Tuesday, August 6, 2019

Ethnic Groups in Pakistan Essay Example for Free

Ethnic Groups in Pakistan Essay Recommended Citation Khan, Adeel, Ethnic nationalism and the state in Pakistan, Doctor of Philosophy thesis, Faculty of Arts, University of Wollongong, 2001. http://ro. uow. edu. au/theses/1736 Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: [emailprotected] edu. au Ethnic Nationalism and the State in Pakistan A thesis submitted in fulfilment of the requirements for the award of the degree of Doctor of Philosophy from University of Woilongong by Adeel Khan Sociology Program, Faculty of Arts February 2001 Declaration I, Adeel Khan, declare that this thesis, submitted in fulfilment of the requirements for the award of Doctor of Philosophy, in the Sociology Program of Faculty of Arts, University of Woilongong, is wholly my own work unless otherwise referenced or acknowledged. The document has not been submitted for qualifications at any other academic institution. Adeel Khan 26 February 2001 11 Aknowledgements I would like to thank the Sociology Program and the School of Critical Enquiry at the University of Woilongong for helping me to travel to Pakistan twice to do my fieldwork. In Pakistan there are too many people who have helped me in many different ways. I am grateful to all those academics, journalists, politicians, lawyers and activists who spared their time to speak to me. I would like to especially thank Mazhar Abbas who not only provided me with very useful information and contacts but also arranged meetings with the MQM leaders. I am indebted to Ahmed Shah and Ayub Shiekh for organising one of the most entertaining as well as productive trips to Hyderabad where they arranged meetings with Ibrahim Joyo and Rasul Bux Palejo and other Sindhi nationalists. In Lahore I had the pleasure of Khawar Malik and Imtiaz Alams company in one of the most dramatic months in Pakistans history when the chief justice and the prime minister were caught in a bizarre battle of ego that had created a serious political crisis. In Quetta, Abdul Sami Kakar, a former Pukhtim Student Federation activist, who was introduced to me by Tahir Mohammad Khan, was a wonderful company and great help in organising interviews with Baloch and Pukhtun nationalists. In Islamabad I shall always miss late Eqbal Ahmed with whom I had some of the most stimulating discussions. My supervisor, Stephen Castles, has been an unrelenting source of encouragement and inspiration. He not only encouraged me to think as deeply and as critically as possible but also, at times, forced me to explore different aspects of the argument whenever he felt I could do better. I have particularly benefited from Stephens knowledge of European history. What impressed me the most about Stephen, however, is that he is one of those people who are so comfortable with themselves that they hardly care what others think of them, and therefore they are unassuming and full of humility. I wish I could learn that from him, too. My wife, Rafat, deserves more than a few words of gratitude for she is the one who had to put up with my anxiety, self-doubt, writers block, mood swings, and all the other hazards that come with a person who agrees with Adomo that (o)nly those thoughts are frue which fail to understand themselves. I stand obliged to her for bearing with me. As is customary, and in legal terms, too, I must admit that only I am responsible for the mistakes and weaknesses in my work, but as I have made it obvious that I would not have been able to produce this work without the help of all those mentioned above, and therefore, morally at least, they cannot escape the responsibility. The only consolation I can offer to them is that I apologise for the mistakes and weaknesses and promise to try harder, next time, to fail better. Ill Abstract Nationalism is a way of dealing with a world where everything melts into thin air. It is a form of self-love in which individuals celebrate their collective identity. And like all forms of self-love it gets its strength more from the hatred of others than its love for the self Here lies the secret behind some of the most intractable conflicts in the world. Nationalism is, probably, the only form of self-love that gets its life-blood from an institution, the modem state. Had the state not been behind the self-love of the Germans, they would not have been able to torture and murder so many Jews in such a short period of time. Likewise, had the west not helped the Jews to establish their own state in Palestine, the Jews would never have been able to displace and kill so many Palestinians. Nationalism is not the pathology of the modem world, but is, as a sentiment and as a doctrine, only a pathetic way to deal with a pathetic world. But nationalism as a game of power, as a politics, is lethal and destructive. As a sentiment and as a doctrine nationalism may be the child of an unstable and fast changing world but as a politics it is the child of the nation state. This thesis explores the relationship between the nation-state and the nationalisms of four ethnic groups, namely, Pukhtun, Sindhi, Baloch and Mohajir, who have, at various points in time, contested the legitimacy of the administrative structure of the Pakistani state. It starts with identifying the issue of ethnic conflicts, goes on to review the available literature and then outlines a framework for studying ethnic IV nationalism. As the emphasis here is on the role of the modem state in provoking ethnic discontent and resistance the second chapter discusses the interventionist role of the state and tries to highlight its relationship with nationalism. The second section of the chapter looks at various approaches to nationalism and explains as to which approach is more suitable and why for dealing with ethnic nationalism. The third chapter endeavours to explicate the difference between pre-colonial and colonial state in India as well as the way the colonial state despite being modem was different from the modem state system in the west. The fourth chapter discusses the state system in Pakistan and argues that the postcolonial state is a replica of the colonial state. The next four chapters examine the emergence of four ethnic movements and their varying strategies for dealing with the centralising and homogenising policies of the state. Throughout, the focus remains on the ethnic groups distance from and proximity to the state system as the major factor in determining their relationships. Table of Contents Declaration Acknowledgments Abstract 11 iii iv Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Introduction Nationalism and the State Colonisation of the State in India Nationalisation of the Colonial State in Pakistan Pukhtun Ethnic Nationalism: From Separatism to Integrationism Baloch Ethnic Nationalism: From Guerilla War to Nowhere? Sindhi Ethnic Nationalism: Migration, Marginalisation, and the Threat of Indianisation Mohajir Ethnic Nationalism: El Dorado gone Sour! At a Crossroads as Ever Before! 1 24 45 67 99 133 Chapter 7 158 Chapter 8 Chapter 9 201 238 References Appendix A Interviews 244 259 VI The whole is the false Adomo Inversion of Hegels famous dictum, the whole is the true (1978:50) Vll Please see print copy for image Source: 1998 Census (Statistical Pocket Book of Pakistan, 2000) PAKISTAN.

Monday, August 5, 2019

Elements Of The Service Marketing Mix Marketing Essay

Elements Of The Service Marketing Mix Marketing Essay Marketing mix is the key concept in the marketing task. It is the strategy used to perform marketing functions. Marketing mix according to De Aze is the planned package of elements which will support the organization in reaching its target markets and specific objectives. Marketing mix helps to position the library or information service very firmly in the perceptions of their communities served the wider community for the public library, academic community for the academic library or the clients and customers for the business or specialist information service. Marketing mix needs more properly to be termed marketing mixes, to encourage librarians and information managers to perceive the value of different marketing mixes for specific market segments or groups of users. These are inter-related, interdependent, and also a combination of many factors. C:UsersAjayDownloads69e6aa0beac8f353cdcc2768df8d9bdb_LARGE.png Product: As seen in the goods-service continuum, your product can have both tangible and intangible aspects, and is the thing you offer to satisfy your customers wants and needs. Within this element, you need to consider such things as your product range; its quality and design; its features and the benefits it offers; sizing and packaging; and any add-on guarantees and customer service offerings. Price: Sound pricing decisions are crucial to a successful business and should be considered at both long-term strategic and short-term tactical levels. Within this element of the mix you should consider list price and discount price; terms and conditions of payment; and the price sensitivity of your market. Worth remembering is the connection of price to your position in the marketing specifically that only one operator in any market can be the cheapest. Jostling between competitors for this position is rarely wise. Promotion: This is the element of the marketing mix that most people mean when they talk about marketing. But jumping straight into decisions about what promotional tools to use without considering their relationship to the rest of the mix can be a sure-fire way to waste money. There are many different promotional techniques, each with their own strengths but essentially they can be broken down into four broad categories: Advertising; Public Relations; Sales Promotions; and Direct Selling. These techniques are used to communicate the specific benefits of your product to your customers. Place: Marketers love models that explain the way they work; they love it even more when elements of each model begin with the same letter hence the use of the word Place to describe distribution channels. Your choice of such channels is important, as is the variety of channels you use. For example, a common issue for businesses beginning to trade on-line is how that will affect their off-line business, for example selling directly through the web could alienate retail outlets that have been the mainstay of your business in the past. People: The impact that your people can have on your marketing cannot be underestimated. At its most obvious, this element covers your front line sales and customer service staff who will have a direct impact on how your product is perceived. You need to consider the knowledge and skills of your staff; their motivation and investment in supporting your brand. Any element of the marketing mix will also have its impact on other elements of your business, but the people element is one where the importance of regarding marketing as an integral part of the way you do business is crystal clear. Process: The process part of the mix is about being easy to do business with. If youve ever become frustrated at call centers that cant answer your questions, or annoyed when you cant buy something in a shop because the computerized till doesnt recognize that it exists, even when you can see it on the shelves, youll know how important this element can be. The more high contact your product, and the more intangible, the more important it is to get your processes right. Remember to look at this from your customers point of view. The process problems that are most annoying to a customer are those that are designed for the providers convenience, not the customer. Physical Evidence: When you sell tangible goods, you can offer your customer the chance to try before they buy, or at least see, touch or smell. With services, unless you offer a free trial, your customer will often be buying on trust. And to help them do so you need to provide as much evidence of the quality you will be providing as possible. So physical evidence refers to all the tangible, visible touch points that your customer will encounter before they buy, from your reception area and signage, to your staffs clothing and they images you include in you corporate brochure. 7ps service marketing mix in mc Donalds After segmenting the market, finding the target segment and positioning itself, each company needs to come up with an offer. The 7 Ps used by McDonalds are: Product   Product is the physical product or service offered to the consumer. Product includes certain aspects such as packaging, guarantee, looks etc. This includes both the tangible and the non tangible aspects of the product and service. McDonalds has intentionally kept its product depth and product width limited. McDonalds studied the behaviour of the Indian customer and provided a totally different menu as compared to its International offering. It dropped ham, beef and mutton burgers from the menu. India is the only country where McDonalds serve vegetarian menu. Even the sauce and cheese used in India are 100% vegetarian. McDonalds continuously innovates its products according to the changing preferences and tastes of its customers. The recente xample is the introduction of the Chicken Maharaja Mac. McDonalds bring with it a globally reputed brand, world class food quality and excellent customer specific product features.   McDonalds Indian Menu: Vegetarian McVeggie McAlooTikki Paneer Salsa Wrap McCurry Pan Pizza McPuff   Non vegetarian Chicken Maharaja Mac McChicken Burger Shahi Chicken McCurry Wrap Chicken Mexican Fillet-O-Fish Chicken McNuggets   Price   Pricing includes the list price, the discount functions available, the financing options available etc. It should also take into the consideration the probable reaction from the competitor to the pricing strategy. This is the most important part of the marketing mix as this is the only part which generates revenue. All the other three are expenses incurred. The price must take into consideration the appropriate demand-supply equation. McDonalds came up with a very catchy punch line Aap ke zamane mein ,baap ke zamane ke daam. This was to attract the middle and lower class consumers and the effect can clearly be seen in the consumer base McDonalds has now. McDonalds has certain value pricing and bundling strategies such as happy meal, combo meal, family meal and happy price menu to increase overall sales volumes. Place   The place mainly consists of the distribution channels. It is important so that the product is available to the customer at the right place, at the right time and in the right quantity. Nearly 50% of U.S.A is within a 3 minute drive from a McDonalds outlet. There is a certain degree of fun and happiness that a customer feels each time he dines at McDonalds. There are certain value propositions that McDonalds offer to its customers based on their needs. McDonalds offers hygienic environment, good ambience and great service. Now McDonalds have also started giving internet facility at their centers and they have been playing music through radio instead of the normal music. There are certain dedicated areas for children where they can play while their parents can have some quality time together. Promotion The various promotion channels being used by McDonalds to effectively communicate the product information are given above. A clear understanding of the customer value helps decide whether the cost of promotion is worth spending. There are three main objectives of advertising for McDonalds are to make people aware of an item, feel positive about it and remember it. The right message has to be communicated to the right audience through the right media. McDonalds does its promotion through television, hoardings and bus shelters. They use print ads and the television programmers are also an important marketing medium for promotion. Some of the most famous marketing campaigns of McDonalds are:  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚   You deserve a break today, so get up and get away- To McDonalds   Ã‚  Ã‚  Ã‚  Ã‚   Aap ke zamane mein ,baap ke zamane ke daam.   Ã‚  Ã‚  Ã‚  Ã‚   Food, Folks, and Fun Im loving it. People   McDonalds understands the value of both its employees and its customers. It understands the fact that a happy employee can serve well and result in a happy customer. McDonald continuously does Internal Marketing. This is important as it must precede external marketing. This includes hiring, training and motivating able employees. This way they serve customers well and the final result is a happy customer. The level of importance has changed to be in the following order (the more important people are at the top): 1. Customers 2. Front line employees 3. Middle level managers 4. Front line managers Processes   McDonalds worldwide is well known for the high degree of respect for the local customs and culture. McDonalds has developed a menu especially for India with vegetarian selections to suit Indian tastes and preferences. Keeping in line with this, McDonalds does not offer any beef or pork items in India. In the last decade it has introduced some vegetarian and non-vegetarian products with local flavors that have appealed to the Indian palate. There have been continuous efforts to enhance variety in the menu by developing more such products. It is completely transparent and visible to the customers, allowing them to judge hygiene standards where the process takes place. The customers are even invited to check the ingredients used in the food. McDonalds has also re-engineered its operations repeatedly in its 11 years in India to address the special requirements of a vegetarian menu. Vegetable products are 100% vegetarian, i.e. They are prepared separately, using dedicated equipment and utensils. Only pure vegetarian oil is used as a cooking medium. Cheese and sauces are completely vegetarian and egg less. Separation of vegetarian and non-vegetarian food products is maintained throughout the various stages of procurement, cooking and serving. Food manufacturing transparent to customers across the counter. Training to the licensees about how to operate the franchise. Invented the most efficient cooking equipment with use of latest technology. New methods of food packaging and distribution are followed Physical evidence   The physical appearance affects not only the impression outsiders have of a business but also the way that business functions. McDonalds focuses on clean and hygienic interiors of its out lets at the same time they are attractive. It maintains a proper decorum at its joints. Staff members dress in McDonalds Dress code with Green shirts, Blue trousers, Black caps and Customized Ronald McDonalds tie. Building maintenance and visible cues are provided by the golden arches, the trademarks and the logos in the premises. The delivery scooters also add to the physicality of the company. 7ps service marketing mix in Pizza Hut After segmenting the market, finding the target segment and positioning itself, each company needs to come up with an offer. The 7 Ps used by Pizza Hut are: PRODUCT Worldwide and in India, Pizza Hut has come to become synonymous with the best pizzas under one roof. This is because at Pizza Hut the belief is that every pizza has its own magic, thus making it a destination product which everyone seeks. It is this belief that has ignited the passion to create, innovate and serve the finest product the industry has to offer, while setting standards for others to strive to replicate. Pizza Hut is committed to providing uncompromising product quality, offering customers the highest value for money and giving service that is warm, friendly and personal. A critical factor in Pizza Huts success has been its unique dining experience. Crewmembers at Pizza Hut strive each day to provide customer mania the kind of service that ensures that every visit of the customer is a memorable one. Over the years Pizza Hut has also developed and successfully introduced a range of products especially suited to the Indian palate. These products like Chicken Tikka, Spicy Korma, Spicy Paneer and the Masala and Tandoori pizzas have been a tremendous success. What has also given Pizza Hut a competitive edge is that in addition to an extensive range of internationally renowned pizzas like The Italian, the proprietary Pan Pizza and Stuffed Crust, in India the menu offers the option of a complete meal. It includes appetizers, a Salad Bar where the customers can make their own fresh salads, a range of soups, pastas and desserts PRICE In the past, Pizza Hut has successfully used the high/low pricing strategy when setting the retail price of its products. The high/low retail pricing strategy allows Pizza Hut to charge a price that is above the competition, but also promote frequent sales to lower the price below them. Both Pizza Hut and the beverage Mountain Dew are Pepsi subsidiaries, bundle pricing will be used.. Pizza Hut will be able to sell two products together at a single price to suggest a good value. Different groups of customers are willing to pay different prices for the same product. Pizza Hut can sell The Extreme to the customers who will pay the higher price to be the first to buy and also to the bargain hunters Finally, this strategy will emphasize product and service quality. Pizza Hut sets a high initial price for its products to send a signal to customers that its products are quality and the service is excellent. PROMOTION The objectives of promotion are to introduce a new product, stimulate demand, change the short-term behavior of the customers, and encourage repeat or greater usage by current customers. Pizza hut uses many promotional strategies. The main promotion is a coupon to purchase. This promotion is also distributed mainly by mail (VIP members), but also by fliers on college campuses around the country in order to reach the target market. They are using billboards on main stream places to get there customer. They are also distributing door to door brochures to capture more and more customers. Pizza huts also using marketing techniques. These are the strategies Pizza hut is using for its marketing. Pizza huts trys to attract the younger generation as their main market segment. Apart from this Pizza Hut is using intense marketing strategies they are also giving ads in magazines. Advertising camping will creates awareness of the products in our target markets. PEOPLE Here the job design is not the most difficult task to do. Also there is no specific requirement for recruiting process. After talking one of the employees in Pizza Hut, we came to know the criteria of selection. The girl was from west India, she was only 10th passed out. After this we it was confirmed that there is no proper requirement of the educational background. The only factor they were considering on the communication skills, how they communicate with the customers. Since the communication is the most important factor between the customer and employee because the whole process is depended on giving the orders for food. For this the Management conducted the training process for the new employees. The Training is given for total 5 days. Out of 5 days, they have 3 days for kitchen training and other 2 days in the main dining, that is, how to take orders and basically how to communicate with customers and make them happy by their services. PROCESS The design of the process of the pizza hut is very efficient .pizza hut do not follow any kind of hierarchy , all the employee is at the same level ,pizza hut has a very prescribe and well known process by adopting various technology software which help them to upgrade their supply management and also manage their crowd of customer efficiently. PHYSICAL EVIDENCE The ambience of the pizza hut is good enough to catch up the people .they provide a very good dining experience with high quality of atmosphere in terms of their physical evidence. And pizza hut always try to upgrade with changing environment and modernization is key of success of the pizza hut.

Computer Ethics: Different Types Of Censorship

Computer Ethics: Different Types Of Censorship A Censor is A person authorized to examine books, films, or other material and to remove or suppress what is considered morally, politically, or otherwise objectionable. There are three different types of censorship; 1. Moral Censorship 2.Military Censorship or Political Censorship 3.Corporate Censorship Moral Censorship The most commonly known type of Censorship, is Moral Censorship. Moral Censorship is used in Four different ways; to omit Sexual explicitly, Violence, Racial Comments, and Curse Words. It is mainly used in Music, Movies, Books, at School, and on TV. Ratings are used to determine what is appropriate for their audience. For example, Movies can be rated G, PG, PG-13, R, or X-17. They are used to deem who would be interested in watching the film, or who shouldnt be watching it. In a G rated movie you can trust that there will not be any nudity, curse words or extreme violence. In Music cuss words are bleeped out or removed all together on kid CDs or on some radio stations. Certain things are censored so the public can enjoy them. In School books some things are politely evaded or vague, such as the topic of sex. Though in biology they leave nothing for the imagination. It just goes to show that how much censorship is used, depends on the audience. Military Censorship and Political Censorship Military and Political censorship both deal with deleting information, trying to control large groups of people, and uses of propaganda. In countries where censorship were used, deleting and changing information was their bread and butter. Such as in the Soviet Union, under Stalins rule when photos, history, and even the weather was changed in a way to control the people. The Internet Police in China totalling more than 30,000 members, are constantly changing search engines such as Yahoo, and Google. In Cuba the internet is even illegal! In wartimes censorship is taken to the extreme and propaganda can be seen everywhere. Emails from the war home, online diaries, or blogs have to be searched and things erased from their writings. Sometimes only a few words can be read, usually just an I Love You, is all that will get by these vast searches. In the U.S. they scan the emails of suspected terrorists for information leading towards an attack. In a way these types of censorship can be both good and bad for people. You can relax that you are behind walls, but are you safe from those within? Corporate Censorship The business today of hiding stars, incorrect commercials, and deciding just what is acceptable on the internet is still a big topic today. Such as the T.V. debate between Johnson and Salant. Though you may not think it deals with Censorship on the internet, in a way it does. Johnsons side was this Many broadcasters are fighting, not for free speech, but for profitable speech. Salant on the other hand said the commercials were not wrong and Johnson was 100% wrong instead. Since many commercials and advertisements are seen on the internet Johnsons and Salants debate comes up often. Sometimes thought, people just cant censor what happens on live broadcasts, but punish them instead. Like at Sports games where the fans, players, and coaches might start a fight and they have to call security or pull out a yellow or red flag. In the arts suggestive elements are removed or condemned from being seen on some Websites. Images blocked with black strips or pixilated views help keep identity and images unseen from public view. Corporate Censorship is a way to show things to the public, but also keep things away at the same time. Public Filtering In Religion, it is common knowledge that the Bible was changed through out bidding at the of Nobles, and Kings. It was a way for them to control the people through a different route than just laws and punishments. Today, public filtering can be seen in libraries, schools, some work offices, and internet cafes. 21 states have laws to filter the web in public places. The Federal Childrenà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s Internet Protection Act (CIPA) provides for three different types of funding: 1) aid to elementary and secondary schools; 2) Library Services and Technology Act (LSTA) grants to states for support of public libraries; 3) the E-rate program that provides technology discounts to schools and public libraries. The libraries and public places that are a part of the E-rate, and LSTA must filter out obscenity and things which are harmful to minors. Usually in order to view things that are not permitted to minors you have to put in a password in order to view the internet. Admins and ModeratorsIn the world of fast communication and millions online, it is hard to keep it in check on the internet. Because people can copy paste, post derogatory images, curse on child protected sites, trolls etc. Admins and Moderators are put to use. There have been many complaints about the copy paste issue. So sites have installed systems that make it impossible to copy paste from their site or print. But there are still loop holes in the system, you can take pictures of the screen, do it at certain time, or even hack in to the network to steal images. But most people see it as harmless so not too many laws are against it. Admins are always careful to list where the images come from and site who spoke what, on a different page, or at the bottom of the page it is cited on. People who post nudity or provocative pictures are usually unallowed to come back on the site and their images are deleted as well as their Username and Passcode. Swearing is the same way, you receive a warning, or if there are enough offenses you are removed from commenting ever again. Trolls and Spammers are different, they are usually anonymous and repeat the same thing over and over again or try to sell something or say really mean things about a user or sometimes a person people dont even know. Flame Wars are on the otherhand, between two or more people in a heated argument and when hurtful things are said to one another. The Moderater usually comes in at this point gives a warning to the two for all to see and then deletes the whole war, they can also do it in private and just delete them if they are unwilling to discontinue the war. Admins and Moderators are also in charge of the safety and privacy of the users on their site. At Home Filtering at home is usually done by parental controls on the computer, and does not allow people to visit certain sites or do certain things. It also puts a time limit for individuals on the web. There is also something like a Modem Officer. If it sees that you are accessing sites that are illegal or you are a sex offender and talking to others with not so innocent conversations, they alert the authorities about your actions. Privacy In Computer Ethics, Privacy plays a big part in keeping the peace between people. In todays world people share many of their thoughts, but they also like to keep some things a secret. And it is the duty of those on the internet to respect that choice. People worry about; *Internet Anonymity *Hackers *Ways to keep their privacy *Websites that may jeopardize their privacy *And what the Government does to keep their privacy Either way, people care about what others see. So they build ways to keep themselves safe by building walls on the internet and on their computers. Internet Anonymity To go by a false name or simply leave the name blank or Anonymous is one of the easiest ways for people to not find out who you are. If a website asks for a picture when you leave a comment, you can leave it blank and go by a name known to be used by anonymous users like Jane Smith. By keeping your identity a secret people can not know who you are. Though sometimes the IP address can be seen, which is basically a computer number that you are using, most people will have not clue who you are. Thats why most scammers try to be anonymous. But it also risks that people will not be able to trust you. Like on Ebay, if you have too much anonymity on yourself or products people may not buy your wares because they fear you are fake. Either way Internet Anonymity if meant for peoples identity to be a secret. Hackers People who try to find out your name, phone number, address, IP address, and other information that you have not given out with your permission, and then use it for their own, or their companys gain. These people usually break through your security codes by their mean of software, and learn about you to blackmail, harm you physically, steal your money, or stalk. People who are hackers generally keep to themselves, unless they are trying to get information from someone. The underground market of hacking to businesses so people can learn about their customers or victims is a dangerous tool worldwide. Hackers are paid to either be a part of the law or against it. Those with the law, hack someone system, usually a criminals, to find out what they have done in the past or what they are planning to do in the future to protect people. Those who hack for wrong, are hacking for their own benefit or their companies and seek victims rather than criminals. Hackers can be just about anyone, without you knowing, and fool you into thinking they are somone else. People who try to message you on the internet using your friends name so they can steal all your money from the bank, is just an example of what they can do. Hackers are dangerous and helpful, depending on what side of the law they are on. Websites that Post Personal Data Sometimes the information we give to others that should remain private, we give out ourselves. Most of the time without us even knowing it. Twitter, Facebook, Myspace, and the new scare Spokeo.com are just a few of the places people can find information about you. The new british Web Wise is also a new thing developed by their government to track your interests for companies. It can be scary how much information about you alone is out there. Thats why, you should rely on Computer Ethics to post what should be given, and what should not. Facebook, Myspace, Twitter, and many more are examples of todays social Websites on the internet today. They do not have too many rules of who joins and they reveal a lot about your personal identity. On Facebook, they ask for your real name and information about you. They are updating their privacy system so that not as many people will be able to find things about you which are private. On Twitter your every thought or action is posted on the internet for all to see. Its a big step from the Pony Express over a hundred years ago. A big concern today is about a Website called Spokeo.com and others like it. They find out all the information they can about you on the internet and then post it all on one site for the World to see. Your Name, Phone Number, Address, Interests, Hobbies, School, Work and much much more. Many people have eliminated their profiles on these websites. But many do not even know they exist. People can find out whatever they want about you from these Websites, and you would not even know they knew. To some its the sheer lack of security that scares them. Others just dont care. Either way the people have a choice if they want their information on there or not, or if they want the Website to be discontinued permanently. Ways to Keep your Privacy In order to keep yourself safe on the internet, there are some things you need to do. *Keep your Internet Viewing safe *Keep your Computer safe *Keep your Personal Information safe When people go on the internet, they are shot into a pool of millions of people of all walks of life. In order to keep the sharks from attacking you, there are some things you should do to keep your Web time safe. The first thing you might want to do is type your name into a search engine, you might be surprised what pops up! Another thing you should consider is surfing with a Proxy. It keeps your identity a secret and its hard for people to find anything out about you. Also, avoid registrations that ask you for your Social Security Number, your Credit Card Number, your Phone Number, Address, or any information you wouldnt give to a stranger. Dont let strangers use your network, put your router in the middle of your house and away from windows so they wont be able to connect. Avoid Flame wars some people hold grudges. Even if your joking, remember they cant see your face or hear your voice so they wont be able to tell. Keep in mind when you are surfing the web if you wouldnt want your family to see what you are looking at. That is a good sign of bad Websites. If children want to search the internet first put on a trusted parental controls device. To keep your computer safe remember these things. Be careful of what you download, Some programs include adware that will report your surfing habits back to a third-party company that will then use that information to send you ads (spam). Downloads can also be a way for people to hack into your system. Keep all software current (including your Web browser) with automatic updates. Use firewall, antivirus, antispam, and antispyware software from a source that you trust and watch out for fake alerts for security software. When you have friends or family over, make sure folders and things that have personal information are hidden from view. Especially if there are people you dont know, at your house. Be aware of Phising Scams, these are criminals who ask for sensitive information like your password, bank account number, or anything that you wouldnt tell a stranger. These people will sound friendly and usually ask through email or instant messaging. Also make sure children know what not to tell someone they dont know. Never let children talk to strangers online, and if you feel someone is asking you too many personal questions report them to the admin of the site, or if someone tells you they are coming to visit you and you dont know them, call the police. To keep yourself safe, you must always be aware that people on the internet are not always kind and may have secret motives. It is the same as telling a child Dont talk to strangers, even if they say they know me. With your bank account or other information. Copyright When a person has done something that requires a fee or special permission, they usually issue a copy right. Intellectual Property, Copyright Laws, and Plagarism will be discussed in this section. Intellectual Property The people responsible for Intellectual Property is WIPO (World Intellectual Property Organization) the Convention Establishing the WIPO relates that rights belong to; 1. literary, artistic, and scientific works 2. performances of performing artists, phonograms, and broadcasts 3. inventions in all fields of human endeavor 4. scientific discoveries. Intellectual Property are the creations of human thought, and intellect. They are usually protected by a Copyright, in which WIPO is internationally responsible for. Copyright Laws The laws of Copyright state that only the owner of Intellectual Property may do the following with the work: 1. reproduce it 2. prepare derivative works based upon it 3. distribute copies of it to the public 4. perform the work publicly (if applicable) 5. display the work publicly. The WIPO Copyright Treaty states that these rights belong exclusively to the owners of the Intellectual Property. The ideas for things are not protected by copyrights, but only the completed product. As such people who Beat Others to the Punch will mor likely succeed than those whos idea it was in the first place. The Copyright Law, does not protect ideas, procedures, systems, or methods of operation. For information over a Communication Network (like the Internet), Copyrights protect all the dealings. But only to those who want a Copyright. Some instances with Copyright are hard to know which is right and wrong. With Caching and Audio Players that can download songs from the Internet, the laws have to be changed periodically. Caching is Copying and Storing of Webpages. It can be done on your browser, with frequently visited websites, or on google. It becomes a problem when it stops others from reading new and improved parts of the website. The major problem though with copyright lately is the MP3 player, and Ipod battle. Where people can download music online for free, which is not legal. WIPO states that home use of copying the music is legal but selling pirated copies is a crime. It also says this about Copyright Ownership which oftens comes up in these debates. 1. Who is the natural author? Who produced the work? 2. Is the creation a work for his/her employee? 3. Is the creation a work for him/her as a specially commissioned work? 4. Is the person a joint author of the work? 5. Has the person obtained a valid license to use the copyrighted work? 6. Are the rights that the person has obtained recognizable and enforceable under the current law? PlagarismAnother Copyright issue that keeps coming up is the Crime of Plagarism. Plagarism is when someone steals another persons intellectual property and claims it as their own. Plagarism is a major offense in school, as well as the Work Force. Thats why bibliographys and quoting where you got the information from is so important. It can stop you from getting a bad grade or even worse, getting sued and losing all of your money. Plagarism is a very serious crime in the entertainment industry. In the movie Singing in the Rain a woman Lipsynchs to another woman singing behind the curtain. After it is found out, the woman lipsynching loses all of her credibility and fame. As such Plagarism plays a vital role in todays Entertainment Industry for the fans to know that whoever is singing, acting, playing, dancing, etc. is who they think it is, and its something that they did not steal from someone else. Though in some instances Plagarism takes on the form of Fandom. Such as a band called the Roaches copying the world wide phenomenom the Beatles. It is not considered Plagarism if someone gives their permission, and they remember to tell where their Intellectual Property came from. Copyright plays a vital role in Computer Ethics today, and makes it a priority for everyone to know where their Intellectual Property is coming from. With the world being connected by computers it is obvious that we need rules to live by. By having laws about Censorship, Privacy, and Copyright, we can assure our lives our safer by our nation following these laws.

Sunday, August 4, 2019

Free Essay on Nathaniel Hawthornes The Scarlet Letter - The Message :: Scarlet Letter essays

The Message of The Scarlet Letter Nathaniel Hawthorne, a critically acclaimed American writer of the 19th century, was born in Salem, Massachusetts in 1804. The novelist's book, The Scarlet Letter, is supposedly his best work, and universally considered a literary classic. Concerned with sin and consequences of dealing with it, Hawthorne's work relates to his own personal sense of shame about his ancestor's persecuting roles in the 17th century Salem Witch Trials. By indirectly dealing with his sense of guilt through fictional circumstances, he shows his viewpoint as being highly critical of the Puritans while teaching a strong moral lesson in the process. Graduating in the middle of his class from Bowdain College in 1825, he went on to write a variety of long stories, short stories, and articles. Generally his writings contained powerful symbolic and psychological aspects of "the effects of pride, guilt, sin, and secrecy" (Encarta, 1997). Although many moral lessons are dealt with in the book, the most significant thesis Hawthorne proved was salvation can only be earned by being open about and true to what you are. Using excellent characterization, description and expression he develops his thesis by showing the consequences of hiding sin, like Arthur Dimmesdale, and of publicly acknowleding it, like Hester Prynne. Through Hester's daily struggle with her public punishment to wear a scarlet letter A on her clothing to remind her and everyone in the Puritan community of her adultery, she learns how to cope with and triumph over her sin against humanity. On the other hand, Reverand Arthur Dimmesdale, Hester's equally guilty partner in the crime, refuses within himself to publicly confess his sin until the end of the novel, whereas shortly after he dies. Thus, Hawthorne summarizes the delayed importance of being truthful about oneself in his quote, "Be true! Be true! Show freely to the world, if not your worst, yet some trait whereby the worst may be inferred, (236)!" The authors overall presentation is very clear because to the emphasis of his main point of truth setting people free. It drags the reader into the action and enables them to live with the characters, at the same time as teaching a valuable lesson in dealing with life's obstacles. The style of his writing is very symbolic, descriptive, and detailed. He creates very vivid images of the story through elaborate adjectives.

Saturday, August 3, 2019

Awakening Vs. Greenleaf :: essays research papers

A strong critique by existentialist writers of modern society is the way in which humans live unexamined, meaningless lives with no true concept of what it is to be an unique individuals. In Kate Chopin’s novel The Awakening and in Flannery O’Connor’s short story â€Å"Greenleaf† the characters Edna and Mrs. May, respectively, begin almost as common, stock characters living unfulfilled lives. They eventually converge, however, upon an elevated life and death filled with new meaning through their struggle with their role as individuals surrounded by other important beings.   Ã‚  Ã‚  Ã‚  Ã‚  Jesuit philosopher Pierre Teilhard de Chardin (1881-1948) believed that humankind follows a certain evolution of mind and body. This process involves a beginning (komogenese), a development (biogenese), and then a peak (noogenese) in which humans reach an Omega Point of higher being. Though his ideas were actually applied on a much broader scale of humanity over a large timespan, the theory can be applied to the individual’s process of human development. Single humans begin as common clones of one another. From this commonality many examine their lives and develop the things within them that make them uniquely them. This development of the self only can be ended at death when the individual converges upon an Omega Point in which he has an elevated understanding of and meaning for life. The characters Edna from The Awakening and Mrs. May from †Greenleaf† encounter a similar human development in which an individual is formed with an understanding of life. The means by which they achieve this differ greatly.   Ã‚  Ã‚  Ã‚  Ã‚  As the novel The Awakening opens, the reader sees Edna Pontellier as one who might seem to be a happy married woman living a secure, fulfilled life. It is quickly revealed, though, that she is deeply oppressed by a male dominated society, evident through her marriage to Leonce. Edna lives a controlled life in which there is no outlet for her to develop herself as the individual who she is. Her marriage to Leonce was more an act of rebellion from her parents than an act of love for Leonce. She cares for him and is fond of him, but had no real love for him. Edna’s inability to awaken the person inside her is also shown through her role as a â€Å"mother-woman†. She loves and cares for her children a great deal, but does not fit into the Creole mother-society in which other women baby and over protect their children.

Friday, August 2, 2019

Erickson’s development stages

Different psychologists have put forward stage theories of development which discuss that people go through many stages in definite orders, with challenges associated to diverse capacities arising from each stage and age. Erik Erikson proposed a theory of psychosocial development that happens in eight different stages over a person’s life span.He proposed that people face fresh challenges during each stage: generativity vs. self-absorption autonomy vs. shame and doubt: trust vs. mistrust initiative vs. guilt, identity vs. role industry vs. inferiority, confusion, intimacy vs. isolation, and integrity vs. despair. As Erik Erikson stated, the identity search marks an imperative step in adolescence. Adolescents may pass through an identity crisis, in which they struggle to comprehend themselves and make decisions on their future. Identity foreclosure occurs when a person hastily obligates to roles or values that others recommend.Foreclosure status is whereby a person has makes a commitment minus attempting identity examination. The sense of commitment and the quality of this commitment plus the manner in which it’s derived varies. Foreclosure status has so many characteristics. The adolescents in this status tend to assume commitments handed to them by others like their parents.They are able to put across a commitment but unable to explain how they got to that decision. Here they also tend to take for granted the recipe knowledge. They are obedient to people in authority and respect strong leadership. They also conform to the significant expectations of the other. They need strong social approval in making decisions. Moreover they are affectionate and loving when at home.They are unlikely to offer direction or leadership that is creative because of fewer analytic knowledge and rigidity in their commitment. The following is an example of a girl in a foreclosure status: Mary’s mother is a lecturer in women and gender studies and is totally involved in feminist issues. Mary admires her mum so much.She is a woman who is strong and as a single parent, has struggled to fend for her daughter while establishing her personal career. Mary believes that she, too, will be an independent and strong woman. She likes avoiding people especially men who don’t recognize her that perspective or just by attempting to bring let out her feminine personality.She undoubtedly maneuvers clear of her maternal grandmamma who is very artsy and unpleasantly very disorganized. Mary’s performance at the university is promising and the selection of her courses shows her unwaver ing interest in politics, psychology and more importantly feminine/women studies. Foreclosure comes from some sort of adversity or roadblock when a person delays commitment to an identity then an identity moratorium occurs. He or she may experiment with different roles and values. When a person is concerned in exploring varied identities and does not make any commitments, then it is in order that the person is in the moratorium state. The adolescents in this stage are the most anxious. They have well developed moral development.They are able to describe their feelings deeply. They like to exercise a socially mature influence, good debaters, socially in-depth and effective, they are good critical thinkers about everything they say and do. An example of a moratorium status is as follows. Tom has switched his college major many times that it will take him 6 years to graduate.Because his parents have incidentally refused to cater for his tuition ,room and board expenses, tom has tried so many of jobs, ranging from cleaner to shoe salesman. He likes jobs that allow him think and be alone; his friends are very much the like him .He performs well but his record has many incompletes. He has had one satisfying intimate relationship and is looking anxiously for another.  When a person lacks a clear sense of identity but still hasn’t explored issues related to identity development then identity diffusion happens. Here they engage intense immediate experiences that heighten their sense and provide an immediate pleasure.They tend to avoid making decisions with less developed moral reasoning. They always belong to the negative identity. In terms of sexual orientation, they are more experimental. Here is an example of a boy who is identity diffusion state. Dan is a freshman in the nearby university close to his former high school.He travels home almost every weekend but does not enjoy himself whenever he's there. He avoids talking to his high schoolmates friends or parents, prefers to surfing the web in his room. Occasionally he engages in impulsive shopping sprees and there after discusses elatedly over h is new electronic appliance he has purchased..He gets annoyed if his parent asks about it. Dan is registered for courses that   he has been informed that are simple, and he doesn’t have strong interest in his studies or his grades. Dan apparently has few goals and doesn’t care much about finding it  Identity achievement happens when a person considers other possibilities and commits to a certain direction in life and identity. In this case an individual has explored varied identities and made a commitment to one.The adolescents in this category are the ones that are natured by their parents well and have democratic family. They tend to be involved in occupation, political and religious belief exploration. They can think critically and have reasonable mind in that they make informed decisions. However they can be convinced to change their mind.They are the most highly adaptive and complex adolescents. They are more of future oriented and can identify things coming i n their future. Moreover they have self esteem and high level of reflective ability. They develop good relationships with their colleagues. Here is an example of identity achievement status girl. Melissa has parents who are both doctors. At the university she was a Spanish Major, spending a semester in Spain studying culture and art.During her graduation she surprised her parent that she had enrolled for medical school. She arrived at that decision after having an intimate relationship with a hospice nurse and working as a hospital volunteer during summer.Conclusion In our fast changing world, it is believed that identity crises are very many currently as compared to the Erikson's days. Exploring diverse areas of your life within your family, romantic relations and your role at work can help improve your individual identity.ReferencesErickson, H.E (1970). Reflections on the dissident of contemporary youth, international journal on psychoanalysis Marcia, E. J (1980). Identity in adol escents. In Adelson J.(Ed.), Handbook of Adolescence Psychology. Wiley: New York

Thursday, August 1, 2019

Personal Ethics Development Paper

Trevino and Nelson (2007), define ethics as â€Å"the principles, norms, and standards of conduct governing an individual or organization. † I was influenced the way I determine different actions or behavior in a particular situation since I was a child. Growing up with a single Catholic mother made me value different things and behave in a particular way. In addition, this made me a have a particular ethical system that influences the way I work and act as an individual. At the corporation level, ethics is important because they set the rules and regulations. In this paper, I will explain the developmental aspects of my ethics as well as my ethical system, the effects of my ethics at my workplace, and importance of ethics in an organization to achieve its goals. My ethical system was shaped since I was a child. Growing up with a catholic single mother, definitely influence the way I value the family. Also, some of my decisions are influenced by this catholic background, which I do not genuinely practice but follow to some extent. Other factors that shaped my ethics were my family, school, and personal events. My family always corrected me whenever I did something that they consider wrong, which could be something simple as taking a flower from my neighbor’s garden. My family saw this little example as stealing, but as I child I saw this as taking the flower for my mother. School taught me what was legally wrong or right. I learn that some people simply don’t care too much about the actions and consequences of their actions and act impulsively. When making decisions, my ethical system influences they way I act because tend to be bias by what my mom, my family, school, or personal events taught me. Time has taught me to value the importance of learning form other mistakes and advices. This had leaded me to draw conclusions from specific examples. For example, when considering any issue, I usually use inductive reasoning and go from the very specific problem to the general conclusion. At the workplace, my ethical system influences the way I behave and perform in a positive and negative way. Based on the nature of the work, my ethical system at the workplace tends to be a combination of duty-based and goal-based. Duty-based is an â€Å"a moral obligation or commitment to act in a certain manner. For example, I work for the United States Postal Service and I am commitment to my work, which includes several tasks determined by the Postal Service rules and regulations. If I fail with one of this laws or rules I could be on probation or lose my job. Therefore, it is important that I obey those rules. In addition, all this tends to be influenced by the actual goal of the company and my personal goal. The company goal is to complete my assigned tasks in a timely manner, which is to deliver the mail. My personal goal is to produce money to sustain my family and pay my expenses. This personal goal drives me to be ethical and the do the right thing at my workplace because I do not want to put in jeopardy my job. This puts into play my personal family values. Therefore, my ethical system could be considered individualistic and very very competitive, which could impact my workplace in a negative way. On the other hand, this could turn out to be very positive because I am very reliable and undependable at work. Business ethics (2009) is defined as â€Å"moral principles defining how businesses and business professionals should act towards each other, employees, and the public. In other words, ethics are needed in an organization because they determine the company norms and principles for its employees and customers. To determine the company ethics its important because based on this, the company will be perceived nationally or internationally. Business ethics play such as important role today that the government forces companies to pay attention to corporate re sponsibility and business ethics. This norms, rules, and regulations also play an important role to achieve the company goals and direction. The effects of the application of these ethics influence consumers, employers, other businesses, and the society in a positive way. In order words, not only this company teaches other companies what is the right thing to do, but it also acts as an example for individuals who work there or purchase their items or services. In conclusion, ethics are rules, norms or regulations that influence the way people or corporation act. These influences could be either positive or negative and there is shape early in our lives or at the early stages of a corporation. In this paper, I explained that my personal ethics were shaped since I was a child. My ethics and values have changed based on personal events, religion, and family values. My ethical system influences the way I perform my job to achieve my personal goals. Based on these factors, ethics play an important role in corporations because companies are run by individuals who have their own ethical systems. In addition, ethics determine who the company is and how it is perceived in the society. Personal Ethics Development Paper Trevino and Nelson (2007), define ethics as â€Å"the principles, norms, and standards of conduct governing an individual or organization. † I was influenced the way I determine different actions or behavior in a particular situation since I was a child. Growing up with a single Catholic mother made me value different things and behave in a particular way. In addition, this made me a have a particular ethical system that influences the way I work and act as an individual. At the corporation level, ethics is important because they set the rules and regulations. In this paper, I will explain the developmental aspects of my ethics as well as my ethical system, the effects of my ethics at my workplace, and importance of ethics in an organization to achieve its goals. My ethical system was shaped since I was a child. Growing up with a catholic single mother, definitely influence the way I value the family. Also, some of my decisions are influenced by this catholic background, which I do not genuinely practice but follow to some extent. Other factors that shaped my ethics were my family, school, and personal events. My family always corrected me whenever I did something that they consider wrong, which could be something simple as taking a flower from my neighbor’s garden. My family saw this little example as stealing, but as I child I saw this as taking the flower for my mother. School taught me what was legally wrong or right. I learn that some people simply don’t care too much about the actions and consequences of their actions and act impulsively. When making decisions, my ethical system influences they way I act because tend to be bias by what my mom, my family, school, or personal events taught me. Time has taught me to value the importance of learning form other mistakes and advices. This had leaded me to draw conclusions from specific examples. For example, when considering any issue, I usually use inductive reasoning and go from the very specific problem to the general conclusion. At the workplace, my ethical system influences the way I behave and perform in a positive and negative way. Based on the nature of the work, my ethical system at the workplace tends to be a combination of duty-based and goal-based. Duty-based is an â€Å"a moral obligation or commitment to act in a certain manner. For example, I work for the United States Postal Service and I am commitment to my work, which includes several tasks determined by the Postal Service rules and regulations. If I fail with one of this laws or rules I could be on probation or lose my job. Therefore, it is important that I obey those rules. In addition, all this tends to be influenced by the actual goal of the company and my personal goal. The company goal is to complete my assigned tasks in a timely manner, which is to deliver the mail. My personal goal is to produce money to sustain my family and pay my expenses. This personal goal drives me to be ethical and the do the right thing at my workplace because I do not want to put in jeopardy my job. This puts into play my personal family values. Therefore, my ethical system could be considered individualistic and very very competitive, which could impact my workplace in a negative way. On the other hand, this could turn out to be very positive because I am very reliable and undependable at work. Business ethics (2009) is defined as â€Å"moral principles defining how businesses and business professionals should act towards each other, employees, and the public. In other words, ethics are needed in an organization because they determine the company norms and principles for its employees and customers. To determine the company ethics its important because based on this, the company will be perceived nationally or internationally. Business ethics play such as important role today that the government forces companies to pay attention to corporate re sponsibility and business ethics. This norms, rules, and regulations also play an important role to achieve the company goals and direction. The effects of the application of these ethics influence consumers, employers, other businesses, and the society in a positive way. In order words, not only this company teaches other companies what is the right thing to do, but it also acts as an example for individuals who work there or purchase their items or services. In conclusion, ethics are rules, norms or regulations that influence the way people or corporation act. These influences could be either positive or negative and there is shape early in our lives or at the early stages of a corporation. In this paper, I explained that my personal ethics were shaped since I was a child. My ethics and values have changed based on personal events, religion, and family values. My ethical system influences the way I perform my job to achieve my personal goals. Based on these factors, ethics play an important role in corporations because companies are run by individuals who have their own ethical systems. In addition, ethics determine who the company is and how it is perceived in the society.