Thursday, October 31, 2019

Summary Essay Example | Topics and Well Written Essays - 500 words - 152

Summary - Essay Example Additional to this are some famous and demanding worldwide organizations that are occupied in underlining all-purpose human rights problems as well as issues in Africa. The editorial highlights the contradictory interests plus diversified deeds. The issues have been brought forth on the rights matter since the formation of the Organization of Africa in 1963, at Addis Ababa, Ethiopia (Santosh 1). Africa went through some issues that discolored its image of the human rights. They comprise the rise along with the fall of evil dictators like Jean-Bedel of the Central African Republic, Fernando Nguema of Equatorial Guinea and Idi Amin of Uganda. In Africa there has been an unrelenting call for the conservation of civil and political right as per the article. Relations established particularly in the 1980’s and 90 are plea on strict enforcement on human rights. The piece of writing asserts that there is a special rule in which one requirement to give treatment to treat the other as they would love to be treated. The editorial stress on the works completed by groups that are anonymous as well as exposed ones as well as those that a evidently respected in the civilization in trying to avert governmental infringements of political and social rights. The writer states how nongovernmental organizations have disputed against rights breaches like favoritism, aggression against ch ildren, women as well as refugees and persecution (Santosh 1-5). NGOs have persisted to keep significant responsibility while they study human rights in diverse parts of African although they are weak. The drive, energy, vision, the obstinacy of global human rights movement at present lies fully with the NGOs. The NGOs dedicate a lot of funds in promoting and shielding the human rights. The NGOs are troubled with the clash for human rights troubles and are spearheaded by the Amnesty International.

Tuesday, October 29, 2019

Benefits and Effectiveness of Accounting Essay Example for Free

Benefits and Effectiveness of Accounting Essay The research was based on two variables these are computerized accounting systems which comprise of definitions, components of computerized accounting software and benefits and limitation of computerized system and financial reporting which also comprises of definitions of financial reports, benefits and effectiveness of accounting system used at National Water and Sewerage Corporation. The study will enable management to understand the significance of preparing quality and reliable financial reports. The study will point out weakness in the accounting system which management needs to address. The Government of Malaysia through the Department of Accountant General (MDAG) has instructed MARA to implement the Standard Accounting System for Government Agencies (SAGA). This is a total Enterprise Resource Planning (ERP) System, developed based on web-based application and is using an accrual basis of accounting. The SAGA financial system enables its users, particularly the government agencies to close their accounts on a daily basis, monitor their daily financial activities as well as produce standardized financial reports to the stakeholders at any place and any time. However, upon completion of the SAGA financial system analysis, MARA identifies that the system could not cater all MARA business activities. Processes such as disbursement of scholarship and loans to students and entrepreneurs are not covered by the system. As such, MARA still has to maintain its existing databases and therefore made special request to the MDAG to exclude the implementation of SAGA while awaiting MARA ICT consultant’s recommendations on the development of a new MARA Total Information and Financial System. As a conclusion, the SAGA financial systems could not be used by MARA on its own. The end-users in MARA need to operate both, SAGA and its own systems at the same time. This situation could lead to users’ confusion if they are to use different type of system when updating certain type of financial transaction. This is because the end-user of MARA Computerized Accounting System could only utilized the SAGA Financial System just for ordinary operating expenditures whilst any disbursement of expenditure pertaining to subsidiary system, they still need to use the existing MARA Financial Systems. Consequently, internal controls and security functions may not be easily built in the systems. Concurrent use of both systems may affect job satisfaction and performance of the end-users. Introducing Computerized Accounting Information Systems in a Developing Nation: Egyptian International Motors This study aims to assess the implementation of accounting information system on a company in a developing nation. To answer this question this manuscript attempts to do the following: (1) identify the reasons for the shift to an automated system and the main goals that the company aim to achieve form this shift, (2) determine the company’s strategic decisions like choices between outsourcing versus in-house development, and ready made packages versus tailor made software, (3) describe the steps of implementation, (4) understand the reaction of the employees to the new automated system, (5) study the required changes on the organizational chart and human resources qualifications that are required, (6) recognize the problems that the company met during the process, (6) point the advantages of the shift to the automated system. A computerized accounting System provides many advantages over manual systems, for example entries do not have to be recorded in multiple ledgers so as to fulfill the cardinal rules of financial reporting.A single entry is made and the system will populate all the appropriate corresponding accounts automatically. Computerized accounting also makes it possible for people in other departments,not just accounting to enter data.It does not require avast amount of accounting knowledge for a payroll clerk to enter wages details into the accounts,a basic understanding of how to use the system is sufficient The study intends to find out the effect of a computerized accounting system on the quality of financial reports generated by an organization. To examine the effect of computerize accounting systems quality financial reporting. To determine the challenges encountere by organizations before and after implementing a computerized accounting system. To identify strategies/measures of ensuring quality financial reporting. An accounting system is part of the organisation’s management information system therefore a good or decent accounting system must be able to produce reports like trial balance, aged debtors and aged creditors. Accounting systems must provide data that should enable the production of management accounts, statutory accounts and must also assist the managers and accountants in discharging their stewardship roles. Production Of Accounts A good system should enable the firm to produce its management reports and management accounts at short notice. This will enable the organisation to monitor performance, to take decisions quickly and to make decision based on objective and verifiable information. Audit Trail Audit trail is very important as it will enable auditors and senior managers to monitor transactions entered in the accounting system and this will ensure that there is information integrity. A good system should document the changes that have been made in the system, who made the changes and it should also be able to track what was changed. Compatibility With Other Programmes A strong characteristic of a good accounting system is that it must be compatible with other systems. For example, it should easily be configurable so that it can communicate with other programmes like Excel or Crystal. An accounting system should be able to export transactions and reports into Excel and it should allow data and transactions to be imported from an external source. This will lead to time savings as there will be no need to duplicate a role or process. Error Detection If an accounting system does not dictate errors then it is not a good accounting package as it is failing to perform a basic functionality. An accounting package should decline to post transactions that do not balance for example the total debits should equal the total credits and if this is not the case, then the accounting system should automatically flag this error. Internal Controls Internal controls are the eyes and ears of the organisation and a good accounting system should embed these internal controls into the system. Internal controls enable prevention and detection of fraud and error. An accounting system should enable internal control tools like segregation of duties, reconciliations and account allocations. A good accounting system should not allow users to delete data that has been posted into the system. Manual Vs Computerized Accounting Computerized accounting systems provide more benefits than manual ones, allowing for more accurate calculations, in less time. Compared to manual accounting, with a computerized system errors are far less common, eliminating human error. And with accounting programs that are industry-specific, you can benefit from various preset templates for your general ledger, saving more time. You can store virtually endless information, without any trouble at all. And if you later want to review financial information from several years ago, with a computerized accounting system you can do it easily, while with a manual one you would have to sort through stacks of paper ledgers. Bottom line, both systems may be useful to some extent. But for more accurate bookkeeping and increased efficiency, a computerized accounting system seems to have more advantages. You can find several free versions online, as well as more proficient accounting software available for purchase. Search online for such accounting systems, read about their features and decide which one would be better for your particular business needs. Although they will not allow you to physically handle the ledgers, it will provide a better accounting solution. The advantages of Computerized Accounting seem to be unknown by business owners and individuals who are in doubt of purchasing Accounting Software. Accounting Software has been a trend nowadays. With the vast Computerized System Providers and wide range of versions to choose from, Accounting System has evolved to be one of the trends in information technology. Computerized Systems are designed to create more value in Financial Accounting. Value can be relayed in terms of speed, accuracy and reliability of accounting data. With Computerized System, invoices can be transmitted in an instant through email; inventories are appropriately monitored; and disbursements are tracked for payments to be done before due dates. It helps Bookkeepers to reduce manual activities. When transactions are entered in the Accounting System, automatic entries are posted to generate data needed for financial reporting. Accounting Software enables Bookkeepers and Accountants to adjust necessary accounts to reflect the correct amount of each Account. Computerized Accounting allows Accountants to trace erroneous data and entry in a creative and organized manner through the help of summaries, list of accounts and original entries. Article Source: http://EzineArticles.com/?expert=Jason_Tsang Article Source: http://EzineArticles.com/7017983 Computers are extensively used in accounting and there are multitude of computer software for Accounting, MIS, CRM. HiTech Financial Accounting is one such software which has been customized for users in many segments in business and services. Payroll accounting was the first commercial area to become widely computerized. The calculation of wages or salaries involves a number of variables which relate to the personal details of each employee, such as gross pay or rate for the job, individual deductions, tax liabilities of the employees and so on. These facts can be retained in the computers and processed every month of produce pay slips for the employees. The computer helps to exercise the type of stock control needed by the organization. It up to dates the sales and purchases records, determines optimum re-order levels for different items and prints out the stock lists when desired. The system can be so designed that it triggers orders when stock level reaches order point for variou s material items; tests those item which are slow moving or gives list for over stock items. Programming can be done for any sales accounting system. The computer will pin point defaulting debtors, determine the right limit for credit for each debtor and maintain stores ledger. Costing and budgetary control can be affected through the computer, the computer will point out the variations from the planned performance.The computer also helps greatly in production planning and control. It is possible that scheduling of the work may become necessary due to break downs etc. A new critical path may have to be worked out. A critical path is the shortest path to be followed in production to achieve production objectives. The computer helps the management lay down this new critical path. The increasing competition and the highly demands of globalization, Malaysia government attempt for Small Medium Enterprise, SME for the development of innovative, competitive with high technology. Computerized accounting system (CAS) adoption may be decisive factor for an organization to be success and also to survive. This research project which aimed to investigate SME practice of CAS and to identify the factor affecting the adoption among SMEs in Melaka. A survey was carried out through a set of questionnaires to examine the CEO Innovativeness Factors Scale, Perceive Usefulness Factors Scale, Perceive Ease of Use Factors Scale and Business Competitiveness. The sample selected comprised of CEOs of SMEs in three districts in Melaka, namely Melaka Tengah, Alor Gajah and Jasin. The data gathered were coded and analyzed using descriptive statistics, linear regression analysis, Pearson Correlation analysis and Analysis of Variance (ANOVA).This study reveals that CAS adoption rate in SMEs in Melaka is high. Results from the analysis also shown the significant of independent variables and proved the relationships have been substantiated to the dependent variable which contribute to the usage of CAS adoption between SMEs in Melaka. The findings indicate that CEO innovativeness; perceive ease of use and business competitiveness negatively correlated to the adoption of CAS. Results reveals that only perceive usefulness are significantly positive correlated to CAS adoption. Therefore it can be deduced that adoption of CAS among SMEs in Melaka is caused by its usefulness. The findings reveal that types of business and business location influence the adoption of CAS. However, size (paid up capital, sales turnover and number of employee) do not influence the adopter. Results also indicate that CEO literacy on ICT, accounting and CAS has influence the responded CEO to adopt CAS in their business. However, the advantages by using the accounting systems software were not fully utilized by CAS adopters. http://www.ccsenet.org/journal/index.php/ijbm/article/view/18273

Saturday, October 26, 2019

Principles Of Information Security And Governance Information Technology Essay

Principles Of Information Security And Governance Information Technology Essay The progress and expansion of the field of information technology and worldwide network has given birth to the issues like, violation of information security, hacking and virus attacks. Information security governance play vital role in providing regular protection of information from a wide range of threats to ensure business continuity. It helps minimize risk factors, maximize profits, investment returns, and boost the reputation. Virus attacks, hacking and information theft are some of the basic dangers faced by many organizations, and the solution lies not only in the hands of technology but management as well. Information security failure or poor management lead to business and financial loss and reputation damage. I will be shedding light upon the principles, risk factors, privacy threats and then the required strategies, policies and procedures for administration and management of an information security and governance program in my organization. Information Security Governance A structured framework of policies, procedures and authority of handling, sharing and recording information securely and confidentially is termed as information security governance (NHS, 2005). A successful information security governance in an organization ensures the confidentiality, integrity, availability, authentication and identification, authorization, accountability and privacy (Whitman and Mattord, 2009, p. xvii) of information and data related to security and reputation of an organization. Information governance in an organization requires teamwork, where all the staff members are aware of the importance of the confidentiality of information. This framework makes sure that the information and data is secure with accuracy and also that the information are shared and recorded in compliance with all the legal and lawful procedures and proper set of rules and guidelines (Simmons, Scott, et al., 2006). Information security governance compliments the Information technology and corporate governance and is an important segment of both. Most of the companies in order to provide a contemporary environment to the information system of governance are using internationally recognised frameworks like; COBIT and ISO 17799. The Control Objectives for Information and related Technology (COBIT) is a framework designed in 1992, by the IT Governance Institute (ITGI) and the Information Systems Audit and Control Association (ISACA). This framework works for the IT management in implementing and developing the Information security governance on a wider platform. It includes the threat analysis, risk assessment, cost estimation as well as countermeasures and future (Solms, 2005). Figure 1 : Proposed Integrated IT Governance Framework (Dahlberg and Kivijà ¤rvi, 2006). Figure 1 shows a proposed integrated IT governance framework. A successful information governance structure builds on the integration between the structural and processes perspectives of IT governance, business-IT alignment, and senior executives needs (Dahlberg and Kivijà ¤rvi, 2006, p. 1). The framework requires the involvement of the management board, executive and subject steering committees, service delivery teams and all the staff members related to the networking, systems, applications, desktops and cross functional works (Richardson, 2010, Q 3). Implementation and administration of IT security are carried out by the Information security management of the organisation which help identify the levels of requirements. Information security management follows a methodology or framework which include top management commitment and information security policies (Ghonaimy, El-Hadidi, et al., 2002). Information security governance ensures that the information security management establish, implement, monitor, and review these procedures and policies in order to meet the business objectives of the organization (Pironti, 2008). The Information security team is responsible for handling security issues regarding the safety and confidentiality of companys information and data protection. It also helps maintain the integrity and availability of information. Information security management deals with the security team, organisational culture, change management, assessment risk factors, people and risk behaviour. It is responsible for the deve lopment of strategies, policies and procedures to reduce threats, risks and attacks. The Security team presents to the management team the security analysis, reviews and implementation plans (Parker, 1981). Information Security issues and risk factors A hack, a virus or a denial-of-service attack may have the effect of halting business operations (Ross, 2008, p 1). The main dangers faced by many organizations include, identity theft, leakage of personal information, data manipulation and modification and improper access to security passwords and secure areas. Widespread IT security risks include; malware, hacking the system, terrorism, extortion, people and non compliance behaviour of the staff and mangers. These dangers can affect the overall reputation of the company and stakeholders become concerned. Main losses and threats include; loss of Confidentiality, integrity, availability, authenticity and reliability of information, which require protection (Stoneburner, Goguen, et al., 2002). Confidentiality threat means the unauthorised access to secure information. The breach of confidentiality can occur in number of ways, like the absence of the screen savers on the personal computers and laptops would invite dangers like leakage of data information as staff members or any external visitor with bad intentions can easily access them. Similarly, the post-it notes with id and passwords reminders would pose the same violence of confidentiality. Secondly, the direct access to the server room key would be like inviting security theft and accessibility of the unauthorised person (Stoneburner, Goguen, et al., 2002). Integrity implies unauthorised modification and manipulation of data. Unauthorised access implies leakage of important information which could mean that anyone can steal or misuse the confidential information of the company and this could lead to the distribution; alteration and stealing of personal data and identities of key personnel and hacking and virus attacks on the organization secure system. An employee can misuse the data information by changing the main figures, mistyping or deleting important information by accident or on purpose. When members of staff take the official laptops home with unencrypted personal information, this could mean the leakage and distribution of confidential data going in the wrong hands (Stoneburner, Goguen, et al., 2002). Availability means providing accessibility only to the authorised users. Loss of availability of data could be caused by attacks like hacking, virus or hardware failure. Unavailability of system to the end-users could mean for example affecting the productivity time and hence affecting the organisational goals of the company (Stoneburner, Goguen, et al., 2002). There are number of other issues and risk factors regarding information security that can threaten the Information security governance. Lack of professionalism of the employees can generate many high risk issues, for example, sending unofficial emails within the organization indicate improper use of internet, which is wrong and unethical. Plus if someone is incharge of companys high risk or sensitive data information then internet browsing or emailing can easily invite virus attacks or hacking. Information Security Strategies, Policies and Procedures These risk factors and security issues require proper security policies and advanced framework. Although the HR department already possess a set of security policies and procedures but they are seldom implemented. The information security governance program works with the risk management program with strategies, security policies and procedures to work effectively in providing a completely secure environment. Information governance ensures application of all the security policies (Nagarajan, 2006). Risk analysis is very important before implementing information security rules, strategies, policies and controls. Risk analysis forms the basis of risk management system. Implementations of information security in an organization comprise six major activities: Policy development, understanding roles responsibilities, suitable information security design, regular monitoring, security awareness, training and education. Now in order to achieve reliable information security essential elements of control within the organization is required. Security controls include technical and non-technical controls. Technical Control Technical control provides logical protection by implementing protective software into the system. This includes; access control mechanisms, identification and authentication mechanisms, data encryption, access control list and intrusion detection system, plus other software and hardware controls. Computer security can be achieved by creating strong passwords, updated anti-viruses anti-malwares, firewalls, screen savers, proper encryption and creating backup files (Stoneburner, Goguen, et al., 2002). Keeping in minds that the passwords should be strong and well protected and employees must not share them with anyone and these passwords should be changed periodically. Organisations must have incident response procedures which include the backup generators for electric failure and off-location data centres in case of natural disasters or accidents. Non-technical Controls Management control include management and administration of security policies, operational measures, risk assessments and training and education. Management control is responsible for educating staff members to guide them in handling the case sensitive data and information through a suitable security awareness program. HR team should conduct a proper background check on the employees and especially on the ones who are incharge of handling confidential information in addition to providing proper training to the staff members. The administrative control should also inform employees the UK legislation and laws of data protection that are in place. Internet threats can be handled by educating staff member and creating an awareness of confidentiality, prohibiting web browsing, chatting and useless emailing within the computers containing confidential information and downloading software from unknown or unprotected sources. Moreover, their level of computer literacy must be analysed in or der to identify their capabilities in handling information. It must also administer the authorization and re-authorization of the system (Stoneburner, Goguen, et al., 2002). Security awareness program should provide security training and must also analyse the level of computer literacy in each employee. Information security officer must administer and implement information security awareness program, which should include providing training and awareness to the senior management, staff and employees involved in handling data information as well as educating the end-users or the clients. Involvement of all the users within the organisation is essential (Ghonaimy, El-Hadidi, et al., 2002). Operational control include physical control and environmental security. It plays a vital role in implementing administrative and technical controls. Operational security ensures the quality of electric supply, humidity, temperature controls and physical facility protection system. Some examples include; backup generator, physical intrusion detection systems like alarms and motion detectors. This system also monitors and controls physical accesses to the secured areas, some examples include; locks, doors, cameras, security guards and fencing (Stoneburner, Goguen, et al., 2002). The HR department should provide security awareness training to the staff members and must make sure that when appointing a new employee, the contract of employment must include the security policies and procedures. These security controls should be revised and renewed annually in order to achieve successful information security. All these essential controls and security awareness program must be implemented by the Human Resource department. Information security culture Peoples behaviour and attitude towards their working atmosphere forms the organisational culture of the organisation. Information security culture evolves from the behaviour and attitudes of the people towards confidentiality, integrity and availability of the organisational information and knowledge. It includes people, training, processes and communication because the inside behaviour poses a more serious threat to the security of information than outside behaviour (Ghonaimy, El-Hadidi, et al., 2002, p. 204). It is therefore essential to understand and analyse the organisational and corporate culture of the organisation as well as the need to change the security culture within the organisation. Threat analysis would indicate how much the organisational culture contributes towards the violation of security and it should be changed accordingly by educating staff members (Ghonaimy, El-Hadidi, et al., 2002). Figure 2 describes a proposed information security culture in an organisation. Figure 2 : A proposed information security culture (Ghonaimy, El-Hadidi, et al., 2002). A healthy security culture is achieved when people in the environment are trained to handle the clients confidential information securely and are completely aware of the threats and dangers around them regarding information theft; hacking and virus/malware attacks and they should be trained to handle these situations with confidence and responsibilities (Richardson, 2010, p. 3). Information security culture can change the organisational culture in a positive way. For example, the staff must understand that if servicing or repairing is required than this should only be handled by an authorized person. Security culture depends upon the managerial attitude, including the top management, security awareness and training and awarding of security conform behaviour (Ghonaimy, El-Hadidi, et al., 2002). Risk Management System However, the information security policy alone cannot be counted upon to effectively eliminate these threats because it narrowly focuses on the use of technology to mitigate threats as the nature of threats and attacks have changed to become highly targeted, highly effective and nonadvertised (Pironti, 2008, p. 1). Therefore a proper risk management model is compulsory. The ever changing faces of attacks and dangers on the information security require proper risk management system which must be understood and supported by the senior management and business leaders of the organization, to identify and finalize investment levels utilizing proper information protection and risk management capabilities. Moreover, regular reporting is essential to demonstrate the effectiveness of the Information Risk management practices. This model will definitely improve the efficiency of the information security team in following the Risk management teams decisions, which is made by the higher officials, who can have the valuable approach towards information infrastructure and can make these decisions effectively. The corrective approach of a successful risk management program depends upon the presence of a single team leader (Pironti, 2008). Information risk management program helps in characterizing and analyzing whole system of companys information highlighting risk factors and information infrastructure. It combines individual functional capabilities into one single well managed and well oriented organization enhancing business strategies. It increases the efficiency of security teams. It produces a bridge of confidence and communication between the team and the leaders. This program provide protection against wide range of threats in terms of security theft not by limiting access but by evaluating appropriateness and requirement of extent of that access, which in turn does not stop an organization to achieve their targets (Pironti, 2008). Conclusion In order to achieve a level of satisfaction in terms of confidentiality, integrity and availability of companys case sensitive information and data protection, reliable information security governance is required. This framework must include the implementations, renewal and revision of the strategies and policies within the organisation, understanding the need to change the organisational security culture and monitoring and management of the information security team with the supervision of the top management. However with the expansion of global network day by day, there are major risk factors of viruses and malware which require a risk management system as well. These policies, strategies and procedures must be implemented through the HR department including hiring and training of security officers and staff members with the approval of the top management. Appendix A: Summary of the paper presentation Key Elements of an Information Risk Management Program As part of our MSc assessment we were asked to take part in a paper presentation on the key elements of an Information Risk Management system based on a paper written by John Pironti, which was published in 2008 in the Information Systems Control Journal, Volume 2. Information security has become more challenging with the ever-changing and evolving faces of threats in the information processing. The adversary creates a new threats as soon as the defender develops and implements the defensive controls. The defenders get affected by the ethics, rules, knowledge, time, and lack of investment and resources. The adversaries can only be defeated by a suitable Risk management approach by using available assets, resources and potential. Policies, procedures and processes complemented by technology prove far more effective in mitigating security threats than the technology alone. Information security only relies upon the technology to create defences against threats that can easily be downloaded or purchased. The reason is that these components require proper implementation and operation. The organizations Information Risk Management approach identifies which information to protect and the level of protection required to align with organizational goals. It must be understood and supported by the senior management and business leaders of the organization, to identify and finalize investment levels utilizing proper information protection and risk management capabilities. Team Structures in most of the companies today have segregated leaders with the title chief, which is of no significance as the main chief has limited access to the senior positions and business strategies. In order to meet current challenges, all these independent capabilities must be united on a single platform as Information Risk Management program. Information Risk Management Program helps in characterizing and analyzing the whole system of companys information highlighting risk factors and information infrastructure. It combines individual functional capabilities into one single well managed and well oriented organization enhancing business strategies lead by the Chief Risk Officer. The leader becomes the focal point to produces a bridge of confidence and communication between team and leaders regarding all communications about risk identification, mitigation and management. This program provide protection against wide range of threats not by limiting access but by evaluating appropriateness and requirement of extent of that access, which does not stop an organization to achieve their targets. This team leader has regular access to higher officials to provide them correct and update information regarding risk factors and business strategies. Key performance indicators are essential measurement tools for the performance of a business function, process or capability. These indicators need to be assigned thresholds to ensure that they are working within normal limits. The key elements of risk management program include; presence of a Chief Information Risk Officer, Information security, Physical security, compliance, privacy, financial risk, market strategy risk, business operations risks, risk methods, practices, key performance analysis effectiveness, cultural awareness, training, communications, strategy governance and risk oversight board and committee. Information Risk Management serves as a mature progression of information security. The Risk management program structures the Risk management, utilizing existing capabilities and provides a 360 degree holistic view of security risks within the organization. Appendix B: Discussion generated from the paper presentation Q. What do you mean by the holistic view of risks that affect productivity and success? A. A holistic view implies focusing from a high perspective and ensuring that all the organisational requirements are met with relevant policies, processes and procedures complimented by technology rather than certain technical area on which the information security team focuses on. Q. How would you convince the businesses that such a wide model of Risk management program can get implemented with the requirement of so many resources? A. This program probably applies mostly to the larger organisations with more number of people involving different levels so that they are able to map on this new mature model, explaining the benefits and understanding why change the structure of the information governance. Another key element to highlight would be that this model re-uses the existing resources within the organisation. Q. Who decide the key performance indicators in the policy and standards maintained by the Risk Management program? A. Normally it would be something which is discussed by all the actual relevant departments rather than the IT department telling you what your KPI should be. It will be coming from a higher level and senior management. Appendix C: References

Friday, October 25, 2019

The Scientific Revolution and The Enlightenment Essay -- Essays Papers

The Scientific Revolution and The Enlightenment In the 17th Century, there was much controversy between religion and science. The church supported a single worldview that God’s creation was the center of the universe. The kings and rulers were set in their ways to set the people’s minds to believe this and to never question it. From these ideas, the Enlightenment was bred from the Scientific Revolution. Nicholas Copernicus was the first to question the universal truths and teachings of the church. He devised a theory that the earth along with the other planets revolved around the sun. This theory disagreed with Aristotle and the old teachings that the universe revolved around the earth, and that man was the center of the universe. To follow Copernicus’ theory was Giordano Bruno. He went beyond Copernicus to suggest that space was limitless, and that the sun and its planets may not be the only systems of its kind. i Bruno dared to say that he believed there was a possibility of other worlds with rational beings possibly superior to us. Since this kind of action was unheard of at that time, Bruno was condemned and burned at the stake for blasphemy. The team of Tycho Brahe and John Keppler were the next to study Copernicus’ theory. Brahe tried to disprove Copernicus’ theory and tried to prove the idea of the earth-centered universe. Although Keppler was Brahe’s assistant, he argued for Copernicus and analyzed Brahe’s data to conclude that the sun was the center of the universe. Keppler also used Brahe’s data to discover the movement of the planet Mars. This was the key to explaining all planetary motion. ii He also discovered the planets move in elliptical orbits, which also went against the beliefs of the church. Kepp... ...nce and nature inter-twined to compliment one another. i Santillana, Giorgiode. The Crime of Galileo. Chicago: University of Chicago Press, 1955. ii Dene Scoggins. www.txwesleyan.edu/scoggins/world/17thCenturyScience/menu.html iii Porter, Roy. The Enlightenment. London: The Macmillan Press Ltd. 1990. iv Dene Scoggins. www.txwesleyan.edu/scoggins/world/17thCenturyScience/menu.html v Santillana, Giorgiode. The Crime of Galileo. Chicago: University of Chicago Press, 1955. vi Santillana, Giorgiode. The Crime of Galileo. Chicago: University of Chicago Press, 1955. vii Brians, Paul. http://www.wsu.edu/~brians/hum_303/enlightenment.html viii Outram, Dorinda. The Enlightenment. Great Britain: Cambridge University Press, 1995. ix Brians, Paul. http://www.wsu.edu/~brians/hum_303/enlightenment.html

Wednesday, October 23, 2019

Judicial Response to Environmental Issues in India

Environmental protection during the last few years has become not only a matter of national concern but of global importance. It is now an established truth beyond all doubts that without a clean environment the very survival of mankind is at stake. Decline in environmental quality has been evidenced by increasing pollution, loss of vegetal over and bio-diversity, excessive concentration of harmful chemicals in the ambient atmosphere and food chains, growing risks of environmental accidents and threat to life support systems. This has drawn the attention of entire world community and therefore they resolved to protect and enhance the environment quality. How could the judiciary remain a silent spectator when the subject has acquired high importance and become a matter of caution and judicial notice. In a developing country like India, with uneducated masses, conditions of abject poverty, where the awareness of socio-economic and ecological problems in lacking, the judiciary has to play an active role to protect the people’s right against the anti-people order by infusing confidence in people as a whole for whom it exists, for as rightly put by Justice Lodha, â€Å"Judiciary exists for the people and not vice-versa. † Judiciary therefore cannot sit in silence and helplessly but must come forward actively to make good the deficiencies of law and provide relief wherever and whenever required. The Judiciary remained as a spectator to environmental exploitation until recently. But now judiciary assumed an effective role of public educator, policy maker, super-administrator, and more generally, amicus environment. In India Environmental law is judicial response to the queries of its citizens against environmental exploitation and administrative sloth and also role played by the public interest litigation. Since 1985 most of the environment cases in India have been brought before the court as writ petitions, normally by individuals acting on pro bono basis. While numerous legislative steps have been taken to give effect to the significant right of man to live in a sound environment and the corresponding duty of the state and individuals to ensure environmental preservation and conservation, our present endeavor is to analyze the steps taken by judiciary to forward this goal. To achieve this end, the judiciary had evolved certain principles to provide effective remedy in case of violation of constitutional and legislative mandate. In the subsequent sub divisions, several concepts which the judiciary has evolved in order to give force to the right of man to a healthy environment would be briefly dealt with. Right to a Wholesome Environment Judicial recognition of environmental jurisprudence, in the backdrop of industrialization, reached its peak with the pronouncement of the Supreme Court that right to wholesome environment is a part of Article 21 of the Constitution. In Subhash Kumar v. State of Bihar, the court observed that Article 32 of the Constitution has been designed to enforce the fundamental rights of the citizen. The said articles provides for extraordinary procedure to enforce the right of a person. The right to life under Article 21 includes the right to enjoyment of pollution free water and air for full enjoyment of life. Judicial concern regarding right to wholesome environment has been reflected in subsequent pronouncements. It has issued appropriate directions where the government machinery has failed to perform its statutory duty, and thereby undermined the right to life guaranteed under Article 21 of the Constitution. In Indian Council for Enviro-Legal Action and Other v. Union of India and Others, the chemical industries surrounding Bichhri Village in Udaipur (Rajasthan) contaminated the water, soil and air through the discharge of highly toxic effluents, particularly iron-based and gypsum based sludge. The court interfered to give proper remedy to the destitute villagers. It opined that the social interest litigation under Article 32 of the Constitution was a weapon in the hands of the people to enforce their right to wholesome environment, when it was blatantly disregarded by industries. In other words, the court reaffirmed that right to clean environment is an important facet of the right to life. In RLE Kendra Dehradun v. State of Uttar Pradesh, the apex court declared that right to life includes ‘the right of the people to live in the healthy environment with minimal disturbance of ecology and without avoidable hazard to them and to their cattle, home and agriculture land and undue affection of air, water and environment’. Also, the Supreme Court, in Andhra Pradesh Pollution Control Board v. MV Naydu, has put forward the view that matters relating to environment are of equal significance with those of human rights. In its own words: Environmental concerns arising in this court under Article 32 or under Article 136 or under Article 226 in the High Courts are in our view, of equal importance as Human Rights Concerns. In fact, both are to be traced to Article 21 which deals with fundamental right to life and liberty. While environmental aspect concern ‘life’, human right aspect concern liberty. Principles of Common Law In 1980, the Supreme Court held that clean civic life is the right of the inhabitants who reside within the municipal area. In Municipality Ratlam v. Vardichand, the petitioner, a municipal council, filed an appeal against the direction of the magistrate under section 133 of the Code of Criminal Procedure, 1973. The judicial magistrate, on application by the people of the area passed certain directions against the civic corporate body to bring cleanliness within the municipal area, as it had been polluted by open drains, human excreta, in absence of proper sanitation, and discharges from alcohol factories. The High Court affirmed the directions issued. Thereafter, the civil corporation filed a Special Leave Petition before the Supreme Court on the ground that the magistrate had no powers to pass order against the municipality. The Supreme Court took a very serious note of the miserable condition of the municipal area which posed health hazards for the people. Additionally the discharges from the alcohol plant overflowed the open drains making the condition more miserable. The Supreme Court issued certain directions, in addition to the magisterial directions, and fixed the time limit within which those were to be implemented. The significant contribution of this judgment, from the point of view of environmental criminal law was that, if any officer of the corporation failed to discharge his duties, then he could be punished under section 188 of the Indian Penal Code, 1860. Subsequently, in Ram Baj Shing v. Babulal, the Allahabad High Court tried to read atmospheric pollution within the broad spectrum of private nuisance, and issued permanent injunction against the polluting brick-grinding factory. The court enumerated that the dust emitting from a grinding machine factory created public hazards and injured the health of individual members of the society. ‘Any act would amount to private nuisance which caused injury, discomfort or annoyance to a person. ’ PIL with Reference to Environment Protection Since the last decade, PIL has played a unique role by which people belonging to different walks of life and especially the down trodden are getting social justice from the Supreme Court as well as the High Courts. The PIL is now recognized as an effective instrument of social change. It is because of this new strategic of pro bono litigation that the poor and the down trodden have been able to seek justice from courts. As a result of this development, a spate of environmental cases has been brought before the courts through public interest litigation. They have been filed either by individuals, voluntary organization or by letter/petitions sent to judges. In the following passages an attempt is being made to examine some of the leading judicial pronouncements on the point. i. Delhi Gas Leak case M. C. Mehta v. Union of India, popularily known as Delhi Gas Leak or Oleum Gas Leak Case, is the historic one in the field of environmental justice. The Supreme Court besides laying down substantial principles of law, embarked upon some important questions of law and policy which need to be answered. The Supreme Court laid down two important principles of law; First, the power of the Supreme Court to grant remedial relief for a proved infringement of a fundamental right (in this case Article 21) includes the power to award compensation, albeit in exceptional cases. Thus, the court not only widened the scope of the Article 21 by including in it protection of environment but also included a liability in tort for those harmed others by pollution. Second, the judgment opened a new frontier in the Indian jurisprudence by introducing a new â€Å"no fault† liability standard (absolute liability) for industries engaged in hazardous activities which has brought about radical changes in the liability and compensation laws in India. The new standard makes hazardous industries absolutely liable for the harm resulting from its activities. It is a standard which on its terms, admits of no defences. The case is significant from other points. The court further expanded the scope of â€Å"epistolary jurisdiction† when it reiterated that â€Å"a public spirited individual or a social action group acting pro bono public would suffice to ignite the jurisdiction of this court† and that hyper technical approach that defeated the ends of justice was inappropriate in PIL cases. ii. The Ganga Pollution Case The Ganga pollution cases are the most important water pollution cases in India to date. The brief facts being, in 1985, M. C. Mehta, an activist advocate and social worker, by way of a public interest litigation, filed a writ petition under Article 32 of the Constitution inter alia, for the issue of a writ/order/direction in the nature of mandamus, directing Kanpur Municipality to restrain itself from discharging waste water into the river Ganga, and governmental authorities and the tanneries at Jajmau near Kanp ur to stop polluting the river with sewage and trade effluents till such time that they put up necessary treatment plants for treating these effluents. The court in Mehta case I made order against the tanneries, while in Mehta case II ruled against municipalities and other governmental authorities. In Mehta case I, the court realizing the importance of water of the river Ganga in particular, and concerned over the continuing pollution of it by the industries and municipal wastes, reminded the conviction of environmental protection as enshrined in the directive principle in Article 48-A of the Constitution which provides that state shall endeavour to protect and improve environment and to safeguard the forests and the wildlife of the country. Article 51-A which imposes a fundamental duty on the citizens to protect and improve the natural environment. The court also invoked the Water Act as an indication of the importance of the prevention and control of water pollution. The court emphasized that notwithstanding the comprehensive provisions contained in the Water Act the state boards had not taken effective steps to prevent the discharge of effluents in the river Ganga. The court ruled that the fact, as was asserted on behalf of the some of the tanneries, that the effluents were not directly discharged into the river but first discharged in to the municipal sewers, did not absolve them from being proceeded against under the provisions of the law in force, since ultimately the effluents reach the river Ganga from Municipal Sewers. The ourt also invoked Environment (Protection) Act, 1986 as further indication of the importance of prevention and control of water pollution and noted that not much has been done even under the Act by the Central Government to stop the grave public nuisance caused by the tanneries at Jajmau, Kanpur. Mehta Case II related to the action taken against Kanpur Municipality and other Government entities for their failure to prevent waste water flowing to the river Ganga as was asserted in the original petition by the petitioner. Accordingly the Supreme Court directed Kanpur Nagar Mahapalika to: a. Complete the works to improve sewerage system within the target dates mentioned in the counter affidavits and not to delay the completion of those works beyond those dates. b. Take action against the dairies for either removing the waste accumulated near the dairies or to get them shifted to a place outside the city. c. Take immediate steps to increase the size of the sewers and wherever sewerage line is not yet constructed, to get it constructed. d. To construct sufficient number of latrines and urinals for the use of poor people in order to prevent defecation by them on open land. . The practice of throwing corpse and semi burnt corpses be brought to an end immediately. The Municipality and Police should take step to ensure that dead bodies or half burnt bodies are not thrown into the river Ganga. The remarkable thing about this judgment is that thought, it was a case against Kanpur Nagar Mahapalika but the court directed that this will apply mutatis mutandis to all other Mahapalikas and Municipalities which have jurisdiction over the areas through which the river Ganga flows and accordingly directed to send the copy of judgment to all municipalities. ii. Dehradun Quarrying Case Rural Litigation and Entitlement Kendra, Dehradun v. State of Uttar Pradesh, or Dehradun Valley Litigation as it is commonly known, is one of the most complex environmental case handled by the Supreme Court. It is the first momentous decision of the apex court wherein it was required to balance environmental and ecological integrity against industrial demands on forest resources. The main question before the Supreme Court for consideration was whether the mine lessees could be allowed to mine quarrying operations. In its order of 12 March, 1985, the Supreme Court, after considering the recommendations of the Bhargava Committee, ordered immediate closure of most dangerous mines and those falling within Mussoorie city’s board limits. The court finds that due to working of lime stone quarries there is imbalance to ecology or hazard to healthy environment, then in that case the court will order their closure. The court thus impliedly recognized right to a wholesome environment as implicit in Article 21 of the Constitution. iv. Calcutta Taj Hotel Case Sachidanand Pandey v. State of West Bengal, is an important town planning case which in categorical terms reiterates the court’s duty to protect environment. In this case, the Government of West Bengal gave on lease to the Taj Group, four acres of land belonging to the Calcutta Zoological Garden for the construction of a five star hotel. This garden was located in Alipore, the heart of Calcutta. It was this giving away of the land that w as challenged by a PIL petition, filed originally in the Calcutta High Court by two citizens of Calcutta-one the secretary of the Union of Workmen of the Zoological Garden and the other, a life member of the zoo. The Calcutta High Court upheld the lease in favour of the hoteliers. In appeal the Supreme Court held that ecological balance shall be maintained by the court in spite of the fact that such duty imposed on the government is merely a directive principle of state policy under Part IV of the constitution. The court further held: â€Å"Whenever a problem of ecology is brought before the court, the court is bound to bear in mind Article 48-A of the Constitution and Article 51A(g). When the court is called upon to give effect to the Directives Principles and fundamental duty, the court is not to shrug its shoulders and say that priorities are a matter of policy and so it is a matter for the policy-making authority. The least that the court may do is to examine whether appropriate considerations are borne in mind and irrelevancies are excluded. In appropriate cases the court may go further, but how much further must depend on the circumstances of the case. In view of the above approach the court adopting a liberal approach in favour of the development held that the Government has acted perfectly bonafidely in granting the lease and its action was not against the interests of the zoo or migrant birds visiting the zoo. On the contrary as the proposed hotel is a garden hotel there is every chance of the ecology and environment being improved as a result of planting of numerous trees around the premises and removal of the burial ground and dumping ground for rubbish . Conclusion Thus, the Supreme Court of India had taken into account the right to a healthy environment along with the right to sustainable development and balanced them. This concept of right to a healthy environment and sustainable development are the fundamental human rights implicit in the right to life, which has been constructed as such in many countries. The entire judicial construction by the Supreme Court and the High Courts also reveal the humanitarian approach to these environmental laws with the help of public interest litigations. The Indian Supreme Court was the first to develop the concept of right to healthy environment as a part of life under Article 21 of our constitution. This principle is now been adopted and followed in various other countries now. Suggestions In this paper the researcher wants to recommends the following suggestions. 1)The problem can be very well addressed to masses with the help of clinical environmental education, as there will be specialized treatment to sensitize people about environmental problems. Moreover, innovative minds can come out with very real solutions. 2)There should be separation of funds for issues related to environmental protection and international financial institutions should leap forward to take care of nation. 3)Governments of the nation should make provisions for environmental protection officers, those who should have the power to accept grievances against the public authorities who are not responding to legislative policies of environment protection. )The judiciary should go for dialogic activism i. e. through judgments it should enter a dialogue with several agencies of states to implement the agenda of environmental protection. 5)There should be an environmental census i. e. a questionnaire should be made about the general awareness on environmental protection and to distribute it to the people which would be helpful in the collection of data on prevailing conditions.

Tuesday, October 22, 2019

Biography of George Washington, First U.S. President

Biography of George Washington, First U.S. President George Washington (February 22, 1732–December 14, 1799) was Americas first president. He served as commander-in-chief of the Colonial Army during the American Revolution, leading the Patriot forces to victory over the British. In 1787 he presided at the  Constitutional Convention, which determined the structure of the new government of the United States, and in 1789 he was elected its president. Fast Facts: George Washington Known For: Revolutionary War hero and Americas first presidentAlso Known As: The Father of His CountryBorn: February 22, 1732 in Westmoreland County, VirginiaParents: Augustine Washington, Mary BallDied: December 14, 1799 in Mount Vernon, VirginiaSpouse: Martha Dandridge CustisNotable Quote: To be prepared for war is one of the most effective means of preserving peace. Early Life George Washington was born on February 22, 1732, in Westmoreland County, Virginia to Augustine Washington and Mary Ball. The couple had six children- George was the oldest- to go with three from Augustines first marriage. During Georges youth his father, a prosperous planter  who owned more than 10,000 acres of land, moved the family among three properties he owned in Virginia. He died when George was 11. His half-brother Lawrence stepped in as a father figure for George and the other children. Mary Washington was a protective and demanding mother, keeping George from joining the British Navy as Lawrence had wanted. Lawrence owned the Little Hunting Creek plantation- later renamed Mount Vernon- and George lived with him from the age of 16. He was schooled entirely in Colonial Virginia, mostly at home, and didnt go to college. He was good at math, which suited his chosen profession of surveying, and he also studied geography, Latin, and English classics. He learned what he really needed from backwoodsmen and the plantation foreman. In 1748 when he was 16, Washington traveled with a surveying party plotting land in Virginia’s western territory. The following year, aided by Lord Fairfax- a relative of Lawrences wife- Washington was appointed official surveyor of Culpeper County, Virginia. Lawrence died of tuberculosis in 1752, leaving Washington with Mount Vernon, one of Virginias most prominent estates, among other family properties. Early Career The same year his half-brother died, Washington joined the Virginia militia. He showed signs of being a natural leader, and Virginia Lt. Gov. Robert Dinwiddie appointed Washington adjutant and made him a major. On Oct. 31, 1753, Dinwiddie sent Washington to Fort LeBoeuf, later the site of Waterford, Pennsylvania, to warn the French to leave land claimed by Britain. When the French refused, Washington had to retreat hastily. Dinwiddie sent him back with troops and Washingtons small force attacked a French post, killing 10 and taking the rest prisoner. The battle marked the start of the French and Indian War, part of the worldwide conflict known as the Seven Years War between Britain and France. Washington was given the honorary rank of colonel and fought a number of other battles, winning some and losing others, until he was made commander of all Virginia troops. He was only 23. Later, he was sent home briefly with dysentery and finally, after being turned down for a commission with the British Army, he retired from his Virginia command and returned to Mount Vernon. He was frustrated by poor support from the Colonial legislature, poorly trained recruits, and slow decision-making by his superiors. On  January 6, 1759, a month after he had left the army, Washington married  Martha Dandridge Custis, a widow with two children. They had no children together. With the land he had inherited, property his wife brought with her to the marriage, and land granted him for his military service, he was one of the wealthiest landowners in Virginia. After his retirement he managed his property, often pitching in alongside the workers. He also entered politics and was elected to Virginias House of Burgesses in 1758. Revolutionary Fever Washington opposed British actions against the Colonies such as the British Proclamation Act of 1763 and the Stamp Act of 1765, but he continued to resist moves to declare independence from Britain. In 1769, Washington introduced a resolution to the House of Burgesses calling for Virginia to boycott British goods until the Acts were repealed. He began to take a leading role in Colonial resistance against the British following of the Townshend Acts in 1767. in 1774, Washington chaired a meeting that called for convening a Continental Congress, to which he became a delegate, and for using armed resistance as a last resort.  After the battles of Lexington and Concord in April 1775, the political dispute became an armed conflict. Commander-in-Chief On June 15, Washington was named commander-in-chief of the Continental Army. On paper, Washington and his army were no match for the mighty British forces. But although Washington had little experience in high-level military command, he had prestige, charisma, courage, intelligence, and some battlefield experience. He also represented Virginia, the largest British colony. He led his forces to retake Boston and win huge victories at Trenton and Princeton, but he suffered major defeats, including the loss of New York City. After the harrowing winter at Valley Forge in 1777, the French recognized American Independence, contributing a large French Army and a navy fleet. More American victories followed, leading to the British surrender at Yorktown in 1781. Washington formally said farewell to his troops and on December 23, 1783, he resigned his commission as commander-in-chief, returning to Mount Vernon. New Constitution After four years of living the life of a plantation owner, Washington and other leaders concluded that the Articles of Confederation that had governed the young country left too much power to the states and failed to unify the nation. In 1786, Congress approved the Constitutional Convention in Philadelphia, Pennsylvania to amend the Articles of Confederation. Washington was unanimously chosen as convention president. He and other leaders, such as  James Madison  and  Alexander Hamilton, concluded that instead of amendments, a new constitution was needed. Though many leading American figures, such as  Patrick Henry  and  Sam Adams, opposed the proposed constitution, calling it a power grab, the document was approved. President Washington was elected unanimously by the Electoral College in 1789 as the nations first president. ​Runner-up John Adams became vice president. In 1792 another unanimous vote by the Electoral College gave Washington a second term. In 1794, he stopped the first major challenge to federal authority, the Whiskey Rebellion, in which Pennsylvania farmers refused to pay federal tax on distilled spirits, by sending in troops to ensure compliance. Washington did not run for a third term and retired to Mount Vernon. He was again asked to be the American commander if the U.S. went to war with France over the XYZ affair, but fighting never broke out. He died on December 14, 1799, possibly from a streptococcal infection of his throat made worse when he was bled four times. Legacy Washingtons impact on American history was massive. He led the Continental Army to victory over the British. He served as the nations first president. He believed in a strong federal government, which was accomplished through the Constitutional Convention that he led. He promoted and worked on the principle of merit. He cautioned against foreign entanglements, a warning that was heeded by future presidents. He declined a third term, setting a precedent for a two-term limit that was codified in the 22nd Amendment. In foreign affairs, Washington supported neutrality, declaring in the Proclamation of Neutrality in 1793 that the U.S. would be impartial toward belligerent powers in a war. He reiterated his opposition to foreign entanglements in his farewell address in 1796. George Washington is considered one of the most important and influential U.S. presidents whose legacy has survived for centuries. Sources George Washington  Biography. Biography.com.George Washington: President of the United States. Encyclopedia Brittanica.

Monday, October 21, 2019

A Parents Guide to Notre Dame

A Parents Guide to Notre Dame Paris may have its legendary cathedral, but when it comes to famous Catholic universities, there is only one Notre Dame - and its in South Bend, Indiana. Heres the scoop: everything a parent should know about the Golden Dome and the Fighting Irish. The College: This venerable university with its glowing Golden Dome and breathtaking gothic architecture dates back to 1842. Its founder, a 28-year-old French priest, named it after Our Lady of the Lake, Notre Dame du Lac. The school is known for its top-notch academics - it regularly appears on the U.S. News World Reports top 25 - as well as its famous athletic programs and a 1,250-acre campus that belongs on any most beautiful list. Its stunning.Your child does not have to be Catholic to go here, but you should know that mass is held daily, the campus has 47 chapels and its prayer grotto is modeled after the one at Lourdes. Spirituality is important here and community service part of the schools ethos. Notre Dames 12,000 students - a figure that includes 8,400 undergrads - attend classes on the semester system. But the single most important thing parents should know is that Notre Dame students are so very happy here, both academically and personally, that 95% of the freshmen retur n sophomore year. And 95% of those students end up graduating from Notre Dame. Only Harvard and Princeton boast better stats. The Tab: Of course, all that glory - and all those small class sizes - comes at a hefty price. Tuition at the University of Notre Dame was $41,417 in 2011-12. Some 80% of the universitys students live in the colleges 29 single-sex dormitories. Add room and board - $11,388 - to the tab for a grand total of $52,805 per year. There is no Greek system here, but students remain in the same residence hall for all four years, which creates a tight-knit sense of community.The College Town: Technically, Notre Dame is in its own small town of Notre Dame, just outside South Bend. But from a parent perspective, thats mere envelope addressing. South Bend is the college town, and its a very nice one indeed with all the benefits of cosmopolitan life and small-town charm. In addition to visiting your college kid, you can also hike the winding riverbank trails, go white water rafting on the East Race Waterway or head for the recreational possibilities of Lake Michigan.Notre Dame is a two-hour drive ( 90 miles or so) from Chicago, so youll likely fly into OHare - although South Bend has its own small airport too. Just be aware that Notre Dame is on Eastern time, Chicago on Central. Chicago makes a great hub for any college tour. There are scores of terrific universities - Purdue, Northwestern, Loyola and more - all within a few hours drive. But if your interest lies in Notre Dame and Notre Dame alone, stay in South Bend, where there are plenty of hotels, including the much-beloved, 60-year-old Morris Inn, which is located right on campus. The Morris closed its doors in late 2012 for major renovations; it is expected to re-open in August 2013. (Tip: some hotels will give college visitors discounts, so be sure to call and ask - its not usually advertised online. Check with the Morris directly, when it reopens, to see if they plan to resume their parents club offers.)If youre visiting in the winter months, pack for snow. Its not as cold here as in Minnesota, but South Bend gets 81 i nches of snow per year and January temperatures drop down to the 20s and 30s Fahrenheit. One last thing: When its time for junior to fly home for the holidays, theres a bus service that runs between campus and OHare for about $35 one-way. More Important Details: This is a highly competitive school, but it produces some pretty incredible results. That high retention rate comes from the universitys first year of studies program, which teaches college study skills, helps students explore interests and offers support and guidance. Got a a possible pre-med? The Notre Dame acceptance rate into med school runs around 80% - the national average is closer to 40%. Community service is part of the culture here. Some 80% of the colleges students volunteer; more than 10% go on to join the Peace Corps.Got a musician with a penchant for sports? Notre Dames famous marching band dates back to 1843. Got a bel canto soprano, a bassoonist or jazz pianist? Notre Dame has an opera program, as well as jazz and classical performance and music education majors, and its performing arts center boasts five stages. But music majors here don’t declare until sophomore year, its possible to double major in music and another field, and auditio ns are for ensemble placement and scholarship consideration, not university admission. (Translation: Its a very fine program, but if your kid is considering Juilliard or Curtis, he probably wouldnt apply here. And if thats where you are in the decision-making process, this article on College Admissions for Music Majors may help.) Notre Dame is famous for its Division I athletics, and especially its Fighting Irish football team, which has notched 11 national championships and seven Heisman Trophy winners. More than 60 former players are in the College Football Hall of Fame. But Notre Dame also fields 25 other mens and womens varsity teams, as well as more than 80 intramural and club sports. Broom ball, anyone?Incoming Frosh Stats: Notre Dame is considered one of the nations 20 most selective universities, with a 29% acceptance rate. The average incoming freshman is in the top 4% of his high school class, with a SAT score of 1,390-1,490 out of 1,600 or an ACT of 32-34.The Law School: Notre Dames law school dates back to 1869 and its programs include the standard 3-year Juris doctor degree, as well as programs in international human rights and an LL.M. (Masters of Law) program in international law from Notre Dames London Law Centre. Admissions are extremely competitive, with more than 3,000 applicants vying for 183 places per year. The average accepted law student had a 3.64 college GPA and a 166 out of 180 on the LSAT. More? Visit the University of Notre Dames campus website for details on admissions for undergraduate study, law school, and grad school. This link will take you straight to information on scheduling a campus visit. If youre headed to the campus itself, visitor parking is at the corner of Eddy and Holy Cross Drive in Notre Dame, Indiana.

Sunday, October 20, 2019

Critique of Twelve Angry Men Essays

Critique of Twelve Angry Men Essays Critique of Twelve Angry Men Essay Critique of Twelve Angry Men Essay Book Critique: Twelve Angry Men, Reginald Rose and David Mamet The criminal justice system of the United States, when first framed through the U. S. Constitution and Bill of Rights, was a revolutionary breakthrough in contemporary peace-keeping. For fear of becoming like their former governing nation wherein unreasonable trials were held in such a way that numerous individuals accused of criminal acts were not offered a opportunity to demonstrate their innocence or, in some cases, a trial by jury – the framers of the Constitution created a justice system based on the preservation of the rights of the accused, as well as ascertaining an un-biased truth and dealing justice. This brief explanation on the foundation of the U. S. Criminal justice system plays an importance to the piece of literature under criticism. Reginald Rose’s screenplay Twelve Angry Men provides insight into the judicial underbelly of a criminal trial, particularly the rigors of the jury’s decision-making procedure. Many issues to the contemporary justice system are made manifest despite the fact that the entirety of the play, excluding the opening court scene, takes place in a New York City jury room. The scenario of the case being presided over is an â€Å"offense against the person†; a homicide in specific in which, a New York City teenager is accused of fatally stabbing his father. The defendant has a criminal record (and a lot of circumstantial evidence piled against him) and therefore if convicted, the application of the death penalty is mandatory (in this scenario), which obviously should give the presiding jury a sense of pressure, given that a human being’s natural right to freedom and life rests in their unanimous decision. The application of the death penalty in this criminal case may have been just added for dramatic emphasis but the relevance to the modern criminal justice system is what makes an entertaining play plausible. For example, obviously in real criminal court, a guilty verdict would not necessarily be a death-sentence. The guilty party would have the chance to appeal to the court of appeals, and given the weak evidence (mentioned later), that appeal would be granted and moved into a higher level of judicial review. Another issue that Twelve Angry Men displays is Reginald Rose’s depiction of a diverse jury. The characters – who remain nameless except for their numbers – seem to have representatives from all spectrums of society. Such characters include: a sports-fanatic football coach, a former street-urchin, a Swiss-German immigrant, a doctor, an advertising agent, a self-made businessman, a bigot, and a level-headed representative of the â€Å"everyday American† to name a few. Eleven members of this diverse group of people, all with their own agenda (such as tickets to a ball game, or the desire to escape the un-air-conditioned room), immediately establish their biased, objective view of the accused youth by casting a â€Å"guilty† vote during the preliminary vote process. Only the level-headedness and determination to not condemn a youth so easily led one man to cast a not-guilty vote. Once the play reaches this point it relies on this one man to convince the other jurors to set aside their bias and examine the evidence before casting a guilty vote. Once again, all though the issue of bias is very likely to come up in genuine criminal trials, the use of these clashing characters is likely intended for dramatic effect. It is not the diversity of the jurors that makes the situation quite unlikely in a real criminal trial (because jurors are chosen at random from a Venire or list of randomly selected names from a Master Jury List and therefore given to diversity) but the fact that, as a rule, groups of people generally follow the majority and that one lonely level-headed juror (# 8) should not be able to convince them otherwise. If one does ignore that aspect then one still discovers later in the literature that many of the other jurors display a personal prejudice that influences their objectivity. For example, juror 10 exhibits a these people are dangerous outburst near the end functioning as outright bigotry. Other such jurors display a sense of past emotional scarring that influence their decisions only when touched by juror #8’s candor. This trial could immediately be dismissed as prejudicial error and therefore given to a retrial. Another interesting prejudice is the fact that most of the jurors characterize the accused youth through certain criminological theories. For example, this troubled teen has grown up in a poorer district, obviously right next to the El train; therefore he must have â€Å"turned out† bad. This is known as the Chicago School created by Clifford Shaw and Henry Mckay, which states that social disorganization (gangs, poor neighborhood, lack of decent educational facilities, etc†¦) causes criminal behavior in individuals. While this may present some grain of truth, the theory itself has not been proven to be undeniably correct in all circumstances thus the term â€Å"theory† rather than it being adopted as a law. On the issue of the incrimination of the accused youth, the twelve dissenting jurors (led by the level-headed juror #8) must reanalyze the evidence and witness testimonies provided by the court. At first glance, the evidence seems fairly damning to the accused: a unique murder weapon (switch-blade) that was supposedly bought by the rebellious teen, an overheard declaration- by an old man with a limp living below the duo- during a heated argument between the accused and the victim declaring that the teen would â€Å"kill him†, a poor-sighted woman who apparently saw the stabbing through a passing train, as well as a poor alibi given by the youth that he was at the movies, yet neglected to remember what was being shown. Without difficulty can one understand and justify the majority of the jury’s initial vote for a guilty verdict. But, would not taking the evidence at face value violate the founding principles of the United States criminal justice system? Condemning one to death with a casual glance at these evidences is neither about protecting the rights of the accused as a human being nor finding the truth to deal swift justice. Juror #8’s approach to the evidence is to illustrate that: On cases in which the death penalty is the consequence – jury, as objective citizens must decide whether or not a criminal charge can be proven to be fact. If the evidence of prosecutors does not determine that no other theory is possible, then who has the right to do anything but set the defendant free? In other words, the evidence provided could be displayed in a way that shows it was Possible that the defendant is innocent due to lack of undeniable evidence; therefore you cannot condemn the accused. This is relevant to the criminal justice system in several ways. For example, the fact that the dissenting jurors have to reevaluate these evidences even though it is clear that, while they do provide some sort of cases for the prosecution, the testimonies of handicapped people hardly is damning evidence. In a legitimate criminal trial, the defense would be able to employ a reasonable doubt tactic. The Defense attorney could easily prove by cross-examining the two witnesses’ stories and raise reasonable doubt as to the guilt or innocence, this derives from the fact that the old man’s testimony is hearsay evidence. While this may present a fairly weak case, this tactic would prove that the evidence and testimonies would not be absolutely conclusive to the accused youth’s apparent guilt.

Saturday, October 19, 2019

A Part of My Life Essay Example | Topics and Well Written Essays - 250 words

A Part of My Life - Essay Example This essay demonstrates and clearly shows that I am a mother of my kids. I am a daughter of my mother. I am a grandparent to my grandchildren. And I am a granddaughter to my grandparents. We are someone to somebody and this is our relationship identity (Deaux, 12). I am a teacher, a special education teacher. This is my occupational identity. Occupational identities are tied to a generic group (Deaux, 13). In my case, my occupational identity ties me with the generic group of the teacher. And so I am a teacher. I am a woman. And this is my gender identity, an ascribed social identity. Ascribed identities are given at birth (Deaux,13). And because I have female organs, I am a woman. And with all of my identities, the most important thing is that I know who I am. I am me. I am someone who loves her children and her family. I am part of my community, I am a part of my life. In addition, I create my identity based on my beliefs and I am me because of who I wanted me to be. This paper makes a conclusion that by studying diversity, I aim to understand how these social identities form the different identities of special children, how this impacts their learning and how the differences between social identities impact their relationship and interaction with me and each other. Also, with this, I will be able to connect with my students better, I will be able to apply appropriate teaching techniques to better educate them and I will be able to adapt better with their perception of themselves.

Friday, October 18, 2019

2 drafts to peer review Essay Example | Topics and Well Written Essays - 250 words

2 drafts to peer review - Essay Example Of course the story will directly not tell what that meant which makes it more interesting because it leaves us to fill the gap by our interpretation of the story. It would have been nice if the interpretation was included. In essence, James Baldwin’s Sonny’s Blues s about a person’s struggle, discovery and liberation of which every human being undergo to a relative extent. Probably the reason why there was an attempt to keep the narrator anonymous is to maintain the universality of the story. Albeit it may spoke of the struggle of the African-American against segregation and prejudices, the same struggle is also experienced by other people although the challenge may take in different form. The paper â€Å"got† the gist of the story and just needs some polishing. It was also nice that some quotations were included to emphasize a point such quoting â€Å"low ceilings of their actual possibilities† when complacency was talked about. It progresses to select some scene’s in the work to highlight aspects of the story making it more detailed without being too

The role of entrepenurship in the 1860-1900 and the role of technolgy Essay

The role of entrepenurship in the 1860-1900 and the role of technolgy in railroads and government influence and tariff policys a - Essay Example The demand for steel and oil hit an all time high. This industry had very renowned personalities (Link and Susannah 34). These included John D. Rockefeller who dealt in oil and Andrew Carnegie, who dealt in steel. These individuals went by the name of robber barons because people believed that they got their wealth through unscrupulous business deals. It is Gilded Age because of the notable fortunes realized in the period and people’s improved level of affordability. It is during Gilded Age that the United States shifted from an agricultural society to an urban industrial society. This was as a result of massive movement of people to cities after the Civil War. In 1860, only twenty percent of people in the U.S.A lived in cities. This number grew to forty percent in 1900. Cities provided a place of adventure for young people who left the countryside to go to towns and cities. This heightened modernization in the U.S.A as more skyscrapers came up department stores emerged and, t elephone and electric lamps installed. Consumerism and middle classes emerged as a result of industrialization and immigration into cities (Meyer 61). Technology and expansion of railroad Railroad was perhaps the single most important factor that transformed industrial cities in the West in the 1800s. The advanced technology of the time enabled the building of railroads that helped ease transportation around the U.S.A and made travelling safe and cheap. Transcontinental lines helped move grain, people, ore, cattle, and equipment to and from across the Midwest. Railroad passed through Rocky Mountains, Sierra Nevada and the fertile areas of California and Oregon (Link and Susannah 35). The building of railroads transport transformed the landscape of the West. Bison travelled across the Great Plains to provide food and clothing to Native American tribes. Railroads destroyed Bison’s habitat and brought sport hunters to their environment. Americans killed many Bison and by 1885, o nly 1,000 Bison survived. There were other things that contributed to the expansion of railroads in the U.S.A. One important factor was the Civil War. The Civil War caused an increase in U.S.A’s industrial production leaving it among the world’s leading industrial producers in the 1890. The war also accelerated the growth of corporations as it demanded more consumer goods and services. The growth and popularity of money capital also contributed greatly to the expansion of railroads as it attracted foreign investors into American economy. Consequently, more people increased their investment in capitalist ventures. Government support of business also had an impact on the growth of railroads in America (Meyer 62). The government donated enormous land to railroad companies for the expansion of railroad transport. Pullman sleeper car complemented the development of railroad transport by increasing railroad passengers’ comfort. Double sets of tracks took the place of a single set track system. This enabled two-way rail traffic with snarl-up. Iron rails gave way to steel rails that could handle heavy weight loads. The development of locomotive tenders enabled the use of coal to power trains. Coal took the place of wood as it was more efficient than wood. Coal power cut on the number of times trains had to stop and refuel (Link and Susannah 36). After Westinghouse got patent rights for air brakes, mechanical brakes paved the way for air brakes. Air brakes allowed for

Argument Essay Example | Topics and Well Written Essays - 1000 words - 11

Argument - Essay Example ts: one from the USA Today (Australian gun control holds lessons for U.S.) and the other published online in Denver Post (Gun rights and gun control arent necessarily exclusive). The discourse would present a separate examination of each article’s arguments including supporting contentions. A concluding portion would then assess which editorial was deemed most effective. The editorial article entitled â€Å"Australian gun control holds lessons for U.S.† published online in the USA Today on December 18, 2012 proffered issues that apparently compared the measures taken by Australia in terms of gun control. As an editorial article, the author comes from the Editorial Board, but was not specifically identified. The article’s main thesis was despite sharing similarities between the United States and Australia in terms of having previously experienced violent deaths due to indiscriminate firing of guns, Australia’s gun control policy which was enforced after a 1996 shooting eventually solved the dilemma. According to the discourse, Australian law on gun control necessitated categorizing firearms into five distinct classifications, where â€Å"some of the deadliest assault-style weapons and large ammunition clips are now all but impossible for individuals to lawfully own. (Further), firearms are subject to a strict permitting process, and dealers are required to record sales, which are tracked by the national and territorial governments†¦ (In addition,) the law encouraged people to sell their firearms back to the government, which purchased and destroyed about 700,000 of them† (Australian gun control holds lessons for U.S. pars. 4 & 5). Due to the passing of this law, the report disclosed that evident result was no violent gun-related incidents ever occurred. The author used logical arguments through the support of evidential historical records and citing credible findings that apparently revealed the effectiveness of gun control through the law enforced by

Thursday, October 17, 2019

Magical Realism Essay Example | Topics and Well Written Essays - 500 words

Magical Realism - Essay Example Kate states that â€Å"Knowing that Mrs. Mallard was afflicted with a heart trouble, great care was taken to†¦Ã¢â‚¬  (Chopin par 1). The phrase afflicted with a heart trouble suggests that Mrs. Ballard had heart problems. From the story, Josephine (Mrs. Mallard sister) had to break the news in a manner that could not affect her sister. Mr. Mallard is said to have died in a railroad disaster. Kate writes â€Å"†¦newspaper office when the intelligence of the railroad disaster was received, with Brently Mallard’s name leading the list of â€Å"killed.† (Chopin 1). This message is conveyed to Mrs. Mallard by Richards (friend of Mrs. Mallard husband) through her sister Josephine. Richards takes time and confirms that Mr. Ballard is dead through a second telegram. Mrs. Ballard weeps for her husband in front of Josephine and Richards and immediately she goes into her room. The setting and the events that happen in the room can be described as living in the world of fantasies. Mrs. Ballard is cushioned into emotions that almost take her way before she is interrupted by her sister. She sees a thing coming to possess her and tries to fight it back but all in vain. It overwhelms her and she declares she is free. Free can have many meanings but at this instance, it is like Mrs. Ballard knew death was approaching her by the hour. To support this assertion, Kate states â€Å"She knew that she would weep again when she saw the kind, tender hands folded in death; the face that had never looked save with love upon her, fixed and gray and dead. †¦ of years to come that would belong to her absolutely† (Chopin 1). From this statement, Mrs. Ballard knew the hour of her death was approaching and she had foreseen what would happen and welcomes it with open arms. She even makes a prayer that life would be longer. Such a scenario explains clearly the fate o f Mrs. Ballard. Her room and the setting of the furniture and the window give some clue as

Athletes versus Non-Athletes on Academic Performance Research Paper

Athletes versus Non-Athletes on Academic Performance - Research Paper Example The reason behind selecting the topic of the research includes the popular misconception that sports and games cause the wastage of student’s time by diverting their focus from studies. The critics are of the view that the students, interested and involved in athletics and other games, consume large part of their time and energies in the playgrounds, and consequently become too tired and exhausted to pay any heed to their academic obligations. As a result, they lag far behind than their classmates in educational activities, and thus are unable to complete their studies in order to become the proficient and successful professionals for the future years to come. One school of thought observes that sport activities deflect time away from the classroom, and children always keep sports and play in mind, and neglect their classroom responsibilities and assignments. Somehow, the other school of thought disregards the very idea that athletics keep children away from their studies. The y are of the opinion that schools are not established to mere bestow certificates and degrees upon the students; on the contrary, people send their children to various educational institutions in order to make them capable of comprehending with the challenges life offers to man on the one hand, and for the growth and development of all aspects of their personality on the other. The researcher have selected small north Georgia schools as the population for the present study, where he aim to select one hundred and sixty respondents for the research process; one hundred and twenty of which would be students, while twenty each would consist of teachers and parents of the students. Interview schedule will be the tool for data collection in the present study. After the collection of data, the findings will be analyzed and results will be interpreted subsequently. Hence, the study will present a balanced report on the influence of athletics and games on the overall academic performance of the students. In addition, the data relevant to the North Georgia schools available at various websites will also be consulted for the study. Identification of the Problem: It has aptly been observed that sports and games maintain significant place in social life of the individuals. Sports not only perk up the physical strength of the people, but also pave the way towards the enhancement of intelligence level and sharpness in them. Thus, participation in sports improves mental and physical health and raises IQ level of humans. â€Å"Some of the factors to consider in assessing the significance of mental health relative to other influences are evident in reflecting on a familiar scenario: the long haul flight† (Lynch et al. 2000). Since all parents are determined to see their children healthy and intelligent, they make adequate arrangements for the studies and recreational activities of the children, where participation in sports is given particular attention. In addition, political authorities and social establishment also promote and project the opportunities of physical games of various kinds for adolescents and adults in order to make society healthy, strong and vigorous. Researches reveal the very fact that healthy people can work harder than

Wednesday, October 16, 2019

Argument Essay Example | Topics and Well Written Essays - 1000 words - 11

Argument - Essay Example ts: one from the USA Today (Australian gun control holds lessons for U.S.) and the other published online in Denver Post (Gun rights and gun control arent necessarily exclusive). The discourse would present a separate examination of each article’s arguments including supporting contentions. A concluding portion would then assess which editorial was deemed most effective. The editorial article entitled â€Å"Australian gun control holds lessons for U.S.† published online in the USA Today on December 18, 2012 proffered issues that apparently compared the measures taken by Australia in terms of gun control. As an editorial article, the author comes from the Editorial Board, but was not specifically identified. The article’s main thesis was despite sharing similarities between the United States and Australia in terms of having previously experienced violent deaths due to indiscriminate firing of guns, Australia’s gun control policy which was enforced after a 1996 shooting eventually solved the dilemma. According to the discourse, Australian law on gun control necessitated categorizing firearms into five distinct classifications, where â€Å"some of the deadliest assault-style weapons and large ammunition clips are now all but impossible for individuals to lawfully own. (Further), firearms are subject to a strict permitting process, and dealers are required to record sales, which are tracked by the national and territorial governments†¦ (In addition,) the law encouraged people to sell their firearms back to the government, which purchased and destroyed about 700,000 of them† (Australian gun control holds lessons for U.S. pars. 4 & 5). Due to the passing of this law, the report disclosed that evident result was no violent gun-related incidents ever occurred. The author used logical arguments through the support of evidential historical records and citing credible findings that apparently revealed the effectiveness of gun control through the law enforced by

Tuesday, October 15, 2019

Athletes versus Non-Athletes on Academic Performance Research Paper

Athletes versus Non-Athletes on Academic Performance - Research Paper Example The reason behind selecting the topic of the research includes the popular misconception that sports and games cause the wastage of student’s time by diverting their focus from studies. The critics are of the view that the students, interested and involved in athletics and other games, consume large part of their time and energies in the playgrounds, and consequently become too tired and exhausted to pay any heed to their academic obligations. As a result, they lag far behind than their classmates in educational activities, and thus are unable to complete their studies in order to become the proficient and successful professionals for the future years to come. One school of thought observes that sport activities deflect time away from the classroom, and children always keep sports and play in mind, and neglect their classroom responsibilities and assignments. Somehow, the other school of thought disregards the very idea that athletics keep children away from their studies. The y are of the opinion that schools are not established to mere bestow certificates and degrees upon the students; on the contrary, people send their children to various educational institutions in order to make them capable of comprehending with the challenges life offers to man on the one hand, and for the growth and development of all aspects of their personality on the other. The researcher have selected small north Georgia schools as the population for the present study, where he aim to select one hundred and sixty respondents for the research process; one hundred and twenty of which would be students, while twenty each would consist of teachers and parents of the students. Interview schedule will be the tool for data collection in the present study. After the collection of data, the findings will be analyzed and results will be interpreted subsequently. Hence, the study will present a balanced report on the influence of athletics and games on the overall academic performance of the students. In addition, the data relevant to the North Georgia schools available at various websites will also be consulted for the study. Identification of the Problem: It has aptly been observed that sports and games maintain significant place in social life of the individuals. Sports not only perk up the physical strength of the people, but also pave the way towards the enhancement of intelligence level and sharpness in them. Thus, participation in sports improves mental and physical health and raises IQ level of humans. â€Å"Some of the factors to consider in assessing the significance of mental health relative to other influences are evident in reflecting on a familiar scenario: the long haul flight† (Lynch et al. 2000). Since all parents are determined to see their children healthy and intelligent, they make adequate arrangements for the studies and recreational activities of the children, where participation in sports is given particular attention. In addition, political authorities and social establishment also promote and project the opportunities of physical games of various kinds for adolescents and adults in order to make society healthy, strong and vigorous. Researches reveal the very fact that healthy people can work harder than