Friday, December 27, 2019

The Enron and Worldcom Scandals - 1009 Words

The Enron and WorldCom scandals Enron #1. The segment that put Enron in difficulties was the LJM1. That SPE was the worst of all four SPE’s. This one had no independant investor that could put up the 3% that they needed for the controlling investor, where CHEWCO would work as a counterparty accounting to the Ugt;Sgt; guidelines. Enron already owned 97% of CHEWCO, where if they had a controlling investor, the profits from CHEWCO would go directly to Enron’s assets. Later, they did not find a controller investor, and invented another SPE, which was LJM2. The problems in LJM1 still was there that affected LJM2. Arthur Anderson, the auditor for Enron, went ahead and approved of this SPE, knowing that the financial statements had†¦show more content†¦WorldCom #1. In the general ledger of WorldCom, they were supposed to reduce the line cost expense accounts and reducing- in accounts corresponding to the improper and false line cost expense in various reserve accounts. This would through off your balance sheet and your income statement, showing you made profits, which indeed, you never did. Later, the senior management would instruct that the line cost expenses are fraudulently be reclassified. By doing this, they had to adjust the schedules of certain Property, Plant and Equipment Capital expenditure accounts by increasing certain capital accounts for â€Å"prepaid capacity†. In the future periods, the increase of these certain accounts for â€Å"prepaid capacity† would then remain manipulation of choice by Ebbers, which would add to their profits. #3. WorldCom’s board of directors should have reduced the conflicts of interest, so they could exercise the fundamentals of ethics to the shareholder’s or company and to the public’s interest. They could have ensured that financial reported were accurate, complete, understandable, and transparent. The directors should have also ensured that the accounting standards were adequate to protect the investor’s interests. #4. Lay may never been an accountant, but a milkman, but he was assisted in all of these manipulation by his Chief financial officer and his Controller , which both men worked for ArthurShow MoreRelatedThe Enron and Worldcom Scandals875 Words   |  4 PagesE. Boos – Week 2 – Assignment February 17, 2013 The Enron and WoldCom Scandals ENRON 1. The segment of Enron’s operations that got them into difficulties had several parts. They published misleading financial reports. They could not meet their bridge financing commitment with Barclay Bank because outside investors were not found. Because of this, they restated activities of JEDI and Chewco SPEs so they could be retroactively consolidated into Enron’s accounts. The SPEsRead MoreAccounting Scandals. ENRON, WORLDCOM1894 Words   |  8 PagesENRON Enron shocked the world from being â€Å"America’s most innovative company† to America s biggest corporate bankruptcy at its time. At its peak, Enron was America s seventh largest corporation. Enron gave the illusion that it was a steady company with good revenue but that was not the case, a large part of Enron’s profits were made of paper. This was made possible by masterfully designed accounting and morally questionable acts by traders and executives. Deep debt and surfacing information aboutRead MoreFinancial Scandals Of Enron, Worldcom, And Tyco Occurred Risk Management1671 Words   |  7 PagesRisk Management After the major financial scandals of Enron, WorldCom, and Tyco occurred risk management became a high priority for companies. According to Brown, Steen, and Foreman (2009) risk management can be defined as the culture, processes, and structures that are directed towards taking advantage of potential opportunities while managing potential adverse effects† (p.547). To assist companies in the risk management process, companies are incorporating a risk management system, this helpsRead MoreEnron and Worldcom Case Study1225 Words   |  5 PagesEnron and WorldCom Case Study This report is based on the demise of Enron Corporation and WorldCom. Both the firms are demised due to the ethical lapses. These ethical lapses come into existence when managements of the firm, uses unethical practices to accomplish the goals of the firm. Maintaining financial and accounting standards in the business practices are necessary. The profession of accounting has become a mockery due to the accounting scandals that took place all over the world in theRead MoreEssay on The Consequences of Bad Business Decisions1304 Words   |  6 PagesIn todays world business is very competitive. To compete with other companys executives have turned to corrupt practices. Once respected businesses like Enron, WorldCom, and Arthur Anderson have been found deceiving there customers, stockholders, and employees. C.E.O.s try to achieve the American dream and pursue capitalism to its fullest potential. In doing so, business leaders have lost their values and ethics, and make bad business decis ions. The downfalls of a company are the consequence ofRead MoreCorporate Scandals And The Implact Of The Sarbanes Oxley Act1472 Words   |  6 PagesA LOOK AT CORPORATE SCANDALS AND THE IMPLACT OF THE SARBANES-OXLEY ACT OF 2002 I. INTRODUCTION An economic boom filled with fraud, collapsed in the early 2000s with the unravelling of Enron in October 2001 followed by the implosion of WorldCom and many others big corporations. The downfall of these major companies led to a wide spread crisis of confidence in the financial markets. A crisis caused by executive greed was able to be magnified when the gatekeepers, the auditors, lawyers and analystsRead MoreThe Sarbanes Oxley Act Of 20021133 Words   |  5 Pagesdirectly affected by these scandals, many were indirectly affected as well due to the externalities caused by these greedy firms. The industry, for example, was to be untrusted. To try and instill trust back into customers, the Securities and Exchange Committee proposed and implemented a new law. This policy was put in place to regulate the accounting practices and to make them more honest. Titled the Sarbanes-Oxley Act of 2002 (enacted just after the WorldCom scandal), basically set rules and regulationsRead MoreCorpora te Scandals And Allegations Of Fraud1111 Words   |  5 PagesCorporate scandals and accusations of fraud have amplified intensely over the last decade. The cost of fraud has reached over $400 billion dollars a year, not to mention the loss of investments and jobs. Corporation fraud involves creative, complex methods in which to overstate revenues, understate expenses, over value assets, and underreport liabilities. To hide financial problems, management will manipulate stock prices, minimize taxable income, and maximize compensation. â€Å"It s been my experience†¦Read MoreThe Sarbanes Oxley Act Summary And Introduction1714 Words   |  7 PagesReforms have been created to close the gap of corporate governance and financial reporting in order to prevent the reoccurrence of corporate scandals. Congress created a federal bill named the Sarbanes-Oxley (SOX) Act in July 2002 in response to the Enron and WorldCom scandals that introduced major changes to the regulation of corporate governance and financial practice in order to protect the interest of investors and the public (â€Å"Sarbanes-Oxley Act Summary and Introduction,† 2003). The Act is extensiveRead MoreEthics : Ethical And Ethical Considerations1741 Words   |  7 Pagescompany. For small business investors, creditors and managers being ethical is a simple way of staying out of trouble, and is easier to distinguish between right and wrong. WorldCom was one of the biggest telecommunication company that our world h as seen and also had one of the largest accounting frauds in history. WorldCom was a company that did not stay ethical in their ways of doing business. In accounting, the ethical consideration is honesty. You want to help your client to pay as little

Thursday, December 19, 2019

Fracking Is A Dangerous Process That Should Be Banned...

Hydraulic Fracturing (fracking) is the process of drilling into the ground and pumping sand, water, and fracking fluid at high pressures in order to extract natural shale gas that was previously unattainable. This process comes with environmental issues: the chemicals from the fracking fluid can contaminate nearby drinking water wells and harm the citizens of that area. Despite the fact that there have been several contaminated drinking water cases reported, there is little being done about this matter. This paper analyzes the available research that asserts why fracking is a dangerous process that should be banned immediately. The intended audience is my peers and instructor, as well as anyone interested in the debacle of fracking-caused water contamination that may come across this piece. As you are reading, I ask that you keep in mind that this is a very perplexing issue that has not been given much of an opportunity for true research and investigation. Therefore, the data discuss ed has not been officially proven or disproven to be directly related in every way to local fracking. However, the research gathered on the proposed danger of the Hydraulic Fracturing process is solely based on science that has already been proven as well as documented illnesses and symptoms from residents and contractors around or near fracking operation sites. Hydraulic Fracturing: This Dangerous Process Should Be Banned Immediately Hydraulic Fracturing (fracking) is the process of sand,

Wednesday, December 11, 2019

Anti Violence Essay free essay sample

Anti violence essay Seven years ago I did not think violence existed in America. The most violent act ever committed was the tragedy of the World Trade Center in 9/11/01. The Trade Centers had been the target for something so horrible, and I thought at the time, ‘This will change the world. † I was right about that fact: our airports are more secure, we have to have pass-ports anywhere you go now, you have more thorough bagage checks, and they’re more selective as to what’s in your purse before boarding a plane. I think the most secure place in America right now is our power plants. They have increased security at all our power plants, including the nuclear plants, and also there is air space around each plant so planes have to keep their distance from them. Homeland Security is a common word in our homes today because of 9/11. I wanted to know how. We will write a custom essay sample on Anti Violence Essay or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Wanted to know why. Wanted to know what our leaders reactions would be. The world trade center killed many people that my friends knew and loved; that can never be replaced. This act changed the way my friends lived, loved, and acted in school. This spine-chilling nightmare was committed because terrorists took over three planes that flew into the giant buildings. The causes of this violence is the hatred between countries, states, or nations. The hatred is then passed down to the youth generation, because we hear, and see the dislike between the grown-ups. Children learn from the wisdom and actions of what the elders do. Shooting, stabbing, verbal abuse, physical abuse, and gang fights are a few examples of youth violence. All of these exist in schools, neighborhoods, malls, the movies and even in your own home on the internet. Schools have tried to stop it but there is still a lot of verbal abuse anywhere in the school system you go. Youth violence can be stopped by reporting abuse, shooting, stabbings, and anything to do with gangs. It can also be solved by not being the one that does bulling or any of the things listed above. I think it is funny how teachers wonder about why no one reports violence in America. My say on the matter is the kids are scared it will only get worse if we tell a teacher or principal or any adult because they use our name and our grade to the bully or person that Bothers you.

Tuesday, December 3, 2019

Isaac Storm Essays - Galveston Bay Area, Greater Houston

Isaac Storm The Storm of 1900 On Friday evening, September 7, 1900, many of the 37,000 residents of Galveston, Texas, were settling down to dinner, few if any of them concerned about the steady 15 mph northerly wind rattling their windows. Within 48 hours, at least 8,000 of the townspeople would be dead, victims of the single worst natural disaster in U.S. history. Relatively few people are aware that the deadliest natural disaster in the United States was the hurricane that struck Galveston Island on September 8, 1900. One of the best resources that can be found to help fully understand the significance of this storm is Isaacs Storm: A Man, a Time, and the Deadliest Hurricane in History by Erik Larson. Dr. Isaac M. Cline was the chief of the U.S. weather Bureaus Galveston station located on the 3rd floor of the Levy Building which can still be found on the corner of Market and 23rd. Cline had begun tracking the storm from the Cape Verde Basin off the western coast of Africa. On August 31, this storm entered the Caribbean and began to increase in size. The hurricane passed just north of Cuba, and on Thursday September 6 entered the Gulf of Mexico. The projected course would have the storm make landfall well east of Galveston, but on Friday Dr. Cline became worried. Cline noticed a continually rising tide in spite of a 15 mph wind from out of the north as well as decreasing pressure. At 12 oclock midnight Saturday September 8, 1900 it began to rain in Galveston. By nine in the morning water was running calf deep Roberts 2 a few blocks from the beach. The rising tide, driving wind, rain and storm surge broke apart the bathhouses on the beach. Citizens of Galveston began to comprehend the importance of the situation and started moving toward the middle of the island along Broadway, only 8.7 feet above sea level at the time. Cline sent the final message from the island by telephone at 3:30 P.M. to the Western Union office in Houston. At five oclock the anemometer recorded winds of 102 mph before itself was carried away in a rush. Like that, the full fury of the storm was upon the island. Waters from the Gulf of Mexico and Galveston Bay quickly rose to meet each other, effectively swallowing the island. Throughout the night, the people of Galveston fought to survive. Buildings and homes began collapsing; blowing debris killed or maimed many people who managed to remain above the rising tide. Water poured through second story windows, forcing hundreds into the ocean where they were drowned or killed by wind driven debris. The tide reached 15 feet with breakers more that 25 feet. Many survivors, including Isaac, his three daughters and brother, spent the night clinging to the remains of their homes. By the morning, floodwaters had drained back into the sea. The corpses of people and animals lay intermingled through out the island; some were struck down in the street by debris, while others were crushed beneath their shelter or drowned. At least 6,000 to 7,000 Galveston resident were dead. Isaac survived along with his 3 daughters and younger brother Joe, but Isaacs wife Cora did not survive. Her body was found a few weeks later, identified by her engagement ring, which from then on Isaac wore. Roberts 3 High heat and humidity quickly settled over the city and made the stench from the thousands of dead humans and animals unbearable. Bodies were stacked on barges, weighted, and taken out to sea for burial. But in a morbid twist, the tides soon deposited the bodies back onto Galvestons beaches. After that, remains were buried in mass graves or cremated in bonfires. In 1900, the population of Galveston was 37,000. In one evening, it is estimated that 6,000 to 7,000 islanders lost their lives. Approximately, another 2,000 people in Galveston Bay area were killed. Not before or since have so many Americans perished in a disaster. By the next day the people of Galveston began rebuilding. Galveston constructed a seawall along the beach to protect the city from future storm surges. By 1905, the wall was 6 miles ling, 17 feet high and

Wednesday, November 27, 2019

Anna Garcia Lab Report Essays

Anna Garcia Lab Report Essays Anna Garcia Lab Report Paper Anna Garcia Lab Report Paper Anna Garcia was found dead in her entry hall way by the police at 9:56 am on the notice from Doug Greene who was worried and called 91 1 at 9:45 am. The suspects were/are Alex Garcia, Eric Piedmont, Doug Greene, and Lucy Lifelong. The evidence supports the case of it being none of them. I have received the suspect list, external autopsy report, and other evidence collected. So far the internal autopsy is needed to confirm any hypotheses and now all thoughts of how Anna Garcia died is only a hypothesis. Summary of Findings: Anna Garcia was found dead at 9:56 am by local police. My findings are that none of the suspects committed any crime related to Anna Garlics death. In support of this, the finger prints, blood analyses, shoe print, hair, and was unknown substance/Aspirin all show that none belonged to anyone but Anna. I believe that a disease or some other foreign pathogen caused her death, the thing that killed her I belief is Ryes syndrome. To support this it is caused by aspirin and when recovering from an illness. It also causes vomiting (was on corpse), irritability and aggression (was reported she was in arguments and fighting with many people), and causes edema (on corpse in ankles). Her body also had a injury on her head were she is thought to have fallen and hit her head, I suspect on the over turned table in the crime scene. Conclusion: In all the findings support Ryes syndrome. The findings are her; blood tests, suspect stories, and fair amounts of information that suggest no person was involved all support that the manner of her death was natural, and not foul play for anyone to get ahead.

Sunday, November 24, 2019

Heat Transfer Essays

Heat Transfer Essays Heat Transfer Essay Heat Transfer Essay The University of Sydney Aerospace, Mechanical and Mechatronic Engineering MECH3260 Thermal Engineering Heat Transfer Quiz 3 2007 Time: 40 minutes Answer ONE question only. Question 1 Consider the cylindrical receiver in a solar thermal power plant shown below. The receiver is made of opaque material and has a diameter D = 8m and length L = 14m. At a particular time, the heliostats direct a concentrated solar flux of q†S = 80 kW/m2 onto the receiver. The ambient air has a temperature T( = 300K and there is no wind. Under these conditions, the surface of the receiver has a temperature of Ts = 700K, an emissivity of ( = 0. and a solar absorptivity (S = 0. 8. i) Calculate the heat loss from the vertical surface of the receiver due to convection. Assume effects of curvature are negligible. ii) Calculate the heat loss from the vertical surface of the receiver due to radiative emission. Neglect irradiation from the surroundings. iii) Determine the collector efficiency. iv) If a wind started to blow, what would happen to the surface temperature of the receiver? Would you expect the collector efficiency to increase, decrease or remain the same? Explain your answers. (Note – assume all other conditions remain the same. ) [pic] Question 2 The roof of a refrigerated truck compartment is of composite construction, consisting of a layer of foamed urethane insulation (t2 = 40mm, ki = 0. 03W/mK) sandwiched between aluminium alloy panels (t1 = 6mm, kp = 200W/mK). The length and width of the roof are L = 12m and W = 4m respectively. The temperature of the refrigerated space within the truck is –15? C. The solar absorptivity and the emissivity of the outer surface are (S = 0. 3 and ( = 0. 7. Consider conditions for which the truck is moving at a speed of V = 90km/h, the air temperature is T( = 30? C and the solar irradiation is GS = 900W/m2. Assume turbulent flow over the entire roof. Take the average convection coefficient on the inner surface of the roof to be 0. 5W/m2K. i) Derive an equation for the average temperature of the outer surface Ts,o in the form and hence show that Ts,o ( 302K = 29? C. Assume a film temperature of 300K and neglect irradiation from surroundings. (No marks if your equation is not in the above form) ii) Determine the corresponding heat load imposed on the refrigeration system. iii) The average convection coefficient assumed for the inner surface of the roof is relatively low. Explain why this is so. [pic] [pic] [pic]

Thursday, November 21, 2019

Dietary and Activity Analysis Assignment Example | Topics and Well Written Essays - 1500 words

Dietary and Activity Analysis - Assignment Example The assignment "Dietary and Activity Analysis" presents the analysis of the author's dietary and activity, his energy intake and output, carbohydrate, alcohol, fat, protein, vitamin/mineral intakes and overall dietary intake based on 3-day average data. The paper contains the analysis of the estimated 3-day average daily expenditure in comparison with the 3-day energy intake. The author talks about the gaining or losing weight recently and if it is consistent with the differences between his energy intake and estimated energy output and his 3-day average daily energy intake. The energy consumed is analyzed during the weekend or weekdays and if it expends more energy on the weekends or weekdays. It is estimated that one should have at least 125 grams of carbohydrates a day and ideally, much more. Therefore the average intake compares with this minimum. The person requires more than 125 grams of carbohydrates per day for the energy supply to the body. The negative consequences of consuming less than this amount on a regular basis because less carbohydrate leads to more weight loss. Also, the percentage of the total calories contributed by carbohydrate based on the 3-day average intake is calculated. It is analyzed if the author's intake in line with the recommendations that 45-65% of the calories in his diet should come from carbohydrate. The grams of fiber consumed based on the 3-day average are also calculated and compared with the recommendation to consume 21-38 grams of dietary fiber/day.

Wednesday, November 20, 2019

Media Analyse Essay Example | Topics and Well Written Essays - 2000 words

Media Analyse - Essay Example It also intends to assess the strength as well as weaknesses of these two communication mediums from the perspective of marketing communication. Compare and Contrast Uses of Facebook and The Economist Current statistical findings suggest that Facebook has a greater influence upon the way people communicate. The main advantage of using Facebook is that it permits the marketers to be in connection with the people all around the day whether they are on their mobile devices, at home or at work, watching TV or shopping with their friends. It is because of this reason that the marketers are capable of generating rich social experiences, develop enduring relationships and enhance the strongest marketing strategies such as Word-Of-Mouth (WOM). Facebook has been one of the medium that permits the companies to learn regarding the customer behaviour having close observations of their actions and by involving with them directly. This social networking site is often considered as one of the best online places to learn about the potential customers and their perception about the company. It becomes easier for the companies to integrate their customers into their product development cycle along with the marketing campaign (Facebook, 2011). It is a well known fact that the magazines are not just read once but are read several times by the readers. The readers often prefer reading most of the pages repeatedly. This is one of the main advantages of print media in comparison to television or radio. It has been revealed from the JICNARS Reader Categorization Study that most of the readers of magazines view the spreads. Thus, the advertisements that the company places are at least viewed by the readers in the process of screening the content of the magazines. There are many evidences which prove that the magazine advertisement has the capability of selling the products (Consterdine, 2005). There have been favourable sales effects of campaigns which are focused upon magazine adverti sing. It is to be remembered that the magazine exposure do not take place at once the issue is published. The impact of the advertisement is basically evident after a week or even a month and therefore the advertisers need to consider these facts so that they can compare ad exposure as well as advertisement effect (Office of Commission, 2006). The weekly news magazine such as The Economist sells quickly because it is well written and covers almost all the issues of the world. It has also been observed that the magazine is aimed at those readers who prefer to remain informed. A good instance of a promotion that includes both consumer as well as business sector is generated by The Economist. There are four main components such as ‘Invoice me’ option, good use of colour, stronger offer and an easy order form that tend to help the marketers to ensure that the advertisements placed on The Economist will perform effectively in comparison to other forms of advertisements in UK (Subscription Strategy, 2006). The main advantage of reading The Economist is that each of the issues intends to discover domestic as well as international issues. It also offers its readers with news relating to science, technology, finance, business and arts. Each article published by The Economist is highly analytical. However, it is most often found

Sunday, November 17, 2019

Question and Quote Essay Example | Topics and Well Written Essays - 500 words

Question and Quote - Essay Example This action is to strengthen the financial structure of the country through the regulation of the individual institutions and the promotion of the interdependence of the financial firms and the participants of the financial system (Morgan Lewis Website, 2009, p.1; US Department of Treasury, 2009) The need for the improvement of the regulation of financial firms had been realized during the latest financial crisis due to the credit boom and housing bubble. This triggered the need for reformation of the financial system (Walker, 2009, p.1). The action of the US government is an immediate response to the need of the nation. There are comments and criticisms on the limitations of the Financial Regulatory Reform. On a personal point of view, the US government made an immediate effort to act upon the financial crisis, thus, it is commendable. This hindered the worsening of the situation. At such a short period of time, alertness had been a crucial strategy. II.

Friday, November 15, 2019

Malware And Exploit Protection

Malware And Exploit Protection In todays modern world of information technology, malware and malware protection is becoming a large part of computer security. To analyse this problem various Internet and academic articles have been studied in order to grasp the main concepts of malware and its impacts on information technology as well as current security protection available in todays market. Introduction The purpose of this report is to give the reader an understanding on the concepts of malware and what technologies are being implemented to prevent unauthorized access of computers and networks. This report will also look into how cyber criminals are able to use a variety of measures to infect computers and networks and why it is necessary to implement various security applications to stop them from accessing data. A brief history on the exploit protection of computers and information systems is also included to provide the reader with a basic understanding of computer security and protection before the Internet was developed into a global fixture. The function of Malware and virus security PG 1 PG 1If a computer is communicating with other devices on a network it can potentially be at risk. Documents and files that are stored in that computer can be exposed to anyone who wants to access them especially if there is no security implemented on that particular device. In recent years the lack of security on Internet applications and web sites has been responsible for hackers entering computer and stealing files and private information. Because the Internet is so large and complex it is becoming increasingly hard to protect computers from malware and viruses. Cyber criminals are able to set up spam and can potentially enter a network through a backdoor or loop hole in the system. These actions can be hard to track and many hackers are not caught due to the fact they are accessing the content from a different location (often in a different country). The concept of malware security has taken huge steps in recent years to prevent computers being vulnerable to attacks. This report w ill focus on how computer security is breached by malware and what security measures are in place to deal with aspects such as anti-malware/virus and spyware protection, spam filters and other password based securities built around Internet applications. The history of security and birth of Malware and Viruses Computer viruses have been in existence long before the modern Internet came about. One of the outbreaks of virus activity was caused by mistake in the late 1980s. In 1987 the Vienna virus was developed, computer specialist Ralph Burger decided to investigate the virus so he got a copy of it and wrote his findings in a book titled Computer Viruses: a high tech disease. His book however caused major problems. Because his analysis was so in depth he ended up telling people how the virus worked and how to write them. As a result people who previously had no knowledge of what computer viruses or malware were now getting a beginners guide on how the process worked. Ralph Burgers book was effectively a guide on how to create viruses and in the years after publication his concepts and findings were still being put to use by cyber criminals who wrote thousands of malware viruses based on his methodologies. PG 2 PG 2The 1990s saw a huge rise in information technology security breach with the introduction of the modern Internet. Major viruses such as the Michelangelo and Melissa viruses saw a new dawn in virus activity and as a result the information technology industry started to take notice. New virus technology such as bots and botnets were beginning to take shape. The introduction of malware saw a huge rise in security breaches especially in home and business environments. For the first time confidential information such as user credentials and private details were being exposed over the Internet. The ability for hackers to trace cookies and monitor network activity in real time started to become a major issue for all internet users. During the mid to late 1990s there were many attempts to put a stop to cyber criminals and malware activities but overall the fact remained that there was no major force that could deal with the increasing problem of computer security and exploit protection. The problem had begun to take effect on national security. Because government agencies had confidential information on computer networks there became a real need to not only protect information on their networks but to protect national security. The U.S in particular became increasingly paranoid about their government agencies and there were a number of cases were their networks had been compromised. In 1998 the U.S attorney general unveiled a $64 million dollar scheme to try and counter cyber criminals and the effects of both Malware and Viruses. A command center was set up to protect all U.S computer systems; the National Infrastructure Protection Center was another major step in internet security in the 1990s. As the Internet continues to grow Internet security is still an extremely important issue. With more and more people using tools such as internet banking and purchasing online items there are now a lot more procedures being put in place to keep these applications secure fro m malware and viruses. Types of Malware and viruses In todays world there are a number of major malware, viruses and bugs that are commonly used to infiltrate Internet applications and computer networks. This section of the report will look at what they are, how they work and what tools are available to counter this kind of criminal activity. PG 3 Viruses A virus is a computer program that is able to replicate itself and infect computer devices. In order for a virus to replicate itself it must first be granted access to execute its code. To make this possible most viruses will try to attach themselves to executable files that are commonly apart of legitimate programs and applications. Viruses can be made to do a number of things including damaging data files, corrupting applications and lowering system performance. Viruses can also be transferred between devices especially if the user has no knowledge of the viruses presence. Commonly USB drives and other forms of memory units will transfer viruses amongst computer devices. What is Malware? Malware is an abbreviated term that stands for malicious software. The main purpose of malware is to spy or damage a computer device. Malware can also include things like tracking cookies, which will allow someone to monitor Internet activity and usage. In todays modern information technology malware encompasses a lot of different types of viruses and exploitation. Spyware As its name suggests spyware is used to spy on a computer or device. Spyware is a form of Malware that performs predominantly the same kind of tasks. It is often used in advertisements known as adware that can be used to track activity on a computer. In recent times spyware has be known to log keystroke activity which enables criminals to gather bank account details and other sensitive data. Worms PG 4A computer worm is able to replicate its self and uses a network to send copies of its self to other devices on a network. Worms are a kind of Malware that can infect a large number of devices on a network, once the worm has been released on a computer it can quickly cause damage over a network. Unlike a virus worms do not need to attach themselves to an executable file. Bots Bots are programs that are capable of taking over a computer. Bots allow the hacker to control a computer from a remote location often starting out as Malware. Cyber criminals will often hide their remote control software attaching to a legitimate source such as a game or application. When the application or game is running they are able to run their software in the background and gain remote access whenever the device is online. Hackers usually try to go unnoticed while implementing bots. In a lot of cases hackers will create a lot of bots and set up botnets (an army of bots) these can then be used to send out spam and other forms of illegal activity. Trojans Trojans (also known as Trojan horse/s) are programs that disguise themselves by doing a legitimate task on a computer. In actual fact the Trojans main purpose is to spy on computer activity and steal information such as credit card details and pin numbers. Once the information has been captured it is then sent back to the cyber criminal who initially set up the Trojan. Trojans are commonly sent as email attachments and are NOT viruses. A Trojan does not infect files or replicate it self like a virus and its main purpose is to go unnoticed within the system. Spam Spam is a type of advertising that is commonly sent to a large scale of computer users. Most spam is developed in the form of get rich schemes, suspicious messages and other forms of advertising that are aimed at tricking the user into releasing credit card details and other information that can benefit the person who sent the spam. Because spam costs the sender next to nothing to send they are able to send it on a large scale increasing their chance of success. PG 5 Current Malware protection Security breaches can come in all forms of illegal activity. These are simply the mainstream problems that occur on a day-to-day basis. There are many more forms of malware that put Internet security to the test and cyber criminals continue to develop new ways of infiltrating computers and networks. So what are some of the current developments put in place to stop malware and other forms of illegal activity? Firewalls The term firewall was fist established by fire fighters. The firewall was a large barrier put in place to prevent the fire from spreading. In computing terms a firewall performs relatively the same task. Essentially a firewall operates by working with a router-based application to make decision of wether to forward packets to a device or wether to drop the packets all together. An easier way to think of a firewall is to imagine a police check point on a road, the cars coming into the checkpoint represent packets being sent across the internet, the police check point represents the firewall as well as the process that is taken to determine if the packet (car) is able to continue to its destination (a network or computer). In other words a firewall is a scan that can detect infected or illegitimate data files or programs before they reach their intended destination. In organizations and businesses a firewall will often be set up on an elected computer that is separated from the rest of the network so that incoming traffic does not have immediate access to the rest of the network. One of the main methods that a firewall uses is screen requests to insure that domain name and internet protocol addresses are genuine. With devices such as PDAs and cell phones, firewalls will allow remote access to certified networks by using password based security measures. Anti Malware/virus software PG 6Anti Malware/virus software applications are used to scan files and eliminate any Malware or viruses that are found on a particular device. Current anti virus applications have come along way in protecting users from malware viruses. Anti virus applications will typically use two forms of scanning procedures to identify malware. The first is analyzing the computer programs and looking for any suspicious activities that are not normally conducted. The second is done by scanning a computer using a malware and virus dictionary this is one of the most effective ways of identifying a security breach. The malware/virus dictionary works by examining a database of known viruses that has been established by that particular anti virus Software Company; it will then scan the computer and try to match any piece of code in its database to the files on a computer. If a match is found then the user will be prompted with a message that gives the user options to deal with the malware and/or virus . For this process to be successful in the long term the malware/virus dictionary needs to be updated on a regular basis to keep up with newly written viruses being developed by hackers and cyber criminals. This is the main reason that anti malware/virus software applications will prompt users to update on a regular basis. Anti-spyware based applications work with the same method of spyware dictionary scanning. Spam filters PG 7In todays modern Internet spam is always a constant threat to computer security for users worldwide and will often contain malware viruses. Although most people will ignore spam a small amount of users get sucked in to spammers advertising schemes. Because spammers are sending out thousands of spam based messages at a time they can easily profit from a couple of over trusting users and because spam is cheap to develop there is always a market for them. In past years users would receive hundreds of messages a day by spammers and trying to sift through emails to find a legitimate message proved to be a daunting task for users. For this reason spam filters were introduced. Spam filters work by using a number of procedures. The first is a language-based filter; these are the easiest procedures for a spam filter to implement. The filter will simply scan through emails and remove any that are not in the native language of the user. Settings for this can obviously be changed if a user i s working in a foreign country, the user can simply enable the languages that they would like to receive by changing the settings of the filter. Content spam filters use a complex set of rules to evaluate messages that are likely to be spam-based advertising. The spam is redirected into a spam folder that can later be deleted by the user. This is one of the most effective approaches to countering spammers however on occasion it can result in legitimate emails being sent to spam folders due to a user request of an advertising promotions or news letters. User spam filters can be the most effective filters if used properly. They require the user to input a set of rules for the filter to follow, although this can be an effective method it can be time consuming and is not the easiest tool for users to use. Conclusion Overall there are a lot of security measures that can be implemented to protect computers and networks form malware. Most security measures that are available to users are aimed at protecting computers from malware, adware, spam and various types of common viruses. Although there are a lot of companies providing these services cyber criminals are always looking for new ways to get around firewalls and anti virus software and on some occasions they are successful. Because there are so many hackers and spammers around the globe new ways of getting around these barriers are frequently being developed and catching them can be very difficult. However if users take the appropriate steps such as installing firewalls and anti malware/virus software they will be less likely to fall prey to cyber criminals. PG 8

Tuesday, November 12, 2019

Mobile Phone Security

This fact sheet has been developed for the Consumer Education Program by the Communications Commission of Kenya. It was compiled by studying material from various authoritative sources and adopting what Is universally acceptable and relevant to the Kenya situation. The fact sheet is intended to enable Consumers have a good understanding of the issues discussed and hence empower them when making decisions regarding CIT products and services. Introduction One of the biggest threats that a mobile phone user faces today Is loss or theft of the phone.Not only Is the mobile valued as a physical device, the phone may contain personal and financial data stored in the handset or in the phones subscriber identity module (SIMI card). While a stolen SIMI can be barred by a mobile network once the theft has been reported it Is a bit harder to bar the handset from being used with different SIMI card. Unless the user had protected his personal Information with a PIN prior to the theft or loss of th e phone, this data can be accessed by unauthorized persons. Mobile phone users normally store a wide range of information on their phones.This information can either be stored in the phone's Internal or external memory (depending on the make and model of the phone) or In the SIMI card. The SIMI card Is used mainly to store contacts and short messages while the phone's memory is used to store information such as personal photos, emails, and calendar items. In order to prevent unauthorized persons from using the phone and further gaining access to the stored Information, some mobile phones have security features which the user can activate. This fact sheet has been developed to address security of the information stored and what to do should you lose the phone.Securing the information stored. There are at least two methods one can use to secure the Information stored on a mobile phone. These are: a) SIMI lock This method takes advantage of the SIMI card as a storage element to secure private Information associated with the subscriber. The subscriber uses a PIN number which is mostly a four digit code which should only be known to him and is always prompted by the mobile phone every time the SIMI card is inserted into the phone. It Is an effective method since even If the subscriber looses the SIMI card the other person cannot access any information stored on it. Phone lock Mobile phone security This method takes advantage of a password to lock the mobile phone such that access to the phone's functions can only be permitted upon input of the correct password. An eight-digit code is more secure than a four-digit code. Most phones also have an inbuilt an automatic phone lock system which kicks In after a stipulated time period e. G. 30 seconds when activated which Is mostly used as a keypad lock and subscribers are advised to take advantage of this features to enhance the security setting AT tenet phones. N more nana el n a evolves Delve capable AT achieving emails , security especially of corporate email with sensitive internal and external data has become a major concern. This means that mobile handsets hold data which previously only resided in computers. Since this method is more effective and protects more information than the first, subscribers are advised to always lock their phones especially if they hold any sensitive information. Safeguarding your Handset Some of the ways to keep your mobile safe include: ; ; ; Keep your phone safe and out of sight.Only give your number to your friends and people you trust. Avoid using your phone in the street. If you need to call someone in a public place, be discrete and be somewhere where you can see what is happening around you. Use a PIN code to lock your phone. If you're walking alone put your phone on silent or vibrate mode so your ring tone doesn't draw attention to you. Be alert while walking and testing at the same time. Security-mark your phone with a unique code. The best place is underne ath the battery.Many mobile phones are stolen in public places such as cinemas, pubs and nightclubs, especially when they are left on a bar, table or on a seat, so don't leave your phone in such places unattended. Don't leave your phone unattended in a car – if you must, put it out of sight and turn it off or switch to silent mode. It takes seconds for a thief to smash a window and enter a car. For a Bluetooth or Wi-If enabled phone install antivirus software to help guard against harmful programs or viruses. For the sake of the safety of very young children; always keep the phone out of their reach.Avoid making easily identifiable entries in the phone e. G. ‘mum' or ‘dad' for the security of such persons should the phone be lost. There are other methods of securing your phone that are dependent on the genealogy that the phone is based on. The two main technologies used for the provision of mobile services are GSM (Global System for Mobile Communications) and CDMA (Code Division Multiple Access). Phones based on these two technologies connect to their respective networks differently, so the security features differ slightly. Mobile phone security Your GSM Phone's Unique Equipment Identification Number Each GSM mobile phone has a unique electronic serial number called the MIME (International Mobile Equipment Identification) number, which can be identified by the GSM network. It is a 15-digit number programmed into the handset and also written is at the back of the handset, under the battery. On most GSM handsets, it can De Oligopoly on ten managers screen Day pressing ten Key sequence using the keypad, when the phone is switched on.Upon purchase of a mobile handset, users are advised to record their MIME number for use in case the mobile phone is lost or stolen. Your mobile phone service provider can liaise with the police regarding a lost or stolen handset and, if found, your handset will be identified using the MIME. Thieves are deterred fr om stealing mobile phones by MIME blocking. Blocking an MIME on a mobile phone network prevents a GSM mobile phone from being used with any SIMI on any Kenya GSM network. Mobile carriers are able to block the use of customers' lost or stolen mobile phones and unblock recovered mobile phones on their network.They have also agreed to exchange their lists of blocked and unblocked MIME numbers with other mobile carriers so these can also be processed (blocked/unblocked) on all mobile networks. The CDMA phone unique electronic identification number CDMA phones also have a unique electronic identification number, the Electronic Serial Number (SENSE). This number can be found on the back of the CDMA handset under the battery and usually has eight digits, combining letters and numbers. Users are advised tap record this number for identification purposes in case the phone is lost or stolen.Hidden battery power Some mobile phones are designed to reserve battery power. If the cell battery is v ery low and the user is expecting an important call or is confronted by an emergency situation, and doesn't have a charger at that moment, one can activate this reserve battery power. To activate, press the keys *3370#, the cell phone will restart with this serve and the instrument will show a significant increase in battery power. This reserve will get replenished the next time one charges their cell phone.However it should be noted that this only works on some phones. What to do if one's mobile handset is lost or stolen If the user's mobile phone is lost or stolen, the user is advised to contact their mobile phone service provider immediately to suspend service and prevent unauthorized calls being made and billed to the user. If one has a GSM mobile phone, the provider will 3 Mobile phone security block the subscriber's SIMI card and MIME number to prevent heir phone from being used on all Kenya mobile networks.

Sunday, November 10, 2019

Eulogy for Fritz Haber

â€Å"During peace time a scientist belongs to the world, but during war time he belongs to his country†-Fritz Haber Here lies the ashes of the famous chemist Fritz Haber and his first wife Clara. Fritz had a heart attack and managed to recover, but not fully. He died of heart failure on January 29, 1934 at the age of 65. This â€Å"Father of Chemical Warfare† is known for developing and deploying chlorine and other poisonous gases, the development of gas masks with absorbent filters, and trench warfare in World War 1.Even though he was too old to enlist in military service, this scientist was given the rank of captain. He was most known for the Haber process (the reaction of nitrogen fixation to industrially produce ammonia), the Haber-Weiss reaction (a reaction in cells that creates oxidative stress), and the development of several fertilizers and explosives. He was also given the Nobel Peace Prize in 1918 for synthesizing ammonia for fertilizers and explosives. In 18 98 Haber published a textbook on Electrochemistry, which was based on some lectures he gave.In 1905 he had published his book on the thermodynamics of technical gas reactions, in which he recorded the production of small amounts of ammonia from N2 and H2 at a temperature of 1000 ° C with the help of iron as a catalyst. This German chemist was proud of his work even when no one, including his family, stood with him. Clara and his first son later committed suicide because of the shame in what Haber did in chemical warfare, but even the lack of faith in his family didn’t slow him down. He will be dearly missed, but always remembered.

Friday, November 8, 2019

Transitioning from Nonfiction to Fiction Writing

Transitioning from Nonfiction to Fiction Writing First of all, it is possible. Ernest Hemingway and William Kennedy moved from journalism; Sue Monk Kidd from memoir; and C. S. Lewis from essays and treatises. Sue Monk Kidd states that the most frequently-asked question on her book tours is, â€Å"How did you go from nonfiction to fiction?† Here are some tips and support to help you make the transition: You need to transition your reading, as well. Read your most-admired authors and new fiction authors also. Remember, C.S. Lewis says good readers read a piece more than once. Have a plan. Stagger your writing. Perhaps write fiction and nonfiction on alternate days. Or, write your fiction first, then go back to the nonfiction you’re more comfortable with once you’ve met your word count in the other. Writing fiction is a discipline for which you have been well-trained through your nonfiction deadlines. Produce five to ten pages a day faithfully! Try flash fiction first. Because it is short, it is easier to start with and there are numerous contests listed in FundsforWriters newsletter. Your nonfiction themes can find a home in your fiction. For instance, C. S. Lewis’ themes concerned Christianity which he incorporated into his fiction (Chronicles of Narnia) without being didactic or preachy. The skill sets you have developed while writing nonfiction will serve you well in fiction also. These include: 1) Attention to detail. Your descriptions of the who, what, where, why and how will help you in plotting fiction and in description. 2) Interviewing. Interview your characters on what they think about - religion, politics or an event - just as you would a source. 3) Sense of place. Your knowledge of a place garnered from nonfiction can serve you well in fiction. William Kennedy reported on Albany, NY first for the Albany Times Union and then set his cycle of Albany novels there. Readers always want to see a place with which they are familiar portrayed accurately, and your nonfiction experience of place sets you apart. 4) Journal Writing. Your journal or dream journal writing can help with both plot and productivity. This angle also falls in the category of â€Å"write what you know.† 5) Research. Nonfiction research is helpful to fiction. You’ll get that time or place right, but William Kennedy talks about the danger of research: â€Å"And so I got hooked on research, couldn’t get out from under the library’s microfilm machine until I finally realized I was doing myself a great disservice; because your imagination can’t absorb all that new material and synthesize it easily.â€Å" Finally, William Kennedy describes the difference between nonfiction and fiction: â€Å"But the journalist must report on life objectively, and the novelist must reinvent life utterly, and the work has to come up from below instead of down from the top as a journalist receives it. But experience alone will produce only commonplace novels. The real work is a blend of imagination and language.† Source for quotes: Allen, Douglas and Mona Simpson, â€Å"William Kennedy: The Art of Fiction 111,† Paris Review, Winter, 1989.

Wednesday, November 6, 2019

Rise of a Tyrant, Hitler and the Holocaust Essays

Rise of a Tyrant, Hitler and the Holocaust Essays Rise of a Tyrant, Hitler and the Holocaust Essay Rise of a Tyrant, Hitler and the Holocaust Essay Rise of a Tyrant, Hitler and the Holocaust BY oliver2017284 Rise of the Tyrant, Hitler and the Holocaust Germany was in utter chaos due to hyperinflation, Joblessness, and humiliation prompted by the Treaty of Versailles leading to a demoralized and dire state. During this crisis, Adolf Hitler, an unknown though high-ranking German soldier of World War l, saw firsthand how his country fought and made sacrifices again and again only to face defeat in the end. Hitler conveniently assigned blame on the innocent Jewish people. l will never be able to go back to Sweden without knowing inside myself that Id done all a man could do to save as many Jews as possible. (Raoul Wallenberg), Letters and Dispatches 1924-1944. Raoul Wallenberg, a Swedish diplomat and a humanitarian, saved over one hundred thousand Jews in Nazi occupied Hungary during the Holocaust and the later stages of World War II. Raoul Wallenberg witnessed horrific inhumane acts committed by Hitler and his Nazi army spurred by Hitlers ambitions, his effective use of propaganda creating one of worlds worst human tragedies the Holocaust, and his scapegoat of the Jewish people. Hitler wanted to restore Germany to its former glory and eliminate the aftermath of the Treaty of Versailles. With the Treaty of Versailles put into place after WWII, Germany was forced to pay harsh reparations and give-up German colonies. Hitler took advantage of Germanys instability to advocate his vision of a pure German state, which also helped solidify his gain for power. Germanys economy was in severe recession and that made Hitlers power rise immensely because he was able to pinpoint the concerns of the masses. He put in place a social hierarchy where the Aryans were placed at the top and the Slavs, Jews, and the homosexuals placed at the bottom. He advocated one strong leader was needed to help lead this movement for a stronger Germany. In his mind, the Jews were the culprit and could not be trusted. The struggle for world domination will be fought entirely between us, between Germans and Jews. All else is facade and illusion. Behind England stands Israel, and behind France, and behind the United States. Even when we have driven the Jew out of Germany, he remains our world enemy. (Adolf Hitler) declared in 1927. He wanted to transform himself into a dominant leader and gain power by sacrificing the Jewish people. Therefore, Hitler was eager to create this imagined utopia where Germany was a country consisting of a single race, absolutely no Jews, and no physically or mentally impaired people and transforming it into a world power once again. To gain power, propaganda was heavily used to brainwash the masses and spread anti-Semitism to help him gain the status of the Fuhrer a tyrannical leader. Hitler even created a special name for the Jews, Untermenschen the sub-humans. Discrimination against the Jews quickly spread as time passed under the reign of Hitler. It is a small, rootless, international clique that is turning the people against each other that does not want them to conduct peace. (Adolf Hitler) speaks in 1929. personal biases and opted to tarnish the Jewish legitimacy. Hitler conveyed to his people that the Jewish had no permanent country of origin, and therefore they had no loyalty to Germany either. He also manipulated the masses by dehumanizing the Jewish people. Nazi thugs forbid Germans from going into Jewish shops, banks, and ffices, but unfortunately for Hitler, most Germans initially ignored his mission. Hitler did not expect his power to be condoned by his peers, what he wanted was his rules to have impact and widespread by the use of force and violence. His hunger for power soon led him to be a malicious and tyrannical leader. Hitler started to distinguish the hierarchies by creating symbols and signs to distinguish the Jews from the rest. Jewish people had their Jewish star sign pinned on their Jacket, and they werent allowed in certain places such as theaters, swimming pools, and resorts. On the other hand, people that wore the Swastika were feared but respected. Furthermore, what the soldiers accomplished were all part of Hitlers propaganda plans. As Germany dominated Austria, Poland, and countries around Czechoslovakia, Hitler attempted to eliminate the Jewish race completely by building concentration camps. The Nazis filled the concentration camps with Jewish captives and slowly eradicated them. They eliminated woman, children, and elders because of their physical limitations . Germans also forced the men and teens to labor for long hours. Hitler wanted to make use of the Jewish people efficiently, so he made them do harsh physical labor that no one else was willing to do. The Nazis committed mass murders after they felt the Jews work was done. Hitler thought about the limiting factors such as the food source, so he fgured the best way was to kill them all. Hitler used methods such as mass open-air shootings, gas chambers, forced to work until death, and death marches. Hitler anticipated many ways to get rid of the Jews as fast as possible. One of his well known and cruel ways was to use gas chemicals to poison the Jews. Almost 6 million Jews were murdered during the Holocaust and that was two-thirds of the Jews in Europe at the time. 1. 1 million children were killed during the Holocaust. His inhumane actions clearly brought the attention of the outside world. Germans were extremely powerful and advanced, they started to expand their army and reached for the Soviet Union. However their aggressive and quick expansion exhausted their own supplies. (Lucy Li) Hitlers troops were exhausted, millions dead or captured, and with the fall of the Romanian oil fields, German armies were running out of gasoline. Soon they dropped from the peak to the pit bottom by an attack from other countries such as the United States. During Hitlers reign, hundreds of thousands of Jews were sent into concentration camps. Wallenberg took on a humanitarian mission to save around one hundred Jews. Hitlers inhumane act to gain power was completely unforgiving and needs to be prevented at all cost in the future. Hitler exchanged 5. 7 million Jewish people for the sake of his own power and selfish dream. Therefore, this dark part of history should never happen again for the sake of humankind.

Sunday, November 3, 2019

Affirmative Action Policies Essay Example | Topics and Well Written Essays - 2000 words

Affirmative Action Policies - Essay Example As such, matters related to sharing, equality, and fairness are of paramount importance and frequently give rise to need for mechanisms for addressing implications that come along with these mechanisms. Affirmative action traces its roots back in the Reconstruction Era whereby after slaves attained freedom, they had nothing else apart from small skills that could use to earn a living2. As a result, the victorious General T. Sherman set forth a proposal that was to divide the land and goods of the Southeastern Georgia into sizeable proportions and give the freed family 40 acres of land and a mule in order to begin their lives3. This move attracted a huge level of opposition from the sitting clergy. However, almost a century later, this issue of affirmative action has come back to haunt opponents of this policy. Today, the lawful society of the United States recognizes the idea of assisting individuals of minority decency to gain access to American goods. This came via a series of poli tical initiatives and court proceedings that interpreted all the requirements of the civil rights just as provided in the Fourteenth Amendment 4. These initiatives, as well as court decisions, came into books as affirmative action. As the term itself suggests, it is both voluntary and mandatory in that it intends to affirm civically recognized rights of the designated classes of people by employing a positive action in order to protect these individuals from the rampant, all round, and pervasive incidents of discrimination in America. Sources indicate that affirmative action developed about four decades ago following the debate between the Board of Education and Brown5. In terms of Brown, the Supreme Court opined that children of minority races faced segregation and discrimination in areas of education. This fact denied these children equal education opportunities and rejected the doctrine that asserted â€Å"separate but equal† within the public schools6. Following increased cases of discrimination and victorious wins in wars like the Vietnam War, men and women of minority groups intensified their fight for equal rights. These members were able to integrate change in the nation’s existing laws and attained collective address in the Fourteenth Amendment. Following the success of affirmative action, members of the minority groups attained places in the employment and education sector. As the focus of this paper ascertains, changes in both the graduate and undergraduate programs in the US grew due to increased criticism from whites and men who claimed that the policies of affirmative action brought about something they termed as the â€Å"reverse discrimination†. To ensure, successful integration of affirmative action policies in undergraduate and graduate programs, the Court acted before business legislatures and executives and mandated coalition of positive actions in these programs7. As a matter of course, the Court set in place a number of devices that integrated and fostered indiscriminative measures towards students from minority backgrounds. These devices included majority to minority transfers, redistricting, new construction, magnet schools, school pairings, abandonment of all blacks’ schools, and busing. Investigations highlight that implications related to affirmative action particularly when compared to race consciousness and race blind admissions give explanations as to how alternative programs are impractical in general. With reference to a number of discussions, selections that base solely on academia qualifications such as the Medical College Admissions Test and Grade Point Averages

Friday, November 1, 2019

Humorous exhumation hypocrisy in Moliere's Tartuffe Essay

Humorous exhumation hypocrisy in Moliere's Tartuffe - Essay Example For an instance, the US involvement in the Iraq War can be described satirically as following: Mr. Bush, the President, along with his whole Army led an enterprise in Iraq to beat in the bush. But what he got there ultimately kept him busy with beating about the bush in America. Finally, the innocent Americans with blood-washed hands raised their voice: â€Å"Mr. Bush! Will you please stop beating around the bush? Now It is time to hear about the truth!† The salient ingredients of satire are humor, criticism and moral tone. The object of satire can be any foul and objectionable idea, concept and practice in either an individual or a group. The main literary tool of satire is the use of both sarcastic and mild ironies, sarcasm, exaggeration, etc. But sarcastic satires often pivot on bitterly cynical denunciation that tends to injure its intellectual brilliance. For example, if one says, â€Å"Once upon a time, in Iraq the Americans would chop the tender Iraqi boys and girls and prepared the dishes for the leaders†. This line is not satirical; rather it is sarcastic because it lacks humor as well as wit. Yet a satire can refer to some socially acknowledged taboos such as obscene sexuality, invectives against religion, etc. Griffin Dustin defines satire as following: Satire is a wit contest, a kind of game in which the participants do their worst for the pleasure of themselves and their spectators. . . . If the exchange of insults is serious on one side, playful on the other, the satiric element is reduced. (Dustin 23) Indeed a satire attacks foolishness, follies, vices, wrongs, etc by making fun of them wittily. Moliere’s â€Å"Tartuffe† is such a successful satire that humorously criticizes the religious hypocrisy during the latter half of the Seventeenth Century. Moliere has declared the moral purpose of the play in bold line in the preface of the play: â€Å"distinguish clearly the character of the hypocrite from that of the truly devout man† (Moliere 2). On the surface level, he depicts Tartuffe as a devoutly religious character. But the underlying message of the play is that Tartuffe is ultimately a fraud under the religious apparel. Obviously in the play, the object of his satire is to criticize the late seventeenth century religious hypocrisy with humor and wit. The most remarkable passage that is significant for its role in the satire as a whole is as following: Your husband? Why concern about that rube? He drinks in every story like a boob! If he caught us, en flagra nte, that dull lout, He'd offer up to God a joyful shout! And even when he realized, that clown, He'd chastise you, be careful of your gown! (Act IV Scene V) This passage -in fact, one of Tartuffe’s speeches- is the most precious part of the satire as a whole. Its satirical role is double-folds. On one hand, it exhumes the filthy nature of Tartuffe before his most devout follower, Oregon, who is hiding beneath the table. Indeed such exhumation of Tartuffe’s fraudulence before his most obedient devotee significantly refers to the witty and humorous exhumation of the hypocrisy of Moliere’s contemporary religious institution. On the other hand, it criticizes the blind faith of Oregon, generally the commoners while evoking the convulsion of laughter of the audience. Obviously Oregon stands for the death of common sense that is an essential part of a satire. At the beginning of the play he has been fooled by Tartuffe and remains befooled till this episode. Therefore this passage also contains the moral and pedagogic part of Moliere’s satire. Here Moliere opens Oregon’s as well as the audience’s eyes. In this passage, it is as clear as broad daylight to both Oregon and the

Wednesday, October 30, 2019

Using a modified social story to decrease disruptive behavior of a Article

Using a modified social story to decrease disruptive behavior of a child with autism - Article Example There are different methods to using Social Stories, each having their own strengths and weaknesses when used with children. As children with autism are mostly visual learners, various mediums can be used when doing the Social Stories. In some examples, multimedia was used, though the effects of this method were inconclusive, as were many other methods in Social Stories. Just as each child is different in their autism, they will also be different in how they approach and take heed to the Social Stories. While, during the research, the behaviors of these children have decreased, there is still no definitive "one method" that works best. Each child will need to have their own individual Social Stories methods if teachers, parents, and researchers alike want to see any changes in their behavior. The use of verbal reminders throughout the sessions, though, proved to have more of an effective in quickly discouraging misbehavior, as shown through a study by Ivey et al. (2004). However, this method of verbal repetition might not work as well in other methods of the Social Stories, and may not be as effective on children with autism as a whole. Again, what works best for each child depends solely on each child. The use of Social Stories seems to me to be a promising method of instilling in autistic children the proper behavior to use in a social setting, such as in a classroom. Various methods have been tested and have been proven to work and be beneficial to a childs life and education. Unfortunately, as there are many autistic children, there must be equally as many methods of Social Stories, since each child is different in their learning and comprehending, though they do share the common aspect of being visual learners. It is obvious that the Social Stories methods do work, it is just a matter of deciding which method works best for which autistic child. The use of verbal prompts and reminders has shown to be most effective, so

Monday, October 28, 2019

Are Imf Loans Good Poor Countires Essay Example for Free

Are Imf Loans Good Poor Countires Essay A poor country with a weak government is suffering from shortages in terms of financial resources. Most of its population lives below poverty levels, there is high unemployment, low literacy rate, food shortages, no clean water and due to a combination of drought and lack of technology, no crops to export. As if it didn’t have enough problems, the country has debts to pay back to foreign governments, investors and agencies. This is where the IMF, which Easterly calls ‘the world’s most powerful creditor’, steps into the picture. [1] It was originally set up by the West in order to prevent large trade imbalances and unstable currencies. However, it shifted focus and started bailing out poor countries in financial crises. It has had success in helping countries out on a short-term basis. Most of the countries that have benefited from IMF loans are countries that need temporary assistance, do not qualify as ‘emerging markets’ and face difficulties in attracting foreign investors and lenders. For example, the IMF successfully helped South Korea and Thailand during their financial squeezes in the 1980’s[2] . However, there are problems in terms of the long-term development of countries which rely on the IMF. Easterly begins his article by describing a meeting between the IMF and the minister of finance and economic development of Ethiopia. At the meeting, the IMF set out several conditions that the government of Ethiopia would have to satisfy in order to receive assistance and most importantly, pay back their loans. The problem with the conditions was that they were at times contradictory and unrealistic. For example, while stating that it supported the government’s food security program, the IMF also told the finance minister that he would have to be careful that the program did not endanger ‘macroeconomic stability’.[3] How macroeconomic stability could be achieved in a country where most of the people are starving is a mystery. Other conditions that the IMF places on countries include getting them to agree to financial programs which reduce government spending and inflation, limit excessive money printing, increase taxes and put in place austerity measures. Through such strict conditions, the IMF has therefore accomplished very little when it comes to promoting long-term development. The conditions have been too intrusive into government policies. Easterly argues therefore that there is an association between â€Å"IMF involvement and the most extreme political event: state collapse†.[4] This is caused by the involvement of the fund in domestic politics. By ‘forcing’ governments to carry out social cuts such as reducing subsidies on basic goods, the proposed IMF measures create riots and political and social instability. The article demonstrates that out of 8 countries that collapsed or failed, 7 had spent a high share of time ranging from 46 to 74 % of the decade before the collapse on IMF programs. This shows that the IMF measures are often too difficult to comply with and their ultimate success is limited. The author therefore suggests that the countries that ultimately collapsed would have probably been better off without IMF involvement.[5] This is because such countries have far greater problems than the IMF can fix. However, despite this, the IMF never turns a country down even if it fails its programs several times. The author gives the example of Sierra Leone which went into civil war after participating in an IMF program and then returned into the program and failed again, this time requiring UN intervention to protect its population from genocide. He suggests therefore that the IMF should have left it alone in the first place and not intervened. Trying to help was according to Easterly, clear evidence of the ’Planner’s mentality’.[6] However, one might ask what would happen if the IMF did not intervene in such a case? Easterly ´s suggestion of leaving the country alone would lead to the struggles of the people being ignored, genocide would occur and the country would sink into further poverty. The result would be over-reliance on aid, more refugees escaping to struggling neighbouring countries and a low literacy rate which would affect future generations. Perhaps therefore the solution is not for the IMF to turn a blind eye to countries that fail despite decades of following IMF programs. Perhaps the solution is for it to change its strategy and program in order to tailor it to the unique needs of each country. Easterly mentions this as well. He states that not only do the staff at the IMF operate a  ´one size fits all ´ model to all countries, their accounting relies on shaky numbers as evidenced in page 22 of the article. Thus Easterly argues that it is better for a country’s balance to bounce than for it to rely on shaky statistics by the IMF which do not reflect reality. Very little can be achieved if unrealistic goals are set for countries and if their achievements or failings are not measured accurately. Thus IMF loans do not work in the majority of cases. They may only work where a country has some form of reliable government and does not already have many loans to pay back. Getting an IMF loan in such a case is just a temporary measure and the country can pay back without great consequences. In relation to the most poor however, their problems persist so they renew their loans from one change of government to another with little or no prospect of being able to pay back. The IMF stipulates in all its agreements with countries that they need to pay it back before they pay other creditors. However, Easterly argues that by making such a condition, the IMF is actually bailing itself out.[7] It ends up in a situation where it provides new loans to countries so that they can pay it back for old loans. It also drafts the World Bank in to make an adjustment loan as part of the bailout package. This is to no benefit to the country which sinks deeper into the debt to the IMF and still has other loans from other investors to pay back. The IMF calls countries that are dependent on its loans ‘prolonged users’. The definition of a prolonged user is a country which spent 7 out of a 10 year period under an IMF program. The addiction to IMF loans is evidenced by the fact that 44 countries qualify for the definition of prolonged user and half of IMF lending goes to such countries.[8] However, repeated debts do nothing to solve the problem. In1996, the IMF and World Bank decided to forgive part of their loans to the poorest nations. These nations had accumulated loans from not only these organisations but also loans from western countries and other agencies. There was very little chance of them being able to repay the loans and the interest that had accumulated. Such countries were named heavily indebted poor countries (HIPCs).[9] 17 out of 18 of the HIPCs were among the countries receiving above average amounts of IMF and World Bank loans. They had no growth of income or resources. They continued to sink into debt with interest still growing. The forgiving of the debts over a period according to Easterly, only encouraged borrowers to keep borrowing. For example Bolivia and other countries got 100 percent debt relief, but they still made no recovery.[10] Another example is offered by the Argentina disaster set out in the article. Argentina was a star pupil from 1991 to 1999.[11] It had gone through several IMF programs and in 1991, it achieved financial stability. After almost a decade of financial stability, the president who was faced with elections led the wave of public spending and loans from private foreign investors. Financial crisis ensued and the IMF put together a rescue loan plan that included loans from the World Bank, Inter-American development Bank and Spain. In 2001 lenders demanded interest rates from Argentina that were 10 percent higher than elsewhere. The IMF continued to give loans worth several billions to support Argentina so that it could pay its private creditors. However, despite this, Argentina failed to pay any of its creditors back their full amount. Its debt reached 81 billion dollars and it eventually had to make ’take it or leave it offers’ to its creditors who had to accept not getting most of their money back. This supports the argument that loans on their own are not the solution to the poor countries’ problem. They need help to resolve their unique political and social problems. Putting them in debt is not going to assist them as whatever progress they make, they will have to give the money back. Easterly concludes therefore that the world bank which is an aid agency should give countries grants not loans. And the IMF should get out of the business of bailing countries out. It has inadequate knowledge of what is happening at ground level and it was not designed to offer the kind of assistance that poor countries need and the long-term planning their needs require. Thus it would be better for aid agencies to continue their work at grass-root level and to contribute to long-term change.

Saturday, October 26, 2019

Near-Drowning in Pediatric Patients Essay -- Nursing, Health Care

Introduction There are an estimated 8,000 deaths per year in the United States from drowning. Near-drowning occurs anywhere from 2-20 times more frequently (for estimated 16,000-160,000 events per year)7. The definitions for drowning and near-drowning have for the longest time been very confusing to understand. Recent health officials have attempted to resolve some of this confusion by redefining drowning as â€Å"the process of experiencing respiratory insufficiency or difficulty following a submersion or immersion in a body of liquid.† Near-drowning has also been redefined as â€Å"survival from a drowning event which involved impaired consciousness or water inhalation for 24 hours or more†2. Both near drowning and near-drowning occur when someone experiences a submersion event. A submersion event is when someone, in this case a pediatric patient, experiences an unexpected submersion in water. When an unexpected submersion, regardless of water type (salt or fresh) occurs, the ind ividual experiences breath hold, panic, and a struggle to resurface1. Humans, naturally, can only hold their breath for a short period of time. This prolonged breath hold results in hypoxia and eventually leads to involuntary gasping. As the individual attempts to gasp for air they sometimes aspirate7. This paper will attempt to look at the clinical presentation of a near-drowning patient who has suffered from a submersion event. Research It was previously thought that the type of water aspirated posed a serious threat to the patient and drastically increased their chance of mortality. In particular, salt water was thought to be one of the more potent types of water to aspirate due to it’s tonicity. This previous thought that salt water was more harmful to... ...01. 4. Oehmichen, M, Hennig, R, and Meissner, C (2007). Near-drowning and clinical laboratory changes. Legal Medicine;10:1-5. 5. Gregorakos, L, Markou, N, Psalida, V, Kanakaki, M, Alexopoulou, A, Sotiriou, E, Damianos, A, Myrianthefs, P (2009). Near-drowning: clinical course of lung injury in adults. Acute Lung Injury;187:93-97. 6. Beeck, EF, Branche, CM, Szpilman, D, Modell, JH, and Bierens, JJ (2005). A new definition of drowning: towards documentation and prevention of a global public health problem. World Health Organization;83(11):853-856. 7. Ender, PT, and Dolan, MJ (1997). Pneumonia Associated with Near-Drowning. Clinical Infectious Diseases;25:896-907. 8. Leroy, P, Smismans, A, and Seute, T (2006). Invasive pulmonary and central nervous system aspergillosis after near-drowning of a child: case report and review of literature. Pediatrics;118(2):509-513.

Thursday, October 24, 2019

Budget and Budgeting Techniques Essay

Answer- 1: Answer- 1 India was a closed economy in the beginning. Policy banning imports. The Liberalization of India’s Government in 1991. New Industrial Policy. Strict policies regarding the entry of foreign brands. Trade rules & regulations simplified. Foreign investment increased. Pepsi enters in 1986. Coca-Cola follows in 1993. Contd †¦ Slide 14: Unlawful to market under their Western name in India Pepsi became â€Å"Lehar Pepsi†. Coca-Cola merged with Parle and became â€Å"Coca-Cola India†. Different Laws for Pepsi and Coke Coca-Cola agreed to sell off 49% of its stock as a condition of entering and buying out an Indian company. Pepsi entered earlier, and was not subject to this. Contd †¦ Slide 15: India forced Coke to sell 49% of its equity to Indian investors in 2002. Coke asked for a second extension that would delay it until 2007 which was denied. Pepsi was held to this since they entered India in a different year. Coke asked the Foreign Investment Promotion Board to block the votes of the Indian shareholders who would control 49% of Coke. Change in oversight of the FIPB: Past lobbying efforts made useless. Contd †¦ Slide 16: Could these problems have been forecasted prior to market entry? Probably not Inconsistent, and changing government. How could these developments in the political arena have been handled differently? Coke could of agreed to start new bottling plants instead of buying out Parle, and thus wouldn’t of had to agree to sell 49% of their equity. Answer-2: Answer-2 Coca-Cola’s Pros & Cons of Timing of Entry in the Indian Market: Coca-Cola’s P ros & Cons of Timing of Entry in the Indian Market Benefits Parle offered its bottling plants in 4 major cities. Made its return to India with Britannia Industries India Ltd. Disadvantages Rigid Rules and Regulations. Buying of bottling plants leads to 49% disinvestment. Local demand of carbonated drinks is as very low. Harder to establish themselves. Pepsi’s Pros & Cons of Timing of Entry in the Indian Market: Pepsi’s Pros &  Cons of Timing of Entry in the Indian Market Benefits Own set up green filled bottling plants. Advantage of coming before Coca Cola. Government policies favored the company. Joint venture with Volta’s and Punjab Agro. Gained 26% share by 1993. Disadvantages Pepsi approached Parle but it was rejected. Launched 7up and there is stiff competition in the market for lemon drinks. Answer-3 Responses to India’s Enormity : Answer-3 Responses to India’s Enormity Pepsi and coca-cola responded in many ways to the enormity of India in terms of it population and geography. Conti .. Cont..: Cont.. Product Policies: Catering to Indian tastes Entering with products close to those already available in India such as colas, fruit drinks, carbonated waters Waiting to introduce American type drinks Coca-Cola introducing Sprite recently Introducing new products Bottled water Conti .. Cont.. : Cont.. Promotional Activities: Both advertise and use promotional material at Navratri . Pepsi gives away premium rice and candy with Pepsi Coca-Cola offers free passes, Coke giveaways as well as vacations Use of different campaigns for different areas of India â€Å" India A† campaigns try to appeal to young urbanites â€Å" India B† campaigns try to appeal to rural areas Cont†¦: Cont†¦ Pricing Policies: Pepsi started out with an aggressive pricing policy to try to get immediate market share from Indian competitors Coca-Cola cut its prices by 15-25% in 2003 Attempt to encourage consumption to try to compete with Pepsi and gain market share Contd ..: Contd .. Distribution Arrangements: Production plants and bottling centers placed in large cities all around India More added as demand grew and as new products were added Answer-4 Coke and Pepsi’s â€Å"Glocalization Strategies†: Answer-4 Coke and Pepsi’s â€Å" Glocalization Strategies† What is â€Å" Glocalization †? Global + Localization = Glocalization By taking a product global, a firm will have  more success if they adapt it specifically to the location and culture that they are trying to market it in. Both companies have successfully implemented glocalization Pepsi’s Glocalization: Pepsi’s Glocalization Pepsi forms joint venture when first entering India with two local partners, Voltas and Punjab Agro, forming â€Å"Pepsi Foods Ltd †. In 1990, Pepsi Foods Ltd. changed the name of their product to â€Å"Lehar Pepsi† to conform with foreign collaboration rules . In keeping with local tastes, Pepsi launched its Lehar 7UP in the clear lemon category. Pepsi’s Glocalization: Pepsi’s Glocalization Advertising is done during the cultural festival of Navrtri , a traditional festival held in the town of Gujarat which lasts for nine days. Pepsi’s most effective glocalization strategy has been sponsoring world famous Indian athletes, such as cricket and soccer players. Coca-Cola’s Glocalization: Coca-Cola’s Glocalization First joined forces with the local snack food producer Britannia Industries India Ltd. in the early 90’s. Formed a joint venture with the market leader Parle in 1993. For the festival of Navratri , Coca-Cola issued free passes to the celebration in each of its â€Å"Thumps Up† bottles. Also ran special promotions where people could win free vacations to Goa, a resort state in western India. Coca-Cola’s Glocalization: Coca-Cola’s Glocalization Coca-Cola also hired several famous â€Å"Bollywood† actors to endorse their products. Who could forget†¦ Answer-5: Answer-5 Yes, we agree that Coca-Cola India made mistakes in planning and managing its return to India. They wrongly forecasted Indian political environment due to which they had to dilute their stakes later (49% disinvestment). They rejected the plan to put up green fields bottling plants as they took over Parle’s existing bottling plants. Coca cola tried to get extensions twice. Answer -6: Answer -6 Pepsi and Coke can confront the issue of water use in the manufacturing of their products by the use of canal irrigation & rainwater harvesting. Then they can also put water recycling plant to treat the discharged water from their factories and then they can provide that water to farmers for their agricultural use. This way the ground water problem can also be solved and managed. Cont..: Cont.. Coke can further defuse boycotts or demonstrations against their products in California by doing Ad-campaigns in which they can ask the experts from the ministry of health to convey the message to the public that their products are safe and healthy. They can also hire celebrities to do the Ads for their products because the public follows them. Coke should address the group directly because their company was not wrong and they should justify themselves. Answer-7: Pepsi Better marketing and advertising strategies Widely accepted More preferable More market share Less Political conflicts Coke Government conflicts Trailing Pepsi in market share Pepsi will fare better in the long run Answer-7 Answer-8 Pepsi’s Lessons Learned: Answer-8 Pepsi’s Lessons Learned Beneficial to keep with local tastes Beneficial to pay attention to market trends Celebrity appeal makes for exceptional advertising It pays to keep up with emerging trends in the market Coca-Cola’s Lesson’s Learned: Coca-Cola’s Lesson’s Learned Pay specific attention to deals made with the government Establish a good business relationship with the government Investment in quality products Advertising is crucial

Wednesday, October 23, 2019

Australian education trends Essay

It is often known that education forms the backbone of economic development and growth in any nation. The investment in pre-school, primary and secondary education as well as community college education ensures availability of human capital endowed with relevant skills and knowledge for enhanced productivity. This has proven to be a necessity for sustained economic development in any country in the world. Educated people are in no doubt different from the uneducated or less educated in a variety ways (Tiffen, & Gittins, 2004). At the outset, the difference is eminent in attitudes and behavior, in their well being and health status, income as well as values regarding morals, religion, politics and employment among others. By instilling these positive characteristics to individuals in the community, education has therefore transformed the world people live in from the old ignorance-ridden era to the technologically-advanced modern life (Tiffen, & Gittins, 2004). Australia has experienced a steady increase in education levels in the last century. The government has in the past centralized funding of education and imposed high taxes on high income earners in an attempt to finance education. Students are not spared either in this plan and have been included in the â€Å"user pays† principle where they reimburse for the education services received. However, this scheme has affected education in many countries and how the government plans to implement the principle together with high taxation is a matter of concern. In Australia, the Government provides public funding for non-government schools as well as substantial assistance to government academic institution. Funding of state government schools is the primary responsibility of States and territories (Laporte, & Ringold, 1997). These organs can also provide assistance to non-governmental institutions of learning. It is estimated that more than two thirds of the students in non-government academic institutions are affiliated to Catholic as a religion. Australian education system is a three tier model where children enroll in Kindergarten at the age of about five years, then graduate to primary followed by secondary levels from year one to twelfth year and finally tertiary education (Harrison, 2002). Education is mandatory for the children aged between five to about sixteen years but the federal government caters for the university education. This system has ensured a reduced school life expectancy thereby enhancing educational development in the country (Centre for Educational Research and Innovation, 2008). This however draws a sharp contrast to the old system. Australian education system was highly stratified and that only infants and primary education were provided for the children. Additionally, Selection for high school education was very competitive, and favored the siblings of specific people who used to be prominent in the society (Henry, 1990). These individuals included industrialists, agriculturalists as well as businessmen among other professionals. Teaching profession was undermined since the government offered low wages to the teachers in addition to subjecting them to strict laws that restricted their personal as well as professional conduct. These factors reduced the productivity of the teaching staff thereby suppressing students’ performance in schools (Henry, 1990). The tremendous increase in level of education in Australia has been largely attributed to changes in a variety of factors including social and institutional framework as well as economic changes and student financing much else besides (Evans & Kelley, 2002). To start with, changes in educational levels have been associated with urbanization. The rural-urban migration brought about by the inadequacy of farmland as well as search for skilled jobs in the cities has enhanced the development of cities in Australia. This has therefore called for the provision of educational services in these highly populated regions hence increasing the educational levels. Evans & Kelley (2002) estimates the changes brought about by urbanization to about six percent over the last century. Economic growth on the other hand has been articulated with the steady increase in the educational levels in Australia. This country has witnessed a considerable economic growth in the recent past. Australian GDP for instance is currently valued at 1050 billion dollars which is slightly above 1.6 percent of the world economy (Laporte, & Ringold, 1997).   Australia has so far recorded steady economic growth and unlike other OECD nations it did not fall to the economic recession witnessed in the recent past (Organization for Economic Co-operation and Development, 2007). Moreover, the country has recorded a growth rate of about 3.6% annually for the last fifteen years. This has empowered the government hence its ability to fund education as well as other sectors (UNESCO/OECD World Education Indicators Program, 2005). It therefore implies that most of the Australians are able to access education compared to the past where parents used to dropout of school after compulsory education level. The current parents have therefore acquired high social status in addition to pursuing the available high skilled and well-paying professional jobs. The Australian children who hail from well educated families can now access proper education thereby increasing the levels of education in the country (Ruitenberg, 2010). Economic growth has therefore contributed to about twenty six percent education growths in Australia. This change has mainly improved education levels in both the primary education which is compulsory as well as secondary education which the educated and socially as well as economically-empowered parents can now afford (Evans & Kelley, 2002).The duo however admit that the aforementioned factors only contribute to a little percentage of the sources of educational transformation so far witnessed in Australia and that the real sources of change in education trend in this century are still unclear. Youth participation in education including vocational education and training has also improved in Australia. According to Sue et al (2009) a variety of factors have influenced this upsurge in the education trends in Australia. Factors such as how the young people’s families as well as community value education, the socioeconomic status of the general population, available education and training and the school curriculum, existing policies on education and youth employment, financial incentives and obstacles, economic structure in regard to industry and occupation have changed hence improvement of youth participation in education and vocational training in Australia (Kilpatrick, Sue,  Baynes, Chapman & Hazel An indexing term that provides specific identifying information in a category: geographic names, laws and legislation, or tests and testing., ()), 2009). Australia just like other developed States has recorded a steady decline in fertility rate which has brought about the ratio of two children per couple (Tiffen, & Gittins, 2004). It is always presumed that the higher the number of children in a family the reduced ability of the parents to provide quality education to an individual child. This is because the available resources such as finance, energy and time are shared among the many children thereby reducing the amount received by an individual child (Evans & Kelley, 2002). The reduced fertility rate in Australia has ensured reduced number of children in a family which the parents can afford to provide quality education for thus contributing to increased level of education in the country. These changes in education levels brought about by changes in family size are only noticeable in secondary schools and tertiary levels and not in primary level where the government funds education (Harrison, 2002). The government’s commitment to provide quality education has also influenced to a greater extent the steady growth in education levels so far witnessed in Australia. The Australian government has increased its spending on education of both males and females compared to the last century. There have been issues of gender inequality in education and females have been stereotyped as underperformers in the past (Evans & Kelley, 2002). It is note worthy that in all countries except New Zealand; there have been lower performance by females than their male counterparts especially in mathematics literacy (Marginson, 1993). This traditional stereotype is being overcome by the Australian government through equal provision of educational services to both the sexes. Philosophers such as Martin Roland have also contributed to this issue of gender equality and education of the girl child. Roland argues that the old tradition was a barrier to the equal distribution of resources to both the sexes in the society since it discriminated against the females and favored the males. She reiterates that gender issues should be embedded in the curriculum as well as in teaching and schooling activities to ensure that the product of such a system is an ideal educated person. John Dewey is another renowned philosopher whose contribution to education, politics as well as philosophy has been globally recognized. According to Dewey, education was the cornerstone to intellectual development and progress of the society. He stressed on the improvement of moral and social nature of schools as an attempt to fostering democracy and community prosperity (Paringer, 1990). Dewey asserts that provision of education service to a single child in the society empowers the child towards self- effectiveness which consequently provides a guarantee to a lovely, worthy and harmonious society. Democracy never used to prevail in the ancient society as a result of lack of knowledge by then. According to Dewey, the nature of things should be viewed from a perspective of change and growth and therefore the continuous transformation in education is inevitable (Dewey, 2007). Nel Noddings is an additional prominent philosopher whose argument revolves around the moral reasoning, beliefs and values in education. She states that the current education trends encourages moral development hence the need to adopt educational structures that incorporates ethics and the use of motherly interest to inform moral learning. She however blames politics that fulfills the interests of particular groups for threatening the establishment of strong ethical foundation of learning as well as teaching in the academic institution (Palmer, Bresler, & Cooper, 2001). Conclusion Education in Australia has undergone commendable changes since the first half of the last century. The Australian government as well as other stakeholders in the educational sector has contributed towards the social progress which is primarily dependent on the enhanced education standards in the country. Education has so far transformed from the old system characterized by repugnant traditions and values to the modern technologically- advanced era where education is the basic requirement for community sustainability. The progress in science and technology in the current era has created the knowledge and skills necessary for the developed industrial economy, while growth of education has provided workforce that is needed to utilize these new opportunities. Australia currently enjoys a socially-friendly environment with high paying professional jobs as well as improved living standards courtesy of development witnessed in the education sector. Reference List: Centre for Educational Research and Innovation (2008). Trends shaping education. OECD   Publishing. Dewey, J. (2007). Democracy and Education: An Introduction to the Philosophy of Education.   NuVision Publications, LLC.   Evans, M. & Kelley, J. (2002). Australian economy and society, 2001: education, work, an   welfare. Federation Press. Harrison, J. (2002). Excel senior high school: community and family studies. Pascal Press. Henry, M. (1990). Understanding schooling: an introductory sociology of Australian education.