Friday, December 27, 2019

How Students Adopt Social Media - 884 Words

Introduction This study will examine how HPU students adopt social media, and if there are any difference between an early American adopter versus an early Scandinavian adopter. The literature review will guide this study by give an understanding of how new innovations in social media are being adopted by the use of Diffusion of Innovation Theory. The first three sections of the literature review will provide information of the American and Scandinavian culture, with the focus on the differences in the use of technology between them. The forth section will provide Social Media and Facebook, which is essential in understanding this study. In sum, this literature review consists of the following sections: Culture (the differences in use†¦show more content†¦The definitions explain that culture as â€Å"human-made† and that it is learned, it highlights subjective elements such as values, beliefs and behaviors. However, culture is a term that is difficult to define and it is diffic ult to identify all the factors that it encompasses (Davey, 2011). Culture includes gender, sexual orientation, race, socioeconomic status, and cultural background (Peters Williams, 2009). Other terms such as mainstream, minority, ethnicity religion and race are used to describe how a group of people, a community or a nation lives in their social and physical environment (Schinke Hanrahan, 2009). 2.2 American Culture and Technology From a historic viewpoint, the American culture has dominated global culture based on its technological leadership of Web-based and consumer technology (Ashby, 2006). While these innovations are adopted outside the United States, in America it becomes less and more global. Cortada (2009) explains that American Web sites, applications and high-tech gadgets are dispersed worldwide, which results that it becomes less US-centric, even though they remain influenced by American culture. By using Facebook in this thesis, one sees that this technology is clearly a part of American culture, but worldwide adoption causes them to become less American. Nye (1997) explained, â€Å"Machines are social constructions which Americans long have

Thursday, December 19, 2019

Examples Of Capstone Reflection - 1057 Words

This capstone course has helped me tie together all the material I have learned thus far in the program as well as helped me to identify what skills and knowledge I need to continue working on. The capstone presentation, as well as class, helped me to practice strength-based language and be conscious of how I describe my client’s when presenting them to others. It can be a habit to use negative language to describe a problem-saturated story and unintentionally describe a patient’s story in a way that comes off as stigmatizing. This class helped me become conscious and tactful of how I word sensitive circumstances. It was a great experience to present my patient’s case to the class and practice being thoughtful on how I portrayed my†¦show more content†¦There is a variety of evidence-based research on varying cultures and each cultures perspective regarding medical care. Evidence-based practice will be extremely helpful among the hospital setting because it will allow for one to acquire knowledge from reliable resources. Using evidence-based practice is important because it allows social workers to utilize well researched interventions which will best serve the patient’s. I will continue to work within the hospital setting and need to be sensitive of how different cultures feel about the medical system as well as treatment options. At times, I have found myself wondering why my patient does not want to go a certain treatment route and have used evidence-based practice to form a better understanding and approach. Social workers can use evidence-based practice to educate themselves as well as the whole treatment team. In conclusion, evidence-based practice has allowed for me to share articles with coworkers and have dependable evidence to fall back on when advocating for my patient within team meetings. In week five, I found the topic of suicide to be very helpful because I have discovered that I need to gain skills for worki ng with patients who are suicidal or facing death. Many cancer patients have to think a great deal about death and often times contemplate suicide. Throughout my capstone presentation, it became evident how difficult it was to process death with my patient who had aShow MoreRelatedExamples Of Capstone Reflection975 Words   |  4 PagesThis capstone course has helped me to tie together all the classes I have taken thus far in the program as well as helped me to identify what skills and knowledge I need to continue working on. The capstone presentation, as well as class, helped me to practice strength-based language and be conscious of how I describe my client’s when presenting. It can be a habit to use negative language to describe a problem-saturated story and unintentionally describe a patient’s story in a way that comes offRead MoreCapstone Reflection1238 Words   |  5 PagesGreetings MBA Students!    Several of you have requested more information on the reflection paper so I am providing more explicit instructions below:    1. The paper should be 3-5 pages long, double-spaced, 1-inch margins all around, 11-pt Times New Roman font. (I won’t be a stickler on these details).    2.There is no single right content expected for the reflection paper; that is, different people can be expected to reflect uniquely on the simulation experience. Just think about your simulationRead MoreA Project On My Capstone Project956 Words   |  4 PagesFor my capstone project I decided to create something that I have never done before. Fiona, Nadia, and myself had an idea to write a funny play script. A few weeks ago, the three of us sit together and had a conversation which lead us to such an idea. We were talking and sharing some of our experiences which related to creativity and art that we had before. Theatrical show or drama was not something new for both Nadia and Fiona, but it was completely new for me. However, with almost no experienceRead MoreBusiness1053 Words   |  5 Pages3028MKT STRATEGIC MARKETING SIMULATION CRITICAL REFLECTION FEEDBACK Definition Reflective learning is an understanding and a disposition that a student builds across the curriculum and co-curriculum, from making simple connections among ideas and experiences to synthesising and transferring learning to new, complex situations within and beyond the campus. Task The Critical Reflection offers students the opportunity to critically reflect on their learning experiences both in the course and acrossRead MoreReflections of OMDE 670, the Most Important Course of My Masters Program1112 Words   |  4 Pagesdifferent spaces and time. Holmberg, (2009) also put this in perspective stating, helping students to learn is any educators most important task... that must be considered at the planning stage (p. 46). The other course that is significant to the capstone is DEPM 604, leadership in distance education. It provided a foundation for the concept of student autonomy that places responsibility for learning on the student along with the need for instituting skills that document learning. In distance learningRead MoreApplication Of Transforming Leadership Principles And Benefits For The City Of Suisun City Police Department1390 Words   |  6 PagesTransforming Leadership Principles and Benefits for the City of Suisun City Police Department Stephen M. Brown Charter Oak State College Author Note This paper was prepared for the Spring 2016 Public Safety Administration 499: Capstone, taught by Professor Thomas Fowler. Abstract This capstone paper explores how Transforming Leadership principles, as prescribed by Anderson, Gisborne, Holliday, et al. (2006), can be applied to a typical law enforcement agency in order to better address common issues facedRead MoreWhy An Organization / Team Exist Essay1510 Words   |  7 Pages(defined as a pass/fail practicum including a mastery testing sterile technique and a Nursing Process simulated experience) Nursing Basic Skills subspecialty portion of four Evolve examinations (Health Assessment, Mental Health, Leadership, and Capstone) (defined as scoring at least an 850 on the Nursing Basic Skills subspecialty of these examinations) 2. Discuss with the other committee members if these measures are suitable for the SLO. Make recommendations if you think they need improvementRead MoreReflection On Leadership Competency1453 Words   |  6 Pages â€Æ' Introduction This reflection on my leadership development was key to understand the fundamentals of leadership development. Having already acknowledged that leadership development is a self-development on-going process, I now realize that it requires deliberate practice based on a serious self-assessment to become a better learner before to become a better leader (Smith, 2017). As learning how to learn can be challenging, the NCHL Leadership Competency Model seems to be the perfect method to teachRead MoreA Reflection On My Career Goals998 Words   |  4 Pagesto recognize that law is not black and white, but shades of grey; just as life is full of grey. Reflecting on the relationship between law and life, my passion for law grew. My studies, my experiences, my determination and my curiosity became a reflection of my career goals. Ambitious and determined to become a lawyer, I entered college with political science on my mind. Sophomore year became another pivotal moment in my life. After taking Social Ethics offered by the philosophy department, I realizedRead MoreMarketing and High End2437 Words   |  10 Pagesï » ¿ Capstone Simulation Report 430550708 Xiaofu CAI xai5030@uni.sydney.edy.au BUSS 6000 Scceeding in Business Capstone Simulation Report Bozena Pieniazek Part 1: 1. Introduction This report is designed to critically analyse the changing environment of simulation and review the performance of Baldwin by using a set of business models. To start with, the general industry background and company overview will be introduced by highlighting some market segments. Secondly, competitive landscape

Wednesday, December 11, 2019

Crimeware and Malware-Based Business for Attackers - myassignmenthelp

Question: Discuss about theCrimeware and Malware-Based Business for Attackers. Answer: Introduction Information is an integral part of the business organizations and is also of utmost significance for the users. With the increase in the use of information and data sets, there are increased number of risks that have emerged in association with the information and network security. There are various agents and carriers that are associated with the occurrence of these risks and attacks. One of the widely occurring forms of these attacks is Crimeware and malware. With the occurrence of the attacks, there are varied degrees of impacts that may result. These impacts may range from the low to severe degrees of impacts. The report describes the definition and meaning of Crimeware and malware along with the description of the recent trends in the area of Crimeware and malware. The different types of the Crimeware and malware activities along with details on Crimeware as an organized business have been covered in the report. Background of Crimeware and Malware There are various forms of malevolent activities that are carried out by the attackers and hackers. One such activity that is illegal is termed as Crimeware. Crimeware is defined as an illegal activity that is executed in an illegal manner and is done to cause damage to the party that is affected. Some of the popular types of Crimeware include spyware, browser hijacking, keyloggers etc. Phishing kits have also been developed nowadays so that the phishing attacks can be easily executed by the attackers that have little or limited technical knowledge (Snyder, 2015). Another form of such illegal security attacks are malware attacks. There are different types of malware that may be executed, such as, viruses, worms, Logic Bombs, spyware, ransomware, Trojan Horses etc. These are the malicious codes and programs that are written to cause damage to the systems or the networks on which the malware is launched. There may be a trigger required for the occurrence and execution of the malware. It may also be possible that the malware is caused without the need of a trigger. These malicious codes may or may not be self-replicating in nature; however, the impact that these codes have on the infected system can be extremely severe (Palmer, 2017). The primary motive of the attackers behind the execution of the malware attacks is to gain unauthorized access to the systems and the information and to cause damage to the affected party. Recent Trends in Crimeware and Malware The trends in the area of Crimeware and malware keep on changing. Zombies which are also known as botnets have started to impact a lot many systems in the present times. In this form of the security attack, Trojan viruses are used to infect the systems and the control of each of the infected systems is taken. These systems are then connected in a network which is called as bot and it is this bot which is then remotely controlled by the attacker. Cyber criminals tend to make sure that a larger network of computer systems get impacted and get covered in the network. These networks of hundreds and thousands of computer systems are then used to give shape to the denial of service attacks or the distributed denial of service attacks. In this form of attacks, the availability of the systems is impacted (Welivesecurity, 2016). Trojan Horses are the malware that have the capability to impact a large number of systems and the impact is also severe in nature. There are banking Trojan gangs that have emerged which attempt to steal the banking details and information of the customers. These forms of malware result in legal obligations for the banks or the parties that are affected by the attack. Malware codes that are designed and executed have different forms but the goals of each of these codes are the same. These codes are designed to cause damage to the systems and the information channels along with the networks that are connected with the same. One of the recent forms of such attacks is the Point of Sale (PoS) malware. This is the malicious code that attacks a particular business and the sales transactions that are executed in association with such businesses (Scmagazine, 2017). Another form of malware attack is the ransomware attack. In this form of malware attack, the attackers gains unauthorized access and control to the system and the networks. As a result, the owner of the system are demanded to pay a ransom amount in return so that the control is provided again. Recently, a ransomware attack was given shape by using worms as the malware and the attack took place at a global level. It was termed as WannaCry and there were hundreds and thousands of systems that got impacted by the attack in over 150 countries. After the execution of WannaCry, the attackers have been successful in creating many such attacks and occurrences (Savage, 2015). Mobile devices and mobile applications are being increasingly used by the business organizations. These devices and applications are often the carriers as well as the victims of the malware attacks. There are increased authentication vulnerabilities that have emerged to the mobile based systems and applications with the implementation of two-factor authentication. There are new forms of malware that have been designed which have the capability to impact the mobile device as well as the service that is used. Such forms of malware and Crimeware have the ability to cause a significant damage to the device and application. Internet of Things (IoT) based applications are in trend in the recent times. These IoT based applications also fall victim to the malware and Crimeware attacks. There are IoT based malware codes that are designed so that the information that is present in the applications is accessed in an unauthorized manner. There are many new entrants in the market that are providing the users with the IoT based applications. However, such new entries do not have sufficient funds to install security patches and avoid the security risks and attacks. This leads to the increase in probability and likelihood of the attacks. Mobile payments are also exposed to a number of security risks and attacks. The probability of malware and Crimeware in mobile payments has increased in the last few years. This is because of the reason that the use of the mobile applications and devices along with the mobile based services has increased. Many of the viruses and worms are designed to target the financial payments and transactions that take place through the mobile devices and applications. These malicious codes capture the details of such transactions which are later misused causing a significant damage to the user and the business organization involved. Types of Crimeware and Malware Activities There are various types of Crimeware and malware activities that are executed by the attackers. Some of the types of such activities include organized crime, ad fraud, hacktivism, credential harvesting, payment systems fraud, medical data fraud, bank fraud and many more. Most of these activities are executed with the motive of gaining some form of a monetary gain. Ad frauds are carried out by the attackers which include the release of advertisements by making use of fake traffic. In this manner, the advertising network gets paid as it looks like the attack has been viewed by the users. Payment system frauds are becoming increasingly common with the use and application of electronic payments. It is done by directly impacting the payment system or by making use of money laundering. Medical records fraud is also done with the motive to gain money and cause damage to the party that is impacted. In this form of Crimeware or malware activity, the medical data of a particular entity is captured and is stolen which is then provided to an unauthorized user. There are user names and passwords that are also stolen which are then misused so that the entry to the user account can be made. Once the attacker succeeds in gaining entry to the user account, all of the associated information gets exposed. This information is then passed on to the competitors or the enemies of the organization. There are loosely organized groups that are involved in the execution of the malware/Crimeware activity called hacktivism. These groups organize these attacks for ideological or political reasons. Hacktivism is further classified in three categories as nuisance, disruptive and destructive. Twitter handle takeovers are an example of the nuisance hacktivism which are executed to cause social disturbance. Other forms of Crimeware/malware are botnets, distributed denial of service (DDoS) attacks which are disruptive in nature. The data of an organization or the personal device of a user gets impacted in the destructive hacktivism. Bank fraud is a type of the malware activity in which the primary targets are the banks and the financial corporations and organizations. In these attacks, the attackers make use of techniques such as phishing or spoofing or any other to trick the executives and users that are associated with the banks. This leads to the passage of sensitive financial details and information to the unauthorized entities. These activities can have devastating impacts on the users that are affected and also on the organizations. There are increasing numbers of such cases that are being reported with the use of electronic transactions in the field of banking and accounting activities. Technical development is an important aspect of the Crimeware and malware activities. There are various tools that are required for the execution of such tasks and these tools are first analyzed by the attackers and hackers in terms of their need, design and development process. These tools are also developed as part of the entire lifecycle of the malware or Crimeware which are then used to give shape to the attack. Crimeware as an Organized Business Crimeware has emerged as an organized business after the increased probability of the attacks and the enhancement of the attack surface and attack window. There is a specific and designated human resource department that is setup to look out for various skills and there are job opportunities that are looked out by the people. Some of these profiles and job opportunities include tool development, cyber laundering, recruiting, sales and marketing, legal, background checks and escrow services. The educational qualification that is necessary to get into the business of hacking can be negligible to extremely specific in nature. For instance, in the execution of certain types of attacks, such as, Brute Force attacks, there are no specific educational skills that are required. However, some of the advanced forms of attacks demand knowledge of a certain programming language or coding platform. There are tools that are necessary for the execution of the security attacks and Crimeware. Technical development is an important aspect of the Crimeware and malware activities. There are various tools that are required for the execution of such tasks and these tools are first analyzed by the attackers and hackers in terms of their need, design and development process. These tools are also developed as part of the entire lifecycle of the malware or Crimeware which are then used to give shape to the attack. There are jobs that are available in this area and the resources that are qualified for the same are provided with the opportunity to develop and deploy such tools. Trust plays an extremely significant role in the Crimeware business. This is because of the reason that the hackers also have a huge network that is used to give shape to a security risk or an attack. The confidentiality of the information and the hack job that is to be executed needs to be kept private until the execution of the attack is complete. There are roles of guarantors and recruiters that have been created to serve this purpose. These entities select and identify the resources that will not cheat and will serve their purpose and duty to the fullest (Gcc, 2017). The primary goal of any business task or an activity is to achieve the results with the involvement of minimum costs. The same holds valid for the Crimeware business as well. Region or location plays an extremely important role in case of Crimeware or malware. This is because of the reason that there are many attacks that are executed on the basis of the location of the user or the system. The occurrence of the cyber based attacks is always virtual in nature; however, the location of the actor is also significant. There may be cases wherein the attacker may not be experienced and may make it easy to give information on his or her location. In such forms of attack, the probability of being caught increases which is a negative point for the continuity of the Crimeware business. Support and maintenance are also two types of operations that are involved in the Crimeware business. The tools that are used to give shape to the Crimeware or the malware need security patching and updates. In case of absence of these updates, the performance of these tools may deteriorate and their purpose may not be served. Therefore, support is an essential operation in case of Crimeware business. There is a support staff that is also present in the organized Crimeware business and the members of these staff resolve the incidents that are reported (Vogel, 2016). Cash flow and cyber laundering is a significant part of the Crimeware business. There is money that is required for the execution of the Crimeware activities and it is necessary to ensure that this money is represented as authentic and clean. The conversion of the illegal and dirty money to the clean money in the cyberspace is a part of the Crimeware operations. There are various layers and networks that have been set up by such malevolent entities to represent the fake or illegal activity as real entity. It then becomes very difficult to track the difference between real and fake. There are escrow services that are also involved in the Crimeware business. These are the services and the entities that act as a mediator between two parties involved in the execution of a Crimeware activity. For instance, if an entity wishes to buy an exploit from another entity then escrow services provide verification and validation on the same. It is only after the approval that the process can be termed as completed (Taylor, 2016). Technical development in case of Crimeware business is not restricted to the development and maintenance of the tools only. There is also a great work of research that is also required to be done to make sure that the process of technical development is adequate. Research is an important part of the technical development that includes activities such as credential harvesting, uncovering of the zero day vulnerabilities, new technological exploration, development of the botnets, scanning media coverage and many more (Bullguard, 2017). Credential harvesting is a process in which the credentials of the user accounts are targeted. There are user names and passwords that are stolen which are then misused so that the entry to the user account can be made. Once the attacker succeeds in gaining entry to the user account, all of the associated information gets exposed. This information is then passed on to the competitors or the enemies of the organization. The information that is acquired helps in the process of research and analysis along with the technical development. Botnets are also discovered as part of the process of technical development. In this step, Trojan viruses are used to infect the systems and the control of each of the infected systems is taken. These systems are then connected in a network which is called as bot and it is this bot which is then remotely controlled by the attacker. Cyber criminals tend to make sure that a larger network of computer systems get impacted and get covered in the network. These networks of hundreds and thousands of computer systems are then used to give shape to the denial of service attacks or the distributed denial of service attacks. In this form of attacks, the availability of the systems is impacted. There are also many other activities that are carried out in the process of research. Marketing and sales is also an important aspect and part of the entire chain of Crimeware activities. In this process and operation, the information regarding the hacking and Crimeware activities that are performed are spread over to other entities and business present in the same field. This leads to the ability to spread awareness about the work being done and the opportunities and skills are also identified that may be required. Crimeware has succeeded in setting up as an organized business as it involves the use of the activities and operations that are otherwise involved in all the other forms of business operations and activities. Conclusion There are various agents and carriers that are associated with the occurrence of these risks and attacks. One of the widely occurring forms of these attacks is Crimeware and malware. Crimeware is defined as an illegal activity that is executed in an illegal manner and is done to cause damage to the party that is affected. Some of the popular types of Crimeware include spyware, browser hijacking, keyloggers etc. There are different types of malware that may be executed, such as, viruses, worms, Logic Bombs, spyware, ransomware, Trojan Horses etc. These are the malicious codes and programs that are written to cause damage to the systems or the networks on which the malware is launched. There may be a trigger required for the occurrence and execution of the malware. The trends in the area of Crimeware and malware keep on changing. It is therefore necessary to make sure that the information on such trends is always gained so that the countermeasures are accordingly created and implemente d. There are various types of Crimeware and malware activities that are executed by the attackers. Some of the types of such activities include organized crime, ad fraud, hacktivism, credential harvesting, payment systems fraud, medical data fraud, bank fraud and many more. References Bullguard (2017). What are zero-day attacks?. [online] Bullguard.com. Available at: https://www.bullguard.com/bullguard-security-center/pc-security/computer-threats/what-are-zero-day-attacks.aspx [Accessed 6 Oct. 2017]. Fireeye (2017). Recent Zero-Day Exploits | FireEye. [online] FireEye. Available at: https://www.fireeye.com/current-threats/recent-zero-day-attacks.html [Accessed 6 Oct. 2017]. Gcc (2017). The Business of Hacking. [online] Available at: https://www.gcc.com.cy/news/HPE/The_business_of_hacking.pdf [Accessed 8 Oct. 2017]. Palmer, D. (2017). This Android-infecting Trojan malware uses your phone to attack your router | ZDNet. [online] ZDNet. Available at: https://www.zdnet.com/article/this-android-infecting-trojan-malware-uses-your-phone-to-attack-your-router/ [Accessed 6 Oct. 2017]. Savage, K. (2015). The evolution of ransomware. [online] Available at: https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-evolution-of-ransomware.pdf [Accessed 6 Oct. 2017]. Scmagazine (2017). Three and a Half Crimeware Trends to Watch in 2017. [online] SC Media US. Available at: https://www.scmagazine.com/three-and-a-half-crimeware-trends-to-watch-in-2017/article/630485/ [Accessed 8 Oct. 2017]. Snyder, B. (2015). Hacking is a business -- and business is good. [online] InfoWorld. Available at: https://www.infoworld.com/article/3011447/cyber-crime/inside-the-hacking-economy-the-business-of-cyber-crime.html [Accessed 8 Oct. 2017]. Taylor, H. (2016). A $445B economic threat you aren't prepared for. [online] CNBC. Available at: https://www.cnbc.com/2016/02/05/an-inside-look-at-whats-driving-the-hacking-economy.html [Accessed 8 Oct. 2017]. Vogel, M. (2016). Hacking as a business model. [online] Florida Trend. Available at: https://www.floridatrend.com/article/19472/hacking-as-a-business-model [Accessed 8 Oct. 2017]. Welivesecurity (2016). Trends in Security Everywhere. [online] Available at: https://www.welivesecurity.com/wp-content/uploads/2016/02/eset-trends-2016-insecurity-everywhere.pdf [Accessed 8 Oct. 2017].

Tuesday, December 3, 2019

Pacifism A Critical Perspective free essay sample

An examination of the policy of pacifism and its terms. This paper examines the political philosophy of pacifism which holds that the use of violence by the state, under any circumstances is unethical and counterproductive. The paper assesses whether pacifism can be effective against Nazi-like dictatorships and includes a brief examination of nonviolence, the philosophy of Gandhi and King. If we had neither weapons nor soldiers, what would we do if an enemy tried to conquer us, asks Liane Ellison Norman in her essay, Nonviolent Civilian Defense. What would we do if our government suspended civil liberties, imprisoned, tortured and executed people like us? (McCarthy, ed. 189). Advocating the pacifist principle, Norman goes on to contend that the modern state does not need a conventional army to protect itself. Nonviolent defense strategy, Norman goes on to argue, provides an effective defense mechanism that surpasses that of conventional armies, the cause of so much chaos and destruction throughout history. We will write a custom essay sample on Pacifism: A Critical Perspective or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Relying on the principle that the conquer is meaningless unless the conqueror is able to govern, and evoking the beliefs and practices of Mahatma Gandhi and Martin Luther King, Norman and other pacifists argue that the methods of nonviolent civil disobedience strikes, marches, sit-ins, etc. can replace modern warfare. It is therefore argued that the use of violence by the state, under any circumstances, is unethical and counterproductive.

Wednesday, November 27, 2019

Book Report I Am David Essays - I Am David, David,

Book Report: I Am David Setting: This story takes place at a concentration camp in an unmarked part of Europe. Plot: The old man said to David "you must get away tonight." David did not like the old man but for some reasons trusted him. When the guards changed their shifts David made his move. When David got out of the concentration camp, he ran with as fast as he good so nobody would catch him. Before he had left the old man told him he must go to Denmark. Fleeing for the sweetness of freedom, David must undergo many obstacles such as crossing the sea and walking over mountains. His biggest difficulty was in switzerland. He was so close to his destination when he saw some soldiers looking for him. He had other problems before but not so great. How would he get out of this one? Conflict: Weakened by hard labour, cruel slavery and malnutrition, David has become very skinny. Every night and everyday David hears the cries of the other prisoners causing him to stay awake during the long nights which leaves him with bags under eye's. David does not smile a lot because all he sees in the camp is his friends, family and other prisoners getting beaten. Character: In the camp David did not have anyone to teach him anything until he met Johannes. Johannes taught David different languages and also to help one another, especially in the camp. After Johannes was shot David became very much like Johannes. David became caring, kind and smarter with the languages he had learned. Any chance David had to do something good he would, for ex. the time David risked his life to save the girl in the burning cabin. (I hope I did not give away to much of the book) Critique: One reason I liked the book was because the author gave the character, David, a positive attitude. David did not have much to live for (until later on in the book) but still had a desire to live. Secondly I like the way the author did not make it a happy ending. I also liked that be reading this book, you did not only read a fantastic story, but history at the same time. My fourth reason for liking the book relates to my third reasons, the reason is you realize since this world was created people try to run others lives. In David's case that was the soldiers and the farmer. One thing I did not like about the book was that the author made the ending go by so quickly, I thought he should of extended it and add more details. Likes and Dislikes of The Character: What I liked about David, the character in the book was the way he thought of everyone before himself. Secondly I like the way, even through tough times, he tried to learn something new, like another language.

Saturday, November 23, 2019

Free Essays on Legalization Of Marijauna

Legalization of marijuana I choose this topic basically because we as citizens of the United States have a basic right to make choices for ourselves as long as their actions do not harm others. Responsible individuals (Possibly at the age of 18) should be allowed to choose whether or not they use marijuana. We place a high value on the principles of individuality, liberty, and freedoms of thought and are government should stand by that. The government is wasting our time and money by prohibiting marijuana. Taxpayers are forced to pay billions of dollars to persecute, prosecute, and incarcerate individuals while the government ignores more important issues like fighting the war on terror and the war in Iraq. Prohibiting marijuana is not an effective solution to the problems associated with marijuana use because just like when alcohol was prohibited before it caused more problems like the organized crime that supported it. We understand that marijuana, like tobacco, alcohol, and other drugs, can be abused. But the harms associated with marijuana are less than those associated with tobacco and alcohol, and they are not sufficient reason to justify making marijuana illegal. In conclusion I think we should take a lesson from what we have learned from our history. Alcohol prohibition did not work, and there is no logical reason to believe that marijuana prohibition is a better idea. My final comment is that our government should stop taxing us for the â€Å"War on Weed† and tax the people who buy marijuana and use it for the greater cause of our country.... Free Essays on Legalization Of Marijauna Free Essays on Legalization Of Marijauna Legalization of marijuana I choose this topic basically because we as citizens of the United States have a basic right to make choices for ourselves as long as their actions do not harm others. Responsible individuals (Possibly at the age of 18) should be allowed to choose whether or not they use marijuana. We place a high value on the principles of individuality, liberty, and freedoms of thought and are government should stand by that. The government is wasting our time and money by prohibiting marijuana. Taxpayers are forced to pay billions of dollars to persecute, prosecute, and incarcerate individuals while the government ignores more important issues like fighting the war on terror and the war in Iraq. Prohibiting marijuana is not an effective solution to the problems associated with marijuana use because just like when alcohol was prohibited before it caused more problems like the organized crime that supported it. We understand that marijuana, like tobacco, alcohol, and other drugs, can be abused. But the harms associated with marijuana are less than those associated with tobacco and alcohol, and they are not sufficient reason to justify making marijuana illegal. In conclusion I think we should take a lesson from what we have learned from our history. Alcohol prohibition did not work, and there is no logical reason to believe that marijuana prohibition is a better idea. My final comment is that our government should stop taxing us for the â€Å"War on Weed† and tax the people who buy marijuana and use it for the greater cause of our country....

Thursday, November 21, 2019

How do real business cycle theorists go about explaining the sources Essay

How do real business cycle theorists go about explaining the sources of business cycles What are their main conclusions - Essay Example Under the technical innovation, RBC models were developed with the aid of a method called calibration. (Quiggin, 2009). Sources of Business Cycle In 1986, Edward Prsescott, argued in an article that business cycles in USA, after the World War II resulted from the random changes in the business sector productivity. He justified his argument by proving that upswings in economic activity resulted from an above average growth rate of productivity while downswings resulted from a below average growth rate of productivity. In doing so, Prescott openly challenged the then prevalent notion that business cycles were triggered by monetary and financial disturbances (Chatterjee, 1999). There are numerous ways of measuring total output and one such way is to measure the total value added in all the domestic firms. The total output tends to change when productivity of workers changes or the effectiveness of the equipments used increases. Thus an increase in the effectiveness of workers and equipm ent leads to the value-added and is known as total factor productivity (TFP). TFP increases majorly as a result of improvements in technology and increase in worker productivity. TFP can also change when the price of an imported raw material changes or when new products are developed through investments in Research and Development (R&D) or when natural calamities destroy agricultural output (Chatterjee, 1999). When the TFP increases, it signals to the firms that they can benefit immensely from hiring more labor and installing more equipment. To make good use of such opportunities, firms invest heavily in buildings, equipment and hire a lot of workers. Additional income is generated in the economy and the overall output rises and people tend to consume more. These favorable trends in macroeconomic variables such as consumption and investment are used by RBC theorists to explain a boom (Chatterjee, 1999). There are other sources of fluctuations in the RBC, such as changes in taxes and government spending, tastes, government regulation (such as laws to protect the environment and minimise wastage by factories), terms of trade and energy prices. When government spending increases such as expenditure on infrastructure and transfer payments, firms are encouraged to set up production plants and increase economic activity, and consumption of households also increases. Investment, government spending and consumption are the elements of aggregate demand and they are directly related to output: an increase in these elements results in an increase in the overall output of an economy. The graph below shows this as an outward shift of the aggregate demand (AD) curve from AD to AD1, with the corresponding increase in output from Q to Q1 (McGrattan, 2006). In RBC theory, technological distrubances are discussed at length because the fluctuations caused by technological disturbances resemble the actual economic fluctuations a lot. According to Kydland and Prescott’s mod el, when households respond optimally to changes in technology, fluctuations occur (McGrattan, 2006). In a traditional business cycle, consumption and leisure move in opposite directions: when one increases, the other decreases. During the boom period, consumption