.

Thursday, November 28, 2019

Case For Legalizing Marijuana Essays - Herbalism, Medicinal Plants

Case for Legalizing Marijuana What Is Marijuana? Marijuana, a drug obtained from dried and crumpled parts of the ubiquitous hemp plant Canabis sativa (or Cannabis indica). Smoked by rolling in tobacco paper or placing in a pipe. It is also otherwise consumed worldwide by an estimated 200,000,000 persons for pleasure, an escape from reality, or relaxation. Marijuana is known by a variety of names such as kif (Morocco), dagga (South Africa), and bhang (India). Common in the United States, marijuana is called pot, grass, weed, Mary Jane, bones, etc. The main active principle of cannabis is tetrahydrocannabinol. The potency of its various forms ranges from a weak drink consumed in India to the highly potent hashish. The following consists of pure cannabis resin. Marijuana is not a narcotic and is not mentally or physically addicting drug. One can use mild cannabis preparations such as marijuana in small amounts for years without physical or mental deterioration. Marijuana serves to diminish inhibitions and acts as an euphoriant. Only once in a while will it produce actual hallucinations. More potent preparations of cannabis such as hashish can induce psychedelic experiences identical to those observed after ingestion of potent hallucinogens such as LSD. Some who smoke marijuana feel no effects; others feel relaxed and sociable, tend to laugh a great deal, and have a profound loss of the sense of time. Characteristically, those under the influence of marijuana show incoordination and impaired ability to perform skilled acts. Still others experience a wide range of emotions including feelings of perception, fear, insanity, happiness, love and anger. Although marijuana is not addicting, it may be habituating. The individual may become psychologically rather than physically dependent on the drug. Legalization Of Marijuana Those who urge the legalization of marijuana maintain the drug is entirely safe. The available data suggested, this is not so, Marijuana occasionally produces acute panic reactions or even transient psychoses. Furthermore, a person driving under the influence of marijuana is a danger to themselves and others. If smoked heavily and a great deal of consistency, its use has been clearly associated with mental breakdown. In many persons who smoke chronically, the drug reinforces passivity and reduces goal-directed, constructive activity. The chronic use of pure resin (hashish) has been associated both with mental deterioration and criminality. One of the major complications of marijuana use is the tendency on the part of some users to progress to more dangerous drugs. Users in economically deprived areas usually go on to heroin, whereas more affluent individuals tend to move from marijuana to more potent hallucinogens such as LSD. There is no established medical use for marijuana or any other cannabis preparation. In the United States, its use is a crime and the laws governing marijuana are similar to those regulating heroin. Many authorities now urge that the laws be modified to mitigate the penalties relating to conviction on marijuana possession charges. The Case For Legalizing Marijuana Use The United States stands apart from many nations in its deep respect for the individual. The strong belief in personal freedom appears early in the nation's history. The Declaration of Independence speaks of every citizen's right to "life, liberty, and the pursuit of happiness." The Constitution and Bill of Rights go further, making specific guarantees. They forbid the government to make unwarranted entry into dwelling places. They forbid seizure of personal property, except when very clear reasons are approved by the courts. They allow every citizen to remain silent in court when accused of a crime. Legal decisions have extended these rights, so that every citizen may feel safe, secure, and sheltered from public view in the privacy of his or her home. The Right To Privacy In recent years, Americans have referred to privacy as one of the basic human rights, something to be claimed by anyone, anywhere. United States citizens feel strongly about this and often tell other countries that they must honor their people's claims to privacy and personal freedom. Foreign leaders often disagree. They resent what they deem arrogant meddling by the United States. Leaders of the Soviet Union, for example, regard individual privacy as trivial when compared to the needs of the state. If the United States is

Sunday, November 24, 2019

Jesus and Muhammad, How they lived their lives

Jesus and Muhammad, How they lived their lives Free Online Research Papers Jesus and Mohammed are the central icons of the largest religions in the world. These are Christianity and Islam. These two icons have influenced the live of more people in the last two thousand years than any other icons to follow. Both of these icons are highly regarded and have influenced many lives. In this paper I plan to show the difference between these two icons and the similarities, and show how they have influenced the lives they have touched. This paper will also trace the historic lives and compare each of their death and the impact this had on each of there religions. This paper will also show how their lives have been applied to today’s world. Jesus was born in Bethlehem sometime between 8 BC and 29 AD. Many Christians believe that Jesus was conceived divinely by the Virgin Mary, although she was married to Joseph the carpenter at the time of Jesus’ birth. There is not much known about his early life, except that he may have been trained to be a carpenter as well. Mohammed is believed to have been born almost 600 years later in the town of Mecca. This is where the Prophet Muhammad was born. Both of these events are believed to have changed the course of history for every human mankind. Much of the early life of Jesus Christ is a mystery to many people. The enormous amount of information on or about Jesus’ life is found in the four gospels of the New Testament in the bible. At the age of 12 Jesus was seen in the temple talking with, listening and teaching many men. It was then that Jesus declared that he was the son of God with a divine purpose here on earth. Jesus at this point in his life lived a traditional Jewish life as a carpenter. (Jesus-Institute, 2006). At the age of 30, Jesus was baptized and recognized by John the Baptist; it was not that he began his earthly ministry (Fisher, 2005). The main points of Jesus’ teaching were that God loves everyone and is always with you. He also wanted everyone to know to love one another, to learn the value of each other that the kingdom of God had come to earth, the reality of judgment to heaven or hell and that God forgives those who speak to him. (Jesus-Institue, 2006). One aspect of Jesus’ teachi ngs, that brought some attention to him, was that he was the son of God sent to Earth to redeem human mankind. This was in direct violation of the Jewish law. For this he was condemned to die. Jesus was put to executed by Pontius Pilate, the governor of ludaea province between CE 26 and 26, some have attempted to date his crucifixion from a possible Crucifixion eclipse, most calculate possible years that the spring full mono could have fallen on a Friday. Jesus is believed to have been risen from the dead by God on the third day. Many of the specific dates of Jesus’ life involve guesswork. When comparing Christianity and Islam, the historical details of Jesus’ life are essential. The earliest records of Jesus are the four Gospel narratives, which were written by Jesus’ followers within the few decades of his death. In the Gospels Jesus repeatedly suggest to his disciples that his end is near, asking them to share bread and wine in his remembrance. On this evening Jesus also predicts that one of his followers would betray him, which is met with astonishment and denial. Jesus was betrayed by Judas, one of is disciples and possibly the group treasurer. Judas led Roman soldiers to Jesus for 30 pieces of silver. Jesus was arrested, and Peter defended his master with a sword slicing off the ear of a centurion. He was reprimanded by Jesus and told to put back your sword and for all who draw the sword would die by the sword. Jesus was brutally beaten, clothed in a mock-royal purple robe and crown of thorns. He then was crucified. This method of execution, entailed nailing or tying the victim’s hands and feet to a wooden cross, and was a slow painful death of asphyxiation. Jesus’ body was taken down from the cross by Joseph of Arimathea, and placed in a tomb carved into rock. Jesus’ mother and one or two other women were the only ones present during this. The same women came to the tomb every Sunday morning to anoint his body with spices. One day they arrived and the tomb had been emptied and rolled away. Later it is believed that Jesus arose from the dead. This belief that Jesus had resurrected makes it possible for people to have peace with God in his life and meet with a favorable end. Many followers believe when they pass on they move to be with God. Today worship of Jesus’ is very similar as it was back when he was still on earth. Many people believe they can go to church and talk to God and Jesus. And many believe that they can be forgiven of their sins by simply talking to them. Today the word of God and Jesus’ is spoken through many ways. By reading the bible, by going to church and listening to a Priest, or by just believing in the words he has given us in the bible and repenting. Muhammad is believed to have been born in the year 570 in the town of Mecca, a mountain town in the desert plateau of western Arabia. His name was given from the Arabic verb Hamada, meaning â€Å"to praise†. He was the first son of Abd Allah bin Al-muttalib and Amina bint Wahb. Abd Allah died before Muhammad’s birth and Muhammad was raised by only his mother. His mother kept up with the Meccan tradition and entrusted her son at an early age to a wet nurse named Halima from the Nomadic tribe of the Sa’d Ibn Bakr. Muhammad grew up in the hill country, and learned their pure Arabic traditions. Muhammad was five or six when his mother took him to Yathrib, and oasis town a few hundred miles north of Mecca, to stay with her relatives. On the journey back to Mecca his mother fell ill and died. She was buried in the village of Abwa on the Mecca-median Road. Halima, his nurse, returned to Mecca with the orphaned Muhammad and placed him in the protection of his paternal grandfather, Abdul Al-Muttalib. Inthis man’s care, Muhammad learned the rudiments of the statecraft. Mecca swas Arabia’s most important pilgrimage center and Abdul was its most respected leader. Muhammad’s grandfather passed away in 578 when Muhammad was about the age of eight. Muhammad was then passed to his paternal uncle Abu Talib. Muhammad grew up in the older man’s home and remained under his protection for many years. When Muhammad grew up he worked as a shepherd to help pay his keep. His uncle lived by modest means, and needed the help on there farm. In his early twenties, Muhammad entered the service of a wealthy Meccan merchant, a widow named Khadija bing Khawalayd. The two were distant cousins. Muhammad worked by carrying her good to the north and returned with her profit. Muhammad was proposed marriage by Khadija. They were wed in about 595, when she was nearly forty. Muhammad continued the managing of the business affairs, and their next years were happy and pleasant. In the next couple of years Muhammad began to make long retreats to a mountain cave outside of town. There he fasted and meditated. On one occasion, after a number of indistinct visionary experiences, Muhammad was visited by an overpowering presence and instructed to recite the words of such beauty and force that he and others gradually attributed them to God. This experience shook Muhammad to the core. Several years passed and he decided to talk to his family about this experience. After, several of these experiences, Muhammad finally began to reveal the messages he was receiving to his tribe. These were gathered verse by verse and later would become the Qur’an, Islam’s sacred scripture. In the next decade, Muhammad and his followers were first belittled and ridiculed, then persecuted and physically attacked for departing from the traditional Mecca way. Muhammad’s message was resolutely monotheistic. For several years, the Quaraysh, Mecca’s dominate trib e, levied a ban on trade with Muhammad’s people. Finally the leaders of Mecca attempted to assassinate Muhammad. In 622, Muhammad and his few hundred followers left Mecca and traveled to Yathrib, the oasis town were his father was laid to rest. The leaders were suffering through a vicious war, and they had invited Muhammad for his wisdom, to become their mediator. Yahtrib soon became known as Medina, the city of the Prophet. Muhammad stayed here for the next six years. He built the first Muslim community and gradually gathered more and more people to follow his preaching. In 630, Muhammad and his followers marched on Mecca and were joined by tribe after tribe along the way. They entered Mecca without any bloodshed, and the Meccans, joined them. Muhammad returned to live in Medina. In the next three years, he consolidated most of the Arabian Peninsula under Islam. In 632, he returned to Mecca one last time to perform a pilgrimage, and tens of thousands of Muslims joined him. After the pilgrimage, he returned to Medina. Three months later on June 8, 632 Muhammad passed away. His word lived on and spread as far as Morocco, France and Spain. Muhammad and Jesus had the same visions. They believed in their teaching, beliefs and values. The both mad pilgrimages to other parts of there land and tried to make people see what they believed in. In most of their teaching the beliefs were the same. Muhammad died of natural causes, Jesus died for us to be free of sins. They both traveled and tried to make there words known throughout many lands. REFERENCES Peter Schfer. (MARCH 2008). WWW.RELIGIONFACTS.COM. In LIFE OF JESUS. pbs.org/muhammad/timeline_html.shtml Research Papers on Jesus and Muhammad, How they lived their livesComparison: Letter from Birmingham and CritoCanaanite Influence on the Early Israelite ReligionCapital PunishmentPersonal Experience with Teen PregnancyHip-Hop is ArtMind TravelQuebec and CanadaThe Spring and Autumn19 Century Society: A Deeply Divided EraThree Concepts of Psychodynamic

Thursday, November 21, 2019

American History Essay Example | Topics and Well Written Essays - 750 words - 10

American History - Essay Example omacy, the text talks about the differences between the people of the North and those of the South, which we are told that can be traced back in the early settlements of the English in the North American region. The writers says that the societies that were found in the two colonies developed in a very different way that any visitor from Europe saw the difference and did not fail to give comments about it. The Southern region was nearly whole rural and also agricultural with very few towns. In addition, the region was under the political and social dominance of the great planters of tobacco possessed large tracts of land together with several slaves (p259). On the other hand, the people of the North were definitely farmers too, even though they practiced it in small scale. It was mainly done on subsistence basis by the family members or a few slaves or servants were used by those who were most successful or affluent. Contrary to the Southern region, the Northern region has three large cities called Boston, New York, and Philadelphia, as well as several other beautiful and lively towns that were large as compared to all those that were found in the Southern region, except for Charleston. Nevertheless, the cultural and social norms, from Pennsylvania north were characterized by businessmen that ranged from the merchant princes who were involved in the seaborne trade to artisans, struggling middlemen and retailers who purchased and sold goods produced from the farms together with some other goods that were produced within the cities or even overseas (p260). The Northerners were capitalists, whereby the basis of its economy was on the fact that everything was valued in terms of money, and its tradition became more and more based on wealth acquisition. The people of the south who were mainly farmers and considered themselves as aristocrat who had the duty to look after a society that had its basis on individual relationships regarded the people of the North as being

Wednesday, November 20, 2019

Summary Essay Example | Topics and Well Written Essays - 500 words - 55

Summary - Essay Example It is argued secondly that hope is caused by merits, and therefore doesn’t qualify as a virtue. However, Aquinas contends that the occurrence of hope in itself is not based on merits but instead on the desire for happiness, which is virtuous. The last stated problem with hope being a virtue is the imperfect nature of hope, explained as a wish for something that is lacking. Aquinas states that while the desire is imperfect, hope is perfection in that it is reflective of faith in God’s rule and influence. The second article questions if eternal happiness is indeed the object of hope. Objections include denial that humans need to hope for eternal happiness since it is a constant state of the soul, examples of hope being for things other than eternal happiness, and the suggestion that hope deals with many difficulties other than eternal happiness. The replies to these issues state that eternal happiness is veiled and thus not experienced as a constant state by humans, prayers should not be for things other than eternal happiness, and all other desires should seem small in comparison to eternal happiness. In article three, Aquinas discusses the possibility of one person wishing for the eternal happiness of another. He argues that this is not possible since hopes for another person are not acts of hope at all, but are instead acts of love. Article four investigates the lawfulness of being hopeful in another person. The author’s position is that hope may be placed in a person as long as it is not believed to be virtuous hope, which is reserved for God. Discussion of the fifth article is very similar to the first. In response to arguments against the nature of hope as a theological virtue, Aquinas relates several examples that are meant to relate hope as being divinely based regardless of its superficial appearance. The distinction of hope from other theological virtues is the topic of article six. It is suggested that this

Sunday, November 17, 2019

Accounting Information Is Produced Only For Its User Essay - 1

Accounting Information Is Produced Only For Its User - Essay Example Managerial accounting is the division of accounting contemplation and study that deals with presenting knowledge that helps decision makers to lead to some conclusion within the organisation, correlated to the consumption of goods and utilization of enterprise favourable possibilities.It ought to be highlighted that the precincts of managerial accounting are not fixed. Managerial accounting, in general with financial accounting has an attention on the enterprise and its actions. It varies from financial accounting only in terms of verdict makers whose decision criteria are usually changed from those offered by financial accounting. Additionally, several decision models that have developed for use by organisation and in support of which accountants deliver the essential accounting information inputs have been developed under this regulation of professional economics and professional business. (Hussey, 1999, pp 45-46) These decision representations are commonly expressed as component o f managerial accounting as it is obligatory to be aware of organisation resolution models in order to provide information that is appropriate for the decision.At last, it is becoming extensively accepted that business institutes manage by the synchronised hard work of individuals. Therefore, achievement of majority of management judgments centres on fascinating the human beings concerned to perform their tasks in a way most dependable with the intention of the result. The learning of the relations of people working in the enterprise has for a short time been imperative for the creation of management accounting structure. From the time when the tools for such types of study have been introduced in the behavioural sciences, the accounting discipline has eternally wrung the behavioural sciences as a basis for enhanced study and training. Long-run Management Decisions and Related Accounting Information Setting the long-term income target, the long-run attainment of the activity depends upon the management's capability to recognize and put into practice the most capable programs, product lines and schemes within the organisation's abilities and its ecological and money-capital restrictions. The initial need to accomplishment is dynamic searching of possibilities, either to offer latest and improved services or goods or to build up recent and enhanced means of manufacturing. The previous necessitate contribution, at least at some nominal stage, in research into current advertise and user predilection, together with product advancement research. The later requires minimum association with business engineering plus behavioural, managerial, and institutional examination. These all are basically knowledge-getting actions put in by experts excluding accountants. The involvement of accountants move towards into participates in another important key to long-run achievement of the enterprise -the picking of the most competent set from amongst the well-known substitutes. Capital-Budgeting Decisions: The critical aspect of long-run substitutes is that they generally entail substantial preliminary expenses of the enterprise's partial money resources for functioning. Introductory outlays comprise costs for such stuff like long-standing assets to be employed in the program, official fees, and extra expenses of organisational and developmental exploration. More than numerous upcoming periods, allied supplementary expenditures are requisite to construct benefits in the form of ready money or cut down overall outlays than the

Friday, November 15, 2019

Literature Review on Mobile Banking

Literature Review on Mobile Banking Mobile banking is defined as a provision and availment of mobile and bank services by using telecommunication device, the services may include keep in contact with bank to administer account and access customized information (Tiwari and Bus, 2007) Mobile banking is a channel through which a customer can interact with bank through device such as mobile and PDA ( Tommi Laukkanen, Suvi Sinkkonen, Marke Kivijà ¤rvi, Pekka Laukkanen, 2007). Mobile banking is seen as an extension to the payment system of bank which enables mobile network to extend its services in reach of customer (Gavin Troy Krugel, 2007) Mobile banking help customer to access their banks anytime. Through mobile banking application customer can check their account details, transfer money transitions, and can pay their bills while sitting at home and offices. (Infogile Technologies, August 2007) The continuous development and usage of mobile make people to become in habit for it and this force companies to come up with new mobile services. Some studies shows that the transaction through mobile is more secure than a connection through internet on pc. But some studies go against it and showed the security a major challenge for mobile banking (Tommi Laukkanen, Suvi Sinkkonen, Marke Kivijà ¤rvi Pekka Laukkanen, 2007). Some factors which nourished the mobile banking and due to which the need of mobile banking is felt are the economic development (globalization is leading to mobility), high density of mobile devices, powerful devices, high data transfer, attitude of new generation towards the use of mobile banking the need and wish for mobility is increased. Features of mobile banking includes its available anywhere, anytime, instant connectivity, pro active functionality (push and pull technology), easy access (simple authentication) ( Tiwari and Bus, 2008). Mobile banking can provide location based services as compared to banks. Mobile banking is more secure than internet, it not only provide traditional bank services but also 3A services (anywhere, anytime and anyhow).As mobile banking is more convenient, effective and efficient which help to attract more customer (Jin, Nie, Xianling, Hu, 2008) Banking services, delivered by means of mobile phone Informational services: report on any type of transactions to mobile phone Payment services, based on mobile phone Mobile banking can be based on different technologies SMS, WAP, GPRS/Edge/3G(Eddy Cormon,2009) The difference between internet banking (e-banking) and mobile banking (m-banking) is that through internet bank account information is access by pc or off the mobile and through mobile banking account information is accessed by its two channels either via SMS or browser and by using mobile banking in advance era a customer get SMS alert of changes in account (Bankable Frontier Associates, 2008). Mobile banking is area in which the development can flourish and can lead to replace credit/debit card. In past 2 to 3 years mobile banking advance itself to the extent that it increase three times if we go on comparison with debit/credit cards banking (Mahesh .K. harma , Ritvik Dubey, 2009) Mobile Banking: Use of mobile device to connect to a financial institution to conduct customer self-service (CCS) includes viewing account balance, transferring funds between the accounts, paying bills or receiving accounting alerts. Mobile Payments: Use of a mobile device to make a purchase or other pay ment-related transaction. Payments initiated in physical or virtual worlds, and can be conducted via SMS, MMS, mobile Internet, downloadable application, and NFC chips.(Breffni McGuire and Marianne Crowe, 2008 ) From the last ten years technology has been evolving itself by inclusion or replacement of other technologies coming through as the day pass. This technology development has a great impact on banking industry. On the other hand the services of banking is also go through many changes starting from early eighties when telephone banking and computer banking took a lead and moved towards ATM and internet banking applications. As the electronic banking was on its peak along with it change bring in mobile technologies as well including SMS, WAP, 3G and 4G technologies (Tommi Laukkanen, Suvi Sinkkonen, Marke Kivijà ¤rvi Pekka Laukkanen, 2007). The population of Pakistan is exceed to 170 million but unfortunately there are approximately 16 million bank accounts and left behind 110 million people are without access to banks. The main focus of mobile banking is rural area, where people have 2500 branches of banks for 105 million people and 42000 subscribers per branch, Whereas mobile phone users are reached to 97 million. So that Pakistan was a good market for Mobile Banking begning. (CGAP, February 2010) In Pakistan mobile banking is emerged and famous by the name of branchless banking. After the struggle of five years from 2005 to 2010 now Pakistan is able to make their people dreams come true and mobile banking is now on its success way. Back to march 2007 first time the policy and regulatory paper was issued by SBP on a base of branchless banking (which can provide the financial services to the people who are underserved or unbanked). (CGAP, February 2010) Financial institutions were reluctant to make such huge and risky initial investment. SBP insist on implementation of mobile banking and advice Financial Institution and Banks to process the work flow of mobile banking otherwise the that would be permitted to the MNOs (Mobile Network Operators) to start their own. SBP take step with Ministry of information technology (MOIT) and Tameer bank. In 2009, Telenor has launched easypaisa( First Mobile banking Platform) with the help of Tameer Bank (A microfinance bank mostly owned by Telenor). In 2010 MCB, UBL and Allied Bank has implemented the mobile banking and making it more profitable for banks and customers as well. (CGAP, February 2010) Benefits to Customer: Customer can access his/her account by sitting at home. he/she dont need to at the counter of bank and answer the various questions of officers. Mobile banking is time saving. Mobile banking keep informing customers about his/her bank account all the time anywhere. Utility payments can be done through M-payment customers donot need to get in line and wait for his/her turn ( Uppal, 6 jan 2010). Benefits to Bank: By reduction of transaction cost, banks can save big money as Government gain is Rs.12 or Rs.13out of every 100 rupees, through mobile banking this cost reduce to Rs. 2 Time saved by the bank through mobile banking can be utilize in expansion of business, marketing and sale activities etc Banks can be benefited in a way by getting commission from cellular companies for providing services through ATM i-e prepaid talk time Those banks that are providing these services have a competitive advantage over those who are not providing it (Uppal, 6 jan 2010). MODELS: According to the policy paper issued on regulatory frame work of mobile banking by SBP there is only bank led model allowed. Non-bank model will only be allowed afterwards when players included in system get that much mature to have a limited control on a system. Bank- led model can be implemented by joint venture of Bank and cellular companies (SBP, 2007). Mobile banking can be implemented by using One- to-One Model, One-to-many and many-to-many model (SBP, 2007). One-to-one Model: In this model only one bank gets in agreement with a telecom company to provide mobile banking services to the customer. The scope is limited because the services is specific to one telco customers but good service standard, greater customization and opportunity of Co-branding and Co-marketing (SBP, 2007). One-to-many model: In this model a bank is in agreement with many telecom companies and provides service of mobile banking to their customers and everybody who has mobile phone can reach to the mobile banking service. There are several drawbacks of this model one is the telco cannot prioritize the mobile banking SMS services in order to provide quick transactions, secondly financial institution has to bear all expense related to advert/marketing, lastly bank is responsible for the arrangement of product distribution and cash inflows and outflows (SBP, 2007). Many-to-many Model; In this model many banks interact with many telecom companies in order to provide services to all those customers who have bank accounts. System leads under this model require a central transaction processing system which is handled by a financial institution or a third party who had an agreement with bank. Transaction processing system must be responsible for provision of real time service, having all proves of transactions and provide daily basis reconciliation to the account holder. This model has minimum limitation and gives maximum connectivity to its customer like an ATM which can be use by the consumer for initiating another bank transaction (SBP, 2007). In 1997 Nokia, Motorola, Ericson and phone.com came together to have a one platform for WAP application because they believed that it is critical to have a uniform standard for implementation of wireless internet universally. From that time 350 more companies join them for WAP (o.o.obe and V.F balogun, 2007). Mobile banking can be implemented through companies other than telco such as fuel distribution companies, Pakistan post, chain stores etc by using technologies of mobiles and pc (SBP, 2007). According to the research, number of those people who doesnt have bank account are 4 billion in this world which is more than two third of world population consist of low and middle income countries. In Pakistan the ratio of financial outflow is even higher than inflow, the increase of inflows is become the critical component which lead to country economic development. Mostly developing countries had implemented mobile banking such as Kenya, south Africa, Philippines, Cambodia. (Syed Salim Raza, 2010) In Kenya mobile banking is implemented by largest mobile service provider, Safaricom and launched M-PESA in 2007. With the increase of 10000 subscriptions per day, Kenya has now 7 million clients out of 38 million people. Kenya provides services of depositing and transfer of money, in order to operate M-PESA 10000 agent was hired. M-PESA is usful for those area where there is hard to reach to banks. According to study the income of Kenyan is increase to 30% since they had started mobile banking. (Syed Salim Raza, 2010) Philippines were the first user of mobile banking is ASIA. The central bank of Philippines (BSP) has taken step towards opening of mobile banking. Further than mobile banking is supported by two biggest mobile network operators in Philippines, Global and Smart. The services provided by the smart is smart money having 2.5 million out of 39 million subscriber and 1.2 million subscriber of Gcash services out of 23 million by Global. According to BPS, through traditional way customer was charge 2.5 or 5 % of remittances but in mobile banking this cost only less than 2% and Philippians are now charge US$ 50. (Syed Salim Raza, 2010). Mobile banking working based on its four constituent MNO, Banks, user applications, customers. These participant help to translate the transaction initiated from customer to the format which can be understood by banking system. For the implementation of mobile banking bank use its core infrastructure with some advancement in which a user is authenticated (usually a pin) through a platform usually a phone and a server, information is extracted from a user and pass it on to the bank then bank have set of processes for a transaction once the application is done with financial transaction it is switch back to the user by an acknowledgement usually in a form of bank account reconciliation (Gavin Troy Krugel, 2007). The technology use in mobile banking can be categories in two environments, technologies at server side and technologies at customer side. SMS, IVR, USSD2 and WAP are server side technologies, on the other hand consumer side technologies includes applications, solution and offer which is set in SIM or in user mobile such as [emailprotected] and J2ME (Java) (Gavin Troy Krugel, 2007). According to the study there are different challenges faced by the mobile banking discussed by different author which relate to mobile banking through different prospects. Uniform standard is one of the most important challenge as there are many devices of different service providers and vendors are indulge. There are no uniform regulation had made for those electronic devices to work on one platform. Network security (unauthorized access), customer privacy, and clearance of liability on customer side as they go for loan because through mobile banking the subscriber has virtual account and there is financial risk involve in it. A challenge of wireless carriers and financial institution dispute, both have different responsibility with respect to mobile transaction. (VENABLE, LLP, November, 2008). The lack of interoperability among mobile operators has limited the access of mobile payment (Kopicki and Miller, 2008). Some of the challenges which include profitability, can be generated b y the initial payment paid by the customer for initiating a transaction. Which would be paid by the customer if the offer of mobile banking seems attractive to him, if its not does so then the initial cost of banks would be a sunk cost. Interoperability, regulatory issues and security are major constraints. (Ref: Upkar Varshney, December 2002). Financial loss seems more fearful for a customer because something passing in air is not that much secure than physical transaction. Privacy risk which relate to the theft of private information. There are many uncertainties related to customer for example they think that they may not make mistake while doing financial transaction through mobile. The loss of connection which left the transaction incomplete make customer hesitated for usage of mobile for its financial transaction. Ref: (Tommi Laukkanen, Suvi Sinkkonen, Marke Kivijà ¤rvi, Pekka Laukkanen, 2007). The introduction of GSM technology helped to boost the idea and implementation of mobile banking in Nigeria. Some of the challenges faced by the Nigeria are sustainability of of growth and progress, requisition of funds for marketing of mobile banking, development of promotion of IT, Security and privacy issues, Middleware issues devices, network and protocol limitation, different standards (o.o.obe and V.F balogun, 2007) As mobile banking is a new concept that will bring some challenges and issues as well, if these issues are solved adequately it will proved to be more benefited than other technologies. Some issues including awareness about mobile banking which cover rural and urban areas, the extent of resolving the issue of security and privacy these issues can be handled very carefully and effectively but the need to take an eye of interest (uppal, 2010) According to the survey more than 60% of users are worried about security of personal data and password protection while using mobile banking as mobile phone encryption ability is limited as compare to personal computer because of which the mobile cannot meet the demand of financial security. Various threats such as cloning and use of magic cards in advance era make mobile unprotected. The applications of new technologies make the bank to keep on changing the competition rule in banking industry. The most competitive challenge is how to provide the banking services to the customer which is more convenient to them, awareness among people would be a catalyst but also upgrade the business innovation and based on these services the mobile banking is the future (Zhong Wan, Weifeng Yin and Ronggao Sun, 2009). Issues in mobile banking are demonstrated as there are large numbers of people who do not have bank accounts especially in rural areas, due to unawareness and distant factor the people dont know about banking. There are policies, regulatory and legal, financial, security from malicious viruses, spam and malware attacks, information transfer (privacy of individual) and consumer protection, information disclosure on tariffs and services, data security, technical issues which need to be tackle. While introducing various applications for mobiles such as WAP based solutions create difficulty in uniform standards. Standards need to be address security and privacy concerns of customer as well as to promote the interoperability between different implementations. Revenue sharing agreement is another major issue between service provider, banks, content providers, other service provider such as utilities, retailer (Sanjeev Banzal, 2008). Challenges faced by the bank during implementation of mobile banking in Bangladesh are, Difficulty in selection of right software, Huge Investment in purchasing the Software, License, inability to do interbank transaction as the national payment switch is not in place. Handling huge agent network to deliver and receive cash over the counter. Challenges for mobile operator includes, sharing network with multiple Banks and Operator, technical limitation to access other banks, breaches in data privacy, accounting errors, or fraudulent transactions could expose an operator to large liabilities and serious reputation damage, The complex delivery of financial services could distract management from its core communications business, perhaps stretching the abilities of smaller mobile operators, Additional Investment in Solutions. Challenges faced by solution providers are, most of the solution are telco led so bank do not feel safe, Huge Investment from their part as most of the Bank wants t o share revenue, Some of the Banks are also not ready in terms of core banking or infrastructure for mobile baking solution. Challenges faced by government are prepare a proper guideline for the Mobile Banking system, maintaining track of all the financial transaction, setà ¢Ã¢â€š ¬Ã‚ up a list of services and there charges for all the mobile Banking service, Ensuring the compatibility of the software in Bank Led Model, Allow Interà ¢Ã¢â€š ¬Ã‚  Bank transaction( Muntasir B. Shahariar, 2010). In order to provide mobile banking services the service provider has faced a challenge of security and privacy of customer, service provider has to promise users a level of security, a solution for this challenge has been made by mobile service provider is PIN and pass code to authorize valid customers and encrypted data for transfer along with the threat of password or PIN stolen if a mobile phone or wireless device is lost. Cope with low price charged to the customer is a also a hidden challenge for financial institutions because mobile banking is based on the revenue sharing model but in order to attract and retain customer low price than e-banking and previous banking service must be target(Caroline Boyd, 2007). Though mobile banking has a potential to improve saving rate and provide access to financial product but its still facing challenges which need to overcome includes high barrier to entry, low rate of loan repayment because of less contact with customer and regulatory issues (John Erickson, 2010). Attackers are gaining experience in tricks and those techniques which are unknown in 1990 are become mainstreams in 2000s such as phishing, malware, pharming such as DNS poisoning, increasing advancement in phones now threats is increased more on mobile than pcs(Bankable Frontier Associates, 2008) Challenge regarding m-banking to policy-makers and regulators is two-fold: Firstly, to encourage banks and mobile operators to develop solutions that are not proprietary, and secondly, to allow access to potential new entrants that can disrupt the lucrative business models of the banks and mobile operators. The key challenge is to do this while at the same time ensuring high levels of security and trust. Just like convergence forced the integration of broadcasting and telecommunications, so mobile banking is forcing the convergence of the financial and telecommunications sectors. Unfortunately, the convergence of two such heavily regulated industries means that this potential is unlikely to be met unless policy-makers lay the ground rules for innovation. (Comninos, Esselaar, Ndiwalana Stork, 2008) The bigger barriers in way of mobile banking is interoperability, fraud and security ,lack of awareness and understanding of benefits can achieve from mobile banking (Mahesh .K. harma , Ritvik Dubey, 2009). The common challenge policy makers and regulators have to address is: how to formulate regulatory policy that balances the need to provide space for innovation whilst ensuring services are scaled up safely (GSMA, 2008) There are also other manifest security challenges in delivering banking and payment services through wireless channels. Banks and other providers must implement security measures that adequately address these risks and threats regardless of the underlying network and carrier infrastructure used in delivering their services( Tony Chew, 2002) PUBLIC KEY INFRASTRUCTURE (PKI) FOR MOBILE BANKING To understand the challenges of deploying PKI in mobile banking, it is assumed that two keys are important. One for encryption and another for decryption. Only the decryption key must be kept secret: it is called the private key. The corresponding encryption key call the public key can be published. A Public key infrastructure works as follow. Each mobile bank user is listed in a public directory, with his/her public key. If mobile banking user wants to send a message to the bank server, he/she obtains banks public key from the directory and uses it to encrypt the message. The encrypted message is sent to bank application server. Only bank server is able to decrypt this message, because only bank knows the corresponding decryption key. Further, mobile user can use his/her private key to digitally sign his/her message by encrypting the message (or its hash) with his/her private key. Although everybody can read public-key directories, they must be protected from falsification and abuse. Therefore,there is need arise for an appropriate infrastructure called a public key infrastructure (PKI). (Narendiran, Rabara, Rajendran, 2010) In Jan 2010, for the security protection public key certificate was introduce by which the transactions made more secure than ever by using public key certificate, a special phone i-e smart phone used in which electronic signature is validate the transaction and authenticate to access the banks website. For this purpose application based Microsofts ActiveX internet explorer was necessary in order to download PKC. As mobile phone is a non- Microsoft browser and its do not support ActiveX for example iPhone , blackberry, Android, these phone do not support the designed procedure, therefore the mobile phones cant be used for mobile banking. In July 2010, Financial services commission extended its regulation to allow other verification methods by which a lay man can having its simple mobile phone set can use mobile banking services by introducing non-Microsoft browsers (CAU, 2010). The major regulatory issues which set around the branchless banking some of them are; 1- the risk of failure after introduction, a high profile failure lead to failure of all branchless schemes in which a high risk involved, 2- Non-bank institution must be introduce why only trust bank and presently using model of bank led is not always successful there must be bank led model at bank because mobile operator is a trustable authority and mobile operator can provide facilities such as a transaction can be traced geographically that a bank can never provide and mobile operator can know location exactly well than banks where a money is going to transfer and where its going to be received.3- appropriation of KYC regulation is necessary the suitability of application of customer should be under consideration. For example, if a customer transfer $30 and other is transferring $1000, will both undergo same KYC checks? If the most basic KYC checks applied to the poorest customer and full KYC ch ecks would be applied to the customer who reached to the Max-limit this relaxation may lead to the risk of terrorist attacks (Paul Makin and McEvoy, 2009). Those regulation that have been used for traditional banking cant be used for mobile banking because the risks of traditional bank and risks of mobile banking cant be equal so there is a need to develop more regulation for mobile banking, there are some areas in which the regulator attention is more require for example, making legal anti money transaction, agency rule, fullfilment cost of regulation, Foreign exchange controls, Payment regulation for non-banks, i.e. mobile operators (GSMA,2008) The regulation against risk of fraud, loss of privacy of customer and even for loss of service for the establishment of trust among the customer and its the most necessary element for the development of mobile banking. A legal framework needed which give authority to receive or send payments in electronic form. The Regulations also require for the Banks to take corrective actions and result proof measures to provide protection against violation terms and conditions of licensing including power to suspend or withdraw the license and if is there any violation done enforce financial penalty or regulate compensation. In order to formulate regulation the bank is eligible for issuance of rules, regulation and guidelines and directions for paper based payment items and the instruments used to complete the transactions and for presentation of electronic check. Moreover, the regulation is set by the bank to recognize new payment tools for the protection of interest of customer by ensuring sec urity, integration, reliability of the payment system. In bank of India, the guidelines are only formulate by the reserve bank of India and it specifies that only those bank who have physical presence in India will be licensed and supervised and will be allowed to offer mobile banking in India. Services shall be restricted only to customers of banks and holders of debit/credit cards issued as per Reserve Bank of India guidelines. SBP issued a policy paper on Mobile ( Rasheda Sultana, 2009) The development of mobile banking require some rules and regulation to be implemented for the protection of consumer, promote secure transactions, encourage economic stability. In regulation, clearly define those activities and institutional arrangements for mobile banking that directly focus on licensing, regulation and management by financial authority. It is require by those who are offering mobile banking to clearly expose prices and services offered by them along with it ensure fair dealing and data protection for all consumer. It is also require that mobile banking facilitator supervise risks of fraud and illegal activities under the rules of Know Your customer (KYC) (CAU, 2010) Banking which elaborately discusses models of mobile banking and associated risks. SBP recommends bank-based model with the scope of introducing non-bank-based model at later stage ( Rasheda Sultana, 2009) Financial crisis highlights need to make customer protection, financial access and financial stability mutually reinforcing Technological advances in mobile banking necessitate regulations that are flexible enough to accommodate innovation and customer demand yet stringent enough to protect customer privacy. The clarification of issues help banks and telecom companies to assess the risk involved in providing mobile banking in better way (CAU, 2010) A major issue that come arise while using mobile banking is to know your customer, new customer identity evertime verified whenever he have to use the service. In Kenya, identification is proved through national id card and M-PESA service which rely on id card authentication and it goes perfect. Some development in regulation allowed that only a bank can offer mobile banking services because of the reason that mobile operator due to its lack of perception and recognition power, do not know how to apply same regulatory environment to the non- bank to some extent. As the security, protection (end to end encryption) can be done only by the mobile operators since the SIM in under control of mobile operator. There are two ways to resolve this issue one is to relax the SIM control, there will be a time reach in near future that the SIM will be public utility and some control rights would be taken away from mobile operator and given to the third parties, second is relaxation of security As the implementation of mobile banking solely on mobile operator is not possible, it can be operated with comprehensive security and suitable control on appropriate reporting of maximum number of customers, transaction size and enhanced server based control. The regulator will have access to the necessary levels (Paul Makin and McEvoy, 2009) In order to achieve success in fulfillment of regulation and implementation of regulation, the regulator have to keep in mind that regulation must be apply in a proportionate manner to ensure safe and sound mobile money transfer. The regulation must benefit customers by rise in competition which reduce the price and improve the quality of service. The regulation must allow to be with the new mobile coming up for money transfer services. Financial regulation has to be developed through a consultative approach with the mobile industry to ensure it closely tracks market development without becoming a regulatory barrier (GSMA, 2008) With respect to completing a mobile banking transaction, a mobile carriers legal obligation also differs in fundamental ways from a financial institutions. The mobile carriers obligation to verify the origination and termination of a telecommunications transmission is mainly to ensure that a call is completed, and, that customers are accurately billed for the service. To the extent that a transmission is not completed, regardless of the content of that transmission, the liability of a telecommunications carrier is extremely limited as a matter of law. Under longstanding common law precedents and statutory law, for the most part a customer is entitled to no more than a refund for the cost of a failed communications, even if that communication happens to involve digital transfers of very large sums of money( Frederick M. Joyce, 2010) Mobile banking has two security segments; one is called handset zone users zone and other is mobile operator zone. Data security issues in mobile banking for example hackers, malware, viruses attacks etc some of the security issues that occur in mobile banking is as follow; Information leakage, loss and alteration can be happen in mobile banking as the technology is based on wireless devices, the information is transferred from one end to another end by using radio waves modulation and demodulation. When the rays passes from the air there are many other rays with which the interference of respective wave can be happen by which information may be leaked, loss and distort or it can be intercepted hackers can extract the information by installing devices on electromagnetic devices or may delete, modify or add in information which can damage the purpose of legitimate user which is initiated by him. Instability of communication channels and mobile devices lead to incomplete transaction. T

Tuesday, November 12, 2019

The Timeless Power of Les Miserables Essay example -- Les Misérables M

The Timeless Power of Les Miserables      Ã‚  Ã‚   The book Les Miserables, written by Victor Hugo in 1862, created a sensation throughout the world (Royston and Schlesinger 2). That impression continued through theatrical productions and most recently the musical, but the book contains greater detail and adds a deeper understanding of Hugo's epic story than the movie or musical portray. Regretfully, few people in World society take the time to relish this masterpiece. Living in a fast paced world, many people today consider reading a time-consuming, senseless activity, and those who still read most likely choose a shorter novel rather than the 1500 page story of Les Miserables. However, the author states, "I don't know if it will be read by everyone, but it is meant for everyone" (Royston and Schlesinger 2). This statement applies to this time period as well. The sincere characters, intriguing sub-plots, and moral theme of Les Miserables relate to people today even 130 years after its publication.    Popular characteristics that today's reader admires coincides with the characteristics of the characters in Les Miserables. Readers look for a hero that they relate with, so the hero who possesses admirable qualities as well as demeaning faults appeals to most people. The heroes of Les Miserables, Jean Valjean and Marius, both portray average men with flaws in their character. Jean Valjean, the main character, steals from a bishop who treated Valjean decently when other people only saw him as a convict. This single act makes Valjean appear ruthless, but later in the novel, his eagerness to help people and his willingness to accept punishment makes Valjean's error seem trivial. Valjean's mistake secures his r... ... and moral theme. Written over 130 years ago, it remains influential even today. Although the book requires an immense amount of time to read, the outcome proves beneficial and invigorating to anyone who chooses to embark on the adventure of Jean Valjean's life in Les Miserables.    Works Cited Hillis, Newell Dwight. Great Books as Life-teachers: Studies of Character, Real and Ideal. New York: Fleming H. Revell Company, 1899. Grossman, Kathryn M. Les Miserables: Conversion, Revolution, Redemption. New York: Twayne Publishers, 1996. Lee, Rob. The Barricade on the Rue de la Chanvrerie: Les Miserables - The Novel. Internet. 1997. Available: www.users.cloud9.net/~rlee/lesmis/welcome.htm. Royston, Peter and Sarah Schlesinger. About the Novel Les Miserables. Internet. 1997. Available: www.lesmis.com/inspiration/author/aboutnovel.html.   

Sunday, November 10, 2019

Fraternities and Sororities Essay

What is fraternity? A fraternity (Latin frater : â€Å"brother†) is a brotherhood, although the term sometimes connotes a distinct or formal organization and sometimes a secret society. A fraternity (or fraternal organization) is an organized society of men associated together in an environment of companionship and brotherhood; dedicated to the intellectual, physical, and social development of its members. * Wikipedia A fraternity is a male-only association with members who are linked by common interests of some form or another. The most famous form in North America is probably the college fraternity, although it is also possible to find social and a variety of other fraternal organizations around the world. College fraternities date to 1776, when Phi Beta Kappa was founded in the United States. Many college fraternities are established with academic criteria for membership. People who wish to join typically participate in activities that take place over the course of a week at the start of a semester. Since most colleges with a system have multiple fraternities, these events usually take place during the same week for all groups, allowing people to explore all their options. This period is known as â€Å"rush week.† After rush week, current members of the fraternity decide which new members should be voted in. Traditionally, new pledges participate in an initiation ceremony that has historically been accompanied by hazing challenges. Due to concerns about the risks of hazing that involve dangerous activities and drinking, many colleges have explicitly banned it in the interest of student safety. Some colleges have also cracked down on fraternity parties in response to complaints from other students and the surrounding community. Membership in a fraternity can confer many advantages. It is not uncommon for these groups to maintain living quarters and private clubs that are only open to their members. Special scholarships may be available, and membership can be used for networking which will be valuable later in life. Many people also enjoy the brotherhood that comes with membership. Fraternities are often identified with Greek letters, as in the case of Lambda Chi, a Christian fraternity, and Phi Iota Alpha, a Hispanic fraternity. These letters often represent the group’s motto. Thanks to the common use of Greek letters in their identifications, the culture is sometimes described as â€Å"Greek,† as in â€Å"Greek life† or â€Å"Greeks† in reference to the members. It is also possible to use an English name, as in the case of the Skull and Bones, a notorious Yale fraternity. Public service is often a part of fraternity membership. They usually include a specific charity or cause in their mission, with members donating funds or time to the cause each year. Members are sometimes frustrated by the judgmental attitudes of people outside the Greek system, pointing to their fundamental missions of service and brotherhood to counteract stereotypes about lewd behavior and decadent parties. History There are known fraternal organizations which existed as far back as ancient Greece and in the Mithraic Mysteries of ancient Rome. Analogous institutions developed in the late medieval period called confraternities, which were lay organizations allied to the Catholic Church. Some were groups of men and women who were endeavoring to ally themselves more closely with the prayer and activity of the Church. Others were groups of tradesmen, which are more commonly referred to as guilds. These later confraternities evolved into purely secular fraternal societies, while the ones with religious goals continue to be the format of the modern Third Orders affiliated with the mendicant orders. The development of modern fraternal orders was especially dynamic in the United States, where the freedom to associate outside governmental regulation is expressly sanctioned in law.[1] There have been hundreds of fraternal organizations in the United States, and at the beginning of the 20th century the number of memberships equaled the number of adult males. (Due to multiple memberships, probably only 50% of adult males belonged to any organizations.)[2] In 1944 Arthur M. Schlesinger coined the phrase â€Å"a nation of joiners† to refer to the phenomenon.[3] Alexis de Tocqueville also referred to the American reliance on private organization in the 1830s in Democracy in America. There are many attributes that fraternities may or may not have, depending on their structure and purpose. Fraternities can have differing degrees of secrecy, some form of initiation or ceremony marking admission, formal codes of behavior, disciplinary procedures, very differing amounts of real property and assets.[2] Types of fraternities The only true distinction between a fraternity and any other form of social organization is the implication that the members freely associate as equals for a mutually beneficial purpose, rather than because of a religious, governmental, commercial, or familial bond, although there are fraternities dedicated to each of these fields.[2] On college campuses, fraternities may be divided into groups: social, service, professional and honorary. Fraternities can be organized for many purposes, including university education, work skills, ethics, ethnicity, religion, politics, charity, chivalry, other standards of personal conduct, asceticism, service, performing arts, family command of territory, and even crime. There is almost always an explicit goal of mutual support, and while there have been fraternal orders for the well-off there have also been many fraternities for those in the lower ranks of society, especially for national or religious minorities. Trade unions also grew out of fraternities such as the Knights of Labor. The ability to organize freely, apart from the institutions of government and religion, was a fundamental part of the establishment of the modern world. In Living the Enlightenment, Margaret C. Jacobs showed the development of Jurgen Habermas’ ‘public space’ in 17th century Netherlands was closely related to the establishment of lodges of Freemasons.[4] Trade guilds The development of fraternities in England can be traced from guilds that emerged as the forerunners of trade unions and friendly societies. These guilds were set up to protect and care for their members at a time when there was no welfare state, trade unions or universal health care. Various secret signs and handshakes were created to serve as proof of their membership allowing them to visit guilds in distant places that are associated with the guild they belong. Over the next 300 years or so, the idea of â€Å"ordinary† people joining together to improve their situation met with varying degrees of opposition (and persecution) from â€Å"People in Power†, depending on whether they[clarification needed] were seen as a source of revenue (taxes) or a threat to their power. When Henry VIII broke from the Roman Catholic Church, he viewed the guilds as supporters of the Pope, and in 1545 expropriate their property. Later, Elizabeth I appropriated apprenticeships away from guilds,[clarification needed] and by the end of her reign most guilds had been suppressed. The suppression of these trade guilds removed an important form of social and financial support from ordinary men and women. In London and other major cities, some Guilds (like the Freemasons and the Odd Fellows) survived by adapting their roles to a social support function. Eventually, these groups evolved in the early 18th century into more philosophical organizations focused on brotherly love and ethical living. Among guilds that became prosperous are the Freemasons, Odd Fellows and Foresters. In many instances fraternities are limited to male membership, but this is not always the case, and there are mixed male and female, and even wholly female, fraternities. For example, for general fraternities: the Grande Loge Mixte de France, the Honorable Fraternity of Ancient Freemasons, the Grande Loge Fà ©minine de France, the various Orders of Odd Fellows, Orange Order, Daughters of Rebekah and the Order of the Eastern Star. College and university fraternities Main article: Fraternities and sororities in North America Fraternities have a history in American colleges and universities and form a major subsection of the whole range of fraternities.[5] In Europe, students were organized in nations and corporations since the beginnings of the modern university in the late medieval period, but the situation can differ greatly by country. In the United States, fraternities in colleges date to the 1770s, but did not fully assume an established pattern until the 1820s. Many were strongly influenced by the patterns set by Freemasonry.[2] The main difference between the older European organizations and the American organizations is that the American student societies virtually always include initiations, the formal use of symbolism, and the lodge-based organizational structure (chapters) derived from usages in Freemasonry[2] and other fraternal organizations such as the Odd Fellows and Knights of Pythias.[6] The oldest active American college fraternity is The Kappa Alpha Society founded in November 1825, at Union College in Schenectady, New York, followed closely by Sigma Phi Society (1827) and Delta Phi Fraternity (1827) at the same school. Other fraternities are also called literary societies because they focus on the literary aspect of the organization and its role in improving public speaking. In Germany the German Student Corps are the oldest academic fraternities. Twenty-eight were founded in the 18th century and two of them still exist.[7] ————————————————- References 1. ^ NAACP v. Alabama ex rel. Patterson, 357 U.S. 449, 460 (1958) 2. ^ a b c d e Stevens, Albert C. (1907). Cyclopedia of Fraternities: A Compilation of Existing Authentic Information and the Results of Original Investigation as to the Origin, Derivation, Founders, Development, Aims, Emblems, Character, and Personnel of More Than Six Hundred Secret Societies in the United States. E. B. Treat and Company. 3. ^ Schlesinger, Arthur M. (October 1944). â€Å"Biography of a Nation of Joiners†. American Historical Review (Washington, D.C.: American Historical Association) L (1): 1. 4. ^ Jacob, Margaret C. (1991). Living the Enlightenment: Freemasonry and Politics in Eighteenth-Century Europe. New York, New York: Oxford University Press. 5. ^ Baird’s Manual of American College Fraternities 6. ^ Several collegiate fraternal societies were founded by members of Freemasons, Odd Fellows and Knights of Pythias, Abovetopsecret.com 7. ^ Klimczuk, Stephen & Warner, Gerald. â€Å"Secret Places, Hidden Sanctuaries: Uncovering Mysterious Sites, Symbols, and Societies†. Sterling Publishing, 2009, New York and London. ISBN 9781402762079. pp. 212-232 (â€Å"University Secret Societies and Dueling Corps†).

Friday, November 8, 2019

Essay on Femininity and Feminism and the Histories of Art

Essay on Femininity and Feminism and the Histories of Art Essay on Femininity and Feminism and the Histories of Art Essay on Femininity and Feminism and the Histories of ArtGriselda Pollock in her work â€Å"In Vision and Difference: Femininity and Feminism and the Histories of Art† gives us some arguments which extend beyond issues about impressionist painting and parity of artists who are women. She outlines the spaces of femininity in works of artists compering female artists and the artists, who are men.The author indicates that a big amount of outstanding modern art works are considered and viewed extremely in the scope of sexuality and commercial exchange of it. In those works of art women are often pictured as subjects, which have a purpose to please men’s eye. We often see a bar with a female bartender or naked women in paintings (Olympia (1863) and A Bar at the Folies-Bergere (1881-82) by EdouardManet).Have you ever seen a modern painting with a naked man on it? Such painting will look ridiculous. A huge amount of modern arts are simply made just for men, for their pleasure, and women are selling their bodies to the artists. There had been social and subjective difference between women and men for several centuries. Such asymmetry has a historical background.The author mentions some female artists and their art works in order to compare them with paintings painted by male artists. Berthe Morisot and Mary Cassatt for instant were representatives of Impressionist exhibiting society. Griselda Pollockanalyses the differences between art works of these two female artists and male artists using space criteria. She analyses the location where women are depicted. In the case of female artists, private areas and domestic territory are included. On the contrary of male paintings, female artists depict women in the public domain scenes, for instance, of promenading, driving in the park, being at the theater, boating (At the terrace (1874), The harbor at Lorient (1869) by Berthe Morisot). Women are represented carrying their children, not being some naked courtesa ns or some bartenders. Women’s looks are not sexualized in the paintings of female artists.The author is also pointing out the spatial argument. The spatial order within the painting made by women is different from the spatial order on the man’s painting. When we are talking about female’s works of art, it is reasonable to mention the following arguments. The disposition of different subjects and the point, from which the painting has been made, make the viewer involved and taken into position of depicted person. Sometimes the viewer’s gaze is obstructed from the foreground by the depicted figure. Therefore, the viewer feels some dislocation between the woman depicted and the rest of the world. There are boundaries between two spatial systems. The differences lie in the wayperson can relate to the painting and objects depicted in it. For example,The garden of the princess (1864) by EdouardManet gives the viewer only ability of observing the scene, not bei ng present in the painting. It makes the viewer independent and absent. But the point of view of women’s painting put the person somewhere in the middle. The viewer is not absolutely absent, but also not to personally involved. The painting simply demonstrates historical moment.The women may be depicted in exactly the opposite way depending on the location and clothing. The respectable woman is well dressed and accompanied by her husband in a park. The girl of easy virtue is showing some parts of her body and her dress is not so modest.There was quite distinctive separation of women’s and men’s public territory in bourgeois society. Women were not supposed to visit public places alone. They were considered to be home keepers. If woman showed up alone in public places, she had risked to be judged by society. She could be disgraced and defamed. Female artists like Berthe Morisot and Mary Cassatt showed us that discomfort and vulnerability of lonely women in public places. Women depicted by Mary Cassatt in The Loge (1882) show the reality and true feelings of such women. One of them seems suppressed and the other one is covering her face. That is the evidence that they feel uncomfortable. The yeas of the public were fixed on these ladies. Male artist Auguste Renoir in The loge (1874) shows the same location but from a different point of view. The woman in his picture draws attention of a viewer to herself. She is depicted presumably for a male spectator. We see a picture of a woman. She is the only object of this painting.It is Griselda Pollocks opinion that that line between public and private life of a woman is not just a division of her world, it is also the frontier of the spaces of femininity. While men could move freely in public world, women were restricted. Women could not observe the world because of such restriction of visiting public places alone. On the contrary of man, woman had no freedom of looking and acknowledging. She was th e object of men’s gaze by herself. It was a man who had a whole freedom.The ways the women are depicted in private areas are also different. Female artist, Marry Cassat, for example, shows the maids simple washing. The maid is half naked. But not sexualized. She is not pictured as fallen woman. The artist depicted maid in the way, that she is not the subject of voyeuristic gaze. The viewer sees a simple act of private life. Griselda Pollock analyses Degas’s painting. The male artist shows the same act of private life in absolutely opposite way. The woman in his painting is definitely a subject to sexual commodification. It is also reasonable to mention about class division between women. The author suggests that bourgeoise and proletarian are depicted in different locations. It is a woman from the proletariat painted as a maid washing herself.In conclusion Griselda Pollock is talking about the spaces of femininity nowadays. It still regulates women lives. Author indica tes that modernity is still out there. It is still with us. Women are even more vulnerable to assault. Women are not able to move safely.   They are still objects to annoying looks by men and even victim to sexual crimes. That is why it is so important to analyze modernist art works in the scope of femininity.   It is important to discern sexualized structures and discover past resistance with the help of works of art. That could serve a factor to discovering new spaces of femininity.Now I would like to test arguments given in paper work by Griselda Pollock, which were summarized above, using the assigned work of art. A Box at the Italian Theatre was painted by Eva Gonzalà ¨s in 1874. It is currently located in the permanent collection of the Musà ©e d’Orsay in Paris. A Box at the Italian Theatre may truly be considered as a representative of impressionism in female version.At first, let’s analyze the space criteria. We see a woman in the public place. It is a de cent place, which is a theater. Eva Gonzalà ¨s depicts the character of the painting sitting in the box, so we can assume that she seeks for some privacy. Woman perhaps wants to feel herself a little bit more comfortable that is why she chooses some enclosed space. The character prefers to avoid some annoying looks of men and condemnation. This woman is allegedly alone in the theater. But that fact that she has her seat in a box gives us these associations with wealth and status. She can afford this privileged seat. The analysis of the location and the dress of the lady depicted bring us to the conclusion that this woman is a representative of the bourgeoisie.If we are talking about the women’s vulnerability in public places, we will see how precisely Eva Gonzalà ¨sconveys this problematic. The seat next to the lady is empty. We can assume that she came alone. But the woman obviously doesn’t have the possibility of observing the performance. As we can see she is cons tantly under the gaze of some man. That man seems interested in the lady, but she has her eye glued to the scene. The woman is restricted again. She has denied in freedom of looking and observing peacefully without any interferences.At the same time the posture and the way the woman sits gives us the feeling that she feels quite comfortable and that gaze of a man doesn’t disturb her.The analyzed painting supports statements of Griselda Pollock mentioned in her work â€Å"In Vision and Difference: Femininity and Feminism and the Histories of Art†. It shows the way female artists depicted women with all their vulnerable nature. It depicts the spaces of femininity.

Wednesday, November 6, 2019

Last Minute ACT Strategies 12 Guides You Must Read

Last Minute ACT Strategies 12 Guides You Must Read SAT / ACT Prep Online Guides and Tips It's the week or the day before your big ACT test date, and you want to have the best chance possible at raising your score. At PrepScholar we've written hundreds of free guides to help you succeed on the test, but some guides are especially helpful right before your test. By reading these guides, you'll make sure you're in the best shape possible on test day. General ACT Strategy What You Must Bring to the ACT on Test Day In this guide, we explain exactly what you should bring (your admissions ticket, #2 pencils, lots of snacks, etc.) and what you need to leave at home (the iPhone glued to your hand, a #1 pencil, your mom). Test Day can be stressful. Make sure you’ve got the right supplies. Should You Guess on the ACT? 5 Guessing Strategies Short answer: ALWAYS GUESS ON THE ACT. For the long answer, read the strategies our experts recommend. And no, â€Å"always guessing ‘C’† did not make our list. The Best Way to Review Your Mistakes from ACT Questions In your last study time before your ACT test date, don't worry about taking another full-length practice test. Instead, review your mistakes from the past so that you can avoid them on test day. This guide tells you how you should be reviewing your mistakes to get the most out of your time. How to Get a Perfect ACT Score, by a 36 Full Scorer If you’re looking for a top ACT score (33-36), take advice from someone who scored a 36- me. In this post, I break down all you need to know about striving for perfection on the ACT. It’s challenging, but definitely not impossible. ACT Science Strategy Time Management Tips and Section Strategy on ACT Science You can see the light at the end of the Test Day Tunnel. All that stands between you and the rest of your Saturday is the dreaded Science section (and possibly an essay, but more on that later). In this guide, we give tips on how to finish strong and within the time limit. The Only Actual Science You Have to Know for ACT Science By now, you’ve probably figured out that the ACT Science section is basically a reading test with bigger words and more technical pictures. You don’t actually have to know a lot of science in order to do well; in this guide, we’ve outlined the core topics that show up again and again in this section. ACT Reading Strategy How to Stop Running Out of Time On ACT Reading It’s not just about watching the clock on Test Day. It’s about how to maximize the time you do have. You won’t learn to speed read by Saturday, but our experts have outlined strategies to buy you time on test day. ACT Math Strategy The 31 Critical ACT Math Formulas You MUST Know You’ve probably memorized hundreds of formulas in math classes. Whether or not you remember them†¦ Well, that’s a different story. In this guide, we review the 31 formulas you must know in order to ace ACT Math. How to Stop Running Out of Time on ACT Math On test day, you’ll have 60 minutes to answer 60 math questions. It doesn’t take a genius to figure out that this will be challenging. Luckily, PrepScholar experts have outlined the top strategies for taking advantage of every second. ACT English Strategy The Complete Guide to ACT Grammar We’re not going to lie. It’s a long guide, but every single question you’ll face in the ACT English section will be based on this material. How can you not read it? ACT Writing Strategy How to Write an ACT Essay: Step by Step Example Writing a cohesive essay in 40 minutes sounds impossible, but our experts have broken it down into an easy-to-remember, step-by-step process. Practice this at least once or twice before test day to make sure you’ve got it down. ACT Writing Tips: 15 Strategies to Raise Your Score In this guide, we’ve outlined what ACT wants you to know about the Writing section, some secrets they’d rather not share, and a step-by-step process that can definitely help you improve your writing score. Want to improve your ACT score by 4+ points? Download our free guide to the top 5 strategies you need in your prep to improve your ACT score dramatically.

Sunday, November 3, 2019

MC DONALDS ADVENTURE IN THE HOTEL INDUSTRY Essay

MC DONALDS ADVENTURE IN THE HOTEL INDUSTRY - Essay Example anged but as the hotel was under the umbrella of McDonalds, therefore it is quite expected that the brand image will be the same as that of the McDonalds. It refers that the brand should be associated with cleanliness, hospitability and convenience but the fact was that the hotel management was unable to satisfy the expectations of the customers. Golden Arch should prepare different marketing missions and should promote those accordingly. Therefore, it can be concluded that Golden Arch did not have much success in the branding strategy. After deciding about the diversification of the business, McDonalds had entered into the markets of Switzerland with the hotel business. The pros and cons of this entry strategy can be analyzed as below. Pros: Switzerland is an attractive tourist destination and most targeted place for the hotel business. The country is economically sound and possesses a stable political background. The city that has been chosen for operating the hotel business is the political capital of Switzerland which comprises of 35 million populations. Also, 10 years ago there was not as much competition prevalent like today and therefore it was a good decision. Cons: McDonalds needed to have a market analysis before entering into the hotel industry in Switzerland. The related industries such as travel and construction should also be evaluated. Due to the booming construction industry, four and five star hotel can be built quickly. Another important aspect is the availability of the human resource. Switzerland ranks number two with respect to the productivity of the labor sources but there the availability of cooks and chefs are inadequate and that had definitely interrupted the flow of the work. From the above analysis it can be said that the entry strategy was not bad at that point of time but with the passage of time, scenario has changed as competition has increased and Golden Arch needs to strategize accordingly. Strategy was not the issue, rather

Friday, November 1, 2019

Formal Report case study Research Paper Example | Topics and Well Written Essays - 4250 words

Formal Report case study - Research Paper Example Employees need to know that it is an offense to smoke or drink within the boundaries of the workplace. However, they should not feel as though the company is punishing them. This is why they should be included in the policy making to prevent such misconceptions. The company ought to be clear on rewards and punishments as a way to control smoking and drinking. Most employees fail to take care of their health for lack of information. Books, movies, and seminars should be availed to enable employees get the information required for change of behaviour. The company should consider using the services of experts in dealing with critical issues such as smoking and drinking prevention programs. Putting employees in darkness about what is happening within the company creates a sense of isolation and powerlessness. This is especially if they are not included in the decision-making within the company. This may kill their morale about work and become victims of alcohol to fight their frustration s. As normally said, ‘work and no play make jack a dull boy.’ Employees need to have activities that enable them to unwind. These include gym and other exercising equipment. Employees can use them over lunch break to exercise. Other resources include programs that might assist employees to stop drinking and smoking. Ensure that food eaten within the workplace is healthy to prevent the lifestyle complications. Finally, managers are also trained to detect problems in employees and address them instantly. There is a positive correlation between stress and drug use amongst the employees. For that reason, it would be imperative to ensure that employees are trained to cope with stressful situations. To ensure employees are not stressed, the company should ensure favourable working conditions. If possible, the company should create an employee and family assistance programs. Professional help is offered not only to