Saturday, December 28, 2019

Review the Laws Related to Security and Privacy of Data

ss | | | | | | | | Review the laws related to security and privacy of data In this document I will be discussing the laws that are related to security and privacy of datas, I will explain how they relate to the security and privacy of data. Computer Misuse Act 1990 This act was introduced to prevent users hacking. This also stops them entering a computer, programs or files without authorisation, this act is in place to prevent users to use the internet without permission to cause an act of crime and also prevents unauthorised modifications to a computer. This act does not allow any attacks on a server as this is illegal. Hacking into a computer is not allowed as it can disrupt the business as personal information can be†¦show more content†¦Copyrights This exclusive legal right that is given to the original artist to print, perform film, publish or record literary and authorize others to do so for their material. This protects a physical expression of ideas , for example someone has an idea to write a book the content that is written in that book is covered by the copyright act as it will be unique to the creator. You do not need to register or claim copyright, this protection is automatic as soon as it is created. If someone steals information or wrongly sells other work or creation for their own financial benefit then this copy right act will protect the original creator and he can claim back the money that has been gained by the person who has taken the material without permission. This protects security and the use of private data as it does not allow anyone to take data or material without the author permission, if this does happen the user who has taken this material can be fined and prosecuted as the products does not belon g to them, the author can also decide how his material has been used and if someone breaks his restriction they can also be prosecuted. Open Source This is software or material that is available with the source, this allows users to copy the material and modify the material, the reason for this is because the creators would believe that if someone can edit the material for themselves it will be more useful to another persona and will also allow lessShow MoreRelatedThe Expansion Of The Internet As A Primary Source For Communication1603 Words   |  7 Pagesconcerns over data security and privacy. Specifically the technical and legal capabilities of government agencies to coerce private businesses to turn over the data. This data collection often occurs without appropriate warrants and requires data centers to retain data for longer periods than required for business needs and build in code to give government agencies a backdoor for access. The net effect is increased security risks and decreased privacy protections for personal data. When US citizensRead MoreOrganizational Data Privacy and Security Policy1271 Words   |  6 PagesOrganizational Data Privacy and Security Policy Alyaa Ghanim What are Organizational Data Privacy and Security Policy? It is the policy of the Organization to protect against the unauthorized access, use, corruption, disclosure, and distribution of non-public personal information. The Organization shall hold non-public personal information in strict confidence and shall not release or disclose such information to any person except as required or authorized by law and only to such authorizedRead MoreRisks And Risks Of Security Essay1346 Words   |  6 Pages SECURITY Concept of Security However, risk is the likelihood of something bad happening, security help to minimize risks. There is a need to recognize how risk can result from a threat. Some of the common threats are as follows: I. Unintentional threat—natural disasters like flood, fire or snow storms or equipment failure like power failure or network failure. II. Intentional threat---includes theft of laptops, software or data and fraud which translates to unauthorized access to data. In the worldRead MoreThe Problem Of Information Security And Security1502 Words   |  7 PagesInformation security and privacy is a fundamental component of a successful and efficient healthcare environment. The coming year will be a busy one for lawyers, compliance officers, privacy officers, and senior management as they must stay above the game when it comes to privacy and security. I will explore three trending issues and concerns relating to healthcare privacy and security. My hot topics include the use of big data and its implication, the evolving risks of cyber security, and healthRead MoreNo Child Left Behind Act1358 Words   |  6 Pages1. 4. Steps Taken by Educational Institutions to Comply with FERPA Few decades back, educational institutions maintained educational records mainly in paper files. In those days, privacy breaches meant access to information present paper files without proper consent, and the main concern was related to misuse of the student information by agencies rather than the theft of records. To comply with FERPA, educational institutions had to safeguard paper files from illegal access, and provide access toRead MoreBill C 51 : Rights And Freedom1626 Words   |  7 Pagesprotected rights, on the rule of law, and on the health of Canada’s democracy. In the end, this legislation is not only unsuccessful in countering terrorism, but is also counter-productive in that it is reckless, dangerous and ineffective towards supporting Canadians’ rights and freedom. The purpose of this act is to encourage and monitor the sharing of information between Government of Canada institutions in order to protect Canada against activities that threaten the security of Canada, but this billRead MoreEssay about Hipaa: Impact the Delivery of Human Services1272 Words   |  6 Pagesfor use of the same computer language industry-wide; Privacy protection, which requires healthcare providers to take reasonable measures to protect patients written, oral, and electronic information. Congress passed HIPAA in an effort to protect the privacy and security of individually identifiable health information.† Additionally, lawmakers sought to reduce the administrative costs and burden associated with healthcare by standardizing data and facilitating transmission of many administrativeRead MoreEmployee Handbook Privacy Section1397 Words   |  6 PagesIntroduction to Employee Privacy Rights This section of the employee handbook is provided as a guideline for employees to understand the company policy and procedures regarding privacy in the workplace. While this section cannot address every possible scenario that may occur, the general policy will serve as a basis of understanding the key workplace issues and employee privacy. This section addresses privacy issues related to personal background information, off-work activities, and the corporateRead MoreThe Electronic Health Record And The Movement Toward The Digital Age1716 Words   |  7 Pages and standardizations to improve quality, safety and efficiency of the electronic health record, as well as reduce disparities of patient data of the positive HIV population. The course outcomes that my paper will address are the rules and regulations regarding privacy, confidentiality, and compliance with special attention to the HIPAA Privacy and Security rules on our local, state, federal and various regulatory agencies, an d the enforcement authority of these agencies for patients with positiveRead MoreHipaa Compliance Laws And The Iso 17799 Security Standard Essay1101 Words   |  5 PagesTHE HIPAA COMPLIANCE LAWS AND THE ISO 17799 SECURITY STANDARD Unit VII – Research Paper Margarita Olguin ITC 4390 Columbia Southern University September 14, 2016 â€Æ' THE HIPAA COMPLIANCE LAWS AND THE ISO 17799 SECURITY STANDARD The Health Insurance Portability and Accountability Act came into existence in 1996. It is part of government legislation that was created to safeguard medical information and any health records related to an individual. Government gave providers a deadline

Friday, December 20, 2019

What I Know About Anna Garcia - 1130 Words

On February 10, 2015, Anna Garcia, a 38 year old hispanic woman, was found dead in her foyer with a blood pool surrounding her head and vomit near her mouth. A similar blood stain was found on the corner of a nearby table that was found on the floor, turned on its side with a couple of orange juice 2.5 ft away from her spilled on the floor and a footprint found near her front door. Luckily, the footprint and the blood stain on the floor and corner of the table belonged to her. Based on what I know, Anna Garcia died from a Diabetic coma caused by many other disorders affecting her cardiovascular, nervous, urinary, and digestive system. Her coma was most likely caused by dehydration, heart attack, ketoacidosis, and high blood sugar, especially as she was diagnosed as a Type 1 Diabetic at the ripe age of 14 (Activity 2.1.1 Medical History). Being a Type 1, she can’t produce her own insulin which requires for her to take insulin shots, as a syringe found at the crime scene as show n in our crime scene sketch. Along with the syringe was Vasotec, an ACE inhibitor, that causes blood vessels to enlarge which lowers her blood pressure (Activity 4.1.1 Autopsy Report).. Although there was a lack of the drug in her blood of the medication being taken in 3-4 days. This simple fact explains why her blood pressure, around her last checkup(Project 4.3.1 Medical History), was 140/72 which is a signal of Type 1 Hypertension. Her blood pressure was uncontrolled as shown in her foodShow MoreRelatedA Broken System Of My Mother1716 Words   |  7 Pageswhere I truly believed she was going to be taken away from me. One late night, from basketball game, my mom was driving me back home when out of nowhere behind us we saw blue and red flashing lights, telling us to pull over. In that moment both of our hearts stopped and we both knew what was going happen. The police officer told us he had pulled us over for not have a turning signal on when we switched lanes. While we waited fo r the officer to check her license and insurance, my mom and I had alreadyRead MoreAllen Ginsberg, A Supermarket in California Literary Analysis1669 Words   |  7 Pagespoet in the nineteenth century, experimented with meter and rhythm and forgo the structured line and stanza (Holmes 1). Whitman was an eccentric, controversial for his time, and just like Ginsberg, Whitman was a homosexual (Moore 1). Whitman wrote about nature, and encroachment of industrialized society, sexual expression and freedom, spirituality, much like Allen Ginsberg’s work (Holmes 1). Like Ginsberg’s â€Å"Howl,† Whitman’s most famous work â€Å"Leaves of Grass† was considered pornographic and obsceneRead MoreNature Of Its Services At Banner Home Care Essay1931 Words   |  8 PagesHome Health Face-to-Face medical records, Zeljka Branbley, who is also a Senior HIMS Clerk. There are 10 Senior HIMS Clerk employees under the Banner Home Health division. Yvonne Garcia takes ca re of the filing and scanning in the facility and Donna Greiner oversees the storage and medical record requests. Sonja Gillum and Anna Schneider are in the West office and are responsible for creating charts, filing and scanning documents at their location. Finally, Arnel Morales; Denise Hess; Lisa Dal Ponte;Read MoreGoal Movie Review10720 Words   |  43 Pagesstars Alessandro Nivola, Stephen Dillane, Anna Friel, Marcel Iures, Sean Pertwee, Lee Ross, Stephen Graham, Kevin Knapman, Cassandra Bell, Kieran O’Brien, Tony Plana and Miriam Colon. The talented creative team includes cinematographer Michael Barrett, editor Chris Dickens, production designer Laurence Dorman, costume designer Lindsay Pugh and composer Graeme Revell. About the Production The cinema has given audiences scores of beloved, inspiring films about sports, from â€Å"Rocky† to â€Å"Raging Bull† toRead MoreCallaway Golf3311 Words   |  14 PagesGolf Company must address. The first of these issues is the fact that Callaway is losing market share. The second key issue is that they need to gain new market share. Nothing complicated here, quite simple and straightforward are the issues. What is not as simple and straightforward are the marketing solutions necessary to remedy these issues. Situation Analysis: Identify Assess 5C’s The situation analysis begins with the identification and assessment of the five C’s of marketing. TheRead MoreThe Impact Of Immigration On The United States3572 Words   |  15 Pagesfunds. These funds included weapons, money, and training from American military advisors Mumford, Jeremy. Salvadoran americans. Countries and Their Culture. N.p.. Web. 18 Nov 2014. http://www.everyculture.com/multi/Pa-Sp/Salvadoran-Americans.html. What s education like in El Salvador. web.stanford. N.p.. Web. 18 Nov 2014. http://web.stanford.edu/~hakuta/www/archives/syllabi/E_CLAD/sfusd_cult_03/nancy/new/educ.html). Many historians believe the war could have been over in less than a couple yearsRead MoreImmigration Policy And Its Impact On The United States3871 Words   |  16 PagesSalvadoran men were forced to fight for the government. To the government, a soldier was a Salvadoran boy older than 14. About half of the immigrants ended up in refugee camps in Honduras or in Salvadoran enclaves in Costa Rica, Nicaragua, or Mexico (Mumford). The other half fled to the United States. Santiago Mirales, an undocumented Salvadoran living in Leesburg, Virginia I interviewed for this project, witnessed brutal human rights abuses during the civil war. He explained to me that the governmentRead MoreThe Impact Of Immigration On The United States3629 Words   |  15 Pagesfight for the government. About half of the immigrants ended up in refugee camps in Honduras or in Salvadoran enclaves in Costa Rica, Nicaragua, or Mexico. The other half fled to the United States. When Salvadorans fled to the U.S. during the civil war, they left quickly and quietly, without property or established connections in the United States. This led to Salvadoran refugees not being able obtain U.S. visas. A majority crossed the border illegally through Mexico. â€Å"I walked 12 hours a day, forRead More Understanding Online Sexual Harassment Essay3822 Words   |  16 Pagesfor illegal activities, increase violations of intellectual property laws and trade secrets, and encourage harassment. Opponents claim Internet anonymity has a detrimental effect on society: †¦producing a society of strangers†¦[who are] people about whom one know[s] little or nothing [and] are harder to trust; they can be feared †¦ [and are] without any risk of being held accountable. On the other hand, those in favor of anonymity point out that anonymity encourages whistle blowing; allows criticismRead More Religion in the World Today Essay5782 Words   |  24 Pagesreligion, we wi ll look at different countries from different parts of the world; analyzing the different religious problems and human rights violations. The overall question that we propose is: is there a simple solution to these problems and what can be done about them? Throughout history, the lower class: those who are considered poor, minorities, and women, have been taken advantage of, denied their inalienable rights, and forced into unfavorable situations. Even in the United States within

Thursday, December 12, 2019

Working with Mobile Devices in Governance-Free-Samples for Students

Question: Write a report on Working with Mobile Devices in Governance. Answer: Introduction Nowadays each and everyone own at least one cell phone or can be more. In fact, most recent figure reveals that two-thirds of the population owns a mobile phone. It can be either feature phones (screen is limited to text and very low-end graphics) or smartphone (like small computers). However, the market trend is more towards the smartphone. In addition to that, the market for smartphones is dynamic compared with featured phones. For instance, half of the world's populations are the users of smartphones (Fernando, Loke Rahayu, 2013). Cloud computing has a very significant influence on mobile technology as it makes these devices more powerful and cheaper. With cloud computing, the users can access the applications and services located remotely. Recent market trend unveils that apple iPhone, Google android phones are showing trajectory upward. The countrys productivity can be improved by effective governance. Effective Governance also increases its competitiveness. In a country like India, service of good governance is quite a challenging task (Sundar Garg, 2005). The basic services that are provided by the government services via mobile phones help the government to deliver public services. The cell phones are coupled with innovative potential in applications of mobile that have reached to its height. These help the mobile governance as a cornerstone in different schemes of state government. Increasing the wireless penetration and services of better awareness helps in increasing the upgrade of mobile governance services in the future. The government focuses on the improvement of mobile governance (Jo et al., 2015). The services that the mobile government provides are providing information that are basic which includes alerts of natural disaster to polling via mobile phones. Key words:Mobile technology, cloud computing, mobile governance Literature Review E-governance and M-governance E-Governance: The application of ICT (Information and Communication Technology) is the E-Governance which includes delivering services of government, communication transactions, information exchange services that are held between G2C (Government to Customer) and G2B (Government to Business) and also different system of sand stone integration. There are four basic models that are available- government to employees, government to government, government to customers and government to business. M-Governance:(Mohamad, Building, Ismail, 2010)M-Governance is meant to provide access to those who are unable to access (means those prefer mobile phone or living in remote areas) the services offered by the government through the internet. By owning one cell phone and having access to one mobile network, then they can use the public services at anyplace at any time. M-governance is an innovative technology that brings government services to citizens by reducing the gap arising between them. Limitatins of M-Governance (Mohamad et al., 2010) explained about the limitations of m-governance. They are 1) Small sized phone: In rural areas, most of the people are relying on the small phone since they cannot afford the smartphone. 2) Government needs to take more care to ensure scalability and high availability of information. For this, the technology is to be more elaborated. 3) Some information is critical and needed to be safeguarded. Then will arise security and authentication problem. 4) Cost:To implement m-governance, a further channel is required in e-government. This channel will create additional costs. A substitute delivery channel can solve this to a certain extent.(Sreenivas, Manjunath, Abate, Weseni, 2016) 5) Some people use this technology for fun rather than productive activities. For example, hoax messaging. (Sreenivas et al., 2016) 6) Literacy problems: The reduced literacy rate creates some challenges in use of m-governance. (Sreenivas et al., 2016)M-Governance is an innovative technology. However, some part of the population is unable to access these technologies. For instance, poor people, illiterate peoples come under this category. Moreover, they are also denied from getting the benefits that offered by the government in other words m-digital divide. Today (2012) In this article also they agree that sometimes illiterate people face some sort of problems to access these services. This is because those people are unfamiliar with these devices and technology. The solution to this issue is that integrated speech assistance tools and by ensuring m-governance in regional languages. More and more people would use this service when proper awareness about services is given. Advancement in mobile technology will increase the usage among the masses. Tools The smart phone manufacturers group their devices to into different operating systems (Almunawar, 2015). The operating systems that are mostly used are RIM (Research in Motion), operating system with blackberry, windows operating system in mobile, symbian platform and all variation of UNIX that includes Android, Google and Apple iOS. (Mell Grance, 2011)Research in Motion has developed a system of mobile operating known as BlackBerry Operating System. Environment of Java development which includes IDE BlackBerry, Java Platform APIs, simulator of smart phones, and application of BlackBerry and vendors of third party like MobiHand are used for application developers. According to Almunawar 2015, modified kernel Linux is used to build an android operating system of Android. The maintenance and Android Development was developed by Android Inc. and was bought in 2005 by Google which is performed by Open Source Project of Android. The codes of the Android applications are mainly written in Java language by the use of Android SDK that includes a run time environment emulator for debugging and testing. The market of Google Android and different distribution channels like Handango and GetJar have an application that are distributed. The iOS of Apple comes from the Apple Mac OS X that is itself an operating system that is UNIX based and also the GUIs. The applications mainly in the Objective-c which uses iOS of Apple, Interface Builder and Xcode are built by the developers. The App Store of Apple has distributed applications which have almost 300,000 applications. The Windows mobile phone that uses Windows operating systems known as Windows Phone 7 is inherited from operating system of Windows Mobile. To make the user experience better, Microsoft designed Windows Phone 7 (Dinh et al., 2013). The codes are written through APIs by the developers such as API compass, Video API and sockets API (Presswire, 2012). The marketplace of Windows Phone distributes the Applications. There is also an operating system that has open source is known as Symbian. These operating systems are used for smart phones of Nokia. A Java application of ME with services layer are used in the service layer of operating systems. The developers of applications write all the codes in Java language, Perl, c++ or SDK that are customized for the developer of IDE who uses the applications. (Calheiros et al., 2011)The above mentioned mobile technologies have approached the technology of cloud in a broader way. The iCloud service of the Apple or androids helps the user to store data that includes pictures, audios, videos and also documentations. Apple has its different approach in developing cloud application of its own so that it can support the backup and storage of its own devices instead of going with the industry flow. The Apple operating system provides a reliable and secure synchronization feature with the cloud. Government perception The mindset of the government is not that easy to change. The government has built many infrastructures over the decades which do not easily communicate with each other. The perception of the government is changing day by day. They are using the concept of cloud to build scalable, secure and safe cloud solutions so that the efficiency of the government is increased (Dinh et al., 2013). The perception of government has now changed because they are able to deploy solutions that on the demand and also receives access to all the infrastructures without buying tools that are expensive. For ensuring cloud services in government, the agencies of government are looking for vendors who provide cloud services and also employ professionals who help them to move to cloud very efficiently and quickly. By existing infrastructures that are with bridges of networking, an efficient and controlled cloud can take place.(Sreenivas, Manjunath, Abate, Weseni, 2016) (Today, 2012)Mentioned the Current working areas of central government are bill payment system and filing income tax returns. They have been developing a framework for these services. Advantages of this framework are interoperability across several service providers and government departments (Sreenivas et al., 2016). Soon, we can expect services like disaster alerts in mobile phones as the m-governance is constantly developing. Possible m-Government Application Areas are: Notifications for payment of taxes, traffic condition information, notifications for civic authorities, disaster/crisis alerts, bill payment, support for education and government healthcare campaigns. Benefits of M-Governance for both citizens and public servants are: 1)The civil servant must carry data in either head or portable files when they are in the field. However, the emergence of m-governance helped them a lot to make better decisions and actions with the digitized government, 2)one of the major benefits is that the citizen can access the services and information at any place at any time (Today, 2012). In another way, it is beneficial for government also that they can ensure very critical information such as terror alerts are reaching the masses quickly and directly, 3)m-governance improves public interaction. since it provides a channel for interactions among policymakers, service consumers, service deliverers, civil society representatives, 4)m-governance lowers the effort and time needed in communication thereby motivating more and more communication, 5)m-government will boost the public servants productivity by allowing them to enter data and information at real time. Thus, it reduces the time needed them to spend on data related activities. In fact, they can use this time for other productive activities and 6) Availability of information at any time anywhere breaks the boundary and create a truly integrated digital nervous system for government. In a way to broadening the m-government concept, they are encouraging the citizen to use the full potential of their services. Citizens perception Almunawar MN (2015) narrated in his article about an issue related to client side. That is since the client (mobile users) is geographically dispersed, means long distance away from the cloud. As a result, it could affect the internet speed that in turn affects the performance, especially in data-intensive computation. The citizen thinks that the cloud has helped them to connect to their friends over social media (Computer, 2010). Connecting with all the old buddies has never been such an easy way that is now today. The citizen thinks that they are able to educate themselves through the medium of cloud computing. The whole world is connected together by the help of cloud computing which helps the citizens to save, upload or share files in the Internet. Security (Zhang, 2012) explained about the Challenges that are faced in the governance system come from three aspects of cloud computing: 1.the resources located on the data centre of service providers, 2. the client those interact with the resources, 3.the communication channel that connects client and resources. We will go through each aspect to study the most significant security challenge there, and come upwith appropriate solutions. As the results, our work will be including following three sections: secure computation with resources in a remote site, prevent information leak through the communication network and protect sensitive information on the client devices. Secure computation with resources in the remote location. Dividing task and keeping sensitive data on private cloud and rest can be maintained on the public is the solution. That is hybrid cloud computing. However, its cons are that it does not support data-intensive computing frameworks. Here they are suggesting MapReduce programming model as the example, and try to leverage the unique features which automatically partitions the job that is computing on all the data it works upon. Almunawar MN (2015) also cited in article regarding privacy issues and suggested a solution for this. Obviously, about the sensitive information of government agencies. Since the data is located remotely somewhere else, there arise one question like can the cloud providers offer the same protection as if it is stored locally? The third party cannot be trusted completely, since they do not provide any security and privacy to the data stored in the cloud. In this article, they are suggesting one solution to this issue as security-related activities can be assured to a third party such as ISO 27001 or SAS 70. Another one that is highly related to one as mentioned earlier is that since the data on the cloud is accessing through the open network like the internet, there affects the confidentiality of data. The major ones that arise as a topic of discussion among the researchers were security and privacy issues. Some of the proposals regarding security and privacy issues are appended. Protection is given to the identity of a mobile user from hackers. Xiao and Gong ha suggested a process which involves environment of mobile computing to create dynamic credential for all users of mobile. Next is all about malicious content in mobile devices. A platform is called cloud antivirus platform in which a separate network service or cloud have given the detection capabilities. However, R.Chow et al. suggested an inbuilt authentication platform to tackle the privacy issues. In fact, Jia et .al suggested two schemes called PRE (proxy re-encryption)and IDE (identity-based encryption) to solve security issues related to data. The factors that thrive mobiledevice to use cloud computing are less energy, less security, low storage, limited processing power, and battery. (Zhang, 2012)Prevent information leak through the communication network. Users are communicating with the client using client software. So there can be a possibility of side channel attacks. Web application components are used in both browser and web server. Therefore communication is essential, and this can lead to side-channel attacks. The automatic quantification and detection of solution is possible on side leaks of side channel in the web applications. Impact of cloud on M-Governance Research and Markets, 2012 explained about the impact of cloud on m-governance. For the public citizens, telecommunication corporations and government agencies, the cloud-enabled mobile governance offer boundless opportunities.The result of a survey in December 2010 by1105 government information group is that the apex three reasons which thrived the public bodies to include cloud to governance are quick access to data and information, simplifying IT framework and management and reduction in cost. The development in technology enhances the performance and adoption of cloud (Ferrer-Garcia, Gutirrez-Maldonado Riva, 2013).Cloud application is possible in many fields. One of the interesting areas is mobile technology. In this article one of the major areas of discussion is how the cloud computing environment can enhance the overall functions of all the device of mobile. According to Dihal et.al,2013 there so many factors that affect the mobile devices capability and availability.(Kumar and Lu,2010) explained these factors as memory storage, input methods, battery lifetime, processor capability. The issues of mobile devices can be mitigated by cloud computing (Chun and Maniatis, 2009). Aforementioned is beneficial to both consumers and service developers. As far as consumers concerned, they can access services like music, movies, and services despite their devices capabilities. In the case of developers since they had to manage only one version of their services in the cloud. Key findings/future references New intelligent services of mobile are enabled by cloud computing (Mohamad, Building Ismail, 2010). Cloud computing also collects the data from sensors of devices that provide the services that are customized (Wang and Deters, 2009). Research and Markets, 2012 cited in his article as mobile cloud computing is a still-evolving concept with various challenges includes reliability, delay in handover, data integrity, bandwidth limitation, task division for offloading, security of data and information in the device as well as in communication channel (Computer, 2010). According to the article written by Chen et al. 2011, the cloud computing recently has introduced a technology that allows the users so that the users get access to all the storage, development environment, infrastructure and software that is based on the model that is based on pay what the users use. The dynamic nature of cloud environment cannot be handled by the forensics of digital that are traditional. So an approach that is efficient to forensic investigation is proposed by the use of snapshots of Virtual machine. The future work on cloud computing is the architecture will the pattern of server less architecture. The server less pattern of architecture will determines the infrastructure that is needed dynamically. Conclusion Cloud computing has a very significant influence on mobile technology as it makes these devices more powerful and cheaper. With cloud computing, the users can access the applications and services located remotely. Recent market trend unveils that apple iPhone, Google android phones are showing trajectory upward. Effective Governance increases its competiveness. In this report, the details of mobile cloud computing is given which defines the m-governance and the e-governance. This report gives a detailed structure on what the government and the citizens think about mobile cloud computing and also illustrates the security that is provided by mobile cloud computing. There is also a detailed structure about the impact of m-governance in present world and some future works is detailed which helps to improve the mobile cloud computing. References Almunawar MN (2015) Benefits and Issues of Cloud Computing for E-Government. Review Pub Administration Manag3:e105. doi:10.4172/2315-7844.1000e105. Calheiros, R.N., Ranjan, R., Beloglazov, A., De Rose, C.A. and Buyya, R., 2011. CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms.Software: Practice and experience,41(1), pp.23-50. Chen, K., Hu, C., Zhang, X., Zheng, K., Chen, Y. (2011). Cloud Computing.IEEE Network, 4. Computer, E. (2010). Mobile Devices May Pose the Greatest Threat to Confidential Information , ISACA, 12. Dihal, S., Bouwman, H., de Reuver, M., Warnier, M., Carlsson, C. (2013). Mobile cloud computing: state of the art and outlook. Info, 15(1), 416.are https://doi.org/10.1108/14636691311296174. Dinh, H. T., Lee, C., Niyato, D., Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches.Wireless communications and mobile computing,13(18), 1587-1611. Dinh, H. T., Lee, C., Niyato, D., Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches.Wireless communications and mobile computing,13(18), 1587-1611. Fernando, N., Loke, S. W., Rahayu, W. (2013). Mobile cloud computing: A survey.Future generation computer systems,29(1), 84-106. Ferrer-Garcia, M., Gutirrez-Maldonado, J., Riva, G. (2013). Virtual reality based treatments in eating disorders and obesity: a review.Journal of Contemporary Psychotherapy,43(4), 207-221. Jo, M., Maksymyuk, T., Strykhalyuk, B., Cho, C. H. (2015). Device-to-device-based heterogeneous radio access network architecture for mobile cloud computing.IEEE Wireless Communications,22(3), 50-58. Mell, P., Grance, T. (2011). The NIST definition of cloud computing. Mohamad, R., Building, A., Ismail, N. A. (2010). Journal of Internet Banking and Commerce. Journal of Internet Banking and Commerce, 15(1), 111. https://doi.org/10.1007/978-3-531-92534-9_12 Presswire, M. (2012).Research and Markets: 4G Cloud Services for Mobile Governance. Sreenivas, N., Manjunath, G., Abate, Y., Weseni, T. A. (2016). Analyze on m-Governance for Better G2C Service in Ethiopia. International Journal of Trend in Research and Development, 3(1), 123126. Sundar, D. K., Garg, S. (2005). A Framework for Indian Urban Local Bodies. The Proceedings of Euro mGov, 395402. Today, C. (2012). MVAS Empowering the Nation, (Jan), 15. Zhang, Y., Juels, A., Reiter, M. K., Ristenpart, T. (2012, October). Cross-VM side channels and their use to extract private keys. InProceedings of the 2012 ACM conference on Computer and communications security(pp. 305-316). ACM.

Wednesday, December 4, 2019

17th Century Life/scarlet Letter Essay Example For Students

17th Century Life/scarlet Letter Essay The Scarlet Letter by Nathaniel Hawthorne expresses the aspects of relationships, religion, community, discipline and punishment in the puritan community of 17th century Boston. Relationships between men and women were very constrained and that is what made adultery such a bad sin in the eyes of everyone in the community. Religion seemed to govern over all, people would look up to reverends and the community believed that fate was their destiny. Public discipline and punishment were used to discourage everyone else from committing the same crime or sin as the offending criminal did. The community was to follow the beliefs of god and to do their duties the best they could, yet were there to criticize and punish all who disobeyed the religion or laws. In 17th century Boston every thing was very strict and everyone was expected to follow the laws, which makes Hesters sin such an excellent example of the beliefs of that time period. The first scaffold scene is very important because the scene sums up the beliefs of the general public at that time, and gives a prospective of what Hester Prynne must deal with. In the beginning of chapter two the scene is described as it could have betokened nothing short of the anticipated execution of some noted culprit,(47) showing that the whole town was there for a ruthless public punishment. The crowd was not there for an execution though, but there for a public punishment of Hester Prynne who had committed adultery. A townsman describes Hesters punishment to a stranger as, they have doomed Mistress Prynne to stand only a space of three hours on the platform of the pillory, and then thereafter, for the remainder of her natural life, to wear a mark of shame upon her bosom. (58) This scene shows the weight of values and morals upon society in the 17th century and how public punishment was not only used as punishment but as a way to discourage others from committing the same crime. The community was key in this punishment because it helped alienate Hester and further her pain. The punishment brings forth Hesters underlying pain, Hester sent forth a cry she turned her eyes downward at the scarlet letter, and even touched it with her finger, to assure herself that the infant and the shame were real.(55) This pain only breaks surface once, yet throughout the whole story Hester must deal with the shame and emotional pain of the scarlet letter. The stranger sums it up best with the quotation, Thus she will be a living sermon against sin, until the ignominious letter be engraved upon her tombstone.Since religion was such a key part of their lives, anyone who did disobey their god was looked down upon. What made religion ironic in this story was how everyone looked up to a reverend that had committed the same sin as someone they looked down upon severely. Dimmesdale says, before the judgment-seat, thy mother, and thou, and I, must stand together! But daylight of this world shall not see our meeting!(134) The reverend knows his sin and wants be punished with Hester and Pearl, yet not until what he calls judgement day. In the 17th century, Puritans believed that there was a stern God who had decreed in advance the fate of each person for all time. Therefore, there was not much people felt they could do to become a better person in Gods eyes but do his biding with their jobs. To increase their chances of getting to go to heaven the townspeople would often get one step closer to God by getting close to a religious leader, which was bad for Arthur Dimmesdale who was probably farther away from God than everyone else because of his sin. Relationships were looked upon as something sacred and a woman should be loyal to her husband. .uc143e1c046a294fe5e297b3a7744ff06 , .uc143e1c046a294fe5e297b3a7744ff06 .postImageUrl , .uc143e1c046a294fe5e297b3a7744ff06 .centered-text-area { min-height: 80px; position: relative; } .uc143e1c046a294fe5e297b3a7744ff06 , .uc143e1c046a294fe5e297b3a7744ff06:hover , .uc143e1c046a294fe5e297b3a7744ff06:visited , .uc143e1c046a294fe5e297b3a7744ff06:active { border:0!important; } .uc143e1c046a294fe5e297b3a7744ff06 .clearfix:after { content: ""; display: table; clear: both; } .uc143e1c046a294fe5e297b3a7744ff06 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .uc143e1c046a294fe5e297b3a7744ff06:active , .uc143e1c046a294fe5e297b3a7744ff06:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .uc143e1c046a294fe5e297b3a7744ff06 .centered-text-area { width: 100%; position: relative ; } .uc143e1c046a294fe5e297b3a7744ff06 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .uc143e1c046a294fe5e297b3a7744ff06 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .uc143e1c046a294fe5e297b3a7744ff06 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .uc143e1c046a294fe5e297b3a7744ff06:hover .ctaButton { background-color: #34495E!important; } .uc143e1c046a294fe5e297b3a7744ff06 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .uc143e1c046a294fe5e297b3a7744ff06 .uc143e1c046a294fe5e297b3a7744ff06-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .uc143e1c046a294fe5e297b3a7744ff06:after { content: ""; display: block; clear: both; } READ: The Syrian Refugee Crisis essay Once married it was considered a horrible offense if you were un-loyal to your spouse. They have not been bold to put force the extremity of our righteous law against her. The penalty therefor is death.(58) A townsman explains that the penalty is death for her crime (showing the harshness of the 17th century), yet that the other party in the affair must have played a strong role in tempting her, so they just sentenced her to the letter on her chest and three hours on the scaffold. The stranger shows how most people reacted when only seeing one of the guilty two parties up on the scaffold, it irks me, nevertheless, that the partner of her iniquity should not, at least, stand on the scaffold by her side. Women still did not have that many rights, so anything Hester said in her defense would have just have been ignored. Relationships were not supposed to be broken unless by divorce, even if the husband was at the bottom of the sea-where Hesters husband was believed to be.Through relationships, religion, community, discipline and punishment the reader can get a better understanding of what was expected of towns people in the 17th century. The Scarlet Letter shows the pain and suffering a woman went through when she broke her marriage, and disobeyed her religion. She then was sentenced to a public punishment to be humiliated, tormented, and alienated by the community around her. The fate driven religious society in 17th century Boston would not accept sin of any kind and the punishment for adultery was death. Instead, the community branded Hester Prynne with the letter A for the rest of her life and made her stand in front of the whole community as an example for everyone that sin and corruption was not accepted in their society.

Thursday, November 28, 2019

Battle of Talavera - Napoleonic Wars Battle of Talavera - Peninsular War Battle of Talavera

Battle of Talavera - Napoleonic Wars Battle of Talavera - Peninsular War Battle of Talavera Battle of Talavera - Conflict: The Battle of Talavera was fought during the Peninsular War which was part of the Napoleonic Wars (1803-1815). Battle of Talavera - Date: The fighting at Talavera occurred on July 27-28, 1809. Armies Commanders: England Spain Sir Arthur WellesleyGeneral Gregorio de la Cuesta20,641 British34,993 Spanish France Joseph BonaparteMarshal Jean-Baptiste JourdanMarshal Claude-Victor Perrin46,138 men Battle of Talavera - Background: On July 2, 1809, British forces under Sir Arthur Wellesley crossed into Spain after defeating the corps of Marshal Nicolas Soult. Advancing east, they sought to unite with Spanish forces under General Gregoria de la Cuesta for an attack on Madrid. In the capital, French forces under King Joseph Bonaparte prepared to meet this threat. Assessing the situation, Joseph and his commanders elected to have Soult, who was then in the north, advance to cut Wellesleys supply lines to Portugal, while the corps of Marshal Claude Victor-Perrin advanced to block the allied thrust. Battle of Talavera - Moving to Battle: Wellesley united with Cuesta on July 20, 1809, and the allied army advanced on Victors position near Talavera. Attacking, Cuestas troops were able to force Victor to retreat. As Victor withdrew, Cuesta elected to pursue the enemy while Wellesley and the British remained at Talavera. After marching 45 miles, Cuesta was compelled to fall back after encountering Josephs main army at Torrijos. Outnumbered, the Spanish rejoined the British at Talavera. On July 27, Wellesley sent forward General Alexander Mackenzies 3rd Division to aid in covering the Spanish retreat. Due to confusion in the British lines, his division suffered 400 casualties when it was attacked by the French advance guard. Arriving at Talavera, the Spanish occupied the town and extended their line north along a stream known as the Portina. The Allied left was held by the British whose line ran along a low ridge and occupied a hill known as the Cerro de Medellin. In the center of the line they built a redoubt which was supported by the General Alexander Campbells 4th Division. Intending to fight a defensive battle, Wellesley was pleased with the terrain. Battle of Talavera - The Armies Clash: Arriving on the battlefield, Victor immediately send forward the division of General Franà §ois Ruffin to seize the Cerro even though night had fallen. Moving through the darkness, they nearly reached the summit before the British were alerted to their presence. In the sharp, confused fight that followed, the British were able to throw back the French attack. That night, Joseph, his chief military advisor Marshal Jean-Baptiste Jourdan, and Victor plotted their strategy for the next day. Though Victor favored launching a massive assault on Wellesleys position, Joseph decided on making limited attacks. At dawn, the French artillery opened fire on the Allied lines. Ordering his men to take cover, Wellesley awaited the French assault. The first attack came against the Cerro as Ruffins division moved forward in columns. Moving up the hill, they were met with heavy musket fire from the British. After enduring this punishment the columns disintegrated as the men broke and ran. With their attack defeated, the French command paused for two hours to assess their situation. Electing to continue the battle, Joseph ordered another assault on the Cerro while also sending forward three divisions against the Allied center. While this attack was ongoing, Ruffin, supported by troops from General Eugene-Casimir Villattes division were to attack the north side of the Cerro and attempt to flank the British position. The first French division to attack was that of Leval which struck the junction between the Spanish and British lines. After making some progress, it was thrown back by intense artillery fire. To the north, Generals Horace Sebastiani and Pierre Lapisse assaulted General John Sherbrookes 1st Division. Waiting for the French to close to 50 yards, the British opened fire in one massive volley staggering the French attack. Charging forward, Sherbrookes men drove back the first French line until being stopped by the second. Hit by heavy French fire, they were forced to retreat. The gap in the British line was quickly filled by part of MacKenzies division and the 48th Foot which was led into place by Wellesley. These forces held the French at bay until Sherbrookes men could be reformed. To the north, Ruffin and Villattes attack never developed as the British moved into blocking positions. They were handed a minor victory when Wellesley ordered his cavalry to charge them. Surging forward, the horsemen were stopped by a hidden ravine that cost them around half their strength. Pressing on, they were easily repulsed by the French. With the attacks defeated, Joseph elected to retire from the field despite requests from his subordinates to renew the battle. Battle of Talavera - Aftermath: The fighting at Talavera cost Wellesley and the Spanish around 6,700 dead and wounded (British casualties: 801 dead, 3,915 wounded, 649 missing), while the French incurred 761 dead, 6,301 wounded and 206 missing. Remaining at Talavera after the battle due to a lack of supplies, Wellesley still hoped that the advance on Madrid could be resumed. On August 1, he learned that Soult was operating in his rear. Believing Soult to only have 15,000 men, Wellesley turned and marched to deal with the French marshal. When he learned that Soult had 30,000 men, Wellesley backed off and began withdrawing towards the Portuguese border. Though the campaign had failed, Wellesley was created Viscount Wellington of Talavera for his success on the battlefield. Selected Sources British Battles: Battle of TalaveraPeninsular War: Battle of TalaveraHistory of War: Battle of Talavera

Sunday, November 24, 2019

The Sky Isnt the Limit

The Sky Isnt the Limit Free Online Research Papers If you have ever seen an episode of the 1960’s cartoon â€Å"The Jetsons†, then you should know all about the almost laughable portrayal of our future society, sporting things such as flying cars and robotic house keepers. However, according to Douglas Malewicki, an inventor as well as aerospace engineer for UniModal Transport Solutions Inc., the idea seems far from a joke. The famous inventor is considered the father of green transportation, responsible for creations like the 156-miles-per-gallon California Commuter cars that hold the Guinness fuel economy records for street-legal vehicles driven at freeway speeds, as well as the highly-aerodynamic human-powered recumbent bicycle. Although both inventions seem to be great contributors to the technological revolution, neither top Malewicki’s latest prototype, the SkyTran. Malewicki patented the SkyTran in 1992 and published several papers on it, including a paper entitled People Pods Miniature Magnetic Levitation Vehicles for Personal Non-Stop Transportation, which was presented to the Society of Automotive Engineers (SAE) Future Transportation Conference. The paper describes how Malewicki had built and driven a freeway-legal 154-MPG car in 1981, but realized it could never be safe on a street surrounded by vehicles much larger and heavier; however, elevated tracks would allow a very light vehicle to be safe, hence the concept of the SkyTran. It went on to describe how the SkyTran can squeeze both surfaces of a track simultaneously and brake safely to a stop from 100 miles per hour in just 55 feet. In 1999, Malewicki was invited to present an overview of the invention for the Institute of Electrical and Electronic Engineers, hinting to the construction of the SkyTran in the year 2052. Once Malewicki and his partners began making proposals to transit systems, the prototype began to be recognized in popular technology magazines, as well as local and national news articles. So what exactly is the SkyTran? It is a lightweight, two-passenger PRT (Personal Rapid Transit) system suspended from elevated magnetic levitation tracks, estimated to travel around 100 miles per hour with approximately 200 miles per gallon. The special kind of tracks featured with the SkyTran allow it to use natural magnetic fields to counteract the effects of gravity, as well as propelling itself by a linear motor and metal coils built in to the tracks. Because of these unique and innovative railway features, it makes switching on and off tracks at high speeds easier and more efficient as well as requiring little to no maintenance. Ideally, the system would be elevated by standard utility poles 20-30 feet above the ground or attached to the sides of buildings. The tracks are carefully mapped out in a 3D grid of inter-city guideways to avoid intersection accidents as well as derailment, and are able to deliver you within a quarter to half of a mile within your destination. The pod a lso comes equipped with parking wheels, a vertically opening door, and air conditioning or heating to optimize the comfort of the passengers. There is a list of incredible benefits of the SkyTran system, starting with how extremely inexpensive it would be to build compared to other transit modes like light rails and buses. One mile of SkyTran guiderail, including stations and stops, will cost $1 million to $2 million, while the Light rail costs $25 million to $50 million per mile, and SkyTran vehicles will cost approximately $4,000 to $6,000 each while one new 36-passenger transit bus costs $300,000. As far as labor costs go, SkyTran’s operating and maintenance costs are only a fraction of those required to support a light rail and expanded bus system since there are no drivers. Also, consider the savings not only in terms of the tax burden current transit systems put on the public, but in other areas such as no land purchases or neighborhood destruction to provide rights-of-way. Additional benefits include the freedom and convenience passengers will receive with the system because they will not be spending any time in traffic, which will reduce stress as well as their time commuting. It is environmentally friendly because of the 200 miles per gallon it can achieve, as well as the elimination of air and noise pollutants that used to be caused by traffic and gridlock. Last but not least, it will help with the rising number of deaths due to automobile accidents. In the United States each year, there are over six million car accidents and around 40,000 deaths due to how unsafe cars can be, from drunk or irresponsible drivers to car malfunctions; the SkyTran would drastically reduce those numbers. Not only does it keep its riders safe, but heres where SkyTran’s self-driving vehicles really shine. Essentially, there is no risk that an incapacitated driver will crash or endanger other vehicles, but if they can manage to press the vehicle Emergency button in case of a medical situation, such as heart attack or seizure, then an operator will intervene, assess the situation, and re-route you straight to a hospital or emergency room. People with medical conditions can also wear monitors that detect a dangerous event and communicate with the system for them, even if they are unconscious. Malewicki’s intentions for the SkyTran were not to completely replace cars, just eliminate commuter traffic. It is not expected for you to ride the system to your local grocery store or down the street, just lengthy trips into or throughout the city. Although the concept seems beyond brilliant, it has of course been met with criticism. One of the design flaws is the size of the pods. Because they only seat two at a time, it will make it hard for groups or families to travel together, as well as not being able to carry large amounts of stuff, like luggage. Another dangerous possibility to consider is a local area power failure. Imagine hanging in a pod in the middle of winter until the utility company restored power, or until a cherry picker could come by and rescue you; it would not be the best way to spend your morning. To summarize, nowadays we all seem to be obsessed with technology- always having the better cell phone, car or computer, or simply being more advanced than everyone else. The SkyTran could be the one technology that starts a whole other revolution, opening up other scientific discoveries. It could be the future of our transportation system; the advantages obviously outweigh the risks. It is ideal for the every-day commuter- efficient, environmentally friendly, fast, and not to mention extremely aesthetically pleasing. If UniModal actually introduced this advancement into our lives, the possibilities could be endless. Research Papers on The Sky Isn't the LimitLifes What IfsTwilight of the UAWBionic Assembly System: A New Concept of SelfQuebec and CanadaStandardized TestingThe Effects of Illegal ImmigrationThe Spring and AutumnOpen Architechture a white paperMind TravelPETSTEL analysis of India

Thursday, November 21, 2019

Tuesdays with Morrie Essay Example | Topics and Well Written Essays - 1250 words

Tuesdays with Morrie - Essay Example Morrie Schwartz was the best professor Mitch could ever ask for. He supplemented Mr. Albom with the knowledge and advices in life that will surely help the young one in his future. Their relationship was more of a father and a son than a teacher and a student. When Mitch Albom graduated, Professor Morrie was more than proud of his achievement and he was very happy to see him graduate. During his graduation, Professor Morrie Schwartz embraced Mitch Albom as he was even crying because he was so happy. He only had one wish from his beloved student and that is to keep in touch with even after leaving the school. Mitch Albom promised to do so but he never kept his project. Only after Mr. Albom came across his old professor in one of the television shows that he remembered he was not able to keep his promise and he missed to see Professor Morrie for a long time. When he had the guts to see his professor, he drove to where he lives and after 16 long years, he saw his professor again, now se riously ill with ALS. Professor Morrie was already deteriorating and he was almost too late to see his professor. Despite the long years of waiting for his student, Professor Schwartz was still very happy to see Mr. Albom. The two reunited and Mitch now seeks for his advice again regarding his life, his job and his family life. The professor was very eager to see his student listens again to him. Mitch Albom's life was not perfect and his relationship with his wife is greatly affected by his work. Meeting up with Prof. Morrie Schwartz every Tuesdays, Mitch Albom now became more aware of he missed out chasing the life he thought was what’s best for him and his wife. He now finds himself wondering if he is really happy with what he has and what he had become. He needed more time with his professor to enlighten him and answer his questions about life but he now has little time left with his professor. If only he chose to keep his promise and kept in touch with his professor, he might be happier with his life. He may have chosen a different path with his life. But nevertheless, he had the chance to makeup with the time lost with his dear professor. This is one lesson that we need to consider in our life. We must not take for the granted the important people in our lives. Although they will be there to help us and love us, we must also reciprocate everything and let them feel our love. There will be a lot of opportunities that will come for us as we live, it is very important that we will not take others for granted as we embrace these opportunities. According to Professor Morrie Schwarz, it is very important that we "Love each other or die." (p.163) Make the most of your life In the book, not only did Mr. Albom ditch his promise with Professor Morrie, he also keeps on failing his wife by not keeping his promise to her. Although he knew his wife will stick and wait for him every time he leaves for his job, he still barely spends time with her to check on her or make-up for his absence. His wife only asked for them to have a baby. And yet, for years they have been married, they still don’t have a baby. Time flies so fast and there is a great possibility that his wife will not become pregnant anymore. What will happen if this will be the case? We don’

Wednesday, November 20, 2019

Are we getting overly dependant on technology Essay

Are we getting overly dependant on technology - Essay Example For this reason, people have become lazy to do go their work thus becoming obese. For an instant, a CEO who does not want to attend a meeting in the office, one can just conduct the meeting in their house by use of a webcam. According to Shenk (1997), people have been so dependent on technology such that they cannot solve a simple calculation without the help of a calculator. The today’s children cannot write in good handwriting because they are used to just using a computer to write whatever they need. They do not have time even to learn to write cursive. Computer and internet are not as perfect as people may think. There are some things these technological devices and media cannot teach (Shenk 1997). If the whole world were to lose power, some people would not be able to do some things. The world would stand still as individuals would have been used to technology doing their everyday activities. Because of the continuous advancement of technology, the ultimate fear is that people will completely rely on technology to run their lives. However, people need to resist this temptation and try to learn some things

Sunday, November 17, 2019

Management Accounting Essay Example | Topics and Well Written Essays - 1500 words - 6

Management Accounting - Essay Example The cost of each Renault car is  £ 12,000 (Crosson, 2011). The company’s expenses will include fixed expenses and variable expenses (Noreen, 2008). On the other hand, the company pays for variable expenses. The variable expenses fluctuate or change in the same direction as the car revenues (DuBrin, 2009). Comparison with Competitor’s Price. The above Table 1 information shows sales prices are pegged on the Skoda car competitor’s selling prices. The above table indicates that the company’s Skoda selling price is lower than the competitor’s car selling price in order to increase customer demand for the Skoda (Hartline, 2011). In the same manner, the company is selling its Renault car at a selling price that is lower than the competitor’s selling price. The lower price is a marketing strategy to increase revenues (Buttle, 2009). Since the prices are lower, the company expects to generate high Skoda and Renault car revenues (UKCardiscount, 2012 ). In addition, the above table 2 data indicates the sales prices of the company’s Renault car in relation to the competitor’s selling price (Chandler, 2011). The above table indicates that the current and future customers can save more money if they purchase the company’s lower priced Renault car, when compared to purchasing the competitor’s car (UKCardiscount, 2012). Further, the table 3 data clearly shows the company’s fixed expenses (Glencoe, 2011). The fixed expenses include the flat rent, electricity, water, telephone, garbage, and other expenses (Levine, 2008). The increase in the car sales normally does not significantly influence the fixed expenses. The fixed expenses are period expenses (City-data, 2012). Furthermore, the table 4 statistical data clearly shows the company’s variable expenses. When the sales increase, the variable expenses also increase (Miltenburg, 2005). In the same manner, when the sales decline from one accounting period to

Friday, November 15, 2019

The Tale of Hong Kiltong | Love Suicides | Analysis

The Tale of Hong Kiltong | Love Suicides | Analysis Gender refers to a range of behavioural, physical and mental characteristics that people use to differentiate masculinity from femininity. The context of definition may take the concept as a synonym to sex, which means the state of being male or female. The term can be used to define social roles and gender identity among different individuals. In the text, The Tale of Hong Kiltong, the story revolves around a man who raises beyond his birth circumstances to prove his masculinity among the people. Masculinity has a much far horizon that just being male or female, as the text reveals. The living circumstances of the young boy, Kiltong, who was not a very famous son, and his father wanted to kill him but when he realized that, he disappears to another land. His life story reveals another side of masculinity when he takes the role of fighting for the unfortunate. The concept of masculinity conveys the fact that ones behaviour is a reflection of whom they are. In the spirit of capitalism, Minister Hong wishes to eliminate his bastard son because he bore him with a maid-servant. This is the concept of masculinity in the society. The man has the power to have affairs with the maid servant without caring about the consequences. The presence of the other main wife does not bother, because women also understand their place as femini ne, in the society. The play, love suicides also depicts aspects of feminism and masculinity regarding the lives of the two protagonists, Jihei and Koharu. By virtue of being a man, the society expects Jihei to be responsible enough to take care of the family, implying that masculinity regards to responsibility. The society also does not criticize Koharu for being a prostitute, but lays emphasis on the reckless life of Jihei who the playwright accuses of being as worthless as a wastepaper (Chikamatsu Shively, 1991). The masculine aspect of being a man eludes Jihei. The reader also gets the feeling that femininity in the society is described as a pleasure provider since the society deems the lifestyle of Koharu as normal. To the society, prostitution is fine as long as it is a woman. In understanding masculinity, there are three basic features that have been widely used, and they are evident in the text The Tale of Hong Kiltong, which Kiltong expresses, rather than by the virtue of just being a male. The first one is a definition feature, for instance, risk taking. Masculinity has been defined in the past and the present as characterized by risk taking. In the text, the aspect of risk taking is rampant, with Kiltong taking numerous risks by stealing from the rich to help the poor. Despite being wanted for the atrocities he commits, risk taking produces him as a man. This implies that masculinity is not only being male, but also having such characters, meaning that there are females who as well manifest masculine characters since there can have been cases of risk-taking female. In the same respect, taking responsibility of situations as a feature can define masculinity. In this case, responsibility over other people was and still is the role of men in most contemp orary societies, although in some societies, women have come up to challenge the believe; hence depicting their masculinity. The text, The Tale of Hong Kiltong opens by talking about the minister, who has responsibility over people, his wife, sons and maid servants. Responsibility is the defining feature of masculinity over femininity. Just like the minister, his son is also a vibrant young man whom despite being waned, takes charge of unfortunate people, and when he takes the government post, the people continue suffering; hence showing that he was directly responsible for the poor people. In the love suicide, Jihei does not fulfil his masculinity duties as a man, and lives recklessly ignoring his wife and children. On the other hand, his brother is responsible and runs around trying to prevent the death of his brother and Koharu. This is a depiction of masculinity. Jiheis wife possesses what the society would refer to as femininity by being remorseful to the extent that she sacrif ices her savings to save the life of Koharu. She is passionate and strong, portraying attributes of femininity and masculinity. Despite being a woman, she takes more responsibility of the family than her husband. This implies that the society had different views about responsibility as a factor of femininity and masculinity. Normative standards of classifying feminists and masculine regards to using the characteristics of what men ought to do and what women ought to do in order to qualify to be in either group. Although this concept is widely accepted, it has a major loophole that masculinity can not be a one minute show. Going by this definition, an individual can depict characters of masculinity in a minute and resume the normal characters. This cannot define the individual as masculine. For instance, the Hong tradition expected the male to have several sexual partners, which led to the Minister having an affair with the maid-servant. This took place for only a day, which bore him a son. The one day affair may not be used to classify the minister as a masculine since he ended up declining the responsibility of taking care of the results of his one day masculinity show. In love suicides, masculinity evades its normative standards if one is to analyse the life of Jihei. The only aspect of Jihei that classifies him under masculinity is the fact that he is the man of the home, but his actions in entirety, for instance, ignoring his family and his wife taking the responsibility, him being broke to the extent that he cannot redeem his lover and leaving it to his wife, among others, are the depictions that he has more of the feminine attributes that the masculine attributes. The final landmark that defines masculinity as a distinct aspect is the semiotic approach, which depicts the symbolic differences between femininity and masculinity. In this case, masculinity is the opposite of femininity, meaning that being masculine is not being feminine. Symbolically, an example is that masculinity is marked by authority whereas femininity lacks the authority. In cultural analysis, this is the definition that was effective in stating the traditional gender roles of both sides. In the text, The Tale of Hong Kiltong, the minister is the symbol of authority and he has the power of command in the territory to the extent that he orders pursuit of his son. Masculinity under this aspect regards to the widely accepted relationships through which male and female accomplish their gendered lives. This implies that masculinity is a place in the relationships and depends on the daily practices that fit them in their gendered lives and the consequences of the practices in terms of bodily experience, culture and personality. The texts also reveal the fact that one can understand gender as a social practice that regards to the bodies and their social functions. This can be widely understood by the fact that the daily conduct is organized in relation to the reproduction sphere regarding to the structures of the body and the reproductive system. Despite this revelation, there is no relationship with the body biology because gender presents itself because of the lack of the link between sociology and biology. This aspect, gender relations, is the major aspect of the entire contemporary societies. Femininity, in the society in love suicides, comes out as a sacrifice for the survival of men. For instance, Magoemon is ready to force a divorce between his brother and Osan in order to source funds to redeem Koharu and save his brother from suicide. Further, Osan is ready to sacrifice her savings to save the life of her husband and his lover. Masculinity and femininity regards to the gender practice configurations, rather than being male or female. Understanding the role of male and female in the text, The Tale of Hong Kiltong, can help elucidate this aspect of gender. Understanding gender can take place through various aspects like understanding the course of individual life and their character, the ideology, discourse or culture, and the institutions in the society such as schools and work places. Therefore, the model of understanding gender can adapt power relations, production relations and cathexis, which regard to the characters surrounding sexual desires and the practices that define it, as the aspect of gender order. The text reveals such aspects of gender through hegemony. The leadership of the Joseon dynasty seems to revolve around the Hong family and the male characters. Masculinity in this aspect is the gender practice configuration embodying an accepted answer to the problem of authenticity of the patriarchy guaranteeing the male dominance and their women subordinating them in their positions. Subordination is also a feature of gender as there are gender relations that are specific in terms of dominance and subordination between groups. An example in the contemporary society is heterosexuality verses homosexuality. Complicity is the complexity of the fact that despite there being few men supporting and maintaining the concept of hegemony, many are beneficiaries of the subordination by their women. This provision does not give men a chance for tensions or risks of being in the frontline to protect their positions. Historically, masculinity and femininity as subsets of gender were distinct from each other by acts of violence and crisis. The structures tend to change with time in response to various factors including external pressures, and sometimes from internal pressures. The conflicts of interest between the two classes of gender have been streamlined by factions like women movements in the past. The socially defined unequal structures, which placed male and female in defensive and offensive positions respectively has met widespread resistance over time. Such battles may not lack violence; hence reducing the aspect of masculinity and femininity as a mere theoretical notion that can erode with changing times. The system of dominance (in this case, male dominance) is characterised by violence and a measure of imperfection. The hierarchal system may not be legitimate, and the perpetrators employ violence in order to maintain the system. Extreme masculinity has proved fatal in the attempts to maintain dominance. There have been cases of sexual harassment, murder and domestic assault in homes and streets. This implies that in gender politics, violence is important in order for one to prove a point to the other group. Femininity regards to the set of behaviours, attributes and roles associated with the female individuals in the society. The concept is a social construct, although it may include the aspect of biological functions. In behavioural traits, femininity included moral characters of empathy, sensitivity to other peoples problems and gentleness. The behavioural traits eliminate the aspect of biological disposition in defining femininity in the contemporary society because either gender has possessed the above character traits at one time or another in a social context. The original context of the definition of femininity encompassed emotional outlook of the female as a distinguishing factor from the male. The texts, love suicides and The Tale of Hong Kiltong present women as emotional characters who, by virtue of their gender roles do not have the audacity to reproach the male for their atrocities. Their emotional outbursts lead to some of them committing suicide for love in the Love suici des. Conclusion The texts provide numerous aspects of masculinity and femininity and depict both as important entities in the social settings of the texts. Femininity and masculinity were respected definitions of the roles of gender in the traditional society. Although the distinctive roles are waning, they remain important concepts in many fields in the contemporary society. Violence and crisis have been characteristics of the gender wars, with the male dominantly staying above the rest by use of violence to maintain their status quo. Feministic movements have arisen over time to challenge the demeaning roles of the gender classes, and through diplomacy, and most times violence, they have succeeded to some degree. The representation of gender in the texts have been characterised by violence and emotional oppression in order to achieve the gender goals by the powerful masculine practices.

Wednesday, November 13, 2019

The Mirroring Lives of a Jamaican and a Rastafarian Essay -- essays pa

The Mirroring Lives of a Jamaican and a Rastafarian Introduction This paper is a series of two interviews that I had over the course of the semester. I used both of the interviews as a series of research. I then used this research and supported it with published work. The first interview occurred when I was in Jamaica. I randomly crossed paths with Peter. He informed my friends and I that he was a Rastafarian. We spoke with him for about two hours on the beach. He informed us about his religion and his lifestyle. Unaware at the time that I would use this knowledge in my paper I am pleasantly surprised that I was able to transgress this information. The second interview was with Marie Debal. She is one of my sister’s clients. Upon informing my sister about this class and the paper that was due she suggested that I speak with Marie to get information. Marie was the perfect contrast to Peter. She grew up on the island and was raised as a Jamaican woman. Her family traveled a lot with in the island so Marie was very informative about her home land. She came to the United States for college and then stayed to work in New York City working for the Jamaican tourist board. From the interesting aspects that Peter had spoken about I decided to get Marie’s opinion on some of the same topics. I thought these two people would create an interesting contrast to my paper. Today they both live two very different lives but they share very similar backgrounds. Interviewee A background: Name: Peter Age: 30 Home: Jamaica Blue Mountains Occupation: Rastafarian Marital status: none and lives alone Education: self educated by other Rastafarians with in his village Interviewee B background: Name: Marie Debal Age... ...that each of them transgressed into my understanding makes me feel privilege to have even spoken with them. Bibliography Barrow, Steve & Dalton, Peter, Reggae: The Rough Guide New York: Penguin, 1997. Pinkey, http://web.lexis-nexis.com/univer Barrett, Leonard, The Rastafarians Boston: Beacon, 1997. Manely, Michael, The Politics of Change New York: Natural History Press, 1992. Ie: Garvey,1 Kerr, Madeline, Personality and Conflict in Jamaica London: Collins Pub, 1961. Charlie, Susan, Tourism Continues in Jamaica Newsweek, 1997. Zips, Robert, Rastafari New York: Natural History Press, 1993. Winston, Phillip "Revitalization Movements" London: Associated Press, 1995. Cashmore, Ernest, Rastaman: The Rastafarian Movement in England London, Penguin, 1996. Brown, Samuel E., "The Truth About Rastafarians," The Liberator, vol. 3, no.9 Kingston, 1963.

Sunday, November 10, 2019

American War effort in Vietnam Essay

The Vietnam War is viewed by the majority as one of the worst periods in American history. The Americans moved into Vietnam in 1954 under the pretence of fighting against an â€Å"evil and aggressive Communist regime†1. The government stated the Domino Theory as a reason for involving themselves in someone else’s war, whereby if America did not stop Vietnam from falling to Communism then other countries would follow, and American liberty, free enterprise and security would be put at risk. It is hard to define one important reason for the American’s defeat in Vietnam. There are many factors that explain it: restrictions on the military and tactics that the American army employed, coupled with the strength of the North Vietnamese Army. The war also cost a lot of money, which meant inflation, tax rises and America’s economy suffering. The collapse of the home front and the lack of support from the media was cause for the presidents to retreat and was another reason for the undermining of the war effort. This information from home often leaked to the front line and caused the deterioration of troops’ morale, also, the government was often criticised for not understanding the political nature of Vietnam, where no-one really understand or cared about the term democracy. The general consensus by most historians is that the military tactics employed played a large part in determining the outcome of the war. Justin Wintle’s ‘The Vietnam Wars’ concentrates on the military aspects, and suggests that while the Americans had a superior military and equipment, the tactics they used were useless due to the environment in Vietnam – Westmoreland’s search-and-destroy operations would have been an effective opposition to guerrilla combat, ‘or would have done had they been able to take place in a sealed environment ventilated by the Ho Chi Minh Trail’2, proving that the tactics used were inappropriate and not well thought out by the army generals. Even Major John Fenzel in the US Army agreed that defeat was due to tactical failures, which meant that they could not compete with the ‘multi-faceted strategy of insurgency and protraction’3 of the North Vietnamese army. General Bruce Palmer Jr. stated that Vi etnam was ‘†¦a devilishly clever mixture of conventional warfare fought somewhat unconventionally and guerrilla warfare fought in the classical manner’4. It was not just that the American strategy was ineffective; it was ineffective  in the conditions and against a strong North Vietnamese army perfectly adapted to their environment. Due to the absolute strength of American air power, the Americans were lucky enough to keep a good death ratio where the number of Vietnamese deaths heavily outnumbered their own, however the fact that the war dragged on for so long greatly deteriorated the troops’ morale. Obvious tactical failures were the Phoenix Program under Nixon where troops agents infiltrated into Vietnamese peasant districts to detect activists, and while its effect was obvious, its methods were seen to be violent and news of innocents being murdered soon reached home. Operation Apache Snow, where American soldiers attacked Vietcong taking refuge on Ap Bia, now more commonly known as ‘Hamburger Hill’. Troops attacked with fire-fight, hand-to-hand combat and aerial bombardment, however this only served to increase opposition to the war, so ‘Hamburger Hill’ was abandoned, which impelled Senator Edward Kennedy to label the operation as ‘senseless and irrseponsible’5. Morale among the troops was also decreasing. When tactics looked successful, morale was high. But as strategies resorted to a degree of barbarism with innocents being killed and bombing raids, news of lack of support from the home front reached the front line and the drawn out nature of the war ensured that morale soon deteriorated. Also, the experience of war was reasonably comfortable, as Saunders points out in ‘Vietnam and the USA’; soldiers spent a considerable amount of time away from the front line and in Japan or Saigon for ‘Rest and Recuperation’, this obviously led to an ‘air of  unreality and disorientation’6, where drug abuse was common. This lack of morale led to  even more barbarism, one marine unit was known to say- ‘our emotions were very low  because we’d lost a lot of friends†¦so†¦we gave it to them†¦whatever was moving was going  to move no more – especially after (our) 3 days of blood and guts in the mud’7. There were other factors, which led to this low morale. It was often frustrating for some soldiers as men in authority were not always as experienced as them; this meant that there appeared to be little structure to strategies, leading to confusion. They also could not capture the hearts and minds of the Vietnamese, with the hamlet programme set-up by Diem, and the bombing of Vietnam by Americans, the Vietnamese peasants disliked American troops. However, it is easy to understand the Americans lack of reaction to the Vietnamese, as the circumstances of the war were obviously frustrating, and they felt that they were fighting someone else’s war, resenting the American government for sending them. This dislike for those who they were supposed to be helping meant that it was a difficult task for the American troops to win the war. The North Vietnamese Army (NVA) on the other hand were very well suited to the surroundings and made the most of their environment. The situation in Vietnam appeared to be, as James Cameron stated, ‘from the moment the US prepared its first bomb in the North of Vietnam, she welded the nation together unshakeably. Every bomb was a bonus for Ho Chi Minh’8. It seemed that whatever hindered the American army only strengthened the Vietnamese. What the Americans did not realise was that the blitzes from firepower united the North Vietnamese. Chinese and Soviet aid meant that the NVA could enjoy modern  hardware: rocket launchers, anti-aircraft batteries, mortars and flamethrowers. The view shared by many historians is that ‘they could be defeated but they could never be vanquished’9, they had great perseverance and their tactics were clearly laid out, in summary: Americans attack and NVA retreat Americans camp and NVA raid Americans tire and NVA attack Americans retreat and NVA pursue The structure of the army also seemed more advanced than that of the Americans. Someone carrying supplies and ammunition maintained each unit. Structure was built upon the idea of ‘cells’ of three or ten men, so if they were discovered or captured, they would not lose large numbers of troops. This also meant that they could move around more stealthily and communication around the cell was easier. The NVA became expert at setting booby traps and it became hard for Americans to effectively fight them as they attacked enemy units and then quietly disappeared into the jungle. The communists were also better at winning over the Vietnamese population. Their combination of brutality and kindness allowed them to gain the support of the Vietnamese peasants. This obviously gave them an advantage over the American Army. The actions of the American Presidents also went some way in undermining the war effort. Eisenhower had restricted involvement in the war, rejecting any idea of bombing the country –  Ã¢â‚¬Ëœyou boys must be crazy. We can’t use those awful things against Asians for the second time in less than ten years.’10. While he did give support to the French in their Vietnam battle,  Eisenhower saw that sending troops in would be unwise. When Kennedy became president, he increased America’s commitment to Vietnam, needing a more adventurous foreign policy  and bigger defence expenditure. The war is seen as ‘Johnson’s War’ as it was Johnson who  started major escalation. With the Gulf of Tonkin resolution, it appeared that the population  was behind Johnson and his efforts to send more troops to Vietnam, but towards the end of his term, public opinion had swayed and their was  pressure to start bringing soldiers back home. Nixon had initially supported the war, but soon he was under a lot of pressure to allow fewer troops out, and bring more back. Nixon soon began to organise secret bombing campaigns so that he could fulfil his own wishes concerning Vietnam without losing the public’s confidence. Nixon was able to manipulate the situation by making announcements of troop withdrawals at times so that it would decrease opposition. Eventually, Nixon ended the war due to public opposition, the realisation that the war was not winnable, the need for a vote-winning action, and opposition from Congress. The main problem with the presidents is that they seemed to have their own personal agenda for Vietnam, knowing little about the actual situation. After a meeting with, Johnson and Kennedy, a State Department expert said – ‘†¦I was asked to say something at the end of the meeting and they looked at me absolutely helpless, the whole group of them. There was not a single person there who knew what he was talking about†¦They simply did not understand the identification of nationalism and Communism’11, this issue was also brought up at a National Teach-In, ‘the obsession of American policymakers with what they see as monolithic Communism has blinded them to the fact that Communism in Asia has adapted itself to nationalism’12. Those in power often fooled the public and therefore undermined American involvement in the war, as there was a good kill ratio, where it looked like the American forces were winning, officials could fool themselves into believing it would be a victory; however the Tet Offensive showed the reality of the situation. Presidents seemed to be set on destroying Communism, being blind to the  fact that building a feasible South Vietnam was outside of America’s power, what was needed was for them to understand Vietnam and ‘work with rather than against this powerful forceâ₠¬â„¢13. The majority of Vietnamese did not ‘even know the difference between communism and democracy’14. The Vietnam War was the first war with free press, so the media played a huge part in undermining the war effort, undermining public opinion and demoralising American troops in Vietnam. The media had started off supporting the American presidents and their decisions about the war,  however, their support soon decreased as news of the brutal reality of the war and the campaigns that had been covered-up leaked to the press. Press coverage was a major factor in ensuring lack of public support, and therefore the retreat of presidents from Vietnam. One notable example is the issue of ‘Life Magazine’, which saw a full edition with two hundred and forty-two photographs of the soldiers killed in Vietnam during just one week of fighting. As well as showing the hardships which Americans had to endure in Vietnam, the media showed ‘footage of the bulldozing of human carcasses into mass graves, the napalming of children, and the ravaging of villages by American soldiers’15, so that the public began to dislike soldiers, causing many men to try to dodge the draft. Not only did the media allow public opposition to spread, it also undermined the military; less people were drafted into the  war, low morale, and secrets were leaked to the press from troops in Vietnam which the media was able to exploit. The NVA would then be able to see this and could expect attacks. The images that were on television were so powerful that they have been used as one of the main reasons why America was defeated due to the impression left on the public. Although, Riddick argues against this analysis – ‘while the media can influence public opinion, inVietnam media reportage merely reflected, and did not create the national mood of  disillusionment’16. The government, however, understood how influential the loss of media  support could be. In February 1968, a CBS reporter, Cronkite, left an aside not meant for broadcast – ‘what the hell is going on? I thought we were winning this war?’ President Johnson supposedly said – ‘If we’ve lost Cronkite, I’ve lost Mr. Average citizen’. In order to cope with the expansion in Vietnam, US financial aid was greatly increased, Washington had, for example, sent out approximately $2billion worth of aid in the time running up to the Paris Peace Agreement. The war was costing money, and started to interfere with the economy. Johnson,  however, would not admit to the extent of expenditure in case Congress decided to cut budgets on his domestic programmes. In 1965 the government deficit was $1.6billion, in 1968, it was $25.3billion, Johnson had not requested the required wartime tax increases. This resulted in inflation, and eventually taxpayers became indignant and they increased the pressure on Johnson to put an end to the war, or to take a different approach. The war was a great hindrance on America’s economic stature. It denied funds to America and other needs, such as hospitals and education. In the early sixties, Vietnam was popular; patriotism was strong in a confident nation, who assumed that they had the necessary weapons and firepower to assure victory. Opinions on the war differed according to geography and age. The Southern and Mid-West counties were conservative and patriotic whereas coastal counties were liberal and democratic. The older generations supported the war because of the effect of World War II, which had brought prosperity. The younger generations had more liberal attitudes. They were concerned with freedom of speech and self-expression. Conscription also made the war unpopular with young adults, which resulted in low morale in the army and a fall in the number of troops as draft papers were torn up. Further into the sixties, anti-war sentiment was growing in America, the turning point was the Tet Offensive, where the public was able to see the reality of the war and the fact that they were not winning. Soldiers returning home were jeered at and called ‘baby-killer’, and trust in the American government was lacking. At the onset of war, those who opposed it could be split directly into three categories: ‘people with left-wing political opinions†¦pacifists who opposed all wars†¦liberals who believed that the best way of stopping the spread of Communism was by encouraging democratic rather than authoritarian governments’17. The fact that presidents had decided to use chemical warfare especially upset the public as they saw images and heard stories of innocent men, women and children dying as a result. The mid-sixties was also a time of black rights. There were disproportionate numbers of blacks fighting in Vietnam, and it seemed unfair for America to expect blacks to fight this war for ‘freedom’ when they enjoyed little of this at home. Historians saw the blacks as ‘comparing themselves with the Vietnamese: both were, in their view, victims of a  racist government’18. An International War Tribunal was set up and they, along with other critics, claimed that ‘US behaviour in Vietnam is comparable to the atrocities committed by the Nazis in WW2’19. In 1967, the ‘Vietnam Veterans Against the War’ was formed, one member stated ‘I hope that someday I can return to Vietnam and help to rebuild the country we tore apart’20. Also, anti-war leaders claimed that if troops were not withdrawn from Vietnam, the government might  need to bring them home to stop a revolution. Apart from these comments to the government, several protests were taking place. By 1965, organised rallies were being held in approximately forty American cities and a few foreign capitals. There were a lot of students  protests as the younger generations refused to accept the authority of the government. Groups  against the war were dedicated to protesting for the withdrawal of troops, putting a lot of pressure on the government. Violent protests started to become more common as more  atrocities became apparent in the press, specifically the incident of My Lai where about 400  innocents were murdered, which damaged the morale argument about the need to save Vietnam. In November 1965, Norman Morrison imitated the actions of Buddhist monk in Saigon by setting fire to himself out side the Pentagon. A protest at Kent University where four students were killed by open fire brought the message to the public that ‘loss of life as a result of the Vietnam War†¦was no longer confined to Indchina’21. There was still a considerable amount of support for the governments policies, however, even a minority in America can protest vociferously and make a huge difference, especially when figured of respect and authority  speak out. For example, Senator J. William Fullbright spoke out against ‘that arrogance of power which has inflicted, weakened and in some cases destroyed great nations in the past’22, Martin Luther King also spoke out about how ‘the Great Society has been shot down on the battlefield of Vietnam’23. Public pressure meant that in 1968, Johnson had lost confidence in his decisions and his war and he announced he was calling of bombing raids and was prepared to open discussions on the possibilities of peace talks. However, the war was prolonged into Nixon’s term as president, which served only to strengthen the disquiet against the war. As C. Reich stated, ‘the War seemed to sum up the evils of our society: destruction of people†¦environment†¦war by the rich and powerful against the poor and helpless, justification based on abstract rationality, hypocrisy and lies’24. The presidents knew that unless public opinion was swayed towards them and the war, they would not be able to stay in power. By the time Vietnam ended, it was clear that a major reason for withdrawal was down to public opinion. There is no doubt that public opinion went a long way in ensuring that presidents retreated and the war effort undermined. Opposition resulted in a decline in troops and protests throughout America which demonstrated the unrest which politicians had to act on. However, there are other factors which add to this to explain America’s defeat, the failure of the American army against a strong Vietcong force, the role of the media, the economic situation due to mass expenditure, and the blindness of the government to the real situation in Vietnam. Saunders – ‘The USA and Vietnam’ (p.2) 2 Wintle – ‘The Vietnam Wars’ (p. 136) 3 Major John Fenzel – ‘Vietnam: We Could Have Won’ 4 General Bruce Palmer Jnr. – ‘The 25-Year War: America’s Military Role in Vietnam’ (p.176) 5 Wintle – ‘The Vietnam Wars’ (p.165) 6 Saunders – ‘The USA and Vietnam 1945 – 75’ (p.85) 7 Ibid. (p.89) 8 James Cameron – ‘Witness’ 9 Wintle – ‘The Vietnam Wars’ (p.165) 10 Saunders – ‘The USA and Vietnam 1954 – 75’ (p.32) 11 State Department Report 1963 12 National Teach-In – Gettleman – ‘Vietnam: History, Documents, and Opinions on a Major World Crisis’ (p.411) 13 Gettleman – ‘Vietnam: History, Documents, and Opinions on a Major World Crisis’ (p.411) 14 Vietnam Veterans Against the War Statement – John Kerry to the Senate Committee of Foreign Relations – 1971 15 Franklin H. Bruce – ‘From Realism to Virtual Reality: Images of America’s Wars’ (p.441) 16 Riddick – ‘The Vietnam War’ 17 A Vietnam Overview – www.spartacus.schoolnet.co.uk/VietnamWar.htm 18 Higgins – ‘Vietnam’ (p.101) 19 A Vietnam Overview – www.spartacus.schoolnet.co.uk/VietnamWar.htm 20 Ibid. 21 Wintle – ‘The Vietnam Wars’ (p.168) 22 Ibid. (p.157) 23 Ibid. (p.161) 24 C. Reich – ‘The Greening of America’ (p.194)