Wednesday, July 31, 2019

Mo-tzu’s Argument Against Music Essay

Mo-tzu (also called Mozi, Moz, or Micius in Latin) was a renowned philosopher in China back in about 390-470 B. C. during the time of the Hundred Schools Thought (Wikipedia, 2007). Having founded Mohism, he argued about the inadequacy of Confucianism and Daoism on the need for a mortal being to self-reflect and meditate upon oneself. He also insisted that, instead of rituals and singings, what human beings need are acts of authenticity that does not include the use of drums, zithers, and pipes. He, therefore, stressed out: â€Å"To have music is wrong† (Par. 1, Book VIII, Chapter XXXII). Main Body We all agreed that Mo-tzu presented a very well thought of argument against music. This can be seen when he stated, Although the body knows they are comfortable, the mouth knows they are gratifying, the eyes know they are delightful, and the ears know they are pleasing, yet they are found not to be in accordance with the deeds of the sage-kings of antiquity and not to contribute to the benefits of the people at present. (Par. 1, Book VIII, Chapter XXXII) In saying this, he implied that music did not have anything to do with the greatness and success of the sage-kings†¦ that it did not fulfill the basic needs, unlike the boats and the carts that were built from the same contribution of the ancient citizens. It slowed production by wasting labor on things that are of no use. He stated, The levy of heavy taxes on the people to construct the big bell, the sounding drum, the ch’in and the she, and the yY and the sheng, is not at all helpful in the endeavor to procure the benefits of the world and destroy its calamities. Therefore Mo-tzu said: To have music is wrong. (Par. 3, Book VIII, Chapter XXXII) Mo-tzu is absolutely correct. Yet in spite of this, if people accept that music is not useful in acquiring the needs of this world, such as food, clothing, and rest (Par. 3, Book VIII, Chapter XXXII), then they must also understand that, just like music, philosophy is just as useless in acquiring the needs of this world, such as food, clothing, and rest (Par. 3, Book VIII, Chapter XXXII). In fact, as compared to music, philosophy presents greater cause for men to think deeply, and run into sickness and chaos (with oneself or with the society) that, in turn, makes them more prone to hunger, to state of undress, and to unrest. What philosophy has failed to give men, music could give with just a stroke or a beat of the instruments. True, musical instruments cannot be directly eaten and cannot cloth the naked, yet the instruments were also considered treasures in the long ago, which means that the owners could sell it for a chance to buy food or clothing in exchange of the musical instruments. When it comes to giving rest, however, music has the capability to give rest to those who are bothered psychologically or biologically. Philosophy, on the other hand, cannot be exchanged for food, clothing, or rest, since it all runs in the mind of the wise men. Thinking about the statements of the wise will just make men hungrier, poorer with less clothing, and more troubled. I, therefore, stress out—to have philosophy is totally wrong! Conclusion Mo-tzu failed to acknowledge that music is an art that sprouts from the very being of the individual. It is like painting, sculpture, literature, or the use of colors. It is an expression of what human beings feel, think of, believe in, or acknowledge. It comes from the mind. With this, it is very obvious that to say that music is totally wrong would also mean that philosophy is totally wrong, since the latter is also an expression of what human beings feel, think of, believe in, or acknowledge. Music comes from the mind just as philosophy comes from the mind. The only difference is that philosophy centers on chosen beings—those who are more gifted and wise—than when compared to music, which is so ordinary and can be expressed by anyone who dreams of expressing himself. Yet they both come from the mind. Even if both have their own sides of gains, both are totally incapable of destroying calamities.

Tuesday, July 30, 2019

Compare the short story “Flowers for Algernon” Essay

The differences between â€Å"Flowers for Algernon† as a short story and as a movie represent the differences between the two media. In my essay I am going to show, from the differences between the short story and the movie, the differences between the two media, coming up with the conclusion that the short story is the better medium by which to tell this story. One of the most significant differences between the short story and the movie is the developing of Charlie’s character in the story. In the book for example, is nothing said about his family, whereas in the movie is told a lot about his childhood and in the end he also sees his mother. When we see Charlie in the movie identifying himself as lonely, he becomes a more described character than he is in the book. This shows the difference that in a short story we have to develop a character ourselves, but in a movie only throughout one picture of a person we already get a description of this character we would never have got in a short story. In the movie we have seen the information about Charlie we immediately get it supported by information about his family. There are also different kinds of pathos in short story and movie. With the identification of Charlie Ms Kinnian and indirectly Algernon with the loneliness in the movie, they identify themselves as sad. This makes the movie much more pathetic than the short story, because in the short story only the identifying between Charlie and Algernon takes place, which is much less pathetic. What also support the pathos in the movie is the whole emotion around the relationship between Charlie and Ms Kinnian. This could represent the fact that a movie has to be more emotional than a short story, so that the people want to see it. But it could also show that someone who is making a movie has to bring in more pathos in his story, because he shows the story omniscient. That means he has not the chance to tell the story in diary-form and so directly out of the brain of the main character which is much more personal. With short story as diary-form you can see everything through the eyes of the diary writer. To compare the roles of the doctors, doing the operation, also brings up a big difference. In the movie there is no Dr. Nemur, who plays a big role in  the short story. In the short story Dr. Nemur represents the scientific world, which is not always human. Dr. Strauss plays the good, personal and human guy, which also cares about Charlie’s feelings and his psychology. Now in the movie there is only Dr. Strauss, who then has to represent the scientific world but also has to be the good guy. So two flat characters from the short story can be put into one character in the movie. Because Dr. Strauss is representing two characters, he becomes a grotesque person. This happens, because he has to represent a scientific society, which does not have ethics as basis but also has to represent a world of humanity and ethics, which in the short story represent Dr. Nemur. In my opinion the short story is the more successful medium by which to tell the story, because the movie creates you through a lot of emotions one specific opinion about what happens to Charlie. Whereas in the short story you have more chance to create your own opinion about the story, which is a very important thing in stories but also in your life.

Criminal Justice Policy Process Essay

The criminal justice policy-making process is interesting to say the least. There are three levels of government branches which are Legislative, Executive, and Judicial. Looking into how the policy-making process works one finds that Federal and State has their hand in the process of making criminal justice policies, while local government is receiving many benefits by getting on board with the policy-making federal and state government branches. Criminal Justice Policy Process  Criminal justice policy-making process as fascinating as it is there are a lot of strings to benefiting from the process. Criminal justice policy actions taken at the federal and state levels affect local criminal justice agencies in various ways. Many policies provide grants and other forms of assistance to local police departments and other criminal justice agencies. However, to receive additional funding the local branches are mandated to do certain things such as getting into bed with the state or federal government good or bad. A good example of this is the policies related to the â€Å"war on drugs,† poured billions into the coffers of local law enforcement authorities, who in turn stepped up their drug enforcement and investigation activities, arrested many suspected drug dealers and users (Hall, 2013). Many times the actions by state and national (federal) policy issues will result in legislators passing new laws to address the issue. Ordering local agencies to enforce the new law passed with little or no funding, and minimal if any guidance on how to enforce the new law. Arizona passed a new illegal immigrants law in April of 2010, which the Arizona law enforcement opposed. The problem was not passing the new law it is however, the strain it will have on the local police departments. Currently the officers are required by this new law to detain all illegal immigrants, time and money is the price for this new law. â€Å"In other cases, the local level of the criminal justice system bears the cost when state and federal officials fail to act. Overcrowding in state prisons provides one example. During the 1980s, overcrowded conditions in Texas prisons resulted in many county jails being forced to house inmates awaiting transfer to state prisons. This imposed heavy costs on local jail operators, with no help from state officials, who faced federal court pressure to reduce crowding in state prisons. Texas built new prisons and expanded others but made no policy changes to reduce recidivism rates or provide alternatives to incarceration, according to the Texas Criminal Justice Coalition† (Hall, 2013). So it does seem that at the federal level of the criminal justice policy-making process that agency is highly involved with helping to make the new policies. Just as with the state government branch they also are involved in the new policy-making process. One can see how the local branches are not involved in the policy-making process but are involved with reaping the benefits of the new policies or shouldering the hardships caused by them. During the research information such as the branches of the government are as follows the Legislative branch is the branch that makes new laws. The Executive branch is the branch that carries out the laws, and the judicial branch is the branch that interprets the laws. Again this is fascinating how the three branches work with the federal, state, and local branches of the government. The federal branch although it is known help to make laws that is not all they do they also help to enforce laws. The FBI (Federal Bureau of Investigation) is a good example of enforcing the law. This branch is governed by an entirely different set of rules. It is able to cross state lines, can even leave the country if that is where the investigation leads the case. The state branch is also involved in the policy-making process as well as enforcing the laws which are made. The state houses many criminals in the state penal institutes. State law enforcement are ruled by a standard that has jurisdictions and are not able to cross state lines even if that is where the investigation leads, the must call in the FBI to finish the case. As they say things role downhill the state can call on the local agencies to help them out. The criminal justice policy-making process is in place to deal with issues that come up. Throughout time different issues have needed new ways to deal with them so policy is made and laws are set to fix the problem. The United States Constitution has been ratified starting in 1791proving that all laws and policies are subject to change over time. (Ritchie, 2005) As fascinating as Criminal justice policy-making process is there are a lot of strings attached to benefiting from the process. Criminal justice policy actions taken at the federal and state levels affect local criminal justice agencies in various ways. One can understand which agencies help to make the laws and which agencies reap the most rewards from the policy-making process. To conclude that the federal and state branches come out ahead would be an understatement. One can clearly see that the local branches of government have more red tape to deal with and have more hoops to jump through to receive the funding needed to do the best job. One could conclude that all matters of criminal justice policy-making process are beneficial to all branches. Depending on the interrupter because others may believe none of the branches benefit from the policy-making process.

Monday, July 29, 2019

On the book Full steam ahead Essay Example | Topics and Well Written Essays - 250 words

On the book Full steam ahead - Essay Example ished, the manager doesn’t pause thinking ‘what to do next?’, instead he has very clear instruction or vision that helps him to make his next move. It is especially important for leaders as leaders (managers) are in the driving seat. They need to steer the machine to destination while keeping it on a safe track. If managers or employees don’t know what is the goal then leadership becomes useless. Content refers to the common-sense angle. It contains some true statements, most probably based on relevant facts. Logically, it can be true or false. Content also refers to consideration of anything (vision) at its face value. Process is the impact of the content. Process gives context to the content and drives it. Anyone can come up with a vision or a dream but to be able to have a compelling vision but one needs to have the purpose behind that vision. This is the real fuel of vision. Purpose can be anything. Your purpose can be to become the investment firm that makes more money than any other investment company or your purpose can be to have offices located at places even where giant corporates don’t have a facility. Picturing the future has both psychological and physical effects. Once this purpose is gets fused with the future-picture (the dream) possibilities become endless. And to make sure that all goes on well and the company/management doesn’t engage into something which is looked down upon by law or society, the firm needs to place core values. This is how your arsenal gets equipped with a functioning VISION. NASA did not place a man on the moon after the famous Apollo mission because its vision lacked purpose and value. A vision is created not by asking the top management of the company to simply plan out something and then announce, â€Å"Here is the vision†. A vision is created through dialogue where all important people have their say in it. The process can be related to brain-storming. Stoner, Ken Blanchard and Jesse. "The Vision Thing:

Sunday, July 28, 2019

Economics Essay Example | Topics and Well Written Essays - 1000 words - 5

Economics - Essay Example An economic cycle comprises several phases viz. recession, recovery and boom. In the recovery phase, individuals and businesses borrow and invest more causing the aggregate demand to rise up which leads to boom or expansionary pressures in the economy. This boom brings with it problems like inflation and high imports etc. In such a situation, the government needs to take some action through various macroeconomic policies for the purpose of stabilisation of economy. Thus, the recessionary pressures enter the economy characterised by weak investment and business slow down (Smith, 2003). The economy displays several peaks and troughs over a cyclical phase (see Fig 1). The responsibility of government to stabilise the economy leads it to make use of various macroeconomic policies in order to manage the cyclical economic fluctuations. As an advisor to the government, I would like to recommend the use of monetary and fiscal policies for the purpose of curtailing cyclical fluctuations. Macroeconomic policies like monetary and fiscal policies can be utilised by government to control economic fluctuations. Macroeconomic factors like taxation and government spending fall within the realm of fiscal policy whereas inflation, interest rates, exchange rates and other monetary factors are relevant to the monetary policy. Government can control economy by fluctuating interest rates, exchange rates, and the growth of money and credit in the economy (Smith, 2003). Most particularly, changing interest rates on the part of the government affects inflation, supply of money and credit, exchange rates, foreign and domestic investment and business expansions etc. All these factors put a great impact on the cyclical pressures in the economy. Monetary policy can be utilised in two dimensions under cyclical fluctuations in business. In the case of expansionary pressures or boom in the economy, the

Saturday, July 27, 2019

International Business Essay Example | Topics and Well Written Essays - 750 words - 6

International Business - Essay Example The demands and supply in the international market determines the exchange rate of world major currencies. The supply of a nation currency reflects demands for foreign goods services and securities by that country. The demand of a currency of a country reflects foreign demand for that country goods, services and securities from other countries. Ceteris Paribus, the quantity demanded reflects a negative function of the exchange rate. The market gravitates to equilibrium exchange rate where quantity demanded is equal to the quantity supplied. For instance, Ceteris Paribus, from initial equilibrium, if U.S incomes, inflations or foreign interests’ rates rise, U.S demand for foreign goods, services and securities will increase and so will the supply of dollar. The market will gravitate to the new equilibrium at a lower exchange rate that corresponds to the depreciation of the dollar (Bigman and Teizo 2003, p. 88). Similarly, Ceteris Paribus, if foreign incomes, foreign inflations, or U.S interest rates rise, foreign demands for U.S goods, services and securities will rise and so will be the demand for the dollar. The market will gravitate to a new equilibrium at a higher exchange rate that corresponds to an appreciation of the dollar. ... However, it is worth to note that market forces are not the only factors that influence the exchange rate. In addition, Central Bank may intervene in the foreign exchange market selling or buying currencies to impact the exchange rates. Central bank intervenes when the currency becomes either over or under valued. This system is distinctively different from the fixed exchange rate system under the Breton woods accord. Therefore, it is interesting to note that the present international monetary system can be characterized more correctly as a managed float exchange rate system. This is because the exchange rates changes according to demand and supply, however, central bank may intervene when deemed necessary to save the currency (Burton 2009, p.436). Opponent of Floating exchange rate system argues that’s the system leads to exchange rate volatility which consequently affects trade. Analysis of the effect of exchange rate volatility on trade can be grouped into two. There are th ose who use time series evidence to look at the relationship between volatility and trade, and there are those who use cross- sectional comparison across countries. Results on different studies relating to effect of exchange rate volatility and trade using the time series evidence varies quite widely a few have found a significant effect but most finds little or no impact, for instances surveys done by IMF in 1984 and the Commission for European Communities in 1990. This research indicates that higher volatility has a small negative impact on trade volumes (Burton 2009, p.438). Alternatively, comparisons can be made across countries rather than over time. A model of expected trade flows between countries calculates

Friday, July 26, 2019

Uzbekistan Insurance Company Case Study Example | Topics and Well Written Essays - 1000 words

Uzbekistan Insurance Company - Case Study Example "However a person may also be interested in his former wife/husband where ties of affection and care continue to exist" 3 The fact that Vicky called Dave to set right the faulty wiring even after their divorce would prove that there existed cordial relationship between them signifying existence of insurable interest. However as a matter of abundant precaution, it is advised that confidential enquires must be made rule out the remote chances of Dave's intention to kill her in a seemingly accidental fire due to faulty wiring, before settling his claim. Secondly Dave's claim for the damage to the house due to the fire can not be entertained for the following reasons. The fire policy is a contract of indemnity unlike a life policy. In contract of indemnity, insurable interest must be present both at the time of conclusion of contract as well as at the time of occurrence of the insured event. In this case, because of the confirmed ownership of the house in Vicky's name and because of their divorce, Dave did not have insurable interest on Vicky's life. Further because his wiring was faulty and his negligence contributed to the loss and even if he had had insurable interest, he is not eligible for claim on the damage to the house. The second case is regarding Brian who dies while surfing apparently due to drowning confirmed by the presence of water in the lungs in post mortem. The fact that he over-exerted himself while jogging can be attributed as a contributory negligence and hence the claim of his lawyers for 20, 000 need not be settled provided there are provisions in the personal accident policy to that effect."An injured person's failure to exercise due care, which along... Uzbekistan Insurance Company Three questions arise for considering the claims of Dave: 1) Whether he has insurable interest on Vicky’s life even after their divorce 2) Whether death of Vicky was caused by his evil design under the pretext of accidental fire and 3) Whether he has insurable interest on the house and whether his negligence in wiring disqualifies him from making the claim. The second case of Brian need not be settled because of his contributory negligence though his lawyers can claim for relief due to comparative negligence. The third case of Heather's death due to hospital's ineffective cleaning though she had been admitted due to allergy which she had not disclosed in the proposal, her husband's can be settled at higher premium rate with proportionately reduced sum assured since it would be too harsh to reject the claim on two counts. One even if she had stated the allergic condition, only higher premium would have applied and two, the death was not due to allergy. The second case is regarding Brian who dies while surfing apparently due to drowning confirmed by the presence of water in the lungs in post mortem. The fact that he over-exerted himself while jogging can be attributed as a contributory negligence and hence the claim of his lawyers for â‚ ¤ 20, 000 need not be settled provided there are provisions in the personal accident policy to that effect.†An injured person's failure to exercise due care, which along with another person's (the defendant's) negligence, contributed to the injury.

Thursday, July 25, 2019

Horror dark fiction essay Example | Topics and Well Written Essays - 750 words

Horror dark fiction - Essay Example But Stephen King as well as Lovecraft use many times the dangerous character that cannot be described it’s something that even author cannot tell, but this fact frighten a reader even stronger. All people have fear of something unknown and strange and this fear can be considered to be the main acting part of such type of fiction. Fear of something unknown is stronger than of people or animals. Desperate position with unknown creatures or things can produce more effect on the reader than the equal situation with people or animals. But some authors are used to use people like a characters and in the work of Lovecraft â€Å"The Colour out of space† we can see something indescribable. Some creature or even substance that came from the space. One cannot identify for what reason it came and what it will do, but the effect on the people was terrible, as well as on the land. â€Å"  It must, I thought as I viewed it, be the outcome of a fire; but why had nothing new ever grown over these five acres of grey desolation that sprawled open to the sky like a great spot eaten by acid in the woods and fields† (Lovecraft). People became mad of something that was like an as teroid and animals began to do some strange things. â€Å"It was a little before this that the horses had stampeded. Something had aroused them in the night, and their neighing and kicking in their stalls had been terrible. There seemed virtually nothing to do to calm them, and when Nahum opened the stable door they all bolted out like frightened woodland deer. (Lovecraft)† There was one description of something that landed and it was some object that was constantly warm and has the colour that one cannot describe. Some people called it â€Å"Color of the space† (Lovecraft) â€Å"They had uncovered what seemed to be the side of a large coloured globule embedded in the substance. The colour, which resembled some of the bands in the meteors strange spectrum, was almost impossible to describe; and it

Wednesday, July 24, 2019

Geography and gender, sharia law and it's effects on women and men in Essay

Geography and gender, sharia law and it's effects on women and men in countries with sharia - Essay Example Islamic law is derived from the Qura’n, the revelation of God to Prophet Muhammad. Life in an Islamic society is supposed to follow the tenets of Islamic law. Islamic law includes prayer, fasting, pilgrimage as well as laws pertaining to family, crime and commerce. Islam however does not have an official clergy. Therefore Islamic law or sharia, meaning the path, was developed by the ullema, the scholars who have come to assume a position of power and status in Islamic society. It is the ullema who issue fatwas or religious edicts. However within Islam there have been voices of concern at a too strict interpretation of Islamic law without any consideration for the milieu into which Islam originated. The Egyptian Sheikh Muhammad Abduh had maintained that injunctions in the Qura’n relating to the observance of ibadat or tenets of worship were to be followed strictly but those relating to masdaba or rules of living should be interpreted with the consideration of the context they originated in. This is a view that is controversial and still unresolved in Islam. The view again that Islam is a patriarchal religion or misogynistic has been refuted by modern scholarly criticism which has proved that Islam inherited certain perceptions of women from biblical lore. Zayn R. Kassam states that interpretations about women entered Islam through certain strands of early Islamic literature such as the qisas al-anbiya, the asbab al-nuzul, the hadith, the tafsir and the fiqh. These were all oral sources of commentaries i n Islam until they were collated and written quite later. The qisas al-anbiya literally means the â€Å"stories of the prophets† and was a principal source for the entry of biblical lore into Islam perhaps because the earliest Muslims were essentially converts from Judaism and Christianity. The asbab al-nuzul was incorporated into the tafsir, or commentaries on the Qura’n, providing an explanation of

Obesity and Responsibility Lab Report Example | Topics and Well Written Essays - 750 words

Obesity and Responsibility - Lab Report Example The second article is titled "Weighing in on the Issue of Childhood Obesity: An Overweight Child Often Becomes the Target of Discrimination and Ridicule on the Playground. Clearly, the Problems That Overweight Children Encounter Go beyond the Physical" by Cynthia Lynn-Garbe and James L. Hoot. It concludes that the school environments can play a powerful role in influencing children's eating behaviors, especially those of the obese. However, since families and the community are equally important in this regard, schools should link up with them to promote healthful eating and activity patterns. The author's approach is therefore more of choice of methodology and methods. The two articles are relatively impartial as expected of research materials. The first one on "Economic perspectives on childhood obesity" is critical of schools in that schools appear to be making money out of selling food indiscriminately to the detriment of children who can become obese of these foods. It is also critical of mothers who had to work but spend less time to think of the children's intake - whether balanced or not. It is assumed that "researchers are anxious to understand the reasons underlying the trends, policy-makers would like to implement programs to promote a healthier population, and the media reports virtually every glimmer of insight from research and every potential policy remedy." The focus of interest is on national health. The second article on "An Overweight Child Often Becomes the Target of Discrimination and Ridicule" is relatively impartial in that it targets the teachers as capable of doing something for the obesity problem as though schools could stem any obesity problem that starts from the homes. The focus of interest is on what teachers could do over obese children in school. (d) How does the sort of intellectual project being undertaken affect the research questions addressed "Economic perspectives on childhood obesity" gives a thorough explanation of how obesity could start from environmental settings, but it does not point any finger directly in answer the research question. It's interest is to lead the discussion to a need for an effective policy. The second article on "An Overweight Child Often Becomes the Target of Discrimination and Ridicule" also does not answer the research question but rather proposes good practice. (e) How does the sort of intellectual project being undertaken affect the place of theory "Economic perspectives on childhood obesity" doesn't mention about theory at all. It is atheoretical. The second article on "An Overweight Child Often Becomes the Target of Discrimination and Ridicule" quotes Smith (1999:82) as saying that "Experts believe that obesity most probably results from the interaction of an individual's genetic makeup with the environment in which the person lives." And to this they add that educators can influence these two factors (Epstein, 1993). This study is

Tuesday, July 23, 2019

COMMUNICATION IN BUSINESS - case study format Essay

COMMUNICATION IN BUSINESS - case study format - Essay Example The perceptions about time, the power of analysis and integration etc can also be different in different cultures. Political, economical, social and technological parameters can affect the business management process. These parameters are different across diverse cultures. Some countries may have democratic administrations whereas some other countries may have autocratic administrations. Moreover, economic growth, religions and the development of technology etc need not be the same in different countries. Business management styles need to be adjusted or fine tuned based on these parameters in order to manage a business successfully across cultures. Terms of Reference â€Å"In global firms, the effective management of cultural diversity which was once a concept, became imperative for the firms survival now† (Adler & Gunderson, 2007, p.128). I am working as a management consultant and Microsoft has recently approached me to prepare a management report for them in doing business in India. They specifically asked me to give more emphasize to the management challenges Microsoft may face in India. Microsoft discards the idea of a joint venture in India and they preferred making an independent unit in India. They are aware of the fact that because of the above decision, they have to do everything from A to Z in order to setup a business unit in India. So, they asked me to study the probable management issues they may face in India related to culture. This paper is written as a report to Microsoft about the possible management issues Microsoft may face in their Indian operations. Overview of the situation America and India are some of the largest democratic countries in the world even though, they differ heavily in many other aspects. Even though democracy is prevailing in both of the countries, the functioning of the political systems is entirely different. Even though both the countries are secular democratic, Christians dominate the American population where as Hindus dominate the Indian population. â€Å"India is an enormously hierarchical society (arguably the most hierarchical in the world) and this, obviously, has an impact on management style† (Indian Management Style, n.d) Most of the Indian organizations consist of people from different parts of the country and the management should address the cultural diversity aspects all the time. India consists of 28 states and 6 union territories; most of them are extremely diverse as far as culture and language are concerned. Because of the influence of left parties, the influence of trade unionism in India is more than that in America. Left trade unions can create problems to Microsoft, because of their declared stands against the capitalist countries and monopolies. However, considering the huge growth potentials of India Microsoft can neglect these challenges. At the same time, Microsoft needs to spend more time on learning about the diverse Indian culture in order to manage thei r business successfully in India. â€Å"Management practices are always culturally bonded† (Guidham, 2002, p.52). Analysis based on Trompenaars and Hampden-Turner cultural model The major elements of Trompenaars and Hampden-Turner cultural model of management of international business are; Universalism vs. Particularism, Analyzing vs. Integrating, Individualism vs. Communitarianism, Inner-directed vs.

Monday, July 22, 2019

Christian Philosophy on Death Essay Example for Free

Christian Philosophy on Death Essay The Christian philosophy on death has long been that there is life after death. Yes, we do have confidence, and we would rather be away from the body and at home with the Lord. (2 Corinthians 5: 8) We are supposed to take solace in the fact that while although our earthly body will be no more, our spirit or soul will move on into immortality. Since life after death seems like a simple enough concept, death should be no big deal, right? We should just view it as a step in becoming closer to God. While in theory, we should just take death in stride, even for those who wholeheartedly believe in life after death find it difficult to accept death. We find it difficult to visualize and conceptualize the afterlife and what our role will be in it. People cope with death differently. Some choose to combat it head on, others choose to simply ignore it all together. However most people fall somewhere in between those two extremes. Dying person will use belief systems as they have throughout there entire life-constructively, destructively, or not at all This saying generally tends to hold true as one dies. All people cope with death differently however, by in large, most people go through some form of Kà ¯Ã‚ ¿Ã‚ ½bler-Ross model of grieving. The Kubler-Ross model contains five stages that people go through while contemplating their own death. The first stage is denial. In this stage the person grieving thinks that This cant be happening. In the second stage, anger, the griever says, Why me? Its not fair?! (either referring to God, oneself, or anybody perceived, rightly or wrongly, as responsible) The third stage is bargaining. In this stage, the dying person says, I know its me but or Please just let me live to see The bargaining can be directed toward God which if the bargain is perceived as accepted can lead to a sense of hope or resignation, or anger, guilt, or fear if the bargain is perceived as denied. The fourth stage is depression, which is arguably the hardest to go through. During the depression stage the dying person takes time to grieve his/her own death. The final stage is acceptance in which the dying person is ready to go. While not everyone goes through these stages in exactly this order, almost everyone goes through these stages in one form or another. They may experience the stages out of order, skip a stage, or even go through the cycle multiple times. There is also a belief that people have three spiritual needs of dying people: the search for the meaning of life, to die appropriately, and to find hope that extends beyond the grave. The search for the meaning of life takes on a higher priority when one is closer to death. The knowledge of impeding death creates a crisis in which one reviews life in order to integrate ones goals, values, and experiences. Without finding their lifes meaning one may feel that their life had no meaning. Another spiritual need is to die appropriately. People want to die in ways consistent with their own self-identity. Most people want to die a quick death surrounded by fantasy, however this is only the case for a lucky few. People fear not so much the fact of death but more the process of dying. The final spiritual need is to find hope in life after death. Life after death is an integral part of many faiths and religions. We seek assurance in some way that our life, or what we left, will continue. We all want some sort of life after death, because the thought of death being the ends of things can be an awful thing to think about. Oftentimes during class or discussions on death, I find myself questioning my own faith and trying to imagine what it would be like if I wasnt on earth anymore. I guess to be more specific what it would be like if my mind or soul did not continue on in some way, shape, or form. The thought of the world around me going on without me often leads to a chilling feeling and a headache. I almost prefer just to shut down, effectively turning off my ears to the discussion around me. Doing that just seems easier than thinking of the what-ifs that the thought of no life after death means. I believe in God, that there is a life after death, and that my soul and mind will exist eternally. However, it is still hard for me to shake that feeling that comes with thinking about death. If I am getting these chilling feelings while thinking of death as a teenager, I can only imagine the thoughts running through peoples heads while they are on their deathbeds. While it is easy to dwell on the negatives that death presents, there are other ways to approach death. Some people handle death with much grace, accepting their fate and using the time allotted to them to try to make their last days count. No one exemplifies this more that Morrie Schwartz from Tuesdays with Morrie. Morrie rather than overly dwell on the fact that he was dying, chose to take the time he had left on earth to explain dying to the world. His advice such as When you learn how to die, you learn how to live. and Love each other or perish. are just two of the numerous tings that Morrie has tried to teach us. If we could all handle death as gracefully as Morrie did, death wouldnt be nearly as big a deal to people. Morrie teaches us that there is a time to be three and a time to be sixty-three. Morrie tells us that death is just as much a fact of life as a birthday or getting married. Morrie sets a high standard for coping with a terminal illness. We can also look to the Bible to give us Gods take on death and life after death. The Catholic faith believes that no matter what there is life after death. Whether that life after death takes place in heaven or hell depends largely on how you live your life here on earth. Our citizenship is in heaven. And we eagerly await a Savior from there, the Lord Jesus Christ, whowill transform our lowly bodies so that they will be like his glorious body. (Philippians 3: 20, 21) Through the belief in God and living according to his commandments we can attain a life after death. O death, where is thy sting? O grave, where is thy victory? The sting of death is sin; and the strength of sin is the law. But thanks be to God, which giveth us the victory through our Lord Jesus Christ. (1 Corinthians 15:51-57)

Sunday, July 21, 2019

Steganography: Uses, Methods, Tools and Examples

Steganography: Uses, Methods, Tools and Examples Steganography by Mohammed Almintakh ABSTRACT This paper talks about steganography, steganography is the art or hiding data within a medium without letting others to know about that data is exsisting. I will go through an introduction about it , then explaining the background of it and more information about the uses of this technique , and how organization use it in their own good. This topic surprisingly is new for most of people who read its name , ill try to simplify the idea of this approach as much as possible. 1. Introduction Steganography is the art of hiding a message. The purpose of steganography is to hide a message from a someone you don’t want to see it. It is different than cryptography, the art of secret writing, which is intended to make a message cannot be read , but does not hide the existence of the secret communication. Although steganography differs from cryptography, there are many analogies between the two, and some authors classify steganography as a form of cryptography since hidden communication is a type of secret writing. Steganography works by changing bits of useless or bot used  data in regular computer  files  (such as graphics, sound, text,  HTML) with bits of different, invisible information. This hidden information can be  plain text,  cipher text, or even images. 2. Steganography Background: Information hiding is related to two fields, Steganography and watermarking. There are three main aspects for information hiding, capacity, security, and robustness. Capacity means the amount of information that can be hidden, security refers to the unability of an eavesdropper to detect hidden information, and robustness to the amount of modification the cover medium can resist before the hidden information is corrupted. In general, information hiding goes through these processes: 1. Identification of redundant bits in a cover medium. Redundant bits are those bits that can be edited without taking care of the quality of the cover medium. 2. Then, we select a subset of the redundant bits to be replaced with data from a private message. The stage medium is created by replacing the selected redundant bits with message bits. The modification of redundant bits can change the statistical properties of the cover medium. As a result, statistical analysis may reveal the hidden content. 3. Uses of Steganography Steganography means of storing data in a way that it hides the existence of them. Steganography used to carry out hidden exchanges .For example, Governments are interested in two types of communication of hidden data: first, which supports national security and second, which does not. Steganography support both types, also business have similar concerns, about trade secrets for new technologies or products information. Of course, using steganography to communicate greatly reduces the risk of information leakage. Businesses takes advantage of another form of steganography, called watermarking. Watermarking is mainly used to identify and entails hidden unique part of information within a medium without touching the medium. For example , let’s say that I have design an image , with that image , I have embedded a watermark that identifies me as the one who created this image, later on , when this image is spread with people , I can later identify myself as the creator and I can of course prove that I am the owner of this. This approach is used by companies for the copyrighted digital media a lot for the purpose of protection. Also, steganography enhances the privacy individually, although it is not a substitute for encryption, of course this is effective only if the hidden embedded information is not detected. If the communication is almost never exists, this will becomes so private to be caught. Like many tools, steganography: 1. Steganography can be a way which makes it possible to send news and information without being censored and without the fear of the messages being intercepted and traced back to us. 2. It is also possible to simply use steganography to store information on a location. For example, several information sources like our private banking information, some military secrets, can be stored in a cover source. When we are required to unhide the secret information in our cover source, we can easily reveal our banking data and it will be impossible to prove the existence of the military secrets inside. 3. Steganography can also be used to implement watermarking. Although the concept of watermarking is not necessarily steganography, there are several steganography techniques that are being used to store watermarks in data. The main difference is on intent, while the purpose of steganography is hiding information, watermarking is merely extending the cover source with extra information. Since people will not accept noticeable changes in images, audio or video files because of a watermark, steganography methods can be used to hide this. 4- Steganographic Methods: The formula below describes the process of steganography as discussed above: cover_medium + hidden_data + stego_key = stego_medium The explanation of this formula is, The cover medium refers to the file that we are going to put our information on it. Hidden data obviously is the data we want to keep secret. An encryption advanced which is a choice for us. The result shall be a stego medium , which is the same file as the cover medium. The easiest way to hide the data in an image , is called LSB(least significant bit) insertion. Figure 1: shows a common taxonomy of steganographic techniques. 5. Steganography Tools: A  steganography  software tools allows a user to attach hidden data in a carrier file, such as an image or video, and sometimes it could be an audio , and later take off that data. It is not necessary to hide the message in the original file at all. Thus, it is not necessary to edit the original file and thus, it is hard to detect nothing. If a given part of the message is subjected to successive bitwise manipulation to generate the cyphertext, then there is no evidence in the original file to show that it is being used by a third party. to encrypt a file. An example of this method is described in a self-published science fiction novel. In that example a file is encrypted using a 1949 photo from a digital archive of National Geographic magazine. 6. Steganography Example: There are software that preform steganography, some of well knows programs are : Hide4PGP (http://www.heinz-repp.onlinehome.de/Hide4PGP.htm) MP3Stego (http://www.cl.cam.ac.uk/~fapp2/steganography/mp3stego/) Stash (http://www.smalleranimals.com/stash.htm) Steganos (http://www.steganos.com/english/steganos/download.htm) S-Tools (available fromhttp://www.webattack.com/download/dlstools.shtml) 7- Describing a tool of Steganography and how it works: Take a look on this picture Figure 2: Stego picture This picture looks ok , nothing suspicious , nothing wrong with it , but in reality it has a hidden message. If you use a software tool to analyze the pictures , this result will come up: Figure 3: QuickStego program Basically , this technique is done by these steps below : Figure 4: Steganography process 8- Deep knowledge of Steganography: Steganography comes from the Greek words for â€Å"covered writing†.It is the practice of disguising the existence of a message.Generally, innocent looking carriers, e.g., pictures, audio, video, text, etc. that hold the hidden information The combination of hidden data-plus-cover is known as the stego-object Stegokey An additional piece of information, such as a password or mathematical variable, required to embed the secret information Typical Scenario Sender Sender Hides Secret Message In a Cover Using a Stegokey Transmitted Carrier Appears Innocuous Receiver Decodes Secret Message by Removing the Cover Using the Stegokey Receiver Reads Secret Message 9.Steganography and Security As noted above , steganography is an effective and efficient way of hiding data, it is just protecting the data from the unauthorized or unwanted interception. But stego is merely one of many methods to defend the confidentiality of data. It is probably the best used in integration with another data-hiding method. When used in collection, these ways can all be a part of a layered security mechanism. Some good complementary methods include: Encryption-  Encryption  is the operation of crossing data or plaintext through a series of mathematical processes that generate an alternate form of the original text known as ciphertext. The encrypted text can only be read by one who have been given the proper key to decrypt the ciphertext back into its original plaintext form. Encryption doesnt hide data, but it does make it difficult to read! Hidden directories (Windows)- Windows provides this feature, which allows users to hide files. Using this mechanism is as easy as changing the characteristics of a directory to hidden, and hoping that no one can view all types of files in their explorer. Hiding directories (Unix)- in current directories that have a lot of files, such as in the /dev directory on a Unix implementation, or making a directory that starts with three dots () versus the normal single or double dot. Covert channels- Some tools can be used to transfer important data in seemingly normal network traffic. One such tool that does that is Loki. Loki is a tool that hides data in ICMP traffic (like ping). 10.  Steganography vs. Encryption The goal of steganography is to not keep others know the hidden information, of cource , to keep others from thinking that the information even exist.if a method of steganography causes someone to suspect the medium which carries the data , then the method has failed. Encryption and Steganography achieve separate goals, encryption is changing the meaning of the message so it cannot be read, steganography does not change the meaning or change the data to make it unusable or unintended, rather, it prevents the third party from suspecting that there is a communication or data even exists. For these people who want to reach ultimate in security or privacy , can combine both approaches , encryption and steganography. Encrypted data is difficult to be differentiate from normal occurring phenomena than a normal plain text (which is a raw text) in the medium, there are several steganography tools that can encrypt data before hiding them in a chosen medium. Steganography should not be confused with encryption .Encryption disguises the content of a message. The existence of the message is usually obvious.Steganography disguises the existence of the message .However, additional security can be obtained if steganography is combined with encryption. 11. Steganalysis and its techniques: Steganalysis , is the counter measure of steganography, is the art of detecting that there is a steganography exists , or a decoded data within a medium. There are two main major tools in Steganalysis, information theory and statistical analysis. Mainly , this reveals clearly the tremendous potential for hidden information in the interner data of course as long as a set of data can be compressed to smaller sizes.there should be a space for hidden data within the medium. Steganalysis can be classified in a similar way as cryptanalysis methods, largely based on how much prior information is known : Steganography-only attack: The steganography medium is the only item available for analysis. Known-carrier attack: The carrier and steganography media are both available for analysis. Known-message attack: The hidden message is known. Chosen-steganography attack: The steganography medium and algorithm are both known. Chosen-message attack: A known message and steganography algorithm are used to create steganography media for future analysis and comparison. Known-steganography attack: The carrier and steganography medium, as well as the steganography algorithm, are known. 12. Method of Steganography: A lot of methods are available for digital Steganography. But exploiting the lenient constraints of a file formats is the most famous one. There are a lot of softwares that uses this technique. a- Image as carriers: One of the ways to hide data is using images , which is a good method. The difficulty to reveal the data hidden increases with the detailed in an image, and that makes it harder to guess or to suspect that image. JPHIDE/JPSeek is a package that uses the coefficients to hide the information. (http://linux01.gwdg.de/~alatham/stego.html). There was a new method of that , that embeds data in visually insignificant parts of an image. These both methods modify the image. The user however can explore image degradation with different messages and images of different length. Another way is for GIF images, is to modify an image’s palette for hiding its data. Gifshuffle, which is a tool , that doesn’t modify the image itself, in any visible way. It permutes a GIF image’s color map, that will leave the original image completely intact. b- Audio File Carriers: A lot of packages also available for embedding and hiding data in the audio files. One of the tools for audio file hiding stego is the MP3Stego,which does not only hide information effectively , of cource arbitrary, rather also claims to be partly strong method of watermarking the targeted MP3 audio files. The WAV formal , which stands for Wavaform Audio File Format, is a Microsoft audio format which mainly windows depends on, however, this format lets users hide data using StegoWave or Steghide (http://www.radiusnet.net/crypto/steanography/Java/stegowav.zip) (http://steghide.sourceforge.net/). These sites refer to both programs in order. Steghide modifies the LSB of data to be transmit in the carrier medium. Using an audio file as a medium is less popular than using an image as a steganography medium. c- Data Ordering: The data ordering which does not have ordering constrains, is usually a very good method of steganography. Each change of a group of objects could be pointed to a positive integer. pointing can then be used to encode the hidden data by modifying the sequence of objects that are not considered in ordered by the carrier medium. While this technique mainly, does not change the information quality, the data which are hidden can of course easily get lost if the medium is encoded again. For example, if we have a GIF which its color map consist of hidden data, we could then open the GIF in our favorite graphics-editing tool package that will be used , and save it again. Visually, the result will be both identical , from the original file to the second file, but the ordering of the color map may have been lost. 13. Limitations: Steganography is limited just like that encryption is, if bob wants to send an image with a hidden message to alice , he have to first agree secretly with alice on a way of steganography. Underneath the encryption model , alice can be fairly sure when she has got some ciphertext. Let us have a scenario about alice ,when she wants to borrow bobs camera and neglects to tell him to be careful for every 73rd byte in the images she sends him.Bobs will be ignorant of Alice’s steganography efforts. The chanses that bob will let alice borrow his digital camera will decrease the large number of pictures he will receive from her.The amount of data that could be effectively hidden in a medium is heading to be limited by the size of the medium itselt. The less limitations that exist on the integrity of the medium, the more potential it has for hiding data. 14. Conclution I have briefly explained and defined steganography , which is in my opinion an effective tool to do so many things regarding security or reliability in any field of communication .what I mean that , this technique can be used in any section in real life, military , businesess, educational , governments and more.Also , I have shown varous tools and how they function well. 15- References: 1- Artz, D. (2001). Digital steganography: Hiding data within data. IEEE Internet Computing, 75-80. 2- Provos, N., Honeyman, P. (2012). Detecting Steganographic Content on the Internet. 3- Classification of Hiding Techniques Ref: F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, â€Å"Information Hiding A Survey,† in Proc. Of the IEEE , vol. 87, No. 7, July 1999, pg. 1063 Kessler, G. (2001, September 11). Steganography: Hiding Data Within Data. Retrieved December 6, 2014, from http://www.garykessler.net/library/steganography.htmlhttp://www.garykessler.net/library/fsc_stego.html Kessler, G. (2004, February 2). An Overview of Steganography for the Computer Forensics Examiner. Retrieved December 6, 2014, from http://www.garykessler.net/library/fsc_stego.html http://www.symantec.com/connect/articles/steganography-revealed http://en.wikipedia.org/wiki/Steganography#Network http://www.webopedia.com/TERM/S/steganography.html http://quickcrypto.com/free-steganography-software.htm

Saturday, July 20, 2019

The Role Of Women In Religion Religion Essay

The Role Of Women In Religion Religion Essay Religion has been apparent and ever developing since the beginning of man. Both woman and man have contributed to that development and believed in a higher power to explain their own existence. Now, with the different variations on religion and separation in belief, women and men have taken on different roles that are distinct to their particular faith. Often, among all religions, mans role has been superior to that of women. All of the worlds major religions depreciate women to some degree; so what role do women play in religion? And what impact have they had? In examining three of the worlds major religions: Christianity, Hinduism and Buddhism, this paper will compare and contrast the role of women as well as discuss any influence women have had in the development of each faith. How Women Are Viewed? The view of women on the Hindu religion has changed over the course of history several times. The view of women was sometimes, but not always positive. In the earlier Upanishad Age they seemed to have been given more respect than in later times. According to the Hindu religion, a woman is the form of energy or an aspect of Shakti. In many Hindu scripture she is both upheld and respected. High opinion is especially given to women who are mothers and disrespect of her is considered unforgiveable. One Hindu scripture states, All other sins are expiable but he who is cursed the mother never liberated. Another Hindu scripture ranks the value of a woman over that of a man stating, An outcast father may be forsaken, but not the mother, she is never an outcast to the son. Many other religions do not hold the respect of woman over that of men. The Buddhist religion for example, states very little about women. This is not because the Buddhism refuses to recognize women but rather that they strive to have equality among women and men. Thus the scripture speaks of the human race as a whole and makes little distinction between genders. In one scripture, the Visuddhi Magga, a monk asked, Reverend Sir, have you seen a woman pass this way? And the elder said: Was it a woman or a man that passed this way? I cannot tell. But this I know, a set of bones is travelling upon this road. (Mohr, Tsedroen, 2010) In comparison to the Buddhist religion, Christianity also strives for an equal and positive view of women. In the Old Testament the creation of man is explained and represents both women and men as equally valuable. It states, Then God said, Let us make man in our image, in our likeness, and let them rule over the fish of the sea and the birds of the air, over the livestock, over all the earth, and over all the creatures that move along the ground. So God created man in his own image, in the image of God he created him; male and female he created them, (Genesis 1:26-27.) In society, Christian women have rules and laws to abide by. Christian women are instructed by God to conduct themselves modestly, as a witness of God to unbelievers. Your beauty should not come from outward adornment, such as braided hair and the wearing of gold jewelry and fine clothes. Instead, it should be that of your inner self, the unfading beauty of the gentle and quiet spirit which is of great worth in God s ight. (1 Peter 3:3-4). Christians do not try to earn merit in order that there good deeds may outweigh their bad. Roles of Women Women played many different roles in the history of the Hindu religion. During childhood she is under her parents care but when she marries she becomes the sole responsibility and property of her husband. As his wife, she takes on four different roles. Her roles include; servant to her husband in duty, minister in decision making, as a mother to his children and lover in his bed. Women in the Hindu religion are expected to act and speak with respect for their husband as well as other men. (Sharma, Libraries, 2001) In the days of the Buddha, other religious teachers had also spoken on the duties and obligations of a wife towards her husband. They stressed that it is the particular duty of a wife to bear an off-spring for the husband, and render him faithful service and to provide conjugal happiness. The teachings of the Buddha were not as biased towards the husbands. In the Singalovada Sutta, the Buddha had clearly stated both the duties of the husband towards the wife and vice versa. On the part of the husband, he should be faithful, courteous and not despising. It is the husbands duty to hand over authority to his wife; and from time to time, provide her with adornments. Therefore, we witness the unbiased attitude shown by the Buddha towards both men and women. (Yifa, Yifa, 2010) In the Christian faith there is a contrasting perspective. Women, though viewed as equal to men in value in the eyes of God are given unequal roles. In Genesis 2, there is a more detailed account of the creation of Adam and Eve and discloses the differences in their purpose and responsibilities as given by God himself. The general idea is that God did not create the man and the woman at the same time, but rather He created Adam first and Eve later for the specific purpose of being Adams helper. Eve was equal to Adam, but she was given the role and duty of submitting to him. The womans one and only role in the Christian religion is to be submissive to her husband and be a good helpmate to him. (House, 1995) A woman has no role in the church that is ruled and dictated only by men. The Christian woman is instructed by scripture to remain silent in matters of the church. 1 Corinthians of the Bible states, Let your women keep silent in the churches, for they are not permitted to speak; bu t they are to be submissive, as the law also says. Women in Religious and Leadership Roles The leadership and religious roles of women in all three religions have changed over the course of history. Women in early Hinduism were very well respected. They took part in the royal court, and they were not afraid to push an issue until they were fully satisfied with the answer. These teachers were wise and well valued by other philosophers, of both the male and female genders. These women also contributed to how the various sacred teachings of Hinduism were brought down through the generations. Over the years, the situation surrounding Hindu women is gradually changing. They are gaining respect in both politics and religion and share an equal status with men. In some cases they enjoy more opportunities than women in many western countries. (Sharma, Libraries, 2001) Advances are also being made for women in the Buddhist religion. The Buddha opened the gates for the full participation of women in the field of religion by making them eligible for admission into the Bhikkhuni Sangha the Order of Nuns. This opened new paths of culture, social services and opportunities for public life to women It led implicitly to the credit of their importance to society, and in doing so enhanced the status of women .It was said that under circumstances women are considered wiser and discerning than men, and that they are also capable of attaining perfection or sainthood treading the Noble Eight fold Path. (Yifa, Yifa, 2010) When King Kosala found that he had a daughter Instead of a son, the Buddha pointed out not only their weaknesses but also their potential. The Buddha clearly showed that women are capable of understanding his teachings and also to practice them to some degree of spiritual attainment. (Mohr, Tsedroen, 2010) The modern era of Buddhism is much different than in the days of the Buddha. Womens liberation, their quest for freedom and equality achieved tremendous strides mostly in the West. This came about as the result of modern trends and thinking, and modern education for women in all areas of higher learning. Like women in Hinduism and Buddhism, women in Christianity have gained better status and new roles in religion. In fact, women in Christianity may have made the most progress over history. In the early development of Christianity, women were told to take on the submissive role and only he a helper to their husbands. The womans role in the church was nonexistent and has now risen to a point where she can obtain roles as a minister and/or dean in the church. The Christian woman also has a voice that is respected and valued in making decisions. In conclusion women of all three religions were historically not given the value and respect that men were, but have all gained new status and roles in their religion. Women throughout history have played different roles in different religion, but most of the time women were submissive to men. Women would never dream of becoming a minister or involved in the leadership of the religion regardless which religion it was. Today, women play more roles in leadership than ever before.

An Analysis of William T. Vollmann’s The Visible Spectrum Essay

The task of interpreting William T. Vollmann’s works seems as monumental for the reader as writing the story oneself. The text of â€Å"The Visible Spectrum†, in fact, does not feature any extensively challenging vocabulary or particularly thwarting subject matter; yet it would seem that in all of its â€Å"objectivity† and â€Å"transparency†, there lies no obvious, dominant or intended interpretation. The narrative is ambiguous in its â€Å"message† to an infinite degree, and thus the reader must construct its â€Å"meaning† given only scraps of discontinuous plot, description and dialogue. Vollmann’s story concentrates on the private experiences of individuals in a hospital. The commonality of the setting allows the reader to make necessary assumptions about the locale, timing and purpose of these hospital visits, also permitting the author flexibility in selecting events to comprise the plot. The universality of the hospital experience (lingering in the waiting room, a doctor’s examination, and a nurse’s questioning, for example) encourages the reader to relate to these private events in a shared, public manner. In this way, Vollmann relies upon one’s knowledge of hospital procedure to make greater comments about other institutions and society in general. Using a pseudo-scientific, case-study approach, â€Å"The Visible Spectrum† correlates the ideologies of a hospital to that of society. Vollmann’s sociological critique describes the hospital as a microcosm of the society in which it is located; although theoretically structured, efficient and beneficial to its patrons, in practice, however, the institution (and likewise, society) veils its omnipotence in the illusion of an individual’s agency and self-determination, while acting... ...aims to a final hope or refuge for humanity, but rather concludes its hospital-as-society metaphor with a semi-entropic presentation of sociological reality as counter-utopian, desolate and irreparable. WORKS CITED 1. Vollmann, William T. â€Å"The Visible Spectrum.† Postmodern American Fiction. Ed. Paula Geyh et al. New York, NY: W. W. Norton & Company, 1998. 153-161. [1] I suppose that characterization is not particularly necessary in this story, as one is able to ‘connect with’ a character given the generality of his or her experience (having blood drawn, for example). [2] On another note, a discussion of veins and blood seems necessary in Vollmann’s work. In one sub-chapter, â€Å"People without Veins† (Vollmann, 157), it appears as though the author is hinting that the vein-less individuals (who are therefore also blood-less) are inhuman, almost robotic

Friday, July 19, 2019

The Body Essay -- Sexuality

The social and cultural conditions in which we live in today continue to perpetuate and maintain the rape culture that pervades our lives, especially for the lives of individual women. As a feminist thinker, Ann Cahill works to change this by challenging current definitions of rape as assault, and addressing questions of why rape exists in the first place, and how we can begin the prevention process. In Cahill’s book, â€Å"Rethinking Rape†, she approaches the subject of rape by analyzing the works of contemporary feminist theorists like Judith Butler, who perceive the female body as a potential site of resistance against gender-based oppression and a â€Å"larger system of sexual domination† (Cahill 32). Although each is addressing very different issues in feminist theory, Cahill does draw upon some of Butler’s ideas about the imitation and performance of gender in Butler’s essay â€Å"Imitation and Gender Insubordination.† Cahill does t his in order to further articulate her critique of â€Å"the body† and the role it plays in the phenomenon of rape â€Å"as an embodied experience of women† at the level of the individual (Cahill 109). There are certain concepts besides the performance of gender that both Authors touch on including â€Å"the body†, heterosexual norms as inhibitions to attaining liberation, the relationship between sexuality and gender, and the problematic nature of social constructs. By comparing and contrasting the works of Cahill and Butler, this paper will explore the importance and complexities of â€Å"the body†, the pivotal role it plays in Cahill’s critique of the phenomenon of rape, and how Butler’s critique of â€Å"coming out of the closet† values the notion of gender â€Å"performativity† more than the notion ofâ€Å"the body† itself. Before de... ... feminine body so we internalize that ideal and subject ourselves to the â€Å"intrusive, expensive, and high maintenance practices in order to be rendered beautiful† (Cahill 155). There are a number of factors that play into the perpetuation of rape culture, the hierarchy of gender, and gender performativity. The one thing they all have in common that is essential to understanding how men have been able to oppress us for so long and continue to oppress us. â€Å"The body† is the one thing that can maintain our inferiority and powerlessness, but it can also be the one thing that can free us from the same system of oppression. Works Cited Butler, Judith. "Imitation and Gender Insubordination." The Second Wave: A Reader in Feminist Theory. Ed. Linda Nicholson. New York: Routledge, 1997. 300-15. Print. Cahill, Ann J. Rethinking Rape. Ithaca: Cornell UP, 2001. Print.

Thursday, July 18, 2019

Archetypes and Their Influence on the Personality Essay

Carl Gustav Jung (1875-1961) was born on July 26, in the small village of Kesswil on Lake Constance. He was named after his grandfather, a professor of medicine at the University of Basel. He was the oldest child and only surviving son of a Swiss Reform pastor. Carl attended the University of Basel and decided to go into the field of psychiatry after reading a book that caught his interest. Jung became an assistant at the Burgholzli Mental hospital, a famous medical hospital in Zurich. He studied under, and was influenced by Eugen Bleuler, a famous psychiatrist who defined schizophrenia. Jung was also influenced by Freud, with whom he later became good friends. Their relationship ended when Jung wrote a book called â€Å"Symbols of Transformation. † Jung disagreed with Freud’s fundamental idea that a symbol is a disguised representation of a repressed wish (Heaney, 1994). After splitting up with Freud, Jung had a 2 year period of non-productivity, but then he came out with his â€Å"Psychological Types,† a famous work. He went on several trips to learn about primitive societies and archetypes. His explorations included trips to Africa, New Mexico to study Pueblo Indians, and to India and Ceylon to study eastern philosophy. He studied religious and occult beliefs like I Ching, a Chinese method of fortune telling. Alchemy became one of his interests during his journeys. His book, â€Å"Psychology and Alchemy,† published in 1944, is among his most important writings. In this study, he told about the human mind. One of his methods was word association. This is when a person is given a series of words and asked to respond to them. Abnormal response or hesitation can mean that the person has a complex about that word. His basic belief was in complex or analytical psychology. The goal is psychosynthesis, or the unification and differentiation of the psyche (mind). He believed that the mind started out as a whole and should stay that way. That answered structural, dynamic, developmental questions. Jung is best known for his theory of â€Å"The three levels of the mind† (Aurelio, 1995). Discussion The three levels of the mind theory includes the ego (conscious), personal unconscious, and collective unconscious. The conscious level serves four functions. It is the part of the personality that carries out normal daily activities: thinking, feeling, sensing, and intuiting. The personal unconscious contains an individual’s memories, and the collective unconscious is an inaccessible layer that contains universal experiences. Usually, one of the two classes usually dominates, and rarely does one see an individual with perfectly balanced classes of behavior (Nehr, 1996). Jung said that an ego is a filter from the senses to the conscious mind. All ego rejections go to the personal unconscious. The ego is highly selective. Every day we are subjected to a vast number of experiences, most of which do not become conscious because the ego eliminates them before they reach consciousness. â€Å"The personal unconscious acts like a filing cabinet for those ego rejections† (Jurkevich, 1991,p. 58). Clusters of related thoughts in the personal subconscious form complexes. Complexes are really suppressed feelings. Complexes are often highly visible to people, but unfelt by the individual who has the complex. Complexes can be revealed by word association, which will cause hang-ups if a certain word is mentioned. A strong or total complex will dominate the life of a person, and a weak or partial complex will drive a person in a direction of it, but not too strongly. A complex, as Jung discovered, need not be a hindrance to a person’s adjustment. â€Å"They can be and often are sources of inspiration and drive that are essential for outstanding achievement† (Aurelio, 1995, p. 351). â€Å"The collective unconscious is hereditary. It sets up the pattern of one’s psyche†(Kremer, 1990, p. 2). An inherited collection of primordial images are stored here. They are universal inclinations that all people have in common somewhere by means of heredity. The four important archetypes that play very significant roles in everyone’s personality are Persona, Anima(us), Shadow, and the Self. Persona is derived from the Latin word meaning â€Å"mask†. In Jungian psychology, the persona archetype serves a similar purpose; it enables one to portray a character that is not necessarily his or her own. The persona is the mask or facade one exhibits publicly, with the intention of presenting a favorable impression so that society will accept him (Nehr, 1996). Anima and Animus is what Jung referred to as the â€Å"inward face† of the psyche. The â€Å"inward face† he called the anima in males and the animus in females. The anima archetype is the female side of the masculine psyche; the animus archetype is the masculine side of the female psyche. Man has developed his anima archetype by continuous exposure to women over many generations, and woman has developed her animus archetype by her exposure to men (Heaney, 1994). According to Mannis (1997), the â€Å"Shadow† is what Jung referred to as â€Å"the negative side of the personality, the unpleasant qualities we like to hide†. When one is not conscious of their â€Å"shadow†, they give it more power. â€Å"Usually, the qualities we dislike the most in others, are the unknown qualities in our shadow† (Kremer, 1999, p. 4). â€Å"The self represents all archetypes working together† (Heaney, 1994, p. 29). Jung used the words extraversion and introversion to show how one’s personality is. Those who lean towards extraversion are usually socially accepted. They are outgoing and very sociable. Those who lean towards introversion tend to keep to themselves and are not very sociable. One’s psyche works together three ways. One structure may compensate for the weakness of another structure (Jurkevich, 1991). One component may oppose another component, and two or more structures may unite to form a synthesis. Compensation may be illustrated by the contrasting attitudes of extraversion and introversion. If extraversion is the dominant or superior attitude of the conscious ego, then the unconscious will compensate by developing the repressed attitude of introversion. Compensation also occurs between function. A person thinking or feeling in his conscious mind will be an intuitive, sensation type unconsciously. This balance is healthy and it prevents our psyches from becoming neurotically unbalanced. Opposition exists everywhere in the personality: between the persona and the shadow, between the persona and the anima, and between the shadow and the anima. The contest between the rational and irrational forces of the psyche never ceases. One’s integrity of â€Å"self† can actually determine whether or not this opposition will cause a shattering of a personality (Heaney, 1994). I decided to do my research on Carl Jung because he is not discussed much in the textbook. I find his theory of conscious and unconscious very interesting. I believe the thoughts of persona and ego without a doubt. When one’s ego is shot down, a person can tend to develop a complex about it. I also agree that people tend to have a different persona based on where they are at and how they are expected to act around certain people. References Aurelio, Jeanne M. (1995). Using Jungian archetypes to explore deeper levels of organizationalculture. Journal of Management Inquiry, 4, 347-369. Heaney, Liam F. (1994). Freud, Jung and Joyce: Conscious connections. Contemporary Review,265, 28-32. Jurkevich, Gayana. (1991). Unamuno’s intrahistoria and Jung’s collective unconscious: parallels,convergences, and common. Comparative Literature, 43, 43-60. Kremer, Jurgen W. (1999). Facing the collective shadow. Revision, 22, 2-5. Mannis, Robert F. (1997). Jung and his shadow. Utne Reader, 84, 91-94. Neher, Andrew. (1996). Jung’s theory of archetypes: a critiques. Journal of HumanisticPsychology, 36, 61-92.

Research method paper: impact of tourism on local communities Essay

Impact of Ecotourism on radicalal anesthetic CommunitiesTable of ContentsTable of FiguresSection1 incomingWith the important objective of promoting responsible touch off to natural argonas, the easy-being of communities and the environsal preservation, ecotourism is presented as an alternative type of tourism which is suppuration incredibly fast (Scheyvens, 1999). One of the objectives of ecotourism is to let benefits to stemal anesthetic anaesthetic communities. The important relationship in the midst of ecotourism and topical anesthetic communities could be explained by the accompaniment that traditional homelands of indigenous great deal be usually the most natural and least developed atomic number 18as of the world (Coria & Calfucura, 2012) The paper is counterbalance follow-uping the unlike shock absorbers that ecotourism faecal matter wee-wee on local communities. The development of ecotourism dismiss experience an important sparing match and can g enerate income, employment and business opportunities (Yacob, Shuib, & Radam, 2008).Thus, mostwhat(prenominal) developing countries have adopted ecotourism with the trust to improve their economy in an environmentally sustainable manner (Coria & Calfucura, 2012). In the wink part, a deep analysis of the methodology of leash terms ab divulge the impact of ecotourism on local communities has been do. The analysis shows two strengths and weaknesses of from for each one maven(a) types of methodologies that were single-valued function and jock then to make up 1s mind which one would be the most commensurate when writing an undergraduate dissertation with regularise aim. C one timerning the methodology that was used for this project, the information was primarily taken from university informationbases, academic journals and reports as nearly as the seek methods books to help the psychoanalyse of the methodologies.Section 2 Literature followupEcotourism is being pr oposed as a scheme that result help to resolve affectionateand sparing issues encountered by local communities, and as an adequate and effective way of of conserving the environment (Garrod, 2003). Thus, this concept has been adopted by some(prenominal) developing countries with the hope that it provide pay back them economic benefits (Coria & Calfucura, 2012). However, some(prenominal) creators wondered whether local communities argon genuinely beneficiating from those benefits (Jones, 2005). Sheyvens (1999) overly agree on the feature that to en authoritative the process of ecotourism leave alone be a success all if they argon sharing the benefits of it. The reasons why local communities should consider the ecotourism include becoming assured of natural attractions value, understanding the necessity for sustainable tourism and the environment conservation. withal, several benefits should be taken into consideration much(prenominal) as the additional revenues tha t it could generate for any local types of business as salubrious as the increase in employment opportunities and the enhancement of their elaboration. Unfortunately, even though ecotourism is bringing benefits, some drawbacks have to be taken into consideration.For instance, army communities do non participate a lot in decision reservation they ar also some cartridge holders used for the resources without receiving any benefits, it can damage their participation cohesion and the rapid tourism proceeds can precipitate important socio-cultural changes (Wearing & Neil, 2009). Belsky really encourages local familiarity to participate into conservation and ecotourism scarce he mentions that they will non do so unless communities benefit from tourism (as cited in Stronza & Gordillo, 2008). Ecotourism is certainly bringing numerous economic benefits but is also astir(p) many different aspects of the communities livelihood. Garrod (2003) explains that by involving them in th e ecotourism project, they will obtain bigger watch over their resources and over the decisions concerning the use of such resources that affect the way they live. However, some prejudicial aspects of ecotourism should be considered. Only few local communities, engaged in ecotourism or really close to tourism operations and bear on areas, have realized real benefits from it. some(prenominal) tour operators have been unenthusiastic with the positioning that they had to share the assertable returns with local communities (Stronza & Gordillo, 2008). In the alike way, Lima and dHauteserre (2011) give tongue to that tour operators do not help the communities in the way they should. Also, even though ecotourism is generating raw(a) revenues, it is increasing the gap among the richer and thepoorer.Earnings are most of the time unequal and conflicts are emerging which are breaking the social cohesion of local communities. Information retrieved from different hearings, it bulg e outed clearly that the meshing received were not sufficient and could not support everyone (Stronza & Gordillo, 2008). Retrieved from other interviews with other communities, the same idea was shared concerning the fact that economic benefits could generate newly conflicts deep down the lodge such as disputes among the members, mis winning concerning the revenues distribution and tasks allocations, which could then lead to a more important problem if race do not collaborate a right way (Lima & d Hauteserre, 2011) just about of the interviewees testified that ecotourism was not the solution to fix economic issues but agreed on the fact that it could bring more opportunities such as establishing a good network, developing new skills and give out self-esteem (Stronza & Gordillo, 2008).local anesthetics seem to aim more aware of their own culture through the relation established between tourists and outsiders and this seems to increase the community self-esteem and beliefs ( Lima & d Hauteserre, 2011). According to Jones, when local communities are completely involved in the ecotourism process, being instantaneously engaged in decision making and working independently with management tasks, they decease aware of the fact that new skills are required. Therefore, many people att terminate culture sessions, sometimes organized by the authorities or associations. This helps them to face new realities and new habits (Lima & d Hauteserre, 2011). Also, ecotourism can have an impact on locals that are not at present working into the ecotourism sector. For instance, the intro of handicrafts, folklore, tales and basically the presentation of their culture appear to reduce the inferiority feelings that some local people could feel.It also enhances their identity and they become more aware of their culture leading to a break self-esteem (Lima & d Hauteserre, 2011). Thus, even if ecotourism could appear is an ideal alternative type of tourism that will help to address economic and social issues toward local communities, some nix aspects should not be neglected. To make sure that the process is working perfectly, improvements need to be done. Also, local communities should not be employ and should receive the benefits of their involvement (Wearing & Neil, 2009).Section 3 Comparison of methodologiesIn this section, methodologies of terce different names used in the previous lit will be analyzed and opposed taking into account their strengths and weaknesses and more specifically their validity, dependableness and truthfulness. The three articles that will be compared are Community views of ecotourism by Stronza, Ecotourism impacts in the Nicoya Peninsula, costa Rica by Almeyda, Broadbent, Wyman, and Durham, and Community capitals and ecotourism for enhancing Amazonian afforest livelihoods by Lima and dHauteserre. All three articles are talking about the impact of ecotourism on local communities but they simmer down differ by the method they used to obtain their information. To do a punter comparison of the methodologies, the book Research Methods For credit line Students wrteen by Saunders, Lewis and Thornhill was really useful.1. Stronza, 2008 Community views of ecotourism.2. Almeyda, Broadbent, Wyman, and Durham, 2010 Ecotourism impacts in the Nicoya Peninsula, Costa Rica- 3. Lima, dHauteserre, 2011, Community capitals and ecotourism for enhancing Amazonian forest livelihoods Method and approach used quantifiable and qualitative approachUse of auxiliary selective informationIn depth interviews with local householdsSemi incorporated interviews with community leadersQualitative approach, use of primary selective informationDeductive approach (but inductive at some points)In depth surveys, carriage structured interviewsQualitative approach use of substitute(prenominal) and primary entropy.Mix of inductive and deductive approachStructured role player ObservationsIn-depth and fishing rig-structured i nterviewsAim and objectives of the articleGive an overview of what soldiery communities hold of the impact of ecotourism Determine the do of the Punta Islita eco- anticipate on the Nicoya Peninsula in Costa Rica. ask how ecotourism development enhances existing capital at community level. LocationAmazone regionBoliviaPeruEcuadorNicoya Peninsula in Costa RicaBrazil, AmazoniaMaripaMaguariJamaraquaTime PeriodThe cultivation was done during six months in 2003 and consisted of three five-days workshop. 2008 (time of publication)2010Three months fieldwork2012SamplePurposive sampling164 households (62 from Peru,67 from Bolivia, 35 from Ecuador,represented 45%, 55% and 7% of the communities population.) One community leader from each commnityPurposive ensample with 63 households within 45 had at least a member employed in the lodge and 17 not employed by tourism industry but still receiving revenue from it Random sampling for employees in depth surveys39 tourists filled out self-admi nistered questionnaires27 community inhabitants42 local stakeholders (10 people from tour operators, 10 frim NGOs and 22 people from government environmental agencies oppugn frameworkSemi-structured interview of 2-3 hoursOpen endedIn depth interviews with householdsSemi structured interviews with community leaders and self administred questionnaire for hotel guests In depth questionnaire based surveysNot stipulate with who they did each types of interviewLimitationsBenefits and indicators of success in each site were determined by emic, or subjective rather than etic. This research may reflect a situation that might changeSample surfaceSourcesStronza, 2008Almeyda, Broadbent, Wyman, and Durham, 2010Coria and Calfucura, 2012Table Comparison of methodologyThe initiatory article written by Stronza, is self-aggrandizing an interest approach as an overview of the topic is first apt(p) to describe ecotourism in general as well as the practicable benefits it could bring to local commun ities. The author then relied on a news report done 5 years sooner which had for goals to hear the communitys eyeshot which used in depth interview with local households and fishing rig structured with community leaders during workshops. As the withdraw was done in different countries which are Peru, Bolivia and Ecuador it allows readers to think at a big exfoliation and it is in all probability more reliable than a study done only in one specific area. A possible weakness would be that, as in-depth interviews are used, even though interviewers have some key questions that they need to cover, their use will depend from one interview to other interview.Concerning the second article written by Almeyda, Broadbent, Wyman, and Durham, it is mostly based on the prayer of primary data with surveys, interviews and questionnaires that they conducted themselves in one specific eco-lodge among guests, employees and locals. The weakness of this article, even if no(prenominal) seem to be mentioned in it, is likely the sample size of it and the fact that the semi structured interviews can lead to data quality issues. Indeed, as it may be hard to standardize the different kindly of interviews, this may lead to reliabilityproblem. Also interviews are reflecting reality at the arcsecond they were collect and then the results obtained from those interviews will not be automatically the same in similar interviews will be conducted in the future. In contrast with the first article, this one used mainly primary data whereas the first one used secondary data. Also, in this article, the study was undertaken only in Costa Rica, which was probably the purpose of the writers, but it narrows the research for someone reading the article. Writers could have undertaken their study to other country to compare both analysis.The last article consists of a collection of secondary and primary data, collected through structured participant observations as well as in-depth and se mi-structured interviews. The strength of this article is that, as secondary data sources, it provides data that are easy to check. Also, it allows scholars or researchers to return time and effort by providing thoughts of several authors about one specific topic. However, when apply secondary data, readers have to be thorough that the sources cited in one lit review were not misunderstood by the one writing the literature review and that they are reliable and valid sources. Although, a possible weakness of the last article would be that the case study do not automatically reflect what is happening in other regions.As the study took line in Brazil, it is not a standardized model that could be applicable to another community everywhere else in the world. Also, their sample was really interesting as they interviewed people for NGOs, tour operators and governmental agencies as well as with local people. Thus once the information has been gathered it gave to the readers a better and generalized overview of the ecotourism impact of locals. Structured observations help also to do that but the main issues about it is the question of reliability as the observer must interpret something in a wrong way and therefore the observer should make sure he understood the setting very well before interpreting.Section 4 pickax of MethodologyOut of the three articles cited in the above section, the one with the most assign methodology for the dissertation of an undergraduate school-age child would be the first one. As previously analyzed, the methodology used in this article proposed first a sort of literature review which seems crucial tohave an overview of the topic and then series of results obtained through in depth interview with local households and semi structured interviews with community leaders. The most interesting thing is that it is representing three different countries which are Peru, Bolivia and Ecuador, that are still close to each other in South the State s but representing different cultures. By providing both qualitative and quantitative data, it gives the learner a better understanding of the topic.However, the sample size was not always appropriate as it was not all the time representing the absolute majority of the population. Special attention should be given to the size of the sampling to make the study reliable. Indeed, if the majority is not represented it can be considered as unreliable. The semi-structured and in-depth interviews are, for an undergraduate student, probably one of the best ways for a better understanding of the topic as they might adapt their questions from interview to interview. It will be really helpful to explore in depth the topic the student might be interested in.ReferencesAlmeyda, A. M., Broadbent, E. N., Wyman, M. S., & Durham, W. H. (2010). Ecotourism impacts in the Nicoya Peninsula, Costa Rica. International Journal of tourism Research, 12(6), 803819. inside10.1002/jtr.797 Coria, J., & Calfucu ra, E. (2012). Ecotourism and the development of indigenous communities The good, the bad, and the ugly. bionomic Economics, 73, 4755. inside10.1016/j.ecolecon.2011.10.024 Garrod, B. (2003). Local confederacy in the Planning and Management of Ecotourism A Revised Model Approach.Journal of Ecotourism, 2(1), 3353. inside10.1080/14724040308668132 Jones, S. (2005). Community-Based Ecotourism. Annals of Tourism Research, 32(2), 303324. inside10.1016/j.annals.2004.06.007 Lima, I. B., & d Hauteserre, A.-M. (2011). Community capitals and ecotourism for enhancing Amazonian forest livelihoods. Anatolia, 22(2), 184203. doi10.1080/13032917.2011.597933 Scheyvens, R. (1999). Ecotourism and the empowerment of local communities. Tourism Management, 20(2), 245249. doi10.1016/S0261-5177(98)00069-7 Stronza, A., & Gordillo, J. (2008). Community views of ecotourism. Annals of Tourism Research, 35(2), 448468. doi10.1016/j.annals.2008.01.002 Yacob, M. R., Shuib, A., & Radam, A. (2008). How Much Does Ecot ourism Development Contribute to LocalCommunities? An Empirical Study in a Small Island. The Icfai Journal of Environmental Economics, VI(2), 5468. Wearing, S., & Neil, J. (2009). Ecotourism impacts, potentials and possibilities. (2nd ed., pp. 115-136). Oxford, England Butterworth-Heinemann.

Wednesday, July 17, 2019

Website Analysis

Web come out Analysis Assignment I choose the website of Gleaners Community pabulum Bank of southeasterly Michigan to analysis. Its address is http//www. gcfb. org/site/PageServer? pagename=homepage. The site intelligibly states Gleaners mission Nourishing Communities by Feeding thirsty(p) People, on the heading with the companys word-painting and also in the low What we do text chunk. From the entropy provided, I found that it serves three reference segments donators, provides, and match agencies.From my perspective, the donators group is the one the organization in general to target, because comp are to other groups, the organization provides exhaustive introductions rough boon and place them on a more easy-to-grasp place. For instance, three out of five homepage text blurbs and the eldest effect comes out in the homepage are whole about contribution The website groups related items into different boards and connects. However, the link name and the hierarchical order are confusing to me. The main menu arranges education as HOME, suck up ACTION, EVENTS/ feed DRIVES, shutdown HUNGER and quisling AGENCIES.For the first sight, people will non understand what the END HUNGER partition means and will encounter to pursuit. Besides, I think the END HUNGER and EVENTS/FOOD DRIVES dents should be before the repel ACTION and PARTNER AGENCIES. Because people need to see the organizations mission and approaches before making a donation or partner decision. Moreover, the website does non do efficacious in terms of web navigation. Different audiences gather in to click back and forward among different link to get all the development they want.The websites menu put donation and volunteer together into the hierarchical menu of TAKE ACTION It puts some of the partner agent registering strangely into the END HUNGER section Besides, the Need Food Now which links to Gleans partner agencies occurs twice at the top-row menu and the right tow boat header within a screen length. This facsimile link is unnecessary since to find the schooling, you do non even need to roll your mouse. The bottom-row menu provides some site navigation about jobs and contact information but does not list any encouraging information on location or site map.All these designs draw off the presentation distracting and inefficient. When I face up into its theme, I find the information is periodically updated, however, not fresh. The last update news is in October. I volunteered with Gleaner on the first Saturday of November and wanted to see our volunteer pictures on the website. It is clearly guaranteed on website, the volunteer section that the pictures will updated per week. However, it seems that the company ate its words. Since the news is not newest, current audiences will feel disappointed and the likely audiences may lose their interest to keep looking at the site.Despite the fact that some information is not easy to access for ce rtain audience, the information content itself is helpful. For example, when I go to the Bag ache event link, I piece of ass find a very attracting event poster, the event date, location, contact information and even a calendar which brings you to previous and upcoming events. The website is written in a consistently passkey and friendly tone. It invites interaction with email newsletters, facebook, twitter, mobile and visit tour. Most of its texts maintain pleasing, easy-to-read line length, use the causa size and color that are easy to read from the background.The line spacing is consistent and easy on the readers eyes as well. The text is balanced with superb illustrative graphics and bulleted lists. The graphs in the website are very powerful. They are adorable and creative in design. When surfriding the site, I even stored some pictures in my computer. hardly a problem about them is the size. They are so small that I have some struggles to enamour the words in the pi cture. Thus the small size kills the informational effectiveness of the pictures. Glearners Food Bank has its headlines and page denomination clear, very simple but still to the point.So it saves the readers time and keeps them interested. Its name and logo are on every page and links to the homepage. The internal links provides identification for all pages with both heading and a short text that explains the purpose of each page. For the contribution site, you can see a description that You can help feed our hungry neighbors today with your donation of funds or food to Gleaners. For the volunteer, it has View a list of current volunteer activities, View our military volunteer Scrapbook to see some of the thousands of volunteers who assist Gleaners every class clearly states the purpose.The heading also contains a chase with an advanced searching option. I tried the search by Wayne State University, and hoped to find their volunteer picture in the scrapbook. But the search gave me twenty uncorrelated Wayne community, Wayne annual report things. It did not work adequately. On a whole, I will trust the website with my information because it presents its information in a professional federal agency and also because it is a member of many honored charity organizations.Even though from my perspective, some items are grouped overlapped and they lack strong logic drive, intimately of the words are really simple and informative. To make the website look better, I suggest the following * take form the images larger and easy on the readers eyes * Delete the duplicate hyperlink Need Food Now * Change the END HUNGER to a more clear and understandable title * fructify the menu into a logic order put END HUNGER and EVENTS/FOOD DRIVES sections before TAKE ACTION and PARTNER AGENCIES * Make sure the content is current and keep its weekly update promise