Monday, September 30, 2019

Effect of Technology and Network Security Support on Information Security Essay

Introduction Information security has become one of the challenges in ripping benefits of information technology. It has been found out that most people fear using modern information and communication technology due to fear of the privacy of their personal details. Information technology has supported the growth of online services like e-commerce, e-banking, e-governance, and many others which required people to give their sensitive personal details. However, practice like hacking and others which breach security of information have eroded personal confidence in use of ICT service. Information security can be described as the act of giving protection to information and systems by denying unauthorized access, use, disclosure or modification. The effect of Technology on information security The following are the technological methods that are used in ensuing information security; Authentication Authentication is the process through which a person or any other things undergoes through a verification process to determine whether it is the one. It is the way through which something or someone is confirmed to establish whether the claim made is actually true (McNab, 2004).   Authentication may involve confirmation of personal identity, origin of any artifact or basically making assurance that computer programs is trusted. Authentication is one of the commonly used methods of ensuring information security. It may be implemented through different methods including; Password A password can be defined as private information that is only known to the owner. A password assigns a user identity which is associated with the password. The password therefore becomes the gateway for the user to access that particular identity (Information Resources, 2009).   Passwords are personal and therefore the standard of the password is very important. Strong passwords are difficult to guess as compared to weak passwords and therefore they offer more security to private information. It is important that user safeguard their password and once they suspect that someone else has accessed their passwords they should consider changing them to ensure security. Token A security token is a hardware device that is used by the owner to authenticate their identity.   Once the device is recognized by the network, the user is given access to the system.   A token can be in different forms ranging from smart cards, key fob, and many others (Erin, 2005).   Tokens provide high level security through two-factor authentication method. First, the owner has a personal identification number or PIN which authorizes them to access the device. Second the device displays that PIN number of the user to the system which allows them to access the system. Unlike passwords, token are more secure since even if the device falls in wrong hands, it will be difficult to guess the PIN.   The four types of tokes include static password, synchronous dynamic password, asynchronous password, and challenge response. Biometrics Biometric is one of the most advance authentication techniques that are used when dealing with many people. It will be observed that today, everyone enters in a baseball match after their physical characteristics have been recorded in a system while in school kids use their thumb to access meals. These represent the commonly used biometric techniques where the emphasis is one authentication using personal physical characteristics (Down and Sands, 2004).   Biometric uses different physical characteristics including eye, face, voice, fingerprints, shape of the hand, and many others. These characteristics are quite unique to every individual and they are one of the strong proofs to the personal identity.   However, biometric authentication devices are very costly to buy and maintain and therefore they are used in very sensitive situations. One of the greatest weaknesses of this method is that it is very easy to attacked stored comparison images than to copy those physical traits.   In most cases, biometrics is used as a two factor authentication methods where a password is combined with personal physical appearance. Software There are a number of softwares that have been developed to protect information in any network. The following are common software used in information security; Antivirus Antivirus are software developed to protect information from virus, spy ware, and malware. Antiviruses are used mostly in internet connected network where there is a high risk of spread of virus (Dhillon, 2007). Antivirus software mostly used includes MacAfee, Karspasky, NOD32, and many others. Content filtering Content filtering is also known as information filtering.   It encompasses the use of software to screen information on computers. It is also used in internet firewall especially by corporations to guard some information considered private. Content filtering helps to include or to exclude some information which can be accessed by a person and excluding information which is deemed objectionable (Dhillon, 2007). Content filtering is also used at home and at school in order to filter information that can be accessed by children. In this case, it is used to filter out pornographic materials and violence oriented materials.   In the internet content filtering can be classified into web filtering where some WebPages are filtered out and e-mail filtering where e-mails are screened for spam. However, content filtering is criticized on the ground that some important information may be filtered out of the accessible content such that the information accessed does not really help the user. Encryption With the increased use of the internet, a great deal of sensitive personal information is sent from one person to another or to an organization. This raises serious questions regarding the safety of that information and the confidence that only the intended receiver receives and understands the information. To raise this level of confidence, data encryption method has been developed (Biham and Shamir, 1991). Although encryption has been used since the time of Roman Empire, it has become more complicated and with diverse use today. Encryption mainly involves conversion of a readable data to another form which can only be read and understood by a specified person or computer. This information is regarded as ciphered or encrypted data since it cannot be understood easily. It is recovered back to its original form through decryption. The level of protection and integrity in encryption is enforced by the use of message authentication code or digital signature. Message authentication code creates a secret key for the sender and receiver of the information which makes it more secure and authentic. Today, there are many softwares that are used in encrypting data. However, encryption is not one of the most secure methods of ensuring data security since there are various methods like traffic analysis, brute force, TEMPEST, and many others which can be used to crack the encrypted data (Biham and Shamir, 1991). It has been found that even some of the most complex algorithms like RSA, DES and others can be broken using these softwares. iii. Hardware Firewalls have also played an important role in enhancing information security.   They can be used either in hardware or in software or when the two are combined.   In day to day uses, firewalls are important in protection unauthorized access to a private network which is connected to the internet especially in the cases of intranets (Whitman and Mattord, 2007).   Firewalls filters all messaging entering and leaving the intranet to ensure that it blocks those messages which are devoid of the set security standards.   There are four major types of techniques used in implementing firewalls including Packet filter This is one of the most effective and transparent firewall techniques. Under this technique, each and every packet entering and leaving the network is filtered and only those which meet user defined criteria are allowed while the rest are blocked.   However, the technique is quite difficult to configure and is more susceptible to IP spoofing. Application gateway Application gateway applies a defined security mechanism to some specific applications like FTP, Telnet servers, and others.   Although it is quite effective, it can also lead to degradation of performance. Circuit level gateway This technique applies firewall security only when a TCP or UDP connected has been made. Once the connection is established, packets of data continue to flow without being checked since a secure connection has been made. Proxy server Proxy server technique intercepts in and out of a network. The server is quite effective in hiding the network addresses and hence cannot be obtained easily. The effect of Network Security Support on information security Although technology has been effective in deterring cyber crime, it is clear that technology alone cannot work. Even with the advanced technology and application of the various information security methods we have reviewed above, human support is still needed. There are various ways that have been employed in supporting technological method to fight cyber crimes. The following are some of these methods: Hacker Hunters Hacker hunters are special branches that have been set up in police department aimed at tracking down cyber criminals.   Hacker hunters are prowling cyberspace with an aim of tracking down and arresting professional cyber criminals who are motivated by big profits made online.   Hacker hunters are employing gumshoe techniques to track down cyber crime suspect (Grow and Bush, 2005). They are employing various methods including infiltration of hacker groups, monitoring the hackers through underground networks, and when possible, intercepting the hackers before they can cause any damage. Most important, hacker hunters are relying on intelligence in order to track cyber criminals. They are using informants inside hackers group to get vital information regarding their operation. For example in 2004, Hacker Hunters in Washington unleashed Operation Firewall in which they targeted members of the ShandowCrew tracking them through their website shandowcrew.com with the help of an informant from the group.   Hackers Hunters must therefore seek inside information from individuals in these groups in order to fight deter them. They are applying the same principles that were used in the 1960s to fight organized crime since both are similar in many aspects. Police Operations Police operations work in the same manner as hacker hunters.   In most cases, police operations are carried out by a special group within the police force and reinforce the work of hacker hunters.   For example in the above case, the Special Agents in the operation firewall got assistance from the local police forces.   Therefore police operations are important in pursuing cyber criminals to ensure security of information (Leyden, 2004). Unlike hacker hunters, police operations are carried out as fighting of routine crimes. This means that although there may be a special group carrying out police operations, it may not be entirely specialized in fighting cybercrime. In most countries, there are special internet police departments which are used in fighting internet crimes.   These police departments are entrusted with carrying out important functions like fighting cybercrime, censorship, propaganda, online scams, manipulation of online opinions, and others. However one of their most important duties is to work closely with hacker hunters in intervening and apprehending cyber criminals. Internet police departments also collaborate with other police departments in other countries in enforcing internet security laws and apprehending cyber criminals.   In the international front, Interpol has been important in enforcing international crimes. iii. Network Security Service Companies For many companies, proving information security is an expensive endeavor. Companies are not only required to install hardware and software devices, but they must also collaborate with authority to ensure information security. However, the growth of corporate resources in provision of secure business environment has made many information security methods inefficient and expensive (Lighthouse Security Group, 2009). For this reason, most companies are finding it appropriate to outsource comprehensive and streamlined network security services from Network Security Services Company. Network Security Service Companies have also become important in enforcing information security. These are companies which are specialized in providing services to enforce information security.   These companies offer Managed Security Services (MSS) which are security capabilities mostly outsourced by other companies. These services vary from supplementing of an existing security system to offering a complete new MSS where the Network Security Service Company is entrusted with information security. However, MSS is just one of the different types of managed services others including routing, hosting, LAN, VPN, and others.   Network Security Service Companies therefore offer specialized high quality network security services ensuring for many enterprises. Conclusion The increased incidence of breach of privacy of information has had negative impact on adoption of ICT services.   The emergence of e-commerce, e-banking, e-governance and other online services which required input of sensitive personal details have been affected by increased hacking of information. There are different methods that have been developed to increase information security mainly through the use of technology and network support on information security. Technological methods include authentication through password, token, biometrics; software including antivirus, content filtering, or encryption; and hardware through use of firewall techniques.   Network security support includes hacker hunters, police operations, and security services offered by network security service companies. Reference: Biham, E. & Shamir, A. (1991). Differential cryptanalysis of DES-like Cryptosystems. Journal of Cryptology, Vol. 4(1): 3-72 Dhillon, G. (2007). Principles of information systems security: text and cases. NY: John Wiley & Sons Down, M. P & Sands, R. (2004). Biometrics: An Overview of the Technology, Challenges and Control Considerations. Federal Computer Week, 21(13) Erin, B. (2005). Information security: Token. Boston, Technology Press Grow, B. & Bush, J. (2005). Hacker Hunters: An elite force takes on the dark side of computing.   Retrieved 28th April 2009 from http://www.businessweek.com/magazine/content/05_22/b3935001_mz001.htm Information Resources, (2009). Security tips: Password protection. Retrieved 28th April 2009 from http://www.utdallas.edu/ir/security/STpassword.htm Leyden, J. (2004). Enforcement is key in fighting cybercrime. Retrieved 28th April 2009 from http://www.crime-research.org/analytics/473/ Lighthouse Security Group, (2009). Enterprise security solutions. Retrieved 28th April 2009 http://www.lighthousecs.com/Practices/Enterprise-Security-Solutions/ McNab, C. (2004). Network Security Assessment. Sebastopol, CA: O’Reilly Whitman, M. & Mattord, J. (2007). Management of information security. Boston, Technology Press

Sunday, September 29, 2019

Martinez Company Essay

Introduction Martinez Company is introducing a new product that may be manufactured by using either one of two methods, capital intensive, or labor intensive method. For the capital intensive method, the manufacturing costs per unit are; direct material at $5.00, direct labor at $6.00, variable overhead costs at $3.00 and fixed manufacturing costs at $2,508,000 for the period. For the labor intensive method costs per unit are; direct materials at $5.50, direct labor at $8.00, variable overhead costs at $4.50 and fixed manufacturing costs at $1,538,000 for the period. The research department of Martinez Company recommended an introductory unit sales price of $30. The selling expenses are approximately $502, 000 annually in addition to $2 for each unit sold regardless of the manufacturing method used. The second part of the research is to determine how many units the company will have to sell annually for both methods to be equal. To determine this number the company will need to calculate the indifference point. The calculation is the total fixed cost of both methods is subtracted and then  divided by the contribution margin per unit for each method. Indifference point = (3,010,000-2,040,000)/(14-10) = 242,500. So the company would have to sell 242,500 units for both methods to be equally profitable. This is good information because based on the manufacturing cost of each production method the company will have to sell a specific number of units to maximize profitability. Based on this number the company will select each method in accordance with the projected number of units to be sold. Capital-Intensive Manufacturing vs. Labor-Intensive Manufacturing In the future, the Martinez Company will need to use either capital-intensive or labor intensive method for production. Capital intensive manufacturing method focuses on a high level of capital investment, while labor intensive focuses on a high level of labor investment. Capital intensive manufacturing method is mostly used on a large scale production with automated processes. Labor intensive method is mostly likely used on smaller scale production with personalized products. The capital manufacturing method is also based on whether the organization is producing a standardized product or an exclusive product. The labor intensive manufacturing method should be used when a substantial amount of customer interaction is needed. Capital intensive manufacturing method can be used when the work is too dangerous for employees. With labor intensive manufacturing method there are lower fixed costs and higher variable costs. With the capital intensive manufacturing method there are higher fixed costs and variable costs. In this case, the capital intensive method would be the preferred choice if the sales are expected to be higher than the indifference number of $242,500. Capital intensive manufacturing method limits competition by serving as a barrier to entry and as a capital intensive business, the Martinez Corporation can benefit from this. Barriers to entry are obstacles that prevent new companies to function in capital-intensive industries. Capital intensive manufacturing minimizes human error resulting in a more effective and efficient productivity. Another great advantage with capital intensive manufacturing method is the minimal labor impact.

Saturday, September 28, 2019

Caught in the Trap

Aromas confronted me as I walked in the door. Masalas—or spices—like curry, cumin and cinnamon each contributed. I sat on the edge of my chair—eager like a child on Christmas. I wanted to experience these exotic spices. They were delicious and fiery, yet flavorful. This is not the first time I desired something new. I yearn for knowledge and enrichment. If I hear something I don’t know much about, I look it up. A new technique, style, movie, or crisis—my desire for understanding and knowledge ranges. This time, the Indian food caught me in its trap. I needed not only the flavor—but also the culture. I needed to know more. I needed to understand. This is how I came across Hinduism. I saw the fascinating three-like symbol, the Om, before and I had looked it up. I knew it was Hindi. But my eyes were blind to Indian culture and religion. Enthralled by the beauty of the symbol and the delicious food, I started my research online. Then, I turned to books. One about Hinduism. An India travel guide about customs. And lastly, The Bhagavad Gita—a book essential to Hindus. I started with basics and grew. I learned that the cow is sacred and therefore, beef is not eaten and cows not slaughtered. This was something I found fascinating. Beef is vital in America. A good steak, special and expensive. But in Hinduism, the cow is a symbol of life and honored. I was drawn in by the open-mindedness towards other religions. Hindus believe that religion is the same just named differently. This appealed to me because religion is about loving and accepting and in Hinduism this is true. Hinduism is diverse, allowing its own followers to believe in a variety of things. Religion tends to be strict, and the diversity and variety in Hinduism made it appealing. The travel guide explained Hinduism is a way of life and is reflected in the customs. The Bhagavad Gita gave me insight and helped me learn from the same text that a Hindu would learn from. All this new information made me think in ways I hadn’t before, pose questions and challenge my beliefs. Did I still believe the religious foundation built around me? I wasn’t sure. â€Å"Aren’t you a Hindu or something?† asked my brother. I knew this question was coming, but I still didn’t have an answer. â€Å"I’m not sure.† Before claiming it, I want to fully understand. And I am still working towards that. I may adapt to this religion, I may not. But it doesn’t matter. This search is about understanding and delving into the intriguing unknown. The Indian food caught me. Forever I will recall my first meal at Tandoori Nights a year ago and what stemmed from it. What will catch me next?

Friday, September 27, 2019

Violence in Modern Thinking Essay Example | Topics and Well Written Essays - 1000 words

Violence in Modern Thinking - Essay Example The threat of war and the vulnerability of existence as a result of the prevailing violence among the European led to the rising fear and insecurity of defeat. Thus the violence undertaken by the Europeans had the objective of developing state authorities, resources and power in order to combat the opposing forces of violence â€Å"We have learned that the external compulsion exercised on a human being by this upbringing and environment produces a further transformation towards goods in his instinctual life – a further turning from egoism towards altruism† (Freud 300). In order to reach a position of competitive edge over the opposition and the interest of not only saving its own territory but also foster the process of expansion of the European state led to the development of modern thinking. The modern thinking of the Europeans was developed to outsmart the thinking of the opposition in the process of violence. The modern thinking was based in line with the developmen t of advanced weapons and machineries, development of advanced technologies in order to emerge victorious over the forces of opposition. The use of advanced weapons led to the discovery of rifles and machine guns against the swords and knives of the opponents. The use of advanced machineries backed by the advanced technologies reduced the efforts of the society in establishing its dominance and paving the path of expansion of the society. The emergence of new ideas, diplomatic thoughts and solutions to complex situations led to the promotion of political environment. Various sections of the European society started to uproot the forces of oppression and an inclusive development of the society happened in the political scenario. Representatives from all sections of the European society expressed their opinion for an even more political and social development. For the purpose of supporting the underlying causes of war and violence, more number of people of the European society partici pated for the production of equipments and other accessories for war and violence. The increase in the total factor productivity led to the increased contribution of the workforce in Europe that resulted in the increase of production volumes. â€Å"We may, however obtain a deeper insight than this into the change brought about by the war in our former compatriots, and at the same time receive a warning against doing them an injustice† (Frued 302). Thus the increase in the production rates led to the development of the economy of Europe. Thus the economic developments were aimed at supporting the causes of violence and war. The rise in the performance of the economy of Europe led to the rise in living standards of the society. All these factors eventually led to the development of the society and the social conditions in Europe. Thus the ways of violence undertaken by the Europeans led to the promotion of modern thinking and supported the development of politics, economics and the society of Europe. In what ways does violence bring about the end of modernity? The tenets of modernity are based on the attainment of equality, spread of humanity, freedom and independence of the people that leads to peaceful and prosperous growth of regions as sovereign powers. The acts of violence are aimed at conquering the territories of opposition forces by virtue of power and comparative advantage.

Thursday, September 26, 2019

A comparison between western and east Asian philosophies Essay

A comparison between western and east Asian philosophies - Essay Example To begin, let us consider the prevailing East Asian mindset that typically goes into the consideration of areas of law and justice. It should be noted that East Asian thought typically includes a wide range of traditional philosophies combining a mix of Japanese, Korean, and Chinese ideas that span more than 2,500 years of history (Moody 166). The focus on this comparison with the West, however, will primarily deal with the Chinese influence, dating back as far as 221 Before the Common Era. In considering how issues related to law and justice related back to both the preimperial Confucian stage, in addition to the incorporation of Daoist traditions, one must consider both historical and philosophical teachings. Even during ancient times, penal codes were enforced as a sense of corrective justice, but Confucius espoused a system whereby the political emphasis in Eastern philosophy was to support a more elitist system where virtues of fairness were perceived to be the humane course of actions. Within this teaching, however, lied the incorporation of flexible standards that were to determine how opportunities and goods were to be distributive to the masses. This was referred to as distributive justice, which Confucian scholars taught was designed to eliminate the need for any type of corrective justice. In essence, the law is not to be applied equally to all classes of people, but the balance of power is to shift to the elite who then distributes justice to other as they see is best reflective of the times and the situations that society finds itself in.

The Regan Revolution Through President Obama Research Paper

The Regan Revolution Through President Obama - Research Paper Example He also supported anti-Communism policies and strengthened America’s military in response to USSR arms race. The Reagan revolution through President Obama Introduction Another turning points during this period is the 9/11 terrorism attacks on the World Trade Center and the Pentagon. The terrorism attacks changed the attitudes of US citizens towards air travel. The US enacted the PATRIOT Act that granted counter terrorism agencies the powers to wire trap and apprehend suspected terrorists. The government also enhanced domestic in the significant installations such as airports, roads and ports through creation of homeland security agency. Another 9/11 turning point was invasion of Iraq and Afghanistan since America considered the two countries as a threat to global peace. The US wanted to topple Saddam Hussein regime and end Taliban menace in Afghanistan. The US also changed its foreign policy on nations that were harboring terrorists (Golway, 2008). The first significant turnin g point came in March 1983 when Reagan introduced strategic defense initiatives. The defense projects aimed at manufacturing space-based defense systems that would protect the US from attack by ballistic missiles. This initiative increased the military capability of America and dominance in geo-politics. Some important defense technologies such as space surveillance systems, tracking devices, and anti-missile systems can be traced back to this project. Another significant turning point was the Iran-Contra scandal of 1986 that undermined the international community faith on Reagan administration. Reagan administration was accused of supplying weapons to Iran in exchange of release of hostages that had been held in Lebanon by the terrorists loyal to Iran authorities. The arms were later sold and proceeds went to contras. The US Congress had banned the sale of weapons to Iran. After, Nicaraguan sued the US at the International Court of Justice. The court held that the US had contravene d the international law with Reagan being criticized for ignoring the existence of the political scandal (Golway, 2008). The AIDS epidemic shook the confidence of Americans in the 1980s. The AIDS epidemic was recognized by doctors in early 1980s and captured the attention of the media, special interest groups and the public (Brier, 2009). The epidemic shook the confidence of Americas since it was first associated with gay men and mostly white Americans. Surprisingly, all the people diagnosed with AIDS were gay and suffered from other complications such Pneumonia. Some of the homosexual men who had been diagnosed with AIDS died within a period of 2 years. By 1981, the epidemic had acquired several names such gay related immune deficiency, gay compromise syndrome and gay cancer (Brier, 2009). In the 1980s, AIDS was associated with discrimination and stigma and gay men stopped going out of their houses. Initially, people did not know how AIDS was transmitted since scientists had no evi dence that the epidemic could be transmitted through contaminated blood transfusion. AIDS started being common among homosexuals, drug abuse addicts, Haitians and Haemophiliacs. Haitians also protested against being labeled as a risk group. With more than 3,000 confirmed cases by the end of 1983, there was growing pressure on the government to develop a national AIDS policy and also develop medication (Brier, 2009). In 1985, the government granted five pharmaceutical companies the opportunity to

Wednesday, September 25, 2019

Grand proposal Research Example | Topics and Well Written Essays - 2000 words

Grand - Research Proposal Example Similarly, renewed economic growth stimulates political stability accordingly. Thus, it seems clear and defined that the economic development generates political development and vice versa within the development context of industrialized countries. However, for all studies into the subject of relations in economic and political development, they lack the objective evidence necessary to resolve this argument, and describe the subject accordingly (Rivero 17). Thus, this desertion pursues a cross-cultural study in three different third world countries, to evaluate the economic and political development through structured study and present evidence into the subject. Thus, the evaluable contexts in the study incorporate the countries of Chile, Peru and Bolivia, all which are neighbours. They all present a multi perspective of the subject; hence, the selection for the study. As the population continues to increase and voter turnouts remain constantly low, then the question arises into the subject of the realistic aspect in a capitalistic democratic government ability to maintain economic stability and development. Consequently, as the costs of political influence increase, the evidence within the firm level and economic aspects in the developing countries also begins to show. Thus, from these consequential effect statements, the question of the interleaved aspects of economic and political development in developing countries continues to raise simulating debates, which seem to have no end (Rivero 69). Thus, this research proposal will seek to evaluate and present evidence into the relations between the economic and political development as they influence each other from a developing countries perspective. Thus, the hypothesis for the research entails that, both economic and political development present vast evidence of aspects of interrelations, which cause them inseparable in determining and fostering a countries development process and

Tuesday, September 24, 2019

Asthma Essay Example | Topics and Well Written Essays - 500 words

Asthma - Essay Example It is important that therapists be familiar with asthma so that they can properly diagnose patients on an individual basis. As such, I picked these articles to review as each person is unique in their diagnosis, as well as their treatment. In Sherry Baker’s article, â€Å"Children in danger from exposure to common chemicals, new studies confirm,† the author divulges into alleged causes of asthma in children, which are the toxic chemicals of common products. One study revealed that children exposed to pesticides during their prenatal stage risked developing a chronic cough at the age of five. This study yields evidence that the respiratory system of a child is defenseless against toxic exposure while in their mother’s womb (Baker, 2012). This chemical found in pesticides that causes children to develop chronic cough is piperonyl butoxide. Two other chemicals that are known to cause chronic coughing in children include diethyl phthalate and butylbenzyl phthalate, which are found in personal care and plastic products. When children are exposed to these chemicals, they are at risk of developing asthma-related airway inflammation. Sarka-Jonae Miller looks at alternative remedies for asthma in her article â€Å"Lifestyle remedies for the management of asthma.† Miller points out that while doctors disagree with lifestyle remedies for asthma, such as acupuncture and breathing exercise, these treatments have been proven to be less harmful than the common prescribed medications (Miller, 2012). Rolfing and osteopathic manipulation can be utilized to alleviate restrictive patterns in muscles and nerves, allowing for easier breathing. Acupuncture has been shown to decrease the frequency of asthma attacks, as well as improve breathing. Various breathing exercises can be used to help individuals control their breathing, thus preventing asthma attacks and allowing individuals to rely less

Sunday, September 22, 2019

Are the Rights of the Mentally Ill Adequately Protected by Current Essay

Are the Rights of the Mentally Ill Adequately Protected by Current Mental Health Law - Essay Example The Law’s feature Mental Health Law of 2007 amended the MHL 1983, the Domestic Violence, Crime and Victims Act 2004 and the Mental Capacity Act 2005. The amendments introduced major changes relating to the intervention, treatment of patient, and technical definitions, and some ethical considerations e.g. undergoing treatment without the patient’s consent (MHL, 2011; Department of Health and Ministry of Justice, 2011). Other crucial changes in the provisions broaden the professional roles of medical practitioners and other attendants, as well as, accord the patient’s family to seek legal remedies based on just cause (The National Archives, 2011). The law also introduced supervised community treatment (SCT), some safeguards which include age-segregation of patient to favor mentally-challenged youths and children to ascertain that they’d not be integrated in an environment which could deteriorate or aggravate their condition (MHL, 2011; DoH & MoJ, 2011). The amended law also empowered the national government to assume accountability to assist initiatives for independent mental health advocacy (MHL, 2011; DoH & MoJ, 2011). ... Such meant that those who are severely victimized by sexual assaults and violence which has consequential negative or adverse psychological impacts (MHL, 2011; DoH & MoJ, 2011). MHL of 2007 likewise provided the victim such right to be inform about patients’ discharged and it’s anent right for representation. Law not enough? While the amendment have successfully improved the mental health protection services for the patients by vesting more accountability for all medical professionals, but most of these are policy-based which pressed for mandatory roles of medical practitioners in providing appropriate care and services to clients, as well as, some procedural mechanisms that are supposedly inherent in the medical practice. Such simply focused on escalating performance management in mental health facilities and about administering support service for the patients. The larger issue of mental health care is basically improving resource allocation to improve the facilities to meet the goals of better mental health care in these utilities’ operation in response to the problems on mental disorders in all social strata, especially those underprivileged to access these health facilities. While there is effort to improve the intervention on neurological disorders, there remained a challenge about how to increase the services to treat schizophrenia, epilepsy, chronic depression amid scarcity of resources. Such must also facilitate increase research studies on causes of mental disorder that are socially-created which result to mental distress and insanity. These studies must aim to address decrease of disorder prevalence. Thus, it is understandable that authorities should be translating these policies into concrete agenda with

Saturday, September 21, 2019

Budgeting Process Is a Waste of Time and Valuable Resources Essay Example for Free

Budgeting Process Is a Waste of Time and Valuable Resources Essay A budget is a plan for financing an enterprise or government during a definite period, which is prepared and submitted by a responsible executive to a representative body (or other duly constituted agent) whose approval and authorization are necessary before the plan may be executed. In the case of Uganda, it is a financing plan for one year prepared by the president and approved by Parliament. Some scholars have argued that budgets are a waste of time and valuable resources. But this statement is not entirely true as the budget process has some very useful roles in public administration as shown below;- Financial control. Government needs to be able to exercise control over the ministries and departs i. e. to make sure that the ministries are keeping to plan and that necessary actions can be taken to put them back on track when needed. Government needs to have control tools to make sure that financial plans and targets are being achieved, and the best tool is the budget. The budget is a plan set out in numbers, which enables the government to exercise control. The difference between what is budgeted to happen and what actually happens is termed a variance. A favorable variance means that ministry or department is doing well while an adverse variance shows those that are not. Allocation of scarce resources. One of the biggest tasks of government is the allocation of scare resources. This is often done through the budget. Resource allocation refers to the distribution of resources, and in particular finance, from the center to peripheral levels. Because the budgetary process is often participatory, it enable the various ministries and local governments to identify their needs and present them to the centre. Programme Coordination. The budget process serves very well to coordinate government departments and ministries. It is at this budget process that the government can get to know who is doing what and at what cost. Government can for example be able to tell that water for irrigation has been covered under the Ministry of Agriculture and should therefore be omitted from the Ministry of Water and Environment. Communication. The public budget serves as a communication tool to a variety of audiences. The general public, civil society, and legislators all receive information from the budget process. Once the budget has been approved by the legislature and signed into law, the ministries and other agencies become the information recipients. Importantly, each of these actors perceives the budget differently. Budget also communicates upwards. Ministries and various agencies must prepare a budget that persuades the president that they support him and his manifesto. At this level of the process, the information in the budget document must explain why a program deserves continued support, how it meets the president’s policy priorities, and how well it is using the resources it has been given. After a ministry budget has been incorporated into the national budget the primary audience for communicating information shifts from the executive to the legislative branch of government. The primary goal at this stage is to provide information to legislature with the recommendations and analysis that serve as the basis for their decisions. Perhaps the most important purpose for public budgeting is to communicate a ministry’s intentions and performance to the citizens. The media also plays a major role in presenting budgets to the citizens. The key events in the budget processes and budget documents must serve to support a mass communication task. Successful communication helps to build legitimacy for the government and its programs. Budgeting as a Governing Tool. Public budgeting has become an increasingly central galvanizing force for both the administrative and policy side of governance. This process begins with the preparation of program-level, agency-level, and then ministry-level requests for the coming fiscal year. This budget process presents a political platform for the selection of policy choices and for the allocation of resources to support those choices. The development of a national budget provides the foundation from which to organize a coordinated response to these complex problems and needs. Financial Accountability. Reflecting its roots, the budget process provides the tools to ensure financial accountability. Legislative oversight and audit functions are important activities that provide an opportunity for ministries to demonstrate that they have complied with legislative directives. This compliance provides assurances to both elected officials and to the public that the ministry and its programs are serving the public interest. Influence on the Economy . The spending and taxation policies of the central government and local governments have economic impact. Of course, the central government, with its sh11 trillion for 2012/2013 has far more impact on the economy than billions the local governments spend. From an economist’s point of view, the budget serves the following combination of economic objectives: * funds social service programs for those in need, thus increasing the demand for private sector goods and services; * reflects tax policy that affects business and individuals; * reflects and funds the enforcement of commercial, transportation, land use and environmental regulations that affect the business climate; * funds education and other training programs that enhance the country’s human and economic resources; * funds routine purchases (like stationary) and capital projects (like Bujagali dam) that stimulate economic activity; * serves to redistribute wealth across the country’s residents; and * Supports the government as the largest single employer. Public Budgeting as Political tool. The budget process presents a series of opportunities for elected officials and interest groups. The perspectives and needs of elected officials and interest groups may fr equently contrast with the values and hopes of most public administrators. Understanding these contrasting needs is a useful key to understanding the budget process. Elected officials must respond to their constituent’s needs and demonstrate a record of leadership. MPs must demonstrate an ability to use government to solve problems in their constituencies. Survival of an MP rests on this ability. In contrast, civil servants often rely on public service and professional values to guide their sense of action and accomplishment. For example, at the ministry of finance, the minister (who is not elected) and budget analysts are primarily committed to acquiring the resources necessary to maintain the efficient and effective delivery of programs, not delivering on promises to constituents. The budget process provides leadership opportunities to bridge and reconcile these competing perspectives. The promises of an election campaign must be quickly translated into policies and programs. Campaign goals and visions must be translated into legislation and directives that can reform and reorient the ministries. The budget also provides an opportunity for the executive to engage with the legislature. When executive and legislative branches are divided, compromise is usually necessary to meet the constitutional duty shared by the Executive and legislative branches i. e the president must present a budget to the legislature and the parliament is constitutionally required to enact a budget. Waste of time. On many instances, however, budgets may appear of a waste of time when they are not adhered too. In Uganda for example, The Monitor newspaper reported that the budget for Sate House had jumped from Shs66. 1 billion approved in September last year to Shs204. 4 billion. On the day to day running, there always unforeseen consequences that governments have to cater for and often need extra resources beyond what is budgeted for. An example in Uganda was the Bududa landslides, In the US we have seen incidences such Hurricane Katrina that devastated New Orleans in 2005. But that is only a perception. Budgets play a very big role in public management and administration.

Friday, September 20, 2019

Modified Radical Mastectomy for Contralateral Breast Cancer

Modified Radical Mastectomy for Contralateral Breast Cancer Abstract Breast cancer is the most common malignancy in women worldwide. With improving survival figures and early breast cancer detection, treatment related long term adverse effects of radiotherapy have become a concern. Contralateral breast cancer due to scatter radiation from during radiotherapy of diseased breast is one of them. This prospective clinical study was conducted to measure the dose received by the contralateral breast and compare the different techniques which influence this dose. It was found that in post mastectomy patients, treatment with telecobalt medial tangential field contribute more dose to contralateral breast compared to supraclavicular field and lateral tangential fields. The mean dose received by contralateral breast during irradiation of chest wall was 168.29 cGy which 3.36 percentage of the prescribed dose. Key Words; contralateral breast dose, breast malignancy, thermoluminescent disc, scattered radiation Introduction Breast cancer is the most common malignancy among the women worldwide. [1] With improved survival figures due to early breast cancer detection and multimodality treatment, long term adverse effects in the form of second malignancy of contralateral breast (CLB) has become a concern. In patients getting radiotherapy to the affected breast, CLB also receives radiation in the form of scattered radiation due to scattered from primary. Second malignancy is a late sequel of radiation appearing at an interval of 10-15 years. [2, 3, 4, 5, 6, 7] Since breast is highly radiosensitive structure this dose to CLB is a major concern especially in younger women and patients with longer life expectancy. Although radiation induced malignancy is a stochastic effect but the intensity increases linearly with increase in dose. [8] Studies have measured CLB dose on phantom and patients and have observed that the dose to CLB is more for medial tangential (MT) than supraclavicular field (SCL) field and later al tangential (LT) field. In our centre 22% of female patients are suffering from breast cancer and majority of them belong to low socio economic status and presented with advanced disease. In the present study we measure the dose to CLB in patients receiving radiotherapy following modified radical mastectomy (MRM). The radiation dose to CLB were measured with the help of CaSO4: Dy thermoluminescent discs (TLD). The TLD are highly sensitivity and can measure even very small doses. Materials and methods Measurement of CLB was done in 25 patients undergoing for EBRT by cobalt teletherapy machine (THERATRON 780 C and E) following MRM. Precalibrated TLD (9mmÃâ€"13mm) were placed on the surface of CLB. Total three discs were placed one at the nipple and other vertically on either side of nipple 3 cm apart. We tried our best to place the TLD on the same position each time. Skin tattooing was done to demarcate the exact position at the first sitting and this was used subsequently to replicate the position. After delivery of radiation dose for a particular field the discs were removed and another set of three discs were placed for next reading. In this way total six discs were used daily, three for SCL field and three for MT or LT field as MT and LT fields were treated on alternate days and SCL field was treated daily. For MT and LT fields breast cone was used for half beam block. Total dose delivered was 50 Gy in 25 fractions, 2 Gy per fraction, 5 fractions per week in 5 weeks. The expos ed TLD were stored in radiation free zone and the readings were taken after 24 hours and within 7 days after exposure because after seven days the TLD start to loose electrons. The scattered dose received by TLD were measured on NUCLEONIX TL 10091 TLD reader. After one set of measurement, the discs were annealed by heating 400 degree celcius and then used for next measurement. For each patient, measurements were carried out at first week, third week and last week, total three times during the course of treatment. Statistical Analysis Mean dose calculation received by CLB. Total dose received by CLB, this was calculated by multiplication of mean dose to number of fractions. The percentage of radiation dose received by CLB with respect to the prescribed dose to diseased breast (Total doseÃâ€" 100 / prescribed dose to diseased breast). We also stratified data based on gantry angle at which EBRT was delivered (≠¤50 degree and > 50 degree). The statistical software SPSS version 20.0 was used for the data analysis. Results The age wise distribution of patients and the mean dose received by CLB is shown in table 1. 19 out of 25 patients in our study were 50 years or younger. 52% patients had left sided breast cancer. Table 2 shows the contribution of SCL, MT and LT field dose with the gantry angle at which the radiation dose was delivered. Total dose received by CLB varies from 1.22% to 5.82% of the prescribed dose of 50 Gy to the affected breast. Mean total dose received by CLB was 105.55 cGy with MT field followed by SCL field, (33.96 cGy) and LT field {(28.97 cGy) as shown in table 2. This data shows that the maximum contribution of dose to CLB was with MT field followed by SCL field and LT field. Mean dose with all three fields received by CLB was 168.48 cGy with SD  ±62.23 which corresponds to 3.36% of prescribed dose to affected breast. 11 patients were treated on cobalt unit with gantry angle ≠¤ 50 degree having 3.00% contribution of CLB dose (table 3). 14 patients treated with gantry angl e > 50 degree had 3.79% contribution of CLB dose (p=0.199). The mean, median and range were 3.66, 3.34 and 4.60 respectively. Discussion It is well known that exposure to ionizing radiation causes carcinogenesis in healthy tissues. Although it is a stochastic effect having no threshold dose but the intensity increases with increase in radiation dose. CLB must be considered as an organ at risk during radiotherapy planning for treatment of cancer breast. Many previous studies conducted to calculate the dose received by CLB, were based on patients, phantom or treatment planning system. Boice et al analyzed the record of 41109 patients of cancer breast and they found the mean CLB dose was 2.82 Gy. [9] They also hypothesized that there was increased relative risk of CLB malignancy due to exposure to ionization given to diseased breast. The relative risk was 1.19 for all patients, however the relative risk was more (1.49) for younger patients who were less than 45 years old. In our study, the maximum dose received by CLB in women below 40 years which was 3.93 percentage (196.437 cGy) of prescribed dose. The minimal dose was received in patients who were above 60 years of age {(1.96 %) (97.875 cGy)}. The possible reason could be the increased laxity of breast tissues in older women cause more lateral shifting of CLB away from the radiation at the time of exposure. Half beam block technique is routinely used while irradiating the breast with tangential beams. [10, 11] Kelly et al measured CLB dose on Alderson Rando phantom using TLD with four different techniques of breast cancer treatment using 6 MV photon beam on linear accelerator. [12] The used half beam block with asymmetrical jaws, custom blocks and symmetrical collimator jaw. Another technique used was isocentric method with non divergent posterior border. They observed highest dose to CLB in MT field with wedge. In our study radiation was delivered using half beam block with breast cone. The dose to CLB was maximum with MT field because in half block beam, the breast cone is placed near to surface of breast which cause increased dose due to secondary collimator scattering. Bhatnagar et al compared dose to CLB during EBRT to chest wall irradiation using conventional tangential technique and intensity modulated radiotherapy (IMRT). [13] They observed 20 percentage reduction of dose to CLB using IMRT. According to a study by Chougule, the average contralateral nipple dose was 152.5-254.75 cGy and the percentage was 3.05-6.05% for a dose of 5000 cGy in 25 fractions for post mastectomy breast cancer. [14] In our study, the measured mean contralateral nipple dose on was 171.88 cGy (55.5-303.80 cGy) which accounts to 3.47% (1.11%-6.07%) of prescribed dose (table 2). Dose to CLB were higher for dose calculated at the level of nipple as compared to dose received by whole CLB. This may be due to TLD at level of nipple being closest to the radiation source. According to Rankel et al with high gantry angle the beam will be closer to the surface leading higher dose to the CLB. [15] In this study, it was found that with gantry angle >50 °, more dose was delivered to the CLB though the difference is not statistically significant (p=0.199). Conclusion In our patient cohort, higher inadvertent CLB dose was delivered in younger patients with MT field; overall, dose being 3.36 percentage of prescribed dose.

Thursday, September 19, 2019

Why The American Civil War Is Important Essays -- The American Civil W

The American civil war took place 150 years ago. The war ripped apart the young country and turned brother against brother. The American civil war ended the most grotesque American institution in its history and caused the nation to struggle for the next decade to recover from the devastation. The war caused a wealthy class to lose their stranglehold over the southern economy and ended politics being swayed by whether you were pro or anti slavery. The war caused the death of over 620,000 men, around 2% of the population. The American civil war is worth remembering today. It is worth remembering because it shapes the identity of who Americans are today. Without it, we cannot understand why a nation could be split over the death of a young delinquent named Trayvon Martin. Without it we cannot understand how Martin Luther King Jr. struggled to gain his dream. Without it we cannot understand why women fought for suffrage rights in the 1920s. What was the American civil war about? States rights? Slavery? Both? Perhaps this does not matter, perhaps all that matters is the end results, the prohibition of slavery and the emergence of the 13th, 14th, and 15th amendments. The nation emerged with a new identity of freedom, not just whites, but people of all color. But the war did not end discrimination or racism, it saw different forms of it take place; forms that still effect us today. The Civil War is worth remembering because the Civil War still shapes America’s identity to this day. First let us examine the cultural implications the Civil War had on us today. Today in America we are we are shaped as a culture by diversity, and dreams. By diversity I mean we are a culture that though, dominantly white, is full of many ethnicities of pe... ...vil War.† In The War Was You and Me: Civilians in the American Civil War, ed. Joan E. Cashin, 136-156. Princeton: Princeton University Press, 2002. Snay, Mitchell, Randall M. Miller, Harry S. Stout, and Charles Reagan Wilson. "Religion and the American Civil War." The American Historical Review 105.1 (2000): 217. Print. McPHERSON, James M. "Major Problems in the Civil War and Reconstruction." (n.d.): n. pag. Rpt. in Major Problems in American History Series. N.p.: n.p., n.d. 10. Print. Dew, Charles B. Apostles of Disunion: Southern Secession Commissioners and the Causes of the Civil War. Charlottesville: University of Virginia, 2001. Print. Douglass, Frederick, and Frederick Douglass. Narrative of the Life of Frederick Douglass and Other Works. N.p.: n.p., n.d. Print. "The Pledge of Allegiance." The Pledge of Allegiance. N.p., n.d. Web. 14 Nov. 2015. Why The American Civil War Is Important Essays -- The American Civil W The American civil war took place 150 years ago. The war ripped apart the young country and turned brother against brother. The American civil war ended the most grotesque American institution in its history and caused the nation to struggle for the next decade to recover from the devastation. The war caused a wealthy class to lose their stranglehold over the southern economy and ended politics being swayed by whether you were pro or anti slavery. The war caused the death of over 620,000 men, around 2% of the population. The American civil war is worth remembering today. It is worth remembering because it shapes the identity of who Americans are today. Without it, we cannot understand why a nation could be split over the death of a young delinquent named Trayvon Martin. Without it we cannot understand how Martin Luther King Jr. struggled to gain his dream. Without it we cannot understand why women fought for suffrage rights in the 1920s. What was the American civil war about? States rights? Slavery? Both? Perhaps this does not matter, perhaps all that matters is the end results, the prohibition of slavery and the emergence of the 13th, 14th, and 15th amendments. The nation emerged with a new identity of freedom, not just whites, but people of all color. But the war did not end discrimination or racism, it saw different forms of it take place; forms that still effect us today. The Civil War is worth remembering because the Civil War still shapes America’s identity to this day. First let us examine the cultural implications the Civil War had on us today. Today in America we are we are shaped as a culture by diversity, and dreams. By diversity I mean we are a culture that though, dominantly white, is full of many ethnicities of pe... ...vil War.† In The War Was You and Me: Civilians in the American Civil War, ed. Joan E. Cashin, 136-156. Princeton: Princeton University Press, 2002. Snay, Mitchell, Randall M. Miller, Harry S. Stout, and Charles Reagan Wilson. "Religion and the American Civil War." The American Historical Review 105.1 (2000): 217. Print. McPHERSON, James M. "Major Problems in the Civil War and Reconstruction." (n.d.): n. pag. Rpt. in Major Problems in American History Series. N.p.: n.p., n.d. 10. Print. Dew, Charles B. Apostles of Disunion: Southern Secession Commissioners and the Causes of the Civil War. Charlottesville: University of Virginia, 2001. Print. Douglass, Frederick, and Frederick Douglass. Narrative of the Life of Frederick Douglass and Other Works. N.p.: n.p., n.d. Print. "The Pledge of Allegiance." The Pledge of Allegiance. N.p., n.d. Web. 14 Nov. 2015.

Wednesday, September 18, 2019

Mother Daughter Relationships - The Mother-daughter Relationship in Amy

Daughters and Mothers in The Joy Luck Club Children, as they become adults, become more appreciative of their parents. In The Joy Luck Club, the attitudes of four daughters toward their mothers change as the girls mature and come to realize that their mothers aren't so different after all. As children, the daughters in this book are ashamed of their mothers and don't take them very seriously, dismissing them as quirky and odd. "I could never tell my father . . . How could I tell him my mother was crazy?" (p. 117). They don't try to comprehend their culture, which is a big part of understanding their traditional Chinese mothers. On page 6, one of the daughters states, "I can never remember things I don't understand in the first place," referring to Chinese expressions her mother used. When their mothers show pride in them, the girls only show their embarrassment. One daughter shows her shame when she says to her mother, "I wish you wouldn't do that, telling everyone I'm your daughter" (p. 101). The girls cannot relate to their mothers because they were raised in a different world. No matter how much the mothers care for them or how much they sacrifice to make their girls' lives better, the daughters are blind to their mothers' pain and feelings. All four of the Joy Luck mothers need their daughters to understand them, pass on their spirit after they are gone, and understand what they have gone through for their girls. One mother dreams of doing this on her trip to a new life: "In America I will have a daughter just like me . . . over there nobody will look down on her . . . and she will always be too full to swallow any sorrow! She will know my meaning because I will give her this swan . . . it c... ...n away a long time ago to what I had imagined was a safer place. And hiding in this place, behind my invisible barriers, I knew what lay on the other side: her side attacks. Her secret weapons. Her uncanny ability to find my weakest spots. But in the brief instant that I had peered over the barriers I could finally see what was really there: an old woman, a wok for her armor, a knitting needle for her sword, getting a little crabby as she waited patiently for her daughter to invite her in. (pp. 203-204) In conclusion, as children, the daughters didn't understand their mothers or their culture. The daughters were being raised in a different world. Their perceptions of their mothers changed, though, as they grew up and realized that they weren't so different from them after all. They finally understood and respected their traditional Chinese mothers. Mother Daughter Relationships - The Mother-daughter Relationship in Amy Daughters and Mothers in The Joy Luck Club Children, as they become adults, become more appreciative of their parents. In The Joy Luck Club, the attitudes of four daughters toward their mothers change as the girls mature and come to realize that their mothers aren't so different after all. As children, the daughters in this book are ashamed of their mothers and don't take them very seriously, dismissing them as quirky and odd. "I could never tell my father . . . How could I tell him my mother was crazy?" (p. 117). They don't try to comprehend their culture, which is a big part of understanding their traditional Chinese mothers. On page 6, one of the daughters states, "I can never remember things I don't understand in the first place," referring to Chinese expressions her mother used. When their mothers show pride in them, the girls only show their embarrassment. One daughter shows her shame when she says to her mother, "I wish you wouldn't do that, telling everyone I'm your daughter" (p. 101). The girls cannot relate to their mothers because they were raised in a different world. No matter how much the mothers care for them or how much they sacrifice to make their girls' lives better, the daughters are blind to their mothers' pain and feelings. All four of the Joy Luck mothers need their daughters to understand them, pass on their spirit after they are gone, and understand what they have gone through for their girls. One mother dreams of doing this on her trip to a new life: "In America I will have a daughter just like me . . . over there nobody will look down on her . . . and she will always be too full to swallow any sorrow! She will know my meaning because I will give her this swan . . . it c... ...n away a long time ago to what I had imagined was a safer place. And hiding in this place, behind my invisible barriers, I knew what lay on the other side: her side attacks. Her secret weapons. Her uncanny ability to find my weakest spots. But in the brief instant that I had peered over the barriers I could finally see what was really there: an old woman, a wok for her armor, a knitting needle for her sword, getting a little crabby as she waited patiently for her daughter to invite her in. (pp. 203-204) In conclusion, as children, the daughters didn't understand their mothers or their culture. The daughters were being raised in a different world. Their perceptions of their mothers changed, though, as they grew up and realized that they weren't so different from them after all. They finally understood and respected their traditional Chinese mothers.

Vladimir Lenin :: Vladimir Lenin Essays

Vladimir Lenin   Ã‚  Ã‚  Ã‚  Ã‚  Vladimir Ilich Lenin was born on May 4, 1870. In school, he was very bright, and enjoyed reading and writings of Goethe and Turgenev. Lenin’s father died of a cerebral hemorrhage and his brother was hung for plotting to assassinate Tsar Alexander III. Lenin was finally accepted to the Kazan University where he studied law. He was expelled, and later studied law on his own and passed the exam in first in a class of 124 people in 1891.   Ã‚  Ã‚  Ã‚  Ã‚  In 1895, Lenin traveled to Switzerland to meet like minded Social Democrats. He and Georgi Plekhanov argued over the means of bringing about change in Russia, and in tern led to the eventual split of the Social Democratic party into Mensheviks and Bolsheviks. Lenin was put in prison for fifteen months for obtaining illegal pamphlets. After he served his term, he was exiled to Siberia, and got married. They went back to Switzerland in 1900 and started his paper, the Iskra. Lenin made a deal with the Germans that he would take power and pull Russia out of the war. Lenin then came to power in October 1917.   Ã‚  Ã‚  Ã‚  Ã‚  In 1918, the Mensheviks fought the Bolsheviks, resulting in a Menshevik loss. Between 1919 to 1921, typhus destroyed Russia and killed over 27 million people! Vladimir Lenin began the New Economic Plan. This came about to revitalize the economy.   Ã‚  Ã‚  Ã‚  Ã‚  In May 1922, Lenin suffered from a stroke, and also received one less than a year later. He tried to prevent Stalin from succeeding him but could not do so, due to his cleverness. Lenin suffered one more stroke before he died with a cerebral hemorrhage, just like his father did, on January 21, 1924.   Ã‚  Ã‚  Ã‚  Ã‚  I am in favor of Lenin’s Bolsheviks, because I like the discipline and professionalism of a smaller group compared to a loosely organized mass party.

Tuesday, September 17, 2019

Life Meaning Essay

The definition of life is very difficult. Although dictionaries and encyclopedias say in general is the intermediate state between birth and death, I think it goes far beyond, is something deeper and we all want to know. By asking this question we faced is as if we ourselves, as research is about something I’ve always lived, after much thought and analysis that is life, in my point of view I think is that although many try to define life as commonly defined other terms, in my position, life is not a thing, but rather as a process. To truly know that life is all we can do is live and this is the only way and how life is lived? Maybe it’s the question we should ask ourselves, what can say to that is this: being alive, flowing, running with her, walking with her. Life is now, is now, life is what is happening to us, life is not something or someone or somewhere that we have to look, life is a gift that we already have. lama you can feel in your breathing, your blood circulation in the beating of your heart. What you are now, that’s your life what happened to you, what is to befall and what not, that’s your life. While humans try to find different meanings to what life is and try to give the concept deeper, scientific, philosophical or theological response will never be enough to describe the life, and while people look the concept of life are missing what it is, they have forgotten the real and have been replaced by concepts and explanations that my term, to take advantage of anything. We see what is actually already here, we rationalizations. Nobody can give you the meaning of your life. It’s your life and you have to give it meaning only you. No one but you can find it. It’s your life and only accessible to you. Only by living the mystery will be revealed. Life is not looking at other people or writings or intelligent explanations, these are only justifications that ultimately explain nothing. Life is already bubbling within. Only if you want her there. The temple is on the outside, you are his sanctuary. So the first thing we must remember to define ourselves is life is never look outside or try to discover somebody. And the second thing to remember is that when you finally discover in yourself that is life, you will find that is death. At the beginning I mentioned that life is a process, well, death is part of that process. Humans usually think that death is the enemy of life, which is the grand finale, which is the enemy to be feared but in reality it is not, death is not the enemy, and if you consider death as the enemy that just shows you have not been able to know what life is. Although it seems absurd, death and life have many things in common, both have the same energy is a phenomenon like day and night, as cold and heat, and summer and winter, life and death are rivals, not polar opposites, are not separated and are not contrary, quite the contrary, they are complementary. Death is not the end of life is actually a culmination of a life, the summit of life, the climax, the great final stage. And once you know your life and your process, then you understand what death is. Death is a part harmony, full of life and is very friendly with her. Without it life can not exist. Death is a renewal process. And death happens every moment. The instant you inhale and exhale the moment, life and death are passing, both are given. By inspiring, life goes; upon expiry death comes. So when a child is born the first thing he does is breathe life begins there, however when the old man dies the last thing you do is breathe, there is life. The exhale is death, life is inspiring. They are like the two wheels of a cart. Lives that inspire and breathe out, is part of the inhale exhale, you can not breathe if you stop inhaling, the exhaling is part of breathing. You can not breathe if you stop exhaling. You can not live if you stop dying. The man who has understood what is your life, let death happen, welcomes you. Dies every minute and every moment to life. LIFE is a process, a process in which the past is dying every moment and born again and again into the future. If you look at what life is like you know what death is. If you understand what death is, only then will you be able to understand what life is. Life is a gift, a gift of God, and have certain scents that make it magical, like love, like friends or family, life is full of little moments that make your story and each of these moments is good live them with people you love and who love you, life without love is like a box that looks beautiful on the outside but when you open it and find it completely empty with nothing of value, that’s love, which gives value to your life. Maybe we’ve heard many times the phrase â€Å"living dead† for my concept that is the perfect definition, a life without love makes us dead in life. When we say â€Å"live life†, we mean that, to love, that gives meaning to life, to love somebody to love many or love everyone, to love God and to love nature. Life is real is what is in you is what queeres, there are things unreal, superficial exterior such as money, money is something that absorbs life unreal how many times we have not worried about getting money and is scientifically proven that concerns cause disease and alters the body of people altering the normal functioning of this, while we worry about things more unreal wears more life and go to becoming a plant that interest only superficial things, fine work and make money, which is not right that this will become the center of your life and everything in you turn around money. If we look at the birds of the sky and see how they survive only with his life, feed and have the best clothes that anyone ever could have, with all those colors and how they sing every morning, the birds live their lives, not care about anything and are inferior to us. We should take example from them. Finally we can say that life does not have to investigate it or try to define it or worry about understanding it, life must be lived and enjoyed.

Monday, September 16, 2019

Impact of Christianity in Australia Essay

* The proportion of Christians in the Australian population continues to decline. * Internationally, the proportion of Christians in developing countries is tending to increase, whereas the proportion of Christians in developed countries generally is decreasing. * This paper first provides a brief overview of the current Australian demographic data and trends in relation to Christian denominations and other religious groups over the past 100 years. * Based on Christianity’s past contribution to Australian society, it then posits a framework for a way forward to contribute to the current and future issues and problems confronting Christianity in Australian society. * Christianity had a significant impact on education and public morality in Australia whin the years of 1788-1900. In relation to public morality, I discuss the significance that the Christian church had on Australian society in the 1800’s by the establishing of the Temperance movement as well as several other actions involving education. * While Christianity played a crucial part in all aspects of Australian society throughout the pre-federation years 1788 to 1900, it had a significant impact on education and public morality. * The influence of Christianity in education was evident through the establishment of a separate education system and, in public morality the formation of the temperance movement as well as other actions. * Education was greatly influenced by Christianity during 1788 through to 1900. Settlers concerned to leave religious divisions in Britain believed that ties between church and state should be eradicated and that churches be supported by their own followers. * Subsequently, with numerous denominations supporting this idea, concerns were partly met by the granting of financial aid to the major religious groups, including the Church of England. * Individuals churches used this aid to maximise its religious and educational influence. * Governor Bourke later extended the state financial aid and attempted to introduce government schools based on the national system in his native Ireland. * However, non-Anglican Protestants, who had formed in 1835 a society for promoting schools where the Bible would be a basis for general education, insisted on its wider use in the proposed national schools than was permitted in the Irish system. * Catholics supported the Governor’s proposal which further angered the Protestants. The successive alliance between the Anglicans and the Protestant denominations favourably brought about an anti-Catholic move to condemn concessions to a religious minority at the expense of national school systems based on the religious teachings of the Bible. * In the past, Christianity has made a sustained and valuable contribution to Australian communities. * To focus on the changing religious demographics in Australia may be discouraging for many Christians, but Christianity again can make a valuable contribution to contemporary societies – if its attention is focussed on the community and not on itself. * This paper proposes that Christians learn from the past and, rather than introspectively focussing on maintaining the two first positions described above, accept the third position and engage with existing communities by utilising communal practical life-style Christian principles. * Perhaps from this new perspective, Christianity will become relevant and re-invigorate the traditional (Christian) Australian values as Described by Linder (2006), values of justice and a fair go, self-sacrifice for the good of the community, mateship based on selflessness, and neighbor love.

Sunday, September 15, 2019

An Overview Of Organic Foods Environmental Sciences Essay

Under the criterions that adopted by the U.S. Agriculture Department ( USDA ) , organic nutrients bring the significance that nutrients raised without chemicals and processed without additives. Man-made fertilisers, pesticides and antibiotics may non be used in raising organic nutrients. Besides that, usage of irradiation, biotechnology, and sewer-sludge fertiliser is besides banned. Farming patterns used before the 1900 ‘s are classed as organic. It was merely after this that added chemicals such as urea and DDT were brought into agriculture. By and large, organic nutrients included organic veggies, fruits, dairy merchandises, meat, and olive oil. Animals can be classs as organic if they are feed with organic nutrients like organic maizes and organic harvests. Based on the information of All for Natural Health, familial alteration is non allowed throughout the whole elevation procedure. Furthermore, additives and seasoning are forbiding to be added into meats. Because of these patterns, organic nutrients bring more nutrition and healthier if comparison with conventional nutrients. Some consumers believe that organic nutrients are tasty due to the agriculture and raising patterns. From a research conducted by Organic Monitor towards organic planetary market, single-digit market growing was observed for the first clip in 2009 because of the economic lag cut downing industry investing and consumer disbursement power. Organic nutrients and imbibe gross revenues expanded by approximately five per centum to 54.9 billion US dollarsA in 2009. Global grosss have increased observed each twelvemonth, except in 2009. Based on the information that collected by Willer and Kilcher ( 2009 ) , more than 140 states are now bring forthing certified organic nutrients with 32.2 million hectares of agricultural land being managed organically globally by more than 1.2 million manufacturers. The states with the largest markets are the US, Germany, and France ; the highest per capita ingestion is Denmark, Switzerland, and Austria which shown in the tabular array below:Table 1.1: The states with the highest per capita ingestion of Organic nutrients 2009Organic Foods Market in Malaysia It is undeniable that the demand for organic nutrients is on the lifting tendency in Malaysia. This lifting tendency fundamentally caused by the alterations of consumer life style as they are more concern about nutrients safety. Harmonizing to IFOAM & A ; FiBL ( 2003 ) , there are 600 hectares of land under organic direction ; with a portion of entire agricultural land of 0.01. Domestic production is mostly limited to veggies and fruit with perchance one organic domestic fowl operator in East Malaysia. Whilst turning, entire estimated norm is still statistically undistinguished ( UNEP/UNCTAD, 2006 ) . Most organic production is sold domestically with some being exported to Singapore. So far, thereA isA no dependable market statistics available. Some supermarkets such as Jusco, Carrefour, set up an organic corner to advance organic merchandises. Based on the information provided by Department of Agriculture Malaysia, Malaysia Organic Scheme ( SOM ) is a enfranchisement programme to r ecognize the husbandman who operates his farm in conformity with the standard conditions set by the national organic criterion, MS 1529:2001. An inspector from SOM will be send to transport out for farm review and the determination to attest whether a farm is organic or non is made by a enfranchisement commission consisting of members from assorted authorities sections. Once the application is successful, a logo of Organic Malaysia will be labeled on the merchandises. A merchandise with this organic logo fundamentally is more expensive comparison to others. In wide, SOM brings benefit to whole society because environmental pollution is minimized and consumers are assured that the merchandises they purchase are genuinely organic.Research BackgroundIt is a fact that the demand for organic nutrients are lifting dramatically in these few old ages. Foods safety and wellness consciousness are turning quickly in late old ages. Therefore, some consumers tend to buy organic merchandises whic h are healthier and higher quality. Under the 9th Malaysia Plan ( 2006-2010 ) that unveiled by the 5th Prime Minister of Malaysia, A Datuk Seri Abdullah Ahmad Badawi, the authorities is aiming the organic agriculture industry to be deserving RM800 million in 5 old ages ‘ clip. The Ministry of Agriculture plans to hold 20,000 hectares under organic farming methods by twelvemonth 2010, increasing local production by 4,000 hectares per twelvemonth. Organic ingestion is expected to turn by 20 % per annum ( DoA ) . Besides this, authorities encourages little scale manufacturer endeavor into organic agriculture. Compare to conventional nutrients, organic nutrients bring a batch of advantages and organic agriculture patterns may minimise environmental pollution. Organic farming method creates organic veggies and fruit contains more 50 % vitamin, nutrition and mineral than farmed nutrients. With a chemical free agriculture method, organic nutrients may cut down nutrient toxic conditio n and forestall some diseases. Pesticides and antifungals are spray on veggies and fruits straight on commercial agriculture method and excessively much ingestion of these chemicals in long term can do malignant neoplastic disease because of it can non be to the full digest by our organic structure system. Therefore, organic nutrients are better pick to cut down the opportunity to develop malignant neoplastic disease. From environment facet, organic agriculture method takes good attention of dirt and land because it encourages the recycling of foods back into the dirt so it can really make better long term sustainability for our land resources.Problem StatementIn facts, there are many research workers making research on the facet of organic nutrients but there are non much research sing Malaysia organic nutrients market. This has triggered the involvement and avidity to analyze more about this subject. Despite authorities has mark to increase organic farming industry, but there are still some consumers do non aware about the particular properties of organic nutrients compare to conventional nutrients. Furthermore, organic market in Malaysia can be considered as little comparison to other western state such as United State and Australia. Besides than these, factors and motivations that influence families to alter their purchase attitudes from conventional nutrients to organic nutrients is besides one of the factors that triggered the involvement to analyze more about this subject.Research AimsThis research paper is conducted for the intent of: To place is at that place any relationship between 3 factors ( economic, psychological science, direction ) and purchase determination of organic nutrients among Malaysia families. To find what is the chief factor to act upon Malaysia families on buying organic nutrients. To research the relationship between demographic background ( age, instruction degree, gender and faith ) and purchase determination for organic nutrients.Research QuestionsBased on the research aim that stated in 1.4, this research will set up several inquiries: What are the relationship between 3 factors ( economic, psychological science, direction ) and purchase determination of organic nutrients among Malaysia families? What is the chief factor to act upon Malaysia families on buying organic nutrients? What is the relationship between demographic background and purchase determination for organic nutrients?Definitions of Key FootingsTable below is the list of cardinal footings with accounts of definitions that the writer will concentrate on in this survey.Table 1.2 Definitions of Key FootingsCardinal TermDefinitionBeginnings1 Organic Foods Foods produced without utilizing most conventional pesticides ; fertilisers made with man-made ingredients or sewerage sludge ; biotechnology ; or ionising radiation. U.S. Department of Agriculture ( USDA ) 2 Economic A scientific discipline which surveies human behavior as a relationship between terminals and scarce agencies which have alternate utilizations. Lionel Robbins ( 1932 ) 3 Psychology A scientific survey of human behaviour and mental procedures Feldman, ( 1990 ) 4 Management 5 Demographic A characteristic used to depict some facet of a population and that can be measured for that population, such as growing rate, age scope, income degree, and instruction background Laura Klappenbach, n.dScope of StudyIn order to increase readers ‘ involvement, this research paper is titled as multidimensional selling positions of organic nutrients. In a simpler word, this research paper is conducted to look into what are the chief factors to act upon consumer from Johor Bahru and Malacca to buy organic nutrients. Therefore, the lone dependant variable is organic nutrients purchase determination. Four independent variables had been established to mensurate this relationship. The four independent variables that have been employed in this research are economic, psychological science, direction and demographic. Survey signifier will be established and administer to aim respondents, family from Johor Bahru and Malacca province who age from 20-65 old ages old. 200 sets of questionnaires will be every bit distributed to aim respondents based on demographic background which is gender. In other words, 100 sets questionnaire will be distributed to male while the re mainder will reply by female.Significance of the StudyFirst, this research paper can be use as a mention to consumers particularly families who are sing to buy organic merchandise, this research might assist them through giving a clearer image about some elements and advantages of organic nutrients. Furthermore, this will take more pupils to take organic nutrients. Second, this survey of organic nutrients shall besides alarm organic husbandmans on some betterment needed. Through this paper, organic husbandmans will understand more about consumers ‘ consideration before they purchase. Some installations can be added to increase the production of organic nutrients. In add-on, organic husbandmans will be provided a clearer image about Malaysia organic nutrients market and organic label. Third, this paper shall give information to those organic nutrients retail merchants. Through understanding consumers ‘ outlook towards organic nutrients, organic nutrients retail merchants can pull off their merchandise from the facet of pricing, wrapping and labeling to excite gross revenues volume. In add-on, this may make more occupation chances and assist to foster better Malaysia ‘s economic system. Last, this paper can be contributed as a mention to future research worker who intends to carry on research in related field. This paper can be a guideline to assist researcher hold a clearer image and smoothen their research advancement.Organization of the ResearchIntroduction about organic nutrients and overall of this research are discuss in chapter 1. Organic nutrients market in Malaysia is defined here and follows up with research background that focuses on some information about organic nutrients. Research aims and inquiries are established in chapter 1 that discuss about aims to be step in this research. Chapter 2 is concentrate on the past literature reappraisal that are related to organic nutrients, which has been published by a big figure of research worker. The chief independent variables will be explained in this portion which consists of economic system, psychological science, direction, and demographic. A really specific account of each variable will be provided in this portion. Chapter 3 will calculate out the research methodological analysis that will be used in this research paper in order to happen out the relationship of independent variables towards purchase determination of organic nutrients. In add-on, hypothesis and theoretical model will be besides shown in this chapter. Apart from these, informations analysis method and trying design will be explained in item. Chapter 4 will continue with the analysis of the information that have been collected by utilizing Statistical Process for Social Science ( SPSS ) Version 18. Analysis of demographic background of the respondents is provided in this chapter. Chapter 5 illustrates the treatment of the hypothesis. Each of the hypotheses that established in chapter 4 will be farther explain in this chapter and follow by deductions. Furthermore, restriction of the survey and some recommendations for this research paper will be provided in this portion. Last, a simple decision will be usage to stop the full research.Chapter SummaryIn overall, chapter 1 has explained the definition and organic nutrients market. In this portion, the research worker has besides set up the research aim for this survey. In add-on, the definition of dependant variable and each independent variable has been explained in a table signifier. Last, range of survey and important of the survey besides has been explained in inside informations in this chapter.

Saturday, September 14, 2019

Cultural Interaction Analysis Essay

Mining is a process that is composed of three major logical, organized and sequential phases; exploration, development and production with unique risks, economic considerations and constraints characterizing each stage. Before deciding to develop a mine the mining company first considers the social, socioeconomic and environmental consequences of the decision. This paper discusses the problems that the foreign mining companies face while undertaking their mining processes in a community with different culture than theirs. The major hitches they faced mostly included; power differential, permeability and psychosocial factors like suspicion and fear between the company staff and the local community members. A Canadian gold mining company in Ghana faced these challenges during their stay in this West African country. The crises originated from language barrier and past experiences the local communities encountered with other mining firms. Although the official language in Ghana is English the larger percentage of local residents were illiterate and were only conversant with their local dialects. This made conversation a problem as the miners could not learn those languages easily. Even with the assistance of interpreters there was distortion of facts resulting into power differences. Similarly, sections of the community were so indifferent with the mining company since the previous mining companies had negative effects to their environment and families. Their children whom they taught were to earn their living from these mining companies were instead exploited. However, the major factors that affected the company-community relations and which also had an immense impact on how exploration activities were viewed by this community included: First, the cultural diversity between modern business practices of developed countries as represented by exploration activities and traditional communities. Second, was the extreme power differential that existed in any contact between the two interacting groups. The locals perceived the exploration activities in seclusion and with minimal knowledge of the larger picture within the mining industry and therefore they were not only uncertain but also fearful concerning the exploration activities. The local community rarely understood the risks that were associated with mineral exploration as well as the period of time required to prove the economic viability of the mineral deposits. They further assumed that a mining company would only invest huge amounts of money with a fixed time frame for advanced exploration. The mining companies were unable to bridge these power differentials that resulted into justifiable expectations as well as fears from the locals. But the expectations were antagonistic to the reality on the ground about the mine to be developed. These communities were unable to distinguish between a major company and a junior company whereby to them these companies appeared to be equally rich, powerful and potentially threatening. Additionally, the local community feared being marginalized due to language barrier and power impermeability and wished to be given a continuous update of day-to-day events of the company. They further expected to receive immediate answers to their worries from the company officials. Since these fears were not addressed in time by this Canadian company there immerged ill-founded rumors and misinformed messages which gained credibility within and among the community members resulting into increased fear and disquiet from the community (Ian Thomson and Susan A. Joyce 2000). This situations surrounded by fear and distrust between the community and the company severed the communication and understanding between the two giving way to outside interest groups and thus impairing further efforts for deliberations. The experiences and the extent to which the community felt uncertain about the future impacts of mining activities mining industry led into increased suspicions. The Communities viewed the mining industries differently depending on the previous exposure to mining explorations. Members of those communities without a history of mining were naive and inactive towards exploration activities which were taking place around them since they believed that good things like job opportunities and development of the area were to be associated with these explorations as well as mining activities. On the other hand, the responses of those communities which had an history of mining were diverse since some were willing to welcome exploration while others unwilling and instead turned hostile to the presence of foreign interest or as well as opposed a return to environmental and social destructiveness experienced in previous mining activities. Areas with small scale artisan mining were so much opposed to these mining activities since they feared being displaced, their traditional livelihoods being destroyed and alteration of their way of life within their community. The mining company did not take time to make the local community understood well the nature of their work as well as address the hopes, fears, traditions and social norms that may result into conflict and negative consequences to all parties. However, the mining company could prevent all these from occurring by forming a community relations team whose major role would be to mitigate the impacts as well as to build a harmonious relationship based on proper handling of expectations, prevention and resolution of conflicts. The community relations team should also be involved in incorporating the results of stake holders, mapping process, identification of Impact area and summarizing quantifiable objectives and targets based on management indicators that are measurable (Chuck F and Fernando R. 2007). Equally, the community relations programs and policies should cover local purchasing, local manpower, hiring training, land purchase and resettlement grievance resolution. The community should be consulted in every endeavor that the industry engages in as well as collaborating with the local communities to fully understand the social cultural values and aspirations and reach a consensus on the best priorities identified by the community. 2nd Analysis It has been established that Canadian mining companies have the largest stake in the mining industry in most third world countries. Official records indicate that this stake is at 30% of all mining prospects in Africa. South Africa too plays a huge role, it is home to many giants mining companies in Africa and consequently the largest mining company is the world DeBeers is based and headquartered in Johannesburg, South Africa, it has mining interests expanding throughout the world. These two companies have dominated the mining industry mostly in the third world and have over the past years been on the focus over various issues but mostly centering on their relationships with the surrounding environment and the communities As afore maintained, mining companies have strained relations with the locals. This relation is centrally compounded by the difference in cultural dispositions and the overbearing ulterior motivates of mining companies. Profit remains the basic drive in business and the mining companies pursue it at whatever cost, many times with no consideration of the locals’ needs and priorities. An analysis of cultural interaction between the miners and the local communities must take this in to account. A look too in Latin America also produces this grim picture. Latin Americans have been up in arms over what they claim are exploitative tendencies from the mining companies. This is the basis of analysis of the culture between the miners and the neighboring communities. The relationship between employees and the neighboring community is also equally strained and both have a rough time interacting with each other. A look at the mining culture over time indicates that it tends to disregard the community interests and the relations between the two are usually digress to a point of hostility Jacobdeen Higgins is an engineer with one of Canadian companies based in Latin America. This is his fifth month in Ecuador, having been transferred to Quito after leaving an equally lucrative job in his homeland Canada. His relocation to Ecuador was after a promise of a hefty allowance as well as other fringe benefits. In his middle age, this is his first time to travel out of Canada and consequently his interaction with people from the developing countries. He has been born and raised in a country and a neighborhood that has not amply prepared him to interact with people of diverse backgrounds and mostly those that live with an income of below a dollar per day. This factor is further exacerbated by the nature of his occupation. He is a miner and the perception the locals in Ecuador have of miners is one of fear and hatred. They see them as exploitative and only seeking to deflower the vast virginal and resourceful land in Ecuador. The first issue Higgins has come to grapple with is the difference in the orientation of the local communities cultures and way of life with that of Canadian miners. There exist such fundamental variations in the two cultures such that the interests between them are always at a crossroad. The first barrier and major difference that Higgins has had to cope with is the language. This however is not unique to Canadian miners in Latin America but is a problem faced by most miners in foreign lands and aggravates an already sour situation. This is one predicament that miners tend to overlook. They do not take time to learn a few lessons on the cultural disposition of the local communities. Higgins is only fluent in English, it is his only language and beside that he can only catch a few French words. On the other hand Ecuador is a Spanish speaking country and in deed it is the official language. Besides that, there are other local dialects that would take years to learn. His company has based its operations in Napo province. It is a territory that is laden with mineral resources, but the company has centrally for the time being focused on gold. The communities residing in Napo province are yet to come in to contact with large mining companies with such huge machines and large workforce mainly composing of foreigners. Very few too understand or speak English. The majority of the leading personnel on these mining companies do not understand Spanish or worse still the local dialects Higgins has been at pains trying to interact with local community and mostly has to employ the use of interpreters who charge exorbitant prices. His position in the company requires him to source for laborers from the neighboring villages and small towns, in so doing the potential laborers have to undergo strenuous interviews to establish their skills and competencies. This is a nightmare he has to contend with in his daily activities. First comes the issue of hostility from the locals and then the tricky situation of the local language (www. mineralresourcesforum). Small-scale mining has been entrenched in the local community’s economic system. Artisan miners roam all over and wield so much influence in the community due to the lucrative nature of their venture. To them, and equally to the rest of the community, Higgins and his work colleagues are foreigners and should be accorded the treatment befitting intruders. This however is understandable as the large companies pose a threat to their livelihood. To the rest of the community the miners are a threat to their lands and open hostility is only way to pass this message. Others in the same community view Higgins with a mixture of dread and awe. He drives a big four-wheel state of the art vehicle, a luxury machine and a reserve of the top government executives and rich businessmen. He clearly does not understand the lives of the locals and does not understand why the locals are reluctant to leave their lands when there is a goldmine lying underneath. In his first days in Napo province, Higgins had been enthusiastic of this first chance to interact with the locals, however his friendly grins were usually met with cold stares and mostly harsh insults form the locals as he later came to learn from a political representative who nowadays acts as his guide just because he understands a few English words. Communication has been difficult to a point of frustration, attempts to reward with kind words or reprimand his employees are met with again cold stares; they just cant communicate with each other. This has resulted to a situation characterized by hostility from both the company and the local community. They rarely communicate with each other beyond a point of need. Higgins is now filled with disparage for the locals. He has been unable to understand their needs and neither their hostility, to him and to the rest of the miners. The minimal interaction he has had with the locals has not helped patch this ill feeling towards them. But for the cheap source of labor, Higgins would not wish to interact in any way. This is the notion and the perception held by both parties and emanates from the inherent cultural differences existing between the miners and the communities. Whereas miners such as Higgins are driven by personal economic motives, the locals on the other hand are wary of the miners and fail to see the long term economic benefits that may arise, they abhor the environmental degradations and social afflicts the mining will have on the surroundings and especially on their lands. 3rd Analysis This Canadian mining company has also to contend with the challenge of safety, more so, convincing the community of the appropriateness of the measures put in place to ensure the safety of the workers and the environment. The issue of communication not withstanding, safety concerns continue to bug the mining companies. It is not a secret the extent of devastation meted out against the locality of the mining operations. They leave huge dents on the surface of the earth and damage the natural habitat permanently. The surrounding communities are aware of this and they usually fight tooth and nail to have the companies relocate their activities or demand huge compensations, which in most cases pass unyielded to. Higgins is in the same position; he stands between a rock and a hard place. The company wants to mine, explore and exit within the allocated time but the neighboring communities are unrelenting in their adamant resolve not to give way. Miners culture has over time not demonstrated any considerations for the welfare of the environment, driven by surreptitious intentions, environmental needs take a back seat being overridden by profit maximization needs. Rarely does it have any room for plough backs directed towards environmental conservation. Being in an influential position as he is, Higgins is at the forefront in building a favorable relationship between the community and the company. He is also aware of the implications of the company’s mining operations but he is not in a position to call the shots within the management. He has a rough time trying to make his guide understand this. He also thinks that the devastations caused by the miners are exaggerated compared to the benefits that are reaped through mining. As the guide tells him, the local community’s hostility emanates from this fear. They fear the environmental impact of the mining project, the hazards that lie in wait resulting from the industrial wastes and air pollution from clouds of dusts emanating from the earth’s bowels. A look at the vast lands in Napo province reveals an expansive land untainted by the vulgarities of modernity. Most of the land is still in its virginal state and is characterized by uninhabited territories that remain revered and cherished by the locals. The mood on the ground is set against the mining companies operations. The vast natural habitat is a source of spiritual inspiration to the surrounding communities and has come to wither a lot of human onslaughts. To Higgins and the mining company in general, those perceived considerations do not hold any water. They are in business and will pursue their interests to the end. It is an economic venture that eventually stands to benefit the locals through employment opportunities. Producing more benefits than the natural habitat in its current state stands to do. Mining culture is impervious to environmental hazards consideration; its eyes are on the prize and not on the sideshows. It is not in line with the local communities worries on safety in the environment. Miners are hungry for profit and the only way to maximize it is through intensifying their explorations. Higgins’ guide cannot understand this selfish drive and likewise the local community’s does not. They value social interactions and solidarity more than economic ventures. The community is close knit and not highly commercialized to a point of neglecting social ties. The attachment with the environment is to a point of divinity. The environment is clean and the mining operations are a threat to this, they fear that it will bring pollution that in the end might result to diseases and other health complications. The safety of the environment remains the central factor. To most local communities where mining takes place, the environment is not the only safety consideration; safety within the mine is also taken into account. Higgins has had a rough time trying to explain the safety measures put in place to ensure that his (and that of other employees) safety in the mines, but the few incidences in the mines world over that have resulted to fatalities are a prove that the unexpected sometimes happen. His guide as well as the rest of the community are convinced otherwise. The prevalent perception and notion held by the majority of the local people is that the mines are not a safe place to work in, the sight of the complicated machines and the large pits confirms this, the miners recognize these machines and the large pits as a source of livelihood. Higgins is an engineer and understands the internal dynamics of these machines. He has operated these machines and been in the bottom of the pits for years and is convinced that they are safe. The necessary measures have been put in place to ensure this. This is the same headache facing Higgins as he tries to recruit more and more workers. The local community is adamant on the safety hazard of the mine. They claim that it can collapse any moment as a result of the spirits vexation towards humanity for destroying its habitat. Few people are volunteering for the underground mining due to the perceived hazards. The local community is also set against this. Families, even in the rampant poverty, are willing to see their family members involved in the mining activities. Pressure is being put by the families of the young men who are in search of quick bucks in the mines, they don’t want to see them volunteering for the underground operations. The local community, according to Higgins’ guide, knows that the dust from the mine can lead to health complications that can turn fatal in the long run. A look at the local communities cultural beliefs, practices and perceptions reveals that they are different from the mining culture. Miners are more concerned with the output and the benefits in the mines more than with the safety environmental consideration. Miners are trained scientists and rarely take a course on social relations. They do not understand the complexities of the local community and the diverse nature of their culture (Lia Bryant and Delrdre Tedmanson 2002). To them, mining is just but a renewed opportunity to make a killing. It is important that the mining culture undergoes a major transformation to ensure that miners are more responsive to the local communities’ needs and aspirations. They should enact mechanisms through which the mining companies should plough back a portion of their profit back into the community to ensure a trickle down effect to the people on the ground. The hostility that arises between the mining companies and the locals usually is fostered by the reluctance of the miners to take time and understand the local community. People are of diverse cultural backgrounds and have some ununderstandable attachment to their ancestral lands. This is not expected to change over night. Understanding the underlying cultural factors and language should be a prerequisite to mining activities. References Ian Thomson and Susan A. Joyce (2000-08-17). Minerals exploration and the challenge Of community relations: PDAC accessed online on 23/10/07 http://www. pdac. ca. pda/members/community/relate. pdf Chuck foster and Fernando Rivera (2007): Mining in Ecuador Hard assets investor. com Accessed online on 23/10/2007 http://hardassetsinvestor. com/index. php Lia Bryant and Delrdre Tedmanson (2002): Diversity in the mining industry: the International journal of knowledge, culture and change management. Accessed Online on 23/10/2007 http://ijm. cgpublisher. com/product/pub. 28/prod. 241 Doctor Mthethwa, Matthews Hlabane, and Ibinini Mara: Breaking communication Barriers between communities affected by mining and the mining industry in South Africa accessed online on 2007 October 23rd. http://www. mineralresourcesforum. org/docs/pdfs/communication. pdf