.

Thursday, January 31, 2019

Analysis Of Mark Strand?s ?kee :: essays research papers

Although its not a lengthy song, the hardly a(prenominal) lyric and their layout in Keeping Things Whole certainly possess great signifi preservece. This meter is centered on the idea that the fibbers life is lacking(p) purpose. In exploring the meaning of his cosmos, he heady that his apprehension for living was to withhold moving so that plentys lives were only temporarily interrupted.      chain of mountainss technique of splitting up his sentences helps emphasize certain phrases and ideas. When I make poetry I of course pause for a brief second at the end of apiece draw and quarter to allow the address to sink in, therefore taking an special moment to realize what the power is saying. With each line in this rime only a few words long, there is a high pause-to-word ratio, which allows for more thought for each idea the first time you read through it. Strand splits up the sentences in places where he is trying to drive more meaning, with t he hope that the referee will pause and contemplate what was expert read. His stanzas are concluded when he wants more attention placed on his current idea.     The narrators viewpoint towards life in this poem is quite different from how close people see it. Where he writes, In a field / I am the absence / of field. (ll. 1-3) instead of acknowledging his existence as something, he regards it as a lack of something. This negativity towards himself is what the full(a) poem is focused on.     He uses the idea that when his physical structure enters an area the bowel movement of that area are momently interrupted and are forced roughly him, just waiting to m other(a) back to normal once he fall ins When I walk / I part the tenor / and always / the air moves in / to fill the spaces / where my bodys been. (ll. 8-13) The air in that line symbolizes the existence of other people around him, and the narrator sees himself as a nuisance to t hose people, always cosmos in the way. He is saying that whenever he enters into a location with a bunch of people, those people see him as a bother and plain as something that they must put up with for a little while. They cant wait for the narrator to leave so that they dont have to put up with him anymore and can therefore withdraw to what they were doing.The last stanza explains the narrators reason for moving, or in other words living I move / to keep things whole.Analysis Of brand Strand?s ?kee essays research papers Although its not a lengthy poem, the few words and their layout in Keeping Things Whole certainly possess great significance. This poem is centered on the idea that the narrators life is lacking purpose. In exploring the meaning of his existence, he determined that his reason for living was to keep moving so that peoples lives were only temporarily interrupted.     Strands technique of splitting up his sentences helps emphasize certain phrases and ideas. When I read poetry I naturally pause for a brief second at the end of each line to allow the words to sink in, therefore taking an extra moment to realize what the author is saying. With each line in this poem only a few words long, there is a higher pause-to-word ratio, which allows for more thought for each idea the first time you read through it. Strand splits up the sentences in places where he is trying to convey more meaning, with the hope that the reader will pause and contemplate what was just read. His stanzas are concluded when he wants more attention placed on his current idea.     The narrators viewpoint towards life in this poem is quite different from how most people see it. Where he writes, In a field / I am the absence / of field. (ll. 1-3) instead of acknowledging his existence as something, he regards it as a lack of something. This negativity towards himself is what the entire poem is focused on.     He us es the idea that when his body enters an area the parts of that area are momentarily interrupted and are forced around him, just waiting to return back to normal once he leaves When I walk / I part the air / and always / the air moves in / to fill the spaces / where my bodys been. (ll. 8-13) The air in that line symbolizes the existence of other people around him, and the narrator sees himself as a nuisance to those people, always being in the way. He is saying that whenever he enters into a location with a bunch of people, those people see him as a bother and simply as something that they must put up with for a little while. They cant wait for the narrator to leave so that they dont have to put up with him anymore and can therefore return to what they were doing.The last stanza explains the narrators reason for moving, or in other words living I move / to keep things whole.

Wednesday, January 30, 2019

Film Violence :: essays research papers

Film ViolenceDo you think there is a elusion for censoring films more radically than present or is this an infringement of in-person liberty?Films atomic number 18 often blamed as an influencing factor in violent crimes, most notably murder. People think that films have decided a number of killers in high profile cases such as the Jamie Bulger murder, which was bond to Childs Play 3 by the press. Another was when a 14-year-old Texan boy decapitated a girl in an effort to become illustrious like thee stars of Natural Born Killers and Rambo was said to have cultivated Michael Ryan when he piece of cake 11 battalion at Hungerford in 1988. But would censoring films more radically make any difference?We, as people, have been showing scenes of delirium for many hundreds of years, so why is it only in the hold water few years that scenes of violence in films are said to influence people? Scenes of violence have been depicted in Renaissance paintings, in stain glass windows a nd in Shakespearean plays Macbeth is a serial killer, mightiness Lear has his eyes gouged out, Desdemona is murdered by Othello in a jealous rage. more than recently in news coverage of conflicts in Rwanda, Kosovo and Bosnia. Why are these violent scenes not menti matchlessd as an influence?A report, The Effects of exposure Violence on Young Offenders, published by the Home say-so in 1998 did conclude the following - The implication is that both a memoir of family violence and offending behavior are necessary preconditions for developing a significant preference for violent film action and role models.Kevin Browne, one of the authors of the report, said the link between film violence and actual violence could not be proved but stated Nevertheless people who come from violent families and commit violent offences are more in all probability to lock into violent scenes, remember violent characters, and this may well influence their behavior. Both of these sources agree that there is not a direct link between film violence and real life violence, but in contrast both agree that people with a violent family annals and a record of offensive behavior might well be influenced by film violence.

Co-education Female Essay

The debatable issue on Co-education is continually progressing through and through the State and convincing parents and teachers that sexuality-separation give reveal a sign of rise in students lives. In the United States, teamwork is a spacious aspect in peoples lives where some(prenominal) girls and sons work unitedly in narrate to achieve their goal , however, both articles provide informative proves that co-education could result in failure because of the different stereotypes in fraternity. The disputation generally focuses on the separation of both sexes in groom since there is no extra cost. The debate also catches the readers attention by the different research that many scientists did in rank to prove a fair result that give satisfy the parents and teachers.The separation of sexes in school could result in forward motion of education and behavior with boys and girls. Based on Jennifer Medinas article, teachers will face less problems if both sexes are spaced s ince the boys will fly the coop to focus to a greater extent on learning than on girls, in addition, girls will endure to feel to a greater extent well-situated alive(p) in class. Co-education will also result in good teamwork peculiarly in the outside community because both girls and boys will learn to communicate.However, from the boys point of view, they will tend to be more comfortable in expressing themselves and learn slightly being a man in their own bodies. In addition to those articles, the media will affect the parents and the teachers around the realm because of utmostly known and educative people in society. For example, Leonard Sax who is a best seller author of Why Gender Matters and Michael Sax argues about single sex with a huge audience in order to prove their facts about the separation and the importance of it.In contrast, both sex educations could also result in amendment around the state and in schools because boys and girls will learn to communicate in c oncert and work hard as one community. In addition, many authors and scientist were seeking for evidence in order to prove that Co-education could be for the good of their community. For example, a research on Bronxs Eagle school stated that both sexes classes tend to collect high test scores around the state and tend to receive high percentages in their community. Both sexes will also learn and appreciate that both sexes are important in everyones lives since they communicate and work together outside of the learning community. Researchers also proved that functional together as both sexes will also result a sign improvement in teamwork because many girls tend to be left out in single-sex schools in teamwork projects.Comparatively, Co-Education and single education also soak up their problems in society because of their lack of certain teachings in schools. For example , a study showed that girls tend to be smarter than boys and tend to solve math and science faster and more ac curate since there are different brains and each person have a different sign of knowledge and personality. However, since girls are smarter, they tend to exact for more detailed teachings and writing scripts since they will have more things to apologize in their writing assignment.When in contrast, boys have to write about a simple sport or a job they seek for in order to prepare them for the future. Although, teachers who support single education tend to have other opinions toward their ways of teaching. For example, Mr. Napolitano claims that he is more comfortable in expressing his feelings and thoughts patch teaching to single sex classrooms because the boys will tend to have the resembling situation. In addition he also shows a book called guard Boy in order to show boys that having a tattoo is non a material they should use in co-ed class.In conclusion, this debate tends to prove that single education will show more improvements since the media tend to support it and al so the teachers. The reasons that parents should choose single education is because they will improve economically and also their students will face less behavior problems and more school focused. However, co-ed schools tend to have higher scores and will teach the students to work together in order to improve their public lecture especially outside in society since they will be working together as one team. Both articles prove that both educations will result in bonding together as students and as teachers in this society because at the end of this debate both classrooms will be teaching and learning in the states.

Tuesday, January 29, 2019

Communication system Essay

engage and ascend systems that evoke converse 1. Be able to address the reach of conference requirement in receive role 1. 1 Review the range of pigeonholings and individuals whose talk c e truly for must be addressed in own line of merchandise role. Working inside Su breakart I plough tail with m both groups and individuals whose confabulation inescapably must be addressed which include 16 lag constituents, supporters users to date we spend a penny 1700 families registered with Surestart. We would pull in a lot of colloquy with Health visitors regarding referrals that they kick in sent in and overly win up teleph angiotensin-converting enzyme c t start ensembles if in that appraise is some(prenominal) concerns with the family.I would a same(p) extradite cope with with sociable run and be asked to attend eccentric review impacts. I would withal be pass judgment to communicate with some other agencies to refer our service users on the captivate agencies for example other children centres, counsellors, womens Aid and enigmatical Harm fond worker, 1. 2 Explain how to support powerful dialogue at bottom own job role Effective conversation and inter exertion play a in truth serious role in the work of e actu e precise last(predicate)ybody that work within Surestart.I come up that how I support legal confabulation is by pose a exhaustively example to lag. With colloquy been so important for the day to day running of the centre, each rung member would be asked to write in the diary in the principal(prenominal) line so peck stick out whap where they be (this is for the nevertheless guarding of module if they be out of the office, lone worker policy) thither is in like manner a white board in the main office so when staff be in programmes other staff ar witting of this and that the p arnts/baby room ar booked.I would also support communication by attending staff skirmish ever second workwe ek and staff atomic number 18 told that they must attend once a month. There is also an open door policy as almosttimes in that respect is learning that staff do non want to character in a team meeting as there whitethornbe difficulties within the team and they would like to piece of land entropy on a one to one basic. 1. 3 Analyse the barriers and ch in allenges to communication within own job role The barriers and challenges that I would face is staff operative part time, staff out doing programme and also whitethorn be difficult whim betwixt staff members.The other barriers and challenges that I would face is staff do not suck in on board what you are saying to them as they savor they are right so they do not scour listen to what you are trying to explain. Some people may part you up wrong on the receiveledge you are trying to raise across. 1. 4 Implement a strategy to overcome communication barriers strike certain I speak very clear, commission on what education I would like them to take on board. Supervision on a monthly basis, open door policy if eitherone has a problem they jackpot talk about it.Staff whoremonger ring and ventilate emails at any time. The child care supervisor meets with the childcare team e actually sunup to desexualise sure that all creches fetch enough staff and if they provoke any concerns regarding the children. There is also a referral meeting once a week where we discuss the referral that health visitor/ kindly workers birth lead in and also to discuss and concerns we would have regarding the promotes. I also circularise rely slips to social worker / health visitor to let them know if a home visit has been completed or if we have been ineffectual to strain the family.Use divers(prenominal) means of communication to meet different needs I am aware that each staff member has different learning styles, some staff like sharing tuition in a group and other staff like to share learning in a on e to one. It is also very important for me to take this on board as I do not want any member of the team whole steping frustrated and in stiff. I want staff to be able to put me and let them implement that I value the work that they do. The different means of communication I use to meet different needs are.Emails are a very powerful means of communication as each staff members gets the information at the uniform time and not second hand. Emails can be sent at any time and also printed out to saddle or record information that has been sent or authoritative. Team meeting again are a very good as all staff are getting the same information and this is a over polished steering for other staff to meet and let everyone else know how things are going and if anyone is finding a family or child difficult hence there is the support of the whole team for ideas of how to handle a situation. If anyone cannot make it consequently the team minutes are there to find out.Telephone if I am not in the office I can alleviate be reached on my roving if anyone needs anything. Health visitor/Social worker would also arrive at me by telephone if they needed an update on a family. Staff diary in the main office this lets staff members know who is in which room and if anyone is on leave or sick or if someone has an appointment. Sign in and out carpenters plane beside the exit door this is for preventive reasons as if there was a go over in the building then I would know who is in and out say slips are back to the health visitors/social worker as an update for the referral they have send in.Letters to parents this is to invite them along to programmes/events. Thought-out the grade I would facilitate information daybreaks for breastalimentation support, weaning work shop and feeding for under 5s this would be to share information to satisfying new service users to the Surestart. Face to face, my office is open to all staff at any time if they need to talk about anyth ing. CU2941 Use and develop systems that promote communication 2. Be able to ameliorate communication systems and practise support positive outcomes for individuals 2.Monitor the usefulness of communication systems and practices. The diary in the face office if very effective for staff on home visit as we know where there are for their safety (lone worker policy). white board in the main office is very effective as this is where all staff write down their programmes so if there is any phone calls for staff the secretary knows if they are in the office or in programmes. Emails can be sent at any time and it means that the same information is been told to the staff at the same time and it is also the staffs responsible to pick up their emails.The childcare supervisor meets with the childcare staff each morning I sprightliness that this is very effective as this is in place to make sure that all rooms are covered with their ratio, and most importantly that the needs of the children are met and if there is any problem in any of the setting it can be addressed as needed and that staff do not have to wait 2 weeks for a team meeting to discuss. wizard to one communication i. e. Supervision and APR, I feel that this is very important within a setting. N-Drive this is where documents can be saved and all staff can access it.In our office we have a policy of hot desking so documents can accessed at any computer. This is also for Surestart forms and newsletters so all staff can print them out as needed. Reply slips to health visitors/social worker/other agencies this is where I state to any referral letter that the project receives, I would result to the other agencies if this family had received a home visit and services offered, if I was unable to ghost the family for different reasons or if the family did not want to avail of Surestart services.Phone if I cannot be reached at any time then a content can be left for me to return there call. 2. 2 value the ef fectiveness of existing communication systems and practice Evaluating the effectiveness of existing communication systems and practice I am going to start with the ones I feels are the most effective. One to One Communication I feel that this works very well within a team as some staff members do not like to speak in front of other and feel that their ideas might not be good enough.I also feel that face to face communication is very effective as some people can pick up a message wrong and take the wrong tone with an email. Supervision this is there for staff to talk confidently with their public treasury I feel that this is very effective means of communication for the manger to tell how well things are going for that member of staff and for the staff member to say how they rightfully feel about how things are going. ( I also feel that you have to have a good relationship with your staff for this to work, you have to be relaxed and friendly and staff members also have to trust y ou).Supervision is also very effective as this give staff clear boundaries of what is expected of them for the month a head and also make sure they are on target to achieve the targets in their APR. Team meetings I also think this is effective as this can let everybody know how programmes are going if there is any follows to do with families in any of the programmes. If anyone is having any difficulties if any of the programmes is nice to get other ideas how to deal with it. It is also there for sharing information for the Surestart board and carry out for children.To let staff know what instruction is coming up. ARP- I have been operative in a Surestart setting for the last 11 categorys, I feel that this is the first year I have felt that an APR has been effective like the rest of communication systems if it is not done right then it will not be effective. APR is there to set goal and targets for the year forwardshand, I feel this is very important for staff as they know wha t is expected of them for the year ahead and then this is monitored at each supervision to make sure that staff in on track with their targets.Childcare meeting every morning I feel that this is very effective as each member of the childcare team no where they are each day and who is cover charge in each setting and also if any member of the childcare team is concerned about a child this is discussed each morning. Emails- I feel has pro and con. It is very effective in a office that emails can be sent at any time and is very good for all staff to receive the information at the same time.I also feels that staff can pick the tone of emails up wrong and some information is best said face to face. Reply letter to health visitors/social workers/other agencies I feel that this is a very effective The diary in the front office This is effective if everyone plays there part in surfeiting it in. If someone is on training or off on A/L and forgets to fill it in then it is very hard for other staff to know where they are. N-Drive This is effective as all the Surestart form and standard letters are on it as well as newsletters.It is also that as this is used small-arm hot desking it means that the documents that are placed on this drive can be accessed by the whole team so if I was redeeming(a) any confidential information I would also password defend it. Phone I do feel that this is effective as if I am not available by phone or mobile then a message can also be left. 2. 3 Propose improvements to communication systems and practices to address any short comings I feel that communication can always be improved as we are only human and staff do forget to pass on messages, response to emails, and even fill in the diary in the main office.I have proposed that each desk has message pad so that all messages have to written down. I have proposed that the main diary is to be brought to the team meeting so that if anyone has any leave booked, any visits logical or trai ning then this can go into the diary. I would also remind everybody at team meeting about remembering to fill in the diary I have also propose that the reply slips to the health visitors/social workers be changed as I feel it could be improved. 2. 4 Lead the implementation of revised communication system and practices CU 2941Use and develop systems that promote communication 3. Be able to improve communication systems to promote partnership working 3. 1 Use communication systems to promote partnership working The systems that we use to promote partnership working is One to one communication theory I meet with the health visitor for breastfeeding once a week. Also any of the health visitors are congenial to call in at any time. Some health visitors like to bring parents that are hard to engage into the centre to meet me to denominate them around the building and meet the staff.I would also have contact face to face with our families on a daily basis with programmes and also read rightments. Phone call health visitors/social services and other agencies would phone for update and regarding case review meetings. Families would also phone on a daily basis if they needed help with anything or information. raise we aim letters to the agencies if we are unable to reach the families or if they no longer hankering to be bear on with the service. I would also post letters and newsletter to families.Emails some agencies like to send email as it is a faster way for them and this is ok with me as long as it is recorded. Referral reply this is a letter drawing and pointed by Surestart parents that we have permission to send it back to the health visitors to say we have been in contact and the Surestart services have been offered. Information events this is different events for Surestart to promote their services 3. 2 Compare the effectiveness of different communications systems for partnership working I feel within waterside Surestart the systems we use are ve ry effective.One to one communication I feel is very effective as this can reassure service users and colleagues and also out of doors agencies, you can focus on the goal. I can be supportive and positive to all that need it. I can also assess the services users needs and provide them with the support needed and I also feel that this builds trust and relationships. Phone call I feel that this is a very effective way of communicating as some health visitor/social worker/other agencies need an update ASAP as they may be on their way to a review meeting.All if a member of staff is not on the office this is a good way of communicating. As my role as family support worker I be in contact with families every day on the phone, may it be they have a question or I am inviting the families to programmes or arranging home visits. Emails This is a very effective way that I communicate in Surestart, supervision notes to be sent 3 says before supervision, team meeting are to be sent and read b efore the meeting. Agencies are able to send emails / newsletters Referral Response I feel that this is a very effective way that Surestart communicate.This is send to health visitors/social workers who send in a referral this is to show the agencies that we have do contact with that family or that we have tried to contact the family and after 4 weeks we are unable to reach them. Information events I feel that this is not really effective as we work on catchment areas and this is very hard to have an event in a general area, it has to be within the area, as we do not like to turn people forward that may be interested in the service, as when agencies send in referrals they have a list of streets that is inside the catchment area and only if there is a need then they can be outside the area.Propose to improvements to communications systems for partnership working I do believe that communication within waterside Surestart has got a lot better in the last year, I feel that this has a great deal to do with our new manager, she has gained the trust and respect of the staff and in return it is a pleasure to work with. I feel that I have a great leader to follow and learn a great deal from. The only improvement that could be made is that a leaflet could be drawn up for families that are outside the catchment area so that they leave with something rather than going away with no information (this is in the process on being done).I am also assisting the upgrade of the referral response form so that families foretoken this form so that we have permission to hold their information and that we are allow to send the form back to the referrer. CU2941 Use and develop systems that promote communications 4. Be able to use systems for effective information focal point 4. 1 Explain legal and ethical tensions between maintaining confidentiality and sharing information Working with in a Surestart setting for the last 11 years, I know that confidentiality is very important. Its important for agencies and services users to build a trusting relationship with me.I am very honest with the people I work with, when I am completing a fitting form with parents I do tell them that their details will duty tour in a locked file cabinet for 7 years, that there information is stored on a entropybase password cherished until there child/ren turn 4. I also let the parents know that under the information in effect(p)ification act they are able to see their file at any time. Parents also sign a form that we are able to share information with the health visitor and other agencies involved if we have any concerns regarding the child or parents.When I have taking programmes with parents I also start with group rules. Confidentiality always comes up, I always tell parents that whatever is discussed at the group I do not take it outside of the group, I can only speak for myself but that I would go for that everyone would stand by this too. I also always make it very cl ear to parents that if anything is discussed or disclosed any information regarding defame or danger or abuse to a child/ren then I will past this information on to my manger and the appropriate authorises.I feel that if I am honest with all the people that I work with then I do believe that you build up a trust and that by law I have to herald and record all that is disclosed to me, although I did have a parent in the past that did not understand this, they felt that I was just reporting them to social services and she believed that social services where there to take her child away. This lady did not return to Surestart as what she disclosed I had to discuss with my manger.Analyse the essential features of information sharing agreements within and between organisations Under the data protection act 1998, the purpose of the act is to protect the rights and privacy of individuals and to ensure that data about them are not svelte without their knowledge and are processed with thei r consent whenever possible, this act covers personal data held in electronic formats, manual data and relevant filing systems.Surestart has devised a form that has recently been updated by my colleagues and myself, this form is where we get service users to sign that they agree Surestart is able to keep their details in a desexualise place for up to seven years, and that if we had any concerns regarding the child that we would contact the appropriate service also that if there is a social worker involved that we are able to update them on any programmes they attend for case review meetings.Health visitors would send in referral form with parents consent, what happens is we then phone that family and do a home visit and in that visit we fill out the Surestart forms with the families details on it, the consent for is then signed and sent back to the health visitor to say we have completed a visit this is what programmes they would like to attend, I would also send back a form to the heath visitor if that family did not wish to avail of Surestart services or that I could not reach them.These forms are kept with the registration and filed in a locked cabinet. When I am facilitating a programme within Surestart I always do group rules, parents can put what they like on it, confidentially always comes up, I just remind parents that what happens in the group will stay in the group with me, but I can only speak for myself and not the rest of the group and I do tell them that It would not be nice to hear anyone talking bad about another parent.I do inform the parents that if there anything disclosed within the group that has caused abuse of harm to a child them I am bound by action for children policies and procedures and under the children order act 1995 to past this information on to my manger and the appropriate services, I do tell the parents that I would discuss this with them before I reported what I have heard.Demonstrate use of information management systems that meet legal and ethical requirement Under the data protection act 1998 Surestart need permission to hold data on the families that I work with, how this is done is that all parents have to sign the registration form and also the consent for their details to be stored according to action for children policies and procedures, which is that their details are stored for up to seven years, in a locked filing cabinet and up to four years on the Surestart database. Under the childrens order 1995 I am bound to report anything that I have heard or seen that my or has caused harm to a child. This would also be discussed with the parent/s what information I would be passing on to my manger. This also gives the parent an opportunity to explain. The information my lead to a referral been made to social services.

Monday, January 28, 2019

Discipline The Essence Of Education

Todays yield is Discipline The essence of Education. Let me share my views with you. Discipline comes from the Latin give voice Disciplina which means instruction. It is the bridge between goal and accomplishment. Discipline is the foundation upon which entirely success is built. In the entire universe, there is an order and qualify. We derriere watch plants, insects, birds and animals alike observed go over in their lives besides only public who has a thinking mind finds it difficult to observed crystalize.But the discipline is inbred from the moment of takeing to the time of going sleep. The discipline is closely tie in to education. Analysing the effect of discipline action, we can better understand why we should improve using discipline. The aim of drill discipline is to create a gum elastic and happy acquire environment. The term naturalise discipline is commonly cognise as School Rules and Regulations. BY correcting misbehavior and developing self disciplin e, school help to prevent the future occurrence of behavior problem.If we remove the discipline from the education, the output of education will be zero that is the discipline is the spunk of education. We cannot think about education without discipline. Student life is a distributor point of learning and grooming. Discipline plays significant role in shaping the spirit and moldings character. A student of today is a citizen of tomorrow. Hence, it is very important that children should be discipline in school, so that they might became worthy citizens of their country.Citizens of discipline nations can work more smoothly and are filled with the spirit of unity, pairing and co-operation. drop of discipline is like a ship without rudder. Beauty takes the attention, but personality with uncorrupted discipline takes the tinder. If you want to full fill the shibboleth Mera Bharat Mahan, our country should shake up a well discipline citizen. For that education is the master(pren ominal) source. Let us anticipate a well discipline generation. Jai hind(prenominal)Discipline The Essence of EducationGood Moring to my respected teachers and wholeTodays outcome is Discipline The essence of Education. Let me share my views with you. Discipline comes from the Latin intelligence Disciplina which means instruction. It is the bridge between goal and accomplishment. Discipline is the foundation upon which all success is built.In the entire universe, there is an order and discipline. We can see plants, insects, birds and animals also observed discipline in their lives but only man who has a thinking mind finds it difficult to observed discipline. But the discipline is ingrained from the moment of working to the time of going sleep. The discipline is closely cerebrate to education. Analysing the effect of discipline action, we can better understand why we should tutor using discipline. The aim of school discipline is to create a safety device and happy learning environment.The term school discipline is commonly cognise as School Rules and Regulations. BY correcting misbehavior and developing self discipline, school help to prevent the future occurrence of behavior problem. If we remove the discipline from the education, the output of education will be zero that is the discipline is the heart of education. We cannot think about education without discipline.Student life is a period of learning and grooming. Discipline plays significant role in shaping the personality and moldings character. A student of today is a citizen of tomorrow. Hence, it is very important that children should be discipline in school, so that they might became worthy citizens of their country. Citizens of discipline nations can work more smoothly and are filled with the spirit of unity, brotherhood and co-operation. Lack of discipline is like a ship without rudder.Beauty takes the attention, but personality with good discipline takes the heart. If you want to full fil l the slogan Mera Bharat Mahan, our country should have a well discipline citizen. For that education is the main source. Let us anticipate a well discipline generation. Jai HindThank You

Saturday, January 26, 2019

Charles Dickens Essay

Comparing the ways in which tension and suspense is created in the opening sequences of David Leans 1946 & deoxyadenosine monophosphate Julian Jarrolds 1999 interpretation of Great Expectations by Charles Dickens In David Leans 1946 interpretation of Great Expectation shoot down is portrayed as a small, smart, clean young boy, as he lead be considered more innocent and vulnerable to the auditory sense. Pips handsome hair colour against the smuggledening background makes the earshot think that he is an saintly ilk figure.Lean shows the vast grace with tall-silhouetted gibbets to indicate rightful(prenominal) how small and vulnerable Pip is running across the marshland. When Pip goes to experience and weed the grave of his parents, Lean shows this particularly to gain the audiences humanity. The audience hears everything that Pip hears and this helps us to understand his apprehension. The scream is shocking and makes us see his fear to his meeting with the convict. Whe n he is being threatened, Pips overwhelming politeness and naivety, despite the life-threatening situation he is in, makes the audience feel a great deal of sympathy for him.However, in Julian Jarrolds 1999 interpretation of Great Expectations Pip is portrayed as a scruffy and an unclean young boy. This fig gains the audiences sympathy as we can tell that he is mistreated at home. Jarrolds Pip has dark hair and although he is not seen as an angelic and innocent figure. Jarrold engages the sympathy of the audience by presenting him as a hunt animal. When Pip encounters the convict, he is undoubtedly terrified and traumatised. He cannot scour typeface at the convict, and is so paralysed with fear he cant even speak.When we first meet the convict we can see immediately how frighten he can be. David Lean shows a close-up of his face simultaneously to him leap onto the scene. This close-up view is being used to show us what the convict is view and excessively to show the anger. Th is close-up view is also used to prevent us seeing what Pip is doing when the camera zooms up on the convict. Therefore we fill for Pip and this adds to the suspense of the moment.The convict is an intimidating large man who has a lot of power over Pip. In the branch he is incessantly shot in tail, whereas Pip is always shot in silklike at large(p) to emphasise his honor. This is particularly noticeable when the convict is in control, nerve-racking to tilt Pip over the gravest unmatchable. There is a cut betwixt Pip and the convict to show Pips vulnerability and a close-up of his face highlights his terror. Pip is shown as the opposite to the convict and looks innocent, charming and neatly dressed. The convict however looks angry and dirty and we presume that this is what he is like and and then regard him as a bad person.Language is also used to emphasise the convicts aggressiveness. The convict specifically emphasises the terminology roasted and also tear him open. Thes e words are emphasized to scare Pip and also to shock the audience. It draws the audience into the story and makes us feel Pips intimidation. The convicts terrifying image adds to the forbidding setting. Julian Jarrolds version of the convict is shown to be fabulously daunting and intimidating. Although no dialogue is spoken we can see from his obdurate stare on Pip and his angry scowl that he intends to do harm to him. The convict is dressed in old dirty clothe and looks very ill groomed, this adds to the audiences understanding of him as an break loose convict.Lean uses some effective techniques to show the characters. He shows the vast landscape with tall-silhouetted gibbets to indicate just how small and vulnerable Pip is. The use of light and dark is very effective when me meet the convict. Pip remains in the light but the convicts face is shrouded in darkness to convince the audience of his an evil nature. Pips lightened appearance shows his innocence and makes the aud ience wonder why such a nice boy is in such a dark and gloomy place. After the confrontation, Pip is seen scrabbling home across the marshes as quickly as possible, against the same supernatural landscape.The setting in Jarrolds 1999 interpretation is less stereotypical. It is not dark and the sky is sunny. There is a very high-pitched note, which appears haunting and creepy to the audience. Just before we see Pips head chirrup out of the wheat field, from the convicts point-of-view, we hear breathing and this causes suspense, as we cannot see anyone. The setting of a wheat field is less handed-down and does not prepare us for when the convict creases Pip, as no one would expect to find a convict in the middle of a wheat field.The golden reeds add to the peaceful tranquillity of the first shot, and therefore relax the viewer. Jarrold uses his own ideas and makes the opening more intriguing and exciting. At the beginning we have no idea what is going to happen and because of thi s Pips running come as a shock, and therefore has more impact. This provides the audience with an immediate incentive to continue watching. We then follow the dramatic chase that Jarrold has constructed through a wheat field and the graveyard. Jarrolds use of point-of-view shots move on the audience a chance to feel more involved in the film and to help them to feel the confusion of the chase. The wheat field itself is Jarrolds own notion and is not mentioned anywhere in the written novel. However, this rattling helps to show Pip is trying to hide but that he cannot escape.

Thursday, January 24, 2019

Basic Prerequisite Skills for the Global Workplace Essay

Outline some of the main issues facing higher fostering in the 21st century. To what extent is higher knowledge an effective means of both obtaining employment and learning the basic essential skills for the global workplace? Higher Education is one of the most principal(prenominal) phenomenons in the 21st century. It is undergoing some major transformations and developments which are mainly conventional by Globalization. Such as, international education, global capitalism, spread of culture and media, grapple and work.Thus, its crucial to interpret the term of Globalization, which becomes a major desktop of other phenomenon, including high education. Certainly, higher education provides prerequisite skills and higher sustenance opportunities to nation. However, the education system today is facing some challenges. There is over-education and over- turn in of educational existence and the change of the global labour market. Higher education provides to a greater extent ch ances for people to obtaining jobs. People who graduated from university are highly employable due to their wealth knowledge, creativity and ability of solving problems.According to the enquiry of Yue et al. (2004) The level of education level has a signifi croupetly positive usurpation on successful job seeking. The higher the education level, the greater the chance of success. Which indicated that higher education make a positive effective to people in job seeking as well as working in a favorable position. The reputation of the higher education institution also has a significant and positive impact on employment. Graduates from delineate universities have greater employment probabilities than their counterparts from ordinary universities.The employment rate of graduates of populace institutions is significantly higher than for private institutions. (Li, 2008, p8) Moreover, a good paper energy helps you attract the attention of the boss. Employers are preferred to hire a mo re promising candidate with a better degree than someone whos just out of school, without a pretty diploma. Furthermore,people who studied in university can gain more information about potential employment from universities or collages have ?? apparent advantages both in employment probability and the kickoff salary. (Spence,1973Stiglitz,1975).

Tuesday, January 22, 2019

The Ten Plagues of Egypt

TAKE HOME tag After hearing the full version of this song in sept your ch every(prenominal)enge is to memorize and/or remix it First divinity fudge sent, disgust go one, Turned the Nile into blood. whole the mint in Egypt were feeling pretty low, They told Pharaoh allow them Go therefore paragon sent, execration number two, Jumping frogs all over you. All the mountain in Egypt were feeling pretty low, They told Pharaoh let them Go Then God sent, Plague number three, Swarms of gnats from head to knee. All the people in Egypt were feeling pretty low, They told Pharaoh Let them Go Then God sent, Plague number four, Filthy ? ies need we say much? All the people in Egypt were feeling pretty low, They told Pharaoh Let them Go Then God sent, Plague number ? ve, All the livestock up and died. All the people in Egypt were feeling pretty low, They told Pharaoh Let them Go Then God sent, Plague number six, Boils and sores to make you sick. All the people in Egypt were feeling p retty low, They told Pharaoh Let them Go Then God sent, Plague number seven, Hail and lighting down from heaven. All the people in Egypt were feeling pretty low,They told Pharaoh Let them Go Then God sent, Plague number eight, Locust came and they sure ate. All the people in Egypt were feeling pretty low, They told Pharaoh Let them Go Then God sent, Plague number nine, Total darkness all the time. All the people in Egypt were feeling pretty low, They told Pharaoh Let them Go Then God sent, Plague number ten, Pharaohs son died so he gave in. All the people in Egypt were feeling pretty low, Finally Pharaoh let them go. *Parents the original song is to the line of products of This Old Man

Friday, January 18, 2019

Plastic and Specific Technical Needs

Answer charge plate was thought to be a boon but it turned out to be a curse. Plastic can be very harmful as it produces harmful gases when it is burned. As it is non bio degradable, it is harmful to the soil and takes hundreds of years to degrade or decompose. Plastic is a boon for man but it is a curse for the master. It makes life booming for man but life tiring for the environment. Once animals have eaten it and collectable to choking they die Plastic is very harmful to living things. We should slump the function of plastic. In India economic function of plastic has been banned.Packaging represents the largest single sector of plastics use in the world today. Benefits of plastics-Boon The considerable growth in plastic use is due to the beneficial properties of plastics. These include Extreme versatility and ability to be adapt to meet very specific technical needs. Lighter weight than competing materials, step-down fuel consumption during transportation. Extreme durabil ity. Resistance to chemicals, water and impact. Good condom and hygiene properties for food packaging. Excellent thermal and electrical insulation properties. comparatively inexpensive to produce.Plastics makes up around 7% of the average household dustbin. set up of plastic-Curse. Plastics toil also involves the use of potentially harmful chemicals, which atomic number 18 added as stabilisers or colorants. Many of these have not undergone environmental risk perspicacity and their impact on human health and the environment is presently uncertain. An moral of this is phthalates, which are used in the manufacture of PVC. PVC has in the prehistorical been used in toys for young children and there has been concern that phthalates may be released when these toys are sucked (come into contact with saliva).Risk assessments of the effects of phthalates on the environment are currently being carried out. The disposal of plastics products also contributes significantly to their enviro nmental impact. Because most plastics are non-degradable, they take a long time to break down, possibly up to hundreds of years although no-one knows for certain as plastics havent existed for long enough when they are landfilled. With much and more plastics products, particularly plastics packaging, being disposed of soon after their purchase, the landfill post required by plastics waste is a growing concern.Plastic waste, such as plastic bags, often becomes litter. For example, nearly 57% of litter found on beaches in 2003 was plastic. Recycling plastic -Advantages. Conservation of non-renewable fossil fuels Plastic production uses 8% of the worlds oil production, 4% as feedstock and 4% during manufacture. Reduced consumption of energy. Reduced amounts of solid waste going to landfill. Reduced emissions of carbon-dioxide (CO2), nitrogen-oxide (NO) and sulphur-dioxide (SO2)

Thursday, January 17, 2019

History of chocolate Essay

- burnt umber is one of the oldest treats enjoyed by many people. I have loved drinking coffee tree ever since I was a little girl. I have enjoyed the different tastes, textures, and styles of it. I necessity to share with you the narrative of chocolate, types of chocolate, and some benefits from eating chocolate. Chocolates history started over 2,000 years ago. It began in the tropic rainforests of Central and South the States from the seed of the cacao tree. This small tree grows best in the tropical atmosphere because it receives the best amount of rain, shade, humidity, wind, and nutrients.A. According to Susan J. Terrio, the author of Crafting the Culture and muniment of French Chocolate, the first people known to have made chocolate were the ancient cultures of Mexico and Central America. These people, including the Maya and Aztec, mixed ground cacao seeds with various seasonings to determine a spicy, frothy drink. This was the very first way that chocolate was consumed Chocolate played a special role in both Mayan and Aztec august and religious events. Priests presented cocoa beans as offerings to the gods and served cocoa drinks during sacred ceremonies.All of the areas that were conquered by the Aztecs that grew cocoa beans were ordered to pay them as a tax, or as the Aztecs called it, a tribute. 2 The Europeans sweetened and lightened the drink by adding refined chicken feed and milk, ingredients the people in Mesoamerica did not use. By contrast, Europeans never integrated it into their ecumenical diet, but compartmentalized its use for sweets and desserts. In the 19th century, Briton buns Cadbury developed an emulsification process to make solid chocolate, creating the modern chocolate bar. For hundreds of years, the chocolate making process remained unchanged.When the industrial Revolution arrived, many changes occurred that brought the hard, sweet glass over to life. In the 18th century, mechanical mills were created that squeezed out cocoa butter, which in turn helped to create hard, durable chocolate. 3 But it was not until the arrival of the Industrial Revolution that these mills were put to bigger use. Not long aft(prenominal) the revolution cooled down, companies began advertising this new invention to sell many of the chocolate treats seen today. 4 When new machines were produced, people began experiencing and consuming chocolate worldwide.

Wednesday, January 16, 2019

Hurricane Charley Essay

Trees down ever soy where, houses crushed, roofs gone, thousands of raft without power, cars damaged, group dieing. Hurricane Charley was perhaps one of more or less devastating events that I subscribe ever experienced, in my entire life. The next morning after hurricane Charley hit, we drove outside and saw the devastating remains that Charley left. The roads were full of chaos, with no merchandise lights, and the gas lines were insanely long. I was genuinely fortunate to only slow down my power and cable, in comparison to some people loosing a love one. This hurricane caused approximately $20 billion in damages, which is nothing compared the 19 lives it took. I learned to never underestimate the effects of a hurricane, always be prepared for a hurricane, and to always regard and help the less fortunate.Hurricane Charley wasnt perceived as a very powerful hurricane to a dowery of people as it progressed more towards Central Florida. I opinion that a spread of people wer e not very prepared for Charley, just as I wasnt. When I heard nigh this hurricane coming I intellection, Oh, other hurricane coming, there is going to be a lot of rain. I didnt view it was going to be a big deal at whole. After the hurricane hit, I realized that I was completely wrong. i should always be prepared for a hurricane. I think that this statement is most definitely true, and should be carried out by everyone. Every household should let plenty of water, money, gas, batteries, flashlights, and many other things stashed away in their houses. There were study gas outages at the gas stations, because people were filling up their generators and cars. One of the major problems was that almost everyone was out of power, so you could cook or take place things cold without a generator. This lead to everyone needed ice to keep their very expensive groceries cold.When I looked back at what resulted from Charley, I actually feel fortunate. Yes, Charley did cause my dad lost b usiness, left a lot of metre for me, left power and cable outages, and hundreds of dollars of meat to go bad. When I judgement about this I felt kind of unfortunate but, when I thought about the people that starve day after day on normal bases in places like Africa, I feel fortunate. A lot of people in other countries dont ever have power, cable, or even houses for that matter. I think that after events like this, we should all pull together and help one another. Volunteer to help your neighbors and people that had it worse then you, have free barbeques with your meat that is going to go bad anyway, and most of all give everyone moral support.I think that Charley was a very important learning experience for a lot of us and should be thought about in different views. If you think about it, were you that effected by hurricane Charley? Did you take your power for granted? Were you wellspring prepared for this hurricane? Did you underestimate Charley? All of these are important t hings to think about as you look back on Charley.

Tuesday, January 15, 2019

Benefits of Drinking Coffee and the Benefits of Green Tea Essay

Compare and contrast the benefits of drawing coffee bean with the benefits of squirt tea? It is nice to have a cup of spicy drink in the morning, there are many elections which to choose, such as coffee and green tea, two famous drinks in the world. They have various effects on body, and could foreclose dissimilar kind of diseases, one similitude thing is both of them contain Caffeine. Coffee could effects on body, prevent diseases and contain vast caffeine. Your muscle strength will be stronger afterwards you drink coffee because of caffeine, coffee couldnt coiffe you fatter, but if you send refined sugar into your coffee, it will make your stature fatter, and almost everyone put sugar in theirs coffee.According to Brian Fung (2012, July 3rd), We are learned that coffee can shelter your heart, reduce the risk of prostate and breast cancer, and curb the risk of fibrosis among those with roly-poly pudding liver disease. Drink coffee is not a preferred option before you go to bed, because of the caffeine, it could stronger refresh you, so it better to drink it in the morning. Green tea could make you body slim, prevent diseases and contain caffeine. An antioxidants called catechins was build in green tea, it could inhibits the cholesterol produce, decrease the cholesterol content could make you body healthy.According to Leslie Beck (2011, July 5th), Its a beverage thats touted to rising slope metabolism, prevent cancer, ease arthritis pain, even fight dental cavities. Now, new con findings suggest theres one more reason to drink green tea It lowers blood cholesterol. If somebody was drunk, green tea could overhaul you get out of that bad condition because the caffeine that in green tea could boost metabolism. In conclusion, different people have different opinions, both coffee and tea is benefit for us. So what drinks is not outstanding, the important thing is to understand yourself and find an appropriate drink.ReferencesFung, Brian. (2012, Jul y 3rd). The Case for Coffee whole the latest research to defend your caffeine addiction, in one place. The Atlantic . Retrieved from http//www.theatlantic.com/health/archive/2012/07/the-case-for-coffee-all-the-latest-research-to-defend-your-caffeine-addiction-in-one-place/259404/.UGODjDyjSBw.email Beck, Leslie. (2011, July 5th). Why green should be your cup of tea. The ground and Mail. Retrieved fromhttp//www.theglobeandmail.com/life/health-and-fitness/why-green-should-be-your-cup-of-tea/article4210709/

Monday, January 14, 2019

Pierre Bourdieu

smashing of South Dakota Bourdieu (19302002), Professor of Sociology at the College de France, might come into view an unlikely outlook for inclusion under the rubric of censorious surmisal. An erstwhile geomorphologicist, whose regulate sometimes appe ared to run equivalent to that of Foucault, an erstwhile anthropologist and former student of Levi-Strauss, he was in numerous respects a peculiar(prenominal)ally cut theorist.However he distanced himself from the quarryivism of structural anthropology, at the aforesaid(prenominal) time as remaining stubbornly contrasted to to post-structuralist deconstruction (Bourdieu, 1977 Bourdieu, 1984, p. 495). Furthermore, his work engaged rattling at once with both redness and Weberian traditions in neighborly theory. One critic has sluice observed that it is lift out understood as the attempt to push class analysis beyond Marx and Weber (Eder, 1993, p. 63).Definitely, if critical theory is described in terms of its butt to cha nge the world, then Bourdieu was as signifi groundworkt a theorist as any. Throughout the late 1990s, he appeared as by far the some well-knget donnish intellectual to join in active solidarity with the raw(a) antiglobalisation movements. His La Misere du monde, first published in volume in 1993 and in paperback in 1998, turned out to be a bestseller in France and a main source of political motivation to the movement, both in the original and in its slope translation as The Weight of the World.He was directly implicated in militant antiglobalisation activism, speaking at mass meetings of dramatic railway workers in 1995 and unemployed workers in 1998 (Bourdieu, 1998, pp. 24n, 88n) he initiated the 1996 formally prayer for an E articulates General of the Social Movement and its May Day 2000 successor, the petition for a pan-European Estates General he confounded the antecedent Raisons dagir group and its associated publishing hearth he overtly called for a left Left (Bourdie u, 1998a) and he was a regular contributor to the radical French monthly, Le Monde diplomatique.We may sum up that, like Marx, Bourdieu attached a distinguishing subtitle to what is still his best-known work Distinction A Social Critique of the Judgement of Taste (Bourdieu, 1984). Bourdieus record as a sociological thinker revolves around the theory of make, in which he tried to theorise valet de chambre brotherlyity as the moderate of the tactical action of individuals operating within a constraining, however not determining, context of values.Notably, the term Bourdieu coined to explained this was the habitus (Bourdieu, 1977), by which he meant an acquired organisation of procreative schemes objectively adjusted to the particular conditions in which it is constituted (p. 95). It is at the same time structured and structuring, clothly produced and very frequently generation-specific (pp. 72, 78). Elsewhere, he explained it as a kind of transforming machine that leads us to regurgitate the social conditions of our own production, but in a relatively unpredictable way (Bourdieu, 1993, p.87). interchangeable Marx and Weber, Bourdieu thinks contemporary capitalist societies to be class societies. However for Bourdieu, their dominant and dominated classes are discernible from each other not simply as a matter of scotchs, however as well as a matter of habitus social class, understood as a remains of objective determinations, he insisted, must be brought into relation with the class habitus, the system of requires (partially) common to all products of the same structures (Bourdieu, 1977, p. 85).Bourdieus closely immensely cited study, though, and undoubtedly the to the highest degree index numberful in heathenish studies, has been Distinction, a work that takes as the object of its critique specifically the same kind of high modernism as that privileged in capital of Kentucky School aesthetics. Where Adorno and Horkheimer had insisted on a rad ical dis tenaciousness between capitalist mass culture as well as daring modernism, Bourdieu would focus on the latters own profound complicity with the social structures of power and domination.The book was footed on an extremely thorough sociological survey, conducted in 1963 and in 1967/68, by interview and by ethnographic observation, of the heathenish preferences of over 1200 people in Paris, Lille and a small French provincial township (Bourdieu, 1984, p. 503). Examining his sample data, Bourdieu recognized three main zones of taste legitimate taste, which was about extensive in the educated sections of the leading class middle-brow taste, more extensive among the middle classes and popular taste, prevalent in the working classes (p.17). He characterised licit taste mainly in terms of what he named the aesthetic angle of dip to state the absolute primacy of form over live (pp. 28, 30). Artistic and social distinction is consequently inextricably interrelated, he argued The pure gaze implies a break with the ordinary attitude towards the world which, as such, is a social break (p. 31).The popular aesthetic, by contrast, is based on the affirmation of continuity between art and life and a deeprooted demand for participation (p. 32). The distinguishing dissolution of this pure gaze, Bourdieu argued, is part of a more general disposition towards the gratuitous and the disinterested, in which the affirmation of power over a dominated necessity implies a claim to legitimate superiority over those who remain dominated by ordinary interests and urgencies (pp.556). Bourdieus general sociology had posited that, without exception, all human practices can be treated as stinting practices directed towards the maximise of material or symbolic profi (Bourdieu, 1977, p. 183). Therefore his leaning to view the intelligentsia as self-interested traders in cultural capital. For Bourdieu, it followed that handicraftal intellectuals were best measured as a subordi nate fraction of the same social class as the bourgeoisie.Defining the leading class as that possessed of a high overall volume of capital, whatever its source whether economic, social or cultural he located the intellectuals in the dominant class by virtue of their entrance to the latter. The dominant class therefore comprises a dominant fraction, the bourgeoisie proper, which also controls economic capital, and a dominated fraction, the intelligentsia, which disproportionately controls cultural capital. The most apparently disinterested of cultural practices are thus, for Bourdieu, fundamentally material in character.Even when analysing the more purely aesthetic forms of literary activity, the anti-economic economy of the country of restricted as opposed to large-scale cultural production, he mention how symbolic, long-term profits are ultimately reconvertible into economic profits (Bourdieu, 1993a, p. 54) and how avant-garde cultural practice remained dependent on the poss ession of substantial economic and social capital (p. 67). Finally, Bourdieu comes to discuss current practices in the visual arts. He sees the current bureaucratization and commercialization of the express mail modernist field as a bane to artistic autonomy.He registers with disquiet certain recent developments which put at risk of exposure the precious conquests of the elitist artists-the interpenetration of art and money, with new patterns of patronage, the growing dependency of art on bureaucratic control, plus the consecration through prizes or recognise of whole kit and boodle successful still with the wider public, alongside the long-cycle modernist works cherished by artists themselves. Bourdieus critique of idealise artistic disinterestedness has been incorrectly reinterpreted as a theory of extensive egoistic domination, not least by the consecrated avant-garde.Bourdieus socio-analysis of the artists has shown, in anguish of charismatic ideology, that in practice the Impressionists and subsequent modernists lived a comfortable man by the time of their middle age, and that usually gallery owners or dealers exchange their works on their behalf, therefore relieving them of attention to the Vulgar needs of material existence. Bourdieu as well accounts for certain recurrent features of the closed worlds of art, for example the social ingenuousness of artists struggles over cultural politics, which the spiritualistic account cannot explain.Contrary to the orthodox expectations of sublimated suffering, Bourdieu cites numerous examples where the conflicts between artists over their specifically artistic interests caused open violence the Surrealists fight, in which Andre Breton broke a fellow artists arm, is a case in point. Nor did the idealized expectations of art stop numerous cultural producers collaborating with the Vichy regime in the 1940s. In The Rules of Art, Bourdieu resumed many of the themes first broached in Distinction, particularly the role of cultural discernment as a marker of class position.Here he elucidated how Flaubert, Baudelaire and Manet had been critical to the institution of an autonomous artistic field of salons, publishing houses, producers, commentators, critics, distributors, and all that and to the cheek of a idea of art for arts sake, which measured legitimacy as disinterestedness. For Bourdieu, the latter concept marked the genesis of the modern artist or writer as a fulltime professional, devoted to ones work in a total and exclusive manner, indifferent to the exigencies of politics and to the injunctions of morality (Bourdieu, 1996, pp.767). This new artistic field had created a zone of autonomy, free from both the market and politics, in its heroic phase, throughout the latter part of the 19th century. But in the 20th century, Bourdieu argued, modernist art had developed not as a critique of the iron cage of instrumental rationality, however as a function of the power games of the domina nt classes, its capacities for critical distance gradually eroded through cooption by both the market and the state education system.Bourdieu detected analogously interested processes at work in the academic intelligentsia. The academic profession is a competitive struggle for authenticity and cultural distinction, he elucidated, which functions to reproduce the wider structures of social class inequality whether applied to the world, to students, or to academics themselves, academic taxonomies are a machine for transforming social classifications into academic classifications (Bourdieu, 1988, p.207). Afterwards he would emphasis the central significance of the elite graduate schools, the alleged grandes ecoles, to the power of the French social and economic elite, showing how their credentialism operated as a kind of state magic for a supposedly rationalised society (Bourdieu, 1996, p. 374).Tracing the growing incidence of academic credentials among the chief executives of the top 100 French companies, he think that the obvious substitution of academic for property titles in fact performed a vital legitimating function company heads no longer appear the heirs to a fortune they did not create, he wrote, but rather the most exemplary of self-made men, appointed by their merits to wield power in the name of competence and intelligence (p. 334).Where the Frankfurt School had worked with a lesson of theory as overtly critical, Bourdieu tended to have an effect on a quasipositivistic objectivism, in order that the moment of critique was often concealed stinker a mask of scientific objectivity. In The Weight of the World, he used a mixture of ethnographic interviews and sociological commentary to hinge upon a stunning condemnation of contemporary utilitarianism in the shape of economic liberalism as creating the preconditions for an unprecedented development of all kinds of ordinary suffering (Bourdieu et al. , 1999).However even here, in his most explicitly engaged work, he still insisted that sociological science could itself uncover the possibilities for action that politics will require exploring (p. 629). Where the Frankfurt School had conceived of intellectuals as considerably productive of critical sensibility, Bourdieu tended to detect merely material self-interest. This sort of reflexive critique is essential, he argued, to break with the habits of thought, cognitive interests and cultural beliefs bequeathed by several centuries of literary, artistic or philosophical worship (Bourdieu 2000, p. 7).However such cynicism can easily cause a radical overappraisal of the reproductive powers of the social status quo. Even though Bourdieus vocabulary of cultural capital and symbolic profits has sometimes misled his readers, his persistence on the complex motives in artists desire to make a mark does not permit him to forget the very important differences between the artistic field and the field of capitalist power. Bourdieu argues th at the characteristic nature of artistic and other cultural fields is that they exist in the form of reciprocal gift exchange somewhat than being live by money.Further, he does not lessen artists to their class position, nor does he recant that artists may certainly be singular figures. Indeed, the comparison across the limited and expanded artistic fields sharpens approval of the differences between the autonomous artists and others. The sociological analysis of the artworks, which illustrates how they are necessitated by social situation and artistic position-taking, can therefore become a piquant sauce which serves to intensify the pleasures of the works. References Bourdieu, P (1977), draught of a Theory of Practice, trans. R.Nice, Cambridge University Press, Cambridge. ___(1984), Homo academicus, English edn 1988a, Homo Academicus, trans. P. Collier, Polity Press, Cambridge ___(1988), Lontologie politique de Martin Heidegger, English edn 1991b, The Political Ontology of Mar tin Heidegger, trans. P. Collier, Polity Press, Cambridge ___(1993), Concluding remarks for a sociogenetic understanding of cultural works in Bourdieu Critical Perspectives, eds C. Calhoun, E. LiPuma and M. Postone, Polity Press, Cambridge ___(1993a), The Field of Cultural ware Essays on Art and Literature, ed. and introd. R. Johnson, Polity Press, Cambridge___(1996), Sur la television, English edn 1998c, On Television, trans. P. P. Ferguson, New Press, New York ___(1998), Contre-feux. Propos pour servir a la resistance contre linvasion neo-liberale, English edn 1998b, Acts of Resistance Against the New Myths of Our Time, trans. R. Nice, Polity Press, Cambridge ___(1998a), La domination masculine, English edn 2001, virile Domination, trans. R. Nice, Stanford University Press, Stanford, CT ___and L. Wacquant (1999), On the cunning of imperialist reason Theory, Culture and Society, 16/1 ___ (2000) Pascalian Meditations. Cambridge Polity Press Eder, K (1993). Th

Reunion Essay

Reunion is a short story, scripted by John Cheever. John William Cheever was an American short story author and novelist, who lived 70 years from May 27, 1912 to June 18, 1982. He is known worldwide as the Chekhov of the suburbs and for his many short stories and novels. 1 The short story Reunion, which I want to analyse and interpret, was originally published in in 1962 in The New Yorker. 2 The text is a short act with some persons, the environment is non-detailed and the story have one conflict, which all are characterising a traditional short story.The story is round a boy named Charlie, who is travelling from his grand puzzles in Adirondacks to a cottage on the curtain and is exhalation to be amidst makes for an hour and a half in New York. He grabs the opportunity to visit his beat, who he had non bring outn since his m new(prenominal) divorced him three years ago. As Charlie arrives to the Grand Central Station, he meets his missing tyro, and together they walked o n to a nearby restaurant. Charlie was happy to lastly insure his father, and as they walked together, Charlie proudly wanted the whole world to see them.At the restaurant the father could non support himself because of his dissatisfaction with the service, and they ended up departure to eat at some other restaurant. At the second restaurant they say a drink and where having a good sequence with distributively other, exactly the good time ended early, once again because of the fathers unsuitable behaviour. This time he was unsatisfied with the waiter, who did not wanted to give Charlie another drink, because of his age. They went to another restaurant again, where the father in like manner started arguing with the waiter.They walked into the fourth restaurant and the comparable happened. All the restaurant trouble had made the time pass, and Charlie had to catch his train without a successfully restaurant visit. The father wanted to give Charlie a paper to read in the tra in, and at their way back to the station, they halt by a newsstand. The father began discussing with the man at the newsstand, and Charlie ended up saying goodbye to his father to leave the station on the train, unhappy, defeated and without any food or paper. The primary(prenominal) characters in the story are Charlie and his father.Charlie is a boy, who wishes to have a father to look up to and be proud of, but got the complete opposite. Charlie is under 21, because he cannot be served spiritous drinks in the restaurant. From what Charlie tells in the beginning, we know that the father is big and good-looking. I deliberate of him as a stressed businessman with too many things going on at the same time and maybe a brusk abuse of alcohol. The reason to my thoughts is, that his wife divorced him, he have not had time to see his son since, his secretary is answering his messages and he cannot behave himself in the restaurants.In the story there is a development between the fathe r and Charlie. To begin with their relationship is good and they are both happy to see each other. But as the fathers behaviour is get worse throughout the story, Charlie begins to realise, that he feels disappointed and unhappy about his father and his behaviour. This negative development is clearly shown at the end of the story, where Charlie ends up loss his father with an empty feeling. The text is easy to read and it is easy to interpret the language.The storyteller is Charlie, and he tells the story from his own point of view. The story also tells about Charlies thoughts and feelings, for example his excitement and happiness about perceive his father in the beginning. The writer is also using direct speeches between the father and the different waiters and Charlie to show and underpin the fathers disadvantageously behaviour. The story takes perspective in New York, USA and the action takes place on the Grand Central Station, the 4 restaurants, the streets they are walkin g sports stadium and the newsstand.The story is, like I said earlier, from 1962, but I think, that it is timeless, because it is a story, which could have happened today as well. I would even say, that the story fits 2013 go against than 1962, because it is more normal and frequent to be divorced and have a busy and stressed life. There are some different guinea pigs show in the story. One of the themes is stress. It is clear, that the father is very stressed about something. It could be his failed marriage, his job or just his insecurity about not cosmos a good enough father to Charlie. That leads us to the next theme destructive parenting.Charlie has not seen his father since the divorce three years ago, and that is of tier not good parenting by neither of the parents. It is of course the fathers problem, but the mother could maybe also have had a bad influence in the situation. I think the two themes reminds a cumulus of each other. In this story stress leads to bad paren ting. The fathers own life is stressed, and that is making his behaviour to other citizenry bad. His bad behaviour to other passel is making him a bad parent, because Charlie plainly does not like being with his father, when he acts in that way.With these two themes, the main theme and the message of the story appears. I think, that John Cheever wants to remind people of the importance of treating other people in the same way, that you treat your nighest friends and family. Because in the story it is the fathers bad treatment of other people that courses his bad relationship to his own son. That leads to the message no progeny how busy and stressed you are, always remember to treat other people in the same way, that you go out treat your own family, or else you will loose the ones you care about.Reunion and Living with strangers have a cud of the same aspects. Living with strangers has a narrator, who describes the life in New York, where strangers does not care about you and are living their own stressed life. The narrator is from another culture, a smaller city, where it is normal to talk and care about other people, and she does not like the way the people of New York treats each other. The narrators situation is very similar to the narrator in Reunion, Charlie, who does not like his fathers behaviour.

Sunday, January 13, 2019

Cyber Security India Essay

After mainland China and the U.S., India has the highest mo custodyt of profit enjoymentrs. Thither be as rise up as an estimated oer 381 one thousand thousand officious sh cadence forward subscriptions with mesh survey connectivity. In the list of online contagion risk India ranks 9th and in personal com throw a vogueing machine crossways the globe, India ranks 7th. A upstart cogitation by McAfee named India next to Brazil, Romania and Mexico the least adapted to defend against cyber fill outs. Cyber valueive coering curses and hacking attempts in India rosaceous to 22,060 in 2012 from 23 in 2004 What it nitty-grittyCyber terrorist act is the crossing of terrorism and net profit. It is in the main d accept the stairsstood to mean unlawful attacks and threats of attacks against computers, ne two(prenominal)rks, and the selective tuition stored in that respectin when d unitary to intimidate or coerce a establishmental science or its people in go onance of semipolitical or well-disposed objectives. Cyber ThreatsCyber threats ro custom be disaggregated, picture on the perpetrators and their motives, into four baskets cyber espionage, cyber fightf atomic number 18, cyberterrorism, and cyber curse. Cyber kingdom of warf atomic number 18 attacking the contemplateing governances of an different(prenominal) countries for espionage and for disrupting their minute base of trading operations.Why Cyber guarantor de ramifyment is subscribeed threesome rough populous countrified subsequentlyward China and India is non each geographical entity exclusively a virtual asseverate c unlessed facebook The uniform deliberation DNA that produced the chat theory r phylogeny has too framed acute vulnerabilities and loving terror targets for societies that depend on cyberspace for subject field warranter department and frugal survival. The festering dependency on the information engine get on (IT) exonerat es cyber tri unlesse a vital component of the Indias home(a) tri barelye al-Qaida. Lately, selective information collection, outgrowthing, storage, transmittal capabilities, mobile, wireless, and cloud computing are change magnitude in huge deems and nonplus cyber attacks easily to occur. Con lieured the tenderest eye socket in modernistic warfare, cyberspace has straightway joined the ranks of handed-down areas assessed by militaries alone all over the instauration. And this is yet how cyberspace should be assessed, since an effective terrorist attack against a nations strength grid,for ex angstromle, could result in massive freeing of life, crippling damage to under building and a blow to the economy that could take historic period to repair. Stuxnet has carried out what in the past could lone(prenominal) be accomplished by at one time bombing a verdants infrastructure or sending in kind-hearted agents to proposet explosives. It can make believe Infras tructures worry banking system, air traffic go out, representation infrastructure and gas pipelines. Destruction now can bypass the military displume and attack via cyber-brute- squash suppressing a countrys military control systems, navigation, communication system, windup down or paralysing scathing infrastructure and affecting the countrys economy, cyber-weapons linking nu abstemious weapons Most common usage of net income is by designing and uploading weathervanesites on which faithlessly propaganda can be pasted. This places under the fellowship of using technology for psychological warfare. The web can rear and support acts of terrorism by means of propaganda, promotion, instructional worldly care exposure and execution, financing, raising, recruiting and can similarly facilitate particularized attacks. Non- put up actors dumbfound the technology to create cyber attacks or endanger the cyber environment of the orbiculate socio-political system. The 201 1, Arab inception revolution in Tunisia, Egypt, and Libya was winning to use cyberspace to pass its message. Threats abound cyber crime, cyber espionage, cyber war and cyber terrorism, all represent genuine risks to nations, firms and soulfulnesss to the highest degree the world. Experts reckoned it is a matter of time in the archetypical holding cyberspace becomes an independent theatre of war. With the rapid march of technology, such attacks impart just now become to a greater result far-flung as the use of internet for manipulating things increases. We affirm now entered into a new material body of conflict in which cyber weapons can be use to create physical goal in someone elses tiny infrastructure. And thither is a distinct misfortune that the disruptions and dislocations it faces are permanent and severe.E.gThe Flame virus (which has been circulating for more than five geezerhood and has yet to be claimed by an owner, although supposition centres around Israel) has turned the computer into the last-ditch spy, gathering information files, turning on PC microphones to record nearby conversations, enter instant messaging chats, winning block out shots and even remotely changing strike offtings on some different computers. more(prenominal)over, hacker groups, such as Anonymous and Lulz aegis (Lulz Sec), soak up kill distri only whened denial of service (DDOS). Under that process, they were successful to deface websites to divers(a)(a) brassal and incarnate interests. They hacked NASDAQ and world-wide Momentary Fund (IMF). Internets capabilities dictate the rules of soak upment in cyberspace to initiate on-ground battles and at the same time create a stiff ground for new, aspiring jihadist. In the recent past, the case of Stuxnet virus which attacked centrifuges. While the targeted dupe was the Natanz nuclear site in Iran, other organisations across the world, including in India, run with the reciprocal ohm system s uffered from collateral damage from the attack. Since 2000-01, there welcome been regular draws of Pakistani cyber venomouss defacing Indian websites and writing derogatory messages against India. On the other hand, China has become a unnerving adversary in cyber space. Recent cases of Chinese hacking into m whatever Indian authorities plaque computers and even the extremely reassure bailiwick protective cover domains admit enough consequence of its capability in waging cyber warfare. Since 2003, the Peoples Liberation Army has dexterous more than 30,000 cyber warriors and a nonher 150,000 in the private sector. accord to several reports available in the human beings domain, the Chinese goal is to build the worlds best informationised armed forces. be Counter Cyber aegis Initiatives.Indian computing device Emergency Response Team (Cert-In).Cert-In is the most primary(prenominal) constituent of Indias cyber community. Its authorisation states, run across warra nter of cyber space in the country by enhancing the warrantor measures communications and information infrastructure, done pro participating exercise and effective collaboration aimed at warrantor incident saveion and reply and protective cover assurance. return selective information hostage Assurance Programme (NISAP).(a) establishment and detailed infrastructures should make a earnest measures indemnity and create a point of contact. (b) compulsory for organizations to implement protective covering measure control and report any credential incident to Cert-In. (c) Cert-Into create a panel of auditor for IT security.(d) each organizations to be study to a three party audit from this panel once a year. (e) Cert-In to be reported virtually security compliance on biannual basis by the organizations.Indo-US Cyber Security fabrication (IUSCSF).Under this forum (set up in 2001) high index finger delegations from some(prenominal) side met and several initiativ es were announced for intensifying two-sided cooperation to control cyber crime amid the two countries.To mitigate supply- string risks emanating from telecom equipment manufactured by companies belonging to China, the telecom and home personal business ministry chip in issued guidelines mandating service set ups to secure their vanes and instal equipment that has been tested as per worldwide standards.CCTNS taking help of ISRO for making project fully indigenous Warned by intelligence agencies that using a foreign satellite in the pro make up nationwide Crime and Criminal trailing Network and administrations (CCTNS) could make comminuted informationbases under attack(predicate) to eavesdropping by other countries, the Union rest home Ministry has decided to take the help of the Indian Space enquiry Organisation (ISRO) to make the project fully indigenous. Since the intelligence agencies brocaded objections to the proposed use of the IPSTAR satellite managed by Thaico mm in the project, the BSNL diverted to this project some four hundred VSATs that it had for other services.Fact Box interior(a) Cyber Coordination eye (NCCC)Indian establishment exit establish its own multi- situation body subject Cyber Coordination Centre (NCCC) that would carry out real time assessment of cyber security threats and generate unjust reports/alerts for proactive actions by law enforcement agencies. NCCC , to be set up at a cost of Rs cytosine0 crore, would be a multi-agency body under Department of Electronics and IT. It allow function in sync with other political sympathies agencies. These agencies include depicted object Security Council Secretariat (NSCS)Intelligence Bureau (IB)Re seek and Analysis Wing (RAW)Indian computing device Emergency Response Team (CERT-In) home(a) Technical Research Organisation (NTRO) refutal Research and Development Organisation (DRDO)DIARA ( falsification selective information Assurance and Research mission) Army, Navy, Air stormDepartment of TelecommunicationsWhat go out be its functions?It pass on be Indias first layer for cyber threat supervise and all communication with government and private service providers would be done this body only. The NCCC would be in virtual contact with the control way of life of all Internet Service Providers to scan traffic at heart the country, flowing at the point of entry and exit, including international gateway. obscure from monitoring the Internet, the NCCC would look into motley threats posed by cyber attacks. The agency pull up stakes provide law enforcement agencies direct gravel to all Internet accounts, be it e-mails, blogs or kind net workings data.DRDO doesnt uses any US base company services in its organization.ChallengesIn India, we need to create an environment indoors which security is built into our cyber and communications working methods. While it is the government that correctly takes a lead in evolving a rational picture of what constitutes vulnerability in our cyber domain and a strategy on how to forebode attacks, the private sector needs to substantiate the real threat it faces. And this is non a future threat or a prospective threat that we need to rail ourselves against this is an ongoing, current threat.Cyber threat will force to grow collectable to the fast evolution and development of internet and tie in technologies. At the global level, nations are stepping up their cyber demurrer efforts. The U.S. was one of the first countries that considered this to be a strategic problem in 2006, both in basis of nationalsecurity and their future stinting wellbeing.The major concern when dealing with Cyber threats is ubiquity and anonymity. What other international medium is highly accessible, far- come abouting, ridiculously inexpensive, whereby information is transferred at the speed of light, the attacker invisible and untraceable? Unlike a missile trajectory, IP (Internet Protocol) pathwa ys can be mantled and the locations appear opaque. Implicating a source and assign blame to the attack progenitor is passing difficult. the extreme difficulty of producing timely actionable warning of potential cyber attacks the extreme conglomerate vulnerability associated with the IT supply chain for various Indias networks Indias approach to cyber security has so far been ad hoc and piecemeal. A number of organisations demand been created but their on the button roles have non been defined nor synergism has been created among them. Lack of awareness and the culture of cyber security at individual as well as institutional level. Lack of teach and qualified man king to implement the payoff measures. Too many information security organisations which have become weak callable to turf wars or financial compulsions. A weak IT passage which has became redundant collectable to non exploitation and age old cyber laws. No e-mail account constitution curiously for the defe nse reaction forces, police and the agency occasion. Cyber attacks have come not only from terrorists but as well as from neighboring countries inimical to our field interests.Recommendations. internationalistic Co-operationAcknowledging that better indigenous snooping capabilities may not be enough to protect Indias cyber security, guinea pig Security consultant Shivshankar Menon has advocated formulating a set of standard operating procedures (SOPs) ground rules for cooperation which would help India succeed in obtaining Internet information from major powers that control much of cyber space. Given the cyber reality, sensible powers should work towards a globally acceptable cyber regime to bring in a set of rules, build transparency and reduce vulnerabilities. Agreements relating to cyber security should be apt(p) the same brilliance as other conventionalagreements. The government should also consider joining the European Convention on Cyber crime. A 247 nodal point f or international cooperation with cyber regime of other countries should be set up. small InfrastructureCyber security should be compulsory in computer science programme and even separate programmes on cyber security should be contemplated. Government should initiate a special drive of implementing practices in the vital infrastructure sectors and provide necessary budgetary support for such implementation. Government should establish a mechanism for measuring cookery of scathing sectors such as security index, which captures preparedness of the sector and assigns value to it.Government should unified IT Supply Chain Security as an important element of e-security contrive to distribute security issues. Government should promote R&D in private industry by dint of active government support for industry-led research projects in the areas of security. Establish enabling mechanisms to facilitate this. accent mark should be placed on develop and implementing standards and best practices in government surgical process as well as in the private sector. Cyber security audits should be make compulsory for networked organisations. Capacity twist in the area of cyber crime and cyber forensics in terms of infrastructure, respectableise and availability of HR and cooperation in the midst of industry, LEAs and judiciary. Cyber security education, R&D and provision will be an inbuilt part of the national cyber security strategy. uvulopalatopharyngoplasty model should be explored for taking security to the regions and industry sectors. Streng thusing telecom security one of the key pillars of cyber security, especially through development of standards and establishment of interrogation labs for telecom infrastructure(equipment, hardware). to a greater extent investment in this cogitation in terms of finance and manpower. The impact of the emergence of new social networking media, and convergence of technologies on society including business, econom y,national security should be studied with the help of relevant experts, judicialProcedural laws need to be in place to achieve cooperation and coordinationof international organisations and governments to study and prosecute cyber criminals. Government essential(prenominal) put in place necessary amendments in actual laws or enact a new legislation like a Data Protection/Privacy Act so as to safeguard against the debauch of personal information by various government agencies and protect individual solitude. requisite for trained and qualified experts to deal with the highly specialised field of cyber security and laws related to it. Govt MachineryMake it a mandatory requirement for all government organisations and private enterprises to have a designated Chief study Security Officer (CISO) who would be responsible for cyber security. formation of a cyber range to test cyber readiness. More powers to sectoral CERTs.Establish an online mechanism for cyber crime-related co mplaints to be recorded. politymakers need to recognise this and put in place structures that allow the sacramental manduction of cyber security information through both formal and at large(p) cyber exchanges. That requires a fast, unified action between government agencies and the private sector. Indian agencies working after cyber security should also slip away a close vigil on the developments in the IT sector of our potential adversaries. enunciate efforts by all Government agencies including defence forces to attract qualified skilled personnel for implementation of counter measures.Awareness rent to sensitize the common citizens well-nigh the dangers of cyber terrorism. Cert-in should engage academic institutions and follow an aggressive strategy. remainderDefining how we deal with Cyber threats and attacks internationally is all important(p) to peace and security. If Cyber weapons are treated with sputum in comparison to other weapons then it can open the doors tomult ifaceted vengeance if a nation is provoked Enforcing the rectify policies to amalgamate security of governments and law-abiding citizens is critical. The asylum of individuals outweighs commercial piracy. Sophism and intellectual blandishment redirects focus on eliminating irrefutable threats like violence and terrorism. Instead, diluted indications of policies are apply and lives are put at risk. . India must take an previous(predicate) lead in creating a framework where the government, the national security experts and the industry catering to strategic sectors of economy, can come together, to pursue the goal of cyber security in the bigger national cause Need to prepare cyber forces .The United States was the first country to formally declare this as the fifth domain warfare after land, sea, air and space. It has also formally classified advertisement the use of cyberspace as a force, a euphemism for offensive capability. The Chinese adopted the concept of informationali sation in the mid-1990s and have relentlessly built up structures and operations in this domain.Cyber Security Dilemma conjuration Herz, an American scholar of international dealing and law is credited for coining the term security dilemma. The dilemma expresses how both the solid and weak states can upset the correspondence of power that could eventually become a catalyst for war. The security dilemma could bob up from the states accumulation of power due to fear and un currentty just well-nigh other states intentions. Post-9/11, successive US administrations have mostly attempted to handle global dis rule by accumulating more power. Not surprisingly, since 2007, the US has been collecting and analysing portentous amount of data available in the cyber space. Cyber security dilemma of the US was latterly exposed by the US whistle-blower Edward Snowden, giving details round the US content Security Agencys controversial Prism programme. The US, clearly has been monitorin g the global e-traffic covertly and in the process add togethering on cyber activities on Google, You Tube, Skype, Facebook, etc. This has resulted in a huge amount of metadata (a data to the highest degree data). US administration has been spoofing on the rest of the world. In the 21st century, with the number of computerand internet users is increasing significantly, the cyber environment has almost become fundamental to a nations existence. oer the years Information and communication Technologies (ICT) have become underlying to various sectors from social, economic, political to defence. The fillip side to it is that various unauthorised, ilsound, criminal, anti-national and terrorist activities have also become rampant. Astonishing as it may sound, but the third most populous country after China and India is not any geographical entity but a virtual state called facebook The human rights activists and states who are under the US direction consider it an anti-democratic ac t that undermines the civilized liberties and individual secretiveness. The absence of a globally authoritative cyber regime and legal structure adds further to the commotion. The excessive dependence on cyber tools has given rise to various vulnerabilities. Recently the US National Security Agency head word Gen Keith Alexander, who also heads the US militarys Cyber Command, has expressed concerns and is of the opinion that on a scale of 1 to 10, the US critical infrastructures preparedness to concur a destructive cyber attack is about 3, this in spite the US having ceremonious a major defence infrastructure to defend against foreign hackers and spies. This assessment would have-to doe with the US to strengthen its defences further. However, since the nature of the threat is extremely dynamic it may not be possible to build any foolproof defensive mechanism. Any cyber architecture can be viewed as a doubled edged sword either ignore it and be exposed or use it to ones ad vantage. Cyber espionage is here to stay. Today, the US is upfront because of its technological superiority and ability to manage the ICT industry and prevent few acts of terrorism from truly happening. More importantly, the data gathered would have return in other fields too. codaSnowden has clearly exposed the US but it is hard to imagine that the US would take for its cyber activities. As a leading power, the US is accustomed to international criticism, lawsuits and questioning and at the end of the day cyber spying and spoofing actually strengthens their intelligence gathering capability. It is important to put down that cyber expertise offers significant amount of unsymmetric advantage to the user. In the future, it isnot only the US but many other states that are also likely to use this method (mostly covertly). States would support a cyber regime essentially because intelligence collection is not the sole purpose for possessing cyber assets. ITC also leads to sanction a nd its importance for socioeconomic development s undisputed. In general, the norms of retirement in a cyber-era world would remain a unbroken subject of debate since the nature of technology presents a challenging task to gingersnap the actual offender. Technologically superior power would forever have an advantage. The time has come to recognize that in the future we would always be watched and mostly against our own wishesIndia-US collaboration in Cyber SecurityIndian officials and security officers would soon be visiting the U.S. for teach in an array of courses from cyber security, megacity policing and forensics, to critical infrastructure protection, financial terrorism and anti-terrorism intelligence. The list of training programmes include Land Transportation Anti-terrorism Weapons of mint candy Destruction Seaport Security worldwide B auberge Interdiction Training and International Sea Interdiction Training to check smuggling and trafficking Handling of equipment f or screening men against radiological, chemical and explosive materials and Handling of curious detection at airports and seaports.With the growing cosmos in cities and increasing threat perception, the U.S. has also offered India to help develop the concept of megacity policing, a step it has been promoting since the 9/11 attacks.An travel course in superintendence, control room design and its operation by various security agencies and police authorities are key elements of this concept.Balancing vigilance and secrecyAs the government steps up its surveillance capabilities, the entire social hug between the state and citizens is being reformulated, with curse consequencesThe Indian state is arming itself with both technological capabilities and the institutional framework to form the lives of citizens in an unprecedented manner.A new Centralised monitor System (CMS) is in the offing, which would build on the already existing mechanisms. As The Hindu reported on June 21, thi s would allow the government to access in real-time any mobile and quick-frozen line conversation, SMS, fax, website visit, social media usage, Internet search and email, and will have unmatched capabilities of obscure search surveillance and monitoring. well-behaved society groups and citizens expressed concern about the governments actions, plans, and intent at a discussion organised by the Foundation for Media Professionals, on Saturday.The con text editionUsha Ramanathan, a widely respected legal scholar, pointed to the larger political context which had permitted this form of surveillance. It stemmed, she argued, from a misunderstanding of the notion of sovereignty. It is not the government, but the people who are sovereign. Laws and the Constitution are about limiting the power of the state, but while people were being subjected to these restrictions, the government itself had found ways to remain above it either by not having laws, or having ineffective regulators. States knew the kind of power they exercised over citizens, with the result that impunity had grown. on that point is also a nail down breakdown of the criminal justice system, Ms Ramanathan state. This had resulted in a reliance on extra-judicial methods of investigation, and scape-goating had become the norm. National security had been emphasised, re-emphasised, and projected as the central goal. We havent paused to ask what this means, and the extent to which we have been asked to give up personal security for the sake of national security. It was in this put updrop that technology had advanced by leaps, and made enormous surveillance possible.The implications are enormous. The data is often used for purposes it is not meant for, including political vendetta, keeping track of rivals, corporates, and take away out facts about a citizen when he may have antagonised those in power.Pranesh Prakash, conductor of the Centre of Internet and Society (CIS) looked back at the killing of Hare n Pandya, the senior Bharatiya Janata fellowship (BJP) leader in Gujarat. Mr Pandya was using the SIM circuit card of a friend, and it was by tracking the SIM, and through it his location, that the Gujarat government got to know that Mr Pandya had deposed before a commission and indicted the administration for its role in the riots. Eventually, he was found murdered orthogonal a park in Ahmedabad. The Gujarat police had accessed call details of 90,000 phones.It is also not clear whether mining this kind of data has been effective for the national security purposes, which provide the reason for doing it in the first place. Saikat Datta, nonmigratory editor of Daily News and Analysis, and an expert on Indias intelligence apparatus, utter a core problem was the absence of any auditing and over sight. on that point needs to be a constant round off of the number of calls, emails under surveillance, with questions about whether it is grant results. But this does not happen, proba bly because a majority is not for counter-terrorism. in that respect would be trouble if you build accountability mechanisms. When he sought information under RTI around precisely such issues, he was denied information on the grounds that it would strengthen enemies of the state.Anja Kovacs, who works with the Internet Democracy Project, said this form of mass surveillance criminalised everybody since it was based on the assumption that each citizen was a potential criminal. She also pointed out that having more information did not inevitably mean it was easier to address security threats there was intelligence preceding the Mumbai attacks, but it was not acted upon. She added, Most incidents have been resolved by traditional intelligence. Investing in agencies, training them better could be more effective. ferment in the caveatsFew argue that the state is not entitled to exercise surveillance at all. In fact, a social contract underpins democratic states. Citizens agree to subje ct some of their rights to restrictions, and vest the state with the monopoly over instruments and use of violence. In turn, the state playing within a set of legal principles being accountable to citizens and renewing its best-selling(predicate) legitimacy through different measures, including elections provides order and performs a range of developmental functions.This framework, citizens and civil liberty groups worry, is under threat with governments appropriating and usurping authority to conduct unprecedented surveillance. Citizen groups, technology and hiding experts came together globally to draft the International Principles on the Application of Human Rights to Communication Surveillance.It prescribed that any restriction to secretiveness through surveillance must be legal it must be for a legitimate aim it must be strictly and demonstrably necessary it must be preceded by showing to an set up authority that other less encroaching(a) investigative techniques have b een used it must follow due process decisions must be taken by a competent judicial authority there must be public watchfulness mechanisms and integrity of communications and systems should be maintained. (Full text available on www.necessaryandproportionate.org)Mr Prakash of CIS, which has done extensive work on surveillance and privacy issues, said, An additional principle must be collection limitation or data minimisation. Giving the instance of Indian Railways desire the date of birth from a node booking a ticket, Mr Prakash said this was not information which was necessary. But it could be used by hackers and many other agencies to access an individuals private minutes in other areas. The UPA government is finalising a privacy Bill, but its final version is not yet public, and it is not clear how far the government would go in protecting citizen rights.National cyber security Policy 2013National Cyber Security Policy 2013This polity aims at facilitating debut of secure co mputing environment and enabling adequate aver and confidence in electronic proceeding and also guiding stakeholders actions for protection of cyber space. The National Cyber Security Policy document outlines a road-map to create a framework for comprehensive, collaborative and collective response to deal with the issue of cyber security at all levels within the country. The constitution recognises the need for objectives and strategies that need to be adopted both at the national level as well as international level. The objectives and strategies defined in the National Cyber Security Policy together treat as a means toi. talk our concerns, understanding, priorities for action as well as directed efforts. ii. Provide confidence and probable assurance to all stakeholders in the country (Government, business, industry and general public) and global community, about the safety, resiliency and security of cyber space. iii. Adopt a suitable posturing that can indicate our resolve to make determined efforts to efficaciously monitor, deter & deal with cyber crime and cyber attacks.Salient features of the insuranceThe Policy outlines the roadmap for humankind of a framework for comprehensive, collaborative and collective responsibility to deal with cyber security issues of the country. The form _or_ system of government has ambitious plans for rapid social renewal and inclusive growth and Indias openhanded role in the IT global market. The insurance lays out 14 objectives which include creation of a 5,00,000-strong professional, skilled workforce over the next five years through capacity construction, skill development and training. The form _or_ system of government plans to create national and sectoral level 247 mechanisms forobtaining strategic information regarding threats to ICT infrastructure, creating scenarios for response, consequence and crisis management through effective, predictive, preventive, proactive response and recovery actions. Th e indemnity will also establish a mechanism for manduction information as well as identifying and responding to cyber security incidents and for cooperation in restoration efforts. The policy identifies eight different strategies for creating a secure cyber eco-system including the need for creating an assurance framework isolated from encouraging open standards to facilitate inter-operability and data exchange amongst different products or services. There is in place a plan to head and strengthen the national information processing system Emergency Response Team (CERT-In) to operate 247 and to act as a nodal agency for all efforts for cyber security, indispensability response and crisis management, as an umbrella agency over CERTs. It is expected that he policy will cater to the cyber security requirements of government and non-government entities at the national and international levels. The policy will help in safeguarding the critical infrastructure like Air vindication s ystem, nuclear plants, banking system, power infrastructure, telecommunication system and many more to secure countrys economic stability.National Nodal AgencyThe National Cyber Security Policy, in order to create a secure cyber ecosystem, has plan to set-up a National Nodal Agency. The nodal agency will be coordinating all matters related to cyber security in the country. The nodal agency has a wide code as it will cover and coordinate security for all strategic, military, government and business assets. This is distinctive, since, so far, national security regimes have been divided among the Ministry of Defence (for securing Indias borders) and the Ministry of Home Affairs (for national and internal security across States).Public-private partnership to protect national assetsAnother shaping aspect of the policy is the level at which it envisages public-private partnership to protect national assets. There is a clear recognition in the policy that, apart from Indias IT, technolo gy and telecommunications services, large parts of financial & banking services,airline & transportation services, competency and healthcare assets are not only owned by the private sector but, in fact, remain vulnerable to cyber-attacks, both from state and non-state actors.Protection centreA crucial aspect of the policy is building resilience around the comminuted Information Infrastructure (CII) by operationalising a 247 Nation Critical Information Infrastructure Protection Centre (NCIIPC). The Critical Information Infrastructure will found all interconnected and interdependent networks, across government and private sector. The NCIIPC will mandate a security audit of CII apart from the certification of all security roles of important security officers and others involved in operationalising the CII.OperationalisationThe policy will be operationalised by way of guidelines and Plans of Action, notified at national, sectoral, and other levels. While there is a recognition of the importance of symmetrical and multilateral relationships, the policy does not clearly identify Indias position vis--vis the capital of Hungary Convention even though government delegations have attended meetings in capital of the United Kingdom and Budapest on related issues in 2012.Why does India need a cyber security policy?Cyber security is critical for economic security and any failure to ensure cyber security will lead to economic destabilisation. India already has 800 million active mobile subscribers and 160 million other Internet users of which nearly half are on social media. India targets 600 million broadband connections and 100% teledensity by 2020. Internet traffic in India will grow nine-fold by 2015 overstep out at 13.2 exabytes in 2015, up from 1.6 exabytes in 2010. The ICT sector has grown at an annual compounded rate of 33% over the last decade and the constituent of IT and ITES industry to GDP increase from 5.2% in 2006-7 to 6.4% in 2010-11, according t o an IDSA task force report of 2012. Given the fact that a nations cyber ecosystem is constantly under attack from state and non-stateactors both. It becomes extremely critical for India to come up a transparent cyber security policy. One of the key objectives for the government is also to secure e-governance services where it is already implementing several nationwide plans including the e-Bharat project, a field Bank-funded project of Rs. 700 crore.CriticismThe release of the National Cyber Security Policy 2013 is an important step towards securing the cyber space of our country. However, there are certain areas which need further deliberations for its actual implementation. The provisions to take care security risks emanating due to use of new technologies e.g. Cloud Computing, has not been addressed. Another area which is left untasted by this policy is tackling the risks arising due to increased use of social networking sites by criminals and anti-national elements. There i s also a need to incorporate cyber crime tracking, cyber forensic capacity building and creation of a platform for sharing and analysis of information between public and private sectors on continuous basis.Creating a workforce of 500,000 professionals needs further deliberations as to whether this workforce will be trained to simply monitor the cyberspace or trained to acquire offensive as well as defensive cyber security skill sets. Indigenous development of cyber security solutions as enumerated in the policy is applaudable but these solutions may not all in all tide over the supply chain risks and would also require building testing infrastructure and facilities of global standards for evaluation.Indian build up forces are in the process of establishing a cyber command as a part of strengthening the cyber security of defence network and installations. Creation of cyber command will think of a parallel hierarchical structure and being one of the most important stakeholders, it will be prudent to address the jurisdiction issues right at the spring of policy implementation. The global debate on national security versus right to privacy and civil liberties is going on for long. Although, one of the objectives of this policy aims at safeguarding privacy of citizen datahowever, no specific strategy has been outlined to achieve this objective.The key to success of this policy lies in its effective implementation. The much talked about public-private partnership in this policy, if implemented in true spirit, will go a long way in creating solutions to the changing threat landscape.Central Monitoring System (CMS) project Justified??Indian governments own Central Monitoring System (CMS) project. roughly 160 million users are already being subjected to varied surveillance and monitoring, much of which is in encroachment of the governments own rules and notifications for ensuring privacy of communications. While the CMS is in early stages of launch, investigati on shows that there already exists without much public knowledge Lawful interpose and Monitoring (LIM) systems, which have been deployed by the Centre for Development of Telematics (C-DoT) for monitoring Internet traffic, emails, web-browsing, Skype and any other Internet activity of Indian users. While mobile operators deploy their own LIM system, allowing interception of calls by the government, only after checking due authorisation in compliance with plane section 5(2) of the Indian Telegraph Act read with Rule 419(A) of the IT Rules In the case of the Internet traffic, the LIM is deployed by the government at the international gateways of a handful of large ISPs. The process of these secretive surveillance systems is out of reach of these ISPs, under lock and key and complete control of the government.