Saturday, August 31, 2019
African American and American Society Essay
African Americans No matter where or when a person lives, skin color, beliefs, class, or history he/she will see a difference in the way every ethnic group is treated. This world has never been fair for anyone. Life can treat a person with the greatest of care or it will treat a person as if he/she is lower than dirt. African Americans are no different. They have faced great hardships and triumphs throughout the years. Since they had been forced from their homeland they have been treated as if they had no rights or thoughts of their own. They were placed in the status of slaves even though they were human beings too. No matter if they were placed in the minority group by the dominate majority group of white Americans they remind structurally pluralism by keeping to their beliefs and traditions. Before and after slavery African Americans did not receive equal treatment. ââ¬Å"Even when slavery ended, Jim Crow laws went into effect meaning that the very best of everything was reserved for whiteââ¬â¢s only-school, jobs, neighborhoods, hospitals, etc. â⬠(Moore, 2008). In other words, the African Americans took the subordinate status to the dominant white Americans. Their race was used to dictate what rights they would be allowed to have in America. At one point, they did not have the right to be free and over the years they were given that right back. Even though they regained their right to be free, they still were not very free. They were only allowed to eat in certain places, drink from certain fountains, and ride in the back of the bus. This is not what would be called very free. They were not even given the opportunities to receive a quality education or to vote. ââ¬Å"With the 1896 Supreme Court decision in the case of Plessy v. Ferguson, the separate by equal doctrine was upheld, and the system of segregation in the South was securely in placeâ⬠(Merger, 2012, pg. 169). When it came to getting a quality education, they were placed at the bottom of the totem pole. The whites receive the best opportunities for receiving a quality education while the African Americans were not. It was not until the Brown v. Board of Education of Topeka case that African Americans were allowed a better education. ââ¬Å"Separate schools were inherently unequal and imposed an inferior status on black children, causing irreparable psychological changeâ⬠(Merger, 2012, pg. 173). The rights as citizens were also being denied by not allowing them to vote and make a proper living to take care of theirfamilies. Years ago, African Americans were not allowed to vote, so they had no say in the laws that were made that would deny them their rights as American citizens or human beings. This kept them from changing the laws that kept them from achieving economically and politically. The Civil Right Movement began a new era for African American. It was their gain of the right to vote and be elected to office that gave the some power over their rights as human beings and citizen in the economic and political environment. Even after everything that the African Americans have gone through, they still face prejudice and discrimination in all areas of their lives. It is no wonder that for some it feels as if it is never over. No matter what a person looks like, how he/she talks, their beliefs, where he/she lives, how much money he/she has, or what race he/she may come from we all bleed red and where cut from the same cloth. We all deserve to have the opportunities and resources that are out there to help better ourselves. African Americans are human beings too and they have the same rights as everyone else.
Friday, August 30, 2019
Coeducation in Pakistan
Coeducation is to educate both boys and girls together. in the modern world of today,coeducation is the new order of the day. most of the countries in the world have adopted this form of education. in Pakistan too, there are some schools where there is coeducation whereas, in many institutes there is sex-segregation. coeducation finds its origin in Sparta,Greece. at that time,there was no distinction between boys and girls. they studied and played together. they were given academic education along with physical training.Plato,the great philosopher theorized that coeducation was essential for the development of personality. he believed that coeducation was the only way to make boys and girls beneficial to the society. therefore,west has acknowledged and adopted the benefits of coeducation since long ago. In the subcontinent, during ancient times,coeducation was present at a few places. but,gradually girls education begin to be ignored. the educational system of that time was quite dif ferent from that of today. boys were sent to gurukuls where they spent most of their educational period.They were imparted physical and academic education. the former included warfare training while,the latter comprised of study of scriptures. in medieval india, women and people belonging to lower caste were forbidden from reading the scriptures. However,raja ramohan roy,the great social reformer revolted against this practice. his succesors also played a pivotal role in revolting against the illiterate practices. Islam has stressed upon the importance of education. infact, the first word revealed was ââ¬Å"iqraâ⬠translated asâ⬠to readâ⬠. Islam has ordained both men and women to acquire education.Holy prophet P. B. U. H said ââ¬Å"acquire education from cradle to graveâ⬠. similarly,islam also acknowledges that an illiterate and an educated man can never be equal. During the time of Holy Prophet(P. B. U. H),mosques were the only educational institutions. there are no instances recorded where holy prophet P. B. U. H forbade his wives from attending semon(khutba),the primary tool of education. Apart from this ,there are many examples which illustrate that muslim women accompanied there men to mosques and even inquired questions from Holy prophet in the presence of men.Even today,many liberal muslims acknowledge that morality emanates from heart. Quran, time and again, has emphasized muslims to guard themselves against immorality. it says ââ¬Å"say to the believing men to lower their gaze and to guard their private partsâ⬠¦. â⬠. many Islamic scholars acknowledge the fact that islam has not barred both the sexes from acquiring education together as long as morality is not infringed. Coeducation, in Pakistan has always remained a controversial issue. some people want this system to be adopted in all the institutions on the other hand, there is a sizeable portion of population that is opposed to it.Both the schools of thought present argument supporting their stance. proponents of coeducation argue that it is the need of hour and that it has the ability to eliminate the problems of the developing country. nonetheless,the opponents dare to disagree. to them,the system does not confirms to the religious, social and cultural values of the society. Coeducation has the ability to cope with the problems of developing countries. for instance,Pakistan is a developing country. it will be difficult for a developing economy to maintain separate instituitions for both sexes.if coeducation system is introduced in all the schools and colleges of the state, then the cost of separate infrastructure, stationary and recruitment personnel can be saved. A country can develop only by increasing the rate of literacy. unfortunately, for developing countries, there is a dearth of well trained teachers. if both girls and boys are taught together in the same class, at the same time then this issue can also be resolved. In coeducation, b oys and girls get the opportunity to intermingle and to understand each other. by studying together, they will develop mutual respect and understanding.Professor simon said ââ¬Å" the only reason to support coeducation is that without it, boys and girls will not be knowing about each other for many yearsâ⬠. In a coeducational instite, boys and girls interact with each other freely. they become broadminded and overcome their shyness. There is no hard and fast rule that if girls will always intereact with girls and boys with boys when they grow up . therefore coeducation will boost their confidence level, which will be beneficial in their future life. such individuals will be more comfortable interacting with opposite sex be it at professional or personal level.Coeducation will provide both sexes an opportunity to learn to cooperate with each other. they will be working together in assignments and projects which will help them to understand the way opposite sex works. this will help them in their respective role taking when they enter practical lives. this cooperation will create a feeling a comradeship in both the sexes. Proponents of coeducation argue that such an educational system will be useful for their personality development. in a coeducation,boys will be free to intereact with girls.Doing so, will help them to understand opposite sexing a better way and allow them to develop a healthy personality.. they will,then not indulge in eve teasing. the students of today will be the citizens of tomorrow. it is the demand of today,to allow individuals to grow in a free atmosphere. In addition, coeducation will allow both the sexes to treat each other on equal terms. girls will become more confident and responsive and the boys will develop more tolerance. the relationship between them will be based on equality,respect and humanity. this will help them to overcome the centuries old system of male dominance.Researchers argue that coeducation has proved to be a better educational system as in such colleges,the results of exams are far better than in sex segregated schools. in coeducation, boys and girls compete with each other and try to remain ahead of the other one. this results in better academic results. A research conducted concluded that presence of girls in class prevents boys from indulging in unruly behavior. it also helps in fostering stronger bondage between teachers and students. generally, in coeducational classes, the number of violent outbursts are fewer. Presence of more than 55% girls in class room has shown better exam results.Particularly, at primary level,coeducation has shown exceptional results. Boys and girls in presence of each other become more conscious of their habits, style and appearance. they abstain from exhibiting immoral behaviour. they try their best to please the opposite sex by showing best behaviour. these habits become a part of the personality. Women of today are entering every profession in large nu mber. they are heading big organizations. They face similar challenges as boys while finding jobs or in professional life. therefore,it is imperative that they should be given education on similar grounds as boys.Although,it is a fact that both boys and girls have different ways of learning,but still it is observed that their joint education has a positive influence overall. Infact, the supporters of coeducation speak of its benefits as if itââ¬â¢s the only road to heaven. Every coin has two sides. An impartial eye should focus on both the silvery sides rather than adopting a biased attitude. The opponents of coeducation believe that in coeducation, boys and girls are exposed to each other. the temptation of flirting appears more attractive than the urge to open books.It also destroys the relationship between teacher and student as temptation cannot differentiate between teacher or student. People against coeducation state that it is not the panacea to the problems of developing countries,in reality it will sprout more problems. Anyone who has attended even a few schools and colleges in Pakistan knows the fact that they are frightfully overcrowded. even girls only institutes present a similar picture. therefore, new institutions are needed and if a few are reserved for girls and boys separately,it will not be an additional burden on the economy.Perhaps, the greatest harm that coeducation can cause is to lead to moral depravity. in coeducation, boys are girls are free to interact with each other. curiousity plays its role well in this regard. the immoral standards promoted by media fill up the gap created from the germs of curiousity implanted by satan. this coupled with the fact, that the students are deprived of sincere supervision, as the teachers themselves do not present an ideal picture of morality and decency. As a result, they fall victim to sexual impurity. Religious conservatives argue that coeducation will wreak havoc to the Islamic values.As boys and girls will be easily accessible to each other, this will promote development of immoral relations between them. they support their view by stating that during the time of Holy Prophet(P. B. U. H) educational instituitions were mosques where, though coeducation was present,but the chances of going astray were limited. they further emphasise that the present coeducational system are not at conformity with the Islamic approach to coeducational system. Supporters of coeducation believe that this system will promote understanding between both sexes.However, the opponents say that if boys and girls cannot understand each other in family and home then they will not be able to do so in coeducation. why is it that a person thinks he can understand the opposite sex only when he meets his neighbourââ¬â¢s daughter? Further, it is believed that coeducation is a western concept. many people want to adopt coeducation because it is prevalent in west. they think that if west has it then they must have it too. They want to be more western than the west. but,they should bear it in mind that a system should be adopted only if it goes along with cultural,social and religious values of a society.Certainly,our society does not accepts the present coeducational system. Antagonists of coeducation assert that it is an urban concept. boys will grow up to earn while girls will maintain their household. they emphasize that as both sexes will play a different role, there is no logic in teaching them similar curricula in a similar manner. Even teachers of some subjects such as biology hold opinion that it is easier to teach certain chapters more thoroughly in presence of only girls or boys in the class room. They find teaching certain topics embarrassing and difficult in coeducation.Nowadays, sex education is becoming a part of the curricular. this further acts as fuel on fire. Certain educationists believe that students do not remain focused in studies in the presence of opposite s ex. they remain more engaged in paying attention to opposite sex, than on lectures. Therefore,it is feared that coeducation will not raise the standard of education,instead will lower it. In coeducation institutions, boys and girls are more consumed by how they appear to the opposite sex. they spent countless hours contemplating what to wear, how to wear and where to wear.This leads to the loss of precious time which should have been dedicated to studies only. The only solution that springs to mind in view of Islamic injunctions and logic of common sense is that there should be sex segregated institutions. however, if a developing country like Pakistan is not able to do so in current situation then it is the responsibility of government to take measures to ensure that coeducation does not attacks the moral values preached by islam. Firstly, the curricula chosen should be such that does not risks morality.Secondly,government should be careful in choosing faculty. the teachers recruit ed should be an embodiment of decency and morality. meanwhile, the religiou conservatives should adopt an attitude of tolerance. Nonetheless,it is also important that some girl doctors should be educated in coeducation otherwise,our mothers and sisters will have compelled to expose their private parts before male doctors under ailment. but still,it is the responsibility of the government to ensure sex segregated educational instituitions whenever,it can bear the expenses.
Thursday, August 29, 2019
Global Education Workshop Essay Example | Topics and Well Written Essays - 750 words
Global Education Workshop - Essay Example Audience of the Project: The main audience of this project would be the educators, the school leaders and the community members who need to be educated about the importance of global education in the area. And the secondary audience of the global education workshop would be the school children who would be given the briefing about the importance of global education in their school environment to become a responsible global citizen. Global Education Model for Workshop: The model for global education workshop would be based on developing the understanding of values, attitudes, skills and knowledge within the group of educators, teachers, school leaders and the community members on how they can be a responsible citizens and how they can develop their own understanding about the developmental, political, humanitarian and societal issues in addressing the problems of their communities. The workshop would long for 9 hours for just a day. The workshop should work on the following guidelines : 1- Clarification of the goals and objectives such as what kind of message is centered for the audience at the end of the workshop? What are the major goals behind conducting the workshop? The strategy and the action plan according to which it is being organized. 2- Involvement of the primary audience and the partnering organization. It is important to target audience from different communities and cultural backgrounds and each one should be assigned with a specific task according to their role. It is equally important to understand that how each one of them fulfills the assigned role and responsibility. 3- Action Plan includes that how the organizers can develop relationship between the content and the audience to increase their involvement according to their... The model for global education workshop would be based on developing the understanding of values, attitudes, skills and knowledge within the group of educators, teachers, school leaders and the community members on how they can be a responsible citizens and how they can develop their own understanding about the developmental, political, humanitarian and societal issues in addressing the problems of their communities. The workshop would long for 9 hours for just a day. The workshop should work on the following guidelines:The model for global education workshop would be based on developing the understanding of values, attitudes, skills and knowledge within the group of educators, teachers, school leaders and the community members on how they can be a responsible citizens and how they can develop their own understanding about the developmental, political, humanitarian and societal issues in addressing the problems of their communities. The workshop would long for 9 hours for just a day. The workshop should work on the following guidelines:1- Clarification of the goals and objectives such as what kind of message is centered for the audience at the end of the workshop? What are the major goals behind conducting the workshop? The strategy and the action plan according to which it is being organized.2- Involvement of the primary audience and the partnering organization. It is important to target audience from different communities and cultural backgrounds and each one should be assigned with a specific task according to their role. It is equally important to understand that how each one of them fulfills the assigned role and responsibility.3- Action Plan includes that how the organizers can develop the relationship between the content and the audience to increase their involvement according to their environment and location.4- Timing, budget, and human resources also play an important role in structuring the model for global education workshop.5- Develop an activity o utcome chart for each action taught to the participants.Ã
Wednesday, August 28, 2019
A Report from a meeting on the 4see model Essay
A Report from a meeting on the 4see model - Essay Example Representatives present â⬠¢ Simon Roberts-Director Foresight Innovation and Incubation Group, Arup. â⬠¢ Nigel Goddard a Director in School of Informatics at the University of Edinburgh â⬠¢ Colin Axon - A Senior Researcher at School of Engineering and Design in Brunel University, Uxbridge, â⬠¢ Barney Foran - Institute of Land Water and Society, Charles Strut University â⬠¢ Benjamin Warr-Director of Environmental Services and Senior Environmental Scientist, GeoQuest Ltd, Modeling paradigm Mr. Goddard took the attendees through the modeling paradigm of the 4see model. He informed members that it differs from other macroeconomic modeling methods. It expresses constraints between components of the macro economy as equations which describe how they affect each other, and then uses iterative time-stepped simulation to evolve the model of the system forward in time. A key principle in 4see modeling is handling of distinctly different classes of flows. The full 4see- GB mo del of the UK economy includes ten distinct flows which are distinguished by having differing characteristics and being non-substitutable to each other in the short term. (Roberts) Modeling principles Mr. Goddard further went on to explain that the approach to creating the model follows a simple principle: that supply follows demand but is constrained in the short term by physical infrastructure or the inputs needed for output. There were concerns on the deterministic approach and corrective approach. Mr. Goddard went on to say that deterministic approach controls the need for inputs. Where as reconciliation between demands on the right and supply of the distinct separate flows is by the corrective approach. Finally, most of the final demand in the model is...The 4see model also identified process flows. The variables of major interest, such as flows of goods and services, were not modeled as stocks and flows in the system dynamics sense, but were assumed to be consumed in the same time-period in which they were produced - there is no modeling of inventory. In system dynamics terms, they we considered being auxiliary variables. The identified fixed capital stocks in the economy with the system dynamics stock concept. This was a reflection of the categorical difference in 4seemodels between fixed capital stocks and other types of stocks such as inventories.(Roberts).We presented a macro-economic modeling framework based on deterministic and corrective approaches that enabled us to reproduce the historical data with a small number of exogenous parameters. The model was grounded in standard national macroeconomic data that conformed to international conventions of data-holding and duration.
Tuesday, August 27, 2019
Army Family Essay Example | Topics and Well Written Essays - 750 words
Army Family - Essay Example I realized what color I was, but that really didnââ¬â¢t seem to affect anything in the communities where I was growing up. Base housing was very diverse and I realized that there were surely more white kids than black kids. But I also noticed that there were more black kids than Hispanic kids and Asian kids as well. I had friends, close friends, of all colors, as did my parents. We went over to the Hispanic family next door for supper and they cam to us. Only they werenââ¬â¢t ever viewed as Hispanic. They were just the Ramirezââ¬â¢s. I do remember going to some parties when I was a kid and all of us were the same race. I do remember thinking, ââ¬Å"This is weird. Where are the Ramirezââ¬â¢s?â⬠I have no idea if these parties were planned so that everybody was the same race as my parents or not, but I sort of doubt it. So I guess what I am trying to say is, as a kid growing up in military housing, I never though about race at all, mine or anyone elseââ¬â¢s. When I arrived in North Carolina, I first became aware of race. For one thing, I noticed that people of the same color tended to stay together. There seemed to be a rule that said people of different colors didnââ¬â¢t mix. I noticed it right away and asked my mother about it. She simply said that things are different everywhere and that in North Carolina, thatââ¬â¢s just the way it was. ... and Asian kids apparently just had to figure out something else to do than have friends because there werenââ¬â¢t many of them on base at that time in North Carolina. I can honestly say I didnââ¬â¢t try to challenge the rule in any way. When you are new to a base, the kids that approach you first are the kids that become your friends. When only kids of your same race approach you, well then that is the friends you have. I remember thinking it was weird at first, and then after a year it was perfectly normal. The second lesson about race I learned was that some races are better than others at certain things. Black kids can run fast and dance best. They listen to rap music and play basketball. White kids are smartest and are better at sports like baseball. Hispanic kids play soccer and have lots of sisters and brothers. For the first time, I was introduced to racial stereotypes and this I struggled with. I didnââ¬â¢t fit into the definition of any of these races. I was smart, awesome at basketball and had five brothers and sisters. I could have been white, black or Hispanic. But for the first time, I felt like I had to downplay an aspect of who I was because I had to conform to somebody elseââ¬â¢s notion of what I ought to be based on my race. The final thing I learned about race in North Carolina is that people of different races had nasty names for each other. It was in North Carolina that I heard racial epithets, from all races, for the first time. Perhaps I was incredibly sheltered growing up. I can say that I wouldnââ¬â¢t trade it for anything. I feel as though I still have a lot of that pre-North Carolina person in me. I still see color, not race. I have a more nuanced understanding of what race means in a societal context, but the reality is I still am largely unaware of
Monday, August 26, 2019
Legitimate authority Essay Example | Topics and Well Written Essays - 500 words
Legitimate authority - Essay Example The author talks about principles and students and so on ââ¬Å"acceptingâ⬠the rules of schools, and entering an ââ¬Å"agreementâ⬠with schools and other institutions. The words ââ¬Å"acceptâ⬠and ââ¬Å"agreementâ⬠both work under means the person, such as the student or the principle, has a choice whether they want to be part of the school or not, and that by choosing to do so they agree that all authority above them is legitimate. But students are often forced without their choice by law to attend schools until a certain age, and the school they attend is decided by the where they live or what their parents tell them to do rather than their own choice. So legitimate authority, as the author talks about it involving choice, cannot function for the students; if they need to ââ¬Å"acceptâ⬠and ââ¬Å"agreeâ⬠for authority to be legitimate, as the author says, they should be able to say that none of the authority above them is legitimate, because they did not accept or agree to it.This essay does not intend to say that the organization of teachers, administrators and so on are not legitimate forms of authority, but rather that choice to be part of an organization cannot be part of forming legitimate authority in school environments. This means that other structures have to stand to take their place, for instance, the ability to appeal decisions a student or parent questions because coercive forces work on subordinates in school relationships without them having a choice.
Sunday, August 25, 2019
Compare and contrast the theories of Karl Marx (the class motive) and Essay
Compare and contrast the theories of Karl Marx (the class motive) and John Stuart Mill (the happiness motive) with reference to the issue of oppression in moder - Essay Example hasized in both Marx, and Mill, but whereas Marx sees the political motives of the individual to be class-based rejection of capitalism, Mills sees the happiness of the individual as more important than political or social oppression. Each of these theorists have contributed towards twentieth century political influence, with both socialists and libertarians using these works as cornerstones of activism and individual beliefs. Marxââ¬â¢s supporters tend to believe in community support, with individual needs oppressed in favor of the society; Millââ¬â¢s theories are concerned with the right of pursuit of individual happiness, against the demands of a society for conformity and participation in accepted beliefs. Marxââ¬â¢s theory of the individual was heavily influenced by the work of Hegel, who was influential in turning the concentration of philosophers from institutions to the individual. Hegel saw society as the individual having subjective encounters ââ¬Å" With the Material Worldâ⬠(Schleuning, webpage). While Hegel sees the material world as essential to developing the individual; property and ownership are crucial. ââ¬ËOwnershipââ¬â¢ in this sense is not purchasing, but creation of material through work: creative self-expression. Marx sees the individual worker being divided from his former ownership of the items which he makes, affecting his consciousness (Ritts, 153). ââ¬Å"The class which has the means of material production at its disposal, has control at the same time over the means of mental productionâ⬠(Marx, page 191). This is the ââ¬Ëtyranny of the minorityââ¬â¢, or the smaller bourgeois class, over the much larger, working-class majority. Ritts sees this as Social Darwinism, with the fitness not suitability for survival, but personal fortune (Ritts, 153) The individual workerââ¬â¢s life inside an industrial society is, according to Marx, very precarious, and this is one of the causes of conflict between the individual and the bourgeois owners. Marxââ¬â¢s
Saturday, August 24, 2019
Media Essay Example | Topics and Well Written Essays - 750 words - 3
Media - Essay Example They target almost everyone. In the recent past, advertisers have tremendously shifted their focus to children. Eric Schlosserââ¬â¢s through his article tries to bring to our attention how today child advertising is in high note through the various tactics marketers and advertisers are using to get today children to always want and thus in that context demand for their products (Schlosser 356). Eric brings to our attention that advertisers know that if the children saw their advertisement and which are appealing to them, they will with no doubt nag their parent to get the products for them. Again, through the article, we find how advertisers have begun using catching songs and cartoon characters to attract children. Todayââ¬â¢s young generation have changed tremendously through media especially through advertisements, as observed by Eric Schlosserââ¬â¢s essay, today even products that young children at their tender age, who are not allowed to access some products such as cig arettes, companies are still coming with ways of developing unique advertisements that are aimed at targeting the children. These companies intelligently achieve this by changing the packaging around these products and go a step further to ensure that they develop iconic symbols on these products so that the children will recognize them even in future. This, they do putting in mind that even though the children will not necessarily access this at young age they will with no doubt remember them from the same advertisements they saw years ago when they were still young. Clearly it is with no doubt that that media has more negatives than positives effects on todayââ¬â¢s young people. As a matter of fact, it is in my opinion that media has a tremendously negatives effects on our young children (Johnson 2011). From the article ââ¬Å"Television: The Plug-In Drugâ⬠by Marie Winn, we find that today, the television has invaded most family both in known and unknown territories. This is characterized with wake up, go to school, watch television and thereafter retire to bed and this is the pattern in many families today. Almost every family today has a television set on their household and this has led many families dynamic to suffer. Watching television has clearly become the norm in almost every family today and this is leading to loss of touch such the quality of sharing a meal together, going out on holiday and vacations (Winn 457). Television has unknowingly eliminated most of the individuality enjoyed aspect of families and has in turn managed to create a boring uniformity, which is experienced with all families that watches the television. Television also affects how todayââ¬â¢s children communicate with other people in the society, itââ¬â¢s evident that a child who spend his/her all day indoors watching television will have difficulties in maintaining eye conducts, and even of great concern failure to maintain conversations and even trust the same people in the society. I strongly believe that in todayââ¬â¢s world the media is changing our young people, the family as a whole and even culture and more so education. As observed from Marie Winnââ¬â¢s article, television is invading many families; it is interfering with our todayââ¬â¢s culture and eroding most of the familyââ¬â¢s rituals in a faster way. Today television denies the families an opportunity to share their daily experiences and in return build their
Applicability of Multiculturalism or Melting Pot Theory Essay
Applicability of Multiculturalism or Melting Pot Theory - Essay Example As such, he identifies himself more with Chinese cultural orientation than that of being either a Mexican or an America. The concept of culture has evolved through time. It was initially viewed as an intriguing complex sociological framework since it reflects the elaborate interaction of values, attitudes, perceptions and behavior displayed by a particular society. Eventually, culture emerged as a more multifarious and dynamic view that encompasses theories of diversity and multiculturalism. In the United States, a land of opportunities, sociologists and experts in cultural theories have separate contentions regarding applying the concept of multiculturalism or respecting the retention of distinct and diverse cultures. I hereby believe that multiculturalism is more beneficial for America rather than merging cultures exemplified in the melting pot theory. The concept of multiculturalism has existed for a long time as manifested by people who migrated to the U.S. and share more than one cultural orientations (Wong; Chavez; Saleem). Its historical existence is proof that multiculturalism in the United States is beneficial; otherwise, regulations would have been enacted to curtail this. According to Linda Chavez in her discourse entitled ââ¬Å"Demystifying Multiculturalismâ⬠, ââ¬Å"multiculturalism is not a grassroots movement. It was created, nurtured, and expanded through government policy. Without the expenditure of vast sums of public money, it would wither away and dieâ⬠(113). Chavez asserted that multiculturalism has long been practiced and validly supported by policy makers through encouraging people from different cultures to migrate. (My professor said this quote was used incorrectly, which means, this quote doesnââ¬â¢t fit in this paragraph.)Immigration policies in the United States have monitored and restric ted the number of people from different races who opt to reside in the country. There are regulations that assist in providing a balance in cultural forces that are seen to be beneficial in terms of contributions to economic, social, technological, and political growth. Chavez has asserted that multiculturalism encouraged educational institutions to focus on ââ¬Å"bilingual education and other multicultural servicesâ⬠(2). Therefore, there are forces that spur economic activities driven by the increasing number of people from various cultures. Multiculturalism is also more beneficial in terms of contributing to diversity. In contrast to the melting pot theory, through multiculturalism, traditional values and norms are preserved. From the video entitled The Great American Melting Pot, the Statue of Liberty was shown to hold a book of recipes that show the melting pot to be comprised of people from diverse nationalities. However, the video does not clearly indicate that these pe ople lose their cultural identities in the process (Schoolhouse Rock). Chavez indicated that ââ¬Å"a whole new industry of "diversity professionals" has emerged to help managers cope with the expected deluge of non-white workersâ⬠(1). Multiculturalism has created a demand for professionals to focus on training people to realize the benefits of employing diverse people in their workforce. Likewise, diversity has opened potentials for accommodating traditional values and learning to adapt to new ones. Tahir expressed her preference to practice the way of life in America, she still respected the tradition of pre-arranged marriage; where her parents would solicit potential suitors according to a predefined qualification. The suitors with most preferred qualifications would eventually be streamlined and would be the basis of selecting the favored husband. Likewise, Wong allegedly
Friday, August 23, 2019
Valley of Saints Movie Review Example | Topics and Well Written Essays - 500 words
Valley of Saints - Movie Review Example Movie reviewers have on various occasions assisted in guiding the audience to watch a movie or made the audience less interested especially when the reviewers discredits the plot and message of the film. Film Critic Roger Ebert ranks among the primary critics and the paper examines the review of Valley of Saints by Elbert and comparing it with that of the researcher. A focus on the critics by the researcher and Ebert is done on Valley of Saints movie. With Guzlar, Afzal and Asifa as the three main characters, Syeed purposively and successfully exposes the political situation and repercussions of India in Kashmir a poor Interior location. His background and experience plays a significant role in ensuring he delivers one of the best prose reflecting on bad politics and the consequences. As a result of poverty and war arising from political instability within the state of Kashmir, Guzlar with his friend Afzal who is more like a friend decides to free the city of Kashmir (Trigon-Film 2014). Although the two has love for their village as a result of friendly neighborhoods and the aspect of beauty possessed by the locals, the political tensions, and continuous wars force them to run away from home. Working as a boatman, Guzlar earns through crossing tourists across his lake Village Dal Lake.
Thursday, August 22, 2019
Macbeth Analysis Essay Example for Free
Macbeth Analysis Essay The extract before me is from Macbeth written by William Shakespeare in the year 1606. It is from Act 1 Sc 7. It takes place in a room at Macbeths castle at Inverness. The extract primarily deals with the ploys that Lady Macbeth uses to persuade her husband Macbeth to commit the crime of murdering King Duncan. Two important themes are bought out in this extract, one is about the creation of gender roles and stereotypes and the second one is about appearances often being deceptive. The extract begins with Macbeth telling Lady Macbeth We shall proceed no further in this business. This is obviously referring to something which has happened before in the scene. Macbeth has been contemplating the consequences of this murder. He conceives a very apocalyptic vision of how the angels of heaven are gonna be coming and spreading the news of this murder all across. The angels are gonna be pleading for Duncans virtues and the people are gonna be actually crying and there be like a flood of tears which will drown the Earth. So, he tells Lady Macbeth that he does not wish to do away with his golden reputation, he does not want to lose its gloss and therefore, he does not want to proceed with the bloody business as he calls it. Lady Macbeth is obviously very affected by this and she ends up trying to accuse Macbeth of being unmanly. She uses adjectives like pale, green. She compares him to the poor cat in the adage. She is trying to drive the wedge between him and his doing and his desire to achieve the throne and his lack of action. Now, Lady Macbeth says, what beast was it then that made you break this enterprise to me. This is a reference to Act 1, Sc 5 because in Act 1 Sc 5, Macbeth tells Lady Macbeth about the prophecies that the witches had made and how he is supposed to become the King of Scotland after becoming the Thane of Cawdor. Now, Lady Macbeth is just wedging upon those lines saying that when you dared to commit this to me, that is when you were a man and now if you are actually gonna commit the deed of murder, you are gonna commit the heinous crime of regicide, you will be even more the man. Lady Macbeth reasons out that the time and the place were not appropriate to kill Duncan at that time but now since he has come into our battlements, he is in our castle as our guest, we are supposed to kill him. Lady Macbeth is surprised that Macbeth is losing his resolve at this time. Lady Macbeth goes on to create a very grotesque image that shows that the milk of human kindness is actually not present in her. She says that she has suckled the baby at her breast and she knows how tender it is to love the babe that milks me and she says that if she had ever said that she had committed to anyone that I am going to be killing my child, she would have actually plucked his mouth out of her nipple and dashed his brains out against the wall. This is a very grotesque image produced by Lady Macbeth has produced. This makes it clear to us that Lady Macbeth has been dehumanised, defeminised in all ways. Thus, she has achieved her wish which she asked from the spirits. She is totally unwomanly and does not have any maternal instincts. She is actually a reminder of the character Medea from the play Medea written by Euripedes because Medea had self-decided to kill her own children. Now, we see that the scene has become progressively darker with Lady Macbeth creating images of death and Macbeth ends up contemplating the possible consequences if we should fail. We should see that there are several times when Macbeth and Lady Macbeth talk about each other as being one. They perpetually use we. Macbeth has never said that i am gonna fail at the murder. He says that we should fail. This shows that there is a sense of togetherness and they are partners not only in greatness but also in crime. So, Lady Macbeth immediately retaliates but then at this time there is a shift in tone. It becomes much more pragmatic because she divulges the plan of the murder to Macbeth. There is a metaphor used over here, its about stringed instruments, now just as you take the string and you create the appropriate tension by tying it to the right peg. Similarly, Lady Macbeth expects that Macbeth decides to be headstrong and resolute and decides to screw his courage to the sticking place. If he does so, they will certainly not fail. She goes on to discuss the plan of murder with Macbeth. She says that when Duncan will be asleep and in all probability, he is likely to sleep due to his long journey. The two sentinels outside his room are gonna be intoxicated by Lady Macbeth using wine, drugs. She will make sure that they are so drunk that they will lose thier memory which has been described as the warder of the brain. The receipt of reason will not be there. Reason will actually be distilled out of their brains. They will not be able to understand anything. They will actually behave like swine and sleeping in that manner. Lady Macbeth sees it as golden opportunity to perform the murder. She once again, as I said, talks about them being one. She says what cannot you and I perform upon the unguarded Duncan? when in fact the murder is going to be committed by Macbeth alone. Lady Macbeth is obviously very important partner in his crime. Now, Lady Macbeth further tells him that they are gonna be taking the daggers and staining the officers with the blood. She expects the officers to bear the guilt of our great quell. Now, the use of the word guilt over here is very important and it is also very ironic because it is not like they do not do away with thier guilt ever. In fact, they leave in torment of the very murder. Lady Macbeth in Act 5, Sc 1 in the sleep-walking soliloquy is a woman who has completely lost her senses. She is leaving under intense emotional pressure and she is the one who is not able to sleep anymore. So, it shows that they are actually guilty of the crime. Macbeth himself in Act 2 Sc 2 does not wish to even go back to the scene of the crime again. So, it shows that even though they are gonna be staining the sentinels with blood. In fact, both of them are gonna be living in horror of the deed. Now, Macbeth seems to be quite convinced and he asks Lady Macbeth to bring forward male children only because the undaunted mettle should compose nothing but males. Now, this is very significant because it is about the creation of the gender stereotypes. In the Shakespearean area, it was expected of men to be embodiment of valour, courage and ruthlessness to some extent and woman on the other hand were expected to be more submissive and incapable of coming up with wicked plans. However Lady Macbeth is an exception to this rule because she comes across as one who is so resolute and cold, so devoid of pity that this is something which should be there only in men. Macbeth once again questions his wife and asks her that if they are gonna marking the two sleepy sentinels with blood, would it not see that they have done it. Lady Macbeth says that while they will be hysterically crying and lamenting the death of Duncan, suspicion will never fall upon them. Macbeth finally capitulates to all its wifes persuasions and he seems to have bend up each corporal agent to this terrible feat. This is a very important line in the building up of the tragic hero because Macbeth is gonna be himself responsible for his fate. He has decided to put his heart and soul into committing so heinous a crime and he is indeed gonna be bearing indeed the consequences of it as we see later in the play. The scene ends with a couplete that rhymes which is typical of Shakespeare. It says that Away, and mock the time with fairest show: false face must hide what the false heart doth know. So, it recounts the theme that appearances are often deceptive. This theme has been running throughout the play. It all began with King Duncan in Act 1 Sc 2 when he wished that he would be able to recognise people by simply looking at their faces. It is also present in Act 1 Sc 5 when Lady Macbeth asks her husband to look like the innocent flower but be the serpent under it. This time Macbeth is the one who is actually telling his wife that she is suppose to be having composure, she is suppose to conceal her ulterior motives and her false face must hide the real intentions that she has. In conclusion, i can say that there is a big contrast between the characters of Macbeth and Lady Macbeth. Macbeth is the one who is contemplating the fear of failure. He says that we should fail, what would happen. He is no doubt ambitious but at the same time he also comes across as a rational being.
Wednesday, August 21, 2019
Computers Insiders Threat
Computers Insiders Threat While attacks on computers by outside intruders are more publicized, attacks perpetrated by insiders are very common and often more damaging. Insiders represent the greatest threat to computer security because they understand their organizations business and how their computer systems work. They have both the confidentiality and access to perform these attacks. An inside attacker will have a higher probability of successfully breaking into the system and extracting critical information. The insiders also represent the greatest challenge to securing the company network because they are authorized a level of access to the file system and granted a degree of trust. A system administrator angered by his diminished role in a thriving defense manufacturing firm whose computer network he alone had developed and managed, centralized the software that supported the companys manufacturing processes on a single server, and then intimidated a coworker into giving him the only backup tapes for that software. Following the system administrators termination for inappropriate and abusive treatment of his coworkers, a logic bomb previously planted by the insider detonated, deleting the only remaining copy of the critical software from the companys server. The company estimated the cost of damage in excess of $10 million, which led to the layoff of some 80 employees. An application developer, who lost his IT sector job as a result of company downsizing, expressed his displeasure at being laid off just prior to the Christmas holidays by launching a systematic attack on his former employers computer network. Three weeks following his termination, the insider used the username and password of one of his former coworkers to gain remote access to the network and modify several of the companys web pages, changing text and inserting pornographic images. He also sent each of the companys customers an email message advising that the website had been hacked. Each email message also contained that customers usernames and passwords for the website. An investigation was initiated, but it failed to identify the insider as the perpetrator. A month and a half later, he again remotely accessed the network, executed a script to reset all network passwords and changed 4,000 pricing records to reflect bogus information. This former employee ultimately was identified as the perpetrator and prosecuted. He was sentenced to serve five months in prison and two years on supervised probation, and ordered to pay $48,600 restitution to his former employer. A city government employee who was passed over for promotion to finance director retaliated by deleting files from his and a coworkers computers the day before the new finance director took office. An investigation identified the disgruntled employee as the perpetrator of the incident. City government officials disagreed with the primary police detective on the case as to whether all of the deleted files were recovered. No criminal charges were filed, and, under an agreement with city officials, the employee was allowed to resign. These incidents of sabotage were all committed by ââ¬Å"insiders:â⬠individuals who were, or previously had been, authorized to use the information systems they eventually employed to perpetrate harm. Insiders pose a substantial threat by virtue of their knowledge of, and access to, employer systems and/or databases. Keeney, M., et al (2005) The Nature of Security Threats The greatest threat to computer systems and information comes from humans, through actions that are either malicious or ignorant 3 . Attackers, trying to do harm, exploit vulnerabilities in a system or security policy employing various methods and tools to achieve their aims. Attackers usually have a motive to disrupt normal business operations or to steal information. The above diagram is depicts the types of security threats that exist. The diagram depicts the all threats to the computer systems but main emphasis will be on malicious ââ¬Å"insidersâ⬠. The greatest threat of attacks against computer systems are from ââ¬Å"insidersâ⬠who know the codes and security measures that are in place 45. With very specific objectives, an insider attack can affect all components of security. As employees with legitimate access to systems, they are familiar with an organizations computer systems and applications. They are likely to know what actions cause the most damage and how to get away with it undetected. Considered members of the family, they are often above suspicion and the last to be considered when systems malfunction or fail. Disgruntled employees create mischief and sabotage against systems. Organizational downsizing in both public and private sectors has created a group of individuals with significant knowledge and capabilities for ma licious activities 6 and revenge. Contract professionals and foreign nationals either brought into the U.S. on work visas to meet labor shortages or from offshore outsourcing projects are also included in this category of knowledgeable insiders. Common Insider Threat Common cases of computer-related employee sabotage include: changing data; deleting data; destroying data or programs with logic bombs; crashing systems; holding data hostage; destroying hardware or facilities; entering data incorrectly, exposing sensitive and embarrassing proprietary data to public view such as the salaries of top executives. Insiders can plant viruses, Trojan horses or worms, browse through file systems or program malicious code with little chance of detection and with almost total impunity. A 1998 FBI Survey 7 investigating computer crime found that of the 520 companies consulted, 64% had reported security breaches for a total quantifiable financial loss of $136 millions. (See chart) The survey also found that the largest number of breaches were by unauthorized insider access and concluded that these figures were very conservative as most companies were unaware of malicious activities or reluctant to report breaches for fear of negative press. The survey reported that the average cost of an attack by an outsider (hacker) at $56,000, while the average insider attack cost a company in excess $2.7 million. It found that hidden costs associated with the loss in staff hours, legal liability, loss of proprietary information, decrease in productivity and the potential loss of credibility were impossible to quantify accurately. Employees who have caused damage have used their knowledge and access to information resources for a range of motives, including greed, revenge for perceived grievances, ego gratification, resolution of personal or professional problems, to protect or advance their careers, to challenge their skill, express anger, impress others, or some combination of these concerns. Insider Characteristics The majority of the insiders were former employees. â⬠¢ At the time of the incident, 59% of the insiders were former employees or contractors of the affected organizations and 41% were current employees or contractors. â⬠¢ The former employees or contractors left their positions for a variety of reasons. These included the insiders being fired (48%), resigning (38%), and being laid off (7%). Most insiders were either previously or currently employed full-time in a technical position within the organization. â⬠¢ Most of the insiders (77%) were full-time employees of the affected organizations, either before or during the incidents. Eight percent of the insiders worked part-time, and an additional 8% had been hired as contractors or consultants. Two (4%) of the insiders worked as temporary employees, and one (2%) was hired as a subcontractor. â⬠¢ Eighty-six percent of the insiders were employed in technical positions, which included system administrators (38%), programmers (21%), engineers (14%), and IT specialists (14%). Of the insiders not holding technical positions, 10% were employed in a professional position, which included, among others, insiders employed as editors, managers, and auditors. An additional two insiders (4%) worked in service positions, both of whom worked as customer service representatives. Insiders were demographically varied with regard to age, racial and ethnic background, gender, and marital status. The insiders ranged in age from 17 to 60 years (mean age = 32 years)17 and represented a variety of racial and ethnic backgrounds. Ninety-six percent of the insiders were male. Forty-nine percent of the insiders were married at the time of the incident, while 45% were single, having never married, and 4% were divorced. Just under one-third of the insiders had an arrest history. Thirty percent of the insiders had been arrested previously, including arrests for violent offenses (18%), alcohol or drug related offenses (11%), and nonfinancial/ fraud related theft offenses (11%). Organization Characteristics The incidents affected organizations in the following critical infrastructure sectors: â⬠¢ banking and finance (8%) â⬠¢ continuity of government (16%) â⬠¢ defense industrial base (2%) â⬠¢ food (4%) â⬠¢ information and telecommunications (63%) â⬠¢ postal and shipping (2%) â⬠¢ public health (4%) In all, 82% of the affected organizations were in private industry, while 16% were government entities. Sixty-three percent of the organizations engaged in domestic activity only, 2% engaged in international activity only, and 35% engaged in activity both domestically and internationally. What motivate insiders? Internal attackers attempt to break into computer networks for many reasons. The subject has been fruitfully studied and internal attackers are used to be motivated with the following reasons [BSB03]: â⬠¢ Challenge Many internal attackers initially attempt to break into networks for the challenge. A challenge combines strategic and tactical thinking, patience, and mental strength. However, internal attackers motivated by the challenge of breaking into networks often do not often think about their actions as criminal. For example, an internal attack can be the challenge to break into the mail server in order to get access to different emails of any employee. â⬠¢ Revenge Internal attackers motivated by revenge have often ill feelings toward employees of the same company. These attackers can be particularly dangerous, because they generally focus on a single target, and they generally have patience. In the case of revenge, attackers can also be former employees that feel that they have been wrongfully fired. For example, a former employee may be motivated to launch an attack to the company in order to cause financial losses. â⬠¢ Espionage Internal attackers motivated by espionage, steal confidential information for a third party. In general, two types of espionage exists: Industrial espionage Industrial espionage means that a company may pay its own employees in order to break into the networks of its competitors or business partners. The company may also hire someone else to do this. International espionage International espionage means that attackers work for governments and steal confidential information for other governments. Definitions of insider threat 1) The definition of insider threat should encompass two main threat actor categories and five general categories of activities. The first actor category, the ââ¬Å"true insider,â⬠is defined as any entity (person, system, or code) authorized by command and control elements to access network, system, or data. The second actor category, the ââ¬Å"pseudo-insider,â⬠is someone who, by policy, is not authorized the accesses, roles, and/or permissions they currently have but may have gotten them inadvertently or through malicious activities. The activities of both fall into five general categories: exceeds given network, system or data permissions; conducts malicious activity against or across the network, system or data; provided unapproved access to the network, system or data; circumvents security controls or exploits security weaknesses to exceed authorized permitted activity or disguise identify; or non-maliciously or unintentionally damages resources (network, system or data) by destruction, corruption, denial of access, or disclosure. (Presented at the University of Louisville Cyber Securitys Day, October 2006) 2) Insiders ââ¬â employees, contractors, consultants, and vendors ââ¬â pose as great a threat to an organizations security posture as outsiders, including hackers. Few organizations have implemented the policies, procedures, tools, or strategies to effectively address their insider threats. An insider threat assessment is a recommended first step for many organizations, followed by policy review, and employee awareness training. (Insider Threat Management Presented by infoLock Technologies) 3)Employees are an organizations most important asset. Unfortunately, they also present the greatest security risks. Working and communicating remotely, storing sensitive data on portable devices such as laptops, PDAs, thumb drives, and even iPods employees have extended the security perimeter beyond safe limits. While convenient access to data is required for operational efficiency, the actions of trusted insiders not just employees, but consultants, contactors, vendors, and partners must be actively managed, audited, and monitored in order to protect sensitive data. (Presented by infoLock Technologies) 4) The diversity of cyber threat has grown over time from network-level attacks and password cracking to include newer classes such as insider attacks, email worms and social engineering, which are currently recognized as serious security problems. However, attack modeling and threat analysis tools have not evolved at the same rate. Known formal models such as attack graphs perform action-centric vulnerability modeling and analysis. All possible atomic user actions are represented as states, and sequences which lead to the violation of a specie safety property are extracted to indicate possible exploits. (Ramkumar Chinchani, Anusha Iyer, Hung Ngo, Shambhu Upadhyaya) 5) The Insider Threat Study, conducted by the U.S. Secret Service and Carnegie Mellon Universitys Software Engineering Institute CERT Program, analyzed insider cyber crimes across U.S. critical infrastructure sectors. The study indicates that management decisions related to organizational and employee performance sometimes yield unintended consequences magnifying risk of insider attack. Lack of tools for understanding insider threat, analyzing risk mitigation alternatives, and communicating results exacerbates the problem. (Dawn M. Cappelli, Akash G. Desai) 6) The insider threat or insider problem is cited as the most serious security problem in many studies. It is also considered the most difficult problem to deal with, because an insider has information and capabilities not known to other, external attackers. But the studies rarely define what the insider threat is, or define it nebulously. The difficulty in handling the insider threat is reasonable under those circumstances; if one cannot define a problem precisely, how can one approach a solution, let alone know when the problem is solved? (Matt Bishop 2005) Five common insider threat Exploiting information via remote access software A considerable amount of insider abuse is performed offsite via remote access software such as Terminal Services, Citrix and GoToMyPC. Simply put, users are less likely to be caught stealing sensitive information when they can it do offsite. Also, inadequately protected remote computers may turn up in the hands of a third-party if the computer is left unattended, lost or stolen. 2.) Sending out information via e-mail and instant messaging Sensitive information can simply be included in or attached to an e-mail or IM. Although this is a serious threat, its also one of the easiest to eliminate. 3.) Sharing sensitive files on P2P networks Whether or not you allow peer-to-peer file sharing software such as Kazaa or IM on your network, odds are its there and waiting to be abused. The inanimate software in and of itself is not the problem its how its used that causes trouble. All it takes is a simple misconfiguration to serve up your networks local and network drives to the world. 4.) Careless use of wireless networks Perhaps the most unintentional insider threat is that of insecure wireless network usage. Whether its at a coffee shop, airport or hotel, unsecured airwaves can easily put sensitive information in jeopardy. All it takes is a peek into e-mail communications or file transfers for valuable data to be stolen. Wi-Fi networks are most susceptible to these attacks, but dont overlook Bluetooth on smartphones and PDAs. Also, if you have WLANs inside your organization, employees could use it to exploit the network after hours. 5.) Posting information to discussion boards and blogs Quite often users post support requests, blogs or other work-related messages on the Internet. Whether intentional or not, this can include sensitive information and file attachments that put your organization at risk. Views of different authors about insider threat 1) Although insiders in this report tended to be former technical employees, there is no demographic ââ¬Å"profileâ⬠of a malicious insider. Ages of perpetrators ranged from late teens to retirement. Both men and women were malicious insiders. Their positions included programmers, graphic artists, system and network administrators, managers, and executives. They were currently employed and recently terminated employees, contractors, and temporary employees. As such, security awareness training needs to encourage employees to identify malicious insiders by behavior, not by stereotypical characteristics. For example, behaviors that should be a source of concern include making threats against the organization, bragging about the damage one could do to the organization, or discussing plans to work against the organization. Also of concern are attempts to gain other employees passwords and to fraudulently obtain access through trickery or exploitation of a trusted relationship. Insiders can be stopped, but stopping them is a complex problem. Insider attacks can only be prevented through a layered defense strategy consisting of policies, procedures, and technical controls. Therefore, management must pay close attention to many aspects of its organization, including its business policies and procedures, organizational culture, and technical environment. Organizations must look beyond information technology to the organizations overall business processes and the interplay between those processes and the technologies used. (Michelle Keeney, J.D., Ph.D. atal 2005) 2) While attacks on computers by outside intruders are more publicized, attacks perpetrated by insiders are very common and often more damaging. Insiders represent the greatest threat to computer security because they understand their organizations business and how their computer systems work. They have both the confidentiality and access to perform these attacks. An inside attacker will have a higher probability of successfully breaking into the system and extracting critical information. The insiders also represent the greatest challenge to securing the company network because they are authorized a level of access to the file system and granted a degree of trust. (Nam Nguyen and Peter Reiher, Geoffrey H. Kuenning) 3) Geographically distributed information systems achieve high availability that is crucial to their usefulness by replicating their state. Providing instant access at time of need regardless of current network connectivity requires the state to be replicated in every geographical site so that it is locally available. As network environments become increasingly hostile, we have to assume that part of the distributed information system will be compromised at some point. The problem of maintaining a replicated state in such a system is magnified when insider (or Byzantine) attacks are taken into account. (Yair Amir Cristina Nita-Rotaru) 4) In 2006, over 60% of information security breaches were attributable to insider behavior, yet more than 80% of corporate IT security budgets were spent on securing perimeter defenses against outside attack. Protecting against insider threats means managing policy, process, technology, and most importantly, people. Protecting against insider threats means managing policy, process, technology, and most importantly, people.The Insider Threat Assessment security awareness training, infrastructure reconfiguration, or third party solutions, you can take comfort in knowing that you have made the right choice to improve your security posture, and you will achieve your expected Return on Security Investment. (Presented by infoLock Technologies) 5) The threat of attack from insiders is real and substantial. The 2004 ECrime Watch Survey TM conducted by the United States Secret Service, CERT à ® Coordination Center (CERT/CC), and CSO Magazine, 1 found that in cases where respondents could identify the perpetrator of an electronic crime, 29 percent were committed by insiders. The impact from insider attacks can be devastating. One complex case of financial fraud committed by an insider in a financial institution resulted in losses of over $600 million. 2 Another case involving a logic bomb written by a technical employee working for a defense contractor resulted in $10 million in losses and the layoff of 80 employees. (Dawn Cappelli, Andrew Moore, Timothy Shimeall,2005) 6) Insiders, by virtue of legitimate access to their organizations information, systems, and networks, pose a significant risk to employers. Employees experiencing financial problems have found it easy to use the systems they use at work everyday to commit fraud. Other employees, motivated by financial problems, greed, or the wish to impress a new employer, have stolen confidential data, proprietary information, or intellectual property from their employer. Lastly, technical employees, possibly the most dangerous because of their intimate knowledge of an organizations vulnerabilities, have used their technical ability to sabotage their employers system or network in revenge for some negative work-related event. (Dawn M. Cappelli, Akash G. Desai ,at al 2004) 7) The insider problem is considered the most difficult and critical problem in computer security. But studies that survey the seriousness of the problem, and research that analyzes the problem, rarely define the problem precisely. Implicit definitions vary in meaning. Different definitions imply different countermeasures, as well as different assumptions. (Matt Bishop 2005) Solution: User monitoring Insiders have two things that external attackers dont: privileged access and trust. This allows them to bypass preventative measures, access mission-critical assets, and conduct malicious acts all while flying under the radar unless a strong incident detection solution is in place. A number of variables motivate insiders, but the end result is that they can more easily perpetrate their crimes than an outsider who has limited access. Insiders can directly damage your business resulting in lost revenue, lost customers, reduced shareholder faith, a tarnished reputation, regulatory fines and legal fees. With such an expansive threat, organizations need an automated solution to help detect and analyze malicious insider activity. These are some points which could be helpful in monitoring and minimizing the insider threats: Detecting insider activity starts with an expanded log and event collection. Firewalls, routers and intrusion detection systems are important, but they are not enough. Organizations need to look deeper to include mission critical applications such as email applications, databases, operating systems, mainframes, access control solutions, physical security systems as well as identity and content management products. Correlation: identifying known types of suspicious and malicious behavior Anomaly detection: recognizing deviations from norms and baselines. Pattern discovery: uncovering seemingly unrelated events that show a pattern of suspicious activity From case management, event annotation and escalation to reporting, auditing and access to insider-relevant information, the technical solution must be in line with the organizations procedures. This will ensure that insiders are addressed consistently, efficiently and effectively regardless of who they are. Identify suspicious user activity patterns and identify anomalies. Visually track and create business-level reports on users activity. Automatically escalate the threat levels of suspicious and malicious individuals. Respond according to your specific and unique corporate governing guidelines. Early detection of insider activity based on early warning indicators of suspicious behavior, such as: Stale or terminated accounts Excessive file printing, unusual printing times and keywords printed Traffic to suspicious destinations Unauthorized peripheral device access Bypassing security controls Attempts to alter or delete system logs Installation of malicious software The Insider Threat Study? The global acceptance, business adoption and growth of the Internet, and of Internetworking technologies in general, in response to customer requests for online access to business information systems, has ushered in an extraordinary expansion of electronic business transactions. In moving from internal (closed) business systems to open systems, the risk of malicious attacks and fraudulent activity has increased enormously, thereby requiring high levels of information security. Prior to the requirement for online, open access, the information security budget of a typical company was less then their tea and coffee expenses. Securing cyberspace has become a national priority. In The National Strategy to Secure Cyberspace, the Presidents Critical Infrastructure Protection Board identified several critical infrastructure sectors10: banking and finance information and telecommunications transportation postal and shipping emergency services continuity of government public health Universities chemical industry, textile industry and hazardous materials agriculture defense industrial base The cases examined in the Insider Threat Study are incidents perpetrated by insiders (current or former employees or contractors) who intentionally exceeded or misused an authorized level of network, system, or data access in a manner that affected the security of the organizations data, systems, or daily business operations. Incidents included any compromise, manipulation of, unauthorized access to, exceeding authorized access to, tampering with, or disabling of any information system, network, or data. The cases examined also included any in which there was an unauthorized or illegal attempt to view, disclose, retrieve, delete, change, or add information. A completely secure, zero risk system is one which has zero functionality. Latest technology high-performance automated systems bring with them new risks in the shape of new attacks, new viruses and new software bugs, etc. IT Security, therefore, is an ongoing process. Proper risk management keeps the IT Security plans, policies and procedures up to date as per new requirements and changes in the computing environment. To implement controls to counter risks requires policies, and policy can only be implemented successfully if the top management is committed. And policys effective implementation is not possible without the training and awareness of staff. The State Bank of Pakistan recognizes that financial industry is built around the sanctity of the financial transactions. Owing to the critical role of financial institutions for a country and the extreme sensitivity of their information assets, the seriousness of IT Security and the ever-increasing threats it faces in todays open world cannot be overstated. As more and more of our Banking Operations and products services become technology driven and dependent, consequently our reliance on these technology assets increases, and so does the need to protect and safeguard these resources to ensure smooth functioning of the financial industry. Here are different area in which we can work and check insider threat, but I chose textile industry as in textile industry there is less awareness of the insider threat. If an insider attack in an industry then industrialist try to cover up this news as these types of news about an industry can damage the reputation of the industry. CHAPTER 2 REVIEW OF LITRATURE S, Axelsson. ,(2000) Anonymous 2001 Continuity of operations and correct functioning of information systems is important to most businesses. Threats to computerised information and process are threats to business quality and effectiveness. The objective of IT security is to put measures in place which eliminate or reduce significant threats to an acceptable level. Security and risk management are tightly coupled with quality management. Security measures should be implemented based on risk analysis and in harmony with Quality structures, processes and checklists. What needs to be protected, against whom and how? Security is the protection of information, systems and services against disasters, mistakes and manipulation so that the likelihood and impact of security incidents is minimised. IT security is comprised of: Confidentiality: Sensitive business objects (information processes) are disclosed only to authorised persons. ==> Controls are required to restrict access to objects. Integrity: The business need to control modification to objects (information and processes). ==> Controls are required to ensure objects are accurate and complete.
Tuesday, August 20, 2019
Virus-host Receptor Interactions in Biology
Virus-host Receptor Interactions in Biology Abstract Viruses are obligate intracellular parasites and, as such, must penetrate a suitable host cell in order to replicate their genomes and disseminate. Most viruses are limited to a specific set of cells or tissues in which they can successfully replicate, and this may be in one or more particular species. When viruses are able to bind a variety of cells, the pathogenesis and overall effect on the organism may differ. The main determinants of viral tropism differ between different virus families, but in order to take the first, and arguably most important step, in the infection of a host cell, the virus must attach via specific interactions between cell surface molecules and viral proteins. Enveloped viruses usually have proteins embedded in their envelope, assembled at the host cell surface prior to budding. In the case of some viruses (such as HIV-1), these may even consist of cellular proteins from the host cell itself. Non- enveloped viruses are usually internalized in some way and uncoated in an endosome in a pH-dependant manner. Many viruses require a number of cell surface receptors for cell entry, and it is this combination, added to other factors such as replication proteins, that determine whether or not a virus can penetrate and replicated within a certain cell. Introduction As obligate intracellular parasites, the life cycle of viruses depends on an intracellular replication phase and they are thus dependant on living cells. The first essential interaction a virus makes with a host cell is with a cell-surface receptor. A viral receptor may be defined as any cell surface component that mediates recognition of a cell and facilitates entry of the virus and subsequent infection. Receptors serve to ensure infection by overcoming repulsion between the virus and cell. (Baranowski, Flint, Jindrak, modern virol) Cellular receptors are generally proteins, although other types of receptor, such as carbohydrates, may be used (see table 1). These molecules are essential components of the cell or extracellular matrix and functions may include cell adhesion, signalling e.g. chemokine and growth factor receptors. (Baranowski 2003) While some viruses require only one receptor, binding to one cellular receptor alone may not be sufficient for initiation of infection for other viruses. Viruses may bind two or more receptors in sequence in order to initiate endocytosis or membrane fusion. For some viruses, the first contact with a cell is through a low-affinity interaction with a ubiquitous molecule, which allows the primary receptor-virus interaction to take place. The primary receptor is generally unique to certain cells and therefore partly defines the tropism of that particular virus, as cells are rendered susceptible to infection by a certain virus if the receptor required for attachment and entry is present. The primary attachment receptor may induce a conformational change in the viral envelope protein bound, to induce further interaction with the cell. (Modern Virology) A further interaction may then be required to initiate infection, performed by a coreceptor.The definition of the term coreceptor may sometimes be ambiguous, but generally, it is taken to be the molecule that induces fusion or penetration of a cell. This may be a further determinant of tropism, for example the interaction of HIV-1 Virus entry into a cell is the first step in the life0cycle of a virus; various mechanisms of viral cell enrty are shown in figure 1. The mechanism of entry varies between viruses, but all begin with the binding of a cellular receptor by a viral protein. Binding of a cellular receptor may induce endocytosis or formation of an endosome, the acidic environment of which induces uncoating; this may be dependent upon cellular proteins clathrin or caveolin. Enveloped viruses may require an acidic environment that will induce conformational changes in envelope proteins required to induce membrane fusion, while others, including the measles and HIV viruses, can fuse directly with the plasma membrane at neutral pH. (Baranowski) Fusion at the plasma membrane releases the nucelocapsid into the cytoplasm, where the virus can make its way to the nucleus or begin replication in the cytoplasm. The differences in these entry pathways are due to the nature of the molecular interactions between the vi ral components and target-cell receptors, for example, viruses that mimic the natural ligand of receptors for signalling molecules interefere with their signalling to promote viral entry into the cell and spread of infection. (Bomsell) Conformational changes resulting from the binding of a primary receptor that allow the binding of a fusion receptor are a common mechanism among various types of virus, including influenza and HIV type 1, examples and brief description. Similar to Influenza . Multiple receptors could be coreceptors and act together either to modulate each other or to contribute complementary functions. Alternatively, the receptors might act sequentially. Binding of the virus to the first receptor could cause changes in the virus or host that are necessary before the second receptor can bind (50). For those viruses in fluids with flow, such as blood or respiratory secretions, the initial binding must be able to effect rapid docking of the virus to its host cell. (Haywood) As previously stated, some viruses recognise more than one cellular receptor. The same receptor may also be used by more than one type of virus. (see table 1) Often, these are highly abundant in many tissues, for example, heparan sulfate can serve as a receptor for many viruses, including Human immunodefiecieny virus, Hepatitis C and Dengue Virus and as a co-receptor for Herpesviruses (excluding EBV). (ODonnel) CAR, acts as a receptor for both coxsackie and adenoviruses. (Schneider) Table 1 illustrates the diversity of cell surface molecules which viruses have adapted to recognise. Some viruses use more than one type of molecule as a primary receptor e.g. reoviruses bind to the beta-adrenergic receptor as well as NAN. (Flint) While the presence of certain receptors on host cells is vital to initiate infection, these interactions are not always sufficient to explain all aspects of cell, tissue and species tropism. (Flint)(Haywood, Schneider) Binding of a viral protein to a cell surface receptor does not necessarily mean a productive infection will follow, since a co-receptor may be absent or functional domains of the receptor may be blocked. (Baranowski) Absence of specific cytoplasmic or nuclear molecules may hinder the replication of some viruses, despite their permissivity. However, even a non-productive infection may induce pathogenic effects, for example, binding to specific receptor may induce the secretion of cytokines. (Schneider) A virus generally cannot infect a cell successfully in the absence of its specific receptor, so the distribution around the body of the receptor will act as a restriction on the range of tissues that can be infected and hence on the number of systems in the body where sig ns and symptoms of infection might be experienced. (Flint) In the true sense of the word, Tropism refers to the specific cells a particular virus is able to replicate in, although the use of receptor by a virus is increasingly a valid definition in the field of virology. Additional factors the cause viral tropism will not be considered in the context of this essay, although they may be mentioned briefly where relevant, since the focus of this review is the link between specific receptor usage and virus tropism and pathogenesis. (Kuhmann) The primary topics explored here are the virus-receptor interactions with cells that allow viruses to enter cells and initiate infection and how this relates to the tropism of the virus at a cellular and organismal level. I am to demonstrate how viral attachment and entry is often a complicated multi-step process, sometimes requiring many different cell and virus molecules. The viruses largely used to illustrate these points, Human Immunodeficiency Virus type 1 (HIV-1), Influenza A and Herpes Simplex Virus type 1 (HSV-1) are human viruses of medical significance, but the tropism of these particular viruses in other animals, along with other viruses specific to other animals will be discussed where relevant. The structure and genomic organisation of these viruses is irrelevant and is only discussed where it relates to the glycoproteins that interact with cellular receptors. Viruses of plants, fungi and bacteria are not discussed The presence on the cell surface of a protein that has been identified as the receptor for a given virus may not be sufficient for a productive viral infection, and there may be multiple mechanisms behind such restrictions: functional domains of the receptor may be blocked in some cellular context, additional proteins (or other cofactors) may be needed, or cells may exhibit impediments for completion of the infection cycle, despite an initial successful interaction with a functional receptor. HSV- Demonstrates how viruses may use a large number of viral proteins and receptors to bind and enter specific cells. (Hayashi and Yoon) and how the interactions are a complex multi-step process. Influenza multiple steps. binds many cell types Tropism is dependent on other receptors and interactions. Of the many examples, the interaction ofà the human influenza A virus hemagglutininà with N-acetylneuraminic acid, and the ensuingà conformational alterations involvedà in pH-dependent membrane fusion, are oneà of the best characterized at the structuralà and functional levels (11) (Baranowski 2001)à example of proteolytic cleavage to aid spread and pathogenesis. Conformational change required for fusion HIV A well-documented case of use of multiple receptos is that of HIV-1 viruses and related viruses. Illustrates how a virus may use multiple coreceptors to mediate entry to different types of cells and thus influence the tropism of this virus. Uses some of the same receptors as other viruses (parallels between HIV, HSV and influenza) Multi-step process The interaction of the virion with the attachment receptor leads to the first conformational changes in the envelope proteins. This step enables the interaction with co-receptors, or entry mediators and further conformational changes at the plasma membrane. In enveloped viruses (top), this may deliver the energy for the direct fusion of the viral envelope and cellular membrane. Some enveloped and non-enveloped viruses require the low pH in acidic endosomes to induce this conformational change. Enveloped viruses may require the low pH to induce membrane fusion (centre). These mechanisms lead to the release and possibly uncoating of the virus genome, and the initiation of the virus replication cycle. Role of Viral Receptor Destruction While non-enveloped viruses typically undergo relase through cytolysis. Influenza and HIV-1 Viruses also demonstrate the importance of receptor-destroying activity on the infectivity of some viruses. This is imperative for the efficient release and cell-cell spread of the virus by preventing the glycoproteins on the newly-emerged virus from binding to the host cell receptors. It is also important for preventing superinfection of cells by the same or different viruses utilising the same receptor, which may result in cell death. The efficient budding and release of Influenza A virus from the host cell relies on the removal of Sialic Acid residues by Neuraminidase. In contract, the HIV-1 virus gp120 envelope glycoprotein downregulates the CD4 receptor after infection of monocytes, by stimulating TNF-ÃŽà ± production. Other cellular mechanisms contribute to down-modulation of CD4, including the gene product Nef, which causes CD4 internalisation respectively. The precursor of gp120 and gp41, gp160, has also been found to bind CD4 intracellularly in the presence of viral protein Vpu, resulting in retention of CD4 in the Endoplasmic Rectilium. Enveloped particles leave the infected cell inconspicuouslyà by budding and secretion. Nonenveloped virusesà are usually thought to undergo release through cell lysis,à but some may escape by secretory mechanisms afterà budding into membrane bound compartments and thenà losing their membrane (Altenburg et al., 1980). Othersà may subvert cellular autophagy pathways to gain accessà to exocytic organelles (Jackson et al., 2005).à (Marsh)
Monday, August 19, 2019
The Modern Grotesque Hero in John Kennedy Tooles, A Confederacy of Dun
The Modern Grotesque Hero in John Kennedy Toole's, A Confederacy of Dunces John Kennedy Toole unleashes a compelling criticism of modern society in the principal work he produced in his short lifetime, A Confederacy of Dunces. Using masterfully crafted comedy, Toole actually strengthens his disparaging position on the modern world. Boisterously and unabashedly opinionated, Ignatius Reilly, the principal character of this novel, colors the narrative with a poignant humor that simultaneously evokes both laughter and pity from readers. Near the beginning of the story, his mother's financial difficulties suddenly force Ignatius to leave the womb-like security of his bedroom and seek employment, making him abandon his project of writing a scathing description of "the disaster course that history had been taking for the past four centuries" (Toole 41) on childish Big Chief tablets. The action of the novel revolves around Ignatius's experience in society as he bumbles from job to job with his ever-present sense of superiority. His outward slovenly appearance and the incongruity between his professed beliefs and his actions create in Ignatius the epitome of the modern grotesque hero. Walker Percy wrote: "'Toole's greatest achievement is Ignatius Reilly, slob, intellectual, ideologue, deadbeat, goof off, who should repulse the reader with his gargantuan bloats, his thunderous contempt and one-man all out war against all of modern times...'" (Samway 345). Using the grotesque to further highlight the satirical conflict that man encounters with modern society, John Kennedy Toole, in A Confederacy of Dunces, artfully attacks the economic, religious, and social states of present day America. The use of such a grotesque principal cha... ...nre." Mississippi Quarterly 38.1 (1984-1985): 33-47. Miller, Keith D. "The Conservative Vision of John Kennedy Toole." Conference of College Teachers of English Studies 48 (1993): 30-34. Nelson, William. "The Comic Grotesque in Recent Fiction." Thalia-Studies in Literary Humor 5.2 (1982): 36-40. Palumbo, Carmine D. "John Kennedy Toole and His Confederacy of Dunces." Louisiana Folklore Miscellany 10 (1995): 59-77. Patteson, Richard F. and Thomas Sauret. "The Consolation of Illusion: John Kennedy Toole's A Confederacy of Dunces." The Texas Review 4.1-2 (1983): 77-87. Ruppersburg, Hugh. "The South and John Kennedy Toole's A Confederacy of Dunces." Studies in American Humor 5.2-3 (1986): 118-126. Samway, Patrick H., S.J. Walker Percy: A Life. New York: Farrar, 1997. Toole, John Kennedy. A Confederacy of Dunces. New York: Grove, 1980. 13
Sunday, August 18, 2019
A Good Man Is Hard To Find Essay -- English Literature
A Good Man Is Hard To Find The story "A Good Man is Hard To Find" begins with a family planning to take a vacation to Florida. The grandmother who does not want to take the vacation in Florida is persuading the family. She has read about a crazed killer by the name of the Misfit, who is on the run, heading for Florida. The mambas of her family ignore the grandmother. On the day of the trip, ironically, the grandmother is dressed in her Sunday best. She is decked in white gloves and navy blue dress with matching hat. She is the first one in the car and ready to go. O'Connor is getting the reader to visualize the Southern culture. The grandmother's purpose of dressing this way is to be recognized as a lady, in case someone saw her dead on the highway. This tells me the grandmother's thoughts of death are shallow. Later in the story, the Misfit says, "There never was a body that gave the undertaker a tip." (qtd, in DiYanni 202) The grandmother's readiness for death is an indication that she does not want to go where there is a prisoner on the loose. However, her read...
How Mildred Taylor uses the Characters and Events to show the Prejudice
Mildred Taylor, the author of 'Roll of Thunder Hear My Cry' clearly depicts racism in her novel. She skillfully uses the characters and events in the novel to show prejudice in Mississippi in the 1930s, when the book was set. At the time Mississippi was renowned as one of the worst states for racism. Taylor has created many situations in her novel were several of the characters are victimized as well as discriminated against. Throughout the novel white people form an irrational judgment on the black race, innocent people are burnt and lynched. 'Roll of Thunder Hear My Cry' is a novel which ventures on how hatred, humiliation and degradation fill the gap between the two races that are separate from each other, the races of the black and white. Taylor uses one of the main characters in this novel, Cassie Logan to show how racism impacted on their everyday lives. When Cassie goes to Strawberry for the first time, she is put out of her comfort zone and into the real world. Through these episodes Taylor shows us that Cassie had to grow up, and learn that being defensive cannot always solve the problem. As Cassie angrily confronts Mr. Barnett as she has not been served, he angrily ?recoiled? and told her to get her ?little black self? away from the counter to wait. As Mr. Barnett tries to get rid of Cassie he bellows, ?whose little nigger is this? leaving Cassie feeling ashamed and confused. Taylor uses this incident and characters to show that black people were considered, by some, to be less important than whites, since Cassie had been waiting for nearly an hour. The language spoken by Mr. Barnett is strongly patronizing, and it expands the portrayal of racism. Another point where Cassie is complete humiliated is when she bum... ...hool every day, whilst the white school bus goes past and sprays them with red dust. This also shows segregation, whites and blacks had to be as far apart as possible according to the whites. In the novel we see segregation many times: when Big Ma parks the wagon the other side of the field, the different schools and different buses. Taylor does use strong and powerful language through her characters and events to portray the racism. She also had a clear structure, some may find it confusing at times, but overall it does not affect how prejudice is portrayed as events follow each other. I think that the final message of the novel, perhaps, is that survival is possible, but that there are inevitable losses along the way, and that whatever race we are should not matter. Taylor uses memorable characters and big and small events to show prejudice in 1930?s Mississippi.
Saturday, August 17, 2019
Religion in Modern Society Essay
Religious teachings often begin with the ideals of finding inner peace, or aiding those in need, yet, over the centuries, these religions have merely become a means of facilitating the ambitions and desires of those who are in power. Many faiths disguise and warp themselves in a way that sets reality aback, and makes individual existence seem all the less valuable. Over millennia, scriptures have been modified countless times, becoming form-fitted duplicates that vary according to the era, or to whatever purpose such an alteration might serve. Recently (relatively speaking), the addition of the media has served as a method of promotion and persuasion, ranging all the way from trivial, street-side advertising to mass conversions and the attempting of subtle, influencing techniques. Worst of all, innumerable lives have come to a horrifying and ghastly end simply because of conflicting beliefsâ⬠¦ and there is no end in sight. Religion, as it has developed, has become harmful, and, c ontrary to its original purpose, a terrible burden to society. All religions, no matter who believes in them or where they originated, are convinced that they are the primary source of all correct thought and righteous action. It is widely known that, no matter who is preaching to you, they are telling you that what they believe is the truth. The fact is that all religions began as word of mouth or a generalized belief. These have been put into writing, rewritten, translated, outdated and rewritten once again. Its not likely that everything in such scriptures should be taken as the absolute truth, with no room for compromise or alternative. Believably, thousands of facts that could clarify a topic were lost in the process of doing exactly that. Such views of absolute and total engagement with the scriptures will mask the true meaning of the religion as a whole, and will deter the logical reasoning and thought processes incurred by reasonable doubt. Reality can no longer function in a place where there is no independent thought, and that is why so many people are misinterpreting their religion, and taking it far to literally. Errors in judgment, occurring over millennia, have resulted in terrible consequences to both believers and non-believers. When religion provides such simple answers to the most complex questions, it even demotes the research into and further development of our society as a whole. Without such answers we will remainà primal and inadequate, and our evolution may grind to a halt. Many religions are becoming wide-spread epidemics, as they are opening their arms and gathering those who would otherwise run astray. The culture in which one develops will (with some exceptions) solely determine oneââ¬â¢s religion and, overall, their moral code and beliefs. When outside influences begin to affect these cultures, people begin to question themselves and all that they believe. This is what the media, the missionaries, and even local societies are developing into: a campaign of cultural uniformity. Christians, for example, have intruded on African soil for centuries, claiming that they are rescuing the countless souls from certain damnation. I am sure that what these independent (even secluded) societies really wanted to hear was that: if they do not believe in exactly what they are told to, they are doomed to spend an eternity in the fiery depths of Hell. Granted, there is a certain period of transition during the attempted conversions. This is a period where the Christian religion seems to adapt to and encircle the given culture, twisting its scriptures to properly conform to the situation. Yet, this is simply an easier method of religious transformation, and it shows no consideration for the subjected peoples or the catastrophic revolutions that they are about to be included in. Even the obvious presence of churches or the not-so-obvious clergy affects the mentality of those exposed to it. There appears to be no other alternative, and, therefore, society will bias their views according to those of the religion that engulfs them. Not all religions, nor all people of these religions, are as horrible as I may have portrayed them: quite the contrary. There are those who are ââ¬Ëtrue believersââ¬â¢. They show a unique respect to peoples of other faiths and beliefs, and understand (more in retrospect than anything else) the trouble that fanatics of any religion may rouse. Their presence brings no consolidation, though, because these people have no real power. They are the ones that sit back and contemplate the whole purpose and meaning of their beliefs. It is the ones who want action (which may be seemingly positive, with a unbeknown negative impact) that are willing to step to the forefront and deliver the righteous justice this world has been awaiting. Insightful,à and truly ââ¬Ërighteousââ¬â¢ individuals do tread our Earth, but all hope of their resurgence seems lost once it is realized that these people are a rare breed, and that mating season is long over. The amount of individuals massacred because of their beliefs is uncounted. Religion has served the purpose of allowing an excuse for very heinous criminal acts, which often occur in mass proportions. Our Christocentric society can only see one facet of a whole, and we regard the beings that worship such gods as Ala (SP) as horrible sadists when they kill in his name, yet this is the most prominent and ignorant form of hypocrisy to date. Many Christians unknowingly believe that, because they worship God and Jesus Christ, they have the given right to use His name to serve their own designs. This is likely one of the worst possible misinterpretations, and has inarguably the most irreversible consequences. Ruining other human lives, not only those of the ones that are killed, captured, raped, or tortured, but those of the loved ones close to them, is no honourable sacrifice. God (or any other true god-like being), would not condone such actions, even if it were for the sake of his children. Nations can instill massive propaganda campaigns, and pound the martyr-related beliefs into their citizens skullââ¬â¢s, with little or no retribution. The citizens (mostly those of the applied faith) will be convinced that their god wills these actions, and that it must be done for the sake of their future. The best example of this is the ââ¬ËKu Klux Klanââ¬â¢, who has taken the Christian belief to a totally obscene level, and deciphered their base-religion in an unbearably clumsy manner. It seems a horrible fate, to be ordered (by your god, of course) to leave everything behind and quarrel over something that will so obviously never be resolved. With all of the trouble in our world today, its disconcerting to know that religion is a contributing factor. Even more so after we have been told of the attributed attainment, and the possibility of its bliss and sanctuary within our miniscule existence. All of our misguidings, misdirections and misinterpretations are being unraveled, and worsening throughout the course of time. This, and the subjective persuasion and manipulation we bestow upon ourselves will convey our impending death and destruction, as it mayà inevitably continue to contribute to the spiraling degradation of our existence in this universe.
Subscribe to:
Posts (Atom)