Tuesday, December 31, 2019

Censorship in America Essays - 1668 Words

Piracy has become a major issue in the United States. For every motion picture that has been featured in theaters also has been pirated onto the Internet the next day, and for every new musical album that is released, yet there is a free torrent file of the album within the same hour. Even though these online pirates steal music and movies from other companies and make a drastic profit, yet these â€Å"rogue† websites receive 53 billions visits a year from across the globe according to Creative America. The persistence of the thieves that break copyright laws of the productions has lead the entertainment business to place a definitive complaint to the U.S. government of the constant notion of piracy. While the notion of piracy was not left†¦show more content†¦With online piracy and a great quality television, an individual do not have to spend the money to watch a movie that can be enjoyed in the comfort of that persons’ own home for free. With SOPA in effect, the movie business can once again establish great income back into movie production. The movie industry will benefit greatly if PIPA/SOPA is finally passed because U.S. citizens can no longer rely on outsources to provide free entertainment, and the nation will once again rely on buying movies, traveling to theaters, and overall spending money to buy entertainment. With that being the movie production companies’ main source of income, so now they will be able to supply the consumers with better quality production and greater sources of entertainment. Needing the support of the U.S. citizens, the movie industry has developed a couple of innovative tactics to persuade the minds of bias citizens. In October 2011, a group known as Creative America began to release commercials regarding the Protect IP Act and the Stop Online Piracy Act. These commercials stated heavily how piracy has and will affect today’s economy. A number of people will lose their jobs; many businesses will lose revenue to keep a stable company operating properly, and thus contributing to the economic recession. Recent studies show that the motion picture and television industry is responsible for 193,220 jobs and 16Show MoreRelatedEssay about Censorship in America1048 Words   |  5 Pages Censorship in America nbsp;nbsp;nbsp;nbsp;nbsp;Since this country was founded, we have had a set of unalienable rights that our constitution guarantees us to as Americans. One of the most important rights that is mentioned in our constitution is the right to free speech. â€Å"Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and toRead MoreCensorship Cases in America1404 Words   |  6 PagesCensorship is the process of suppressing something that is considered objectionable or offensive† (Truly 1). It is also the obstruction of Freedom of Expression. The process starts when a work is found offensive because its contents are considered vulgar, contradicting to beliefs and values, or violent. Concerned citizens form groups and create a strong social pressure to force the government or schools to remove the content. The information introduced in schools can contradict the ideas and valuesRead More Internet Censorship Essay - America Needs Censorship of Cyberspace1330 Words   |  6 PagesAmerica Needs Censorship of Cyberspace      Ã‚  Ã‚   In June of 1998 the country was horrified to learn of the death of James Byrd Jr. He was a 49-year-old black man who had been found horribly mutilated after being dragged to death. Authorities have charged three men with murder and violation of civil rights (A Fatal Ride in the Night 33). Obviously, if convicted, these men are guilty of a horrible crime, but what if this crime had been committed after viewing a racist website? If a personRead More Religion and Sexual Censorship in America Essay646 Words   |  3 Pagesâ€Å"Those of us who trust sexuality must not allow ourselves to be controlled by those who fear it (Marty Klein).† In America censorship has affected various mediums: print, art, television, and internet, as it pertain to sexuality. However the first amendment â€Å"protects† the right to free speak, and press. Congress has tried to pass bills to outlaw pornography, (but have failed) ban books for sexual content, and dictate what can be said on TV and radio. If the government is allowed to censor theseRead MoreEssay on America Needs Music Censorship550 Words   |  3 PagesAmerica Needs Music Censorship â€Å"Obscene: so excessive as to be offensive† (http://www.webster.com/cgi-bin/dictionary). This is the way the Webster dictionary defines obscene. How do you? Some say obscene is vulgar; others say the best way to describe obscene is through disgust. No matter how it is thought of, obscene material is everywhere in society. Television is becoming more liberal, magazines are less edited, and music is more abrasive. At some point, the public must put its foot downRead More America Needs Censorship Essay1567 Words   |  7 Pagesdisasters in life begin when you get what you want. For almost a century now, a great many intelligent, well-meaning and articulate people have argued eloquently against any kind of censorship of art and entertainment. Within the past twenty years, courts and legislatures have found these arguments so persuasive that censorship is now a relative rarity in most states. Is there triumphant exhilaration in the land? Hardly. Somehow, things have not worked out as they were supposed to, and many civil-libertariansRead More America Needs Media Censorship Essay2288 Words   |  10 PagesAmerica Needs Media Censorship Introduction In a world in which acts of heinous violence, murder or crude and shocking behavior seem to be a normal occurrence, it may lead one to wonder what has put society onto this slippery slope. How did this type of behavior come to be so acceptable and in some cases glorifiable? A careful study of society may lead to multi media as being the main cause in this changing of ideals. The modern world has become desensitized to the acts shown on televisionRead MoreAmerica Needs Internet Censorship Essay1046 Words   |  5 Pagesher computer screen. This could not have happened though. All she was doing was casually browsing the internet before a pop-up appeared. Although it may seem hard to believe, the major cause of events such as this is the lack of censorship on the internet. Internet censorship relates to the removal of offensive, inappropriate, or controversial content published online. The current problem with the internet is that there are few restrictions on what can be published or viewed. Several sites on the internetRead MoreEssay about Censorship of the 1950s and its Impacts in America2213 Words   |  9 PagesOne hears about censorship of free word happening all the time in other countries, but did it ever happen in the United States of America? Not many people know that restriction of free speech and personal expression did in fact occur in America, mainly during the 1950s. During this tumultuous time, newfound fears of threatening outside influences, mainly political in nature, had set in and as a result the government tried to protect the American public from these â€Å"radical† ideas through the use ofRead More Censorship and Information Privacy Policies in Eastern Asia and the United States of America2224 Words   |  9 PagesCensorship and Information Privacy Policies in Eastern Asia and the United States of America Introduction Fifteen or twenty years ago, no one would have been able to predict the magnitude of the impact that the evolution of computer internetworking technologies has had on the world. The advancement of computers and networking technologies, as well as the constant flow of new innovations has forever changed the way the human race communicates. People across the globe have been given a medium

Monday, December 23, 2019

Historical Challenges That Native American Women Have...

Martha Garcia and Paula Gunn Allen both write in their essays of the challenges that Native American women have historically faced and continue to confront to this day. Major contributors to these challenges are the stereotypes and misconceptions by white male anthropologists and missionaries who studied the Native American tribes and found the women subservient and passive. Both of these authors strongly disagree in this characterization of Native American women and instead portray them as important and honored members of their tribes who will struggle but will continue to have a tremendous impact on the future of their tribes. Garcia’s research concentrates on previously published works on Cheyenne women by white men and†¦show more content†¦From her research, Garcia found that Cheyenne women had visions, dreams, participated in sweat lodges and shared equally in performing traditional native activities right along with the men of the tribe. Paula G unn Allen’s article compliments and expands on Garcia’s article by revealing the important role Native American women play in their people’s physical and cultural survival. Due to the United States Government’s policies, she strongly believes the Native American population faces extinction, while some tribes have already disappeared. Gunn Allen is passionate in her description of Native American women who are on the front battle lines for the very survival of their children, people, self-respect, value systems, and they’re way of life. Gunn Allen sums up the ongoing struggle beautifully when she shares a personal reflection of , â€Å"We bond, we care, we fight, we teach, we nurse, we bear, we feed, we earn, we laugh, we love, we hang in there, no matter what.† Although Gunn Allen emphasizes the fighting spirit of the Native American women, she acknowledges that some women have given up and have turned to alcohol, drugs and even suic ide in an effort to stop the pain of poverty and abuse. Still other Native American women struggle to fight the addictions of their family and friends. Some women choose to give up by assimilating into the white world and cut ties forever with their own culture. While Garcia writes of past historical equality andShow MoreRelatedAnalysis Of Howard Zinn s The Mind Behind Dozens Of Books 1381 Words   |  6 Pagesincluded in the retelling of a historical event. A man who recognized history is collection of a variety of voices was Howard Zinn. Zinn was the mind behind dozens of books; however, he gained most attention on his work, A People s History of the United States, published in 1980. Not only did he gain attention and praise for this book—Zinn also experienced a lot of controversy. Critics believe Zinn presents American history in a light most unfavorable to Americans. However, Zinn tells the storyRead MoreEssay on Historical Trends at American Colleges and Universities1515 Words   |  7 Pages Historical Trends at American Colleges and Universities The colonial colleges were among the first colleges created and were established under religious auspices. It was believed that an educated ministry was needed to establish Christianity in the New World. Harvard College was established in 1636, followed by Yale, William and Mary, Princeton and King ‘s College later to be called Columbia University and there were also others. The general colonial college curriculum included Latin, Greek, HebrewRead MoreThe Women s Suffrage By Susan B. Anthony1195 Words   |  5 Pages stated during the women’s suffrage movement, illustrates the hypocrisy women faced during the late 1800’s. Furthermore, it displays that women’s rights can be compared to that of an enslaved human being instead of a free United States citizen. Throughout American history gender inequality has been a prevalent, ongoing, concern. Sherna Berger Gluck’s novel, From Parlor to Prison, is a collection of stories from five American suffragists depicting their lives while working towards passing the 19thRead MoreComparing Tekakwitha s Biographers Paint A Completely Pious Life1428 Words   |  6 PagesTekakwitha having the behaviour of an outcast seems â€Å"implausible† due to conflicting reports from many other Europeans (32). Women in the Mohawk community were â€Å"regard[ed] as the principal support of their families† but Greer goes on to explain that in earlier accounts, the Jesuits only mention Tekakwitha’s female relatives in passing, which is essentially problematic when historical accuracy is of such importance in hagiography (32-33). The recurring theme of paganism does to some extent explain why Chauchetià ¨reRead MoreCulture : An Integrated Whole Making It1617 Words   |  7 PagesQuestion 2 Culture is definitely one important thing. Culture is defined as the learned behavior patterns that are attained by members in a society. Throughout this entire class we have learned so much about culture and how important it is for being historical and cultures as interconnected. The idea of culture being historical is really important because all cultures are known to be apart of something bigger. In one of the readings, â€Å"culture is defined as historically produced in particular locationsRead MoreAfrican American History Is A Vital Part Of The United States982 Words   |  4 PagesAll histories are an important subject to teach in every academic levels; however, African American history is a vital part of the United States. America would not be the country she is today without the accomplishments of the slaves and founding African American scholars. Slavery brought about incredible trials and established perseverance with the African American population that future generatio ns need to know about and learn from. History teaches us our errors and our successes; furthermore,Read MoreAnalysis Of The Wild West1441 Words   |  6 PagesWestern Identity The Wild West, in American history, is often thought of as being an ideology filled with adventure and happy endings. This picture of the Wild West is largely in place due to the romanticizing of the West by Hollywood. Movies portraying the West are filled with stereotypes, whether they are purposeful or not, that do not accurately show what defines the Western persona. Stereotypical situations such as Indians being depicted as savages and noble sheriffs saving the day leaveRead MoreGender, Gender And Gender932 Words   |  4 PagesThis week’s materials have many commonalities found throughout the text, which challenges the representation of gender identity in last week’s materials. One of the similarities found throughout this week’s materials is that gender is complex. Professor Davis’s lecture â€Å"Sex Gender – It’s Complicated† defines â€Å"Binary gender: man or women, female or male, and masculine and feminine. Two distin ct categories† (slide 5). The Western society mostly see gender as binary, black and white. However, BairdRead MoreThe Time Period Of The Years Before And After The American Revolution1637 Words   |  7 PagesThe time period of the years before and after the American Revolution have been discussed and analyzed by historians and writers. Viewpoints of the founding fathers belief for this countries citizen indelible right of life, liberty and happiness provides a wide range of information for consideration. The major issues of slavery, and the expansion of Western lands would be debated before, and after the American Revolutionary War as well as into the next centuries. These viewpoints are covered byRead MoreJohn Smith, Anne Bradstreet And Thomas Jefferson1769 Words   |  8 Pagesformation of our nation, many great authors were putting their thoughts and feelings down on paper. These early American writers were the foundation upon which the literary culture of America was founded. Among these are the early writings of John Smith, Anne Bradstreet and Thomas Jefferson. Their writings were completed during a time of exploration and colonization characterized by many historical political and cultural transitions, and their literature accurately describes the events of that period. The

Sunday, December 15, 2019

Disease in the News Critical Appraisal Free Essays

There has been a rise in the number of cases of HIV/AIDS in men who have sex with men in the US. Trends suggest that between the years 2001 to 2004, the number of HIV/AIDS cases is rising in African American and Hispanic populations compared to the White population. The survival rates after 3 years were the lowest for men belonging to the African American and the Hispanic community compared to the White community. We will write a custom essay sample on Disease in the News Critical Appraisal or any similar topic only for you Order Now Since, the year 1999, there has been a rise in the number of cases of HIV/AIDS especially in men who have sex with other men. The article is a thoroughly peer-reviewed journal suggesting that the information is current, evidence-based, validated and researched carefully. The authors of the article include Hall, H. I. , Byers, R. H. , Ling, Q. , and Espinoza, L. They work for the Division of HIV/AIDS Prevention, which is a unit of the Center for Disease Control and Prevention (CDC), Atlanta, US. The journal has given the details including the contact address and the email ID of the authors thus permitting clearance of queries and doubts. The authors are well versed and experienced in the field of HIV/AIDS. Hall and Byers have completed their PhD, Ling has done MS, and Espinoza has completed DDS. The authors are from various groups, and hence they would express the problems of these groups in their work. Each of the authors has played a different role in bringing out the journal. The writing, origin of the study, designing of the study, review and the interpretation has been done by Hall. Major contributions of the writings and modeling of the data has been done by Byers. Ling has performed analysis of the data and the data progression details. Espinoza has done the interpretation and discussion of the data. As this study was just about collecting data and not performing a clinical trial, it did not involve following a protocol. The article has been broken into various subtopics including abstract, introduction, methods, results, discussion, conclusion and references. Credential web sites such as Pub med and the CDC have also cited the article. The article is about the diagnosis of HIV in the male homosexual population, and determining the rate at which the disease progresses. The researchers are interested on working with this topic as highly active antiretroviral therapy (HAART) has seemed effective in delaying the symptoms of the disease and the development of fatal outcomes from the disease. In the 1990’s, there was a reduction in the mortality rates arising from AIDS, due to development of HAART. This therapy is able to reduce the viral load. Since the year 1999, there has been a rise in the number of cases of HIV/AIDS due to the increase in homosexual men amongst certain segments of the population. Another indicator of the trend of men having sex with other men was the rise in the number of cases of syphilis in the male homosexual population. The cases of HIV/AIDS were especially high in men below the age of 30 years. In other parts of the world, the results obtained from similar studies were different. For example, in the UK, it was found that the high incidences of HIV/AIDS were observed in men who had sex with men between the ages of 25 to 44. The incidences of HIV/AIDS increased in higher numbers in the African-American and Latin populations compared to the Whites. It was about 10 and 3 times higher. Before this study was conducted, HIV/AIDS was not detected in a high proportion of the study model. The Whites were more aware of their HIV status compared to the Hispanics and the African-American population. This suggests that the Whites are more likely to start HAART faster and develop better outcomes with the disease. The data was collected for this study by the HIV surveillance system in place. Several statistical methods such as Poisson regression was utilized to determine the HIV diagnosis rates. The study demonstrated that higher rates of HIV/AIDS were observed in homosexual men belonging to African-American and Hispanic background compared to other segments of the population. Besides, the survival rates after 3 years was also lower the same populations. HIV progressed faster in Hispanics and African population. The article talks about a specific population, namely the homosexual men. The geographical area of this study was limited to the United States. However, the results of the study were compared to other countries such as the United Kingdom. The various ethnic groups that were studied included Hispanics, African-American and Whites. The CDC performed the study. The article does make claims of the treatment. In this case, it is HAART to treat HIV/AIDS. HAART plays a major role in reducing the mortality and morbidity from HIV. The study picks up some evidence available from 1996-1999 in which HAART was utilized to reduce the transmission of HIV infection. This may be in the fact that HAART helps to reduce the viral load in infected people. The article speaks of the ongoing emphasis given to the Governments Healthy People 2010 policy, and the need to reduce the transmission of HIV infection. The article also aims to reduce the transmission of HIV/AIDS in the homosexual male population especially. There are various strategies suggested for treatment including prevention, early diagnosis, HAART therapy, etc. The article has used about 48 current and relevant journals written by authors whose credentials are also good. The user can access the abstract of the references by clicking on the link provided. References: Espinoza, L., Hall, H. I., Campsmith, M. L. et al (2005), â€Å"Trends in HIV/AIDS Diagnoses — 33 States, 2001—2004,† CDC MMWR, 54(45), 1149-1153. http://www.cdc.gov/mmwr/preview/mmwrhtml/mm5445a1.htm Hall, H. I., Byers, R. H., Ling, Q. et al (2007), â€Å"Racial/Ethnic and Age Disparities in HIV Prevalence and Disease Progression Among Men Who Have Sex With Men in the United States.† AJPH, 97(6), 1060-1066. http://www.ajph.org/cgi/content/full/97/6/1060 How to cite Disease in the News Critical Appraisal, Papers

Saturday, December 7, 2019

Organizational Behaviour Global Management â€Myassignmenthelp.Com

Question: Discuss About The Organizational Behaviour Global Management? Answer: Introducation Global business is referring to the purchase and sale of the products and services within various countries. A global business is an organization that is having its operation in majority of the countries across the globe. While the organization might be having its headquarters as well as major operations centre in one country, its products as well as services are used all over the world. Certain examples of global businesses take into consideration the Coca-Cola Company and Sony Electronics (Alfes 2013) There exists four basic form of global business. In regard to importing and exporting, it can be stated that importing or exporting or both is considered to be the most basic and largest global business activity. It is the simplest process of making an entry to a market with a small capital outlay. Exporting is to make a product at a domestic location of the organization and conducting its sale in a different country. Importing is to bring products, services as well as capital into the home country from abroad. For instance, automotive organizations such as GM, Toyota, and Volkswagen do the exporting of cars to various countries across the globe. Food retailers do the importing of global products and sell them in domestic stores (Morgeson 2013). There are several strengths associated with exporting. The organization will be able to make significant expansion of its markets, leaving it less dependent on any individual market. Moreover, rise in production will be leading towards larger economies of scale and better margins. With the development of the organizational business in the foreign market, the company will be having increased flexibility for improving or redirecting its marketing endeavours (Wagner 2014). On the other hand, there are certain weaknesses associated with exporting as well. One of the weaknesses is associated with extra costs. Since, it will be taking more time for developing extra markets, and there exists longer periods of pay back, the up-front expenses to do the development of new materials for promotion, allocation of personnel for travelling and other administrative expenses in relation with the marketing of the product, will be restraining the financial resources of organizations. Another weakness is associated with market information. To find information regarding global markets is undeniably more challenging as well as time-consuming in comparison to finding information as well as evaluating local markets. In underdeveloped countries, for instance, steadfast business practice information, market traits, barriers regarding cultural aspects might not be available (Luthans 2015). There are certain strengths associated with importing. To import raw materials and products is considered being one of the paths to increase the margins of profit. Also, an importer will be having the accessibility of resources that are considered to be regionally exclusive as well as cheap labour towards the production of goods. However, certain weaknesses are also there in respect of importing (Chmiel 2017). One of them states that the importing of products will be leading towards the aspect of the local market getting eroded and in particular, national economies when there will occur a deficit regarding trade, i.e. there is higher import in comparison to export. In regard to licensing it can be stated that, it is an association between organizations of various countries. An organization will be allowing another one to do the utilization of its brand name, copyright, technology, patent, trademark or other assets in exchange for an amount depending upon sales. Licensing of intellectual properties like patents, copyrights, processes of manufacturing or trade names is abounding across the nations. Organizations might be choosing to do the manufacturing or selling of their products under licensing when there exists very high transportation or domestic costs of production, regulations of governments restricting the activities of business of foreign organizations or the organization wants purely to do the production as well as selling of similar quality at all places (Wilson 2013). For instance, Starbucks throughout the world is selling same-quality beverages in similar-looking stores under the contracts of licensing. There are certain strengths associated with licensing. To issue a license will be providing immediate as well as definite revenue in respect of the licensing organization. The license agreement will be requiring various kinds of payments, which includes a definite license payment or inconsistent payments depending upon the profits incurred by the licensee business. Either way, the licensee is making the payment in respect of the right for holding the license that is producing revenues in respect of the licensing organization. Another understated strength to do the licensing of a business process is promoting the aspect of brand recognition (Goetsch 2014). This will assist in providing credibility for the brand as well as recognition advantages in respect of the licensing organization, since more individuals are becoming alert that the licensing organization is having the responsibility towards the production regarding the licensee business. On the other hand, there are certain weaknesses associated with licensing. One of the key weaknesses to issue a license is that it does the creation of competition. A licensing organization, might be attempting towards limiting the competition by restraining the opportunity of the license to the utmost. Another weakness associated with the aspect of licensing is that it increases the exposure of the companys confidential, proprietary process of production. When more number of individuals will be having the knowledge of the organizational process, the greater will be the threat that someone might be breaching the confidentiality (Alfes 2013). This is particularly correct where the licensing organization is being unable to control the staffs directly as well as contractors who are working with the licensee business. In regard to franchising, it can be stated that it is an option in which a parent organization will be granting another organization the right for conducting business in a fixed way. Franchising is different from licensing based upon the fact that it normally requires the franchisee to do the following of much stringent guidelines to run the business in comparison to licensing. Moreover, franchising is having more popularity regarding service organizations such as hotels, restaurants as well as rental services (Luthans 2015). There are certain strengths associated with franchising. To create an effective model of business is considered being one of the means for launching a business that is considered to be successful. In this regard, it can be stated that one of the strengths of franchises is that they are depending upon the business models that already exists and are considered being successful (Alfes 2013). For instance, there are McDonalds franchises throughout the globe, so when a new McDonalds location gets opened, there can occur absolute confidence that there already exists a sound business model, and there is no requirement for spending time as well as effort to craft a business model from the beginning. Another aspect of strength is associated with the fact that the franchisees are selling products as well as services that might already be having familiarity with the customers (Miner 2015). Customers might be having more affinity for using the products or services that have been used by them in the past or which is having a reputation that has been established. For instance, franchises like Taco Bell, Subway are having strong recognition of name that can assist in attracting customers. However, there are certain weaknesses relating to the franchises as well. One of the weaknesses is that most of the time, franchisors will have the requirement for someone to pay a certain minimum amount for opening at a new location. Franchisors might as well be taking a portion of the profits, requiring the individual to make the payment of partial management fees, or do the purchasing of products from them. As a result, to start as well as operate a franchise might be considered being more costly than to start a small business. Another weakness regarding the franchises is that an individual is subjected to the franchisee agreement terms that will possibly be containing a number of rules that will be restraining the ways by which the business could be run (Cameron 2015). In regard to Foreign Direct Investment (FDI), it can be stated that it is referring to operations in one country that are being administered by entities in a foreign country. The meaning of FDI is to build new services in a different country. There exist two kinds of foreign direct investment such as joint ventures as well as wholly-owned subsidiaries (Reynolds 2017). The strength regarding FDI is that it is considered beneficial in respect of the global economy, and also for the investors as well as the recipients. There occurs investment of capital into the business with the optimum prospects for development, anywhere across the globe. The reason for this is that the investors are seeking optimum return with the minimum amount of risk (Armstrong 2014). The weakness regarding FDI is that the countries should not be allowing excessive foreign ownership of organizations in industries that are considered being strategically significant. This might be lowering the countrys comparative advantage. To conclude the assignment, it can be stated that there are various forms of global business that has been discussed and each of the global business form is having its individual attributes that are associated with certain advantages as well as disadvantages Reference Alfes, K., Shantz, A.D., Truss, C. and Soane, E.C., 2013. The link between perceived human resource management practices, engagement and employee behaviour: a moderated mediation model.The international journal of human resource management,24(2), pp.330-351. Armstrong, M. and Taylor, S., 2014.Armstrong's handbook of human resource management practice. Kogan Page Publishers. Cameron, E. and Green, M., 2015.Making sense of change management: A complete guide to the models, tools and techniques of organizational change. Kogan Page Publishers. Chmiel, N., Fraccaroli, F. and Sverke, M. eds., 2017.An Introduction to Work and Organizational Psychology: An International Perspective. John Wiley Sons. Goetsch, D.L. and Davis, S.B., 2014.Quality management for organizational excellence. Upper Saddle River, NJ: pearson. Luthans, F., Luthans, B.C. and Luthans, K.W., 2015.Organizational behavior: An evidence-based approach. IAP. Miner, J.B., 2015.Organizational behavior 1: Essential theories of motivation and leadership. Routledge. Morgeson, F.P., Aguinis, H., Waldman, D.A. and Siegel, D.S., 2013. Extending corporate social responsibility research to the human resource management and organizational behavior domains: A look to the future.Personnel Psychology,66(4), pp.805-824. Ranjan, P., 2017. Human Resource Management and Organizational Behaviour.Journal of HR, Organizational Behaviour Entrepreneurship Development,1(1), pp.8-12. Reynolds, M., 2017.Organizing reflection. Routledge. Wagner III, J.A. and Hollenbeck, J.R., 2014.Organizational behavior: Securing competitive advantage. Routledge. Wilson, F.M., 2013.Organizational behaviour and work: a critical introduction. Oxford University Press.

Friday, November 29, 2019

Arts Essays

Arts Essays Arts Paper Arts Paper Over the past few months, the media has drawn attention to the inhumane treatment of women in many Muslim societies.As a result of an influx of technological advances, Muslims societies are more aware of customs in other cultures.This awareness is slowly changing many Muslim beliefs.The atrocities that are portrayed by way of the media often represent extreme and isolated events, thereby depicting the plight of women as more harsh and widespread than it may actually be. The Muslim culture considers women to be inferior to men; women have been treated like second-class citizens for centuries.Many Muslims believe that a man is superior to a woman in both intellect and spirituality.This custom is based on verses from the Quran (Koran), the following verse reinforces these views.Men are in charge of women, because Allah hath men the one of them to excel the other, and because they spend of their property (for the support of women) (Yusufali 4: 34). Muslim women are often referred to as s hadows, because they rarely speak and are seldom seen.It is held that a womans place is home, where she can pray frequently.Because it is considered shameful for a woman to expose any part of her body publicly, she covers her face and body with what is referred to as a burqa during the isolated occasions where she leaves her home.It is believed that a woman who is lacking beauty will not sexually temp a man, for this reason, some societies will allow her to expose her face.It is an honor to be chosen as a Muslim wife, for this honor, a wife is expected to strive to please her husband.Traditionally, Muslim women are raised to be completely submissive to their husbands.The wishes of a husband must never be denied, doing so could result in a beating.A man has the legal right to beat his wife if she violates any of the

Monday, November 25, 2019

Aitken Spence Hotel

Aitken Spence Hotel The situation The Aitken Spencer hotel is a successful project that has achieved its purpose and goals beyond the initial expectations. Like many projects undertaken in ecologically sensitive places, the project initially generated controversy and invoked resistance among the population of Kandalama community.Advertising We will write a custom article sample on Aitken Spence Hotel specifically for you for only $16.05 $11/page Learn More However, the current picture speaks differently about the attitude of the people of Kandalama towards the projects and the awards and recognitions too are a proof that the hotel has lived to its pre construction billing as environmental friendly. The hotel has engaged the surrounding community in different ways which has won their trust and ensured continued support. Corporate social responsibility activities like characterize the current partnership between the people and the project management. First priority job offers to the local youths, scholarships and study centers have ensured the villagers gain first hand from hotel business. Also, the fact that minimal environmental damage has occurred in the environment where the hotel is situated coupled with green waste management techniques have ensured critical support from the stakeholders including employees and even guests. The hotel looks set to continue with the policy of involving the locals in its operations and pursuing green initiatives to conserve the environment and also to cut costs involved in waste disposal. Different location Though there was minimal damage to the environment in Kandalama, the bottom-line remains that the advantages the environment has gained from the project far more exceeds the negative impacts. A different location in Sri Lanka could have undergone changes same way Kandalama did. The time and careful planning that the hotel management ensured minimal damage to the surrounding. The policies that were adopted ensured more merits than demerits for the environment. Given that people anywhere in the country could have raised objections to the environment, Aitken Spencer Hotel management could have made the same adjustments to suit to the community needs and concerns. Therefore, building the hotel anywhere else could have been beneficial to the environment.Advertising Looking for article on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More However, it is difficult to say for sure if the construction in another place could have been better. The current situation in Kandalama is good. The policies and management practices that have been adopted by the hotel leadership could have been applied in another place just like Kandalama. Improved Quality of Life The construction of the hotel came with many advantages for the locals than they had anticipated. The social and community development initiatives that the hotel management put in place helped in greatly turning around the lives of the villagers in Kandalama (Geok Buche, 2008, p 8). The strategies targeted sustainability by focusing on quality, productivity and corporate social responsibility. The quality of life has further been boosted by the bottom up approach with heavy grassroots involvement. The Social and Environmental committee of the hotel implemented projects that touched on public works, education, healthcare, community projects and the environment. Many locals have secured employment, their literacy levels have improved and the environment is still preserved. Perhaps the biggest benefit that the people of Kandalama have had so far is the employment that has come with the setting up of the hotel. The resort has in place a policy to recruit 60% of its staff locally from a radius of 35 miles. Some of the locals who had joined the business in its early days have even risen to the rank of managers giving it a strong local feel on the staff. Locals now enjoy better roads built through the funds contributed by the hotel. There is plenty of water available to schools through the wells drilled by the resort’s support. The village population and the schools also enjoy electricity that was brought to the area thanks to the construction of the hotel. Provision of healthcare is another benefit that the people have enjoyed from establishment of the Hotel in Kandalama. The local population has benefited from the donation of numerous pairs of spectacles by the hotel. Besides, there have been various health campaigns involving glaucoma testing, blood donations and major hospitals repairs thanks to the donations of the Kandalama resort (Geok Buche, 2008, p 8). Before its establishment, the local population faired badly in their international language skills especially English. However that did not deter the management from employing the locals while providing them with the necessary assistance to learn the language.Advertising We w ill write a custom article sample on Aitken Spence Hotel specifically for you for only $16.05 $11/page Learn More Educational facilities that have been developed include libraries, an English Language training centre and also a home science theatre. Locals have enrolled in these centers where they are trained in different disciplines equipping them with the necessary skills to work in the hotel and elsewhere. Besides, there have been donations of books, toys and other supplies and equipment. They have employed professionals to coach for sports and sports (Geok Buche, 2008, p 8). Various sponsorships of exhibitions, debates and art competitions while providing schools with maintainace and repairs grants (Geok Buche, 2008, p 8). Community projects focusing on the sensitive and social needs of the community of Kandalama have been commissioned by the hotel, greatly improving the lives of the people. Charitable events such as clean up campaigns, hosting of orphans and disabled people and soldiers from the Sri Lankan war have characterized the community activities that have impacted widely on the community. There are also the donations of housing equipment to the poor, building houses for homeless villagers, and provision of maintainace to building works to temples and other public places. The environment that had generated controversy at the beginning of the projects was also given priority. Besides the locals enjoying the benefits highlighted above, there environment got constant care through the hotels, corporate social responsibility initiatives. The main advantage here is the continuous monitoring of the environment that did not exist before, a boost to the people who rely on it for their survivals and religious needs. The archaeological reserves have been cleaned up while more trees have been donated and planted in the available spaces of the forest. The local population has gained through continuous education on environmental awareness by holding events in public schools. The waste that used to be disposed wholly is now turned into composite waste through the 3R’s and 7R’s management systems (Geok Buche, 2008, p 9).Advertising Looking for article on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More There are other cash donations that from the hotel guests and management to the local community. Other items that have been donated include lunch packets for the needy people and for school children, curtains and mattresses to hospitals, roofing materials for families and hospitals. Effectiveness of the Environmental protection systems The success of any environment protection measures can only be determined if its judged against the original concerns, how they were addressed and how the outcomes were. The concerns were; deforestation, soil erosion and increase in the production of solid waste in the environment. Very few trees were cut to make way for the construction of the hotel In fact the architect had to modify the hotel design to make sure very few trees were cut during the construction. There were no trees cut. Where necessary, trees were relocated using the â€Å"the root ball† technique that ensured trees survived in their new locations (Geok Buche, 2008, p 4). Wat er did not reduce in the village since forests were not destroyed and the architect’s decided to sink tube wells to access ground water. Even then caution was taken to ensure the vibrations did not harm the environment in any way, especially the soil. This water proved much easier to treat and was a lot more pure which required less energy to treat. Waste management was one of the areas where success was recorded. Initially the focus was on the 3R techniques while later on, the focus shifted to the 7R technique. Through these techniques, recycling has ensured the Kandalama place is solid waste free and almost 100% of the refuse is reused or processes to more useful forms of waste that is beneficial to the community. Hypothesis â€Å"Building the Aitken Spence Hotel increased tourism while having little impact on the local environment and improving the local economy.† The above statement pretty much summarizes the whole case study about the Kandalama resort. Tourism in the Kandalama and Sri Lanka in general increased after the lull in violence and the construction of facilities like the Kandalama Hotel. Many guests arrived in Sri Lanka and used the facility a clear sign that tourism improved after the construction. For instance, there was a group of 135 guests from Lebanon who had visited the place and greatly helped in renovating a school besides donating money to support it. The environment suffered little damage and the waste management initiatives taken after the hotel started its operations ensured an almost zero negative impact on the environment. No trees were cut during and after the construction. The tank that supplied water to the farmers was spared as the hotel sought alternative means of obtaining water and the sacred places of the Monks and Buddhists were unaffected during and after the construction (Geok Buche, 2008, p 5). There was no waste dumped in the village since all was recycled or reused in the hotel and the village. The hot el management formed various committees that sought environmental friendly practices on areas such as water usage, air and sound pollution, solid waste management, ecosystem management and social and cultural development (Geok Buche, 2008, p 8). These committees were responsible for the positive developments that the environment underwent during the construction and after the completion of the project. An environmental management system was integrated into the hotel’s operations and financial management systems highlighting the importance of conserving the environment to the managers and staff. They were trained to incorporate environment conservation into their daily routines (Geok Buche, 2008, p 8). The local economy too improved tremendously after the hotel was constructed in Kandalama. Many youths from the village secured jobs while access to basic amenities like electricity and water was improved. Basic infrastructure like roads, schools and hospitals greatly improved the literacy an d health of the population that in turn helped boost the economy of the region (Geok Buche, 2008, p 9). SWOT Analysis A SWOT analysis on the Kandalama hotel is necessary to shed some light on the direction and future of the business in Sri Lanka. Strengths There are many advantages that play to the hotel’s favor and which easily gives the business an upper hand in the tourism sector in Kandalama and the country generally. The friendliness of the surrounding community towards the business is one such advantage. Initially the people were opposed to the project on the grounds that it was going disrupt the natural system and the way of life of the people. However, their change of heart and eventual embracing of the business became a plus to the hotel. The locals were happy with the integration strategies and community development initiatives that the management pursued. Any expansion plans the business may have are therefore likely to enjoy goodwill from the comm unity given that they have already proves their worthiness. The green initiatives put in place to manage the environment are also another strength that Kandalama hotel enjoys in the area. They have helped the hotel cut costs in waste management practices and also helped in the conservation of the environment. Any project they may have on the cards will not depend on initiatives that will start from scratch hence a strength that can be utilized. Weaknesses Though the hotel has many advantages, some factors may not play to its favor. There is risk of creating overdependence among the surrounding population. Any withdrawal of the policies that the locals consider beneficial to them may lead to a backlash. It will be difficult to change the policies that benefit whether they make business sense or not. Compared to other hotels that have not deeply integrated with the surrounding population and can therefore make decisions without fear of backlash, Kandalama hotel is at a disadvantage. O pportunities There are many spots in the country that are underdeveloped or completely undeveloped and offer good prospects for tourists. The hotel can develop the vast areas of the country that have tourism potential. Because of the success of the project, the authorities are likely to agree to such a project. Threats Though conserving the environment, there is a threat of the environmental factors dictating the direction of the business too much. It is almost impossible for hotel management to modify the hotel by eliminating part of the environment where it stands, even if the modification is absolutely necessary. Conclusion The construction of Kandalama hotel can be termed as a success and an exemplary way of involving corporate socials responsibility and business. Its serves to demonstrate how businesses can involve the population to ensure success is achieved and both financial and social goals are achieved. Reference Geok, B Buche, I. (2008). Aitken Spence Hotel Holdings Plc of Sri Lanka: A sustainable tourism as competitive strategy (B). Heritance Kandalama: Asian Business Centre.

Friday, November 22, 2019

Behaviouralism Essay Example | Topics and Well Written Essays - 3000 words

Behaviouralism - Essay Example All throughout its short history, behaviouralism and the definitions appended to it had always caused disagreements and confusion. Waldo for instance, stated that the even the concept itself emerged as confounding and vague.2 Easton admitted that those who endeavoured to define the idea only strove to bestow it his own personal definition3 and concluded that it was useless to classify behaviouralism using a definite categorization system4. A similar warning has been put forth by David Truman who argued that those who generalise the definition of behaviouralism commit blunders, as the concept was a rebellion against orthodox methodologies utilised in the study of politics.5 This is the difficulty in interpreting the meaning of behaviouralism, since authorities, to whom we can always base our interpretations, on this concept abound.6 The confusion brought about by the definition or the lack of it, led many to contend that behaviouralism did not seem to exist, at all. ... dedness'.7 The term itself became more associated with various scholars, majority of them Americans, who showed disappointment on the achievements of orthodox political science, which based its study on history, philosophy and the 'descriptive-institutional approach'.8 These 'rebels' in the field asserted that other approach could either subsist or could be advanced in order to assist political science in providing it empirical methodology and systematic theories which would employ close, direct and 'rigorously controlled observations of political events'.9 At this time, the concept of political behaviour became more familiar after Charles E. Merriam initiated the call for research in this field. The call also included those involved in the study of political behaviour referred to as 'behaviouralists' although there were those who were more comfortable being labelled with the expression 'behaviourist'.10 However, David Easton insisted that it was significant to discriminate the 'beha viouralists' from the 'behaviourists'.11 The development of the concept spread more rapidly near the end of the 1940's and the start of the 50's, its period of rapid emergence and propagation. American political scientists of the era began to draw their theories and thoughts on these experiences. 12 Writings and literature on the subject continued to appear in the first half of the 20th century.13 In his book, Dwight Waldo first used the word 'behaviouralism' in the introductory text but there existed a few who used it much earlier. Scholars and political scientists began to use the expression more widely after 1956.14 However, the concept became more popular as more works appeared in that era in which the term 'behaviouralism' was mentioned in various publications. Critics against

Wednesday, November 20, 2019

Jet Star Essay Example | Topics and Well Written Essays - 750 words

Jet Star - Essay Example The research shows that the core product offered by Jetstar, is low cost fares without compromising on quality. This has been successful so far, largely due to an operational model which consists of a network of point to point services. Via a SWOT analysis, it was found that the strengths of the company centre on its product range, affiliation with Qantas and expansion through joint ventures. Weaknesses centre on negative customer reviews, reputation issues and poor employee relations. It was found that the threats to the company primarily surround its competitors; Tiger Airways and Virgin Australia, as they offer a similar product. The opportunities available to Jetstar currently centre on market opportunities and growth, potential Asian customers and an increasing consumer reliance on the internet. It is recommended that in order for continued market success, the company focus on service and reliability at a low price, in order to increase their customer base and differentiate themselves from competitors. It is also recommended that the company expand further within Asia and develop and a loyalty program. This report finds that Jetsar Airlines currently enjoy a lucrative position within its domestic market, with strong potential to enjoy success internationally. The product offered by the company, that of low-cost fares without compromising on quality has so far been received well by the consumer. This has also been supplemented by a range of other products. Using Jetstar.com as the single distribution channel for the company has also been successful, due to the ever increasing numbers of consumers which are using the internet. As the external analysis highlights, the competitor situation for Jetstar primarily focuses on Tiger Airways and Virgin Australia, as both airlines offer a similar low-cost product. However, the macro-environmental situation for the company appears extremely positive due to its healthy domestic

Monday, November 18, 2019

Compare and contrast the responses of Japan, China, and India to Essay

Compare and contrast the responses of Japan, China, and India to Western Imperialism - Essay Example China sort of made the rules and had the technology and was powerful, so they were able to fend off Western intervention for a long time. But when their defenses finally broke down in the nineteenth century, China collapsed. Japan fended it off almost entirely. That's why Japan is the one area of the Third World that developed. That's striking. The one part of the Third World that wasn't colonized is the one part that's part of the industrialized world. That's not by accident† (Chomsky, 1993). India, China and Japan demonstrate that there is a direct correlation between degree of involvement and colonization and ultimate success. India is the most colonized of the three: It was largely controlled by the British by the 1700s (Keay, 2001; Chomsky, 1993). In the 16th century, it was already dealing with extensive incursions from Portugal, the Netherlands, France and Britain, and the Europeans eventually emerged victorious over Muslim and Hindu kings, with the East India Company ta king much of the country's control until the Sepoy Mutiny brought it under direct control of the crown (Keay, 2001, 250-500). India is a very complex country: A leader of the non-aligned movement, one that tried to balance between Communism and capitalism, Leninism and free markets... (Khilnani, 1999). Nonetheless, it was in many ways uniquely devastated by colonization. It had burgeoning industries of large-scale sophistication, with good quality in crops and shipbuilding and prosperity in many ways comparable to the Europeans (Keay, 2001; Chomsky, 1993). That was consciously destroyed. The result is that â€Å"India's rural landscape looks rather different from that of most tropical ex-colonies† (Keay, 2001, 448). Two crops were developed, indigo and poppy, across the country, and tea and cotton is still grown in Assam and Kerala, but in most areas, small cottages still produce without much capitalization or integration (Keay, 2001, 448-449). Nehru, in a review of Indian de velopment, found a direct correlation between poverty and length of European control: â€Å" When the British first moved into Bengal, it was one of the richest places in the world. The first British merchant warriors described it as a paradise. That area is now Bangladesh and Calcutta—the very symbols of despair and hopelessness† (Chomsky, 1994, 56). Of course, it's an important point to make that at least in India, the native population wasn't simply exterminated, like in North America. India is a growing economy now, but with a billion people, it is still nowhere near as prosperous as countries with one-fifth or less of its population size. In 2009, the United States had $45,989 per capita, the UK had $35,165 and India had $1,134. For comparison, China has $3,744 GDP per capita and Japan $39,738 (World Bank, 2009). Per capita income variation among these three countries is thirty fold: India was totally integrated and is now a Third World country; China resisted to some extent and is a Second World country; and Japan kept the Europeans at bay almost entirely and is a First World country. India was explored because of tea, cotton, indigo, and for the standard reasons for colonization: A market for cheap goods and cheap employment (Keay, 2001). However, unlike many other colonies, India was also colonized to destroy its native industries so as to prevent competition (Chomsky, 1993). Meanwhile, China was not fully colonized, but major efforts were made

Saturday, November 16, 2019

Gibbs-Donnan Effect on Resting Membrane Potential

Gibbs-Donnan Effect on Resting Membrane Potential How the Gibbs-Donnan equilibrium conditions and diffusion through a semipermeable membrane are involved in creating the resting membrane potential Introduction The resting membrane potential (RMP) is an electrical potential difference in cells, occurring across their plasma membranes. The cytoplasm of the cell is electrically negative in comparison to the surrounding extracellular fluid, this difference in electrical charge gives rise to the RMP. The RMP is essential for the functioning of many electrically excitable cells including, neuronal cells, smooth and skeletal muscle cells, as well as cardiac myocytes, which through electrical impulses control the contractility of the heart. During this essay the generation of the resting membrane potential will be explored, including the effects of the Gibbs-Donnan equilibrium conditions, the structure and function of the plasma membrane, and how, with the diffusion of ions through a semi permeable membrane they give rise to the RMP. (Levy, N. et al.2006) Plasma Membrane The plasma membrane asserts tight control over the interstitial environment of the cell, this is achieved through the formation of a phospholipid bilayer containing protein constituents (ref). Phospholipids are distributed into two leaflets within the bilayer, with the hydrophobic portions facing inwards and the hydrophilic tails of the phospholipids facing the aqueous environment, the presence of phospholipids give the membrane its capacitance. Integral membrane proteins and ion channel proteins span the length of the membrane, like that of the Na+-K+ pump and Sodium-Potassium leak channels discussed later, which aid in the conductance of the cell membrane. The inter and extracellular surfaces of the membrane are negatively charged, due to the presence of acidic phospholipids and the anionic nature of proteins at biological pH, this negative charge on the outer membranes with respect to extra and intracellular fluid is known as the zeta potential, which causes the formation of a sma ll electrical field (ref); This electrical field works to achieve electroneutrality with opposing charged particles, and by doing so aids in the formation of concentration gradients. Changes to surface charges within the plasma membrane, such as ionic concentrations, can therefore effect the resting membrane potential and the ability of a cell to reach threshold (Sperelakis, N. 1998). Concentration gradient and Electrical Potential To understand how the flow of ions contribute to the RMP, the formation of a concentration gradient and electrical potential must first be understood. Molecules diffuse from an area of high concentration to an area of lower concentration, if two aqueous compartments separated by a membrane were formed, containing equal concentrations of the X molecule then no diffusion would occur between compartments (Figure 1). However if the concentration of X increased in compartment A, then the ion would flow down its concentration gradient into compartment B until equilibrium is reached between compartments. However diffusion is more complexed in biological compartments as ions are found in the form of cations and anions. If an X+ion was placed in compartment A, which contained a higher concentration of X+than compartment B, then X+ would again flow down its concentration gradient into compartment B, however X+ now also flows against its concentration gradient back into compartment A, due to th e electrical potential difference across the membrane, generated by the loss of cations from compartment A, causing an increase in negativity, and an increase in X+in compartment B, increasing electrical charge opposing cations (Figure 2); This movement of ions causes a potential difference to arise between compartments, increased movement of X+ down its concentration gradient, increases the potential difference, and decreases the ability of X+ to move against its electrical gradients, thus an equilibrium is reached between the concentration gradient and electrical gradient, known as the equilibrium potential (Aidley, D.1989). Gibbs-Donnan Equilibrium The cytoplasm of eukaryotic cells contain permeable ions as well as many impermeable ionised molecules that cannot penetrate the cell membrane, such as proteins, nucleic acids and glycoproteins. Many of these intracellular molecules are negatively charged at physiological pH, causing a notable effect on the concentration gradient and electrical potential of permeable cations and anions across the plasma membrane. The effect of impermeable intracellular anionic molecules therefore influences the resting membrane potential, this is known as a Gibbs-Donnan equilibrium. Again consider two aqueous compartments separated by a semi permeable membrane, compartment A contains Na+ and proteins (Pr-), compartment B contains Na+ and Cl- (Figure 3a). The semi permeable membrane is permeable to Na+, Cl- and Water but impermeable to Pr-. Compartment A and B contain 0.1 molar solutions of Na protinate and NaCl respectively, as the concentration of Cl- is higher in compartment B it diffuses down its concentration gradient into compartment A, this is turn causes the creation of an electrical potential as compartment A increases in negativity due to the anionic properties of Cl-, prompting a flux of K+ down its electrical gradient from compartment B to A. Equilibrium will eventually occur between compartments so that the concentration of Na+ and Cl- are equal (Figure 3b): [Na+]A[Cl-]A= [Na+]B[Cl-]B This is known as Gibbs-Donnan equilibrium conditions (Sperelakis, N.1998). However it must be noted from the equations that only the permeate ions satisfy the gibbs-donnan equilibrium conditions, the impermeable Pr- are not included as they are unable to diffuse and reach equilibrium (Sperelakis, N.1998). Applying the Nernst equation for either Na+ or Cl- results in a negative electrical potential, this is due to the impermeable protein ions in chamber A (Sperelakis, N.1998), these negative impermeable intracellular anions therefore contribute to the negativity of the cytoplasm in relation to the extracellular fluid, contributing to the resting membrane potential (Donnan, F). Another property of Gibbs-Donnan equilibria should be noted, looking at figure 3b it can be seen that the net concentration of NaCl in chamber A is greater than that of chamber B, this is due to the presence of protein anions in chamber A when establishing electrochemical equilibrium between ions, and is a general property of Gibbs-Donnan equilibria (Levy, N. et al.2006). Finally it is important to mention the equilibrium state of water, as previously mentioned chamber A contains a higher concentration of ions than chamber B, therefore there is a large osmotic gradient between the two chambers; This leads to a flux of water from chamber B to A, however, the osmotic effects of water influx on chamber A acts to dilute ion concentrations building up within the chamber, therefore hydrostatic pressure in chamber A would be insufficient to oppose water influx, leading to a depletion of water and NaCl ions from chamber B (Sperelakis, N.1998); However this situation does not resemble true Gi bbs-Donnan equilibrium conditions, where by the build up of osmotic pressure in chamber A would resist the further osmotic influx of water, resulting in swelling of the chamber, if it were to be enclosed, such as a living cell (Sperelakis, N.1998). If unopposed gibbs-donnan equilibrium would cause the cytoplasm of living cells to have an osmotic pressure greater than that of the surrounding extracellular fluid, as water enters cells, control over cell volume may be lost (Sperelakis, N.1998). However this is not the case due to the cells ability to transport ions (Levy, N. et al.2006). Ion transport The resting membrane potential within skeletal muscle cells is around -80mV, this is due to the differing ion concentrations between the cytoplasm and surrounding extracellular fluid (ref), this difference in ion concentrations is maintained by the active transport of ions against there electrochemical gradient, powered by metabolic energy (ref). The ion pump of most importance to preserving potential difference across the cell membrane is the Na+/K+ATPase, this pumps out three Na+ in exchange for two extracellular K+, through the hydrolysis of a membrane bound ATPase, this ratio of 3:2 leaves the cytoplasm negative in respect to the extracellular fluid, and is therefore termed an electrogenic pump (Huang, F.et al.2009). Although the Na+/K+ATPase is responsible for only a small amount of the RMP between 12-16mV in skeletal myoblasts (Sperelakis, N.1998), overtime inhibition can lead to lack of cell excitability due to the accumulation of small depolarisations. Ion Diffusion To understand how Na+, K+ diffuse across the plasma membrane causing the RMP, their intra and extracellular concentrations must be established (Figure 4). Each ion is capable of establishing a RMP, therefore the potential depends on several factors, the permeability of the membrane to each ion, the intra and extracellular concentrations of each ion and the polarity of the ions (Guyton and Hall.2000). Firstly if the membrane is only permeable to a certain ion then that ion will be solely responsible for the generation of the RMP, for example, in a nerve fibre K+ concentration is greater in the cytoplasm than the extracellular fluid, if the membrane were only permeable to K+, then K+ would diffuse down its concentration gradient into the extracellular fluid until opposed by its electrical gradient, this would leave the cytoplasm with a negative charge of around -94mV with respect to the extracellular fluid, thus K+ would be responsible for a resting membrane potential of -94mV, as this is the Nernst potential for K+ (Guyton and Hall.2000). However the RMP cannot be caused by one ion alone, as the nerve cells has a RMP of -90mV, and the Nernsts potentials for K+ and Na+ are -94mV and +61mV respectively, therefore if the RMP was caused by one univalent ion it would be equal to that of their Nernst potential (Guyton and Hall.2000). Due to the Nernst potential of K+, it can be assumed that this ion is the major contributor to the RMP, the cytoplasmic concentration of K+ is 35times higher than that of its extracellular concentration, and it diffuses through the membrane via Potassium-Sodium leak channels in which its is 100 times more permeable to than Na+ (Guyton and Hall. 2000). However Na+ also contributes to the RMP by low amounts of Na+ diffusing through the Potassium-Sodium leak channels, this small amount of diffusion leads to a ratio of 0:1 Na+ in the cytoplasm to the extracellular fluid, giving a Nernst potential of +61mV (Guyton and Hall. 2000). Using the Nernst potentials for Na+ and k+ in theGoldman-Hodgkin-Katz equationtheir contribution to the RMP can be established, this results in an internal membrane potential of -86mV (Guyton and Hall. 2000). The remaining -4mV comes from the contribution of the previously mentioned electrogenic Na+-K+ pump, leading to a RMP of -90mV in nerve fibres (Guyton and Hall. 2000). Conclusion To conclude, the RMP arises due to a combination of several factors most of which have been covered in the preceding discussions. The cell membranes structural properties allow for the capacitance and conductance of electrical charges, as well as the generation of electrical fields due to the negatively charged outer membrane, this works to aid in the formation of concentration gradients by which ions flow. In the presence of ionic species which are unable to permeate the cell membrane, such as anionic intracellular proteins, a Gibbs-Donnan equilibrium occurs, in which the distribution of permeable ions favour the intracellular environment due to the presence of impermeable anionic molecules, this disruption of ionic concentrations across the plasma membrane coupled with the presence of impermeable anionic molecules, brings about a negative intracellular environment, and thus a potential difference across the membrane. However in a closed system such as the eukaryotic cell, the Gibbs -Donnan equilibrium leads to a greater intracellular osmotic pressure, if unopposed this would lead to a loss of control over cell volume, therefore ion transporters are in place to dissipate ion concentration, like that of the Na+-K+ ATPase. The exchange ratio of 3:2 potassium for sodium respectively, performed by the Na+-K+ ATPase also contributes to the electronegative intracellular environment, and thus the resting membrane potential. The major cause of the RMP is however down to the diffusion of potassium into the extracellular fluid via Sodium-Potassium leak channels, coupled with the low extracellular diffusion of sodium and the aforementioned Na+-K+ ATPase and Gibbs-Donnan equilibrium conditions, the resting membrane potential is formed. References Sperelakis, N. 1998. Cell Physiology Source Book. Second edition. Californa: Academic Press. Aidley, D. 1989. The Physiology of Excitable Cells. Third Edition. Cambridge: Cambridge University Press. Levy, N. et al. 2006. Principles of Physiology. Fourth edition. Philadelphia: Elsevier Mosby. Huang, F. el al. 2009. Distribution of the Na/K pumps turnover rates As a function of membrane potential, temperature, and ion concentration gradients and effect of fluctuations.Journal of Physical Chemistry B113(23), pp. 8096-8102.

Wednesday, November 13, 2019

Complex Visual Hallucinations and Macular Degeneration :: Optometry Psychiatry Neurology Essays

Complex Visual Hallucinations and Macular Degeneration Located in the center of the retina, the sensitive macula provides us with sight in the center of our field of vision. When we look directly at something, the macula allows us to see the fine details. This sharp, straight-ahead vision is necessary for driving, reading, recognizing faces, and doing close work, such as sewing. Macular degeneration is the impairment of this central macular area. Age-related macular degeneration (AMD) is the most common cause of vision loss in the Western world in the over 50 age group. It most commonly affects those of northern European descent and is uncommon in African-Americans and Hispanics. The prevalence increases with age. It affects about 15% of the population by age 55, and over 30% are affected by age 75 (Miller, 1992). In macular degeneration a layer beneath the retina, called the retinal pigment epithelium (RPE), gradually wears out from its lifelong duties of disposing of retinal waste products. Eventually the capacity of the RPE layer to handle these metabolic products is overwhelmed and the RPE begins to degenerate (Miller, 1992). Other deep layers involved in development of macular degeneration are Bruch's membrane and the choroid layer. Additional factors that may hasten loss of the RPE layer, and the resulting degeneration of the central retina (macula) include hereditary factors, ultraviolet rays from sunlight, and blue iris color (more UV rays reach the retina in blue-eyed patients, probably because of the lower pigment density in the eye). There are basically two forms of macular degeneration. So-called dry (or atrophic) macular degeneration, which accounts for 90% of cases, is caused by the aging and thinning of the tissues of the macula (Miller, 1992). This type is characterized by tiny yellowish deposits under the macular part of the retina. These deposits are known as drusen and may increase in size and number over time. Areas of loss of retinal and RPE layers in the macula may gradually appear. Small clumps of brown pigment from the degenerating RPE layer also are commonly seen. The other major form of this disease is wet (or exudative macular degeneration) which is a much greater threat to vision loss even though it accounts for only 10% of cases. This type can be associated with a more sudden loss of vision due to leakage or bleeding under the macula from abnormal vessels, called the choriocapillaris, arising from one of the deeper layers.

Monday, November 11, 2019

Globalization and Perception on War

Globalization and International Organizations Assignment Submitted By A. S. M. Iqbal Bahar Rana. ID # 103-0007-085 MPPG Programme, North South University Date: 14. 11. 2011 Do you think the advent of information revolution has changed the way war is perceived by the West? If so, what are the implications of such changes for poorly-governed countries of the world? Introduction: The German philosopher Hegel held that revolutions are the locomotive of history. According to his theory, every social, political, and economic system builds up tensions and contradictions over time. Eventually these explode in revolution. One cannot create a revolution in the way that an architect designs a building. Nor is it possible to control revolutions like a conductor leads an orchestra. Revolutions are much too big and complex for that. Those who live in revolutionary times can only make a thousand small decisions and hope that they move history forward in the desired direction. Around the world today we see the growing sophistication and rapid international diffusion of powerful new information technologies, the mergers of huge communication empires, strategic alliances across borders, and the doubling of power and the halving of the price of computing every 18 months (Moore's Law). The Information Revolution, ethno-political conflicts, globalization — each of these three mega-trends is individually important for all nations' future; together, they are redefining the global context within which governments and citizens must make daily decisions in the years to come. Thus, their intersection should constitute a central concern of scholars, policy makers, and citizens. In an era of globalization, national security has a different meaning. Nation-states no longer have a monopoly on the means of coercion. Even if nuclear weapons had a deterrent value during the Cold War, today they have none as the causes of insecurity, more often than not, are economic collapse and internecine conflict, and not external aggression. The information age has revolutionized the instrument of soft power and the opportunities to apply them. The ability of a nation to project the appeal of its ideas, ideology, culture, economic model, and social and political institutions and to take advantage of its international business and telecommunications networks will leverage soft power. In simple terms, the information revolution is increasing inter-connectedness and escalating the pace of change in nearly every dimension of life. This, in turn, shapes the evolution of armed conflict. Whether in economics, politics, or war-fighting, those who are able to grasp the magnitude of this will be the best prepared to deal with it. The use of Information and Communication Technologies (ICTs) in warfare scenarios has been of central interest to governments, intelligence agencies, computer scientists and security experts for the past two decades (Arquilla and Ronfeldt 1997; Campen and Dearth 1998; Singer 2009). . ICTs gave rise to the latest revolution in military affairs (RMA) by providing new tools and processes of waging war – like network-centric warfare (NCW), and integrated command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR). This RMA concerns in the premise of military forces, as they have to deal with â€Å"the 5th dimension of warfare, information, in addition to land, sea, air and space†. Classical Perception of War: Clausewitz is under significant challenge. It is clearly alive and well in the military colleges of Western states but outside these corridors other philosophies are in the ascendancy. A debate continues to rage over the extent to which Clausewitzean thinking is still relevant to today’s wars. From today’s vantage point, several developments have eroded the appeal and power of the political philosophy of war. First, the concept of the battlefield, so central to the way in which Clausewitz understood warfare, has dissolved. The 9/11 attacks, for instance, demonstrated that today’s battlegrounds might be Western (or other) cities while the US-led ‘War on Terror’ – now rebranded as the ‘long war’ – conceives of the battlefield as literally spanning the entire globe. In the future, however, battles are unlikely to be confined to planet Earth as the US in particular will be forced to militarize space in an effort to protect the satellites upon which its communication and information systems depend (Hirst 2002). Second, as the speeches of both Osama bin Laden and US President George W. Bush make clear, the leadership cadres on both sides of the ‘War on Terror’ have often rejected political narratives of warfare. Instead, they have adopted eschatological philosophies in their respective rallying cries for a global jihad and a just war against evildoers where ideology played a significant role in waging war. A third problem for advocates of the political philosophy and one which Clausewitz obviously never encountered is war involving information technology. Information technology brings the Finally, when confronted by ‘revolutionary’ wars which cry out for counterrevolutionary responses, Clausewitz’s injunction to destroy the military forces of the adversary is problematic not just because such ‘military forces’ are often indistinguishable from the local populace but also because one can never be sure they have been eliminated ‘unless one is ready to destroy a large portion of the population’ (Rapoport 1968: 53; see also Chapter 26, this volume). As we have seen, it is fair to say, however, that the political philosophy has been the most prominent in the traditionally Anglo-American-dominated field of security studies (on the ethnocentric tendencies of security studies see Booth 1979, Barkawi and Laffey 2006). All that can be said in general terms is that whatever approach to understanding warfare one chooses to adopt will have consequences, leading the analysis in certain directions and forsaking others. Within International Relations and security studies warfare has commonly been defined in ways that highlight its cultural, legal and political dimensions. Information Revolution and information Warfare: ICTs are used in several combat activities, from cyber attacks to the deployment of robotic weapons and the management of communications among the fighting units. Such a wide spectrum of uses makes it difficult to identify the peculiarities of this phenomenon. Help in respect to this will come from considering in more detail the different uses of ICTs in warfare. An attack on the information system called smurf attack is an implementation of distributed denial of service (DDoS) attacks. A DDoS is a cyber attack whose aim is to disrupt the functionality of a computer, a network or a website. This form of attack was deployed in 2007 against institutional Estonian websites, and more recently similar attacks have been launched to block the Internet communication in Burma during the 2010 elections. The use of robotic weapons in the battlefield is another way to use ICTs in warfare. It is a growing phenomenon, coming to widespread public notice with US army, which deployed 150 robotic weapons in Iraq’s war in 2004, culminating in 12,000 robots by 2008. Nowadays, several armies around the world are developing and using tele-operated robotic weapons, they have been deployed in Iraq and Afghanistan, and more sophisticated machines are being used at the borders between Israel and Palestine in the so-called ‘automatic kill zone’. These robots are trusted to detect the presence of potential enemies and to mediate the action of the human soldiers and hence to fire on potential enemy’s targets when these are within the range patrolled by the robots. Several armies also invested their resources to deploy unmanned vehicles, like the MQ-1 predators, which have then been used to hit ground targets, and to develop unmanned combat air vehicles, which are designed to deliver weapons and can potentially act autonomously, like the EADS Barracuda, and the Northrop Grumman X-47B. One of the latest kinds of robotic weapon – SGR-A1 – has been deployed by South Korea to patrol the border with North Korea. This robot has low-light camera and pattern recognition software to distinguish humans from animals or other objects. It also has a color camera, which can locate a target up to 500 meters, and if necessary, can fire its built-in machine gun. Up until now, robotic weapons were tele-operated by militaries sitting miles away from the combat zone. Human were kept in the loop and were the ones who decided whether to shoot the target and to maneuver the robot on the battlefield. The case of SGR-A1 constitutes quite a novelty, as it has an automatic mode, in which it can open fire on the given target without waiting for the human soldier to validate the operation. Finally, the management of communication among the units of an army has been revolutionized radically by the use of ICTs. Communication is a very important aspect of warfare. It concerns the analysis of the enemy’s resources and strategy and the definition of an army’s own tactics on the battlefield. NCW and C4ISR represent a major revolution in this respect. An example of such revolution is the use of iPhone and Android devices. Today, the US army is testing the use of these devices to access intelligence data, display videos made by drones flying over the battlefields, constantly update maps and information on tactics and strategy, and, generally speaking, gather all the necessary information to overwhelm the enemy. Changing Nature of Conflict: States have been resilient in the face of technological change, and despite the increasingly rapid diffusion of information, states still shape the political space within which information flows (Keohane and Nye 1998; Herrera 2004). Yet state power has been diminished too. States have lost much of their control over monetary and fiscal policies, which are often dictated by global markets (Castells 1996, pp. 245, 254). The rapid movement of currency in and out of countries by currency speculators can extract a devastating cost on countries that do not have large currency reserves. States no longer monopolize scientific research. The Internet allows a global scientific community to exchange information on topics that can be easily exploited by terrorist organizations (Castells 1996, p. 125). The Internet has made it impossible for states, dictatorships as well as democracies, to monopolize the truth (Castells 1996, pp. 384, 486-487). Nor can they monopolize strategic information (Keohane and Nye 1998) – the information that confers great advantage only if competitors do not possess it – because states no longer control encryption technologies. Most critically, IT has made the most technologically advanced and powerful societies by traditional indices the most vulnerable to attack. A distinguishing hallmark of the information age is the â€Å"network,† which exploits the accessibility and availability of information, and computational and communicative speed, to organize and disseminate knowledge cheaply and efficiently (Harknett 2003). The strength of the network lies in its degree of connectivity. Connectivity can increase prosperity and military effectiveness, but it also creates vulnerabilities. Information-intensive military organizations are more vulnerable to information warfare because they are more information-dependent, while an adversary need not be information-dependent to disrupt the information lifeline of high-tech forces. Information-dependent societies are also more vulnerable to the infiltration of computer networks, databases, and the media, and to physical as well as cyber attacks on the very linkages upon which modern societies rely to function: communication, financial transaction, transportation, and energy resource networks. The same forces that have weakened states have empowered non-states. The information revolution has diffused and redistributed power to traditionally weaker actors. Terrorists have access to encryption technologies which increase their anonymity and make it difficult for states to disrupt and dismantle their operations. (Zanini and Edwards 2001, pp. 37-8) Global markets and the Internet make it possible to hire criminals, read about the design and dissemination of weapons of mass destruction, and coordinate international money laundering to finance nefarious activities (Kugler and Frost, eds. 001; Castells 2000, pp. 172, 180-182). Terrorists can now communicate with wider audiences and with each other over greater distances, recruit new members, and diffuse and control their operations more widely and from afar. Non-state actors also have increasing access to offensive information warfare capabilities because of their relative cheapness, accessibility and commercial origins (US GAO 1 996; Office of the Under Secretary for Defense for Acquisition and Technology 1996). Globalization, and the information technologies that undergird it, suggest that a small, well-organized group may be able to create the same havoc that was once the purview of states and large organizations with substantial amounts of resources. The availability off-the-shelf commercial technologies benefits smaller states and non-state actors, to be sure, but only the wealthiest and most powerful states will be able to leverage information technology to launch a â€Å"revolution in military affairs. The ability to gather, sort, process, transfer, and disseminate information over a wide geographic area to produce dominant battle space awareness will be a capability reserved for the most powerful (Keohane and Nye 1998). In this respect, information technology continues trends already underway in the evolution of combat that have enhanced the military effectiveness of states. IT makes conventional combat more accurate, thereby improving the efficiency of high explosive attacks. On the other hand, IT also continues trends in warfare that circumvent traditional military forces and which work in favor of weaker states and non-states. Like strategic bombing and counter-value nuclear targeting, efforts to destroy or punish an adversary by bypassing destruction of his armed forces and directly attacking his society, predate the information technology age. Techniques of information warfare provide attackers with a broader array of tools and an ability to target more precisely and by non-lethal means the lifelines upon which advanced societies rely: power grids, phone systems, transportation networks, and airplane guidance systems. Information is not only a means to boost the effectiveness of lethal technologies, but opens up the possibility of non-lethal attacks that can incapacitate, defeat, deter or coerce an adversary, attacks that can be launched by individuals and private groups in addition to professional militaries. Warfare is no longer an activity exclusively the province of the state. Information is something that states, organized for success in the industrial age, do not have a comparative advantage in exploiting. John Arquilla and David Ronfeldt argue that the information revolution is strengthening the network form of organization over hierarchical forms, that non-state actors can organize into networks more easily than traditional hierarchical state actors, and that the master of the network will gain major advantages over hierarchies because hierarchies have a difficult time fighting networks. (Arquilla and Ronfeldt 2001, pp. 1, 15. ) States are run by large hierarchical organizations with clearly delineated structures and functions. By contrast, a more efficient organizational structure for the knowledge economy is the network of operatives, or â€Å"knowledge workers† not bound by geographic location. This is precisely the type of organizational structure being adopted by terrorist groups as they adapt to the information age. There is evidence that adaptation is quicker in flat hierarchies or matrix organizations than it is in the steep pyramidal hierarchies that run the modern nation-state; that flatter networks have a much shorter learning curve than do hierarchically networked organizations (Areieli 2003). The higher the hierarchy, the faster it operates if it is doing something it has already foreseen and thus for which it is prepared. If, on the other hand, a scenario requires the development of new processes that were not foreseen, the flatter organization is better at learning. Matrix organizations are more creative and innovative. According to Castells, the performance of a network depends on two fundamental attributes: â€Å"its connectedness that is its structural ability to facilitate noise-free communication between its components; its onsistency, that is the extent to which there is sharing of interests between the network’s goals and the goals of its components† (Castells 1996, p. 171). On both criteria, large state bureaucracies suffer serious disadvantages. Informal war: Informal war is armed conflict where at least one of the antagonists is a non-state entity such as an insurgent army or ethnic militia. It is the descendent of what became known as low intens ity conflict in the 1980s. Like today, future informal war will be based on some combination of ethnicity, race, regionalism, economics, personality, and ideology. Often ambitious and unscrupulous leaders will use ethnicity, race, and religion to mobilize support for what is essentially a quest for personal power. The objectives in informal war may be autonomy, separation, outright control of the state, a change of policy, control of resources, or, â€Å"justice† as defined by those who use force. Informal war will grow from the culture of violence which has spread around the world in past decades, flowing from endemic conflict, crime, the drug trade, the proliferation of weapons, and the trivialization of violence through popular culture. In many parts of the world, violence has become routine. Whole generations now see it as normal. In this setting, informal war will remain common, in part because of the declining effectiveness of states. Traditionally, governments could preserve internal order by rewarding regions or groups of society which supported the government, punishing those which did not, and, with wise leadership, preempting conflict and violence through economic development. In a globalized economy, the ability of governments to control and manipulate the economy is diminished, thus taking away one of their prime tools for quelling dissent and rewarding support. In regions where the state was inherently weak, many nations have large areas of territory beyond the control of the government. And, as political, economic, and military factors constrain traditional cross border invasion, proxy aggression has become a more attractive strategic option. Regimes unwilling to suffer the sanctions and opprobrium that results from invading one’s neighbors find that supporting the enemies of one’s neighbors is often overlooked. This is not likely to change in coming decades. Finally, the combination of globalization and the Cold War have fueled the growth of an international arms market at the same time that the international drug traffic and the coalescence of international criminal networks have provided sources of income for insurgents, terrorists, and militias. With enough money, anyone can equip a powerful military force. With a willingness to use crime, nearly anyone can generate enough money. Informal war is not only more common than in the past, but also more strategically significant. This is true, in part, because of the rarity of formal war but also because of interconnectedness. What Martin Libicki calls â€Å"the globalization of perception†Ã¢â‚¬â€the ability of people to know what is happening everywhere—means that obscure conflicts can become headline news. There are no backwaters any more. As suffering is broadcast around the world, calls mount for intervention of one sort or the other. Groups engaged in informal war use personal and technological interconnectedness to publicize their cause, building bridges with a web of organizations and institutions. The Zapatista movement in southern Mexico is a model for this process. The Zapatistas, in conjunction with a plethora of left-leaning Latin Americanists and human rights organizations, used of the Internet to build international support with web pages housed on servers at places like the University of California, Swarthmore, and the University of Texas. This electronic coalition-building was so sophisticated that a group of researchers from the RAND Corporation labeled it â€Å"social netwar. Undoubtedly, more organizations will follow this path, blending the expertise of traditional political movements with the cutting-edge advertising and marketing techniques that the information revolution has spawned. A defining feature of the information revolution is that perception matters as much as tangible things. This will certainly hold for informal warfare. Future strategists will find that crafting an â€Å"image assessment† or â€Å"perception map† of a conflict will be a central part of their planning. In failed states, informal war may be symmetric as militias, brigand bands, and warlord armies fight each other. At other times, it may be asymmetric as state militaries, perhaps with outside assistance, fight against insurgents, militias, brigands, or warlord armies. Future insurgents would need to perform the same functions of defense, support, and the pursuit of victory, but will find new ways to do so. In terms of defense, dispersion is likely to be strategic as well as tactical. There will be few sanctuaries for insurgent headquarters in an era of global linkages, pervasive sensor webs, nd standoff weapons, so astute insurgents will spread their command and control apparatus around the world. Information technology will make this feasible. Right wing anti-government theorists in the United States have already developed a concept they call â€Å"leaderless resistance† in which disassociated terrorists work toward a common goal and become aware of each other’s action s through media publicity. The information revolution will provide the opportunity for â€Å"virtual leadership† of insurgencies which do not choose the anarchical path of â€Å"leaderless resistance. The top leadership might never be in the same physical location. The organization itself is likely to be highly decentralized with specialized nodes for key functions like combat operations, terrorism, fund raising, intelligence, and political warfare. In many cases, insurgent networks will themselves be part of a broader global network unified by opposition to the existing political and economic order. Informal war in the coming decades will not represent a total break with its current variants. It will still entail hands on combat, with noncombatants as pawns and victims. Insurgents, militias, and other organizations which use it will seek ways to raise the costs of conflict for state forces. Gray Area War: As the Cold War ended defense analysts like Max G. Manwaring noted the rising danger from â€Å"gray area phenomena† that combined elements of traditional war-fighting with those of organized crime. Gray area war is likely to increase in strategic significance in the early decades of the 21st century. To an extent, this is a return to historical normalcy after the abnormality of the Cold War. Today, gray area threats are increasing in strategic significance. Information technology, with its tendency to disperse information, shift advantages to flexible, networked organizations, and facilitate the creation of alliances or coalitions, has made gray area enemies more dangerous than in the past. For small or weak countries, the challenge is particularly dire. Not only are their security forces and intelligence communities less proficient, but the potential impact of gray area threats is amplified by the need to attract outside capital. In this era of globalization and interconnectedness, prosperity and stability within a state are contingent on capital inflows. Except in nations that possess one of the very rare high-payoff natural resources like petroleum, capital inflows require stability and security. In places like Colombia, South Africa, Central Asia, and the Caucuses, foreign investment is diminished by criminal activity and the insecurity it spawns. This makes gray area threats a serious security challenge. Gray area war involves an enemy or a network of enemies that seeks primarily profit, but which has political overtones and a substantially greater capability for strategic planning and the conduct of armed conflict than traditional criminal groups. Like future insurgents, future networked gray area enemies may have nodes that are purely political, some political elements that use informal war, and other components that are purely criminal. This greatly complicates the task of security forces that must deal with them. Because gray area enemies fall in between the realm of national security and law enforcement, the security forces that confront them must also be a â€Å"gray† blend of the military and the police. Like the military, security forces must have substantial fire power (both traditional and informational), and the ability to approach problems. But these security forces also must have characteristics of law enforcement, working within legal procedures and respecting legal rights. Even though the objective will be monetary rather than purely political, violence will be goal-oriented. Astrategic gray area war will consist primarily of turf battles between armed gangs or militias. It may be related to refugee movements, ethnic conflict, ecological degradation, or struggles for political power (as in Jamaica in the 1990s, where political parties used street gangs to augment their influence). When astrategic gray area war is linked to struggles for political power, the armed forces (such as they are) will be serving as mercenaries only partially controlled by their paymasters, rather than armed units under the actual command of political authorities. Strategic Information warfare: Formal, informal, and gray area war are all logical extensions of existing types. Technology, though, could force or allow more radical change in the conduct of armed conflict. For instance, information may become an actual weapon rather than simply a tool that supports traditional kinetic weapons. Future war may see attacks via computer viruses, worms, logic bombs, and trojan horses rather than bullets, bombs, and missiles. This is simply the latest version of an idea with recent antecedents in military history. Today strategic information warfare remains simply a concept or theory. The technology to wage it does not exist. Even if it did, strategists cannot be certain strategic information warfare would have the intended psychological effect. Would the destruction of a state’s infrastructure truly cause psychological collapse? Would the failure of banking, commercial, and transportation systems crush the will of a people or steel it? But until infrastructure warfare is proven ineffective, states and non-state actors which have the capacity to attempt it probably will, doing so because it appears potentially effective and less risky than other forms of armed conflict. Future infrastructure war could take two forms. In one version, strategic information attacks would be used to prepare for or support conventional military operations to weaken an enemy’s ability to mobilize or deploy force. The second possible form would be â€Å"stand alone† strategic information warfare. This might take the form of a sustained campaign designed for decisive victory or, more likely, as a series of raids designed to punish or coerce an enemy But should cyber-attacks, whether as part of strategic information warfare or as terrorism, become common, the traditional advantage large and rich states hold in armed conflict might erode. Cyber-attacks require much less expensive equipment than traditional ones. The necessary skills exist in the civilian information technology world. One of the things that made nation-states the most effective organizations for waging industrial age war was the expense of troops, equipment and supplies. Conventional industrial-age war was expensive and wasteful. Only organizations that could mobilize large amounts of money flesh, and material could succeed at it. But if it becomes possible to wage war using a handful of computers with internet connections, a vast array of organizations may choose to join the fray. Non-state organizations could be as effective as states. Private entities might be able to match state armed forces. While substantial movement is underway on the defense of national information infrastructure, offensive information warfare is more controversial. Following the 1999 air campaign against Serbia, there were reports that the United States had used offensive information warfare and thus â€Å"triggered a super-weapon that catapulted the country into a military era that could forever alter the ways of war and the march of history. According to this story, the U. S. military targeted Serbia’s command and control network and telephone system. The Future Battlefield: The information revolution is transforming warfare. No longer will massive dug-in Armies, armadas and Air Forces fight bloody attritional battles. Instead, small highly mobile forces, armed with real time information from satellites and terrestrially deployed battlefield sensors, will strike with lighteni ng speed at unexpected locations. On the battlefield of the future, enemy forces will be, located, tracked and targetted almost instantaneously through the use of: * Sensors and their fusion with a view to presenting an integrated highly reliable intelligence picture in real time. * Surveillance devices that unceasingly seek and shadow the enemy. * Data-links and computer-generated battle picture, task tables and â€Å"maps that change scale and overlay differing types of information in response to voice requests. † * Automated fire control, with first round kill probabilities approaching near certainty. Simulation, visualization and virtually in planning, and testing concepts and weapon effectiveness. This would balance out the need for large forces to overwhelm the opponent physically. Control function will be decentralized and shared at all levels of command. Combat will be in tandem to intelligence gathering. Non-lethal, soft-kill electronic weapons will assume as much importance as highly lethal, hard-kil l weapons. Intelligent command posts and paperless headquarters will be the form. A Commander will be of a different breed-priding more in his lap-top than his baton. He will be his own staff officer. Changing Perception of War and its implications on poorly governed country: The idea that weak states can compromise security — most obviously by providing havens for terrorists but also by incubating organized crime, spurring waves of migrants, and undermining global efforts to control environmental threats and disease — is no longer much contested. –Washington Post, June 9. 2004 A majority of states in the contemporary security environment can be classified as weak. These states exhibit a limited ability to control their own territories because, in part, they do not have a monopoly on the use of force within their borders. They also struggle to provide security or deliver major services to large segments of their populations. These vulnerabilities generate security predicaments that propel weak regimes—both democratic and authoritarian—to act in opportunistic ways. Because they lack conventional capabilities, out of necessity, weak states will have to be opportunistic in their use of the limited instruments they have available for security and survival. The threat of information warfare should be understood within a broad vision of global power that is based on an up-dated version of Mao Zedong’s theory of the ‘Three Worlds’. Just as Mao believed that the world was divided into three tiers of states, with the superpowers at the top, the developed states in the middle and the developing states at the bottom, in the information age is also supposed to be three types of state. At the top of the pile is the ‘information hegemony state’, asserting its control by dominating the telecommunications infrastructure, software development, and by reaping profits from the use of information and the Internet. After this comes the ‘information sovereign state’, exemplified by those European states that have accumulated sufficient know-how to exert independent control over their information resources and derive profits from them, and to protect themselves from information hegemony. At the bottom of the pile are the ‘information colonial and semi-colonial states’, which have no choice but to accept the information that is forced on them by other states. They are thus left vulnerable to exploitation because they lack the means to protect themselves from hegemonic power. In recent years, the nature of conflict has changed. Through asymmetric warfare radical groups and weak state actors are using unexpected means to deal stunning blows to more powerful opponents in the West. From terrorism to information warfare, the Wests air power, sea power and land power are open to attack from clever, but much weaker, enemies. The significance of asymmetric warfare, in both civilian and military realms become such an important subject for study to provide answers to key questions, such as how weaker opponents apply asymmetric techniques against the Western world, and shows how the West military superiority can be seriously undermined by asymmetric threats. Conclusion: It is said that nothing is permanent except change. This is particularly true in the information age. It is important to understand the nature of the new world information order in order to be effective in foreign policy initiatives and to conduct the international relations. The information revolution throws up various contradictory phenomena. It includes the strengthening of the forces of anarchy and control. The revolution empowers individuals and elites. It breaks down hierarchies and creates new power structures. It offers more choices and too many choices, greater insight and more fog. It reduces the risk to soldiers in warfare and vastly increases the cost of conflict. It can lead to supremacy of the possessors of information technologies while it leads to vulnerabilities to the same possessors from weaker nations. It cedes some state authority to markets, to transnational entities and to non-state actors and as a result produces political forces calling for the strengthening of the state. However, a mere look at some of the manifestations of the arrival of information technology in international relations, clearly brings out how the nature and exercise of power have been permanently altered. Benjamin Barber describes a world that is both coming together and falling apart in his book Jihad Against McWorld. He describes a world where the nation state is losing its influence and where the world is returning to tribalism, regionalism, and the ethnocentric warfare that characterized much of the earlier human history. This problem is most apparent in the developing world where we continue to see the spread of disease, continuing humanitarian crisis, political and economic instability, and ethnic, tribal, civil, and drug related war. There are several themes that are consistent across these global futures. The first is conflict. The negative effects of globalization will continue to promote regionalism, tribalism, and conflict in the developing world. Secondly, nations with uncontrollable population growth, a scarcity of natural resources, and poor government systems will fail to benefit from globalization regardless of its effects on the rest of the world. Thirdly, technology will continue to be exploited to benefit developed nations and illicit criminal/terrorist networks, and will have little affect on the developing world. In all scenarios the power of the state will weaken and the power of the non-state networked actor will continue to expand with the help of the tools of globalization. References: Paul D. Williams. (2008). War. In: Paul D. Williams Security Studies: An Introduction. New York: Routledge. p151-p171. Akshay Joshi. (2010). The Information Revolution and National Power:Political Aspects-II. Available: www. idsa. org. Last accessed 13rd November 2011. Alvin and Heidi Toffler, War and Anti-War: Survival at the Dawn of the 21st Century, Boston: Little, Brown and Company, 1993. Robert O. Keohane and Joseph S. Nye, Jr. , â€Å"Power and Interdependence in the Information Age,† Foreign Affairs, Vol. 77, No. 5, September/October 1998. Steven Metz. (2010). ARMED CONFLICT IN THE 21st CENTURY:. Strategic Studies Institute. 01 (1), 65-119. Arquilla, J. (1998). Can information warfare ever be just? Ethics and Information Technology, 1(3), 203-212. Floridi, L. (2009). The information Society and Its Philosophy. The Information Society, 25(3), 153-158. Steven, Doglous, 2002. Information Warfare: a Philosophical Perspective. 1. London: University of Hertfordshire. Robert O. Keohane and Joseph S. Nye, Jr.. (1998). Power and Interdependence in the Information Age. Foreign Affairs. v. 77 (5), 1-10 David J. Rothkopf, â€Å"Cyberpolitik: The Changing Nature of Power in the Information Age†, Journal of International Affairs, Spring 1998, p. 27. Akshay Joshi, â€Å"The Information Revolution and National Power: Political Aspects-I†, Strategic Analysis, August 1999. Jessica Mathews, â€Å"Powershift†, Foreign Affairs, January/February 1997, pp. 50-55. Carl von Clausewitz, On War, edited and translated by Michael Howard and Peter Paret (Princeton, NJ: Princeton University Press, 1976). The seminal discussion of the political philosophy of war. Emily O. Goldman and Leo J. Blanken, 2011, THE ECONOMIC FOUNDATIONS OF MILITARY POWER, California, University of California-Davis