Wednesday, October 30, 2019

Important Management Questions Essay Example | Topics and Well Written Essays - 1250 words

Important Management Questions - Essay Example DMAIC method can be utilized when a product or a process is in existence at the company and does not meet the customer specification. In case of clinical practices setting, DMAIC tool can be effectively utilized when any kind of change in triggered. For instance, the health care organisation plans to introduce a new department such as neurology department for the patients. Such introduction necessitates the demand for change management in the healthcare setting. Therefore, all the aspects of DMAIC model need to be taken into consideration when bringing in such a change. At the outset, it is significant to create awareness regarding the change in the heath care organization. After having created awareness, the desire to change amongst those affected needs to be measured. Furthermore, it becomes essential to train the people and thus ensure that the organization has the ability to change. After having gained the necessary training, the people in the organization are capable of embracin g the desired change effectively. When a clinical administrator in an organization recognizes that the organization will be capable of adjusting with the change, only then change can be enforced. The Six Sigma DMAIC process can be implemented to identify the lacuna in the existing systems and to recognize how to correct them and thus implement required changes for the near future. DMAIC can be utilized in the clinical setting when the existing processes are not meeting the needs of the patients. FMEA Utilization in Performance Management FMEA stands for Failure Mode and Effects Analysis. It is a methodical and proactive technique for assessing a method to recognize the probable ways in which it may fail. It further evaluates the influence of the failures, in order to determine the parts of the processes that require change. FMEA has been utilized in the health care industry for organizing the information that has been gathered on causes and their effects. FMEA can be utilized in the process conceptualization and design along with assessment stages. The concept can be consistently applied for constant quality improvement in care providing processes from planning through performance evaluation. In case of clinical practices, the various factors under which performance management can be evaluated have been mentioned in the table below: Factors For Consideration For Performance Management Through FMEA Gathering a team of clinical experts who are involved in a high-risk care process Identifying a trained facilitator Undertaking meetings to converse about a care process in detail Conducting analysis as well as scoring hazardous items upon the care process related maps Applying the indicated results High-risk care processes are generally those where the processes that are employed are generally fragmented and comprise people from numerous departments as well as disciplines for performing similar tasks. Results obtained from FMEA tend to explain and to prioritize fail ures in care providing process and thus facilitate to determine the root causes of such failures. The table below helps to explain the use of FMEA in performance management of the employees in the hospital. The Table Below Describes the FMEA Scoring Example: Function Potential Failure mode Potential effect(s) of failure S Potential causes(s) of failure O

Monday, October 28, 2019

Reflective Account Essay Example for Free

Reflective Account Essay A new little boy started recently in nursery, as he entered nursery i bent down, smiled giving him eye contact i then said hello using his name and told him mine and he smiled back. He had never been to nursery before and he was very excited and had no awareness of the daily routine. i calmly held out my hand and he held out his. holding each others hands i showed him where his name card was, he picked up his name card and we walked over to the self-registration board. i asked him what he would like to play with and he chose to play with the cars. but during his play he become very upset because he wanted to play with the red car and another child had the red car. so i bent down and placed my arm around him and asked to look at me. Tears were rolling down his face and i explained to him that when the other child had finished playing with the red car he would be able to have a turn. i then sat down next to him to take turns in using the garage and sharing the cars. During the session i continued to support him, during lunch time and throughout the session. On occasions when he was unsure of what to do we went over to the routine board and talked him through the pictures so he knew what was happening next. Reflection I felt that i reassured him by letting him know who i was and at all times i made sure i gained his attention by using his name and ensure that he was listening by making sure we gained eye contact before speaking. I helped him with understanding the daily routine and I helped him with his social skills by supporting him with understanding the we need to take turns and share. Next time Next time I will carry on encouraging his social skills and communication skills by supporting him with sharing the toys and taking turns. I will also tell him the childrens names so he will feel part of a group and help with his self esteem. All while letting the child know I will be there to support him and help with his daily needs if he needs it.

Saturday, October 26, 2019

Women in the Israeli Army Essays -- Military Science, Egalitarianism

Women have always played a very integral role in the Israel Defence Forces (IDF), since its inception in 1948 shortly after the declaration of the State of Israel. The IDF is regarded as one of the most well trained armed forces in the world thanks in part to the progressive changes in the military with regards to equality for women. Historically, at the ground roots of the IDF, women were held back from combat and served mostly in a variety of support duties under the command of Chen (Women’s Army Corps). These support duties were extremely important to the functioning of the IDF, but did not satisfy those women who wanted a more active front line role. The aftermath of the Yom Kippur war in 1973 initiated a great change in military thinking for women in the IDF. The increased need for ground forces allowed women to enter selected operational divisions in the military, but still excluded them from participation in any combat roles. In spite of the new recognition that wo men played in the military after 1973, further equality was slow to come. Finally, in January of 2000 after a Supreme Court battle led by Allice Miller a few years earlier, the Equality amendment to the Military Service Law was implemented. Thus, allowing women the opportunity to volunteer in combat support and light combat roles. The Prime Minister of the State of Israel had a vision to equalize the role of women and men from active combat roles in the IDF. On May 31st, 1948 following the establishment of the State of Israel, the cabinet of Prime Minister David Ben-Gurion officially created the IDF, and declared it as the country’s army. It then became official that women between the ages of 18-24, single or married, without children had to join th... ...//www.idf.il/1283-9679-en/Dover.aspx>. "The Israeli Air Force." The Israeli Air Force. 28 Dec. 2010. Web. 10 Dec. 2011. . "Israeli Army Celebrates First-Ever Female Major General." Israeli Defence Forces, 23 June 2011. Web. 5 Dec. 2011. . "Israeli Women in the Military." Women's Rights. The Israel Project. Web. 5 Dec. 2011. . Izraeli, Dafna Nundi. "Israel Defense Forces." Jewish Women's Archive. 1 Mar. 2009. Web. 11 Dec. 2011. . "Women in the IDF." Krav Maga - Israeli Krav International. Web. 10 Dec. 2011. .

Thursday, October 24, 2019

Visual vs auditory

This research paper Is based on experiments that were conducted with the sole purpose of determine people's different preferences towards various learning and presentation techniques, which translates to content retention and ability to learn and remember a wide range of content that was taught in class.This experiment was done on two deferent environments; one experiment was done on people in a control environment (classroom) where students did not use visual aid in their study, while the other environment was not done in the classroom but rather In the open and involved the use of visual lad such as; projectors, graphs, chart among other visual equipments. Participants tried their best to write down each word they either saw or heard but some participants did better than others.Both Group A and Group B performed approximately the same. The result of this experiment, which was based on the ability of the respondents to retain or remember different words, was recorded in a frequent t able which will be analyzed in this research paper. Intro Researchers and policy makers alike allude to the fact that virtually all human beings re visual beings and not theoretical beings, and that they learn better as well as remember or recall different facts and information based on how these information was passed to them.For example, research has shown that when visual aids such as charts, graphs, projectors among other visual aids are used In teaching and presentation, the audiences are able to increase their word or content retention to a larger extent compared to when no visual aid are not used in presentation and teaching (Carol and Roger, 1978). This lab report will conduct an in-depth analysis on n experiment that was conducted by 18 participants, under control and non-control environment In relation to use of visual lad In making experiments.The research paper will thereafter make recommendations, conduct a step by step analysis on what participants did in the experimen t, predict the future of visual presentation, highlight the methodology that was used in conducting this study, outline the key limitations of the study and make a conclusion that is based on the findings of this study. Method Participants 18 participants that are enrolled In an Experimental Psychology class performed an core requirement. The participants consisted of 17 female and one male.The participants analyzed the use of visual and illustration learning, and how they influenced word remembrance. The study used simple random sampling in selecting the sample size that was used in the experiments. Setting This experiment took place in a small room that measured mom by mom, there were no windows in this room. The participants had 25-30 seating options; the chairs had a wooden desk and metal chairs. There was a blackboard in front of the room as well as the back of the room. There was also a rectangular table in the front of the room s well as the back of the room.There was also a rectangular table in the front of the classroom. Materials The material's that was needed for this experiment was random assignment sheet, desktop computer, projector and projector screen, ‘phone (auditory presentation & timer), pens or pencils, and sheets of paper w/ 25 spaces which were computer sized. Random assignment is a method in organizing experiments in which participants have equal odds of being given to a precise state of the experiment. The desktop computer was used to look up the words and sounds for the experiment.The erector and the projector screen was used to make the presentation more vivid so all the participants could see and hear the presentation. The phone was used as an auditory presentation and timer. Participants used pens or pencils to record the data. The sheet of paper with the 25 spaces was used by the participants to record data that was obtained from this experiment. Experimental Design The experiment design was between subject design. Participan ts were assigned by random assignment they were then placed in Group A or Group B.Group A was given the visual presentation whereas participants in Group B were given the auditory reservation. Participants were being observed by effects each presentation had on them. Procedure The experimenter randomly assigned participants got assigned either to Group A or to Group B by the number they received by the experimenter. Group B left room while Group A remained. The experimenter then provided the participants instructions and a sheet. Participants wrote down words they remembered then participants swapped sheets with a classmate. The experimenter reviewed correct words.After that participants wrote down the total number of words correct they received. Participants reported total number to experimenter. Then the Participants in Group A the ones that were presented with a visual presentation stepped outside and Group B the auditory participants entered the classroom. Group B followed the s ame steps as Group A, Group was presented the auditory presentation through the ‘phone. Results Figure 1 indicates the difference between both groups, Group A performed slightly one indicated that the participants in Group A performed better than those in Group B.Group A the ones that received the visual presentation which allowed the participants to answer more correct words whereas Group B had the auditory reservation which was hard to hear so it caused a change in results. The mean for Group A was 12. 4444 whereas the mean for Group B was 10. 6667. The t-test indicates that there is no significances. Discussion Predicting the future of visual aid or visual presentation in the teaching curriculum and presentation is a complex issue this is because of the drastic changes that have been seen in virtually all sectors and how they embrace this concept.For instance, in the academic and teaching profession, the use of visual aid or visual software's such as power point presentatio ns has been embraced through the use of Powering presentation both by the learners and course facilitators, power point presentation tends to be more visual rather than theoretical and hence would help in enhancing the ability of learners to improve their word retention ability, conversely, the use of Youth tutorials is another avenue that will be used more frequently by learners in the future to find real time information in real time.These tutorials provide a visual as well as audio step by step flow on different research topics to user which improves their word retention ability Carol and Roger, 1978). In addition, the future of visual presentation in conferencing and interviews looks very bright.This is made possible because of the use of voice over internet platforms such as Keep, where people can interact over a wide geographical location, resulting to exchange of information and ideas among people. Teleconferencing will further simplify as well as eliminate all the obstacles that existed in the traditional environment, because people are able to interact at low costs, based at their convenience, and moving from one location to another.Since the world has been reduced from the traditional market place, to one the modern market space, businessmen, and professionals such as teachers can be able to share information with each other, as well as benchmark with each other (Carol and Roger, 1978) Also Carol and Roger (1978) contend to the fact that the variability as well as reliability of research is one way or another enhanced by acknowledging the limitations of the study. Basically, this research paper is subject to a number of limitations in the environment, and demographic characteristics of different people.One, this research did not take into consideration the different geographic characteristics of people such as age which would affect people's content retention and remembrance ability. For instance, old people have a low remembrance ability compared to young people this is because old age affects some of the human cells that increase word retention and remembrance. Second, considering the fact that remembrance and content retention can be done through experiments, however, sensitive issues such as physiological or emotional issues that may affect the ability o recall words and remember them all together are difficult to establish.Third, time for carrying out the proposed research is limited, as the researcher will work within strict timeliness. Fourth, there is possibility of change of organizations or the individuals under consideration; this is because the research does not take into consideration the long-term effects of variables of study (Carol and Roger, 1978)). The study gave some suggestions for further research and experiments on the chosen researcher thus thought that research be done in other institutions and people of efferent age groups over a longer period of time in order to establish a better view of current resea rch.It was also suggested that a research should be conducted on different learning institutions to establish whether the use of visual aid and teaching software's such as Powering presentations have improved the word retention of people in these schools since these software's were introduced in their learning institutions (Carol and Roger, 1978). Based on the findings obtained in this research paper, it is evident that use of visual aid such as projectors, charts among other usual materials, enhance and improve the ability of people to retain, remember and recall different aspects of learning like remembrance of words during presentation.Although, some small disparities are reported on people whose memory does not depend solely on the use of visual aid because of demographical and physiological differences in different people based on age, emotions, health status of people among other things. Therefore, the use of visual aid in the teaching curriculum should be encouraged because o f the benefits it provides to students in improving heir ability to retain and remember different things that they are taught in class (Carol and Roger, 1978).Carol and Roger (1978) alludes to the fact that the use of visual presentation and aid has a lot of benefits, however, there is evidence to show that the use of visual aid is superior to some people compared to another group of people. For example, the use of visual aid in fifth grade, kindergarten, colleges and second grade level helped the students to improve their word retention ability, on the other side; the use of visual aid among older people produced mixed results. However, these disparities tend to disappear in the long run.

Wednesday, October 23, 2019

The Fight Against Cyber Crime

Running head: THE FIGHT AGAINST CYBER CRIME The Fight Against Cyber Crime: What Can We Do? Abstract Cyber crime is on the rise and every organization must recognize the danger and take necessary steps to help mitigate the threat. While many institutions worry more about hackers than cyber criminals, it is cyber crime that can cause the most damage. A hacker is more easily detected while a cyber criminal may already be in your network undetected. While a hacker may try to breach a network for the thrill or to annoy, a cyber criminal will breach a network for monetary gain.This paper is intended to point out some of the risks of cyber crime and what a financial institute can do to help mitigate the threat of attack. Keywords: cyber crime, cyber attack, Information Technology Information Sharing and Analysis Center, IT-ISAC, Financial Services Information Sharing and Analysis Center, FS-ISAC The Fight Against Cyber Crime: What Can We Do? While many institutions worry more about hackers than cyber criminals, it is cyber criminals that should make us more wary.A hacker is more easily detected while a cyber criminal may already be in your network undetected. While a hacker may try to breach a network for the thrill value or to annoy their victim, a cyber criminal will breach a network for monetary gain. This may include â€Å"data acquisition and storage, stealthy access to systems, identity collection and theft, misdirection of communications, keystroke identification, identity authentication, and botnets, among others† (Deloitte, 2010).According to a survey conducted in August 2011 by Ponemon Institute, for the 50 participating companies (see chart 1), the average time it takes an organization to resolve a cyber attack is 18 days with an average cost of $23,000 a day. An insider attack can average 45 days to contain. This does not include the value of any data lost, modified, or stolen in the process. This survey also showed the average annualized cost of cy ber crime to financial institutions was $14,700,000 for 2011, up from $12,370,000 the previous year (see Chart 2).Chart 3 summarizes the types of attack methods experienced by the companies that participated in the survey (Ponemon, 2011). According to security firm Imperva, â€Å"The average large business sees 27 attacks per minute hitting its Website. Attackers can use automation technologies to generate up to seven attacks per second, or 25,000 attacks per hour† (Rashid, 2011). To build a sufficient IT security posture, it is important to assume that an unauthorized user can gain access to the network, and then structure the network to best protect the most valuable data.The valuable data can then â€Å"be tagged and monitored so that the organization knows where it is, where it is going, where it has gone, and on whose authority† (Deloitte, 2010). The organization also needs to understand that they need to not only monitor what is coming into their network but also what is leaving their network. This will help â€Å"detect activities enabled by techniques and technologies that mimic, exploit, or piggyback on the access of authorized users† (Deloitte, 2010).Using standard firewalls and anti-virus programs alone will not accomplish this. The organization must take a more proactive approach to protect its financial data. Now that we know what we need to do, how do we accomplish this? Some very basic steps include employee screening, employee training to help mitigate against social engineering, disabling account access of terminated employees, ensuring software updates and patches are properly implemented, and ensuring firewalls are properly configured.More advanced steps include, but are not limited to, setting up a demilitarized zone to help block the network from outside access, installing a honeynet system to look like an authentic part of the network to entice and trap intrusion attempts for further analysis, installing hard drive en cryption and remote data wipe capability on all laptops and other mobile devices, and requiring smart card and pin number authentication (or some other form of multifactor authentication) to access sensitive data.The Ponemon survey revealed companies utilizing security information and event management (SIEM) solutions such as these average 24 percent less expense in dealing with cyber crime attacks (see chart 5). This reduction in cost is because companies that use SIEM solutions are better able to detect and contain, and therefore recover, from such attacks (see chart 6). Another important step for a financial institute to take is to become a member of the FS-ISAC (Financial Services Information Sharing and Analysis Center).The FS-ISAC was founded in 1999 and led the way for the IT-ISAC (Information Technology Information Sharing and Analysis Center) which was founded in 2001. The purpose of these groups is for organizations to have the opportunity to share the security attacks and vulnerabilities they have experienced with other organizations in their field of industry. Given the sophistication, complexity, and evolution of cyber crime technologies and techniques, no sizable organization can plan and implement the necessary response alone. CIOs, CSOs, CROs, and cyber security rofessionals should share information, techniques, and technologies in their battle against cyber crime. (Deloitte, 2010) The importance of FS-ISAC was proven in 2000 when member companies where saved from a major denial-of-service attack that many other companies experienced (Hurley, 2001). As shown in chart 4, a denial-of-service attack can be costly. A more recent example of FS-ISAC at work is the August 23, 2011 report of the Help Net Security (International) Ramnit worm which uses Zeus Trojan tactics for banking fraud.As the FS-ISAC points out, â€Å"When attacks occur, early warning and expert advice can mean the difference between business continuity and widespread business cata strophe† (FS-ISAC, 2011). Knowing and having the chance to combat against these attacks can save an institute millions. In conclusion, financial institutions must stay vigilant to current and new cyber threats. Table 1 through 3 gives a breakdown of cyber threats and controls that can help reduce the impact if these threats become reality. It is important for an organization to enroll in its respective ISAC and to share in the lessons learned from previous attacks.While it would be almost impossible to learn about and prevent every type of attack, staying vigilant will help reduce the likelihood and the impact. References Deloitte Development LLC. (2010). Cyber Crime: A Clear and Present Danger. Retrieved December 23, 2011, from the World Wide Web: http://eclearning. excelsior. edu/webct/RelativeResourceManager/Template/pdf/M7_Deloitte_CyberCrime. pdf FS-ISAC. (2011). Current Banking and Finance Report, Retrieved 24 December, 2011, from the World Wide Web: http://www. fsisac. com/ Hurley, E. (2001, January 29).IT-ISAC: A Matter of Trust. Retrieved 24 December, 2011, from the World Wide Web: http://searchsecurity. techtarget. com/news/517824/IT-ISAC-A matter-of-trust Ponemon Institute LLC. (2011, August). Second Annual Cost of Cyber Crime Study. Retrieved December 24, 2011, from the World Wide Web: http://www. arcsight. com/collateral/whitepapers/2011_Cost_of_Cyber_Crime_Study_August. pdf Rashid, F. (2011, July 25). Cyber-Criminals Use Botnets, Automation to Launch Multiple Blended Attacks. Retrieved December 24, 2011, from the World Wide Web: http://www. week. com/c/a/Security/CyberCriminals-Use-Botnets-Automation-to-Launch-Multiple-Blended-Attacks-656032/ Chart 1. Sample of Participating Companies by Industry (Ponemon, 2011) Average annualized cost by industry sector ($1M) *Industry was not represented in the FY2010 benchmark sample. Chart 2. Average annualized cost by industry sector (Ponemon, 2011) Types of Attack Methods Experienced Chart 3. Types of Attack Methods Experienced (Ponemon, 2011)Average annualized cyber crime cost weighted by attack frequency *The FY 2010 benchmark sample did not contain a DoS attack. Chart 4. Average annualized cyber crime cost (Ponemon, 2011) Comparison of SIEM and non-SIEM sub-sample of average cost of cyber crime Chart 5. Comparison cost of SIEM and non-SIEM companies (Ponemon, 2011) Chart 6 Percentage cost for recovery, detection & containment (Ponemon, 2011) categoryFinancial Impact Regulatory ComplianceIndustry Reputation 4CriticalIncrease in costs greater than $1MFines in excess of $1MSignificant, sustained negative media exposure.Significant loss of business due to blemish on public image. 3MajorIncrease in costs $100K to $1MFines between $100K and $1MNegative media exposure. Loss of business due to blemish on public image. 2ModerateIncrease in costs less than $100KFines under $100KSome negative media exposure. Slight loss of business due to blemish on public image. 1MinorNo significant co st increase expectedNo fines expectedNo media exposure or loss of business expected. Table 1. Impact 4Imminent 3Highly Likely 2Possible 1Unlikely Table 2. Probability PxI (before controls / after controls)Financial Impact Regulatory Compliance Industry Reputation Controls Denial of service1x3=3 / 1Ãâ€"2=21Ãâ€"3=3 / 1Ãâ€"1=11Ãâ€"4=4 / 1Ãâ€"2=2Implement router filters, install patches to guard against SYC flooding, disable unused services Web-based attack2x3=6 / 2Ãâ€"2=42Ãâ€"3=6 / 2Ãâ€"2=42Ãâ€"4=8 / 2Ãâ€"2=4Restrict website access to only what customer needs, disable account log-in after 3 failed log-in attempts, require multifactor authentication to access sensitive data Malicious code2x4=8 / 2Ãâ€"2=42Ãâ€"4=8 / 2Ãâ€"2=42Ãâ€"4=8 / 2Ãâ€"2=4Software updates and patches, anti-virus and anti-spam software pdates, firewall configuration, employee training Malicious insider1x4=4 / 1Ãâ€"2=21Ãâ€"4=4 / 1Ãâ€"2=21Ãâ€"4=4 / 1Ãâ€"2=2Employee screening, disable account access fo r terminated employees, require multifactor authentication for access to data servers, least privilege, separation of duty Phishing & social engineering 2Ãâ€"3=6 / 1Ãâ€"3=32Ãâ€"3=6 / 1Ãâ€"3=32Ãâ€"3=6 / 1Ãâ€"3=3Employee training, least privilege, separation of duty Stolen devices2x4=8 / 2Ãâ€"1=22Ãâ€"4=8 / 2Ãâ€"1=22Ãâ€"4=8 / 2Ãâ€"1=2Hard drive encryption, remote data wipe capability Botnets 3Ãâ€"3=9 / 3Ãâ€"1=33Ãâ€"3=9 / 3Ãâ€"1=33Ãâ€"3=9 / 3Ãâ€"1=3Software updates and patches, anti-virus and anti-spam software updates, firewall configuration, employee training Malware3x3=9 / 3Ãâ€"1=33Ãâ€"3=9 / 3Ãâ€"1=33Ãâ€"3=9 / 3Ãâ€"1=3Software updates and patches, anti-virus and anti-spam software updates, firewall configuration, employee training Viruses, worms, trojans4x3=12 / 4Ãâ€"1=44Ãâ€"3=12 / 4Ãâ€"1=44Ãâ€"3=12 / 4Ãâ€"1=4Software updates and patches, anti-virus and anti-spam software updates, firewall configuration, employee training Table 3. Risk Analysis

Tuesday, October 22, 2019

A New Kind of Didactic Novel

A New Kind of Didactic Novel A New Kind of Didactic Novel A New Kind of Didactic Novel By Maeve Maddox Didactic fiction is nothing new. Aesops tales are didactic, as are Langlands The Vision of Piers Plowman, Bunyans The Pilgrims Progress, Hesses Siddhartha, and Orwells Animal Farm. The authors of all these works desired to teach readers a lesson about the moral significance of human behavior. The word didactic is from a Greek verb meaning both to teach and to learn. There was a time that authors could admit to wanting to create a didactic novel and critics were willing to praise such novels for their moral effectiveness. The success of Harriet Beecher Stowes didactic novel Uncle Toms Cabin (1852) illustrates the effectiveness of using fiction to promote an authors social ideals. Beginning in the 1700s, American abolitionists churned out thousands of tracts in their fight to abolish slavery in the United States. None of them produced the effect of the extended abolitionist tract that Mrs. Stowe framed as fiction. tract noun: a pamphlet, leaflet, or folder issued (as by a political or religious group) for propaganda. In the nineteenth century, Uncle Toms Cabin was the best-selling novel in the world. According to what may be an apocryphal anecdote, when Mrs. Stowe met Abraham Lincoln in 1862, he remarked, so you are the little woman who wrote the book that started this great war. Modern readers expect a textbook or how-to book to be didactic, but modern critics usually perceive didacticism in a work of creative fiction as a flaw: George Orwell was better at essays than at novels. His most famous novels,  1984  and  Animal Farm,  are clunkily didactic, especially  Animal Farm.   George refers to Dickens on the first page of her earnest but perhaps overly didactic novel, What Happened Before He Shot Her. OConnor has been criticized for being overly  didactic. Odetss inability to escape this 1930s pigeonhole is reflected in the intensely ideological, even didactic, nature of his plays.   Unlike many other Soviet filmmakers, whose works are boldly and aggressively didactic, Alexander Dovzhenkos cinematic output is personal and fervently private.   Now, however, a fictional genre called the startup novel has emerged, written by experienced and wanna-be entrepreneurs. These novels encapsulate blueprints for successful entrepreneurship in plots that employ action and intrigue. Apparently, entrepreneurs are reading them to learn the techniques of starting a business. Entrepreneur Orr Ben-Zvy says that after reading almost every [nonfiction] book on Amazons 50 best sellers for business and the next 50 for entrepreneurship, he discovered something counterintuitive: fiction [is] much more useful than nonfiction. His search for a fictionalized account of how to achieve financial success with a startup company led him to Eliot Pepers novel Uncommon Stock (2014), a book credited with being the first of its kind. According to a blurb on Amazon, the Uncommon trilogy has attracted a cult following in Silicon Valley and is the #1 top-rated financial thriller on Amazon. The genre that romanticizes and describes the process of starting a business has blossomed since 2014. An Amazon search for financial thrillers brings up pages and pages of titles. I havent read one yet, but I intend to. Im curious to see what kind of moral message this new didactic genre has for its readers. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Fiction Writing category, check our popular posts, or choose a related post below:45 Synonyms for â€Å"Food†Ten Yiddish Expressions You Should KnowCareful with Words Used as Noun and Verb

Monday, October 21, 2019

Christianity

In regards to the issues of Christianity, Human Nature, and Morality philosophers Fredrich Nietzsche and Thomas Hobbes express radical views that are completely in opposition to one another. Hobbes philosophy is dominated by loyalty to the crown, riddled with references to the Christian scriptures, and centered on a belief that life is nasty, brutish, and short. (Leviathan) Nietzsches philosophy is dominated by the pessimistic views of Arthur Schopenhauer and his belief that the human race is nothing more than a herd. Nietzsche believes that God is inert and thus the enemy of life. (Anti-Nature) Both Hobbes and Nietzsche look at the world in a completely different light. Hobbes was a Christian who defended the bible, while Nietzsche refers to Christianity as being a great curse, one of stupidity in fact. There is nothing we envy less than the moralistic cow and the fat happiness of the good conscience...peace of soul, the Christian desideratum. (Anti-Nature) On the topic of human nature Hobbes thought life to be the war of every man, against every man. (Leviathan) Nietzsche, on the other hand, took a nihilistic approach and declared that human nature is simply a euphemism for inertia, cultural conditioning, and what we are before we make something of ourselves. Hobbes views on morality were strictly biblical, straight out of Exodus. Nietzsche, however, held morality as an impediment to the development of a new and better civilization; after all how could a religion that believes in turning the other cheek proclaim any intelligence? If thy eye offend thee, pluck it out. (Anti-Nature) Nietzsche believed that modern Christian civilization is demented. It is a sickness that must be overcome. Hobbes, however, declared that God, when he speaks to any subject, he ought to be obeyed. (Leviathan) Throughout his life, Nietzsche held the belief...

Sunday, October 20, 2019

Coordinating Conjunction Definition and Examples

Coordinating Conjunction Definition and Examples A coordinating conjunction is a  conjunction (such as and) that joins two similarly constructed and/or syntactically equal words, phrases, or clauses within a sentence, whether they are adjectives, adverbs, nouns, or verbs. Its also called a coordinator. The coordinating conjunctions in English are and, but, for, nor, or, so, and yet. (See the coordinating conjunction and as it functions in that list of conjunctions?) Compare their use with ​subordinating conjunctions, which join items that are not of equal weight. When joining two independent clauses to create a compound sentence, place a comma before the conjunction. When they join two verbs, for example in the case of a compound predicate, you dont use a comma before the conjunction.  Ã¢â‚¬â€¹ Independent Clauses vs. Compound Predicates Independent clauses look  like these examples below. They each have a subject and a verb, making them complete thoughts that stand on their own: She wondered when he would get home. She decided not to call. If we were to write them as one sentence, wed either need to join them with a semicolon or a comma and a coordinating conjunction like this:   She wondered when he would get home, but she decided not to call. Note that each clause keeps its own subject and verb. If theyd be joined without the comma and conjunction, theyd be a fused sentence or a comma splice.   This version of the  sentence contains a compound predicate, two verbs that share the same subject:   She wondered when he would get home but decided not to call. Theres no comma before but because there is only one subject for both verbs. She both wondered and decided. There are no longer two independent clauses. Decided not to call cant stand on its own as a sentence. Conjunctions Starting a Sentence In some cases, a coordinating conjunction may be used as a transition at the beginning of a new sentence. It can break up a static rhythm between similarly structured sentences or lead off a very short  sentence to add emphasis to that sentence in the paragraph. Theres some debate whether writers should be able to use the conjunctions in this way or whether thats a rule that shouldnt exist. Author David Crystal explains: And at the beginning of a sentence? During the 19th century, some schoolteachers took against the practice of beginning a sentence with a word like but or and, presumably because they noticed the way young children often overused them in their writing. But instead of gently weaning the children away from overuse, they banned the usage altogether! Generations of children were taught they should never begin a sentence with a conjunction. Some still are.There was never any authority behind this condemnation. It isnt one of the rules laid down by the first prescriptive grammarians. Indeed, one of those grammarians, Bishop Lowth, uses dozens of examples of sentences beginning with and. And in the 20th century, Henry Fowler, in his famous Dictionary of Modern English Usage, went so far as to call it a superstition. He was right. There are sentences starting with And that date back to Anglo-Saxon times. (The Story of English in 100 Words. St. Martins Press, 2012) Following through with the example in the previous section, it could read like this: She wondered when he would get home. But she decided not to call. Splitting up the two sentences changes their rhythm and pacing slightly, as compared with having them joined into one sentence with the conjunction between them. Starting a sentence with a conjunction isnt a convention you want to use sentence after sentence, paragraph after paragraph, but it can serve as a tool to create drama in a passage through altering its pacing and rhythm.

Saturday, October 19, 2019

Textual Analysis of Emily Dickinsons Poem The Brain is wider than the Research Paper

Textual Analysis of Emily Dickinsons Poem The Brain is wider than the Sky - Research Paper Example The poem also employs fundamental devices that make a poem memorable in its delivery of message (Deppman 76). Uniqueness in Emily Dickinson choice of structure and form in the entire poem is clear. She creates an extremely provocative poem using minimal words. For example, the poem provokes its respective audience to explore the relations of the mind to the sky, the sea and God. Her entire poem reveals the use of several dashes that seem to heighten uncertainty. Dickson places a dash after every sentence in her poem making critics question the intentional use of the symbol. Careful analysis reveals that the dashes emphasize the meaning in the poem. It is fundamental to acknowledge that the form of her poem is captivating because of its brevity. One would not expect such a short poem to deliver an intense message. Other significant elements about form and structure in this poem include Emily’s choice of three stanzas. She ensures that there is equal division of lines in her poem making each of the three stanzas have three lines. There is a notable pattern in the rhyme scheme that she introduces to make the poem suitable. For example, in her first stanza, Emily Dickinson creates an internal rhyme that increases the musicality of her poem. The second line of the first stanza ends with the word â€Å"side† while the second last line ends with the word â€Å"beside†.... The word â€Å"Blue† rhymes with â€Å"do† while â€Å"pound† rhymes with â€Å"sound†. Biographical Criticism Dickson’s previous exposure and consequent address of topics that are relevant to the Romantic Movement in poetry make the poem relevant. She chooses the omniscient point of view in elaborating her storyline. This poem does not seem to have specific voices. However, it has a significantly powerful voice that is neither first person nor second person. The voice is always present throughout the poem. Dickinson displays poetic prowess when using this unique voice to deliver her message in the poem. In the second stanza of the poem, she implies â€Å"-Put them side by side-â€Å". This commanding voice lacks a clear origin. An interesting aspect of the omniscient viewpoint that combines physics and psychology (Faflak 55) Dickinson addresses matters that are beyond feminism in this poem. She uses the poem to display her wonder on significant a spects of nature. Her other works equally focus on several fascinating ideas that are natural (Farr & Louise 5). For example, she focuses on the brain and its power over other powerful elements. She seems to have mastered Romanticism because of her exemplary delivery of a poem that focuses on natural ideas. Psychoanalytic Criticism Dickinson succeeds in accessing the parts of the brain that seem to be unreachable because they are unconscious. The poem allows her to express ideas that seem impossible in the normal world. She uses her poetic justice to reveal some of her unusual desires. Emily Dickinson satisfies the psychoanalytic elements in her poem. Psychoanalysts suggest that people’s actions are governed by sexual desires. Emily displays her sexual

An investment scheme to finance boot camps Research Proposal

An investment scheme to finance boot camps - Research Proposal Example This is to ensure that children attention is arrested before they are swayed by peer pressure. Behavioral finance is a new field that tries to combine both the behavioral and cognitive physiology in explaining the reasons why people make financial decisions that are irrational. The financial decisions being made by various institutions mandated with protecting the interests of the vulnerable children are failing to capture the real issues that need to be addressed in order to improve the living standards of the children. Exposing the children to some environment is playing a significant role in diverting them towards the education. As a result, they end up not helping their parents once they grow up (Maisel 2014). Therefore, it is critical to understand the importance of behavioral finance especially while making financial decisions that will affect other people. Investor behavior keeps on deviating from logic and reason. The behavior is mainly affected by emotional processes, mental mistakes, and individual personality. These make it very hard to make decisions. Therefore, investment is not a matter of analyzing numbers. Instead, a large part of investment is embedded on the individual behavior. There are many types of behavioral biasness while investing. For instance, cognitive bias can be seen as a rule of thumb which can lead to a systematic deviation from the correct judgment. Some of the common behavioral biasness that can affect the investors’ decisions includes representativeness, worry, disposition effect, familiarity bias, anchoring, and self-attribution biasness (Maisel 2014). In economics, financial intermediation is a process that involves borrowing money and lending it to other parties that are in dire need for financial support. Children act as an important investment for any government or society. Therefore, in this case, the money from the investors will be used to finance different activities being undertaken in the boot camps.

Friday, October 18, 2019

Organizational Diagnosis Term Paper Example | Topics and Well Written Essays - 750 words

Organizational Diagnosis - Term Paper Example The obtained results are instrumental in devising solutions. As organizations are increasing around the globe, they are creating more opportunities for organizational problems. According to Papadopoulos (2009), increasing organizations make the organizational owners and managers to encounter different conflicts with their employees and different issues; thus, negatively affecting the productivity of an organization. However, it is imperative for such managers to consider conducting organizational analysis to ensure that every organizational subsystem is functioning effectively, increasing the effectiveness of an organization. Possible issues that might occur in an organization and their preventive measures Different organizations around the globe face many issues that affect their effectiveness; hence, distorting their productivity. Therefore, this paper will draw attention on these issues. Firstly, information security is a major issue to most organizations. Information insecurity h as turned out to me a major problem affecting most organizations since most of the current organizations rely on information technology in their operations. The threats and ferociousness involved in technology have made the protection of organizational private information to be a challenge. This has resulted into other companies hacking vital information concerning their competitor negatively interfering with them (Daft, 2010). In addition, the company managers also control the employees’ personal information denying them freedom to privacy. For example, there are some organizations, which manage the private information of their employees by accessing their emails, Facebook accounts and their communications on phone information. It is important for organizations to train their employees on information security for them to prevent hacking of their organizational private information. The organizations should also ensure that they form a key password for the organizational infor mation to prevent other competing organizations from interfering with their organizational privacy. In addition, organizational managers should ensure that they balance the employees’ freedom and privacy, while at the work place when it comes to managing their personal information. For example, there are some organizations, which take control of all their employees’ personal information by monitoring how they communicate through emails while at work, as well as their computers and other accounts (Daft, 2010). Therefore, it is important for organizations to possess privacy rights hence considering potential issues on employee privacy and autonomy among employees. Secondly, most of the problems in the current organizations arise due to communication problems amongst employees. Consequently, such problems results into dissimilar negative effects such as lowering employees’ productivity, job turn over and other activities within an organization. Poor communication i s a barrier to any organization’s productivity because good communication increases productivity by enabling employees to share ideas, point out potential problems and create an environment that can solve dissimilar issues within an organization. According to Ziegenfuss (2002), good communication process in an organization, results to less problems and conflicts. In order for organizations

Geopolitical Problems in 19th Century Europe Essay

Geopolitical Problems in 19th Century Europe - Essay Example The French Revolution has announced not only the individuals right to freedom and equality but also the right of nations to determine their own status. Wherever human rights and privileges were endangered under foreign rule, the requirement for freedom implied protection of national freedom from such foreign domination. The concept of the right to self-determination for the nations was served to justify the demands of stateless Eastern nations, including Poland, which lost its political freedom in the earlier centuries. This right should help to organize separate nation-states with their own governments including all their subjects. By 1815, nationalism has become one of the leading ideologies in the world. It was able to mobilize society in the transition to a capitalist economy, which led to an increase in the effectiveness of national states and the growth of their economic power. Young nations have also shown high efficiency with the military side. A professional army, consisting of subjects monarchs often suffered defeat from an untrained civilian militia. In the 19th century, the supporters of ethnic nationalism believed that national unity must be based on a common ethnic origin, also it was believed that those who have a different origin, by definition, cannot be part of the national culture . Europe in the 19th century had several large multinational empires such as Habsburg Austro-Hungarian Empire, Czarist Russia, and Imperial Germany. Within these empires were existed numerous national minorities that feel oppressed, exploited and abused. Their reaction was resistance to a stronger and more powerful nationalism. However, in most countries of Central and Eastern Europe nationalism arose as a reaction to the French occupation and initially wore an expression of cultural-ethnic character. In particular, the revolutionary wave of 1848 originated pan-Slavism.

Thursday, October 17, 2019

The Benefits of NAFTA and CAFTA Essay Example | Topics and Well Written Essays - 1000 words

The Benefits of NAFTA and CAFTA - Essay Example Farmers, workers and manufacturers benefit from the reduction of arbitrary and discriminatory trade rules, while consumers enjoy lower prices and more choices. By strengthening the rules and procedures governing trade and investment on this continent, the NAFTA has allowed trade and investment flows in North America to skyrocket. According to figures of the International Monetary Fund, total trade among the three NAFTA countries has more than doubled, passing from US$306 billion in 1993 to almost US$621 billion in 2002. That's US$1.2 million every minute. NAFTA has been a huge success for the U.S. and its NAFTA partners. It has helped Americans work smarter, earn more and increase purchasing power. It has contributed to more trade, higher productivity, better jobs, and higher wages. In ten years of NAFTA, total trade among the three countries has more than doubled, from $306 billion to $621 billion in 2003. That's $1.7 billion in trade every day. U.S. exports to Canada and Mexico gre w from $142 billion to $263 billion in NAFTA's first ten years. And Mexican exports to the U.S. grew 242 percent, improving lives and reducing poverty in Mexico. The DR-CAFTA, the treaty originally encompassed the United States and the Central American countries Costa Rica, El Salvador, Guatemala, Honduras, and Nicaragua. Then in 2005, the Dominican Republic joined the negotiations, and treaty became known as DR-CAFTA. The CAFTA-DR is the second largest U.S. export market in Latin America, behind only Mexico, buying more than $16 billion in U.S. exports. Successful CAFTA-DR implementation is critical to the broader U.S. policy goals for the Americas of strengthening democratic governance, expanding economic opportunity, and investing in people. CAFTA would require market liberalization for the majority of goods and services in Central America. In return, the U.S. has promised increased market access for certain sectors in Central America, including textiles and a limited increase in sugar quotas. To add, CAFTA is important to the DR-CAFTA countries' own businesses, enabling them to increase productivity and increasing the skills of millions of workers as new foreign businesses and new technologies enter their economies. With higher skills, workers will be more valuable and earn more money, increasing their living standards. As living standards rise and people enjoy better lives, their interest in preserving these benefits also increases. Because they have more to lose from a crisis, they strive to preserve peace and stability. As a result, the likelihood of civil conflict decreases. At the same time, the improved domestic situation reduces the incentives to leave home in search of a better life elsewhere.According to the Organization for Economic Cooperation and Development (1997) more workers in more firms in more countries derive their livelihood from cross-border trade and investment activity. Trade and investment have become major engines of growth in developed and developing countries alike. The volume of world merchandise trade is today about sixteen times what it was in 1950, a period during which the value of w orld output increased by a factor of 5.5. The period since 1950 saw a near doubling, from 8 to 15 per cent, of the ratio of world merchandise exports to global production. Most remarkable has been the

Annotated Bibliography Example | Topics and Well Written Essays - 750 words - 3

Annotated Bibliography Example It gave the reader insight into the issues regarding attention span, interest level and more. It covered children from ages preschool to fourth grade. Summary: This article chose books about cats as a theme to show how specific books can be used to teach literature. When children are interested in the literature chosen, they also are able to increase their reading comprehension. Summary: There were mass evacuation of Jews from many towns but the story of the Jews in Denmark is not always told. The author gives a fictionalized account of a true story through the eyes of a 10 year old and how her family helped her best friend’s family out of the country. Summary: This book was a delightful look at a variety of issues in using children’s literature. It provided the reader with ideas that could be used to identify children’s literature with a global picture. Ringrose, Christopher. â€Å"A Journey Backwards: History through Style in Children’s Fiction.† Children’s Literature in Education, 38.3 (2007): 207-218. ERIC database. Web. 18 July 2011. doi: 10.1007/s10583-007-9045-5 Summary: This article gave a history of the styles that have been used in children’s literary fiction. It creates an opportunity for teachers to understand what has been shown in children’s

Wednesday, October 16, 2019

The Benefits of NAFTA and CAFTA Essay Example | Topics and Well Written Essays - 1000 words

The Benefits of NAFTA and CAFTA - Essay Example Farmers, workers and manufacturers benefit from the reduction of arbitrary and discriminatory trade rules, while consumers enjoy lower prices and more choices. By strengthening the rules and procedures governing trade and investment on this continent, the NAFTA has allowed trade and investment flows in North America to skyrocket. According to figures of the International Monetary Fund, total trade among the three NAFTA countries has more than doubled, passing from US$306 billion in 1993 to almost US$621 billion in 2002. That's US$1.2 million every minute. NAFTA has been a huge success for the U.S. and its NAFTA partners. It has helped Americans work smarter, earn more and increase purchasing power. It has contributed to more trade, higher productivity, better jobs, and higher wages. In ten years of NAFTA, total trade among the three countries has more than doubled, from $306 billion to $621 billion in 2003. That's $1.7 billion in trade every day. U.S. exports to Canada and Mexico gre w from $142 billion to $263 billion in NAFTA's first ten years. And Mexican exports to the U.S. grew 242 percent, improving lives and reducing poverty in Mexico. The DR-CAFTA, the treaty originally encompassed the United States and the Central American countries Costa Rica, El Salvador, Guatemala, Honduras, and Nicaragua. Then in 2005, the Dominican Republic joined the negotiations, and treaty became known as DR-CAFTA. The CAFTA-DR is the second largest U.S. export market in Latin America, behind only Mexico, buying more than $16 billion in U.S. exports. Successful CAFTA-DR implementation is critical to the broader U.S. policy goals for the Americas of strengthening democratic governance, expanding economic opportunity, and investing in people. CAFTA would require market liberalization for the majority of goods and services in Central America. In return, the U.S. has promised increased market access for certain sectors in Central America, including textiles and a limited increase in sugar quotas. To add, CAFTA is important to the DR-CAFTA countries' own businesses, enabling them to increase productivity and increasing the skills of millions of workers as new foreign businesses and new technologies enter their economies. With higher skills, workers will be more valuable and earn more money, increasing their living standards. As living standards rise and people enjoy better lives, their interest in preserving these benefits also increases. Because they have more to lose from a crisis, they strive to preserve peace and stability. As a result, the likelihood of civil conflict decreases. At the same time, the improved domestic situation reduces the incentives to leave home in search of a better life elsewhere.According to the Organization for Economic Cooperation and Development (1997) more workers in more firms in more countries derive their livelihood from cross-border trade and investment activity. Trade and investment have become major engines of growth in developed and developing countries alike. The volume of world merchandise trade is today about sixteen times what it was in 1950, a period during which the value of w orld output increased by a factor of 5.5. The period since 1950 saw a near doubling, from 8 to 15 per cent, of the ratio of world merchandise exports to global production. Most remarkable has been the

Tuesday, October 15, 2019

Answer the questions of my exam Assignment Example | Topics and Well Written Essays - 1500 words

Answer the questions of my exam - Assignment Example The initial step in this process is attaining of required information, which is the work of the brain acting as hardware to input data. To input data, brain ought to recognize it, which is the â€Å"perception† stage, aimed at ascertaining the type of information. Then the brain interprets data based on its intended purpose or goal before producing encoding signal meant to store information short or long-term memory. In the â€Å"Goal† compartment, information is already stored depending on its purpose whereby before proceeding to the â€Å"Intention Formation† stage to receive clear definition of purpose. Mainly, this stage is the initial step of information refining process supposed to ensure the required information goes to the effecting of the set task, which is at â€Å"Action specification† stage. â€Å"Execution† stage is merely humanity’s body that assumes all actions, which the brain has processed and formatted as required with the i ntention of fulfilling a certain purpose. B. How does the concept of "attention" limit our performance when interacting with systems? Attention based on one’s settings varies considerably either by limiting or contributing in augmenting our performances. However, in most cases especially when interacting with systems, attention proves to be a detrimental aspect that degrades the expected performance. This is because of numerous distractions an individual experiences characterizing varied settings one inhabits. Most distractions evidenced that interrupt one’s performance encompass radio’s on going conversation that prompts an individual to have a divided attention and fail in what he or she is doing. Since, while tackling a task and interacting with the system, an individual tends to focus on what the radio programme is trying to communicate to its listeners. Consequently, this reduces one’s attention making them fail to be actively involved in their prese nt task. C. Explain why we need to understand how Human information processing (HIP) works and how psychological models help us to do this? First, is to understand how human mental processes function with the intention of utilizing them effectively in attaining our intended goals. Since, one will be in a position to augment his or her performance by focusing on one aspect at a time compared to when he or she has numerous tasks and is multitasking. It also aids in shunning errors that may lead to poor performances caused by human behaviours, which when one has not studied them is extremely difficult to understand, for instance, skill-based behaviours (over habitual slips). D. Why is this theory different from earlier models/ theories that assume linear processing (e.g MHP)? What does current research say? The current method compares mental processes with that of computer, whereby in each section there are other extremely complex activities. Mainly, these activities or processes condi tion information in such a way to achieve the final intended goal. E. What cognitive strategies do we use that may enhance our performance when interaction with system? The include; Skill-based Rules-based Knowledge-based F. Illustrate the components of HIP systems and explain how they work using the Simplex One model? Information/Words- This represents materials or data which brain attains from the world. Perception- It is an initial step, whereby brain

Monday, October 14, 2019

Cyber Security Essay Example for Free

Cyber Security Essay President Obama has declared that the â€Å"cyber threat is one of the most serious economic and national security challenges we face as a nation†¦ Americas economic prosperity in the 21st century will depend on cyber security.† So why is it that so many people still don’t know some of the basic ways that produce cyber threats? The purpose of this paper is to name some of the more basic cyber threats. Even though it is just the beginning to the hazards you can obtain, they are highly effective because of the number of people that still allow these kinds of breaches. First and foremost are viruses. According to cknow.com, â€Å"There were over 50,000 computer viruses in 2000 and that number was then and still is growing rapidly. Sophos, in a print ad in June 2005 claims over 103,000 viruses. And, Symantec, in April 2008 is reported to have claimed the number is over one million.† With so many different viruses out there, how do you know what to look for and how to protect your cyber world from viruses? Some of the most common viruses that effect people are Trojans and Net Bots. PCmag.com defines a Trojan as â€Å"A program that appears legitimate, but performs some illicit activity when it is run. It may be used to locate password information or make the system more vulnerable to future entry or simply destroy programs or data on the hard disk. A Trojan is similar to a virus, except that it does not replicate itself. It stays in the computer doing its damage or allowing somebody from a remote site to take control of the computer. Trojans often sneak in attached to a free game or other utility.† To add to their definition, it can also be affixed to an email attachment or the email itself. So now that you know what it is you’re probably thinking so what can I do to protect myself from obtaining this virus? The best thing to do would be to educate yourself about this threat. Know what they look like and common websites they reside. The next thing that to do is to be sure to always have an up to date WELL KNOWN antivirus such as Sophos, McAfee, or Norton. The well known part is very important because some of the smaller antivirus companies are part of the reason there are so many Trojans out there. Once you get some antivirus software you need to be sure to keep it up to date. Also, don’t open emails from senders that you don’t recognize. Several of the Trojans out there that get circulated by email come from people opening emails from unknown senders. The next one is botnets. http://searchsecurity.techtarget.com says â€Å"A botnet (also known as a zombie army) is a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the Internet. Any such computer is referred to as a zombie in effect, a computer robot or bot that serves the wishes of some master spam or virus originator. Most computers compromised in this way are home-based. According to a report from Russian-based Kaspersky Labs, botnets not spam, vir uses, or worms currently pose the biggest threat to the Internet.† Trojans are the major way that you can get one of these viruses. So it is important that you again get antivirus software, keep it up to date, and don’t open emails from unknown senders. However, with this virus you can get it just from going to a questionable web site. So how do you know what ones are good and what ones are questionable? Well that you can for the most part guess using these deciding factors: Are there several java applications on the web page? Is there a lot of download able content? Are there pop up advertisements that come up on the page? Then you probably should do your best to stay away from the page. In case you are unsure, some antivirus software are now including a trusted and untrusted feature so when you search a site it will let you know if the page is safe or proceed at your own risk. If your antivirus does not have such a feature then there are some applications out there that will do the same thing just to name one would be WOT or Web of Trust. The next issue is a little more targeted to the business world. It deals more with their emails and correspondence but can also be directed to an average internet user. It is phishing. Webroot.com expounds â€Å"Email Phishing scams are carried out online by tech-savvy con artists and identity theft criminals. They use spam, fake websites constructed to look identical to a real sites, email and instant messages to trick you into divulging sensitive information, like bank account passwords and credit card numbers. Once you take the phishers bait, they can use the information to create fake accounts in your name, ruin your credit, and steal your money or even your identity.† This is a serious issue that takes some skill to recognize to evade taking the phisher’s bait. First and foremost is to educate yourself on phishing attacks or scams. Know what it looks like. There are many resources that you have available to you on the internet to learn how to spot a phishing attack and a legitimist email. The Department of Defense offers a grea t course on how to spot a phishing email at http://iase.disa.mil/eta/phishing/Phishing/launchPage.htm. A more specific attack is whaling. Blogs.iss.net explains â€Å"The adoption of the term ‘Whaling’ within phishing is fairly new and may have been derived from the use of ‘Whales’ within gambling to refer to big-time gamblers and high rollers, but most likely come from the colloquialism for â€Å"big fish†. Regardless, Whaling describes the most focused type of phishing currently encountered by businesses or government – targeted attacks against groups of high-level executives within a single organization, or executive positions common to multiple organizations (e.g. the CTO or CFO). In a whaling attack, the phisher focuses upon a very small group of senior personnel within an organization and tries to steal their credentials – preferably through the installation of malware that provides back-door functionality and key logging. By focusing upon this small group, the phisher can invest more time in the attack and finely tune his message to achieve the highest likelihood of success. Note that these messages need not be limited to email. Some scams have relied upon regular postage systems to deliver infected media – for example, a CD supposedly containing evaluation software from a known supplier to the CIO, but containing a hidden malware installer.† So if you’re not a high level employee, you’re probably wondering how this is important to you. How phishers go about their scam is by obtaining little bits of what some would consider being harmless information from other employees about level executives and projects going on in the company. They start at the bottom to get more information at the top. So in all actuality it very much concerns everyone in the company. This leads me in to my last but important area of cyber security: insider threat. Frankly, that is you. Every employee is potentially an insider threat. So let me define it a little better with some help from searchsecurity.techtarget.com. â€Å"An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, institution, or agency. The term can also apply to an outside person who poses as an employee or officer by obtaining false credentials. The cracker obtains access to the computer systems or networks of the enterprise, and then conducts activities intended to cause harm to the enterprise. Insider threats are often disgruntled employees or ex-employees who believe that the business, institution, or agency has done them wrong and feel justified in gaining revenge. The malicious activity usually occurs in four steps or phases. First, the cracker gains entry to the system or network. Secondly, the cracker investigates the nature of the system or network in order to learn where the vulnerable points are and where the most damage can be caused with the least effort. Thirdly, the cracker sets up a workstation from which the nefarious activity can be conducted. Finally, the actual destructive activity takes place. The damage caused by an insider threat can take many forms, including the introduction of viruses, worms, or Trojan horses; the theft of information or corporate secrets; the theft of money; the corruption or deletion of data; the altering of data to produce inconvenience or false criminal evidence; and the theft of the identities of specific individuals in the ente rprise. Protection against the insider threat involves measures similar to those recommended for Internet users, such as the use of multiple spyware scanning programs, anti-virus programs, firewalls, and a rigorous data backup and archiving routine.† It could also be an employee giving away what you would consider to be harmless information like an email address, a project you are working on at work, how many people you work with, or even where you work and the location of the building. Even with some of the best antivirus software, a stellar knowledge of phishing, and an elite cyber security system, an insider threat can penetrate that because they most the time have the credentials to log it to the system and pull resources ligitimently so it would go unnoticed. So how can you help protect you network or your company’s network from an insider threat? Simply, don’t be one. Always be sure to only give information that the other person is on the same level to receive. Secondly is to educate yourself on insider threat prevention. There is a plethora of resources to do just that. A helpful one is http://www.ussecurityawareness.org/highres/insider-threat.html. Also watch for signs of curious activity with co workers. Report any evidence or suspicions to your supervisor. So in conclusion, prevention starts with you. Buy up to date antivirus software. avoid risky sites, educate yourself on what a phishing attack looks like, know what a legitimate email is, don’t be an insider threat and educate yourself about things to look for from other co workers. Cyber security is a serious threat and is a major issue that needs to be taken seriously. It is not just something for the IT department to worry about but starts with every one making sure to take the appropriate security measures to make the cyber world more secure.

Sunday, October 13, 2019

Use of Cell Phones in Our Society :: Communication Health Papers

In a world that is rapidly becoming faster paced, finding various means to keep up with the changing environment is a must. Cell phones are one of the most practical inventions of time that make this possible. However, the subtle effect they have on our culture today, their invasion of our privacy, and the possible health risks they may cause are reasons to reassess the value of this intriguing device. While cell phones may be valuable, they are also potentially harmful. Cell phones are gradually affecting American culture today because they are becoming a key part of everyday life. The cell phone is "?an indispensable companion that serves without favor or prejudice. It has reached into every civilized corner of the world--and often brought civilization with it. From its wires spring the words of history in the making, the chatter of daily life" ("43 Years" sc. 1). The cell phone enables individuals to communicate rapidly over great distances and obtain information like never before. People can now pick up the phone and get information on the weather, time, stock market quotations, and other things simply by dialing a few numbers. Cell phones connect the world together, to the point where individuals become almost helpless without it. The next time you find yourself waiting at a stoplight, take the time to observe the people around you. There will likely be at least one person in the surrounding cars who is talking on the phone. Even on the streets, people continue to chat on the phone. Cell phones are everywhere. One resident in Greenville, S.C. admitted that he uses his cell phone at least 15 times a day (Chany sc. 2). The cell phone is in such high use that the traditional phones in homes and offices almost become antique devices on display. Although traditional phones are still around, individuals are quicker to pick up their cell phone. The percentage of Americans who own or use cell phones is astounding. The Post Courier reports that about half of the American population now owns a cell phone.

Saturday, October 12, 2019

Acquired Immune Deficiency Syndrome: AIDS :: AIDS disease

  Ã‚  Ã‚  Ã‚  Ã‚  AIDS (Acquired Immune Deficiency Syndrome) is a blood born disease that was first recognized in America in the early 1980’s, around the time Rock Hudson passed away. It is believed that it was first passed thru to humans by monkey’s in Africa. â€Å"The battle between humans and disease was nowhere more bitterly fought than here in the fetid equatorial climate, where heat and humidity fuel the generation of new life forms. One historian has suggested that humans, who first evolved in Africa eons ago migrated north to Asia and Europe simple to get to climates that were less hospitable to the deadly microbes the tropics so efficiently spread.† (Shilts, 5)   Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"HIV may already infect one to two million Americans and spreads to forty thousand more people each year.† (Klitzman, 7) This disease wreaks havoc in places like Africa, Europe, South America, Asia, and the United States, as well as countless other places around the world. â€Å"With Modern roads and jet travel, no corner of the earth was very remote anymore; never again could diseases linger undetected for centuries among a distant people without finding some route to fan out across the planet.† (Shilts, 5)   Ã‚  Ã‚  Ã‚  Ã‚  AIDS is mainly a sexually transmitted disease, statistically attributed to the homosexual community, that is transferred by people who are unaware they are infected. It can also be transferred between people through tainted blood transfusions as well as the sharing of infected needles among users. AIDS is a devastating and debilitating disease that may not show up for a period of ten years or longer after the original contact. By this time it might be too late to do anything about it , although, there are various cocktails of drugs that could control the disease and extend life for a considerable length of time.   Ã‚  Ã‚  Ã‚  Ã‚  Western society has been able to arrest the spread of AIDS with sexual education and early testing but where the disease first started, in Africa, almost one third of the population is now afflicted with the disease. In order to combat this problem in Africa, the governments of the western world have shown a concentrated effort by sending billions of dollars in aid to educate and treat people who are infected with this disease.   Ã‚  Ã‚  Ã‚  Ã‚  AIDS has reached many people from all different cultures, ethnic backgrounds, and areas around the world. This is a scary fact considering many of those people could be unaware they are infected with HIV.

Friday, October 11, 2019

The Benefits of Attending a Community College

The Benefits of Attending a Community College Some prospective college students tend to overlook the many benefits that come along with attending a community college. This may be because they aren't aware of the advantages or they don't have a true understanding of how this type of educational training can benefit them. Whatever the case may be, year after year large numbers of people opt to go straight from high school into four-year universities.Although that is of course a fantastic route to take, people should also give some thought to the notion of attending a community college. One of the best things about attending this type of educational institution is the smaller class sizes that are offered. At traditional universities, sometimes classes can have anywhere from 50 to 400 students at one time. This may not seem like a big deal, but the larger the class, the less opportunity students have to get one-on-one interaction with their professors.This may not be important to some pe ople. However, being able to contact their professor with questions or even for tutoring sessions is vital to many people. In fact, being able to have an accessible professor can make the difference in whether or not some students pass or fail. So, one of the great things about choosing these types of establishments are the fact that they promote more student and teacher interaction. Therefore, whenever someone has issues, there's a better chance that those problems will actually be addressed.Another great thing about attending a community college is that it costs much less than the traditional four-year institution. This is extremely important to note, especially now that the cost of education is rising and more people are struggling to stay financially stable. Being able to get a good education at an affordable rate is something that is sometimes hard to come by when people choose to attend traditional colleges. The good news is that the average community college allows people to get a good education without having to pay an arm and a leg.Lastly, another benefit these institutions provide is the ability for students to transfer their course credits to traditional universities. In other words, if someone decided to take this particular route and then one day they decided that they wanted to attend a four-year university, they wouldn't have to feel like they wasted their time. There are many benefits that come along with attending a community college, but many people might not realize it. As the landscape of education continues to change, more and more people are beginning to take this route instead of the traditional path.

Thursday, October 10, 2019

French Revolution: Ultimately a Failure

Liberte, Egalite, and Fraternite were the main principles of the French revolution. However, it was a time where these three ideals would be twisted into nothing more than moral and physical violence. The revolution was ultimately a failure which spun out of control and began to murder itself. The French wanted Freedom from its absolutist ruler, but in turn saw themselves being governed by the devil. These citizens wanted a sense of brotherhood amongst their country, but saw their nation being torn apart by violence.Furthermore, the third estate sought to benefit from a new government that promised equality; however, the result was a further imbalance in an already corrupt society. Ironically, the gruesome reign of terror which was fabricated by the French government, contradicted the ideals of which the very revolution stood for, further illustrating the utter failure of this event. In the beginning, the French saw the revolution as a way to improve their lives, but this path quickl y turned into a horrifying ascent into oblivion, which aside from immense suffering, achieved nothing.During the reign of King Louis XVI and Marie Antoinette, revolutionary ideas flourished through the age of enlightenment. However, Louis made a crucial mistake by aiding the American Revolution; although it was a military success, it was an economic failure. France was bankrupt and the people were starving; they watched as their monarchs, nobles and aristocracy live a life of luxury and wealth while they suffered through poverty, drastically changing how the citizens perceived their monarch. Soon this resentment transformed into pure hatred and nothing could be done to change their minds.Before long the people revolted and Louis’ powers were stripped away, a new man was then put in his place, Robespierre. Maximilien Francois Marie Isidore de Robespierre was a man who had great power and abused it; to some he was â€Å"The Incorruptible†, but in reality was a blood thir sty dictator. As a young man, he studied the law and held a reputation for honesty and compassion. He sought to abolish the death penalty and refused to pronounce a required death sentence after becoming a judge : A victor who kills his captive enemies is called a barbarian!A grown man who kills a child that he could disarm and punish seems to us a monster! An accused man condemned by society is nothing else for it but a defeated and powerless enemy. Before it, he is weaker than a child before a grown man — to erase from the code of the French the blood laws that command judicial murders, and that their morals and their new constitution reject. I want to prove to them: 1- that the death penalty is essentially unjust and, 2- that it isn’t the most repressive of penalties and that it multiplies crimes more than it prevents them.However, as the revolution progressed so did his ideas; he soon became the head of the Jacobin club, a radical group who advocated exile or death for the French nobility. By this time the once soft and kind-hearted man, was now replaced by one who had developed a great love of power along with a reputation of intolerance, self-righteousness and cruelty . Robespierre quickly came to a conclusion that the end would justify the means, and that in order to defend the revolution against those who would destroy it, the shedding of blood was justified.Merlin de Thionville who was a member of several French legislative bodies said commented that: â€Å"In those days so rotten had France become that a bloody mountebank without talent or courage, whose name was Robespierre, made every citizen tremble under his tyranny†. The French now lived under fear and oppression of a man who no longer cared for the people of the revolution but rather the revolution itself. Using his great oratory skills he successfully demanded the execution of the king and queen without fair trial or judgement, saying that â€Å"Louis must die so that the revolution may live†.In January 1973 Louis XVI was executed, followed by his wife ten months later. By his own words he had become a monster, â€Å"A victor who kills his captive enemies is called a barbarian† . A nation cannot be one when the people do not believe in the ideals of the government. The revolution was merely a civil war which pitted citizens against one another. While many people believed in the revolution, they did not accept the extremist ideas of the Jacobins, and for that thousands of ordinary people were targeted and killed.The September Massacres was a subsequent mass killing of prisoners, after news that the Prussian Army had invaded France. On September 3, 1792, crowds of French citizens stormed into the prisons where they attacked prisoners and refractory clergy, regardless of their status as counter revolutionary. An account of this event by Nicolas-Edme Restif illustrates the torture the citizens inflicted on the prisoners who were their †Å"brothers†: There had been a pause in the murders. Something was going on inside. . . . I told myself that it was over at last.Finally, I saw a woman appear, as white as a sheet, being helped by a turnkey. They said to her harshly: â€Å"Shout ‘Vive la nation! ‘† â€Å"No! No! † she said. They made her climb up on a pile of corpses. One of the killers grabbed the turnkey and pushed him away. â€Å"Oh! † exclaimed the ill-fated woman, â€Å"do not harm him! † They repeated that she must shout â€Å"Vive la nation! † With disdain, she refused. Then one of the killers grabbed her, tore away her dress, and ripped open her stomach. She fell, and was finished off by the others. Never could I have imagined such horror. I wanted to run, but my legs gave way.I fainted. When I came to, I saw the bloody head. Someone told me they were going to wash it, curl its hair, stick it on the end of a pike, and carry it past the windows of the Temple . What pointless cruelty! . . The number of active killers who took part in the massacres was about one hundred and fifty. The rest of Paris looked on with fear or approval, and the rest behind closed shutters, signifying the destruction of unity through the people. With a country whose citizens mercilessly killed one another, how could the French have a sense of Fraternite amongst themselves?A Nation is not united under fear and death but rather through peace and prosperity, which was clearly the opposite of the French Revolution. Equality was promised to the third estate, but the revolution did not create a balance. What it did was further upset the structure of society. In turn the first and second estate was removed from power, and the bourgeoisie put in their place. The rest of the third estate which included the peasants and the working class (sans-culottes), were left with nothing: They were the working people, the farmers, the shop owners, the trades people, the artisans, an d even the factory workers.They were among the prominent losers of the first, more subtle revolution. While the middle class and wealthy classes benefitted greatly from the revolution, the sans-culottes saw their livelihoods disappearing and inflation driving them to fight for survival. The sans-culottes and peasants were generally poor and had little power, they could not vote, hold office, or own land because they did not have the means to do so. Since they could not own land, peasants were angry that they had traded one master for another; once again they had found themselves at the bottom of the ladder.The Sans-culottes atoned for this by aligning themselves with the Jacobins. While this alliance gave them a facade of power, they were nothing more than henchmen to a group of radical thinkers who needed people to do their dirty work. However, at the end, many of the Sans-culottes found themselves imprisoned and executed by the very revolutionary tribunals that they had supported. The revolution gave nothing more than an illusion of what the common masses craved; while the first and second estates were gone, a new powerful and cruel organization made up of the bourgeoisie were put in their place.The Reign of Terror was designed to fight the enemies of the revolution; with that in mind the revolution was no longer about freedom, equality and brotherhood, but rather an extremist form of revolutionary ideals. Anyone who had not aligned themselves with the Jacobin rule or had talent and power were seen as a threat to the new revolution, they were subsequently dubbed as traitors and sentenced to the guillotine. For the first time in history, terror became an official government policy, with the intent to use violence to achieve political goals.In the course of this reign the new regime managed to execute thousands of people who were considered as having the potential to stand up or overthrow the government. Through this, scores of influential people were falsely accused. In one particular execution, a woman by the name of Mme Roland uttered the words that have been immortalized by history, â€Å"O Liberty, what crimes are committed in thy name†. She was right, the revolution had abused and committed crimes against not only the idea of liberte, but also of egalite and fraternite.Every person who placed their head upon the guillotine, were there because the three ideals which the revolution stood for were corrupted to support the extremist views of the Jacobins. The modern era has unfolded the shadows of the French revolution. Ultimately this time period did not bring any successes, but rather the opposite. The revolution was purely the product of a few conspiratorial individuals who brainwashed the masses into subverting the old order. The promises of egalite, equalite, and fraternite, were soon lost as violence and bloodshed set in.The French were eager to be free of the constricting class system and absolute monarchy. However, the p eople found themselves under the rule of a man who oppressed the people into an absolute state of obedience. Furthermore, the French wanted a sense of unity throughout their country, but instead resorted to the brutal murders of their own people. Ultimately, this reformation was caused by an upset in the balance of equality amongst the classes. The third estate was promised equal status by the revolution, but in the end only the bourgeoisie emerged victorious.Ironically, the reign of terror distorted the three main ideals for which the revolution stood for. Through the guidance of corrupted leaders, these ideas were washed away in bloodshed. The French revolution is an usurpation of power gone wrong, at the end of this ten year period, nothing was gained, yet everything was lost. The people who once saw this transformation as the answer to an oppressive regime soon realized that had simply set themselves up for a meeting with death.

International Trade and Trade Restrictions

International Trade and Trade Restrictions International Trade and Trade Restrictions International trade increases the number of goods that domestic consumers can choose from, decreases the cost of those goods through increased competition, and allows domestic industries to ship their products abroad. While all of these seem beneficial, free trade is not widely accepted as completely beneficial to all parties and trade restrictions are applied.Trade restrictions can be in the form of tariffs, which are taxes on imports; quotas, which are limits on the quantity of a particular good that can be imported or exported; or other trade restrictions. International trade efficiencies, trade restrictions, and the consequences of these restrictions will be discussed further.World trade offers many advantages to the trading countries: access to markets around the world, lower cost through economies of scale, the opportunity to utilize abundant resources, better access to information about marke ts and technology, improved quality honed by competitive pressure, and lower prices for consumers (McEachern, 2012, p. 733). Comparative advantage, specialization, and trade allow people to use their scarce resources most efficiently to satisfy their unlimited wants.Comparative Advantage is the ability to make something at a lower opportunity cost than other producers face (McEachern, 2012, p. 32). The ability to make a good at a lower opportunity cost gives that individual, firm, region, or country a comparative advantage. Even if a country has absolute advantage in all goods, they should specialize in producing the goods in which it has a comparative advantage. If each country specializes and trades according to the law of comparative advantage, everyone would benefit from greater consumption possibilities.McEachern provides three reasons for international specialization: countries having different resource endowments, greater economies of scale can be achieved when firms particip ate in international trade, and tastes differ from country to country (McEachern, 2013, p. 719-720). Every country has a comparative advantage in the production of some products. This means that the labor and capital resources available in the reason are more productive when focused towards a particular industry and thus are able to be produce that product better as a result.In the case of the textile industry, Pakistan enjoys a comparative advantage as it has many cotton fields, providing it direct access to the raw material for the industry. It further has been operating in that industry for a long time that has spawned a lot of trained workforce relating to that industry in the country. Therefore, law of comparative advantage dictates that it should produce textile materials. The World Trade Organization (WTO) is the only global international organization dealing with the rules of trade between nations (WTO, 2012).Their goal is to help producers of goods and services, exporters, and importers conduct their business. The WTO and agreements such as NAFTA open up free trade, allowing goods to move freely and thereby aiding consumers in various countries in terms of prices and quality. It also spawns healthy competition in the local industries. Trade restrictions can lead to a breakdown in competition and can lead to adverse effects in the local and international market. Restrictions can benefit certain domestic producers that lobby their government for benefits.Congress tends to support the group that fights back, so trade restrictions often persist, despite the clear and widespread gains from freer trade. For example, U. S. growers of sugar cane have been protected from imports, which results in an increase in U. S. sugar prices. Higher prices hurt domestic consumers, but they are usually unaware. As McEachern states, â€Å"Consumers remain largely oblivious. † Who is responsible for trade ethics? Government might be the initial answer but all constitu ents involved should be aware and be transparent. An example is Nike, Inc.They provid a statement in understanding how to change the way an industry views its labor force. It does not happy by monitoring factories alone. Monitoring reveals the issues, issues that in turn are locked into a complex web of root causes. The ability to address these root causes should be shared by many, owned by no single constituent (Nike, Inc. , 2013, p. 1). One of their strategies is to transform working relationships with their contracted factories to incentivize change that will benefit workers. Are trade restrictions effective? Trade protection can foster inefficiencies.The immediate cost of such restrictions includes not only the welfare loss from higher domestic prices but also the cost of resources used by domestic producer groups to secure the favored protection (McEachern, 2012, p. 732). These costs may become permanent if the industry never realizes the economies of scale and never becomes co mpetitive. Protecting one stage of production usually requires protecting downstream stages of production as well. The biggest problem with imposing trade restrictions are that other countries usually retaliate which shrinks the gains from trade.Some experts believe the costs of protecting the jobs of workers in vulnerable industries, which are ultimately borne by taxpayers or consumers, far exceed the potential cost of retraining and finding new jobs for those workers (Globalization 101, 202, para. 1). In addition, that it may not promote firms and industries to make necessary changes to challenge foreign competition and find efficiencies to which then would make them become even more dependent on government protection. As international trade has increased, conflicts over trade have also increased.Trade restrictions may continue to be very political in nature. The more companies like Nike and consumers start being more aware of ethical behavior around international trade, the more everyone will benefit. The U. S. government does take responsibility for workers who lose their jobs by international trade and have programs established to assist in training and support to re-employ those workers. As countries specialize and trade according to the law of comparative advantage, consumers should also benefit from efficient production and cheaper prices.The increase of technology may have an impact that will increase the speed at which international trade and efficiencies happen. References McEachern, W. A. (2012). Economics, 9e (9th ed). Mason, OH: South-Western. Globalization 101 (2013). The Levin Insitute. Consequences of trade restrictions. thttp://www. globalization101. org/consequences-of-trade-restrictions/ Nike, Inc. (2013). Responsibility. Targets and performance. http://www. nikeresponsibility. com/report/content/chapter/targets-and-performance#Labor World Trade Organization (2013). http://www. wto. org/english/thewto_e/whatis_e/whatis_e. htm

Wednesday, October 9, 2019

Problem of Evil Essay Example | Topics and Well Written Essays - 1000 words

Problem of Evil - Essay Example The question is viewed in the angle that if God has all the power and ability he is said to have, why is he not capable of preventing all the evil that affects the well-being of people. Furthermore, a group of people that tend to question the existence of God asks if he is truly morally perfect; and if he is, why does not he do anything in relation to controlling the bad things that happen. These questions conflict with the firm belief of the orthodox theist. The theist believes there is a perfect God who is in control of everything that happens in this world (Michael 324). The other significant issue employed in the logical problem argument is that it is impossible for some of the statements to be true. One such statement indicates that God is omnipotent. This statement simply means that God is all-powerful (Michael 324). The other statement that cause question is that God is omniscient (Michael 324). This statement means that God is all-knowing. Moreover, another statement that ten ds to raise various questions states that God is perfectly good (Michael 324). The final statement that develops various questions on this issue is that evil exists. Some people in the society support the above statements, but they tend to raise various contradictions in relation to the logical problem argument (Michael 326). ... This is because he would have the power of controlling them. The other contradiction that emerges states that if God is perfectly good, he is supposed to play a crucial role in making sure that people he created do not suffer. This simply means that he would not allow any evil to happen. Moreover, the other contradiction states that, if evil truly exists, there is a high probability to the claim that the abovementioned statements are not true. This means that God is not omnipotent, omniscient, or perfectly good. On the other hand, theists argue that people perform evil because they choose to do so on the basis of the free will inherent in them; and, as God needs people to love him – that is, to do good in his name – on the basis of their free choice, he does not force does them to do good – he does not need robots. So, universe and humans have been created as good by God; afterwards, it was the free will that, having chosen to disobey God, brought evil into man a nd the world. The Evidential Argument The evidential argument supports the fact there is some known evidence of evil that truly indicates that God does not exist (Rowe & Nick 163). However, unlike the logical argument based on the contradiction between the existence of evil and the existence of God, evidential argument takes a different move. The argument tries to demonstrate there might be no God considering the existence of various forms and kinds of evil (Rowe & Nick 166). Moreover, the evidential argument takes into consideration for how long evil has been happening on the Earth. Various issues related to evil illustrate there are things beyond human control (Murray n.p). This means that human beings perform unacceptable things, and they are