Thursday, October 31, 2019

Wizard of oz and spirited away Essay Example | Topics and Well Written Essays - 750 words

Wizard of oz and spirited away - Essay Example The Wizard of Oz is a tale about the negotiation of gender, race and identity in popular culture. Spirited Away is about a child’s transition from childhood to adulthood. Spirited Away is a film about a Japanese girl who moves to a new city with her parents. In this film, the young girl goes through stages of transition, which are accompanied by rites of passage. In her adventure through her new world, Chihiro becomes lost in a fantastical world. She meets odd creatures, which alternately hinder and help in her adventure. The film has numerous Shrine Shinto and folk perspectives, which are embedded in the Japanese cultural vocabulary of the film. The film is a representation of the Japanese culture. It has numerous instances that portray the Japanese Shrine Shinto and folk perspectives, which are embedded in its cultural vocabulary (Clews and Michael 187). Spirited Away centers on Chihiro and her journey through the world of spirits. During her journey, Chihiro becomes separated from her previous world. Her experiences in this world are comparable to the experiences of Dorothy in the Wizard of Oz because they represent a rite of passage to adulthood. The archetypical entrance of Chihiro into the spiritual world demarcated her status as an individual who is between childhood and adult hood. In addition to the rite of passage, Spirited Away also provides critical commentary of the Japanese society, in a similar fashion to the Wizard of Oz (Clews and Michael 188). The film focuses on critical cultural perspectives such as the dissolution of traditional cultures, generational conflicts and customs present in a globalized society. Like in Spirited Away, Dorothy, in the Wizard of Oz, lives in a fantastical world. She lives in the world of Oz, which is inhabited by witches. The world of Oz is facing a major conflict between the wicked witches and good withes. Unlike Chihiro, Dorothy is treated like a heroine because her

Monday, October 28, 2019

Martin Johnson Heade Essay Example for Free

Martin Johnson Heade Essay Martin Johnson Heade (originally Heed), the eldest son in a large family of Joseph Howell Heed was born on 11th August, 1819 in Lumberville, a small rural location near Doylestown in Bucks country of Pennsylvania (Hollis Taggart Galleries, Para. 1). His father owned a farm and a lumber mill. His life is said to have been influenced by the two cousins, Thomas Hicks and Edward Hicks who probably taught him his first art lessons locally. His passion for art grew considerably in the 1840s, and it is around this time that he took a study tour to England and stayed in Rome Italy for two years. By the year 1843, he was residing in New York and later moved to Brooklyn, where he changed his name to Heade, and later on moved to Philadelphia (Hollis Taggart Galleries, Para. 2). In 1848, he took his second academic European tour to return later in 1850. The second trip did not leave him settled either, as he continued to travel while settling down briefly in the towns of St. Louis, New Haven and Providence. It was in this decade that he deeply studied and explored the effects of light on the environment, a subject that was equally dear to American Luminists Sanford Gifford, John Kensett C as well as Fitz Lane Hugh. Consequently he fully got into landscape painting (Hollis Taggart Galleries, Para. 2). In 1859, he rented a studio in the famous tenth street studio building in New York and became a full time painter (Lurie and Mappen, Pp. 355. ) It is in relation to this that he is remembered for his flora, fauna and landscape paintings that do not only have a rich effect of color and light but could also portray some poetic sentiments. Its while operating from the same studio that he met Fredric Edwin Church from the Hudson River school who was later to become his close friend and associate. This period is seen as the turning point in his life as it signaled the onset of his unique lifestyle and a lasting interest in landscape and paintings. In 1863, he interpreted the chaste Latin American coastal landscape in a unique manner and later toured Rio de Janeiro in Brazil in the same year (Hollis Taggart Galleries Para 3). The goal of the tour was to illustrate a complete different version of South American Hummingbirds. He was so enthusiastic about the Hummingbirds that he hoped to prepare an outstanding and an elegant album about these creatures in Britain. Though he hoped to have this album published in Britain, it was never to happen. Hummingbirds however continued to be a dear subject to him as evidenced by the paintings that he did in the rest of life. He continued making trips to the Latin America notably in Nicaragua, Colombia, Jamaica and Panama. In the course of those visits, he studied the local flora and fauna, painting both large and small landscapes of hummingbirds and orchids, works that saw him get recognition at the gallery exhibition in New York and Boston. At the age of sixty four in 1883, Heade got married and moved to St Augustine in Florida. This is where he was to spend the rest of his life while he continued to exhibit his paintings in northern towns such as Boston and Springfield Massachusetts. He was almost forgotten in the New York City but was later rediscovered during the revival of the Hudson River painting school and has from then on been accorded the respect and major status that he commanded out of his outstanding work. In Florida, an oil tycoon and hotel magnate Henry Morris Flagger invited Heade to set up another studio, which was to be last studio, in a building behind Ponce De Leon, a hotel that was owed by Flagger in St Augustine. In his two decades stay at St Augustine prior to his death on September 4 1904, he continued to paint while fascinated by the flora and fauna located in Florida. His works were mainly Cherokee roses, orchids and magnolias (Hollis Taggart Galleries, Para. 4). The works could often depicted the same flower over and over again but in different blooming states thus bringing out the hidden beauty of the environment that is not obvious to many. During his stay in St Augustine Florida and prior to his death, Heade made more than one hundred and fifty pieces of work . Most of this work focused on the exuberant nature and landscape, flowers, sceneries and fruits of the American south , topics that were dear to him also. It is against this background that he is remembered, having not only taken a lot if interest in a rare subject but also having pursued it with vigor, passion and up to the old age. He did what he liked most and did it best. The outstanding feature of any artistic work done by Heade is their capture of their botanic and scientific accuracy. They note every line on the leaf, every mark on the facet, fruit or blossom. The figures below are example of the artistic work done by the 19th century artist and depict the mystery surrounding him and his interest in the natural world. Though the work was done more than a century ago, the beauty and elegance has surpassed the passage time. Fig. 1 Source: http://www. martin-johnson-heade. org/ Although little is documented in writing about Martin Johnson Heade as he left no identifiable body of writing, his contribution to the field of art and painting is immense. Such is evidenced by the Martin Johnson Heade, a function organized and premiering at the Museum of Fine Arts (MFA) in Boson from the 29th day of September 1999 through the 17th of January 2000 which shed light on Martin Johnson Heade as one of the most original and all time artists in the history of mankind (Traditional Fine Art Online Inc, Para. 1). MFA owns an outstanding collection of work done by Heade including about 30 paintings, numerous drawings and other materials such as sketches and sketch books that he used. Although he was practically unknown during his own days, Heade is today also recognized in America as a great romantic painter and uniquely as a master landscape painter as far as floral still life is concerned. With a career that spanned over seventy years, a lot went to his name’s credit as noted during the function organized by MFA, having produced a varied body of work more than any other American artist of the 19th century. Martin Johnson Heade is sure to give new insights into the work of one of the most intriguing of American artists, whose paintings have a strange and almost surreal intensity. Heade was one of Americas most productive and inventive artists, and his work reflects a wide range of talent and creativity. The exemplary work captures such a variety of moods, from his atmospheric effects, the glory of light, the sumptuous warmth of his orchids and tropical scenes, and the inexplicable sensuality of so many of his works in every genre. I hope recognition of his genius grows as more and more people are introduced to these superb paintings (Traditional Fine Art Online Inc, Para. 6). During the popular Mesueum of Fine Arts event, Heade’s favourite hummingbirds painting was revisited. It was recounted that even if he never managed to secure the two hundred subscriptions needed to print his expensive book, which was never printed anyway, he produced four hummingbird chromolithographs for the book and could at the time be viewed in Boston as well as the sixteen paintings that were intended for the gems of Brazil from the Manoogian collection (Traditional Fine Art Online Inc, Para. 7). Earlier on in 1955, a historian and the then director of Macbeth gallery Robert Mclntyre had donated some work done by Heade to the Archives of American Art. Such included his sketch book, notebooks as well as letters and correspondeces between him and his close friend and associate Fredric Edwin Church between the year 1866 and 1899. In addition, they included a detailed notebook about hummingbirds that is handwritten as well as a circa dated in the range between 1853 to 1877. The scattred papers measure 0. 3 linear feet and date between 1853 and 1904. In the year 2007, the above were completely digitized to enhance archiving and are now avilable online as the Martin Johnson Heade Papers Online. They had first received a preliminary level of processing immediately after donation before being microfilmed in the same order that they were donated. The notebook and the sketchbook being the first ones to have been donated were therefore proffesionally conserved in the year 2004. Another area that is seen to have captured Heade’s passion is still lifes of southern flowers especially the magnolia blossoms laid on velevet. This was an advancement of an interest that he had since the 1860’s. In his earlier work in this genre, he had done flowers keenly arranged in an ormate flower vase and placed either on small or a large table, but covered with a mere cloth as opposed to velvet. At the time, he was the first and the only american artist who could create such an extensive body of work either in still lifes or in landscape and environment. In 2004, Heade was again recognized and honored with an outstanding stamp from the United States Postal Servive featuring a piece of his 1890 oil-on-canvas painting otherwise called Giant magnolias on a blue Velvet cloth. There were few artists who emulated head in the 20th century owing to the fact that he was unpopular at the time. However his work and art has been duplicated and forged by many especially in the 20th and 21st century. Such is attributed to the way his work has continued to turn up in garage sales as well as other unlikely places as opposed to works by other artists such as his friend Fredric Edward Church or ohn Kensett.. The popularity of his work can be attributed to the way he related with middle class buyers, his outstanding passion and effort put in as depicted in his various trips and his willigness to distribute his work all the country. Though unknown to him even at the end of his life, Martin johnson Heade was one of the most outstanding artist that ever existed on the face of earth. His passion in what was then an unpopular venture tells it all. His keen interpretation and approach towards the light and the environmet at large, his representation of the same on his paintings as well as his vigor and dedication to distribute his work, all leave no doubt that he did what he loved and in return loved what he did. His work does not only reveal what is unobvious to many but also unearths what is sincerely unknown and his spirit therefore continues to live moreso through his elegant work. Martin Johnson Heade is no doubt a legend whose life deserves recognition by and over generations while his work continues to demand respect over centuries. Works Cited: Hollis Taggart Galleries. Hollis Taggart Gallaries. 2007. 26 May 2010 http://www. hollistaggart. com/artists/biography/martin_johnson_heade/. Mappen, Marc and Maxine N Lurie. Encyclopedia of New Jersey. New Jersey: Rutgers University Press, 2004. Traditional Fine Art Online Inc. Meseum of Fine Arts Boston. 29 September 1999. www. mfa. org. 26 May 2010 http://www. tfaoi. com/newsm1/n1m630. htm.

Saturday, October 26, 2019

Restorative Justice: Benefits and Limitations

Restorative Justice: Benefits and Limitations Systems of Restorative Justice have been utilized around the world for many centuries, examples can be found in many civilizations throughout history. In recent times there have been numerous concepts and reinventions of what many believe or feel is the modern restorative justice model of today. This essay will consider some of the strengths and critics of restorative justice, with a focus on some of the latest research and studies. The vast majority of early studies concluded and indicated that the type of restorative justice model, that each examined, was achieving good positive results and appeared to be a viable alternative to incarceration. Later studies however appear to place limitations on these findings and many question the definition and cultural context of restorative justice, concluding that there could be limited merit in the application of restorative justice in modern society. This apparent shift in the thinking of the true efficacy of restorative justice raises many more questions that will need to be addressed with the primary question what is restorative justice? Until a comprehensive and unified definition is developed and all studies and reviews are truly comparative, there may only be limited reliability in the findings or conclusions of any research or study.What is restorative justice? Does it work? Who does it benefit? Is it relevant today? Can it be used for all forms of offending? These are just a few of the many questions that require some form of answer to establish the efficacy of restorative justice in todays society. There are as many supporters as there are critics of the use and efficacy of restorative justice around the world (Daly, 2002). A mixture of restorative justice style paradigms have been in existence and utilized as a method of penalty or reparation in many cultures around the world for many years. The wide spread use has resulted in many styles, forms and types of restorative justice being developed, redeveloped and conceptualized throughout the centuries. Several paradigms are still evolving even today. Progression from the early retribution style practices, to the use of the circle process has been the key component in some cultures. The early use of the circle process by the indigenous people of Canada (Department of Justice Canada, 2000) was one of the first primal steps to what is now developing and considered by many to be the modern form of restorative justice. The circle process of mediation has many forms but the basic principle is a conference style meeting or discussion in a non threatening environment that involves all the relevant parties, victims and offender. The modern concepts of restorative practices, which have evolved from the original circle process, characteristically contain a focus which promotes mutual understanding, respect, acknowledgement and a mutually agreed resolution between the victim and the offender. However there are many who believe that there are some major problems with the modern concept of restorative justice. In a recent study Kathleen Daly (Daly, 2002) highlights the myths that are portrayed by many who advocate the success of restorative justice and who promote the concept as being a successful modern ideology. Daly (Daly, 2002) also suggests that those who promote these myths may be endeavouring to reform the justice system and therefore are accentuating these myths which may also be in part politically motivated to maintain the funding for restorative justice. The view of possible political motivation promoting positive reviews is also expressed in by White (White Perrone, 2005). What is evident is that the re is a lack of reports, studies and information covering the failures of restorative justice. The vast majority of evidence highlights the positives and as suggested by Daly (Daly, 2002) thereby giving the appearance of success for restorative justice. In a 2010 thesis Roberts (Roberts, 2010) evaluated the methodology of how the evaluation of restorative justice practices is conducted. The thesis highlighted the considerable differences in results and outcomes primarily related to the different types of paradigms assessed and in use around the world. The main concerns that regularly appear in most critical reviews and studies focus on the issues related to the lack of a recognised singular definition of restorative justice and how evaluations are conducted (Walgrave, 2011). Around the world there are literally hundreds of definitions each specific to their own culture, ideology and political will. Many discussions have been focused on comparing community justice to restorative styles endeavouring to answer, are they the same or different? (McCold, 2004).This lack of continuity or agreement raises concerns as to the legitimacy or efficacy of many if not all studies and research and the outcomes reported(Walgrave, 2011). Braithwaite (Braithwaite, 2007) pointed out that political desires can also be influential on the application of restorative justice principles. Negative findings on the use of restorative justice or if the public perceived that there was a breakdown in law and order by the overuse of restorative practices, there c ould be a reduction in political support for restorative justice. There however appears to be an element of strength when restorative practices are implemented within the education system (Shaw, 2007), in particular with the very young. The practice of restorative justice has found some merit within the education system, however the success is qualified. In 2007 a report on restorative type practices in Australian schools (Shaw, 2007) highlighted some of the success with these practices and principles in initiating some cultural change within the school environment. The study also found there was considerable support for restorative type practice when actively utilized in facilitating bullying, alienation and harassment situations as well as the reintegration of marginalised students in the school system. Further support for the application of restorative justice style practices within the youth justice system (Hayes Hayes, 2008), concluded that with the requirement for the offender themselves to meet face to face and speak to the victim imparted a strong influence on the outcome. The requirement for the offender to speak to the victim without another person representing them was seen as a strong reinforcement to t he offender of their unacceptable behaviour. A recent study however, conducted in the United Kingdom observed a single student participating in restorative practices to address behaviour problems. The study concluded that restorative practices had no overall effect on improving the students behaviour despite isolated qualified success (Standing, 2012). The study also highlighted a major issue that could have contributed to the failure of the restorative practices. The inability of all sectors of the school staff, in a whole of school approach, to actively and positively engaging in the process created gaps in the continuity thereby reducing the positive outcomes. This result reinforces the necessity for all parties to be willing and dedicated to achieving the desired outcome. Despite some reports and studies showing that there is potential for restorative justice to be successful, as shown in the Victorian schools study (Shaw, 2007), there is however a distinct possibility that the merging of 2 or more of the numerous paradigms, community justice and restorative justice, may lead to uncertainty, ambiguity and misinterpretation thereby creating a doubt in the efficacy of either (McCold, 2004). In other studies the face to face benefit or disincentive to the victim is considered and investigations (Stubbs, 2009) have shown that the impact on the victim in sexual assaults, where they are required to face the offender may create more problems for the victim and be far from beneficial as a restorative practice. Apologies (Choi Severson, 2009)appear to be the main criteria that many practitioners of restorative justice promote and the actual impact on the victim may not be as favourable as most believe. One study that had appeared to report a positive conclusi on (Okimoto, Wenzel, Feather, 2012) supporting restorative justice however examination of the results showed a tendency favour the offender rather than the victim. The victims of crime are still peripheral to the justice system and feel intimidated and can find the offender has no remorse and that the apology is insincere (Choi Severson, 2009). Some offenders have been observed making positive assertions, promises and apologies with the desire simply to obtain a reduction or dismissal of punishment only to later reoffend with no remorse or consideration for the affirmations previously made (Walgrave, 2011). Recidivism is an area of concern as was demonstrated and highlighted by Pranis (Pranis, 2004). Despite what appeared at first to be a successful use of restorative justice in a case involving theft the youth offender apologised to the elderly victim and promised not to reoffend. However the victim later became aware of another incident involving the same youth and requested another face to face meeting with the youth offender. The victim reinforced the disgust at the offenders lack of respect for the victim and the disappointment of broken promises previously made. The victim requested the offender reaffirm the promises, maintain contact with the victim and refrain from further offending (Pranis, 2004). The offender showed great remorse and has remained free from offending post the second meeting. This success however relied heavily upon the very strong character and tenacity of the original victim which would probably not be replicated in the vast majority of situations. The outcome s for some processes appear to be offender orientated with very little consideration for the needs of the victim. There has been a consistency demonstrated in many studies reporting positively how effective restorative justice practices have been found. These positives may be creating a mistaken attitude to the effectiveness of restorative justice. Choi (Choi, Bazemore, Gilbert, 2012) highlights the lack of negative reviews and reinforces some of the problems, as demonstrated within this essay, that may result from the overabundance of positive results. In conclusion the questions proposed at the beginning of this essay will still need to be carefully examined in other forums. What is restorative justice? There is no simple answer. Does it work? In very limited and qualified situations. Who does it benefit? It appears to favour the offender in the majority of situations. Is it relevant today? Many would suggest that it is more relevant. Can it be used for all forms of offending? Agreement appears to support limited use within targeted offending. With no widely accepted definition and the lack of a standard paradigm, comparisons and the true evaluation of the strengths and critics of restorative justice may remain a contentious issue for many years to come. There appears to be a growing amount of information available that indicates that the use of restorative justice has only limited effectiveness, primarily with youth, and the use of restorative justice in the adult realm may have no measurable efficacy. There is much ambiguity and contradiction in the use of restorative justice, much of which will need to be rectified to allow the advancement of the principles. The strengths and success of current restorative practices must largely rest with the facilitators, whilst allowing the academics to solve the dilemmas in definition and paradigm.

Thursday, October 24, 2019

Shylock in William Shakespeares The Merchant of Venice :: Merchant of Venice Essays

Shylock in William Shakespeare's The Merchant of Venice Shylock is a Jew in the play "The merchant of Venice". He has a daughter called Jessica and he is in many ways a victim of anti-Semitism. Shakespeare brings across Shylock as a Jew using many different devices. For example he uses anti-Semitism to show that Shylock is meant to be portrayed as an isolated character. Anti-Semitism was based on religious grounds back then, they held the belief that Jews murdered Christ and were therefore in the league of the devil, this is why the Christians in the play and the directors of the play are vengeful towards Shylock. I believe that Shakespeare deliberately isolates Shylock, which then makes the play more effective, because putting all Christians in the play wouldn't give the play such a strong plot, as it has now. There would be no verbally abusive things said to both the Christians and the Jew and no remarks or stage directions used to show Shylock as the outsider, because the Christians would have treated him like one of their own! From the occurrences at that time, there were no rumours going around about the Jews which were mostly all made up, but it then gave Shakespeare an incentive, which resulted in portraying Shylock as the villain. Firstly, what is definitely noticeable is that Shylock is presented as an outsider. A way that this is proven is when you look at the directors, entrance notes an exit notes, they stand out considerably because Shakespeare writes Shylock "The Jew" this immediately denotes a difference within the play. Another way that Shakespeare is making the audience consider the fact Shylock's an outsider, is his use of language. It's very repetitive and it's conspicuous he's an outsider, he ends his sentences wit "well" every time. The sort of treatment that Shylock obtains from the other characters is that of a more aggressive and rude nature, but Shylock returns their vicious comments by a play on words and his hate for Christians,

Wednesday, October 23, 2019

Burglary Prevention Program Essay

Type of Research Design   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The research is looking forward to adopt the Quantitative Tradition of research.   The Quantitative Tradition of Research employs the method that is based on testing of theories. In addition, such also uses measurement of numbers and statistical analysis. The idea behind quantitative research is often to ascertain that a generalized theory or the prediction of a theory will be confirmed by using a statistical method.   Initially, quantitative research starts with the hypothesis and the theories that require being tested (Benz and Newman, 1998). The approach of quantitative research includes the use of formal and generally recognized instruments. In most instances, quantitative research conducts studies with an underlying expectation that a consensus would be arrived at.   As such, quantitative research usually aims to conclude a predictable generalization, and a causal explanation(Benz and Newman, 1998). Quantitative research also studies controlled and manipulated the participants on experiments and puts immense emphasis on deduction and analysis; as the goal of the aforementioned is to establish consensus by reducing data to numerical indications.   In effect of this, it could be significantly noted that the goal of quantitative research is the determination a given prediction, as the aforementioned seeks to know if certain generalizations could be verified or confirmed. In general, the quantitative methodology assumes that there is an objective reality which is independent of the person doing the research, it also takes the position that the subject of study can be done in an objective manner. The researcher must maintain independence from the research object. And the research is not expected to be value affected as the researcher must make sure that he or she does not become a part of the research (Benz and Newman, 1998) . The quantitative methodology tests cause and effect by using deductive logic. When done correctly a quantitative research will be able to predict, and explain the theory in question (Benz and Newman, 1998). Type of Sampling   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Sampling is the process of identifying the respondents for a particular research in order to attain the data that is necessary for a particular study. Such is also relevant in order to avoid the difficulty of administering the survey on an entire population (Ghauri et al, 1995).   Ã‚  According to Aaker et al (1995) research should cater to a target population that has all the necessary information for the research such as sampling elements, sampling units, and area of coverage.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The research is looking forward to adopt a Cluster Sampling procedure from a number of participants from various police departments who have adopted the burglary prevention that is similar to the Burglary Prevention Program employed by the chief of police in the author’s respective state. Cluster sampling is the process wherein the respondents are chosen in clusters such as police departments in various cities and/or   states using the same burglary prevention and the likes.   This type of sampling is advantageous to save traveling time and cist reduction.   It is also convenient in order to find a good number of participants who since the aforementioned are grouped into clusters (Ghauri et al, 2000). Units of Sampling to be Employed   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Determining the sample size for the survey is very relevant because much of the validity of the quantitative data of the research rests upon it. For the purpose of this part of the research, the research will be focusing on the sample size’s confidence interval and confidence level.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The confidence interval is the plus-or-minus figure that determined the confidence results of a particular study. For the purpose of this research, the projected confidence interval is plus or minus 1.75 on a 95% confidence level and a 120 population size.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   On the other hand, the confidence level tells the percentage on how the results of the study could be sure. Often times, the confidence level is expressed in percentage and tells how frequently the population on the study would pick an answer that is within the confidence interval. For the purpose of this study, the author used the 95% confidence level which is most used confidence level among researches (Benz and Newman, 1998).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   As such, in analyzing the data for the survey, the research will have to look into a 95% confidence with a plus or minus 1.75 intervals. The wider that the confidence level that the research has to work on, the more certain as well that the population response would be more or less within that range.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   For the purpose of the research, the following formula will be used for the Sample Size (Benz and Newman, 1998). ss = z2 * (p) * (1-p) _________________ c2 Where as: ss= the minimum sample size z = z value (e.g. 1.96 for 95% confidence level) p = percentage picking a choice, expressed as decimal (.5 used for sample size needed) c = confidence interval, expressed as decimal (e.g., .04 =  ±4) There are three major factors that would affect the confidence intervals, these are the sample size, percentage and the population size.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   A huge sample size would make the results of the research mirror exactly that of the population. This implies that a for every confidence level, a huge sample size reflects a more small confidence interval. Albeit it should be noted that the relationship between them is not linear that if one would double the sample size, such would also make the confidence interval go up (Benz and Newman, 1998).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The percentage of a particular response from the survey also is a determinant for accuracy. For instance if a particular response says 51%, therefore it implies that there is a 49% chance of the responses being erroneous. However if the response rates reveal a 99% positive response versus a 1% negative response, there would be no significant difference at all (Benz and Newman, 1998).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The population size also matters when one is studying a segment of population that is relatively small such as those from the specific hotels being studied. On the other hand, if a research would be conducting a study from a very huge population, like for instance 500,000 or more, the size of the sample a sample size that is close to that exact number does not appear to be that relevant (Benz and Newman, 1998). Reliability and Validity   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The study’s reliability and validity go hand in hand as patterns of measurement depend on both the dependent and independent variables (Zikmund, 1994). Reliability primarily focuses on the internal consistency and the repeatability of the variables within the research. On the other hand, validity centers on the correctness and appropriateness of the question that one intends to measure (Ghauri et al, 1995). According to Chisnall (1997), validity is generally considered and established through the relationship of the instrument to the content, criterion or construct that it attempts to measure. A lack of validity can lead to incorrect conclusion. Analysis of Data   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   For the purpose of the survey, the data that will be gathered will be analyzed using the SPSS Software. SPSS (Statistical Products and Service Solutions) is a powerful, easy to use statistical package designed in a Windows environment, which enabled researchers to tap into various options of interpreting data (Griego and Morgan, 2000, p. 2). SPSS has been viewed as the premiere statistical software that are primarily being used to interpret quantitative research results due to its ease of use, technical support, ease of installation, scope of capabilities, user interface, graphical components, and so forth (Hilbe, 2005, p. 68).   Independent and Dependent Variables Independent Variable   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The independent variable is the causal factor that shapes or determines the dependent variable.   This type of variable is subjected to arbitrary change that is necessary in order to test the results of a particular test (Crown, 1998). The independent variable for this research is the effectiveness of the Burglary Prevention Program. Dependent Variables   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Dependent variables are is a variable that depends on the independent variable for change.   It is also known as the criterion variable (Crown, 1998). The dependent variables of the research are risk management strategies employed by a particular department such as proper identification of criminal vulnerability areas, use of effective detection alarms, and employee training. Data Collection The researcher will collect data based on primary and secondary methods. Secondary Data Collection   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Ghaury et al (1995) emphasized the importance of secondary data collection most especially through desk or library research. The review of related literature provided a scholarly perspective on the subject matter and at the same time made the researcher aware of both previous and contemporary research on the subject matter.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The data collection for secondary sources will be lifted from Questia Media America, an on-line Research Library and EBSCO Host with a special emphasis on literatures from London. Primary Data Collection   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   For the primary data collection, the researcher will be focusing on getting the data that are exactly needed for the research. With prior consideration on the objectives and the literature that will be collected by the researcher, a   seven-point survey will be formulated. Surveys  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The primary data that the research will use will be lifted based on distributing the questionnaires and survey forms through snail mail, e-mail, telephone conversation and personal interactions.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   According to Ritchie & Goeldner (1994) the process of telephone interview or survey for that matter includes conversing with an interviewee through the use of a telephone, rather than do it in person. In some ways, it could be said that a telephone survey is more preferred than a personal survey because it is relatively faster and could have prevented administrative problems. In addition with these, telephone surveys are relatively more cost effective and have the capability to reach those individuals that could not be reached locally. Although this method appears to be very cost effective,   it also proved to be impersonal in nature.   One major reason is the interviewer’s failure to see the exact reaction of the respondents on certain questions. .   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   On the other hand, Chisnall (1997) said that the process of mailing questionnaires include the use of mailing a set of questions to a certain sample population. Such a method could be said to be also relatively cheaper and assures anonymity and confidentiality. Such a method is also preferred when the respondents for the study are located in various locations and a phone interview appears to be not possible. Also, a mailed questionnaire could allow the respondents answer to the questions at their convenience; albeit, it could be significantly noted that it has also been perceived that there is a relatively low response rate on questionnaires. It is said by Chisnall (1977) that a 30% return of questionnaires is already relevant. In addition with this, it could be possible that the respondents might not have understood the questions in the survey form, and a discrepancy could also show in the results. Finally, similar to telephone interviews, the interviewer could also not see the body languages of the interviewee. Justification of the Selected Method   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   For the purpose of this research, the author will be conducting a pen and paper measurement survey that was sent via e-mail, mail, and personal administered basis. The respondents need to answer question based on a Likert Type Scale which ranks responses in seven different levels: Highly Agree, Agree, Somewhat Agree, Neutral, Somewhat Disagree, Disagree, Highly Disagree and Not Applicable. Whenever applicable, the questionnaires will be asked to be answered on a personal basis in order to avoid errors and discrepancy on the results.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The self-administered questionnaires offered a higher response rate and are also relatively cost effective (Bryman, 1992). Foremost of its advantage rests on the notion that the process of data gathering could be more personal and also the researcher could have clarify certain notions that could be unclear on the survey form. However, one distinct disadvantage of such a method is the difficulty of administrating the survey to multiple respondents all at the same time. In addition, the self-administered data gathering could be very time consuming as well.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Due to the time constraints and the monetary concerns that the research might post, the author perceived that it would be more effective for the survey to be administered on a personal or electronic basis, such as the e-mail. Whenever applicable, questionnaires will be also mailed. Questionnaire Design The questionnaire will be made in a manner that will promote a detailed, precise and logical construction of close-ended question. In addition with this, the questions will also be made in accordance with the hypotheses and the objectives of the research (Oppenheim, 1992).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The questions will be formulated using a 7-Point Likert Type Scale and will be Close-Ended in Nature. Such is relevant so that respondents would only have to encircle the designated number of their corresponding responses (Oppenhein, 1992). In addition with this, close-ended questions are very easy to answer and could enable the researcher create a summated value that could be use for data analysis. Ethical Considerations in Research   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   To be ethical is to conform to accepted professional practices (Bailey, 1994, p. 454).   Utmost on the ethical considerations that this research will focus on is the notion of Informed Consent.   Informed consent is the process wherein respondents are made fully aware of the purpose of the study, possible dangers, and also the credentials of the researchers.   As such, in doing a survey, it is often the case that there is an introductory statement that will accompany the said questionnaire. The aforementioned are relevant in order to induce individuals to participate in a study in a voluntary manner.   For the purpose of the study, the researcher will be providing the respondents with an introductory statement that will accompany their questionnaire.  Ã‚   After reading such, the probable respondents will decide if they wanted to participate in the study or not.   This is very important in order to prevent duress and probable respondents would participate in the study on their own free will.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   It has also been pointed out by Bailey (1994) that sampling could also pose some issues in research as they could have pose privacy issues.   It could be the case that on the course of primary data gathering upon 120 respondents in various police departments, and the respondents felt that there are a number of questions that appears to be invading their privacy, then it could be the case that such an issue could pose a problem in terms of not only the ethical considerations among the respondents but also the validity of the data to gathered as respondents may not choose to answer truthfully such an answer. In the nature of this research, the issue would be a matter of program effectiveness on burglary security.   As such, the research would be cautious to questions that would require respondents to reveal personal information and also specific experiences that could place the respondent in a disposition of inconvenience.  Ã‚   As such it is also then part of the proposed methodology for the study , the anonymity of the respondents.   The responses of the participants will be kept confidential and will only be used for the purpose of the study.       References Aaker, D. A. and Day G. S. 1990. Marketing Research, 4ed. Singapore: John Wiley & Sons. Bailey K. 1994, Methods of Social Research. New York, New York: The Free Press. Benz C. and Newman I, 1998. Qualitative-Quantitative Research Methodology: Exploring the Interactive Continuum. Carbondale, IL: Southern Illinois University Press. Chisnall P. M., 1997. Marketing Research, 5ed., Berkshire: McGraw-Hill. Crown W. 1998.   Statistical Models for the Social and Behavioral Sciences Multiple Regression and Limited-Dependent Variable Models. Westport, CT: Praeger Publishers. Ghauri, P., Gronhaug, K. and Kristianslund, I., 1995. Research Methods In Business Griego O. and Morgan G. (2000). SPSS for Windows: An Introduction to Use and Interpretation in Research. Mahwah, NJ: Lawrence Erlbaum Associates. Studies: A Practical Guide. Great Britain: Prentice Hall. Hilbe J. , 2005. A Review of SPSS 12.01, Part 2. The American Statistician 58 (2), pp. Oppenhein, A. N,, 1992. Questionnaire Design Interviewing and Attitude Measurement. London: Pinter. Ritchie B. and Goeldner C. R., 1994. Travel, Tourism and Hotel Researcher. New York: Wiley and Sons, Inc. Zikmund, G. W., 1994. Exploring Marketing Research. Dryden

Tuesday, October 22, 2019

Concept of the Manifest Destiny Essays

Concept of the Manifest Destiny Essays Concept of the Manifest Destiny Paper Concept of the Manifest Destiny Paper Describe the concept of the Manifest Destiny and analyze its impact on the nineteenth-century South and West. How were the ideas of expansionists similar or different from the goals and experiences of ordinary migrants? What effect did the movement of thousands of individuals to the West and Southwest in the 1840’s and 1850’s have on indigenous peoples? This writing assignment will attempt to describe the concept of Manifest Destiny and analyze its impact on the nineteenth-century of the South and West. I will also elaborate on how the ideas of the expansionists were similar and different from the goals and experiences of ordinary migrants. In closing, I will describe the effect the movement of thousands of individuals to the Manifest Destiny is defined by Dictionary. com as â€Å"the belief or doctrine, held chiefly in the middle and part of the 19th century, that it was the destiny of the U. S. to expand its territory over the whole of North America and to extend and enhance its political, social, and economic influences (Random House Dictionary). It is also defined as â€Å"a policy of imperialistic expansion defended as necessary or benevolent and the United States had the right and duty to expand throughout the continent (The American Heritage, Dictionary of the English Language). According to Wikipedia, it is the historical belief that the United States was destined and seaboard to the Pacific Ocean (Wikipedia. com). In other words, the Manifest Destiny was a concept that influenced American policy in the 1800’s. It was the driving force behind the rapid expansion of America into the West from the East and was heavily promoted in newspapers, posters and through other media. It also led to the passage of the legislation such as Homestead Act that encouraged Westward colonization and territorial acquisition.

Monday, October 21, 2019

This essay was for a Geography retail class, and I was supposed to gather three articles and compare and contrast the ideas of the aritcle with the main topic which was shopping malls in N.America.

This essay was for a Geography retail class, and I was supposed to gather three articles and compare and contrast the ideas of the aritcle with the main topic which was shopping malls in N.America. Shields, Rob., 1989. Social Spatialization and the built environment: The West Edmonton Mall. Environment and Planning D: Society and Space, 7: 147-64.Shields article explores numerous aspects of social spatialization and the environment of the West Edmonton Mall. The development of this world class tourist attraction became the "largest, comprehensive tourist attraction ever built in the universe" (Shield, 150). The city of Edmonton needed a world class tourist attraction, needed a place were people would come to instead of going to other cities in the world to find the same thing. In this article Shield's provide a well analyzed and clear setting towards on how the Mall is becoming a substitute for the Street, and the contrast between the mall users or more specific 'post-shoppers' and 'mall rats'. One of the first point Shields mentions is the architecture of the mall, how the exterior is created with concrete and brick, and inside there is a bricolage of historicist recreations a nd high tech fantasy for example, a water park, ice rink, roller coaster, a three hundred and fifty room hotel and 'streetscapes' replica such as "Europa Boulevard", and New Orleans's Bourbon street.Chinatown, West Edmonton Mall, Edmonton, Alberta, ...The Mall is built "under one roof" to offer the participants worry free of the weather conditions. The creation of this mall followed the same typology for other malls across North America, to have "two anchor department store at each end of a long street of specialty shops" (Shield, 150). Furthermore, Shields explains the reason of success for the mall it "defies conventional marketing wisdom" (Shields, 151). The development of the mall started at the right time during the decline in the oil industry in Alberta, and in turn it became a huge success, in 1987 it became the third best tourist attraction to visit respectively behind...

Sunday, October 20, 2019

A Midsummer NightS Dream Essays - Fiction, Hermia, Demetrius

A Midsummer NightS Dream Essays - Fiction, Hermia, Demetrius A Midsummer NightS Dream William Shakespeare intensifies the emotion of love and foolishness in the epic tale of four lovers and an enchanted forest in his classic Midsummer Nights Dream. Early in this work, we learn of two young maidens, Hermia and Helena, and their unfulfilled passions. Hermia, the daughter of a gentleman, is cast into the burden of marrying a suitor, Demetrius, chosen by her father for which she does not love. Instead, she has fallen for Lysander. To agitate further, Helena is madly in love with Demetrius, who treats her as if she does not exist. As a result, Helenas emotions can be shared by everybody: infatuation, betrayal, jealousy, and spite. Therefore, it is Helenas character that answers to comedy as a tortured soul among lovers in fairyland. Everywhere in the play, Helena plays the victim of Demetrius apathy. We find pity for poor Helena when she finally catches up to Demetrius in the forest and says Ill follow thee and make a heaven of hell, to die upon the hand I love so well (336). In desperation, Helena cries we cannot fight for love, as men may do; we should be wood and were not made to woo (336). So unrequited is her love that she begs him Stay, though thou kill me, sweet Demetrius (340). Helenas jealousy of her friend Hermia emerges from her soliloquy Happy is Hermia, wheresoeer she lies, for she hath blessed and attractive eyes (340). When she finally receives the attention and affection from Demetrius, she becomes mortified at the thought that Hermia and Demetrius have plotted to humiliate her even further by mocking her. Helena vehemently protests O spite! O hell! I see you all are bent to set against me for your merriment (345). When she finally encounters Demetrius and Hermia, she questions the decency of their motives Have not set Demetrius, who even but now did spurn me with his foot, to call me goddess, nymph, divine and rare, precious, celestial? (346). Her torment is so real that she slowly embraces the fate of her existence. But fare ye well. Tis partly my own fault, which death, or absence, soon shall remedy (346). Fortunately, as with all comedies during the Elizabethan era, the play ends and everything turns out exceptionally well (327). With the help of the fairies, Demetrius pairs with Helena and she becomes a tortured soul no more. The only question left to ponder is the view of humanity as seen in this play a just view of love or that of infatuation, lust, and merriment?

Saturday, October 19, 2019

Personal Development Plan Essay Example | Topics and Well Written Essays - 1500 words - 1

Personal Development Plan - Essay Example It has to comprise job assignments that build leadership skills. And it has to be hold up by the organization and incorporated into a development philosophy that views planning documents as the commencement of the development expedition, not the end (Ametrano, I. M., 2003, 190-193). During the research of this network based assignment I have equally focus upon my personal development and look for to become accustomed the worldwide assessment of performance more especially to the personal development in networking. It is based mainly on WAN based networking for Nokia Incorporation The primary four part scores seek to gauge Personal grooming as a professional figure when I was capturing data, the aptitude to create a living in a dynamic-based company like Nokia. To design and implement a network model for an international organisation to get connections between two branches. To also examine the network model to make sure it met the performance and compatibility requirements. No doubt, the objective of this network based project is a development plan for multier national company is an important part of any effectual leadership-development system at two levels. At the organizational level, these plans make sure that the next age group of leaders will have the skills and skills required to define and implement the corporation's strategies. According to this research work at the personal level, it forces me as future leader to focus on what needs to be done in order to grow. When done right, the individual development plan becomes a contract future leaders make with themselves and the organization about the things they want to do or to become. The plan creates discipline and a good plan creates motivation. If we analyzed then we come to know about basic object of this research based project: 1. Research into different area networks (LAN, WAN, MAN, etc) 2. Research into few network modelling and simulation software. (OPNET guru etc) 3. Critical evaluation on the chosen area network (WAN) 4. Critical evaluation on the chosen network modelling and simulation software(OPNET guru) 5. To illustrate the issues to produce a better performance of a WAN 6. Using network modelling and simulation software(OPNET guru) to create a simulation for the designed network model 7. Implement a prototype to demonstrate the simulation of the network. 8. Testing the prototype to ensure it performs and its performance of the network met the requirements. No doubt, the worth network systems of Nokia is a ground of hypercompetitive and personal development spirited individuals were look at in an example of successful people. As predictable, people higher in hypercompetitiveness and in personal development competitiveness were together further possible to support values connected to self-contained uniqueness such as attainment, hedonism, and a determined for an exciting and demanding life, but merely hypercompetitives authorized the worth of power and control over others. Furthermore, the data point to that people higher in personal development competitiveness were extra prone to support values linked to ensembled uniqueness. In exacting, they powerfully endorsed values linked with social concern, that is, with caring regarding the well-being of others and by treating them

Friday, October 18, 2019

Are e-cigarettes a healthier alternative to cigarette smoking Should Research Paper

Are e-cigarettes a healthier alternative to cigarette smoking Should they be used as nicotine replacement - Research Paper Example tes is the smoke that is emitted during smoking, e-cigarettes are seem to be effective since they do not burn to produce smoke and the amount of chemicals they emit is a fraction of what the regular cigarette emits (Caponnetto, Russo et al., 2014). Electronic cigarettes are environment friendly since they are free of smoke, produce no ash, and there is no risk of causing a fire. The paper discusses the differences between regular cigarettes and electronic cigarettes and will suggest possible advantages of the electronic cigarettes for human health. Electronic cigarettes have been described as healthy alternatives to tobacco cigarettes by their producers. As tobacco addiction is reported to be one of the leading causes of preventable premature deaths due to numerous cases of cancers, chronic obstructive pulmonary disease, lung and ischemic heart disease, more and more smokers are concerned about their health (Caponnetto et al., 2013). Electronic cigarettes have gained enormous popularity among the smokers who want to get rid of tobacco addiction. Electronic cigarettes, also referred as vaporizer cigarettes, due to their specific construction do not cause such heavy health dangers, and thus they tend to be less harmful than tobacco smoking (Etter, 2010). These cigarettes release minimal water vapor that does not include nicotine, and, therefore, it is considered to be safe for human health. Small batteries usually power the e-cigarette, and the not only healthier but also more convenient for smokers. This paper examines what e-c igarettes are made of and makes the research on the advantages of using e-cigarettes instead of regular cigarettes. It also focuses on the fact that e-cigarettes are healthy and users who want to quit smoking can use them as an efficient replacement of nicotine. E-cigarettes are effective since the individuals who want to keep on smoking can easily do it in public, and it will have no effects on the non-smokers. Even though e-cigarettes

BHS 499 (Senior Capstone Project) Module 3 SLP Essay

BHS 499 (Senior Capstone Project) Module 3 SLP - Essay Example One major implication of health care fraud and abuse is the monetary loss due to e improper activities which endanger patient safety. The United States Attorneys' offices (USAOs) are held responsible for the civil and criminal prosecution of health care providers, professionals, and other specialized business agencies who engage with health care fraud and abuse. The US government has appropriated certain amount (DOJ, 2000) from the United States Treasury general fund and they in turn must appropriate the Account for transfer some to the federal Bureau of Investigation in order to carry out the purpose and processes as described in above statements. Another implication is the intensification of health care fraud enforcement. This can never be achieved without the cooperation of other stakeholders. In fact, the FBI is one organization involved in the said cooperative effort. Federal agencies needs to collaborate with health care fraud working groups, have a liaison program among organizations and attend trainings as well as conferences. New statutory tools are believed to support ad be provided in order to combat health care fraud. Although Around $451,000 was budgeted to HCFA ($395,500) as well as the ASMB or Assistant Secretary for Management and Budget at the end of 2000 for the formal risk management operations.

Violence in Education Research Paper Example | Topics and Well Written Essays - 1750 words

Violence in Education - Research Paper Example This essay highlights that  education is a very critical sector in the economy of any nation as it contributes too much in terms of expertise and professional knowledge which can be utilized in various fields for achievement of success and progress. It is also through education that many problems faced by the contemporary society are eradicated for instance poverty and ignorance. Despite its importance, education is faced with numerous challenges that hinder its success in one way or the other for example lack of adequate resources and facilities, poor management and violence among others.  According to the report findings  education is a very instrumental aspect to every individual, the society, a nation and the world at large. Every person should be entitled to education to the highest possible level with favorable conditions that allows for excellence. This is so because education is a significant building block in regard to the growth and development of human beings   as it acts as a driving force towards improved living standards and also development through aspects like reduction of poverty, promotion of peace and stability,   improvement of health, promotion of gender equality among other aspects. All this is made possible because people get enlightened when they go through various education systems which instill a lot of knowledge in a wide range of life issues hence helping them in general decision making and problem solving. Education sector is faced with a lot of challenges violence being one of them.

Thursday, October 17, 2019

Marketing Essay Example | Topics and Well Written Essays - 2000 words - 14

Marketing - Essay Example The essay elaborates the marketing mix of Tide along with the target market. Tide has adopted many marketing strategies in order to keep their market share. Few of the strategies are discussed in the essay. Not only in US the brand has captured other market too by its products and has been successfully penetrating more areas which are not yet tapped by the brand. Tide has tapped foreign market like India (Loudon, 2002). Tide has targeted their customers and positioned the products in such a way that they have made their products a unique one among the mass. Tide has also faced with environmental issues in foreign markets which have been discussed in the section. Product Overview Tide detergent powder is a well known brand in the detergent industry which was first introduced in 1946. It is the market leader in 23 countries worldwide. Tide is regarded as P & G’s flagship brand. It was first introduced in US market as the synthetic detergent for heavy-duty and machine cleaning. T ide has initially started with white powdered bead but later it has included orange tinged liquid form in 1984. Today both the non-ultra and ultra products are dark blue in color with an exception of the product Tide Free which is clear in color. Tide had introduced a large array of products such as Tide Liquid, Tide with Febreze Freshness, Tide Powder, Tide Coldwater and many more. All the products that fall under the brand umbrella â€Å"Tide† has the four main utilities such as: 1. Convenient to use and have reasonable price to target the lower income class. 2. Washing at normal temperature (both hand and machine wash). 3. It saves water and also time. 4. Removes stubborn strains, protects color and leaves fresh smell even after the cloth is dry. Target market of Tide in US and India Tide brand first test marketed its products in the US market to see the reaction among the users of the product (Kotler, 2012).When the result came positive they were encouraged to make the pr oduct more aware among the mass so that they start using their new brand. Through many marketing strategies they penetrated the market and made a significant in the laundry market. The company has made extensive consumer research and then they have come to the following conclusions: 1. Women take the main decision of choosing any brand of home products. 2. The lower income group use bars of detergent to wash their utensils. 3. Women want their family’s well being and thus they want the maximum value out of the brand. 4. Women are quite price sensitive customers. They want products which are reasonable in price and also give satisfaction after using it. 5. Every household want to use such detergents which are long lasting and does not erode away in few uses. They even want detergent bars which are tough so that they not melt fast and are wasted. Thus from the above conclusions it can be said that Tide’s main target customers are the women group. Tide has always tried to contribute to the households to its maximum by providing them with the detergent powders which will make their cloths smooth and clean. Tide in US has targeted the women group as well as the lower income group. Women in US are basically working and thus they prefer to use a detergent which will be quickly effecting and is free from hassle. They do not have much time to wash the same cloth a many times if the dirt is not cleaned in first wash. Thus they require a reliable detergent powder which will do its work perfectly. Tide fulfills the need of these women by

Compassion and the Individual by Tenzin Gyatso, the fourteenth Dali Essay

Compassion and the Individual by Tenzin Gyatso, the fourteenth Dali Lama - Essay Example There is a citing in the article of a surging number of mental illnesses in the United States making up about 12% of the general population. A closer assessment showed that the main cause of these conditions were not lack of material possessions as many may think, but ‘deprivation of the affection of the others.’ Although the intent of life may be viewed as happiness, compassion is one of the key ways this is achieved. The term compassion is used depict a variety of other nouns such as love. The view in this case is that everyone tries to be happy ever since they are born. Every action that is undertaken such as playing with toys, socializing, and so forth are done to fulfil the urge to be happy. It is an expression of human will, and possibly one of the purpose of life. The problem nonetheless is that people are not always happy despite striving their best to be. Despite all the actions that humans undertake and the illusion that they might all bring about, Gyatso contends that the hidden objective is to be happy. However, Gyatso goes an extra mile to expound how this happiness can be attained. He initially clusters happiness into two, mental and physical happiness. Mind happiness in this case is taken to be of greater significance as compared to physical happiness. Mental happiness can be attained by devoting out most serious efforts to bringing mental peace, which would help us live in happiness. Mental tranquility according to Gyatso is best derived from the development of love and compassion. Each individual is viewed as a crucial part of society where the happiness of others dictates the happiness of one self. It is hence ones obligation to care for the happiness of others since it influence inner tranquility. Inner tranquility of the mind plays the role of embracing happiness in one’s life, particularly by overcoming problems that are ever present in life. Gyatso states that these problems may be viewed by

Wednesday, October 16, 2019

Violence in Education Research Paper Example | Topics and Well Written Essays - 1750 words

Violence in Education - Research Paper Example This essay highlights that  education is a very critical sector in the economy of any nation as it contributes too much in terms of expertise and professional knowledge which can be utilized in various fields for achievement of success and progress. It is also through education that many problems faced by the contemporary society are eradicated for instance poverty and ignorance. Despite its importance, education is faced with numerous challenges that hinder its success in one way or the other for example lack of adequate resources and facilities, poor management and violence among others.  According to the report findings  education is a very instrumental aspect to every individual, the society, a nation and the world at large. Every person should be entitled to education to the highest possible level with favorable conditions that allows for excellence. This is so because education is a significant building block in regard to the growth and development of human beings   as it acts as a driving force towards improved living standards and also development through aspects like reduction of poverty, promotion of peace and stability,   improvement of health, promotion of gender equality among other aspects. All this is made possible because people get enlightened when they go through various education systems which instill a lot of knowledge in a wide range of life issues hence helping them in general decision making and problem solving. Education sector is faced with a lot of challenges violence being one of them.

Tuesday, October 15, 2019

Compassion and the Individual by Tenzin Gyatso, the fourteenth Dali Essay

Compassion and the Individual by Tenzin Gyatso, the fourteenth Dali Lama - Essay Example There is a citing in the article of a surging number of mental illnesses in the United States making up about 12% of the general population. A closer assessment showed that the main cause of these conditions were not lack of material possessions as many may think, but ‘deprivation of the affection of the others.’ Although the intent of life may be viewed as happiness, compassion is one of the key ways this is achieved. The term compassion is used depict a variety of other nouns such as love. The view in this case is that everyone tries to be happy ever since they are born. Every action that is undertaken such as playing with toys, socializing, and so forth are done to fulfil the urge to be happy. It is an expression of human will, and possibly one of the purpose of life. The problem nonetheless is that people are not always happy despite striving their best to be. Despite all the actions that humans undertake and the illusion that they might all bring about, Gyatso contends that the hidden objective is to be happy. However, Gyatso goes an extra mile to expound how this happiness can be attained. He initially clusters happiness into two, mental and physical happiness. Mind happiness in this case is taken to be of greater significance as compared to physical happiness. Mental happiness can be attained by devoting out most serious efforts to bringing mental peace, which would help us live in happiness. Mental tranquility according to Gyatso is best derived from the development of love and compassion. Each individual is viewed as a crucial part of society where the happiness of others dictates the happiness of one self. It is hence ones obligation to care for the happiness of others since it influence inner tranquility. Inner tranquility of the mind plays the role of embracing happiness in one’s life, particularly by overcoming problems that are ever present in life. Gyatso states that these problems may be viewed by

The Unspoken Laws Essay Example for Free

The Unspoken Laws Essay The conceptualization of sexual, religious, and gendered borders has served to write the human standard of living and the societal roles that we have incorporated into our culture to accept as the social norm. These unspoken laws are the architecture to our socio-cultural environment. These laws represent the cement that has carefully bonded the male-female heteronormative gender role, the pre-inclined human morality given by religion, and sexual identity to be something that is easily definable by the masses. Arturo Islas in The Rain God defines Mexican culture by creating characters that exemplify and embody the stereotypes and the figurative borders of sexuality, religion, and gender. Throughout The Rain God Arturo Islas tells the story of the Angel family- a family made up of strong characters such as Miguel Grande and Mama Chona. Both Miguel Grande and Mama Chona strongly embody the female-male gender role while personifying the cultural borders that Miguel Chico encounters as he develops into an adult. Miguel Grande illustrates machismo as he is described as the traditional patriarch of the Angel Family. Mama Chona takes on the matriarch role that holds the Angel Family together all the while as she is conflicted to accept the Indigenous and Chicano identities that make her whole. Maria- the nursemaid is a symbol for the religious freedom Miguel Chico grows up searching for. She herself strays off Roman Catholicism and becomes a Seventh Day Adventist. Maria’s influences of another form of thinking impacts Miguel Chico as he furthers into interpreting the reality encircling his childhood. Arturo Islas carefully constructs the matriarch role in Hispanic culture as Mama Chona. Her character is a clear example of the generational struggle faced by Mother Chonas alike of other Mexican Families living in the Southwest Texas/ Mexico border seeking out lead their kin out of the â€Å"bad† life. Miguel Chico reminiscing over a family picture in his desk area describes, â€Å"Mama Chona is wearing a black ankle-length dress with a white lace collar and he is in a short-sleeved light colored summer suit with short pantsthe camera has captured them in flight from one world to the next.† (Islas, 3-4). This quote expatiates the generational gap faced between the Angel family and Miguel Chico. Narratively, it also serves as foreshadowing for Miguel Chico straining off the â€Å"correct† path, that is not staying and submitting to the very literal and figurative geographical borders of religion, sex, and gender found in the Southwest. Miguel Chico does this by earning his acceptance to a prestigious University, moving to San Fransisco, and becoming the free thinking individual that he is by heart. With traditional catholic point of views and a ridged sense of what sexuality is Miguel Grande refuses to accept any other form of raising his child, other than the one he’s been conditioned to accept throughout his lifetime. â€Å"‘Apologize to your father for playing with dolls,’ Juanita said to Miguel Chico. He did not understand why he needed to say he was sorry. When his father was not there, his mother permitted him to play with them.† (Islas, 16) Miguel Chico is the queer child who questions religion and the male role that is placed on him by his social environment. Arturo Islas crafts these polar identities to express the very literal border of culture and sexuality that Miguel Chico encounters and battles with as he matures into an adult. Whilst growing up nursemaid Maria attempts to instill the morals and allegories of a religious context into Miguel Chico. Although, Miguel Chico receives the religious barrage from both ends of the spectrum- the mother and the nursemaid, Miguel Chico questions the validity of the information he waveringly accepts at the time. â€Å"Miguel Chico learned that when he asked Maria a difficult question she would remain silent, then choose a biblical passage that illustrated the terrible power of God the Fathers wrath.† (Islas, 17). Moreover, Maria explores another branch of Christianity by being a Seventh Day Adventist, her influences of denying another religion impacts Miguel Chico and in the end lends to his rejection of religion over all, as he sees the influence of another interpretation of â€Å"truth†. Furthermore, as Miguel Chico walks through the journey of adulthood he becomes more aware of the social and personal constraints the borders of religion, sex, and gender present to his growth as an individual though throughout this time he accepts that he is a determinable extension of them both, Maria- the nursemaid and Mother Chona the Angel Familys Matriarch. â€Å"the way a seed continues to be part of a plant after it has assumed its own form which does not at all resemble its origin, but which nevertheless, is determined by it. He had survived severe pruning and wondered if human beings, unlike plants can water themselves.† (Islas, 25-26). Throughout the passage Miguel Chico asserts his independence from all the borders introduced by his family, the border that his persona has been forced to fit in in consequence of a socially accepted mold. Later in The Rain God it is learned that Mama Chona becomes ill. At this time Miguel Chico visits and is confronted with questions concerning his sexuality and relationship status, more significantly by his cousins. It is strange to them that he is neither married, nor in a stable relationship with a woman. Despite the suspicion behind his sexuality he verifies the value he has for knowledge. He conjures up the idea that perhaps he had survived the plucking of his personal growth to tell the stories of people similar to Maria and Mother Chona. Conclusively, Miguel Chico ascertains that he in fact does have a long way to go throughout his journey of self-discovery, along the way he pieces together the identity that makes him whole. These pieces all influenced by the characters in his life, significantly, Mother Chona and Maria. He accepts the fact he alike Mother Chona prefers to disregard facts to assume motives, although unlike Maria, Miguel Chico longed to look at persons and their motives separately from an â€Å"earthly, rather than otherworldly, point of view† (Islas, 28). Miguel Chicos future is undetermined at this point and he is okay with that reality but he now is comfortable with the concept that he does not have to live in the haziness of the garden he has been rooted to be part of. Miguel Chico can stray off the pre-determined path given to him and still be his own after appreciating the soil that nurtured him into the free thinking individual that he is. Works Cited Islas, Arturo. The Rain God: A Desert Tale. Palo Alto: Alexandrian, 1984. Print.

Monday, October 14, 2019

Data Protection Act 1998

Data Protection Act 1998 Abstract The focus of this report is to explain the requirements imposes of Data Protection Act 1998. The 1998 act affects to all people who uses information or data about other individuals Business. The DPA 1998 covers from the initial collection of data through its final deletion or destruction. The main term used in the IT industry is Data Processing which is extremely wide and it can be either usage of data, alteration of data, retrieval, data transmission or destruction of data. Introduction   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The Data Protection Act 1998 is a United Kingdom Act of Parliament [1] which came into force early in 1999 and replaced the Data Protection Act 1984. The Act defines law on the processing data of living people. It is one of the main laws of legislation that governs the protection of personal data. Under this act, those who manage or use personal information have to follow rules or principles that are defined in the DPA. It also provides rights to individuals over their personal information. Some of the individual rights under DPA include access, compensation and the prevention of processing.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The basic principle of DPA is protecting privacy and a way in which each individual can control information about them. Also it defines a way in which organisations should carry their marketing strategy, through any communication media. Most of the act does not apply to domestic use, for example keeping personal address book. Well, if anyone holds personal data for other purpose he should follow this Act. The DPA also ensures that the data controller or the computer bureau will be liable for processing operation against the DPA Principles. The History   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The Data Protection Act 1984 was introduced in UK legislation to provide special protection to individuals. The Act was adopted by the European Parliament after a lengthy discussion sessions. They adopted a proposal for a directive on the processing of personal data and on the transfer of such data. Certain protections where given in scenario where the personal information relating to them was handled, such as large business organisations and in emerging information technology. Data given from one party to another party may only be used for the specific purpose it was disclosed for. The data should be only kept for a limited period of time and must not be disclosed to other party without the authorisation of data owner. The term Processing and Personal data had a great impact in transformation during the DPA 1984. The Personal data covers both the data in electronic and manual form. And the term Processing became wide in such a way that nothing could b e carried out in relation to personal data under this definition.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The Data Protection Registrar was the regulatory authority who oversees the implementation and functionality of the act. Later it was followed up by the Data Protection Act 1998, which is an implementation of European Union Directive 95/46/EC. In DPA 1998 it renamed the Data Protection Registrar to Data Protection Commissioner. The functionality of Data Protection Commissioner is to ensure the compliance by publics by taking the necessity steps. The current Information Commissioner is Richard Thomas, he has the authority to inform parliament directly. The other function of commissioner is to provide guidance, promote good practice which falls under the Act. It also provides helpline services by phone or written request. The commissioner also acts like a legal adviser to the data controllers and has developed issued many documents for the data controller for implementing and interpretation of their duties. Some of the documents include: Code of Practice for CCTV users; Code of Practice on Employment Practices, which include codes on Recruitment and Selection; Records Management; Monitoring at Work and Medical Information about the employees. Code of Practice on Telecommunications Directory Information and Fair Processing. The Principles of DPA 1998   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The DPA 1998 contains eight data protection principles in relation to the processing of personal data. They are Personal data should be processed fairly and lawfully. Personal data should only be obtained for one or more specified and lawful purposes, and it should not be further processed in any manner incompatible with these purposes. Personal data should be adequate, relevant and not excessive in relation to the purposes for which they were collected or processed. Personal data should be accurate and where necessary kept up to date. Personal data should not be kept longer than is needed for its intended purpose. Personal data should be processed in accordance with the rights of the individual which the information concerns. Appropriate technical measures should be taken against unauthorised or unlawful processing or destruction of personal data and against accidental loss or destructionor damage to personal data. Personal data should not be transferred outside the European Economic Area unless that country ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data. The First Data Protection Principle   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The first data protection principle says that Personal data shall be processed fairly and lawfully and, in particular, shall not be processed unless At least one of the conditions in Schedule 2 is met, and In the case of sensitive personal data, at least one of the conditions in Schedule 3 is also met.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  In the first principle, by fairly and lawfully it means that any processing of personal data must be allowed by common law. Fair processing states that any all the processing must be fair without any misleading. The processing should be carried out without any deception. The important point of view of the first principle is obtaining and disclosing personal data, which covers the whole life cycle of personal data used by the data controller. The data controller should have legitimate reasons for collecting and processing the personal data and should not use the data in such a way that have unjustified adverse effects on the individual concerned.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The Lawful processing also defines that the data subjects should be provided with information during the time of collecting the data, on why and how their data are being processed. This information is provided in the Fair Processing Notice. The notice should include the basic information given below: The identity of the data controller who process the personal data. The purposes for which the personal data are intended to be processed. To whom the personal data may be disclosed to, for example, a government department or agency. And any further information regarding the processing, to ensure the subject, that the data controller does not do anything unlawful with the data. Conditions to be Satisfied for Fair Processing   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  In addition to the Fair Processing Notice, there are some more conditions that should be met. The conditions are listed in Schedule 2 of the Act. There are six conditions for processing personal data in Schedule 2; the personal data should not be processed unless one of the conditions is met. Schedule 2 conditions The data subject has given his consent for processing. If it is for performing or entering a contract with the data subject. The data controller is under a legal obligation, other than under contract For the purpose of protecting the vital interest of the data subject. It is for the administration of justice, exercising functions under an enactment, exercising of government functions, or the exercise of any other functions of a public nature in the public interest It is for the pursuit of the legitimate interests of the data controller. In the case of sensitive personal data, one of the conditions in Schedule 2 and Schedule 3 must also be met for Fair Processing. Schedule 3 Conditions explicit consent has been given by the data subject it is for the exercise of rights or obligations in connection with employment it is to protect the vital interests of the data subject or anyone else it is part of the legitimate activity of a not for profit organisation the personal data have already been made public by the data subject it forms part of legal proceedings, including obtaining legal advice, and exercising or defending legal rights it is for the administration of justice, or exercising functions under an enactment, or exercising of government functions it is for medical purposes it is for the purpose of monitoring equality of opportunity The Second Data Protection Principle   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The Second Principle Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes, explains the requirement for specifying the purpose for which it obtains the personal data. It also means that, the organisation who obtains the personal data should clearly specify the reason to the ICO, why they are collecting and what they intend to do with the personal data. The organisation should also notify the process to the Information Commissioner.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The data controller can send privacy notices regarding the process to make it more effective. Privacy notices are generally given at the time of collecting personal data. Data controller should also need to get prior consent to use or disclose the personal data for the purpose other than he originally obtained for. The Third Data Protection Principle   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The third principle of the Data Protection Act states three conditions or requirements to the data controller. The data controller should not obtain any more personal data than they need for the processing nor they should discard any personal data. The data must be adequate, relevant and not excessive. Also the data controller is not authorised to process whatever information he likes about the individual.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The third principle also states that the data controller should identify the minimum required information on each individual to fulfil their purpose. Only in certain cases he can hold additional information about certain individuals for the processing. A simple example for this is a surgeon before performing a surgery he should know about the patient medical conditions, such as his medical history, his habits (like drinking, smoking etc), information from medical checkups. If the patient has to undergo a major heart operation, the surgeon will also look upon patient family members medical history also. If the parents have asthma, blood pressure, etc.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  In organisation the same process is taking place in a different manner during the recruitment process. The employees are asked same in depth question regarding their personal information. The third principle is strongly linked to the first principle. Processing of personal data which is inadequate, irrelevant or excessive is unfair to the data subject. The first principle requires fairness in processing. The excessive information can be something that the organisation keeps for certain conditions, like in a manufacturing factory they will keep the blood group of their entire employee who works in a hazardous environment and this information is needed only in case of accidents. Such information are likely to be irrelevant and excessive for the rest of the employees. The Fourth Data Protection Principle   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The Act says that Personal data shall be accurate and, where necessary, kept up to date. Once the data controller overcomes the first and second principles of DPA, the next main fact to consider is the data quality, in which accuracy plays the main role. There are two obligations in the fourth principle that should be taken care off.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Firstly, the data should be accurate. The data controller should take necessary steps to ensure the accuracy of data in regard to the purpose for which it is collected and further processed. Incomplete information will be inaccurate if it misleads. Even though if the actual given data happens to be true, there will be a misleading if the two data subjects are identical. In such cases more information will be needed to keep it more accurate for the data controller to identify. If the data controller makes decision on the result of inaccurate processed data, then he will be breaking the first data protection principle which indicates the strong link between accuracy and fairness in data processing.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Secondly, the data controller should also see that the personal data are kept up-to-date. This condition depends upon the case where personal data are subjected to repeated use for a long period of time. In such cases data controller has to take more review on personal data. If the data subject notifies the data controller that the data is inaccurate, then he should ensure the changes are made to the data to keep it up-to-date.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  If a data subject suspects that the information held about him is inaccurate, he will have to see the personal data which the data controller holds. The data subject can make an access request under section 7, for accessing a copy of his personal data held by the data controller. If the court is satisfied with the data subject, then the court may order the data controller to rectify, block, erase, or destroy the personal data. If the processing had caused damage to the data subject then the court will order to give compensation. The Fifth Data Protection Principle   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The Fifth Act says that Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. The data controller should review, for how long the personal data is retained. He shall also retain the data for performing purpose other than the original purpose for which it was obtained. The main element of the fifth principle is to show the reason for which the personal data is held. If the data controller fails to show a sufficient reason for holding the data then, he should get rid of the data.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  If the personal data is kept for a long time there is a chance that the information will go out of date causing error. It also becomes difficult to ensure that the information is accurate. Even if the information is no more needed, the data controller should make sure that it is held securely. Reviewing personal data regularly and deleting those no longer needed is a good practice. The data that should be retained must be archived or put offline.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The personal data are retained only in certain scenarios depending upon the current and future scope of the information. Major concerned things for retaining data are the cost, liability and risks for retaining the personal information. The Sixth Data Protection Principle   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The sixth DPA principle says that Personal data shall be processed in accordance with the rights of data subjects under this Act [9]. The sixth principle gives rights to the individual in respect of personal data the organisation hold about them. Under this principle certain rights for individual are mentioned they are: Access to personal data. Preventing process likely to cause damage or distress. Prevent direct marketing. Automated decision making. Correcting inaccurate personal data. Compensation.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Access to personal data is commonly referred to as subject access. It is created by section 7 of the DPA. This is mostly used by data subjects who want to see the copy of personal data which the organisation holds about them. The data subjects are entitled only to their own data. By giving a written request an individual is entitled to know whether any personal data is being processed. The organisation should also inform him the reasons it is being processed and whether it will be given to any other organisation.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The second right says that the data subject can demand the organisation to stop the processing if it causes damage or distress to the data subject. The individual can write an objection stating the damage or distress faced by them to the data controller. This is called Objection to processing. The objection should clearly specify the effect of processing.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  For example, consider the scenario where a person is refused a job in an manufacturing company because the company came to know from a third party that the man is unsuitable for job because he was one among the trade union activists. The third party will be having a blacklist containing names of people who are unsuitable to be employed in a manufacturing company. The suffering person can write to the data controller who maintains the blacklist and ask him to remove his name from the list. He can show that he is suffering damage and distress because of this processing. In this case the data controller should cease processing the persons information and respond to his mail within 21 days.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The data subjects also have the right to prevent their data being processed for Direct Marketing. They can give an objection to processing to halt the usage of their data for direct marketing. Direct marketing includes junk mails that are not addressed to a particular person but to the occupier. For example, mails posted through every letter box in a street, like leaflets, shop advertisements, etc. The direct marketing does not just refer to selling items to customers but also includes promotions and campaigns. The data subject may ask the organisation to delete these details from database. But it is preferable to suppress the personal data. Suppressing involves just retaining only enough information about the customers. It also ensures that the organisation not sends marketing to people who have asked not to and helps retaining individual information in the database.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Data subjects also have the right to inform the data controller, not to make automated decision using their personal data and can ask to reconsider the decision taken by automated means. The data controller should inform the data subject when such a situation is taken. These types of decision are taken without any human intervention. For example, consider a person who transfers his cash from one account to other and the transfer gets declined automatically. This might have happened because the individuals information did not match the pre-defined criteria in the automated system. He may undertake manual process to do the transfer.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  According to the fourth principle the data should be accurate. If the data is inaccurate, the data subject has the right to apply the court for releasing an order to block, rectify, erase or destroy the inaccurate information. The court may investigate whether this statement is true or not. If the individual has suffered from damage or distress then he will be awarded compensation. The Seventh Data Protection Principle   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The seventh DPA ensures the security of personal data undergoing process. The principle says that Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. This principle is often called security principle. The data controller should take proper care of data which he holds not accidentally or deliberately compromise. He should also need to design and organise the security to fit to the process. Also make sure about the person in his organisation that is responsible for the data information security. The data controller should adopt appropriate measures against Unauthorised processing of personal data. Unlawful processing of personal data. Accidental destruction, damage or loss to personal data.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Technical measures/security includes the use of passwords and other authentication techniques, encryption and anti-virus software to detect malwares. . He should also ensure to keep up to date with the development of security technologies, make sure that well trained and reliable staffs with robust physical and technical security are used. As a part of notification process the data controller should describe the Information Commissioner about the security arrangements made in the organisation to keep the personal data. The Eight Data Protection Principle   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The eighth DPA says that Personal data shall not be transferred to a country or territory outside the EEA unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data. The data controller requires informing individuals about the disclosure of their personal data to other overseas parties. Before making the data transfer to a third party, the data controller should consider whether he can achieve his aims without processing the original data and there should be some substantive processing conducted on the personal data in the third country. The condition will not apply in the case where it is not possible to identify individuals from the information. In this type of cases the data controller are free to transfer the information outside the EEA.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  A transfer is said to have occurred when the personal data is send to other country. If the data controller puts the personal data on a website will often results in data transfer to other countries outside the EEA. The transfer occurs when someone outside the EEA access the website. The data controller should also consider the fact that a transfer occurs while putting personal data on websites and sees whether it is fair for the concerned data subject. Currently, there are no restrictions on personal data transfer to EEA countries. They are: Austria, Belgium, Bulgaria, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Liechtenstein, Lithuania, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, and Slovenia.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The European Commission will also undergo a case to case assessment of the level of protection affordable by the third country. All the circumstances surrounding the data transfer are assessed. In addition to this consideration must be also given to: The nature of personal data. How long will the proposed process last. The country of origin of personal data and the destination to which it will be transferred. The security measures and professional rules in the destination country.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Certain countries have been considered for having adequate protection by the European Commission. They are Argentina, Canada, Guernsey, Isle of Man, Switzerland, and Jersey. Conclusion   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  I hope this report would have given a brief idea about the Data Protection Act 1998. This report also mentions the different principles concerned with DPA, the way that a data controller should follow for lawful and fairness processing. Proper care should be taken while handling personal data, still cyber threats are done by accruing the mobile numbers of individuals and pinpointing them by identifying the co-ordinates of the SIM location. So the firms or organisation should ensure that they pay more attention to DPA for the safety and privacy of people. Annotations DPA Data Protection Act 1998 ICO Information Commissioners Office EEA European Economic Area SIM Subscriber Identification Module Card References Stewart Room, 2007, Data Protection Compliance in Context, Published by CAPDM. City Of London, Data Protection Act, Available at: http://www.cityoflondon.gov.uk/Corporation/LGNL_Services/Council_and_democracy/Data_protection_and_freedom_of_information/Data_protection_act.htm Accessed on [Jan 10,2010] Wikipedia, Data Protection Act 1998, Available at: http://en.wikipedia.org/wiki/Data_Protection_Act_1998 Accessed on [Jan15,2010] Piers Leigh-Pollitt James Mullock, 1999, The Data Protection Act Explained, Second Edition 2000,Publlished by Osborne Clarke. Lancaster University Data Protection Project, 2001, the Data Protection Principle. Available at: http://www.dpa.lancs.ac.uk/principles.htm Accessed on [Jan16, 2010]. ICO, Processing personal data for specified purposes (Principle 2), Available at : http://www.ico.gov.uk/for_organisations/data_protection_guide/principle_2_processing_personal_data_for_specified_purposes.aspx Accessed on [Jan 24,2010] ICO, Keeping personal data accurate and up to date (Principle 4)Available at : http://www.ico.gov.uk/for_organisations/data_protection_guide/principles_3_to_5_information_standards/keeping_personal_information_accurate_and_up_to_date.aspx . Accessed on [Jan 24,2010] ICO, Retaining personal data (Principle 5).Available at: http://www.ico.gov.uk/for_organisations/data_protection_guide/principles_3_to_5_information_standards/retaining_personal_data.aspx . Accessed on [Jan 24,2010] ICO, The rights of individuals (Principle 6).)Available at: http://www.ico.gov.uk/for_organisations/data_protection_guide/principle_6_the_rights_of_individuals.aspx . Accessed on [Jan 26,2010] ICO, Information security (Principle 7).Available at: http://www.ico.gov.uk/for_organisations/data_protection_guide/principle_7_information_security.aspx . Accessed on [Jan 26,2010] ICO, Sending personal data outside the European Economic Area (Principle 8).Available at: http://www.ico.gov.uk/for_organisations/data_protection_guide/principle_8_sending_personal_data_outside_the_eea.aspx . Accessed on [Jan 26,2010] Peter Carey,2004, Data Protection Handbook, Published by Law Society.