Thursday, October 31, 2019

Primary Document Analysis Term Paper Example | Topics and Well Written Essays - 1000 words

Primary Document Analysis - Term Paper Example Eventually the practice of indentured servitude and subsequent freedom began to be replaced by outright slavery as practiced in the Caribbean islands. From 1619 to 1865, blacks were bought and sold in slave markets. Despite only about 300,000 slaves entering the shores of America, they have a rich and eventful history and by about 1700, 10 percent of the population of the American colonies consisted of slave labor. However in localities such as Northampton, these people not only acquired property but formed families and provided for the welfare of their children, much like white folks. What is even more surprising that despite their sad past, they did not shy away from the white population and exist in their own exclusive community- rather they mixed with the local population and earned a name for themselves by being industrious and dealing in equal measure with whites, servants and slaves. Discussion In ‘Myne Owne Ground’, the authors Breen and Innes explore the anteced ents and arrival of the blacks on Virginia’s Eastern Shores during the period 1640-1676. The surviving records are remarkably rich in detail, providing names like Payne, Emanuel, Driggus, Cane, Francisco and Grace. There were first names as well as family names; also reference to relationships like the term ‘wife’(Breen & Innes, 69). Records indicate that as much as 29 percent of the black population had gained freedom by 1668, a figure that stands out in all of black history. Some blacks arrived in Virginia via the West Indies, along with the sugar crops and it could be safely assumed that after spending a year in Barbados, they could speak English like a native and had also been exposed to the diseases and atmosphere of this new world. Going forward to the record of the Dutch trader Willem Bosman as recorded in 1701, he narrates the conditions of bargaining in the slave labor market and begins with the astonishing assertion that in conditions of slow economic g rowth, slave trading was a highly lucrative enterprise, even more advantageous than dealing in gold. Bosman notices that the practice of assigning the responsibility of the management of this trade to the captains of the ships did not always turn out beneficial for the slaves- in fact quite the contrary. Captains had too much responsibility on their hands already and could not be expected to handle the additional burden of looking after slave cargo. After a trader arrived at Fida and had satisfied the greed of the rulers by bribing them 100 pounds in Guinea currency equivalent, he was free to trade as he wished. But before he could do so, he was obliged to buy the King’s stock of slaves, that too at a price double or triple their going value in the slave market. If the King had no slaves, the factors were obliged to trust their lot of 200 odd slaves to the local inhabitants to be sold off in inland and remote regions, much in the same way as beasts of burden. For those humane enough to imagine that the sale of slaves meant the dissolution and seperation of their family unit, it was usually held that the slaves were prisoners of war anyway. When it comes to the matter of their trading, the slaves who are held in prison upon their arrival are brought out, stripped naked both men and women, and inspected minutely by chirurgeons. The good are placed on one side and the lame or faulty on another. These may be

Tuesday, October 29, 2019

Area of Study †The Outsider Essay Example for Free

Area of Study – The Outsider Essay How have the texts encountered in your studies enriched your understanding of The Outsider? â€Å"You dont get to 500 million friends without making a few enemies. † An outsider is interpreted as someone who separates themselves from the rest of the society, intentionally or unintentionally. Sometimes, it is this outsider’s insecurities or physical appearance that contributes to this factor of their ‘isolation’. The play Othello by William Shakespeare and the 2010 film The Social Network directed by David Fincher are conclusive in portraying and analysing a significant outsider or group of outsiders through literary and cinematic devices, which enrich my understanding of this concept, later used to my benefit, demonstrated through my visual representation. Written by the famous English playwright William Shakespeare circa 1603, Othello explores the idea of ‘The Outsider’ through the two significant notions that enriched my understanding – insecurities and physical appearances, both of which are used to advantage and disadvantage the characters in the play. Othello is immediately introduced as the titular black general and the Moor of Venice, who has overcome racial prejudice to hold a renowned position in society and a marriage to a beautiful young woman, Desdemona, the senator’s daughter. The metaphor in the line, â€Å" an old black ram is tupping at your white ewe † indicates a sense of hostility that the other members of society have against Othello, using physical appearance and racist slurs to downplay the general, the majority of these comments being made by Iago, Othello’s advisor. Iago could be seen as an outsider in the play, but uses this characteristic to his advantage, being desperate for power and authority; he raises Othello’s suspicions about his wife’s fidelity. Iago is also known for foreshadowing events, as seen in the personification used in the line, â€Å"O beware, my lord, of jealousy; it is the green-eyed monster which doth mock the meat it feeds on † indicative of Othello’s future actions in the play. Othello, oblivious to Iago’s exploitations, undermines himself- an insecurity- seen in the pitiful tone, â€Å"Haply for I am black, and have not those soft parts of conversation that chamberers have † evident of his lack of self worth and vulnerability to issues relevant to his colour or race, enhancing my comprehension of The Outsider. The 2010 American film The Social Network- written by Aaron Sorkin and directed by David Fincher, strongly delves into the concept and deepens my understanding of the Outsider from the beginning. The protagonist, Mark Zuckerberg, like Othello, is instantly presented as a character who does not wish to interact with society directly and uses social networking to express his opinions, thereby the invention of Facebook. The lighting throughout the movie is an example of the many cinematic devices that are effective in demonstrating the different societal groups. As an individual, the dim lighting on Mark, in contrast to the bright lighting on the others in his group is indicative of Mark being an outsider, even within his own group. Also, the repetition of the word ‘asshole’ in several situations in the film is suggestive of how similar Mark’s character is to Othello’s – he allows himself to be looked down on. Erica Albright, Mark’s ex- girlfriend says at the start of the film, â€Å"†¦Itll be because youre an asshole,† and this is contrasted when Marilyn Derpy, the psychiatric nurse has her final statement at the end of the film, â€Å"Youre not an asshole, Mark. Youre just trying so hard to be. † Albright’s vindictive tone is representative of how an outsider can be portrayed when he or she is put down by others, further supported by Derpy’s somewhat sympathetic yet wary tone. Mark’s tolerance of being exploited further enhances my knowledge of the concept of the Outsider, especially through the characters that manipulate him the most – the biggest of these being Sean Parker, the founder of Napster and the first president of Facebook. Sean’s character is much similar to Iago’s, as he is as much as an outsider as he is an insider. The repetition of ‘cool’ as Sean defiantly says to Mark, â€Å"A million dollars isn’t cool. You know what’s cool? A billion dollars,† shows how using such simple socially acceptable terms can influence a person’s decisions, especially characters like Mark, whose insecurities play a massive role in creating the atmosphere of ‘The Outsider’. My visual representation is an amalgamation of the perceptions of the Outsider that I derived from analysis of Othello and The Social Network. Using the same template as the given image, I drew the figure and his surroundings on the inside of the room in black and white, also giving prominence to the central figure, outlining ‘him’ in a darker colour in contrast to the chair he is sitting on. The personage is looking outside, into a colourful world, of which I have used many different colours to show the difference between the inside world and the outside world. As in Othello, colour plays a major role in distinguishing between outsiders and insiders. Using colour, I represented the character to be the salient black and white figure in a black and white environment, but this is merely the ‘inside world’. I have chosen the persona’s gaze to lead the viewer to focus on the colourful outside world, demonstrating the differences between the inside world and the outside world. The individual is recognised as an outsider, not only in his own micro world, but in his larger macro world. Therefore, the conceptualisation of ‘The Outsider’ has been enforced through cinematic and literary devices used in the texts Othello by William Shakespeare, through the notions of colour and physical appearances and The Social Network directed by David Fincher, which reiterates how manipulation and downplay of colour and physical appearances can lead to being in a solitary state as an individual. My visual representation incorporates these ideas into a single ideology, evidence of how these texts have enriched my understanding of ‘The Outsider’.

Sunday, October 27, 2019

The System Hacking Cycle

The System Hacking Cycle System hacking means to hack system password within the operating system. Many hacking attempts start with attempting to crack passwords. However, passwords are the key piece of information needed to access a system. Users, while creating a password, often select password that are prone to being cracked. Passwords may be cracked manually or with automated tools such as dictionary or brute-force method, each of which are discussed in this paper. Scanning and enumeration is the first part of ethical hacking and contains the hacker target systems . Enumeration is the follow-on step once scanning is complete and is used to identify computer names, usernames, and shares. Scanning and enumeration are discussed together because many hacking tools perform both. The system hacking cycle consists of six steps:- a. Enumeration b. Cracking Passwords c. Escalating Privileges d. Executing Applications e. Hiding files f. Covering tracks Enumeration occurs after making the IPv4 protocol independent of the physical network, the designers decided to make the maximum length of the IPv4 datagram equal to 65,535 bytes. This makes transmission more efficient if we use a protocol with an MTU of this size. HowÂÂ ­ ever, for other physical networks, we must divide the datagram to make it possible to pass through these networks. This is called fragmentation. The source usually does not fragment the IPv4 packet. The transport layer will instead segment the data into a size that can be accommodated by IPv4 and the data link layer in use. When a datagram is fragmented, each fragment has its own header with most of the fields repeated, but with some changed. A fragmented datagram may itself be fragmented if it encounters a network with an even smaller MTU. In other words, a dataÂÂ ­gram can be fragmented several times before it reaches the final destination. In IPv4, a datagram can be fragmented by the source host or any router in the path although there is a tendency to limit fragmentation only at the source. The reassembly of the datagram, however, is done only by the destination host because each fragment becomes an independent datagram. Whereas the fragmented datagram can travel through different routes, and we can never control or guarantee which route a fragmented dataÂÂ ­ gram may take, all the information is provided by other means such as the hop-by-hop options or other protocols. In its simplest form, a flow label can be used to speed up the processing of a packet by a router. When a router receives a packet, instead of consulting the routing table and going through a routing algorithm to define the address of the next hop, it can easily look in a flow label table for the next hop. In its more sophisticated form, a flow lab Many hacking attempts can initialize with to attempt crack passwords. Passwords are the important information which is required to login a system. Users, when creating passwords, often select passwords that are difficult to guess. Passwords are stored in the Security Accounts Manager (SAM) file on a Windows system and in a password shadow file on a Linux system. Manual Password cracking involves attempting to log on with different passwords. The hacker follows these steps: 1. Find a valid user account for password test. 2. You can create list of possible passwords. 3. Arrange the passwords according to possibility 4. Try each password. 5. Try and try for correct password. In its simplest form, a flow label can be used to speed up the processing of a packet by a router. When a router receives a packet, instead of consulting the routing table and going through a routing algorithm to define the address of the next hop, it can easily look in a flow label table for the next hop. In its more sophisticated form, a flow label can be used to support the transmission of real-time audio and video. Real-time audio or video, particularly in digital form, requires resources such as high bandwidth, large buffers, long processing time, and so on. A process can make a reservation for these resources beforehand to guarantee that real-time data will not be delayed due to a lack of resources. The use of real-time data and the reservation of these resources require other protocols such as Real-Time Protocol (RTP) and Resource Reservation Protocol (RSVP) in addition to IPv6. To allow the effective use of flow labels, three rules have been defined: 1. The flow label is assigned to a packet by the source host. The label is a random number between 1 and 224. A source must not reuse a flow label for a new flow while the existing flow is still active. 2. If a host does not support the flow label, it sets this field to zero. If a router does not support the flow label, it simply ignores it. 3. All packets belonging to the same flow have the same source, same destination, same priority, and same option. 2. ACCOUNTING MANAGEMENT The Internet is a wonderful thing. It allows knowledge to be shared with the world. But what if you want to use the Internet to share knowledge with just one person? When web pages, e-mail, and even passwords are transferred across the Internet, they are free to be seen by anyone who cares to look. You may ask, Who is going to be looking, anyway? The answer, in most cases, is nobody. Anonymity can be your security. This is especially true of your Internet presence from home. However, the situation changes when you use your credit card over the Internet, or when you are a business on the receiving end of a credit card transaction. In such cases, anonymity clearly doesnt provide enough security. Furthermore, what if you receive a sensitive document, but you are unsure if the person who sent it really is who they claim to be? How do you know that this same document wasnt tampered with between the time it was sent and the time you received it? And what if you need to protect sensitive data on your web site, or perhaps you want to protect the data in transit to the user, or authenticate the user with a stronger authentication method? It prevents users from monopolizing limited network resources. It prevents users from using the system inefficiently. Network managers can do short- and long-term planning based on the demand for network use. Integrated Windows authentication is the most secure method of authentication, but it is available only with Internet Explorer. This authentication type had been known previously as NTLM authentication and Windows NT Challenge/Response authentication. In Integrated Windows authentication, the users browser proves itself to the server using a cryptographic exchange during the authentication process. Integrated Windows authentication supports both the Kerberos v5 and the NTLM (NT LAN Manager) protocols for authentication through the Negotiate package. If you are using Active Directory, and the browser supports it (IE 5 or above with Windows 2000), Kerberos is used; otherwise, NTLM is used. Both Kerberos and NTLM have limitations on their use. Interestingly enough, each ones strength is the others weakness. Kerberos generally works with proxy servers, but it tends to have a hard time with firewalls. NTLM generally works through firewalls, but it tends to have a hard time with proxy servers. 1. A manager checks an agent by requesting information that reflects the behavior of the agent. 2. A manager forces an agent to perform a task by resetting values in the agent database. 3. An agent contributes to the management process by warning the manager of an unusual situation. 3. PASSWORD INTEGRITY Authentication is an important feature of any secure web site. Every time a client browses to a web site, it needs to be authenticated before it can access the resources it is requesting. By default, that authentication all takes place on the server, and the client isnt even involved. Some authentication settings can make for easy access to a web site, but sometimes you want to limit who sees what information on your site. This is where more restrictive types of authentication come in. If your computer is renamed, the Internet Guest Account does not change and continues to use the old machine name. Because user accounts use security identifiers (SIDs) to identify themselves, changing the computer name doesnt affect the account name. When IIS receives a request, it automatically attempts anonymous authentication first. If anonymous authentication fails, it attempts to log on the user using another logon method. If no other authentication methods are enabled, IIS sends a 403 Access Denied HTTP error message to the client. You can use any user account that you wish for anonymous access, including the Administrator account. You can change access settings in the items Properties windows Directory Security tab, accessible by right-clicking the item in the IIS Microsoft Management Console (MMC) snap-in and choosing Properties. (By the way, even though you can do it, dont use the Administrator account for anonymous access.) Basic authentication is a widely accepted means of authentication. Because all the information is presented and transmitted in clear text, its easy to use and makes for easy program interoperability, but the passwords can be found out faster than you can say security risk. Both the web server and FTP server components in IIS support Basic authentication. 4. CONCLUSION The simplest and the oldest method of entity authentication is the password, something that the claimant possesses. A password is used when a user needs to access a system to use the systems resources (log-in). Each user has a user identification that is public and a password that is private. We can divide this authentication scheme into two separate groups: the fixed password and the one-time password. In this group, the password is fixed; the same password is used over and over for every access. This approach is subject to several attacks. 4. REFRENCES www.ankitfadia.in for ethical hacking and password guessing techniques. www.ethicalhacker.net www.hackcommunity.com www.dl4hacks.com www.go4expert.com/forums www.ehacking.net www.govermentsecurity.org/forum/32003

Friday, October 25, 2019

Aruba :: Free Descriptive Essay About A Place

Aruba Aruba’s political center was located on the island of Curacao while under the colonial control of the Netherlands from 1634 until 1986. Decisions on political issues in Aruba were made by the Dutch Governor who was located on Curacao. With the economic boom of the oil refineries in the 1900’s, the people of Aruba started to feel the need to have a say in issues facing them. Many political issues were put on hold because of World War II and the German occupation of the Netherlands from 1940 to 1944. With the world at peace, the issue of the post war handling of their colonies had to be faced by the Dutch. The Netherlands Antilles, which includes------------------- was granted universal adult suffrage in 1950 and internal self-government in 1950. After four years of considerable discussion, the Dutch government and its American colonies adopted an unusual constitutional experiment, the Statute of the Realm, which became effective in December 1954. Under the Statute, the Dutch monarch reined over a composite realm made up of the three kingdoms of the Netherlands, Suriname, and the Netherlands Antilles. The statue grants the Dutch islands considerable autonomy. The realm has jurisdiction over defense, foreign affairs, the sharing of citizenship, and certain other specific matters. All other governmental powers are reserved to the former colonies. Even in foreign affairs, the Netherlands Antilles can join international bodies, and the Realm may not make or break treaties affecting its Caribbean members without their consent . The Kingdom of the Netherlands Antilles formed the Antilles Federation. The center of political power for Aruba during the colonial period was located in Curacao. With the coming changes resulting from World War II, the real issue brought forward before the war was not resolved. A government located on Curacao still ruled Aruba. Leaders of Aruba remained convinced that Curacao treated them unfairly and unjustly obtained too much of their income. The Netherlands maintained that any island leaving the federation must become an independent nation. As Aruba’s economy was boosted by the establishment of the Standard Oil Company of New Jersey (Exxon)’s largest refinery in the world in 19----------------, the cry for independence (or â€Å"Status Aparte†) became more and more vivid. During this period the political parties A.V.P (Arubaanse Volks Partij) and U.N.A. (Union Nacionalista Arybano) governed the island.

Thursday, October 24, 2019

Federal Budget for 2001

This country has been dealing with a budget deficit for many years now. In an attempt to change this, on June 29, Congress voted in favor of HConRes67 that called for a 7-year plan to balance the Federal Budget by the year 2001. This would be done by incorporating $894 billion in spending cuts by 2002, with a projected 7-year tax cut of $245 billion. If this plan were implemented, in the year 2002, the U. S. Government would have the first balanced budget since 1969. Current budget plans are dependent on somewhat unrealistic predictions of avoiding such catastrophes as recession, national disasters, etc. and include minor loopholes. History has shown that every budget agreement that has failed was too loose. One might remember the Gramm-Rudman-Hollings bill that attempted to balance the budget, but left too many exemptions, and was finally abandoned in 1990. So after a pain-staking trial for GOP Republicans to create, promote, and pass their budget, as promised on campaign trail 94, Clinton rejected the very bill he demanded. This essentially brought the federal budget back to square one. Clinton thought such a demand on Republicans to produce a budget would produce inner-party quarrels and cause the GOP to implode. Instead, they produced a fiscal budget that passed both houses of Congress, only to be deadlocked by a stubborn Democratic President Clinton. Meanwhile, Clinton bounced back with a CBO scored plan with lighter, less risky cuts to politically sensitive areas like entitlements. Clinton†s plan also saved dollars for education and did not include a tax increase, but most cuts would not take effect until he is out of office, in the year 2001. Although Clinton is sometimes criticized for producing a stalemate in budget talks, the White House points out that the debt has gone down since Clinton took office, with unemployment also falling. Republicans are quick to state that Clinton originally increased taxes in 1993 and cut defense programs, but his overall plan was for an increasing budget without deficit reduction. As of 1996, the national debt was at an all time high of $5 trillion dollars, with interest running at a whopping $250 billion per year. This equals out to an individual responsibility of more than $50,000 per taxpayer. Nearly 90% of that debt has accumulated since 1970, and between 1980 and 1995, the debt grew by 500%. Currently, the debt grows by more than $10,000 per second, and at current rates, our government is about to reach its breaking point. If that†s not enough to scare a taxpayer, by 2002, 60% of government spending will be for entitlements, and by 2012, these programs are projected to take up all government revenue. Not only economic development, but also family income is hurt by debt. With the cost of living going up, it becomes harder to find a job. According to the Concord Coalition, real wages peaked in 1973 and have gone down ever since. If the economy grew as fast as it did in 1950, without a debt, the median family income would be $50,000, compared to the present median of $35,000. As of current fiscal year†s budget, the United States government spends $1. 64 trillion yearly, $500 billion of that, or 1/3 of the total, is for discretionary spending. This discretionary spending is the target for most cuts, and seems to be the easiest to make cuts in. Overall, the difference between the two parties' budget plans is only $400 billion. This could easily be trimmed by eliminating tax cut and adjusting the consumer price index to reality. Democrats say the GOP plan is too lopsided, and Republicans criticize the Democrat plan for being unrealistic. A study by the Urban Institute shows GOP cuts will be felt mainly by the bottom 1/5 of U. S. population. This should be more equally spread out across income brackets. By fulfilling campaign promises made by freshman Republican Congressmen to cut government spending, the GOP managed to pass a $1. 6 trillion budget resolution by a party-line vote, in both houses of Congress. This budget called for major cuts in education, environmental programs, discretionary spending, and the largest of all: entitlements. 70% of the money to balance the budget under the GOP plan would have come from entitlements. This is because entitlement programs currently take up $301 billion a year. Such cuts had already been partially implemented with the GOP cutting overall spending by 9. 1% in 1996 alone. First, in an attempt to stop the projected bankruptcy of Medicare in 2002, Republicans cut $270 billion overall from the program, with hospital reimbursement cuts being the deepest. Although stabilizing the fund is only expected to cost $130-$150 billion over 7 years, the GOP budget would reform the program to run better, and cheaper, by allowing it to grow at 6% yearly, instead of the current 10%. While both parties agree on premium hikes for beneficiaries, this is a touchy subject for the 38. 1 million elderly voters on Medicare. Medicaid, another volatile program, would be cut $182 billion under the GOP proposal. This would entail placing a cap on the program†s spending, and passing control of it to the individual state governments. For an estimated 39 million low-income people on Medicaid in 1996, the GOP plan cuts the program far more than Clinton†s proposed $98 billion cut. Social Security is another program being cut. The government has already reduced the outlay for seniors 70 and younger who are on the program, but Republicans want more by increasing the eligibility for Social Security from 62 to 65 for early retirement, and 65 to 70 for standard retirement. Smaller cuts included $11 billion in student loan reductions, $9. 3 billion in labor cuts, $10 billion eliminated from public housing programs, and several other numerous disaster relief programs cut. The GOP also wants to eliminate programs initiated by Clinton like the National Service initiative, summer jobs, Goals 2000, and Americorps. Along with terminating unnecessary farm programs, and cutting others by $12. 3 billion. Republicans hope to cut the yearly $6 billion that the Federal Government spends on direct subsidies to farmers. Agricultural policies were also reformed and embedded into budget-reconciliation bills. Clinton†s budget only surfaced after he vetoed the budget passed by Congress, and included shallower cuts, with little or no reform to entitlements. This plan was supported by most Democrats and was used as an alternate to a gutsy GOP budget. Clinton repeatedly trashed the Republican†s efforts to make cuts on programs he feels important like student loans, agricultural programs, and entitlements. He accused Republicans of wanting to kill some all together. He has also threatened to veto a Republican plan to reform Medicare called Medical Savings Accounts, unless his programs are left intact. Under Federal law, the President is required to submit budget requests in 2 forms: Budget Authority, the amount of new federal commitments for each fiscal year, and outlays, the amount actually spent in the fiscal year. The plan that Clinton has presented is not only a budget resolution in the form of a campaign document, but also proof of how far the Republicans have moved him to compromise since the they took control of Congress. Most important, it does not readily translate into regular accounting principles used for government programming. This year†s White House budget was a 2,196 page document that the GOP struck down immediately for not cutting taxes enough and neglecting to downsize the government. Among largest cuts within Clinton†s plan was the downsizing of 1/5 to 1/3 of all programs that he felt were not a priority to present day government. In addition, he wanted to close loopholes presented to corporate taxation, that would save an estimated $28 billion. He vowed to keep programs like education, crime prevention, and research or environmental grants. Attention was also placed on discretionary spending, with Clinton cutting a smaller $297 billion compared to GOP†s $394 billion cut. According to the Office of Management and Budget, the President†s plan cuts middle-income taxes by $107. 5 billion in 7 years, small business by $7 billion, and cuts $3. 4 billion from distressed urban and rural area relief. This was to be paid for by a $54. billion hike in corporate and wealthy-income taxes, and also in $2. 3 billion of tighter EITC (Earned Income Tax credit) adjustments. Although Clinton†s plan was expected to cut a whopping $593 billion in 7 years to furthermore produce an $8 billion surplus in 2002, most cuts are long term without a clear goal. Republicans sometimes criticize Clinton for unwillingness to compromise. He has used vetoes and stubborn negotiations to protect personal priorities like education, job training, and environmental programs, but Republicans have also tried using domination to force him to comply. One must remember that President Clinton does have somewhat of an overwhelming power in this debate that Republicans can do nothing about. He is the single person that can veto laws sent to him, and also has the power to call Congress back into session if he is unhappy with the current situation. This was President Truman†s â€Å"ace in the hole† back in 1948. One of the ways we are currently reducing the deficit includes the introduction of â€Å"means testing. † This means that people would get entitlements based on need. The government already has reduced Social Security for modest income seniors' age 70 and younger, but budget cutters want to broaden that idea. There are 2 major problems with means testing. First, it is considered inherently unfair. Some might argue that a person might blow all of their income before the entitlement reductions come into place. Second, it might reduce the incentive to work and encourage people to hide their income. For instance, beneficiaries of Social Security, ages 62-64, lose $1. 00 yearly in benefits for every $2. 00 they earn in income or wages above $8,160 per year. Some say increasing eligibility requirements would solve some problems, and propose raising the age of early retirement from 62 to 65, and standard retirement from 65 to 70. Another touchy subject in budget reduction is the argument that the poor are being left out of savings. According to the Clinton Administration, the GOP budget would cause a family with income of $13,325 per year to lose 11% of their income. United States Treasury Department studies say the bottom 1/5 income families would have net tax increase of an average $12 to $26 under the GOP plan. The top 1/5 income families would receive more than 60% of the tax relief. A HHS analysis states that the GOP plan would also boost child poverty rates from 14. 5% to 16. 1%, and poor families with children would loose 6% of their income. In the end, budget reduction is no easy task. The center of attention for debate on budget cutting is politics, and whoever takes responsibility for reform gets left wide open to criticism. Although Congress and Clinton have spent the past year on debating the budget and the size of the Federal Government, most plans fall back on gimmicks, loopholes, and long-term plans. Even Democrats now agree to downsize the government, but the two parties disagree on how and where. As we trust our elected officials to make decisions in Washington on our behalf, we must show interest and aptitude on the end results. Countries like Sweden and Canada have successfully reformed fiscal policies. Sweden†s government elected to abandon welfare, pensions, health insurance, unemployment programs, family assistance, and child allowances. Their deficit soon fell by 3. 5% of GDP in one year alone. Sweden†s plan was three times as intense as Congress† current plan, while cutting spending in half the time. As for cuts, everyone must suffer. Older Americans have good reason to protect programs that they have paid into for years, but those programs spend an overall per capita amount of 11 times as much on elderly than that spent on children altogether. The youth are the future of America, and we should protect them too. Currently, poverty in US is 3 times as likely to affect the very young than the very old. By balancing the budget, â€Å"interest rates come down, the economy picks up – we will rebound,† says Representative James Greenwood, and everyone should be happy with that.

Tuesday, October 22, 2019

The Things They Carried Essay

The Things They Carried Essay Number Three Tim O’Brien’s novel, The Things They Carried, is a novel composed of war stories from the Vietnam War. O’Brien tells the stories of not only himself, but stories from the men with whom he fought alongside. The main idea of the book is what these men carried, which was not only tangible objects, but emotions as well. Digging deeper into this meaning, many of the stories were changed from their true and factual selves to half true and half fictitious stories based on that person’s emotions at that time. Many writers, such as Tim O’Brien, find more truth in fiction than on the actual occurring event.In Tim O’Brien’s The Things They Carried there is a blurred line between fact and fiction and the real Tim O’Brien and Tim’s character. Tim’s character represents his truth from his emotional views and the narrator Tim tells what really happened. Tim O’Brien’s charac ter in The Things They Carried looked in the faces of the dead, but in reality he did not have the strength to look into the faces of the deceased. He could call this his own truth because his emotions are what he was writing down. All he did was take the way that he felt and added details and faces to events that actually occurred.For most people this is their own truth. Everybody has their own truth because memories are driven by emotion and the emotions can sometimes temporarily or even permanently block out what really happened and a story from factual events is created. Throughout the majority of the novel Tim uses character Tim over narrator Tim, but he does occasionally distinguish fact from emotions. During the instance when O’Brien’s daughter asks him if he has ever killed a man O’Brien hesitates in a truthful answer. It seems as though he is greatly conflicted because he feels as if he has killed a man, but he never actually killed a man.It is as if by him being a part of the war and not helping the dying men it is a fault of his that he could not help to save them by stopping it. His emotions told him he was a murderer who looked in the face of his victim, who was a young boy he created a life story for; when in reality that boy was never his kill. To the reader it seems that he is contradicting himself, but in actuality he is differentiating between himself and his emotional character. In the chapter, â€Å"How to Write a True War Story,† O’Brien tells the reader about the blurred line between fact and fiction.He tells us what a true war story is and what it is not. According to O’Brien a true war story is never moral, instructing, or uplifting. He also tells us that in a true war story, â€Å"it’s difficult to separate what happened from what seemed to happen. † He also tells us that it is â€Å"a hard an exact truth as it seemed. † This is where the lines become blurred. As it seems f rom the way O’Brien speaks, men do not have the courage to witness entire incidences such as Curt Lemon’s death. He writes that they watch pieces of it, close their eyes, and open them some more. Everything they remember seems true to them based on the facts.Readers may never truly know what happened, but they do know what that person was feeling based on the way the story was told. There is no clear line between fact and story for author Tim O’Brien. To him the lines blur together from time apart from the event and remembering the emotions felt. His novel The Things They Carried represents this idea through its use of storytelling. All of his short stories pieced together to create the novel each represent a different form of truth for different men along with Tim. O’Brien was successful in using this blurred line between fact and story for his war stories.

Free Essays on The Things They Carried By Tim Obrien

Tough Love in â€Å"The Things They Carried,† by Tim O’Brien In Tim O’Briens â€Å"The Things They Carried,† O’Brien describes the blind obsession of Lieutenant Jimmy Cross for a young girl named Martha, a junior at Mount Sebastian College in New Jersey. Burdened by the physical and psychological aspects of the Vietnam War, Cross often finds himself daydreaming and distracted by thoughts about her. Out one day on another one of their seemingly meaningless missions, Cross and his men are investigating tunnels near the Village of Than Khe. As a result of Cross’s negligence, Private Ted Lavender gets shot in the head. Consequently, Cross destroys all of Martha’s letters and photos because he is angry with his own carelessness, and he feels so burdened with the blame of Lavenders death. Cross realizes that he spends more time thinking about Martha than thinking about the well being of his men. Cross realizes that it is not his job to be loved. It is his job to lead. Cross makes the decision to become less emotional and to enforce discipline and respect among his soldiers. In many ways the death of Ted Lavender makes cross a better soldier; it helps him prioritize what his duties are, to keep himself and his men alive. He now distances himself from the other soldiers. â€Å"They would get their shit together and keep it together†(718). All the letters and pictures of Martha are gone, but not from his memory; he can still see her face, and he can still see her in her white gym shorts. Cross is not through with love, he just has to refocus his emotions from daydreams of Martha to the will to survive. Cross knows that if he doesn’t change that he and his men will will end up dead. He knows what he has to do as a commanding officer. He has to get rid of the daydreams and the fantasies of a love that he knows is fictional. The simple facts are that he has to s... Free Essays on The Things They Carried By Tim O'brien Free Essays on The Things They Carried By Tim O'brien Tough Love in â€Å"The Things They Carried,† by Tim O’Brien In Tim O’Briens â€Å"The Things They Carried,† O’Brien describes the blind obsession of Lieutenant Jimmy Cross for a young girl named Martha, a junior at Mount Sebastian College in New Jersey. Burdened by the physical and psychological aspects of the Vietnam War, Cross often finds himself daydreaming and distracted by thoughts about her. Out one day on another one of their seemingly meaningless missions, Cross and his men are investigating tunnels near the Village of Than Khe. As a result of Cross’s negligence, Private Ted Lavender gets shot in the head. Consequently, Cross destroys all of Martha’s letters and photos because he is angry with his own carelessness, and he feels so burdened with the blame of Lavenders death. Cross realizes that he spends more time thinking about Martha than thinking about the well being of his men. Cross realizes that it is not his job to be loved. It is his job to lead. Cross makes the decision to become less emotional and to enforce discipline and respect among his soldiers. In many ways the death of Ted Lavender makes cross a better soldier; it helps him prioritize what his duties are, to keep himself and his men alive. He now distances himself from the other soldiers. â€Å"They would get their shit together and keep it together†(718). All the letters and pictures of Martha are gone, but not from his memory; he can still see her face, and he can still see her in her white gym shorts. Cross is not through with love, he just has to refocus his emotions from daydreams of Martha to the will to survive. Cross knows that if he doesn’t change that he and his men will will end up dead. He knows what he has to do as a commanding officer. He has to get rid of the daydreams and the fantasies of a love that he knows is fictional. The simple facts are that he has to s...

Sunday, October 20, 2019

Strontium Facts (Atomic Number 38 or Sr)

Strontium Facts (Atomic Number 38 or Sr) Strontium is a yellowish-white alkaline earth metal with atomic number 38 and element symbol Sr. The element is known for producing red flames in fireworks and emergency flares and for its radioactive isotope that is found in nuclear fallout. Here is a collection of strontium element facts. Fast Facts: Strontium Element Name: StrontiumElement Symbol: SrAtomic Number: 38Appearance: Silvery-white metal that oxidizes to pale yellowGroup: Group 2 (Alkaline Earth Metal)Period: Period 5Atomic Weight: 87.62Electron Configuration: [Kr] 5s2Discovery: A. Crawford 1790 (Scotland); Davey isolated strontium by electrolysis in 1808Word Origin: Strontian, a town in Scotland Strontium  Basic Facts There are 20 known isotopes of strontium, 4 stable and 16 unstable. Natural strontium is a mixture of the 4 stable isotopes. Properties: Strontium is softer than calcium and decomposes more vigorously in water. Finely divided strontium metal ignites spontaneously in air. Strontium is a silvery metal, but it rapidly oxidizes to a yellowish color. Because of its propensity for oxidation and ignition, strontium is typically stored under kerosene. Strontium salts color flames crimson and are used in fireworks and flares. Uses: Strontium-90 is used in Systems for Nuclear Auxilliary Power (SNAP) devices. Strontium is used in producing glass for color television picture tubes. It is also used to produce ferrite magnets and to refine zinc. Strontium titanate is very soft but has an extremely high refractive index and an optical dispersion greater than that of diamond. Element Classification: Alkaline earth metal Biological Role: Radiolarian protozoa belonging to the group Acantharea make their skeletons of strontium sulfate. In vertebrates, strontium replaces a small amount of calcium in skeletons. In humans, absorbed strontium is primarily deposited in bones. In adults, the element only attaches to bone surfaces, while it can replace calcium in growing bones of children, potentially leading to growth problems. Strontium ranelate can increase bone density and reduce the incidence of fractures, but it also increases the risk of cardiovascular problems. Topically applied strontium inhibits sensory irritation. It is used in some toothpastes to reduce sensitivity. While stable strontium isotopes present no significant health threat, the radioisotope strontium-90 is considered dangerous. Like the stable isotopes, it is absorbed into bones. However, it undergoes beta-minus decay and thus poses a radiation hazard. Strontium Physical Data Density (g/cc): 2.54Melting Point (K): 1042Boiling Point (K): 1657Appearance: Silvery, malleable metalAtomic Radius (pm): 215Atomic Volume (cc/mol): 33.7Covalent Radius (pm): 191Ionic Radius: 112 (2e)Specific Heat (20 °C J/g mol): 0.301Fusion Heat (kJ/mol): 9.20Evaporation Heat (kJ/mol): 144Pauling Negativity Number: 0.95First Ionizing Energy (kJ/mol): 549.0Oxidation States: 2Lattice Structure: Face-Centered Cubic Sources Greenwood, Norman N.; Earnshaw, Alan (1997). Chemistry of the Elements (2nd ed.). Butterworth-Heinemann. ISBN 0-08-037941-9.Lide, D. R., ed. (2005). CRC Handbook of Chemistry and Physics (86th ed.). Boca Raton (FL): CRC Press. ISBN 0-8493-0486-5.Weast, Robert (1984). CRC, Handbook of Chemistry and Physics. Boca Raton, Florida: Chemical Rubber Company Publishing. pp. E110. ISBN 0-8493-0464-4.

Saturday, October 19, 2019

Contract Briefing Assignment Example | Topics and Well Written Essays - 750 words

Contract Briefing - Assignment Example This decision by the Court of Appeal was reversed by the Supreme Court and the case stated to be heard in Florida as per the agreement. 3. Procedure: The District Court in Washington found for the petitioner but the respondents appealed the case. The Court of Appeal reversed the decision and found for the respondents making the petitioners seek the powers of the Washington State Supreme Court to make the final ruling. 6. Reasoning: The Supreme Court in its holding stated that the cruise ship line chose to have Florida because it housed its headquarters and is the location where majority of its cruises start and end. Since the cruise line carries passengers from different localities, it cannot afford to have different locations to hear their cases. The Shutes had prior notice from the 3 page contract sent together with their ticket but they did not provide any dissatisfaction with it and simply went along with the tour. They agreed and hence should not try and bring in the aspect of finance as a reason why the case should not be heard in Florida as the Court of Appeal explained. 2. Statement of the facts: The Spokane Housing Authority wanted to contact a company to put up windows in their building and they sought bids. Skyline Contractors Inc. had the lowest bid which but they did not fulfill the condition of having five years’ experience and the contract was awarded to WRS Contractors Inc. Skyline disapprove the winning and they appealed based on their combined experience together with its subcontractor. They were awarded the bid but they still had to present a list of all their subcontractors. They presented half the names which excluded their original subcontractor who had been mentioned before. Even before they could get the other names on the list, they were informed that the tender had been once again rewarded to WRS and they sued for monetary damages and injunctive relief. The Trial Court awarded summary

Friday, October 18, 2019

Murder of JonBenet Ramsey Case Study Example | Topics and Well Written Essays - 750 words

Murder of JonBenet Ramsey - Case Study Example Prior to the discovery of the body, the Ramsey's found a ransom note in the basement from â€Å"a foreign faction† demanding $118,000.00 for the safe return of Jon Benet (â€Å"JonBenet Ramsey Would Have Turned 22 Years Old This Week; Murder Case Remains Unsolved†, 2012). This particular piece of information pertaining to the ransom amount was a red flag for the police at the time. The amount was the exact amount that John had just received as a bonus earlier in the year, this coincidence led to the speculation that somehow, the person involved in the crime knew the Ramsey's on a personal level (Stuart, 2012). But without a follow up call on the ransom note, the Ramsey family decided that it would be in the best interest of all concerned to inform their family and friends of the situation while also preparing to follow the instructions for the ransom demand. The police began an intensive search for the child within hours only to have her father inform them that he had f ound the body of the child in the basement. The official cause of death is listed as asphyxiation due to craniocerebral trauma. But a more in-depth look at the autopsy records reveals that the child also suffered from a skull fracture and severe blunt trauma. Evidence gathered at the crime scene included a garrote made from tweed and the broken handle of a paintbrush that is believed to have been used to penetrate the child's vagina. Although there was penetration, the police could not accurately declare if sexual assault was one of the horrors that the child suffered in the hands of her abductors (Montaldo, 2013). Although a majority of the evidence collected by the police indicated that a stranger had caused the death of JonBenet, there were still certain things that led the district attorney to question the abduction theory because of the way the child's body was recovered at home. Somehow, the evidence that the DA was seeing did not add up to an abduction scenario. Rather, the s ights of the police investigating the case, and the media for that matter, then centered on the possibility that one or both parents of JonBenet had caused her death. Although the authorities and media fed the public lines that led those outside of the case to believe that Patsy and John had possibly murdered their daughter in cold blood, the courts saw otherwise. Patsy, who died of cancer in 2006, and John were exonerated by the federal courts in May 2003 due to lack of strong evidence to support the parent murderer theory (Montaldo, 2013). Their total exoneration came as new DNA evidence in the case was presented, proving that traces of DNA not belonging to family members was found on the preserved clothing of JonBenet (Gardner, 2010). With the discovery of new DNA evidence in the case, one can clearly see that, had the police not set upon a trial by publicity on the Ramsey's and concentrated instead on actual police investigation, they would have caught the actual perpetrator(s) in the case. During the course of the first investigation of the case, the police had conducted more than a few blunders that influenced the case and set upon creating a publicity machine using false leaked information to crucify the suffering parents instead. First of all, because Boulder, Colorado was known back then as a relatively peaceful and safe place for its

Compare and contrast the advantages and disadvantages of joining a Assignment

Compare and contrast the advantages and disadvantages of joining a professional association - Assignment Example rm, to voice and commiserate, and to provide affiliates a feeling that they are never alone in the hurdles opened by their profession in general (Kjellberg, 2013). Opportunities to discover new techniques, job options, among others, are priceless advantages to group members (Kjellberg, 2013). The disadvantages, on the other hand, of joining these organizations are needless fees, consumes a lot of time, needless expenses, socializing takes the attention away from career development and also they create a lot of pressure to achieve highly among its members (Harvey et al., 2003). Most professional organizations need the reimbursement of yearly fees. There might also be the first application fee (Kjellberg, 2013). Whereas $100 does not appear to be much, it accumulates when the individuals joins the national and state associations of numerous professional organizations (Harvey, 2004). Apart from the membership fees and applications, people also spend money on association lunches, breakfasts and dinners and gas expenses or transportation costs (Harvey, 2004). According to these advantages and disadvantages of belonging to a professional organization, I would opt to join a professional organization because I need access to the information, which will influence my practice. I also need people who will advocate for me in front of others and people who will develop me professionally, thus my decision to join a professional

Health and safety in the organisation Essay Example | Topics and Well Written Essays - 1500 words

Health and safety in the organisation - Essay Example The employers have a moral duty in providing a workplace for the employees that is completely safe and secure and that has no ill effects on their health. A safe and healthy work environment that is conducive to productivity would bring out the highest level of performance of the employees. The employees would be able to concentrate on their work with a relaxed mind free from concern of their health and safety (Burke,  Clarke, and Cooper 58). Also, the employees would believe that the organization is concerned about their welfare which would have the probability to develop a loyal workforce. The organizations are also bound by the rules and regulations to protect the health and safety of their workers. The maintenance of health and safety includes preventive measures against the emission of hazardous substances in the production units, recycling of wastes to reduce the adverse effects of environmental pollution, resolution and sustenance of peaceful work environment with no conflic t between the workers, etc. Inability of the organizations to maintain a safe and healthy work environment may lead to damage of the health of their employees, organizational assets and other stakeholders, clients who are present at the workplace. The families of the employees may also be affected due to such unwanted incidents in the workplace. Such situations may lead to imposition of hefty fines on the organizations by the legal and regulatory bodies. Thus, organizational concern for health and safety has legal implications (Stellman 80). The occurrence of unsafe working environment and damage of health of workers may lead to increase in costs of the organization that include medical insurance, hospitalization expenses due to sickness or injury, etc. The disorder of health and safety would lead to increase in medical leaves, sick leaves, etc. As a result, the organization would face losses of productivity and business. Thus, health and safety in the organizations have financial i mplications as the financial losses would tend to increase in case of accidents occurring due to unsafe work environment. The health and safety in the organizations encompasses a range of other fields including workplace engineering, safety control mechanisms, workplace medicine, workplace hygiene, etc. The organizations allocate proportionate expenditures in these fields with an ultimate aim of ensuring health and safety of the organization. Any drawback in implementation of the health and safety policies of the organization may lead to hazards, which may be biological hazards, chemical hazards, health hazards, psychological issues, etc. The health and safety hazards vary from industry to another. The biological hazards may be due to infectious diseases that spread from one employee to another. The virus and infected bacteria may transmit from one individual to another leading to an epidemic situation. The chemical hazards may occur due to the non-maintenance of the operation units and storage plants. Harmful chemical emission from the production units may lead to damage of health and safety of the workers of the organization. Discriminatory and unequal treatment of labors may lead to

Thursday, October 17, 2019

Product Development of Subaru Assignment Example | Topics and Well Written Essays - 250 words

Product Development of Subaru - Assignment Example It is evidently clear from the discussion that the changing trends have affected Subaru due to changes in demand for cars. The demand for the SUVs increased in the last decade while there was a decrease in the demand for small cars. Such changes in consumer behavior affect the sales performance of the products delivered to the market. The success of any new product is based on the ability to resonate with the customers which are a plus if achieved. The change in the behavior of the customer must be reciprocated with product change or improvement. The company has invested in massive customer demand research with the focus being on the preferences of the customers especially to change in design and performance of the product. The success of the new approach is evident in the success achieved in the utility vehicles developed after the research. In the modern market, the customer is king as such the company must engage research for success to be achieved. The approach of Subaru in resea rch and development has increased product performance.

Secret shopper (mystery shopper) Essay Example | Topics and Well Written Essays - 750 words

Secret shopper (mystery shopper) - Essay Example However, the purpose of this particular analysis will be compared to similar restaurants based upon the quality of the food that is offered and the quality of the services that were rendered during two distinct observed dining experiences. Further, the two experiences which will be detailed below are with respect to an experience that was had at a local Olive Garden and at a local Outback Steakhouse. Firstly, it must be stated that the actual pricing of the cuisine, whether for lunch or for dinner is more or less similar; with most dishes at both of these restaurants costing anywhere from $10-$18 per plate. However, even though the relative price differential is more or less the same, the similarities ultimately end there. The ambience of Outback Steakhouse is unique as compared to the ambulances several other restaurants that I had been to during my lifetime. Firstly, upon entering the steakhouse, the dining area is extraordinarily dimly lit; causing a situation in which an individual could likely stumble over any article on the floor that they might not otherwise see. Within the particular Outback Steakhouse that I went to, I was not greeted upon entering the front door. Instead, there was a rush of waiters and waitresses that brushed by me in a frantic struggle to serve the guests that had already been promised tables. Similarly, as I was waiting, I did not receive a nod or r ecognition that I would be seated anytime in the near future. Instead, it appeared to me that the wait staff was actively avoiding my glance. Eventually I was seated and there remainder of the dining experience proceeded as it should have. The take away that must be had from all of this is that the restaurant can only be measured based upon the two metrics that have thus far been stated. However, due to the fact that the dining experience that has been described fell flat on one of these, the likelihood of me

Wednesday, October 16, 2019

Health and safety in the organisation Essay Example | Topics and Well Written Essays - 1500 words

Health and safety in the organisation - Essay Example The employers have a moral duty in providing a workplace for the employees that is completely safe and secure and that has no ill effects on their health. A safe and healthy work environment that is conducive to productivity would bring out the highest level of performance of the employees. The employees would be able to concentrate on their work with a relaxed mind free from concern of their health and safety (Burke,  Clarke, and Cooper 58). Also, the employees would believe that the organization is concerned about their welfare which would have the probability to develop a loyal workforce. The organizations are also bound by the rules and regulations to protect the health and safety of their workers. The maintenance of health and safety includes preventive measures against the emission of hazardous substances in the production units, recycling of wastes to reduce the adverse effects of environmental pollution, resolution and sustenance of peaceful work environment with no conflic t between the workers, etc. Inability of the organizations to maintain a safe and healthy work environment may lead to damage of the health of their employees, organizational assets and other stakeholders, clients who are present at the workplace. The families of the employees may also be affected due to such unwanted incidents in the workplace. Such situations may lead to imposition of hefty fines on the organizations by the legal and regulatory bodies. Thus, organizational concern for health and safety has legal implications (Stellman 80). The occurrence of unsafe working environment and damage of health of workers may lead to increase in costs of the organization that include medical insurance, hospitalization expenses due to sickness or injury, etc. The disorder of health and safety would lead to increase in medical leaves, sick leaves, etc. As a result, the organization would face losses of productivity and business. Thus, health and safety in the organizations have financial i mplications as the financial losses would tend to increase in case of accidents occurring due to unsafe work environment. The health and safety in the organizations encompasses a range of other fields including workplace engineering, safety control mechanisms, workplace medicine, workplace hygiene, etc. The organizations allocate proportionate expenditures in these fields with an ultimate aim of ensuring health and safety of the organization. Any drawback in implementation of the health and safety policies of the organization may lead to hazards, which may be biological hazards, chemical hazards, health hazards, psychological issues, etc. The health and safety hazards vary from industry to another. The biological hazards may be due to infectious diseases that spread from one employee to another. The virus and infected bacteria may transmit from one individual to another leading to an epidemic situation. The chemical hazards may occur due to the non-maintenance of the operation units and storage plants. Harmful chemical emission from the production units may lead to damage of health and safety of the workers of the organization. Discriminatory and unequal treatment of labors may lead to

Tuesday, October 15, 2019

Secret shopper (mystery shopper) Essay Example | Topics and Well Written Essays - 750 words

Secret shopper (mystery shopper) - Essay Example However, the purpose of this particular analysis will be compared to similar restaurants based upon the quality of the food that is offered and the quality of the services that were rendered during two distinct observed dining experiences. Further, the two experiences which will be detailed below are with respect to an experience that was had at a local Olive Garden and at a local Outback Steakhouse. Firstly, it must be stated that the actual pricing of the cuisine, whether for lunch or for dinner is more or less similar; with most dishes at both of these restaurants costing anywhere from $10-$18 per plate. However, even though the relative price differential is more or less the same, the similarities ultimately end there. The ambience of Outback Steakhouse is unique as compared to the ambulances several other restaurants that I had been to during my lifetime. Firstly, upon entering the steakhouse, the dining area is extraordinarily dimly lit; causing a situation in which an individual could likely stumble over any article on the floor that they might not otherwise see. Within the particular Outback Steakhouse that I went to, I was not greeted upon entering the front door. Instead, there was a rush of waiters and waitresses that brushed by me in a frantic struggle to serve the guests that had already been promised tables. Similarly, as I was waiting, I did not receive a nod or r ecognition that I would be seated anytime in the near future. Instead, it appeared to me that the wait staff was actively avoiding my glance. Eventually I was seated and there remainder of the dining experience proceeded as it should have. The take away that must be had from all of this is that the restaurant can only be measured based upon the two metrics that have thus far been stated. However, due to the fact that the dining experience that has been described fell flat on one of these, the likelihood of me

Susan Hills Im the King of the Castle and L.P Hartleys The Go-Between Essay Example for Free

Susan Hills Im the King of the Castle and L.P Hartleys The Go-Between Essay A comparative study of the role of children and the presentation of the experiences in fiction as illustrated in Susan Hills Im the King of the Castle and L.P Hartleys The Go-Between. The world of the child is often one of intense emotion, confusion, pain and suffering and is a rich source of material for the novelist Having only been alive for about twelve years, the lead characters of Im the King of the Castle and The Go-Between are inexperienced. The intense emotion, confusion, pain and suffering that a child would go through is caused by this. Adults have the advantage over children. They have faced these things before and got through them; the knowledge and experience from childhood that they use to get through bad times as adults is what helps them. Not having such weapons, children react very differently. Im the King of the Castle has a prime example of a boy, Charles Kingshaw, being bullied and not knowing what to do; as this had not happened before, he does not have the experience. Leo, the main character of The Go-Between, is an example of how a pursuit of knowledge can harm a naà ¯Ã‚ ¿Ã‚ ½ve, inexperienced boy. A novel with children in these situations can be very emotional and is thus a rich source of material for the novelist. The similarities that these books hold become apparent very early on. The main character in both are boys and of roughly the same age. Both Leo and Kingshaw have a personality that makes them vulnerable to the bullying which takes place. Romantic, sensitive Leo was easily manipulated into being the go between for Marian and Ted; his imaginative nature meant that he would always wonder what was in the notes, but his ethical beliefs, based on a school boys code which everyone followed, meant he that could not read the notes as they were always sealed. In class and out I had often passed round notes at school. If they were sealed I should not have dreamed of reading them; if they were open I often read them indeed, it was usually the intention of the sender that one should, for they were meant to raise a laugh. Unsealed one could read them, sealed one couldnt: it was as simple as that. Kingshaw was also very imaginative; his encounter with the crow in the field gave him a weakness, which Hopper exploited. His imagination ran wild, terrifying him in the case of the red room and the crow. He thought that the corn might be some kind of crows food store, in which he was seen as an invader. Perhaps this was only the first of a whole battalion of crows, that would rise up and swoop at him. Get on to the grass then, he thought , get on to the grass, thatll be safe, itll go away. He wondered if it has mistaken him for some hostile animal, lurking down in the corn. He was both attracted and repelled by the red room and what it held, as Leo was with the deadly nightshade. I was prepared to dread [the deadly nightshade], but not prepared for the tumult of emotions it aroused in me. In some way it wanted me, I felt, just as I wanted it; and the fancy took me that it wanted me as an ingredient, and would have me. Though Kingshaw had a brief friendship with Fielding, and Leo had Marcus, they were both, to all intents and purposes, alone. Marcus, being ill, gave Leo the chance to start being the postman, and by the time he was well again Leo was too caught up in it. The more I thought about these expeditions in Marcuss company the more impractical did they seem and the less I liked the prospect of them. Nor, though I practised in deceit and an uncritical upholder of the no-sneaking tradition, did I relish the idea of deceiving Marcus not on moral grounds, for any system of ethics, as distinct from the school code, I barely recognised but because I felt it would spoil our relationship. If Marcus had been there the whole time, Leo would not have been able to start taking the letters. The fact that the boys were both in a new, strange environment, Leo visiting some rich friends and Kingshaw having to move in with these strangers as his Mother was hired as the housekeeper, did not help the feeling of being alone. The only person Kingshaw had was his Mother and, in an effort to fit in, his mother sided with Hooper over Kingshaw in most situations even though Kingshaw was innocent. Charles, how can you speak like that, how can you be so naughty? I didnt touch him. Then why ever should Edmund say that you did? I am quite sure he would have no reason to tell an untruth. Oh yes, he would, hes a sneaky little liar, hed say anything. Well I didnt touch him. Oh, what a way to speak! You make me so ashamed of you. In The Go-Between it was the adults, the supposed carers, who were doing the bullying. In a way, it was similar to Im the King of the Castle, as it was not only Hopper bullying Kingshaw, but the adults, too, bullying them into being friends and siding with Hooper. The similarity in the way the boys relate, Leo and Marcus in The Go-Between and Kingshaw and Hooper in Im the King of the Castle, is also different. Both pairs of friends are fighting physically and verbally. However in the case of Marcus and Leo it is in jest; it is the way they relate as friends, although they are almost rivals. Often when we talked there was a spirit of verbal rivalry between us; we trod the knife-edge between affection and falling out; Yet in the case of Kingshaw and Hooper it is meant as harm: Youd better shut the window, Kingshaw said, its my window now. Hooper turned, hearing the new note in his voice, considering what it meant, and hearing the tremor of anxiety, too. He raised his fists and came at Kingshaw. The scrap was brief and wordless and violent. After that first fight, Kingshaw realises he is capable of a violent act. Hooper has brought out violent impulses in Kingshaw that he did not know were there. Leo, however, never reacted violently to the bullying adults. Though both Kingshaw and Leo almost allow the bullying, Leo does not realise they are bullying him into taking the notes so reacts differently. Whereas Hoopers bullying is more obvious, Ted and Marian are more subtle. Leo does what Marian and Ted say because he likes them. He admires Ted as a male role model substituting for his father and he thinks he is in love with Marian. Also Ted exploits his quest for knowledge, especially about spooning, and his inquisitive nature. Well, [Ted] said, Lets make a bargain. Ill tell you all about spooning, but on one condition. I knew what he was going to say, but for forms sake I asked: What is it? That youll go on being our postman. I promised, and as I promised the difficulties in the way seemed to dissolve. Really he neednt have added that final bribe. Kingshaw, however, acted as he did because of his fear of Hooper. However the power did occasionally switched to Kingshaw. When they were in Hang Wood during the storm and when they were climbing the castle, Hooper became afraid, and Kingshaw was the King of the Castle for a little while, but the power always returned to Hooper. Leo never had the upper hand though. He kept taking the notes right to the end. The most obvious technical difference between these two novels is the narrative. The Go-Between is a first person narrative. It is Leo as an old man looking back at his summer in the house. This gives the story a bias as you can only see the thoughts of Leo, giving the reader a sympathy towards him. Im the King of the Castle is, however, in the third person narrative. In this way, it is more neutral. You can see the thoughts of all the characters, and feel a sympathy for each, in a different way. It helps one to understand the characters a little better. Like the opening of the novel where Mr Hooper comes back from visiting his dying father. I am only showing respect now, to behave towards my father as I should because he is dying, because he is almost gone away from me. This helps the reader see that Mr Hooper is a caring man yet is unable to show or act upon his emotions. Because of changing social circumstances, it is harder to understand the thoughts and actions of Leo. It is hard to accept his naivety. In our society, a twelve year old boy would have no difficulty in coming to the conclusion that these secret business notes were in fact love letters but in the 1900s there was no media or social acceptance of discussing personal relationships. Totally ignorant as I was of love affairs, and little as I knew about their conventions, I felt sure that when a girl was engaged to a man she did not write letters to another man calling him darling. She might do it up until the day of engagement, but not after. It was automatic; it was a rule: like leaving the wicket at cricket when you were out; and it scarcely crossed my mind that to comply with it might be painful. However the idea that a twelve year old boy might kill himself as a result of bullying is more believable as this still happens in todays society as it did in the 1950s. Both books have a suicide at the end though in Im the King of the Castle it was the bullied and in The Go-Between it was the bully. Though these books hold some similarities they are also quite different. Though they both present the children in the same way, having similar personalities and experiences, they present those experiences differently. The role of these children also differs; Kingshaw is seen as a victim, and, though Leo is a victim too, in some ways he is almost considered the hero of the novel.

Monday, October 14, 2019

What Do Ethics Have To Do With Research?

What Do Ethics Have To Do With Research? Ethical behavior is defined as a set if moral principles, rules or standards governing a person or profession. Most importantly, principles of ethical conduct includes that the researcher should do no harm, that privacy of and anonymity of participants must be protected, that confidentiality of information must be maintained, that informed consent of participants needs to be obtained including assurance that participation is voluntary, with the chance to withdraw from the proposed research, that inappropriate behavior must be avoided, and that, data must be interpreted honestly without distortion. Lastly, the extent to which participants are to share in data ownership and any benefits from the research must be considered. Although the principles seem straightforward, a series of example were provided that exemplified the difficulty in adhering to the principles, often because situations may have a complex array of conflicting interests. The report presents and identifies range of ethical issues on possible divergence that researchers have to deal with when undertaking or participating in research. Following on, ethical considerations in quantitative and qualitative research the investigator must scrutinize; among others are relevant examples of cases that revolve around unethical issues and the penalty of violation. The role of IRB was discussed, which precedes discussion on how ethical issues in research can be solved the conclusions and final remarks. Chapter 1 Introduction What do ethics have to do with research? Ethical code or moralities are expression of how we should behave as individuals and as a society. They are moral judgments that can be applied to particular situations to help us make decisions and guide our behaviors. Without doubt, they are linked to cultural values at a precise time in our history and are subject to change as attitudes and values evolve. What is well thought out to be insensitive today can be normative, just a half century ago. In doing research there may be a conflict between the speedy conduct of a study and the trouble of doing what is deferential to humans or even animals. While, researchers are focused on knowledge expansion and on the methodology of their projects like personnel and equipment, statistical analysis, selection of subject, research protocols and sample size. At the same time, as essentially accountable persons, they try as much as possible to respect the research environment, which requires attention to the suitable exercise not only of physical resources including funds, but also to animal and human subject matter. Merely whilst the research is of adequate quality to potentially contribute to knowledge can we justify involving participants and making use of other resources? Ethical considerations may help to decide whether the research should be done, and if so, how it should be pursued. Thus, it is vital to be capable, transparent, sincere, and adhere to ethical guidelines in regard to research subjects. Definition of Terms: Research Pearson: (1995-2010 prentice Hall) Research is the systematic process of collecting and analyzing information to increase our understanding of the phenomenon under study. It is the function of the researcher to contribute to the understanding of the phenomenon and to communicate that understanding to others. Ethics: Consider the problem of definition of ethical. Ethics, as a term, is commonly used to refer both to morals beliefs beliefs about what are right and wrong to do and ethical theory (justifications for moral beliefs) (Beauchamp and Bowie, 1997). Obviously, ethical issues can be raised throughout all phases of research, notably problem definition, stating research objectives/ hypotheses, literature review, choice of research design, questionnaire design, data collection procedures, data editing and cleaning, choice of statistical methods, data analysis, conclusions and recommendations, and even referencing. Writers vary widely on ethical issues in research. Often, they oppose on what is and is not morally satisfactory in social research. Debates about research ethics highlights certain tremendous cases of supposed ethical wrongdoing, although in fact the latent for unethical research is much larger. Some cases of unethical research are often associated with particular research methods, s uch as disguised observation and deception in experiments. In as much as ethics apply at every stage of the research, it is very imperative as a researcher to uphold ethics in research as this is what the industry mostly needs: Trust- Decision makers trust researchers to make provision for precise information Confidentiality and professionalism Goodwill- This is applicable to the respondent for their willingness to volunteer their personal information on their awareness, manner and deeds. This paper discusses the significance of ethics in research, considerations the researchers must scrutinize and the penalty of violation. Research must be carried out in a safe and ethical approach. The paper will look into range of ethical issues (procedural ethics, practices and cases of ethical violation) in the next session. Chapter 2 Ethical issues in research Ethics is an essential part of any research project. One may assume ethics is just another stage of research, one that is tackled with filing out a standardized set of forms submitted to an ethics committee. (e.g. IRB) may not lend itself to effectively assessing ethical issues. Ethics has become a cornerstone for conducting effective and meaningful research. As such, the ethical behavior of individual researchers is under unprecedented scrutiny (Best Kahn, 2006; Field Behrman, 2004; Trimble Fisher, 2006). In todays society, any concerns regarding ethical practices will negatively influence attitudes about science, and the abuses committed by a few are often the ones that receive widespread publicity (Mauthner, Birch, Jessop, Miller, 2003). Clearly, researchers have liabilities to their line of work, patrons, and respondent and are obliged to high ethical standards to make certain that both the purpose and the information are not brought into ill repute. As a branch of philosophy it deals with the dynamic of decision making concerning what is right and wrong. Scientific research works, as all human activities, is overseen by individual, community and social values. Research ethics engage requirements on daily work, the protection of dignity of subjects and information in the research that is being made known. In recent years ethical thoughtfulness have come to forefront, however, as a Doctoral candidate embarking on a research project, participating in research, we must cope with value systems that are very fundamental in the course of the study. The societal value, which is about the human rights, and the values about the scientific query. (Clarke, 1991) points out that the values may clash with value subjects, communities, and societies and create tensions and dilemmas. Ethics as a discipline deals with the broader value system of our society that encompasses the consensual agreement on what is right and wrong. This set of values is much broader than that which is legislatively defined as legal and illegal. These principles are the essential underpinning that helps to maintain civil and tranquil acceptance and agreement within society. The scientific community needs to address and resolve ethical problems not only because of their natural un-acceptableness to scientific research, but also to avoid the corrosive effect these problems eventually will have, if not resolved, on our society mores. We need to be deeply involved in the ethical dialogue to at least maintain, and if possible, raise the barrier of unethical behavior in science. A climate of silence with regard to these problems will undoubtedly result in lowering ethical barriers, to the determinant of our society. In this paper, the most significant ethical issues will be addressed. This stu dy will also attempt to highlight the possible divergence that researchers have to deal with when undertaking or participating in research. Ethical issues that affect research conduct Whether a researcher is a psychologist, education or anthropologist, the primary responsibilities is to help protect participants and aim should be clear: to consent ought to be obtain, protecting the participants from harm, and privacy should be ensured. Though, there is one area of responsibilities that is often less clear for both the researcher and the participant, which is intentional deception. These areas are covered in more detail below. Informed Consent: This involves the procedure by which an individual may opt whether or not to be involved in the proposed study by the investigator. The task of the researcher is to make certain that participants have a complete of the purpose and methods to be used in the study, the risk involved, and the demands placed upon them as a participants (Best Khan,2006; Jones Kottler, 2006).) The participant must also understand that he or she has the right to withdraw from the study at any time. The two forms of consent are direct and substitute. Direct consent is the most preferred because agreement is obtained directly from the person to be involved in the study. Substitute consent, or third-party consent, is given by someone other than the person to be involved in the study. Substitute consent may be obtained when it is determined that the person does not have the capacity to make the decision or is dependent on others for his or her welfare, such as children under the age of 18 or people with cognitive or emotional disabilities (Nagy, 2005a; Roberts, Geppert, Coverdale, Louie, Edenharder, 2005). Both direct and substitute consent must meet the requirements for informed consent. Harm: Psychologists must take reasonable steps to avoid harming their clients/ patients, students, supervisees, research participants, organizational clients, and others with whom they work, and to minimize harm where it is foreseeable and unavoidable. (American Psychological Association, 2002, p. 6) When psychologists become aware that research procedures have harmed a participant, they take reasonable steps to minimize the harm. (American Psychological Association, 2002, p. 12) The most basic concern in all research is that no individual is harmed by serving as a participant, as suggested above by the APA and AERA codes of ethics. In the context of research ethics, harm may be broadly defined to include extreme physical pain or death, but also involves such factors as psychological stress, personal embarrassment or humiliation, or myriad influences that may adversely affect the participants in a significant way. Certain types of investigations present potential harm to participants . Research that involves physically dangerous treatment may present real possibilities for harm if the treatment is inflicted on the participants. Unfortunately, there are examples of investigations in which ethical principles were violated in an extreme fashion (see Young, 2005). Other areas of research are specifically intended to examine the effects of psychological or emotional stress. Such research represents tremendously difficult circumstances, especially when the procedures involve actual infliction of stress. There is always the possibility that a subject may become seriously ill (e.g., have a stroke or heart attack) as a result of the stress. In addition, the possibility exists that the stress itself may be harmful to participants from a psychological standpoint. People who are institutionalized or incarcerated, such as prisoners, person with severe disabilities, or people with serious mental illness, may agree to participate in a study either because they should to be abl e to show evidence of good behavior or to gain approval of supervisors. Unfortunately, some troubling examples of ethical violations have occurred with the studies involving these individuals (Field Behrman, 2004; Moser et al., 2004). Highly vulnerable populations should not be taken advantage of in the name of science. Researchers investigating topics involving these individuals must exercise extreme care. Very young children, the elderly, or people with disabilities may be easily convinced that most activities are important, are of little harm, and should be engaged in for the benefit of society (Drew Hardman, 2007; Quadagno, 2005). Privacy: Researchers should know that this is the point at which the objective of study and the right to privacy may come into conflict. Frequently, research of this nature is aimed at obtaining information concerning attitudes, beliefs, opinion and behavior. Thus, pursuing the goals of science, while guarding against unnecessary invasion of participants privacy, present complex issues. As with other ethical thoughtfulness, privacy has become more and more valued right. Seeking privacy is an act of isolation or confidentiality removed from public view or knowledge. According to Hill (2005) identifies three imperative elements to confidentiality in research with participants. These are Public confidentiality- not identifying research participants in study reports, presentations and so forth: Social network confidentiality- not passing on information to family members, friends or other known to the participants, and lastly, third party breach of privacy- where a group or household members reveals something personal about another. (Hill, 2005, p. 75). Privacy considerations in research include both the need to have a safe, private physical location in which the research is conducted, and making sure that participants privacy through anonymity and confidentiality. For example, both these privacy aspects are high lightened in a UK study with lesbian and gay participations that were vulnerable, due to stigmatized identities (Valentine et al., 2001). However, this study, it is vital to have a safe research space in which participants could speak in pr ivate and liberally, and to protect their anonymity and confidentiality so that they were not identifiable. Deception: This occurs when the researcher provides misleading or withholding information from participants about the project. Deception is permissible when the benefits outweigh the costs. This happens when the investigators present their research as something other than what it is. Dishonesty should be minimized and when necessary, the degree and effects must be mitigated as much as possible. However to highlight more on this issue, deception refers to either an omission or a commission on the part of the researcher in terms of interactions with participants. An omission deception could mean that investigator does not fully inform participants about important aspect of the study. Other information or part of it is usually withheld. Commission is a situation in which the researcher lets out false information about the investigation, either to some extent or entirely. More so, the participants may not be aware of the ongoing study, but only to be informed about a section of it. Secondly, they are aware of their involvement in the study, which is out of the ordinary, giving them misleading information regarding the proposed study or activity. Apparently, in this situation the researcher is misrepresenting the study. Regardless of the precise nature of deception, it has become a very prominent issue for investigators concerned with the ethics of conducting research.As we move through the first decade of the 21st century, deception is receiving widespread attention in educational and social science research with increasing concerns regarding its use on the Internet (Keller Lee, 2003; Lichtenberg, Heresco-Levy, Nitzan, 2004; Mishara Weisstub, 2005; Nagy, 2005c; Pittenger, 2003). The next chapter will discuss ethic al considerations in the context of quantitative and qualitative research, how the rationale is to inform researchers as to the ethical issues that possibly will be specific to a given research approach. Ethical considerations in Quantitative and Qualitative research Conceptually, the ethical considerations for both quantitative and qualitative research are the same safety and protection of human rights These are mainly achieved by using the process of informed consent The utilization of informed consent is problematic in quantitative research, but practically impossible in qualitative methodologies in which the direction that the research takes is largely unknown (Ramos 1989) Munhall (1988) argues that informed consent can be achieved in qualitative research by re-negotiation when in expected events occur, but one can argue in turn that this places greater responsibility on the researchers, as well as requiring them to possess a high level of skill, especially in negotiation. Ethics and quantitative research This involves studies of which data that are analyzed are in form of numbers. In this kind of approach, behaviors are counted, accurate answers or miscalculations are counted, and other kinds of measures are documented in terms of quantity. This type of research involves experimental and non experimental research. Ethical issues in experimental research focus on individual protection that receives an intervention. For example, an intervention may involve training participants in group communication where a great deal of self disclosure is required. This is a technique where people are instigated to talk about their feelings, attitudes, and experiences, of which this may be quite personal. In addition to the problems related to participants who receive an experimental treatment, there are also difficult ethical issues involving those who are in a placebo or control group. Such would be the case where one group of students in a high school receives a newly developed science program (ex perimental treatment) that appears to be very effective, and a second group receives the science program that was used for many years with limited effectiveness (control group). One ethical perspective is that the researcher has the responsibility to provide the new treatment to all participants. However, some researchers may have a very different view. This opposing perspective is often called the natural state argument. This argument contends that the untreated participants are not being denied a benefit they already have; they are merely being left in their natural state. In the example above, the high school students in the control group continued to receive the science program that had been used in the school for many years. Clearly, neither of the above positions is acceptable for all research (Field Behrman, 2004; Gross, 2005; Roberts et al., 2005). Ethical issues also exist in conducting no experimental research where an investigator does not impose or manipulate conditions. Although ethics in no experimental designs (e.g., survey research) are often less complex or harmful than experimental studies, it is important for investigators to be aware of basic principles for protecting the participants, including full disclosure and consent. For example, in survey research, each respondent should be fully informed as to the purpose of the study, participant demographics (e.g., teachers, college students, and the general public), confidentiality of responses, how the results are intended to be used, and who will have access to the data. Bacon and Olsen (2005) also indicate that survey researchers have the ethical responsibility of not wasting a respondents time and to only collect data that has utility (real use). Schenk and Williamson (2005), in discussing the ethical responsibilities involved in conducting no experimental research on children, suggest if the information gathering activity will not directly benefit the children involved or their community, do not proceed (p. 17). Ethics and qualitative research This kind of approach involves recorded data in narrative descriptions, not numbers. A researcher makes use of qualitative methods to observe and describe conditions rather than control them. An essential ethical principle for qualitative researchers is this: Do not interfere with the natural setting under the study. More to the point is the fact that participant and non participant observations are vital components of qualitative research and are used extensively in the fields of education, sociology and anthropology. However, each presents unique ethical issues in regards to consent, privacy and deception (Brinkmann Kvale, 2005; Haverkamp, 2005). Informed consent is necessary but can be problematic when relying on observations in a qualitative research study. Although potential harm from treatment is not generally a threat, there are other ethical concerns. Clearly, there is a substantial threat to privacy. A revelation of observed conversations and behaviors could cause harm to p articipants in their families, communities, or place of employment. In addition, the actual research participants, who have given consent, may not be the only people observed. In natural settings, people move in and out of interactions and settings for many reasons (Creswell, 2005; Denzin Lincoln, 2005). To conclude, from the discussion quantitative and qualitative methods are dissimilar; one approach is not superior to the other, both have recognized strengths and weaknesses and are used preferably in combination. Recognizing the tension between researchers about quantitative and qualitative research, and attempting to comprehend it, may serve to create relevant and distinctive modes of enquiries. Cases that revolves around unethical issues As more and more organizations, industries realize the importance of ethics in research; they take initiatives to apply them at every stage of their investigation. Some examples of cases are been looked into below: Case 1: Two infamous studies of obedience to authority The ethical principle of beneficence refers to the Hippocratic be of benefit, do not harm. Beauchamp and Childress, puts forward that the principle of beneficence includes the professional mandate to do effective and significant research so as to better serve and promote the welfare of our constituents. According to the studies Milgrams (1963) electric shock experiments and Haney, Banks, and Zimbardos (1973) prison studies were perceived as villainous, and to further investigate the issues, the experiment conduction was not in accordance with the principles as expected, and more to the point is the fact that, provision for precise intention was not known by the participants. The complex ethical issues raised in this studies relates to the potential harm that was incurred by partakers. Ford and Reutter, (1990) points out that beneficence relates to the benefit of the study, while non malificence relates to the potential risk of participation. Non malificence requires a high level of s ensitivity from the researcher about what constitutes harm. While Burns and Grove (2001) discomfort and harm can be physiological, emotional, social and economic in nature. As a researcher you do not want to do anything that would cause physical or emotional harm to your subjects this could be something as uncomplicated as being cautious how responsive or tricky questions are worded during the experimentation. As stated in the studies, there was no consideration of all possible consequences of test and or balance of the risk with proportionate benefit. Conversely, to justify these benefits there is need for a precise safeguard and guidelines to protect the interest of the subject involved in the experiment conduction. Case 2: A covert study of unofficial rewards Researchers involved in research have to consider many ethical problems relating to the issues of informed consent. In addition, they must ascertain that the participants have comprehended fully their right to withdraw at any time. According to the study, Daltons (1959), one of the key ethical issues is the concerns of lack of informed consent, as participants were in no position to be able to judge whether or not to become involved in the research, as they were only vaguely aware of the nature of researchers interest. Consent, can however, be a major ethical issue for researchers, they need to provide full explanation at the end of their data collection, even if they cant disclose to the participants, the true research objectives. Although the strategy of the researcher was to help protect their anonymity. Apparently, the respondent had volunteer to give out there personal information since they trusted the researcher in other words he should protect their dignity and privacy as wel l. Researchers are expected to obtain informed consent from all those who are directly involved in research or in the vicinity of research. This principle adheres to a larger issue of respect to the participants so that they are not coerced into participation and have access to relevant information prior to the consent. Case 3: Studying health-seeking behavior When embarking on a research, one should be sure that they are not taking advantage of easy to access of individuals. Sound ethical suggests that it is the duty of researchers to preserve, protect privacy, dignity, well being and freedom of the participants. Meaning to say potential participants are entitled to know the purpose of and nature of the proposed research so as to choose whether or not to be involved. According to the case, a team of social scientist are concerned about the improvement of womens health, of which they wants to learn why women do not return to hospital for the results of Papanicolaou (Pap) tests. The aim of the research is to find out how to improve services to these women. As pointed out in the case, social scientists were granted permission to conduct their investigation, and were also provided with records of patience in the hospital with names and addresses so as to enable them visit the patients in their homes. The ethical issues been violated, is the c oncerns of lack of informed voluntary consent, invasion of privacy and confidentiality. This principle adheres to a larger issue of respect to the respondents assuring that confidentiality of information shared and anonymity wont be revealed. The subjects were to be informed of the proposed research involving them; thereby they can express their views and opinion, knowing that the information is going to be utilized in a confidential manner. It is not justifiable to grant permission to the investigator to use the records of the potential patients without their consent as a matter of fact I will say confidentiality was breached in this situation, of which it wasnt inappropriate that the they paid the patients visit at their residence without their permission.(Adapted from material developed by the UNDP/ UNFPA/WHO/World Bank Special Programme of Research, Development and Research Training in Human Reproduction, Bangkok Thailand, 2004.) Case 4: Invasion of privacy in visual research Whether a researcher is a psychologist, educator, or anthropologist, the primary responsibilities to participants are clear: obtain consent, protect from harm, and ensure privacy. However, there is one area of responsibility that is often less clear for both the researcher and the participants: intentional deception. They may have a combination of these and other characteristics that render them unable to exercise free will and make decisions. For such individuals, the question then becomes one of who can give consent on their behalf and what should be considered in the process. There is a need to constantly be vigilant in these situations. Gall 1996, states that all researchers have good intentions, but if they are not careful, their studies can place individuals in situation that involves risk. The issue in the case revolves around anonymity and confidentially of which this is potentially more problematic due to the recognizability of what is involved in the proposed research. Part icipant feel positively about been involved in any test or experiment, it is because of the fact that it will serve as a useful purpose. Some actually enjoy been the subject and are quick at giving their opinion, while others strongly resent or even mistrust aim of the research. This is as a result of the fact that most participant fear if sophisticated techniques to probe their deepest feeling and utilizing this knowledge might be used against them. In as much as legal issue is more complex, specifically the one pertaining to copyright ownership, researchers are supposed to take measures to protect dignity and privacy for their employment not to be in jeopardy. Researcher should carefully weigh the gains achieved against the cost in human dignity. There should be a provision of full and accurate explanation to participants at the conclusion of study, including counseling, if appropriate. An example is when a researcher pretends to be who they are not in order to carry out their intention. On the other hand, this method can result into a severe invasion of privacy and the researchers obtain information they would prob ably never have known. Case 5: An example of an ethical fieldwork dilemma Robbins and Trabichet (2009) defined a dilemma as a situation where one has to choose between two options but does not know which side to take because both seem legitimate (p.52). Complexity and uncertainty are other distinguishing characteristics of an ethical dilemma, Ethical dilemmas are dilemmas because the right course of action is not always clearly visible (Liddell, Cooper, Healy, Stewart., 2010, p14). Kitchener (1984) described an ethical dilemma as a situation where there are good, but contradictory ethical reasons to take conflicting and incompatible courses of actions (p. 43). In the case of Holliday (1995: 17-18) the issues of ethical dilemma faced was that the participant was technically coerced in committing industrial espionage. This involves such unethical and or illegal behavior so as to help disclose operational secrets or even production formulas. This is not intentional but due to the crisis pressuring the company owner, he was looking for a means of helping his business succeed. Each companys culture is different, but some stress profits and results above all else. In the ongoing situation within the company setting, the company owner has turned a blind eye to ethical breaches since the participant has no choice other than to execute the proposed intent offered, giving the firms mentality of the end justifies the means. Conclusively for the cases, ethical issues, conflicting values and ambiguity in making of decision, are persistently emerging from literature review on research. Due to lack of simplicity in ethical standards researchers must endeavor to develop an awareness of this issues and an effectual framework to deal with these problem involving human rights. This is very obligatory in order to come into terms with the issues of the researchers value relative to the rights of individual versus the interest society. As long as there are professional codes, laws, regulations, and ethics committees can make provisions for guidance but the final determinant of how research is conducted, rest with the researchers value system and moral code. Chapter 3 Discussion on how ethical issues in research can be solved As researchers or students, you are bounded by the code of conducts and ethical standards imposed by college or university. In as much as there is an establishment with Institutional Review boards (IRBs), their job is to make certain that, research involving human subjects must be reviewed, approved and monitored. This is a design made for critical oversight. As pointed out by Bi