Tuesday, July 23, 2019

Ethics of selling body parts Research Paper Example | Topics and Well Written Essays - 1250 words

Ethics of selling body parts - Research Paper Example There are many avenues both legal and illegal that human body products can be sold through. According to () the amount of money one receives for trading in human body parts is in proportional to the risk involved. This source of income can be tapped again and again. The global trade in organs opens a large market worldwide with both legal and ethical issues. Being a living laboratory compared to no other laboratory known it can produce products such as Kidneys, blood, ovum, sperms, hair, also prostitution is said to be trade in human body parts and others such as surrogacy. These body parts are are sold through illegal and legal avenues. The human baby is made from a biological combination of sperm and ovum, thus there is no product made from scratch by factories. Good percentage of people who want children are unable to get hence they are helped by science but the important ingredients have to be used. Infertility science has improved so much such that it has developed into a multib illion ventures for entrepreneurs in this business. Buying of biological fathers has been made easier with the availability of sperm banks. A client chose a biological father depending on personality, education, ethnicity among many other factors; this is because when woman buys a sperm she is buying that mans medical history and genes. Screening is thorough in the legal markets for sperms. Ovum donation also referred to as egg donation, involves risks of infection and injuries to the donor, though it is a fifteen minute operation. But even with the modern invitro fertilization methods, many implanted embryos fail to hatch in the recipient’s womb. This technology enables women who are barren to get children.egg donors earn monthly for every months work, they can earn between $3000-$8000 dollars a month, but this is not a task for the squeamish. Man’s obsession with beauty has opened a large market for hair business. There are options for auctioning ones hair. Hair trad e is a multimillion dollar business and probably hair is the easiest body part to harvest and even to sell, depending on the texture of the hair. Prostitution is the oldest trade in human body parts that is practiced the world over but this is a service product. Other human body parts traded in are, the kidneys and the heart, which are done through kidney and heart transplant respectively, it involves a lot of risks to both the donor and the recipient hence it is very expensive for the recipient. for the heart the donor cannot remain alive hence it has not gained popularity because it is 100% risky and very expensive for one to afford .it is not like kidney transplant where the risk is not much since only one kidney is removed. Others like surrogacy involves provision of raw materials for human life, the only body parts sold here the hormones responsible for baby formation, maintenance and renting of the womb. The surrogate mother undergoes a grueling experience for nine

Enterprise Architecture as Strategy Essay Example for Free

Enterprise Architecture as Strategy Essay Technology is shifting at a faster rate resulting in development of new methods that assist in completion of certain technological demand. This has given birth to different enterprise architecture frameworks that fulfill the requirements of day-to-day activities. Architecture is a framework of guidelines, principles, models, standards and strategies that directs, construction and development of business process, design and information and resources through enterprise. Hence, enterprise architecture is a blueprint, which defines the structure and operation of a given organization (Fowler Rice 2003). Thus, a foundation in which an organization can determine how to achieve current and future aims. There are many types of EA frameworks with specified capabilities. Some of these frameworks include ToGAF, Zachman, FEAF, DoDAF and EAP. The aim of this paper is to analyze ToGAF, and analyze how it compares with other EA frameworks. The Open Group Architecture Framework (TOGAF) is an enterprise architecture framework, which approaches the development of enterprise information architecture through design, planning, governance and implementation. This EA framework employs four pillars to achieve its goals: Application, Business, Technology and Data. Before the architect plans for current and future aims of the organization, they are provided with foundation architectures that form the basis that they will use for the new development. The four pillars play a crucial role in ensuring that the process is successful. Business architecture allows the definition of governance, business strategy, the organization and any other important processes of the given organization. Applications architecture allows the provision of the blueprint for the specific application to enable the interaction, deployment and create relationships between the important business processes of a given organization. Data architecture describes the structure of the given organization and defines physical and logical data assets that are in the given organization. Technical architecture defines the software, hardware and network infrastructure that is in place and the required technical resources to accomplish the mission in question. The original aim of the TOGAF was to design and develop technology architecture for a given business entity. However, the framework has evolved becoming a methodology that is used to analyze overall business architecture. This resulted into splitting of the enterprise methodology into two parts: Architecture Development Method (ADM) and Enterprise continuum. The ADM ensures that the enterprise architecture meets the requirements of the organization in terms of business needs and information technology needs. Its ability to be tailored ensures that organizational needs are factored in each of the different execution steps of the architecture planning process. The process is usually cyclic and iterative because the entire process is split into phases. The ADM supports nine phases; the first is the preliminary and the second to the ninth ranges from Phase A to Phase H. Each phase requirements are checked and ensured that it fulfills its basic needs. For example, Phase C combines Application and Data architecture and phase B and C ensure that the clarity of the information architecture is achieved (Lankhorst 2005). For the ADM to be successful, Enterprise Continuum comes handy. Generally, the Enterprise Continuum can be seen as a ‘virtual repository’ of all the assets of the architecture that is in an organization. These assets may include architectural patterns, architectural models, architecture descriptions and other important artifacts. Enterprise Continuum brings together Solutions and Architecture Continuum. The Architecture Continuum structures the re-usable architecture assets, which brings together representations, rules, relationships of information systems that are available to the enterprise. The Solutions Continuum defines the blocks that are used by the Architecture Continuum. This then allows the architectural building models and blocks that assists building the architecture design and eliminates ambiguity during analysis and implementation of the process. Usually there is a relationship between the different EA frameworks in terms of how it operates and ways that enables it to accomplish its duties. Zachman Framework and TOGAF ADM part share some common features. ADM mapping in relation to the Zachman Framework supports a correlation. The Zachman Framework has a well established and comprehensive taxonomy that supports various models, viewpoints and other important artifacts, which an enterprise may consider developing as a phase of the EA (White 2007). The Zachman Framework covers the 30 cells, but the TOGAF does not cover all the cells. However, it is possible for the TOGAF to develop viewpoints to accomplish aspects of Zachman Framework. Nevertheless, there are some viewpoints that are supported by TOGAF, which are not included in the Zachman Framework. For example, the missing viewpoints include manageability and security. The purpose of the architecture is to define viewpoints, an aspect that is supported by the TOGAF ADM but lacks in Zachman Framework. Zachman Framework vertical axis provides a source of potential viewpoints while the horizontal may provide generic taxonomy concerns. Thus, the Zachman Framework does not have means for processes for conformant views or developing viewpoints. Hence, it does not employ a perspective that is shown by TOGAF’s ADM. FEAF structure resembles with TOGAF because it is portioned into Data, Business, Technology and Applications Architectures. Thus, it contains guidance that is analogous to TOGAF architecture and its architectural viewpoints and perspectives. However, the rows that are in the FEAF matrix do not directly map to TOGAF structure. However, the mapping of ADM to Zachman Framework has some correlation between TOGAF and FEAF. Hence, the columns that are in the FEAF matrix correspond to the three architecture domains that are supported by TOGAF; the fourth TOGAF domain covers business architecture that lacks in the FEAF structure. Enterprise Architecture Planning (EAP) is a framework that brings together Applications, Information and Technology Architectures in fulfilling the requirements of architecture. Thus, it shares many concepts with TOGAF because the aim of EAP is to form blueprints for architectures to solve business problems. Moreover, EAP supports the nine phases that are supported by the TOGAF (White 2007). The first three phases in the EAP (Business Architecture) maps to the Phase B of TOGAF ADM. Baseline Description, which is the step 4 in EAP maps to Phases C and D of TOGAF ADM. These are some of the basic features that both frameworks share. However, EAP does not support taxonomy of various views and viewpoints when compared to the TOGAF architecture. Department of Defense Architecture Framework (DoDAF) defines the architecture systems into consistent and complementary views. It defines a structure and mechanisms that help in understanding, visualizing and assimilating the complexities and broad scope of a given architecture design through tabular, graphic and textual means. Thus, it shares minimal aspect with TOGAF. In fact, TOGAF focus on the methodology of architecture in terms of â€Å"how to† without bringing into consideration architecture description constructs. This perspective is different when it comes to the DODAF architecture. DoDAF main functionality focus on the architecture through a given set of views without any specified methodology, a perspective that is different from TOGAF, which has a specific methodology (Bernus Fox 2005). ADM guides the way that TOGAF operates, an aspect that is less exhibited in the DoDAF. This is because the purpose of architecture determines description of use and supports a well tailored process to fulfill the requirements of the EA (McGovern Ambler 2003). DODAF requires that all information, analysis and products to build should be put forefront before building the architecture. However, TOGAF specify certain requirements that should be in place and grouped into the four pillars. DoDAF supports three â€Å"views† System, Operational and Technical while the TOGAF support four views. However, â€Å"views† in DoDAF differs from the view that is seen in the TOGAF. Deliverables and artifacts that are defined in the DoDAF have no corresponding parts in the TOGAF ADM. This is because DoDAF goes deeper in determining details of the specific architecture. Thus, DoDAF are at the system design level rather than in TOGAF, which is in the architecture level. Nevertheless, the level of detail can be included in the ADM especially at Phase B, C and D of the TOGAF. Enterprise Architecture plays an important role in ensuring that the business strategy and the requirements of a certain process are achieved. TOGAF approach is useful in achieving a business-oriented process through a well defined methodology. TOGAF have common features and minor differences with other EA such as the Zachman, FEAF, DoDAF and EAP. The view and viewpoint that is incorporated by the TOGAF ensures that the requirements of the organization are achieved. Thus, TOGAF plays an important role, which is envisaged by other Enterprise Architecture Framework. It fulfills the requirements that it is assigned, however, fulfills it different from the other EA frameworks. References Bernus, P. Fox, M. (2005). Knowledge Sharing in the Integrated Enterprise: Interoperability Strategies for the Enterprise Architect. London: Birkhauser. The book addresses Enterprise Architectures and Enterprise Integration in a way that makes it easy to utilize Enterprise Models and other Modeling Tools. It brings together the different models and forms of a framework into fulfilling a requirement. Thus, it develops interchange models between the given modeling tools, maintain its interdependencies and knowledge on the re-use of enterprise models. The authors also provide means towards the achievement of the ISO9001:2000. The book brings into consideration Design of Information Infrastructure Systems for Manufacturing (DIISM’04) and International Conference on Enterprise Integration and Modeling Technology (ICEIMT’04). Fowler, M. Rice, D. (2003). Patterns of Enterprise Application Architecture. New York: Addison-Wesley Publishers. The book provides proven solutions to the problems that are experienced by information system developers. The book utilizes code example in terms of C+ and Java. The book turns the problems that are associated with enterprise applications developers into a new strategy that eliminates these problems and ensures that the developers are in an environment that they can easily embrace. The authors’ helps professionals to understand complex issues associated with architecture. The book shows that architecture is crucial in completion of application development and multi-user environment. In addition, the book provides patterns and context in EA that enables the reader to have proper means to make the right decisions. Lankhorst, M. (2005). Enterprise Architecture at Work: Modeling, Communication, and Analysis. New York: Springer. The authors bring clearly the complexities that are associated with architectural domains. It brings into consideration description of the enterprise architecture and fulfillment into an organization in terms of processes, structure, systems, applications and techniques. The book brings into consideration description of components and unambiguous specification to allow for a logical modeling language. They utilize their skills in ensuring that the architects have concrete skills that fulfill the architectural practice. It also gives means that allows communication between stakeholders that are involved in these architectures. The authors also provide means to assess both qualitative impact and quantitative aspects of the given architectures. Modeling language that is utilized has been used in real-life cases. McGovern, J. Ambler, S. (2003). A practical Guide to Enterprise Architecture. New York: Prentice Hall PTR. The authors of the book have hands-on experience in solving real-world problems for major corporations. The book contains guidelines that assist the architects to make sense of the systems, data, services, software, methodologies, and product lines. The book also provides explanation of the theory and its application to the real world business needs. Perks, C. Beveridge, T. (2003). Guide to Enterprise IT Architecture. New York: Springer Publishers. The book brings into consideration different Enterprise Architecture frameworks. The authors’ clearly explains development of a modeling concept through various technical architecture, e-business and gap analysis. Moreover, the book brings into consideration operating systems and software engineering principles. Moreover, the book relates EA with service instances, distributed computing, application software and enterprise application integration. Ross, J. Weill, P. (2006). Enterprise Architecture as Strategy: Creating a Foundation for Business Execution. Chicago: Harvard Business Press. The aim of EA is to define the requirements of an organization in terms of job roles, standardized tasks, infrastructure, system and data. Moreover, the book also gives guidelines in the way that organizations will compete in a digitalized world providing managers with means to make decisions and realize visions that they had planned. Thus, the book explains EA vital role in fulfilling the execution of a given business strategy. The book provides thoughtful case examples, clear frameworks, and a proven and effective way of achieving EA. Scheer, A. Kruppke, H. (2006). Agility by ARIS Business Process Management. New York: Springer Publishers. The authors’ brings into consideration the benefits that are associated with utilizing of varies EA frameworks. It brings into consideration the various differences that are seen in each EA framework. Moreover, the authors explores the benefits that will result if a given framework is utilized in a given business strategy. Thus, the book is business oriented with EA playing an important role. Schekkerman, J. (2003). How to Survive in the Jungle of Enterprise Architecture Frameworks, 2nd Ed. New York: Trafford Publishers. This book defines the role that is played by enterprise Architecture Frameworks bringing clearly the main difference between the common Enterprise Architecture Frameworks. This book provides the right procedures and means that can allow selection of the right Enterprise Architecture Framework. The book further gives the history and overview of various Enterprise Architecture Frameworks and the capabilities that the specified Enterprise Architecture. Some common features of EA that the book explores are principles, purpose, scope, structure, and compliance and guidance to ensure that the right EA is chosen. Wagter, R. Steenbergen, M. (2005). Dynamic Enterprise Architecture: How to Make it work. New York: John Wiley and Sons Publications. The authors of the book present a way towards EA that enables organizations to achieve the objectives of their business. The book focuses on governance of the IT organization, advice and strategies provide tangible tools that assist in the achievement of the goals of the organization. If all the directives are followed the organization will achieve its goals at a faster speed. White, J. (2007). Managing Information in the Public Sector. New York: M. E. Sharpe. The book covers the basis of information technology, political and managerial issues that revolve the EA. This book is specifically written for the public and it covers all problems that are related to IT and the public.

Monday, July 22, 2019

Compare-and-Contrast Research Paper Essay Example for Free

Compare-and-Contrast Research Paper Essay Introduction Present essay seeks to provide the comparative analysis of two artworks – Hoffmann’s Boston Twilight, 1957, belonging to Proto-Abstract Expressionism and Rauschenberg’s Retroactive 1, 1964, which may be attributed to the art movement of Pop-Art. The comparative analysis of these paintings will focus on two crucial aspects – structural and positive. Structural analysis addresses cultural, historical context, which influenced the discussed artworks, political climate, art movements’ stylistic characteristics, which informed individual work of artists, their subjective motives, influences and inclinations. Secondly, positive analysis of the artworks focuses on the themes depicted, colors and techniques used, formal and stylistic elements, the reflection of cultural and historical context in the artworks etc. The thesis, present paper defends, may be formulated as follows: Hoffmann’s and Rauschenberg’s artworks were significantly influenced by historical, cultural, social and artistic context. The artistic response to these contexts was different and reflected through opposite art movements. The discussed images belong to different artistic traditions and, hence have many differences. Similarities, however, may be attributed to the similar artistic influences, and utilization of sometimes similar formal and color techniques of composition. Structural context: art movements, history, politics and subjective perspectives. The general socio-economic and historical context of both artworks (as they were created very close in time – 1957 and 1964) may be characterized by the gradual assault of mass consumption postmodernist society, which influenced the rapid development of popular culture in music, entertainment and cinema. Commoditization has reached almost every sphere of social life and closely approached art through mass media. The increasing role of mass culture was immediately seen in the new sphere of advertisement, which conflated the elements of ‘high and low’ culture, which became central to the new postmodernist cultural logic (Jameson, 59). Political situation in the United States and Europe was characterized by the intensification of resistance and leftist movements, which, however, abandoned communist platform and focused on new postmodernist tactics, such as situationism, counter-culturalism, influenced by new discoveries in psychoanalysis, philosophy etc. Politics also became the element of mass culture, as its reproduction was extended from closed couloirs of high cabinets to ordinary population. The response of art movements to the assault of the postindustrial society was irregular and significantly varied from one art movement to another. The dominance of non-objective abstraction in 1940s and 50s was the response to vulgarization of social life, and the manifest of the absence of valuable objective themes in de-humanized world. Abstractionism, hence was an artistic expression of de-humanization and the search for lost subjectivity (Herskovic, 13-17). However, other extremes also came to existence. That is particularly true of the Pop-Art, which positively responded to the modern developments in economy and culture, synthesizing popular culture in the new form of art. Pop-Art was characterized by ‘externalization’ of art, as the objects of ordinary life and advertisement were widely utilized. The later was particularly evident in the works of Andy Warhol, Roy Lichtenstein and James Rosenquist. The similar response to changing conditions in society was made by photorealism, which exemplifies the assault of hyperrealism as the new form of cultural affirmation. Such elements of modern society as standardization, de-subjectivization was immediately seen in Pop-Art , which appeared as the resistance to self-revelation, artistic creativity and originality and focuses on the widely acknowledge cultural codes and images (Harrison 2001) . Robert Rauschenberg’s and Hans Hoffmann’s artistic trajectories were significantly influenced by the discussed developments in politics and ideology. Rauschenberg was, for instance, one of the forerunners of pop-art movement, as he was among the first to use hand-made or found objects in his artworks, combining the elements of high and low culture, using mass-media sources etc (Livingstone, 1990). Such experiments were influenced by Rauschenberg’s strong belief that the genuine artwork should exist between art and life. The technique of ‘combines’ used by Rauschenberg may be described as immediate precursor to postmodernist collage, used in installation art. Rauschenberg’s mindset position deeply opposed Abstract Expressionism’s argument that the self may be expressed through art. Instead, Rauschenberg focused on representation of reality in its absence of structure, sense and single interpretation. Abstract-Expressionism, which was influenced by Hans Hoffman, in contrast focused on gesture paintings and color field painting techniques. Abstract Expressionism should be understood as a historical consequence of the conflation between European and American artists due to World War 2, which forced may French, German and other artists to immigrate in the United States. Hans Hoffmann belongs to this group of artists and his destiny significantly influenced his style and ideological orientations (Herskovic, 2003). Hoffman’s style was influenced by cubist tension between depth and surface, expressionistic flamboyance of color and surrealist technique of automatism, which is based on following subconscious drivers of creativity and libidinal forces. The latter influences were synthesized by Hoffmann in his ‘push-pull’ method, which included the use of expressive colors and paint slashes in the view of creating contradiction between cool and warm colors. Comparative analysis of Hoffmann’s and Rauschenberg’s artworks Both artworks are obviously affected by different artistic movements and styles. Hoffmann’s composition may be posited within abstract expressionism tradition, while Rauschenberg’s painting belongs to Pop-Art movement. On the surface level the similarities between these artistic may be traced in the color usage – in each painting we see the utilization of yellow, green, black, white, red, white and blue colors. Moreover, the presence of grid-like rectangular layout is evident. Apart from this, both paintings are characterized by the sense of distortion. The distortion in Hoffmann’s artwork Boston Twilight is due to the use of abstract expressionist style, which distorts the contours of objective reality, so that we can not find correspondence between the image and reality (Boston Twilight) that it signifies. However, in Rauschenberg’s composition the distortion is reflected in the plurality of meaning and signification. The interpretation is difficult to realize due to the combination of images inserted in the painting: J. F. Kennedy at the center, pointing with his finger, cosmonaut with parachute, the duplication of Kennedy’s hand in the right corner and evidently abstract images in other parts. There is no denying the importance of the fact, that such a ‘combine’ creates difficulties for interpretation and distorts it. Furthermore, it should be pointed to the fact that both artworks have the elements of abstraction, contrasting color tones and are influenced by Cubism in using facets of the color. Both paintings create the feeling of collage and it was noted that Rauschenberg’s ‘combine’ technique is very close to it. Moreover, creating certain color relationships is in important in both images, however, it serves different functions, depending on style and thematic unity. Differences between images are evident in many respects. First of all, art schools are opposite with pop-art, focusing on unification of art and reality, and abstract expressionism, focusing on expressing contradictory being of individual self. Hoffman’s painting is abstract in essence, while Rauschenberg’s refers to widely known political and social images of American President, cosmonaut, which immediately signify objective reality. The social and political thematic of Rauschenberg’s image immediately points to his belonging to Pop-Art tradition. As far as formal and color structure of the analyzed paintings are concerned blue is dominant in Rauschenberg’s image, while green is dominant in Hoffman’s paintings; the first artist uses vertical stress, while Hoffmann is evidently using horizontal stress. Due to stylistic differences between artworjs, colors mix into one another in Hoffmann’s painting and are separated in Rauschenberg’s one. Rauschenberg utilizes much more contrast, than Hoffmann, however the image of the latter is much more organic in contrast to geometric structure of Rauschenberg’s composition. Conclusion To sum it up, present analysis proved the initial thesis that both artworks were significantly influenced by historical, social and cultural developments in Western societies in the middle of 20-th century. These developments provoked different responses on the part of art movements, resulting in creation of different styles and techniques. The latter are reflected in Hoffmann’s and Rauschenberg’s compositions, which are different in many important stylistic respects, however, have much in common due to the same artistic influences. My interest to the discussed paintings is explained by the fact that they are picturesque representations of Abstract Expressionism and Pop Art. Main features, peculiar to each of these styles, may be found in these paintings both in complex and in separate elements. The techniques used by both artists help us better understand other artworks created in these traditions and inform our own artistic endeavors. Hoffman’s image advantage is in its direct appeal to aesthetic taste and sensibility, while Rauschenberg artwork represents a challenge for viewers in terms of interpreting its political and social content. Works Cited Herskovic, Marika. American Abstract Expressionism of the 1950s An Illustrated Survey, New York School Press, 2003. Harrison, Sylvia. Pop Art and the Origins of Post-Modernism. Cambridge University Press, 2001. Jameson, Fredric. ‘Postmodernism, or the Cultural Logic of Late Capitalism’. New Left Review, 146, (53-92), 1991. Livingstone, M. Pop Art: A Continuing History, New York: Harry N. Abrams, Inc. , 1990

Sunday, July 21, 2019

The role of intelligence in aviation security

The role of intelligence in aviation security According to the Centre for the Study of intelligence (A unit under the United States Central Intelligence Agency, CIA), civil aviation, unlike defence (military) aviation, has mostly been in the centre of aviation security concerns for obvious reasons (Raffel, 2007). First, civil aviation has a high-value asset (Human capital, goods, property and wealth) which makes it attractive for criminals and terrorist. Ordinarily, high value asset should not, in itself, constitute a severe security threat, but significant concentration of high value asset attracts crime (Wheeler, 2005:7). In 60s and 70s, some aircraft were hijacked in the united state solely for the purpose of collecting ransom (Poole, 2008:9). Subsequently, an increase s hijacking (for ransom) attack led to the formulation of various aviation security policies and programs especially in America and Europe. So, criminals may seek economic benefit are likely to attack an aviation unit for that reason. On the other hand, terrori st seek economic loss through massive collateral damage. But, not all aviation security attacks are economically motivated. For example, 9/11 attacked was suspected to have been a socio-politically motivated. The severity of the attached is exacerbated by the massive human loss. It can be assumed that Al-qaeda figured the human loss as part of the objectives of their attack. Another example of massive human capital loss was caused by the attacks on Rome and Vienna airport in 1985 (Raffel, 2007). Then, it may be argued that criminals ( especially terrorist) in their bid to make cynical statements and increase the severity of their attacks take advantage of the high human traffic associated with civil aviation to cause massive human loss. The CIA calls this massacre ibid. Moreover, unlike defence aviation, traditional civil aviation systems (aircraft, personnel, airports) are not intrinsically designed with self-defence mechanisms, making them prone to (frequent) attacks. Given the vu lnerability of civil aviation to security attacks, aviation security and intelligence discussion focuses on civil aviation and its complex inter-relations makes multi-perspective discourse. Aviation Security Intelligence: Information Gathering, Sharing and Analysis Combating crimes and averting potential criminal and terrorist attacks is underpinned on well-versed understanding of the goals and resources of criminal and terrorist groups. Wheeler (2005: 37-38 ) explained intelligence procedure as mainly: covert gathering of information related to criminals and terrorist, a deep and broad centralized analysis of the information and a drawing a conclusion against previously known fact about the gang ( terrorist and criminal). Doing this, security operation will not only get a foreknowledge of terrorist but also be able to predict (to a degree of accuracy) their next move. However, there is an ongoing discussion on how to best to deal with security intelligence in civil aviation which according to Raffel CIA, (2007) is drawn-out, confusing and inconclusive. One can quickly associate and gain better understanding of Raffels assertions from the analysis of civil aviation and security threats previously discussed above. The question remains clear: How do we deal with information of a proposed attack? Answering this question requires a system wide, multi-stakeholder analysis which captures the views of the passenger, regulators (government) and the airline operators. Who should know what and when? Airport and airline operators do feel that up to date and appropriate information sharing could help them plan and handle security issues. In practical sense, vigilance can help reduce (if not eliminate) security risks. But in reality, most airline and airport operator do not have access to accurate, meticulously collected and analyzed information. Mostly, the available information or intelligence are too broad that they very difficult (perhaps, impossible) to employ in a specific airport or scheduled flight. This set-back is a flaw of the data capturing process; data is acquired on an informal basis instead of an organized, process driven method (Raffel, 2007). Besides the incongruity of available information and intelligence, there is a caveat on the source of such information. Technology has made all kind of information readily available and as such the accuracy of information and credibility of the source cannot be ordinarily ascertained. This is a dilemma for information analyst , including airport security analyst. Emphasis is placed on the source: general information on the public domain and confidential and sensitive intelligence which stealthy sourced and accumulated. As expected, classified intelligence are restricted, seldom available for open propagation. Security agencies control the dissemination of such information and place a strict need-to know requirement. In a separate argument, Wheeler (2005: 33) described the inhibition of information sharing as a culture, a phenomenon which characterized every human endeavour. How then would airport and airline operator be able access the much needed information (intelligence) given the strict rules on the availability? The absence of an information sharing framework is a potential risk factor in aviation security intelligence. The contest about privacy is another issue with aviation security. In 2004, National Commission on Terrorist Attacks upon the United States an inquiry on 9/11 attacks recommended that the US president determines the guideline for information sharing among government agencies, protecting the privacy of the individual of whom they share information about (Wheeler 2005: 132). Perhaps, this recommendation may have been suggested by the Classified Information Procedures Act (CIPA) of 1980 which ensures the protection of protecting national security while also protecting the rights of the suspected individual. (Berman and Flint, 2003:3) Wheeler (2005:32) identified a missing link between information gathering and information sharing which can cause a drawback in effective policing. The covert method of gathering and analyzing intelligence requires that these two phases (information gathering and sharing) makes this interconnection necessary. Terrorist and criminals can capitalize on the difference between knowledge centres in while planning for and executing attacks on their targets. Inquiries into September 11 showed that the incidence can be blamed on the intelligence failure the government failed to make good use of prior information it had gathered and failed to utilize available information sharing framework. Misguided targeting is another weak point of intelligence gathering. Accumulating vast amount of information (of which some could be irrelevant) without exclusive suspicion will not catch terrorists and criminals instead it could make worse this Berman and Flint ( 2003:2) Critique of Aviation Security Intelligence Programs Before September 11, 2001, aviation security intelligence was cantered around baggage screening (Poole, 2008: 17; Raffel 2007). But the 9/11 attack has set up a new atmosphere: The need to identify precarious passengers (on a flight) and persons (within the perimeters of an airport) so as to nip potential attack in the bud before they are hatched. Before now, there have doubts on the effectiveness of these intelligence program (British Medical Journal 2010), increasing the outcry after the failed Christmas day bombing attack. The question is how did the terrorist (Abdul Mutallab) pass through the walls of screening? Clearly, terrorist organizations are keenly abreast of the trends of aviation security and they are in a relentlessly pursuit to circumvent it. KhaleejTimes.com (2010) claimed that the little success of Christmas day attack should be blamed on failure of human side of intelligence, suggesting the need to revisit the framework of intelligence program, if they will ever pro sper. Computer Assisted Passengers Pre-screening System (CAPPS ) CAPPS (also Computer Assisted Passengers Screening CAPS) was first introduced in 1996, by an airline, as temporary measure to assist in passengers bag screening for explosives. Over time, it was reviewed. The later version (CAPPS II) was modified to classify all passengers into various class according to a risk assessment score allotted to the passenger. CAPPS II, depending on experimental data algorithm from various database (government and commercial), has a double sided central focus: scrutinizing high-risk passengers at the same time as reducing the harassment of low risk (innocent) passengers. Like the suspended US Defences Total Information Awareness program, it is designed at profiling innocent people. Should the TSA invest so much on profiling (innocent) people who do not pose any security threat? In addition to initial public scepticism about the effectiveness of this profiling program, there is a growing debate over the appropriateness and the privacy and security risks of such systems (EPIC 2007a). In 2003, TSA started the Aviation Security Records (ASSR) an information database containing financial and transactional data as well as almost limitless data from other public and private information centre which the TSA said it will allow government, public and private entities to access the records. The unrestricted access to the database raises concern about the privacy and the security of the database. Is it possible for criminals and terrorist to obtain seemingly classified information, under false pretence? How passengers can contest and redress risk score is another missing details in the program. Secure Flight Program and the Terrorist Watch list Soon after the TSA discarded the later version Computer Assisted Passenger Pre-screening System (CAPPS II) in August 2004, it started the Secured Flight Program which was aimed to match up passengers information contained in the Passenger Name Record (PNR) data by provided by passenger and the state maintained watch list. The program transcended beyond simply matching names on two list to a complex system of profiling persons in order to estimate the security risk which they pose (DHS, 2004). Although TSA performed test for the Secure Flight Program, the program faced some criticism which lead to its temporary suspension. According to GAO (2006), at point when the secure flight program was scheduled to commence in September 2005, it was faulted with an inconclusive risk assessment and 144 known vulnerabilities. TSA has a United State legislation backed mandate to keep a watch list of names of persons alleged to constitute a risk of air piracy or terrorism or a threat to airlines or passenger safety. The agencys watch list is categorized into two: no fly and selectee lists (EPIC, 2007). The airlines collaborate with TSA on this in that when a passenger checks in for a flight, they match the passengers identity with the record. Should the passengers name matches any on the no fly list, he or she is tagged a threat, and is refused to embark on the flight. Not only that, TSA is notified at once and a law enforcement officer is called to detain and interrogate the person. In case the persons identity is matches any name on the select list, the person is tag S and he or she receives stricter security screening. But, what if there is a case of mistaken identity when a person name is mistakenly matched with those on the watch list? Would an innocent passenger be disallowed from boarding a flight d espite his constitution guaranteed right to travel? There are Tens of thousands of application of persons seeking redress for been wrongly mismatched (EPIC, 2007b) Multi-perspective Evaluation of Aviation Security intelligence Program This section will attempt to provide an analytic and multi-dimensional view of the role of security intelligence in aviation, exploring the economic, technological and social perspectives leaving out the legal and human right issues. Economic (business) perspectives Civil aviation cannot be disconnected from business. This is self evident in that the industry is deregulated to encourage capitalists who seek profits. And the pursuit of profit is determined by the complexities of the aviation industry which include the impact of the aviation security intelligence on industrys economics that cannot be underestimated. An instance is the aftermath of September 11 which led to a down turn of aviation business. The industry recorded a steep decline of passengers booking (of about seventy four percent), several cancelled flights, reduction in route by some airline operator and consequently, loss of jobs, reduced share prices, and other business losses (Morrell and Alamdari, 2002:1). This change in the aviation business atmosphere was caused from the non-fly reaction from passengers. Passengers reaction cannot be overlooked because it is an indication that passengers (like other consumers) are capable of intelligence sourcing and sharing (Haugtvedt et al , 2004: 283) and responding based on their analysis. Whether analysis of passenger is accurate is another subject entirely. Given the extent at which technology have increase the flow of information and the loop holes in information security, one cannot assume that sensitive security information cannot (would not) slip into the hand of the passenger (that is the set of air traveller) and the consequent passengers reaction and its ripple effect on aviation business (and industry in general) cannot be predicted. There is another dimension to this: Terrorist knowing fully that passengers can react to fear factor just as they did after September 11 may explore this scenario and the weakness of existing information sharing framework to pursue an economic combat strategy simply by sparking panic within the system. Another side of the economics of aviation security intelligence is the massive and undisclosed cost of pursing an intelligence system. Poole (2008:2) argued that similar to other similar human endeavour where choices are to be made based resource constraints, aviation security is faced with the challenge of making a decision on how to invest scares resource for maximum benefit. As anticipated, this makes decision making pretty difficult, and decision are characterized with frequent trade-offs. And if such trade -offs are not properly analyzed or hinged on wrong assumptions, the eventual decision may contribute to insecurity (KhaleejTimes.com, 2010). Based on this premise, Poole (2008:2) developed a risk assessment framework for making choices as related to aviation security. Another effect of classified information is that the actual cost of aviation strategy is difficult to determine, especially if the costing model is extended to account to include themes like cost benefit analysis (Poole, 2008:3). Social perspectives Present Focus is emphasized on international flight overlooking (or disregarding the possibility) internally originated threats like those of London bombing. This leaves one to assume that some intelligence campaigns are based on prejudice and ostensible conclusions. Proponent of this view may not be entirely wrong; may not fault the assumption that international flights poses higher degree of aviation risk. Social (racial, and religious) discrimination concerns became more prominent when the United States government announced compulsory screening for all passenger from 14 countries (mostly Islamic) after the failed Christmas day bombing attempt (Zakaria, 2010). One can argue that intelligence efforts are socially biased (Persico, 2002:1472-73; Knowles and Hernandez-Murillo, 2004: 959 -60) Political perspectives Poole (2008:2) insists that changes in aviation security policies are motivated political imperatives to reassure frightened population of that the nations air space is still very safe. For example in the United State, through legislation, the government established the Transportation Security Administration- an institution with complete responsibility for the nations transportation security but a huge part of its budget is committed to aviation security as directed by legislation. In a move to increase intelligence gathering, Attorney General Ashcroft approved security (FBI) agents to attend and monitor political events and religious which might serve as hubs for terrorist activities Berman and Flint (2003 : YY), showing the an interconnect but these themes : Politics and Security Intelligence. Technological Issues: Open access Information and Biometric Data The debate on information sharing is incomplete without examining the impact of technology. One of such argument is the openness of sensitive information to the public. For instance, Airport Law Enforcement Agencies Network (ALEAN) information-sharing groups supporting airports do make available information and open source material which is intended for aviation security personnel (Raffel CIA, 2007). Mindful the fact that terrorist and criminal can take advantage of the easy and open accessibility of electronic information system, the reliability of this method remains shaky. In another campaign, there is an advocacy to leverage on technology to help strengthen the various passengers profiling program through the inclusion of biometric data (KhaleejTimes.com, 2010). Biometric data are so unique so much that incidence of identity mismatch is almost unlikely (if not impossible). Although, how this new method will be adopted remains on clear, but it shows a promise of resolving some o f flaws in existing program. Summary The drawback in information sharing has rendered most aviation security intelligence initiatives less effective. The present demands for intelligence is expected to increase can become more effective information sharing. In spite of the doubts that present regime of security intelligence on the effectiveness, they are building blocks for the future of aviation security). It remains unbeatable that intelligence affects the aviation security and the aviation industry in general, and that the various intelligences actions and inactions can shape the future. This review has attempted to identify various linkages between these arguments and highlight possible path for future discourse.

Saturday, July 20, 2019

How Emily Brontë Fulfills the Expectations of the Gothic Genre Essay

How Emily Brontà « Fulfills the Expectations of the Gothic Genre Within this essay I will examine the social and historical background of Emily Brontà «'s upbringing, and the way her only novel, wuthering height, is related to the gothic genre. Emily Brontà « was brought up in a time very different from our own; she lived on secluded moors and without many of our modern day privileges, and became very close to her family. Many of her close family members died within her lifetime, affecting her deeply and leaving her emotionally scarred. The tragedy and misfortune of Emily Brontà «'s life is shown through her novel 'Wuthering Heights'. The many dark, sad and misfortunate parts of this novel which represent Emily Brontà «'s life are the same parts which can be categorised it in to the gothic genre. Cathy represents Emily Brontà «; they both suffered the loss of a parent and lived on secluded moors. The semi-autobiographical nature is also shown through Hindely, Cathy's brother, and his similarities to Emily Brontà «'s brother, both go through a spiral downfall into alcoholism and drink themselves into early graves. Emily Brontà « lived in a male dominated Georgian society. It was this male dominance and the idea of female inadequacy that forced her to publish her only novel Wuthering Heights under the male pseudonym Ellis Bell. Brontà «'s novel contains many of the elements that can be seen in the gothic genre. The setting is true to the gothic style; it is in a secluded place that often represents something that happened there. 'On that bleak hill top the earth was hard with a black frost.' In my opinion it represents the dark and gloomy past of Wuthering Heights, the death of Cathy and the tormented life of Heat... ... of a higher class. This shows the shallowness of society at the time and that society was male dominated. Women were forced to be dependent on men and had to marry men they didn't love to secure them a financial future and to gain a better social status. The novel raises issues that can been seen in societies of all times, including the modern society in which we live. It shows how people are judge on material things, most commonly in this novel it shows how people are judged on social status. The novel is told through two narrations, Nelly Dean and Lockwood. The parts of the novel that Nelly Dean narrates are informal, This shows Nelly is a servant, and is considered to be lower class in society. However when Lockwood narrates, the language is more formal, and like that of a highly educated person showing he is of higher class than Nelly Dean is.

Support of the Arts :: essays papers

Support of the Arts Researchers DiMaggio and Pettit (1999), report that the National Endowment for the Arts (NEA) has had trouble keeping support from the U.S. Congress. The House of Representatives has voted against the NEA, however, the Senate was still in favor of supporting it. The NEA has also been given a lot of trouble from Christian conservatives and Republicans who are highly against the NEA and working hard to end their federal support. Attitudes Toward the Arts DiMaggio and Pettit (1999) conducted a study by getting numerous people to complete different surveys, all having to do with support for the arts. The results were reported as fairly positive overall for attitudes toward art. There is a general agreement that the arts are beneficial and public funding for them is supported. However, there are significant differences between the opinions of people from differing backgrounds. Women are more supportive than men, younger people are more supportive than elder, African Americans are more supportive than whites, and people with more education or higher incomes are also more supportive than the less educated/lower income portion of the population (DiMaggio & Pettit, 1999). Overall, the researchers feel that examination conducted through surveys is very useful and necessary. From their survey results, they concluded that the arts have a respectable amount of support. James MacKenzie (1998) wrote a paper arguing that the arts are necessary for the full development of an individual and also to maintain culture. While some do feel that the arts are unnecessary, others still feel very strongly that without the arts, we as a society are basically committing ourselves to cultural suicide. The supporters of this theory believe that â€Å"the Arts are inherent to the existence of every soul† (MacKenzie, 1998). The fact that so many people believe this makes a strong argument for the support of the arts and fine arts education. That would clearly be beneficial to anyone in the field of art, whether teaching or creating. The article on DiMaggio and Pettit’s review (1999) and MacKenzie’s paper (1998), along with others included in this paper, contain findings that could be useful to argue that the arts are well supported and highly thought of. Therefore, the arts should be included in school curriculums and for after school clubs/activities. Attitudes Toward the Support of Art Education In his book, Schwartz (2000) argues that â€Å"art should be subsidized because it brings important educational benefits† (p.

Friday, July 19, 2019

Animal Testing Essay -- Animal Testing

Animal Testing   Ã‚  Ã‚  Ã‚  Ã‚  Using Animals for testing is wrong and should be banned. They should be entitled to the rights we have. Every day humans are using defenseless animals for cruel and most often useless tests. The animals cannot fight for themselves therefore we must. There should be stronger laws to protect them from laboratory experiments.   Ã‚  Ã‚  Ã‚  Ã‚  Although private companies run most labs, experiments are often conducted by public organizations. The U.S. government, the Army and Air Force in particular, has designed and conducted many animal experiments. The experiments were engineered so that many animals would suffer and die without any certainty that this suffering and death would save a single life, or benefit humans in any way at all. An example of this is some tens of thousands of Beagles experimented with. In Albuquerque, New Mexico, 64 Beagles were forced to inhale radioactive Strontium 90 as part of a â€Å"Fission Product Inhalation Program† which has been paid for by the U.S. Atomic Energy Commission. In this experiment 26 dogs died. One of the deaths occurred during an epileptic seizure; another from brain hemorrhage. Other dogs, before death, became feverish and anemic, lost their appetites, and had hemorrhages. The experimenters compared their results to those experiments conducted at th e University of Utah and the Argonne National Laboratory in which beagles were injected with Strontium 90. They concluded that the...