Not Threaten National Security :: September 11 Terrorism Essays

Foreign Students do Not Threaten National Security In response to the horror of the September 11 terrorist attacks, America has demanded action, and we have gotten it. In addition to the U.S. military campaign in Afghanistan and the ongoing federal investigation of the events surrounding the World Trade Center attacks, we have seen a flurry of legislative and executive action designed to increase our domestic security. Yet not all of this activity has been without controversy. From Bush's executive order authorizing the use of military tribunals to try non-U.S. citizens suspected of terrorism, to Attorney General John Ashcroft's call for the questioning of thousands of Middle Eastern men, government actions are sparking a crucial debate: to what extent are we willing to sacrifice civil liberties and individual rights in the quest to make our country safer? For many students here at the university, this question is not just a matter of abstract debate. Because several of the suspects in the September 11 attacks (as well as in the previous World Trade Center bombing) are thought to have entered the United States on student visas, the relative freedom of international students to study here may soon be restricted. In the wake of the attacks, Senator Dianne Feinstein (D-California) called for a six-month moratorium on student visas, a proposal that was subsequently dropped under strong pressure from representatives of U.S. universities. Yet the international student visa process remains under strict scrutiny. The Visa Entry Reform Act, currently in the Senate Judiciary committee, proposes a number of measures to toughen up the immigration and visa system. Of particular interest are two components of the bill: the implementation of a monitoring program for foreign students, and the denial of foreign student visas to nationals of "state sponsors of international terrorism." The monitoring program would ensure that students pass a background check before arrival, and are actually enrolled in a degree program once they arrive. As such, it is a reasonable response to the real threat of terrorism which we confront. It is the second component to which I wish to object. The countries which the State Department considers to be state sponsors of terrorism are Iran, Iraq, Syria, Libya, Cuba, North Korea and Sudan. Over the last four years, we have had hundreds of students from these countries enrolled at the university.