Tuesday, August 25, 2020

Analysis of The Christian and Bible Fundamentalism Essay

Investigation of The Christian and Bible Fundamentalism - Essay Example Christian and scriptural fundamentalism alludes to perspectives dependent on belief systems that contradict different hypotheses that clarify the nature. Logical speculations have been created to clarify the root of life and the earth. Christian and Bible fundamentalists accept that the earth was made in seven, twenty four hour days. Likewise, they accept that different speculations that clarify the starting point of earth depend on bogus philosophies. They center around the creation account contained in the book of Genesis in the Old Testament of the Bible. They restrict organic hypotheses of life and consider the individuals who figure them as being coordinated by the insidiousness. Christian fundamentalists contend dependent on the strict translation of the Bible. In this exposition, Christian and Bible fundamentalism will be examined in detail. Fundamentalism alludes to the all out adherence to the qualities and principles of Christianity concerning the exacting understanding of the Bible (Barrett and Kurian 45). Fundamentalism created from the late nineteenth century to the mid twentieth century, when the protestant development carefully restricted the utilization of Christian conventions to the current speculations of science and theory. Fundamentalism has come about to social and financial issues. The improvement of Christian fundamentalism was quickened by the protestant developments in various nations. The part of fundamentalism created from the United Kingdom and the United States of America in the twentieth century. Christian and Bible fundamentalism began with the advancement of the social Gospel which was related with the name of Walter Rauschenbusch in the United Kingdom (Gifford 2). Christian fundamentalists have been seen as fanatics since they trait for their entire lives and exercises to the Christian confidence. In the good 'ol days, Christianity depended on salvation with respect to issues that identified with death, paradise and hellfire. I n any case, with expanded Christian fundamentalism, Christianity has been considered as a type of freedom from dread, hunger, obliviousness, damnation and different difficulties that face the fundamentalists in their everyday lives. Christian and Bibl

Saturday, August 22, 2020

The Prince vs. Henry V

The Prince versus Henry V An examination of properties After perusing Machiavelli’s The Prince and viewing Shakespeare’s Henry V in class, one starts to see similitudes between the authors’ thought of what a â€Å"perfect king† ought to be. The examples between the perfect leader of Shakespeare and the perfect leader of Machiavelli can be found in various occurrences all through this story. For the span of this paper, I will contrast the likenesses in the two pieces with give the peruser a superior comprehension of how Shakespeare contrived his perspective on what a â€Å"perfect king† ought to be.One can see a model while thinking back on Henry’s energetic encounters. Prior to making vow as lord, Henry was engaged with some careful characters. He would party, remain out throughout the night, and pollute his father’s wishes. Be that as it may, subsequent to turning out to be top dog, Henry evaded this previous way of life and become th e person of significance we know today. As Machiavelli expressed, â€Å"So a ruler ought to be reasonable to such an extent that he realizes how to get away from the detestable notoriety appended to those indecencies which could lose him his state, and how to stay away from those indecencies which are not all that perilous, on the off chance that he can; in any case, on the off chance that he can't, he need not stress such a great amount over the latter.And at that point, he should not recoil from being accused for indecencies which are important for protecting the state. This is on the grounds that, considering, he will locate that a portion of the things that have all the earmarks of being excellencies will, in the event that he rehearses them, ruin him, and a portion of the things that seem devilish will bring him security and thriving. † (Machiavelli) If took a gander at intently, this is actually what Henry had done. He utilized this young articulation to pick up favor w ith the layman and look surprisingly better when he took the throne.This demonstration of â€Å"smoke and mirrors† attempted furthering his potential benefit and backs up Machiavelli’s claims. As Machiavelli says, â€Å"From this emerges the accompanying inquiry: Whether it is smarter to be adored than dreaded, or the converse. The appropriate response is that one might want to be both the one and the other; but since it is hard to consolidate them, it is much better to be dreaded than adored on the off chance that you can't be both. † (Machiavelli) During Henry’s discourse at Harfleur, one can see this point in action.While addressing the representative, Henry actually startles the individuals of Harfleur into accommodation and additions section to the city moving along without any more battling. This shows a distinct similitude in what Machiavelli and Shakespeare see in their pioneer. As a ruler, Henry gets known for taking care of business of versatili ty, technique, and battle. These attributes, as per Machiavelli, are important to turn into the â€Å"ideal ruler. † As expressed by Machiavelli, â€Å"†¦a sovereign should have no other point or thought, nor select whatever else for his investigation, than war and its guidelines and order; for this is the sole workmanship that has a place with him who rules. (Machiavelli) This can be seen when the Dauphin presents Henry with an endowment of tennis balls and an offending discourse for all intents and purposes instructing him to avoid developed men’s undertakings. This gives Henry the influence he needs to begin a war with France without resembling the instigator. He would now be able to put the fault of war on the Dauphin and the numerous existences of whom will be slaughtered. Henry utilizes this to advance toward his quality and show his maximum capacity. Another model can be seen when Henry needs to hang Bardolph for ravaging during the attack of France.Years prior, while savoring the bar, Bardolph had asked Prince Henry this inquiry, â€Å"Do not thou, when thou craftsmanship ruler, hang a cheat? † Prince Henry answered, â€Å"No, thou shalt. † (Branagh, Scofield and Holm) In this occurrence, one can see Henry is following his Machiavellian ways. This can be appeared in the accompanying entry. Machiavelli states, â€Å"The sovereign should in any case make himself dreaded so that, on the off chance that he isn't adored, at any rate he evades being abhorred; and the ruler can generally dodge scorn on the off chance that he goes without the property of his subjects and residents and from their women.If, all things being equal, it demonstrates important to execute somebody, this ought to be done just when there is legitimate defense and show explanation behind it. Be that as it may, most importantly, a ruler ought to keep away from the property of others; since men sooner overlook the demise of their dad than the loss of the ir patrimony. † (Machiavelli) Bardolph had been cautioned of this numerous years sooner. Henry was simply following up on this guarantee. For this last model, I will cite Machiavelli for nearly the last time.He states, â€Å"The reality is that a man who needs to act highmindedly all around essentially ends up badly among such a significant number of who are not temperate. Along these lines, if a ruler needs to keep up his standard, he should figure out how not to be righteous, and to utilize this or not as indicated by need. † (Machiavelli) This can be seen on the night prior to the last fight. Henry masks himself as a typical officer by acquiring Erpingham’s shroud and keeping an eye on his soldiers. Henry does this to guarantee his soldiers are intellectually arranged and in high morale.What he finds is a blended resolve inside his soldiers and causes him to get ready significantly harder for the up and coming fight. Henry utilizes this â€Å"cloak† as a device to discover the shortcomings in his military and afterward abuses them with his rousing discourse before the fight starts. This Machiavellian demonstration could have been the defining moment and significant explanation they won against a dwarfing, French armed force. As observed all through the film, the similitudes between Machiavelli’s â€Å"ideal prince† and Shakespeare’s â€Å"perfect king† are beyond any reasonable amount to count.A mix of old and new characteristics made this immortal character wherein we are as yet gaining from today. One can dare to dream the couple of models given will give the peruser a superior comprehension of were Shakespeare determines his ideal, Machiavellian ruler from. To complete, an adage from Machiavelli, â€Å"The end legitimizes the methods. † (Machiavelli) Works Cited Henry V. Dir. Kenneth Branagh. Perf. Kenneth Branagh, et al. 1989. Machiavelli, Niccolo. â€Å"Selections from The Prince. † M atthews, Roy T and F DeWitt Platt. Readings in the Western Humanities. Vol. II. New York: McGraw-Hill, 2011. 18-21.

Tuesday, August 11, 2020

Problem Solving for Adults With ADHD

Problem Solving for Adults With ADHD ADHD Adult ADD/ADHD Print How Adults With ADHD Can Be Better at Problem-Solving By Keath Low Keath Low, MA, is a therapist and clinical scientist with the Carolina Institute for Developmental Disabilities at the University of North Carolina. She specializes in treatment of ADD/ADHD. Learn about our editorial policy Keath Low Updated on February 07, 2020 ADHD Overview Symptoms Causes Diagnosis Treatment Living With In Children Musketeer / DigitalVision / Getty Images When problems come up in your daily life, are you able to move forward in a solution-focused and thoughtful way, or do you tend to get stuck? For some adults with ADHD, the process of problem-solving becomes so overwhelmingâ€"too many options, too much uncertaintyâ€"that they have trouble moving forward. Thus, no resolution is reached at all. They may even feel a sense of paralysisâ€"wanting to move forward, willing themselves to make a decision around the problem, but ultimately unable to do either. Too many thoughts and possibilities can also cause you to become derailed so the original issue may even get lost. This can certainly create even more feelings of self-doubt in your ability to solve the problem at hand successfully. Sometimes individuals with ADHD have a difficult time drawing from past experiences and this can make problem-solving more difficult, too. For other adults with ADHD, an impulsive and unplanned reaction that ends up being regretted later may occur. Rather than being thoughtful about the solution, the person goes with the first decision that comes to mind, though the decision may not be the most appropriate one. If any of these patterns sound familiar, it may help to follow some simple tips to help you make a good decision when faced with a problem. Here are some steps to effective problem-solving. Identify the Problem Try to get as specific as possible. Don’t hesitate to ask for help from a trusted friend if you are feeling uncertain. Sure it sounds simple, but sometimes it is hard to boil things down to the core. What is the specific problem you want to resolve? Brainstorm Possible Solutions Brainstorm a list of possible solutions. Let your creative juices flow. Don’t judge or prioritize any of the solutions yet, just jot them all down. Chunk It Down Once you have the problem identified and have generated possible solutions, it isn’t unusual to begin to feel a bit overburdened with all the obstacles that may get in the way of solving it. If this happens often, the most helpful thing to do is “chunk it down”â€"that is, break the obstacles down into smaller and more manageable chunks, then brainstorm solutions to each one of them individually. Pick a Solution and Try It Spend some time going through your list of options and prioritize one to try first. Spend a trial period assessing if this solution is working. If things aren’t working like you’d hope, try to sort through what may be creating obstacles. Again, enlist the help of a trusted friend who may be able to give you a fuller picture of what is happening. Sometimes it can be hard to see the whole picture when you are so close to the problem. Don’t ever feel afraid or ashamed to ask for help when you need it. Continue to Assess Is the solution working? Are you seeing any positive results? If so, continue to fine-tune the solution as you need along the way. If you are still not seeing positive results, even after you have addressed the obstacles, go back to your list of solutions and try another. Try not to get discouraged and give yourself a pat on the back for each little step you make towards solving the problem.

Saturday, May 23, 2020

Institutional Discrimination in America - Free Essay Example

Sample details Pages: 4 Words: 1093 Downloads: 8 Date added: 2019/04/01 Category Society Essay Level High school Topics: Discrimination Essay Did you like this example? For about 250 years we had slavery in America, 90 years of Jim Crow, 60 years of separate but equal, and 35 years of racist housing policy. All these years of racism and discrimination has brought not only individual discrimination between one person and another, but also institutional discrimination carried out by social institutions. One of the worst policies introduced by a social institution, that still affects us today was, the Federal Housing Administration that was introduced in 1934 and lasted until 1968. Don’t waste time! Our writers will create an original "Institutional Discrimination in America" essay for you Create order A practice that denies mortgages based on race and ethnicity. This brought us housing segregation that is still a huge problem. Until we cooperate together and admit our faults, America will continue to not be equal forever. Not only does institutional racism affect housing and public schooling, but it affects politics, healthcare, jobs, and so many other sectors. Many people believe since slavery was abolished and hate crimes are illegal, racism no longer is an issue. But just because something is made illegal, does not mean it is not happening. For example, people are still murdering, raping and millions of cases are not solved, and no justice is provided. Just like systemic bias is treated. Here are some examples of institutionalized racism, A study from CNN on wrongful convictions among three types of crimes (murder, sexual assault, and drug crimes,) show, that black people are more likely to be wrongfully convicted than white people and are also likely to spend longer in prison before being exonerated for their crimes and 58% of prisoners are black or Hispanic despite making up one quarter on the U.S. population (Vega 2017). Another huge issue that stems from these uneven incarceration rates, is tha t in many states, felons are not allowed to vote do that means more than 1 out of every 10 black men cannot vote. One more fact from the National Education Association, 74% of black students and 80% of Latino students attend schools that are more than half-minority populations. This is segregation and it is an effect that stemmed from the Federal Housing Administration Mortgage Insurance requirements in 1965. How did this all start? After World War II and all the vets came home, the FHA helped finance military housing. They alleviated the home ownership crisis according to an article off Boston fair housing. But what they also did was isolate residential developments that we call the suburbs today. They, stripped the inner city of many of their middle-class inhabitants, thus hastening the decay of inner-city neighborhoods. Loans for the repair of existing structures were small and for short duration, which meant that families could more easily purchase a new home than modernize an old one, leading to the abandonment of many older inner-city properties (Fair Housing Center). They also practiced a policy of redlining which denies and limits financial services to neighborhoods based off of its racial or ethnic makeup. There was even a wall built to separate the blacks and the white so the FHA appraisers, could approve mortgages on white peoples properties so they can invest, and their childr en can have good lives and good futures. People of color where left out of the new suburbs and shoved into urban housing projects. According to the National Public Radio, Today African-American incomes on average are about 60 percent of average white incomes. But African-American wealth is about 5 percent of white wealth (Domonoske 2016). Why do you think this is? The good old housing policy! Middle class families usually invest in the equity of their homes, so they gain more wealth. White families used their home equities to send their kids to college, give them good health care, and give their wealth to them as well. So, none of these resources where given to African Americans because they were prohibited from being in the suburbs! Our federal government created this segregation and people do not know about this history. This practice of redlining still exists, an article by the Hill, reported that ATT discriminated against low-income areas in Cleveland not bringing them top broadband capabilities. A theory that was introduced by Emile Durkheim, mechanical solidarity, is a social integration of members who have similar beliefs. The members of these societies have a collective conscience that makes them cooperate. This was happening in these white suburban communities. They where living around, communicating, working, and working for only other white people. It was a euphoria for the racist white person, and it was completely legal. White people all had the same experiences, same values and they did not want things to change and once things did start to change, they moved out of the communities and the prices for homes just would go up. After Martin Luther King was murdered, Congress passed a Fair Housing Act of 1968. A policy meant to bring equal housing opportunities regardless of race, ethnicity or religious beliefs. But over the next 50 years, this act was rarely enforced. Today, it is still much harder for black families to get a mortgage or home loan than it is for a white person. In a report by the US Department of Housing and Urban Development, racial bias in the housing market was evidenced by the rate at which homebuyers were shown available housing. The report found that renters and homebuyers of color were shown and told about less homes white homebuyers (2012). It is a basic right that should be offered to every single person in this country regardless of their race or ethnicity. Another major thing that gets affected by this institutional discrimination, is our public schooling that is paid by property taxes. People who live in better, nicer neighborhoods, have access to the best schooling with better paid teachers, better supplies and equipment, and many more resources. This is a huge problem because kids are not being taught equally and it is only getting worse. According to an article by Vox, Black children are now more likely to grow up in poor neighborhoods than they were 50 years ago (Chang 2018). Research says that growing up in segregated, poor neighborhoods will affect so much of your life. It can determine your education level, your income, your happiness, health and even your life span. This is all a result from redlining and the Federal Housing Administration. People still to this day have no idea about segregation today and its history and where it came from. Just like Durkeims theory of mechanical solidarity, white people are too comfortable with being just around each other. Nothing will change until we admit our faults as a country and come together to create an equal world for everyone.

Tuesday, May 12, 2020

The Implantation Genetic Diagnosis ( Pgd ) Using Vitro...

Pre- implantation Genetic Diagnosis (PGD) using In Vitro fertilization is one of the many solutions for families to conceive children who cannot do so naturally. The term â€Å"In Vitro† is Latin, meaning â€Å"out of the body† (In Vitro Fertilization (IVF). Definition). The process begins with a woman taking fertility drugs in order to increase her egg count. The woman plays a physically and emotionally demanding role. She must take powerful hormones for ten days to produce multiple eggs. Every day during in vitro s early phases, she must give blood to be tested, and then undergoes ultrasound testing so physicians can monitor embryonic development both chemically and visually (International Political Science Review 8.2 (1987)). Afterward, the female’s egg, and the male’s sperm is removed in multiples with the use of a small surgery by the name of follicular aspiration, and placed in a laboratory dish where it is then fertilized for about five to six days. At this point in the process, the newly fertilized embryo is examined to determine whether or not the embryo(s) show(s) any sign of genetic disease or any other flaw that could be potentially passed down from one or both parents. From there, a successfully tested embryo will be placed into the uterus of the female three to five days after, in order to develop naturally. What classifies as a successful embryo would be one that either shows no sign of carrier genes from either parent, or one that shows signs of a recessive carrierShow MoreRelatedArgumentative +/- Pre-Implantation Genetic Diagnosis1001 Words   |  5 Pagesbecause of a genetic abnormality you never even knew you had. Your mind races and your heart sinks. How is this possible? You never thought you would have to deal with not being able to have a baby one day. There are several options you have to try and conceive without passing on the genetic abnormalityÂ… the doctor continues to explain, but the one I would reco mmend first is Pre Implantation Genetic Diagnosis. You and your wife finally decide on PGD, a type of in-vitro fertilization. But thereRead MorePGD Essay1127 Words   |  5 PagesWhat is PGD? The demand for Pre-implantation Genetic Diagnosis (PGD) involves people that have genetic or chromosomal disorder, either personally or in their genetic makeup, who desire a healthy baby that doesn’t acquire the genetic or chromosomal disorder for example; Cystic Fibrosis and Huntington’s Disease. Preimplantation genetic diagnosis with assistants from IVF meets this demand. PGD is a reproductive option for those who do not want to pass on specific genetic disorders or chromosome imbalanceRead MoreVitro Fertilisation ( Ivf ) Essay1402 Words   |  6 PagesIn vitro fertilisation (IVF) is a form of assisted reproduction where the eggs from the woman are extracted under anaesthetic and placed in a culture dish with thousands of sperm, allowing the process of fertilisation to take place outside the body. The resulting embryos are grown in the laboratory over 2 – 5 days before being transferred back into the woman’s uterus increasing the chance that a pregnancy will occur. Pre-implantation genetic diagnosis (PGD) is a screening test used to determineRead MoreIVF and Preimplantation Genetic Diagnosis: Essay1048 Words   |  5 Pagesinfertility (ASRM). In vitro fertilization (IVF) is one of the many assisted reproductive technologies used to help infertile couples achieve pregnancy. Since IVF is costly (the average cost is $12, 400. for one cycle), time consuming and a very emotional situation, many couples have a limited amount of opportunities to commit to the procedure and every step should be taken to maximize the chances of a successful healthy pregnancy. Preimplantation genetic diagnosis, or PGD, is a valuable tool forRead MoreThe Benefits of Human Genetic Engineering Essay1654 Words   |  7 PagesPre-implantation genetic diagnosis is a revolutionary procedure that utilizes in vitro fertilization to implant a healthy egg cell into the mother’s uterus after it is screened for mutations or other abnormalities. That way, only healthy eggs can develop to term and become beautiful, bouncing boys or girls. Designer babies have a bright future in the face of science because they are genetically engineered to be: disease free; viable donors for a sibling or parent; and with optional eliminationRead MoreCase Study Of Two Current Embryo Selection Methods1423 Words   |  6 Pages 2 Current Embryo Selection Methods 2.1 Pre-Implantation Genetic Diagnosis PGD or pre-implantation genetic diagnosis is possible for in vitro fertilization. Researchers use a polymerase chain reaction (PCR) to test the sensitivity and can help diagnose any genetic disorders before the egg is implanted. PGD is a screening method of the current embryos before they are implanted back into the women’s uterus. This method was first utilized in 1990 and enabled couples to create and screen several embryosRead MoreUsing Ivf ( Vitro Fertilisation )1503 Words   |  7 Pagesx PDG stands for Pre Implementation Genetic diagnosis it is a technique used to help examine and recognise a specific genetic defect within embryos created using IVF (In-Vitro Fertilisation). This technology is performed to prevent disorders or diseases being passed on to the child. The ultimate aim for couples attempting to use PGD is to produce an offspring free of chromosomal genetic defects. In New Zealand this technology is very limited and every application must be sought through an d gain approvalRead MoreAn Immoral Injustice: Designer Babies702 Words   |  3 Pagesgene-enriched (Preface to Genetic Enhancement of Human Abilities n.p.). The gene-enriched refers to people with designer genes chosen by parents who have had the same done to them. This technology will first prevent birth defects and later diabetes and heart disease. As artificial genes develop to be common, the technology may be used to prevent drug and alcohol addictions, mental diseases, and eventually to create humans with synthetic characteristics (Preface to Genetic Enhancement of Human AbilitiesRead MoreAssisted Reproduction - 12056 Words   |  9 PagesHD is a genetic disorder that begins showing signs at anywhere from 35-45 years of age. Its symptoms begin with slow loss of muscle control and end in loss of speech, large muscle spasms, disorientation and emotional outbursts. After 15-20 years of symptoms HD ends in death. HD is a dominant disorder which means that her child will have a 5 0% chance of contracting the disorder. Feeling that risking their babys health would be irresponsible, the couple decides to use in vitro fertilization to fertilizeRead MorePreimplantation Genetic Diagnosis is Unethical and Immoral Essay816 Words   |  4 Pagessome of the genes of a baby to make a â€Å"perfect† child. A procedure called pre-implantation genetic diagnosis, or PGD, has been used for years by doctors who wanted to reduce the chance of women carrying babies infected with life-threatening diseases. PGD was first used to improve the likelihood of a successful pregnancy for couples suffering with recurring miscarriages and parents who had the chance of passing on genetic diseases to their offspring. Dr. Jeffrey Steinberg, a reproductive endocrinologist

Wednesday, May 6, 2020

Autonomy- the Right of a Client to Self Determination Free Essays

Consider the six major ethical principles of autonomy, veracity, confidentiality, nonmalfeasance, beneficence, and justice. Think back over your many years of educational experiences. Provide examples from your past (either recent or distant—your choice) that illustrate the importance of these 6 major ethical principles. We will write a custom essay sample on Autonomy- the Right of a Client to Self Determination or any similar topic only for you Order Now The experiences you recount may have happened to you personally, you may have witnessed them, or you may have read about or heard about them from others. Any of these types of examples are fine to use in your journal entry. The most important point is that you choose examples that made a lasting impression and influenced your feelings and perceptions related to education (either positive or negative—your choice). Write a conversational paragraph for each of the six principles, including your illustrative example and then brief discussion related to how the example shaped what you know and feel about the educational process. Autonomy- the right of a client to self determination In the ER where I currently work, I am usually not privy to the conversations between the physician and the patient. I am usually providing care to another patient. I receive the orders for pain medication and then proceed to the room to administer the medication. I feel it is my duty, as a nurse, to educate the patient regarding their right to refuse the medication the physician ordered. I empower them with education regarding the effects and side-effects and allow them to refuse the medication if they desire. I educate them to the importance of knowing as much information regarding their own healthcare as possible and allow them the choice to accept or refuse the offered medications. I feel strongly about this aspect of care in the ER. I do not feel the patient should blindly accept medications simply because it was prescribed by a physician. Veracity- truth telling; the honesty by a professional in providing full disclosure to a client of the risks and benefits of any invasive medical procedure. Often times children are fearful of nurses and the procedures they endure in the ER. They often cry as soon as we walk into their room. I feel it is a disservice to these tiny people to lie to them about the medicine they will take or the IV that may need to be started. Even though they are minors and veracity might not be a law that applies to them, I feel they will be more trusting of me and of future nurses if they are told that an IV actually will hurt, but just for a moment, rather than surprising them with a painful procedure when they are trusting you that it will not hurt. Lying to patients is wrong on an ethical level and it also put nurses in an untrusting light. We should always be forthright with every patient, even if they are young or old. Simply procedures may hurt different people on different levels but everyone deserves to know if they are going to be uncomfortable or not. Confidentiality- a binding social contract or covenant to protect another’s privacy; a professional obligation to respect privileged information between health professional and client. Confidentiality is inherent in the field of medicine and nursing and many professional are accustomed to this ethical principal. HIPPA has been drilled into the nurses’ head and the associated fines for violating this law. The aspect that I feel strongly about regarding confidentiality is when my patient in the ER has ingested or used an illegal substance or a narcotic that is altering their care. If the patient believes we will keep their medical information confidential then they are more likely to reveal the drugs they have used so we can better treat them. I remember years ago when I was working as an EMT in the ER and a young man, in his 20’s, came in with chest pain. The EKG showed an acute MI. The patient has no risk factors and it was amazing to everyone that the EKG was showing this at this early hour while he was on his way to work. In the end, after going to the cath lab and having an angiocath inserted in his groin and not heart disease was discovered did he reveal that he had used cocaine. If this patient had been informed that his information would be confidential, and had HIPPA been in place, he might have felt more comfortable revealing this information and avoiding this unnecessary procedure. I assure my clients that no police will ever be notified and that legally their information is protected so they may feel more at ease in revealing the drugs they have taken so we can treat them properly. Nonmalfeasance- the principal of doing no harm. Nonmalfeasance encompasses negligence and/or malpractice (Bastable, 2008). Malpractice can encompass failure to follow standards, communication, ocumentation, monitoring, acting as an advocate, and delegating. The first few hours and days after delivery of a preterm infant are critical times when head bleeds may occur. Simply lifting the legs while changing the diaper can result in a head bleed. Having this understanding and not rushing through cares is critical as a NICU nurse. There are serious developmental problems that may occur with third and fourth degree bleeds and the long term sequelae are daunting. As a nurse at the bedside with these neonates and communicating with the parents, we should always hold in mind the ethical principle of beneficence. It may be very easy to transgress in these areas of the nurse is not attentive and diligent in their work. Being a nurse means stepping outside of our feelings and judgments and treating others, â€Å"attentively and vigilantly so as to avoid mistakes (Tong, 2007, p. 25). Beneficence- the principle of doing good; acting in the best interest of a client through adherence to professional performance standards and procedural protocols. Beneficence encompasses patient welfare but not necessarily to the well being of the healthcare provider (p. 34). I feel an example of this is lifting and moving of heavy patients. It is my duty to assist them to a position they request or to find a more comfortable position if they state they are uncomfortable or if I am aware that their position my cause skin breakdown or harm but not to the detriment of my own body. Nursing injuries are preventable and hospitals have a duty to provide equipment to ensure their nurses do not get injured. There are hoists, slide boards, and even extra man power available to ensure the nurse does not get injured lifting an increasingly obese population. Protocols for lifting ensure the patient is not harmed if the nurse falls while helping them also. I often ask for more assistance in moving patients from chairs to beds and I also enlist the help of the patient if they can assist me with their position chance. Justice- equal distribution of goods, services, and burdens regardless of client diagnosis, culture, national origin, religious orientation, and sexual preference. there may be times when a patient is deemed unworthy by the nurse and he/she may feel that the patient doesn’t deserve to be treated the same as other patients. One example that comes to mind is occurring this week. The shooter of the 6 officers wounded last week is alive and in hospital right now, receiving care for a gunshot wound he suffered. As his nurse, I might need an extra few minutes each day to reassess why I am a nurse and the duties I must conform to before entering his room. The prisoner deserves the exact same treatment as the officers, yet he will be facing the death penalty once the court proceedings start. The same is true of the high prof ile mental health patients at the Utah State Hospital. They all deserve the same treatment as any other individual, yet they have done such tremendous harm to others. How to cite Autonomy- the Right of a Client to Self Determination, Essay examples

Saturday, May 2, 2020

Logistics and Supply Chain Management Logistics Perspective

Question: Discuss about the Logistics and Supply Chain Management for Logistics Perspective. Answer: Introduction OMEGA is an independent fuel retailed providing fuel to the major cities in Queensland. The organization has 100 fuel outlets across the major parts of Queensland and sells close to 1000 million liters of fuel annually. The organization is planning to import refined product from various refineries present in Singapore. This report focuses on the logistics management concepts and tools to be used in the process of importing the fuel from the Singaporean refineries in order to gain competitive advantages over larger organizations like BP (Christopher, 2016). Analysis As mentioned earlier, OMEGA is planning to import refined products from various mega-refineries operating in Singapore. OMEGA has leased tank farms in Townsville, Mackey and Bundaberg. This section of the report mentions some of the logistics challenges of importing fuel from Singapore in Australia (Coyle, 2016). The transportation activities in Australia can be defined in different categories as mentioned below. Roads The roads in Australia can be divided into federal highways, state highways and local roads. The road freight industry in Australia generates close to 50 billion dollars in revenue and has more than 40000 operators. These operators range from single-truck operators to large corporations listed in ASX. One of the logistics challenges for OMEGA is to setup an effective contract with one or more of these operators to move the fuel from the ports to the fuel tanks. The identification and choice for the road operators for OMEGA is a challenge to be completed through effective analysis of the performance, trustworthiness and business model of the operators (Waters, 2014). The road freight transport industry in Australia also provides a wide range of innovative solutions and emerging technologies for the transportation of the products. OMEGA can analyze these facilities provided by the road freight operators to determine the most efficient way to transport the refined products from the port s to the fuel tanks. This is one of the important logistics challenges of OMEGA importing the products from Singapore (Ghaderi, 2015). Figure 1 Producer Price Index (source: www.abs.gov.au/) The chart above shows that the Producer Price Index (PPI) has been increasing slowly over the past 10 years. Such a trend of the PPI for the road freight transport industry suggests that the costs of transporting by road has been increasing. On the other hand, the movement of these costs have been flat since 2014, which in turn suggests a possible benefit from the decreasing fuel price and slower average wage growth (Figure 1, 2016). The decision of transporting the imported products from the ports to the fuel tanks will be a logistics challenge, which OMEGA has to overcome to be able to determine and utilize either the rail or road freight transport industry (Kinnear, 2015). Rail The rail transport industry is responsible for the generation of close to 8 billion dollars of revenue and consists of more than 25 operators. The logistics challenge for OMEGA is to decide whether to utilize the rail industry to move the fuel products from the ports to the fuel tanks and the choice of the operator among the available operators in the corresponding industry (Ghaderi, 2013). Figure 2 Rail freight routes map (source: https://transportinfrastructurecouncil.gov.au) The figure above shows the rail network in Australia connecting the major locations valuable to the business operations of OMEGA (Figure 2, 2016). OMEGA has to weigh out the benefits and costs of transporting using the rail or road freight transport industry based on the national key freight routes map shown below (Figure 3, 2016). This map contains the pictures of the routes though both the rail and road transport connecting the significant places in the country like the ports and airports. Another logistics challenge that OMEGA faces is to determine the most effective route for the transportation of the refined products imported from Singapore, which can be supported by the analysis of the below key freight routes map (Wijeweera, 2014). Figure 3 Significant rail and road freight routes map (source: https://transportinfrastructurecouncil.gov.au) Ports There are a lot of important ports scattered across Australia which can be used for importing refined products from Singapore. The figure below shows the location of the ports across the county (Brooks, 2012). Close to 4 billion dollars of revenue is generated from the Australia port industry due to the operations of close to 27 businesses. Most of these ports are facing congestion issues due to the heavy dependency of most of the import and export activities of the country on the port industry. The federal and state governments have been actively working on the design and implementation of efficient port strategies in order to utilize them more effectively. There are a large number of Figure 4: Ports in Australia (source: www.searates.com) domestic and international shipping operators present in the sea freight industry utilize these ports. The identification of the most effective shipping operator is another logistics challenge in importing refined products from Singapore. The shipping transport industry in the sea contains both foreign and domestic operators in which the domestic operators generate more than 4 billion dollars of revenue (Figure 4, 2016). The federal and state governments are also working to increase the fleet size of the country in the sea freight industry in order to provide more opportunities for the import and export activities of the organizations. Recent analysis proves that the presence of the vessels in the sea fright transportation industry is good enough to support the import activates of OMEGA (Bell, 2014). Australian biosecurity requirements The Australian Government Department of Agriculture and Water Resources includes the operation of Biosecurity Australia, which is responsible for the definition of the policies on the importation of various quarantine risk materials into the country. The Australian Quarantine and Inspection Service (AQIS) is in turn responsible for implementing these policies for the importation of materials into Australia. The importation of the refined products from Singapore by OMEGA will fall under these requirements and would need to satisfy these requirements to be able to import the products. All the vessels coming into Australia from overseas are subjected to these biosecurity requirements implemented by AQIS to be safe inside the country. The products to be imported by OMEGA should also be compliant to the international health regulations to ensure getting a permission to use the corresponding products in the Australian markets. This is one of the most significant challenges of OMEGA for imp orting the refined products from Singapore to ensure that the importation of the products from Singapore comply with the different regulations and policies implemented by the federal government of Australia. The Biosecurity Act 2015 is the regulation in place currently in Australia to ensure that the imported products from overseas are safe to be used in the Australian markets (Nelson, 2014). Recommendations This section of the report mentions a number of recommendations for the importation of the products from the Singaporean mega-refineries by OMEGA. OMEGA should focus on the effective analysis of the operators available in the sea freight industry in order to choose the best possible operator for the transportation of the refined products from the Singaporean mega-refineries to the Australian ports. The management of the organization should locate the ports closest to the fuel tanks present in Townsville, Mackey and Bundaberg in order to minimize the inland transportation costs (Pateman, 2016). The management of the organization should efficiently analyze the costs and performance of both the rail and road freight transport industry in Australia to determine the best decision for the inland transportation system to be used for the transportation of the fuel products from the ports to the fuel tanks. The management of the organization should put a lot of focus on the analysis of all the major freight transportation routes in the country covered by both the rail and road transportation system in order to minimize the corresponding costs of transportation. The importation operations of OMEGA should be effectively designed to be compliant to the Australia biosecurity requirements mentioned in the corresponding legislations as the non-compliance to these requirements may cause major disciplinary or legal actions against the organization (Hausman, 2013). Conclusion The efficiency of the business strategy of OMEGA to import the refine fuel products from the Singaporean mega-refineries to gain competitive advantage over the large organizations will depend on the effectiveness of the importation policies to be defined by the management. The sea freight industry in Australia is utilized to a significant extent and include the usage of all the important ports across the country. The inland transportation industry in the country includes both the rail and road freight transportation, which in turn provides the organization to choose either a single or a combination of the two for the transportation of the products from the ports to the fuel tankers (Pateman, 2016). References Australian Bureau of Statistics, Australian Government, 2016, Producer Price Index, [ONLINE] Available at: https://www.abs.gov.au/ [Accessed 19 August 2016]. Bell, J, 2014, Climate change and coastal development law in Australia, Annandale: Federation Press. Brooks, M R, Puckett, S M, Hensher, D A and Sammons, A, 2012, Understanding mode choice decisions: A study of Australian freight shippers, Maritime Economics Logistics, 14(3), pp 274-299. Christopher, M, 2016, Logistics supply chain management, Pearson Higher Ed. Coyle, J, Langley, C J, Novack, R A and Gibson, B, 2016, Supply chain management: a logistics perspective, Nelson Education. Ghaderi, H, Cahoon, S and Nguyen, H O, 2015, An investigation into the non-bulk rail freight transport in Australia, The Asian Journal of Shipping and Logistics, 31(1), pp 59-83. Ghaderi, H, Namazi-Rad, M R, Mokhtarian, P, Fei, J, Cahoon, S and Ho, T K, 2013, Punctuality improvement in Australian rail freight network by transit time management. Hausman, W H, Lee, H L and Subramanian, U, 2013, The impact of logistics performance on trade, Production and Operations Management, 22(2), pp 236-252. Kinnear, S, Rose, A and Rolfe, J, 2015, Emissions Reporting in the Australian Road Freight Transport Sector: Is There a Better Method than the Default Option?, International Journal of Sustainable Transportation, 9(2), pp 93-102. Nelson, M, Roffey, P, McNevin, D, Lennard, C and Gahan, M E, 2014, An overview of biosecurity in Australia, Australian Journal of Forensic Sciences, 46(4), pp 383-396. Pateman, H, Cahoon, S and Chen, S L, 2016, The Role and Value of Collaboration in the Logistics Industry: An Empirical Study in Australia, The Asian Journal of Shipping and Logistics, 32(1), pp 33-40. SeaRates, 2016, Sea Ports of Australia AU, [ONLINE] Available at: https://www.searates.com/maritime/australia.html [Accessed 19 August 2016] Transport and infrastructure council, 2016, National Key Freight Routes Map, [ONLINE] Available at: https://transportinfrastructurecouncil.gov.au/publications/files/freight_route_maps/National_Map_A3_RAIL.pdf [Accessed 19 August 2016]. Transport and infrastructure council, 2016, National Key Freight Routes Map, [ONLINE] Available at: https://transportinfrastructurecouncil.gov.au/publications/files/freight_route_maps/National_Map_A3_ROAD_and_RAIL.pdf [Accessed 19 August 2016]. Waters, D and Rinsler, S, 2014, Global logistics: New directions in supply chain management, Kogan Page Publishers. Wijeweera, A, To, H and Charles, M, 2014, An empirical analysis of Australian freight rail demand, Economic Analysis and Policy, 44(1), pp 21-29.

Tuesday, March 24, 2020

Psychological Needs free essay sample

Dr. Dale Ironson Psychological Needs In the early 1940s, a humanistic psychologist known as Abraham Maslow developed a model for human motivation. Through this human hierarchy model Maslow demonstrated that humans are motivated by a progression of needs. According to Maslow, people first become motivated by physiological needs. Furthermore, once physiological needs are satisfied they progress to the level of psychological needs, and ultimately they progress to the needs of self- fulfillment. Maslows’s motivation theory is known as the hierarchy of needs (Huckenbury Huckenbury, 2014). According to Maslow (1943), the hierarchy of needs is divided by five levels of needs. The hierarchy model is depicted in the shape of a pyramid with the larger and lower-levels on the bottom and the need for self-fulfillment at the top. The top level, which is at the peak of the pyramid, is described as the level of achieving ones full potential. Following the top level of self-actualization is the level of esteem. We will write a custom essay sample on Psychological Needs or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page In this level, people are motivated by fulfilling a need of self-respect and the acceptance from others. After the level of esteem comes the level of love and elonging. In the level of love and belonging Maslow describes the need of others to fulfill a sense of attachment to a relationship; whether it is friendship, intimate, or family. Subsequently following the level of love and belonging is the level of safety and security. This level describes the need to build financial, personal, health, and safety security. Last, the level of physiological needs ranks to be the lower level of the pyramid. The level of physiological needs is described by Maslow as fulfillment of metabolic requirements for survival. Needs for survivals based on Maslow’s hierarchies of needs are; air, food, water, homeostasis, sex, and sleep. All four lower levels of the pyramid are divided as physiological needs and psychological needs. The top level of self-actualization is the level of self-fulfillment (Green, 2000). The concept of Marlow’s hierarchy of needs is easily understood; however, I do not fully agree with the theory. I agree with the needs described by Maslow such as fulfilling basic physiological needs as well as psychological needs; nonetheless, I do not see a need for it to be broken down in levels. I believe the hierarchy of needs explains motivation as if there is only one ath in life to follow. It demonstrates that first people should fulfill metabolic requirements, to fulfill the need of personal safety, followed by the need of fulfillment of belonging, to the need of acceptance, and finally leading to self-actualization. What if you fulfill the metabolic requirements, possess a sense of belonging, fulfill t he need of self-acceptance; however, you lack the fulfillment of personal security? What happens if one level is met before the other? Maslow’s hierarchy of needs does not give an explanation describing any type of results if one need is met before the next level in the hierarchy. I believe it is possible to meet one level before the other; therefore, explaining the theory in levels may not be adequate. Perhaps approaching the theory as a balance of all needs of fulfillment would be more adequate than breaking it down in levels. Maslow’s hierarchy of needs relates to motivation because it explains how humans are growth-oriented. The hierarchy also describes that when one need is fulfilled, the need becomes satisfied; therefore, it will motivate an individual to grow and continue to the next need of fulfillment. Based on Maslow’s hierarchy, I do not find any of the needs to be challenging. I find myself to be a well-rounded person with strong values and morals. I value personal relationships, family, beliefs, opportunities, health, and life in general. My life may not be perfect; however, I am grateful for the positive and negative situations that become present in my life for it is those situations that allow me to grow and become the person who I am today. Every day is a learning experience, and every day I am in pursuit of reaching my full potential. References Cherry, K. (2013). Hierarchy of Needs. Retrieved from http://psychology. about. com/od/theoriesofpersonality/a/hierarchyneeds. tm Green, C. (2000). Classics in the History of Psychology. Retrieved from http://psychclassics. yorku. ca/Maslow/motivation. htm Hockenbury, D. H. , Hockenbury, S. E. (2014). Discovering Psychology (6th ed. ). Retrieved from The University of Phoenix eBook Collection database. Maslow, A. H. (1943). â€Å"A Theory of Human Motivation†. In Psychological Review, 50 (4), 430- 437 . Washington, DC: American Psychological Association. Maslows Hierarchy. (n. d. ). Retrieved from http://www. redwoods. edu/Departments/Distance/Tutorials/MaslowsHierarchy/maslows_ print. html

Friday, March 6, 2020

Behind the Wheel Professor Ramos Blog

Behind the Wheel Spencer Bowling Photo by Scosche on Pexels.com          Eng 010 Learning to drive is one of the most important and fun things a teenager can learn to do. As a kid I was excited to go for a ride in the car so I could learn new things about driving and was fascinated to see all the stuff involved with operating a car. I remember all the kids my age asking their parents if they could practice driving a car. When I was about 15 I asked my parents if they could take me out to practice driving, I was surprised not only were my parents willing they were also eager to teach me how to drive. My Dad and I went up to Crafton Hills College, he took me to the top parking lot where no one was around and began showing me the different things I needed to know about safely driving, I’ll never forget my Dad had a new green GMC truck and I felt fortunate to begin driving on something new that had a ton of power. He began with the basics turning the truck on and checking the lights, he then told me to â€Å"go in reverse† and back out of one of the parking spaces we were in. From there he had me circle the lot and practice my turning. He would have me stop, turn on a blinker and try and park into one of the empty parking spaces. I struggled at first but after about five times of going up there I had gotten it down. About the fifth time up there he had me drive back home, I was nervous and kinda scared to be out on public streets for the first time, I remember him yelling at me to â€Å"Slow down, and stay in your lane!† He coached me through the rest of the way and we eventually arrived home safely. Next I started Driving School, it consisted of a small classroom with about 12 students. In class your given a small California Drive Guide and you go over things from how to stop on ice to how far back to stop from a railroad crossing. I eventually finished the course after a small test then you get your permit. After that I started my behind the wheel which its where you get to drive with an instructor. It was a Saturday morning at about 8:00 a.m. when my behind the wheel instructor showed up. He was an older man with short grey hair who drove an old black Oldsmobile, he picked me up and we were on our way. The instructor drove me through the city a couple of times then finally on the freeway. He pulled off to the side of the road then it was my turn to drive, he took me around the city, it was my first time getting use to stop lights. Then finally he led me to the freeway, I was very nervous but he told me â€Å"You are doing fine† and somehow my first time on the freeway s eemed kind of calm. He was a good teacher and I think because of him I was able to pass my driving test the first time. It seems like you really get used to driving after you’ve done it a few time by yourself.

Wednesday, February 19, 2020

Cold War Essay Example | Topics and Well Written Essays - 2000 words

Cold War - Essay Example It is called Cold War because the relations were icy at the least and never reached boiling point to bring on a shooting war. It is also 'cold' because each try to undermine each other's political power. There were several zones where potentially both were at loggerheads and where another WW III could have ensued had hotter heads prevailed. In West Berlin, Russia blockaded this US,UK and France-controlled zone with a wall that made the latter construe that they were intentionally entrapped. A dtente ensued when US did a massive airlifting of supplies instead of using force. In the Iron Curtain, Stalin convinced these Slav and Balkan countries to accept communism as form of government because Russia needed them as buffer states against Germany but the Allies construed this as an intense its brand of government. In Greece and Turkey, Russia frowned upon when there the Truman Doctrine was applied i.e. US provided funds and massive aid so that both may be able to resist communist attempts to subjugate them. In Western Europe, the US came up with the Marshall Plan, which was a multi-billion aid program to reconstruct the almost bankrupt nations ravaged by WW II. Russia reacted with consternation because that would make it difficult for them to foment dissension and discontent. Then the NATO, composed of USA, Britain, Canada and Western Europe including West Germany was established for the purpose of mutually securing themselves from possible communist military aggression. Despite the overweening tension and intensified hostilities, no full-scale war emanated. And this was because USA had invented the atomic bomb and displayed how it can resolve conflicts with dire consequences. It is because of the development of these atomic and hydrogen bombs, missiles and other arsenals of war and because of the complexity of plans involved in upsetting the rival that espionage became a necessary tool to outwit the rival. As early as the 1920's, USSR through its NKVD and OGPU intelligence agents, had already penetrated the State and the War Departments and other government agencies by recruiting left-leaning Americans, foreign-born Americans and Russians as spies to obtain classified and confidential secrets and transmit3 them to Moscow as microfilms or as encrypted cables. Then, the interest of the Russian spy ring was the industrial and military secrets of USA and the first target for infiltration was the FAECT(Federation of Architects, Engineers, Chemists and Technicians) and with satisfying results (Usdin 28). In one case, it was discovered that espionage had reached the top echelon of the State Department with Alger Hiss, one of its top officials caught flatfooted when Time Magazine editor Whittaker Chambers, himself a confessed Soviet agent, showed and testified that Hiss passed on to him a microfilm of State Department documents. Even the film industry was not spared as the HUAC (House Un-American Activities Committee), alarmed by the trend of left-leaning films, interrogated directors

Tuesday, February 4, 2020

Cloning Essay Example | Topics and Well Written Essays - 3000 words

Cloning - Essay Example ifferent contexts in biological research but in its most simple and strict sense, it refers to a precise genetic copy of a molecule, cell, plant, animal, or human being. In some of these contexts, cloning refers to established technologies that have been part of agricultural practice for a very long time and currently form an important part of the foundations of modern biological research† (Nussbaum & Sunstein, 1998, p. 1). Although this method has created many live successes, it has proved significantly less likely to generate successful instances of pregnancy than those conceived naturally via sexual intercourse. Additionally, the majority of cloned mammals have had some form of birth defect. Mammals do not replicate their own DNA through the natural process. This occurs only by cloning which presents both scientific and ethical implications. â€Å"The prospect of such replication for humans has resulted in the most controversial debate about reproduction ever to be taken up in western civilization† (McGee, 2001). Plants create offspring through replication by the natural method. When mammals replicate DNA by artificial means the practice is complex both technically and socially speaking. Those who are in opposition to cloning humans contend that this unnatural form of reproduction has a tremendous potential for basing dubious procreation decisions with regard to the genetic engineering of children. Their worry is that the traditional family is in jeopardy of evolving in a bizarre, unfamiliar and socially undesirable direction. Supporters of cloning procedures say that it may possibly, among other attributes, serve society as a valuable alternative infertility treatment. The cloning of animals has provoked the debate regarding the social, legal and ethical aspects concerning human cloning. Because of failure rate as compared to the customary conception method in animal testing, scholars, scientists and politicians usually agree that human experiments

Sunday, January 26, 2020

ICT Security Issues And Concerns

ICT Security Issues And Concerns ICT security issues and concerns are becoming more prevalent and increasingly complex as the pace of technology implementation continues to accelerate. How this phenomenon has affected the public sector and the private sector in our country. Discuss Each e-government project has its own version of the framework, where elements within the four components may differ according to the individuals agencys business or technical needs. List and explain the function of the components. 1.0 Introduction: ICT is the technology needed for information processing, in general, the use of electronic computers, software applications and communication devices to convert, retrieve, transmit, process, protect and store information from anytime, anywhere. Information and communications technology also known as (ICT) it is the sectors that process information which includes capturing, transmitting, and displaying information using electronic systems. Information communication technology sectors dont stop transforming our everyday life and economy. This sectors Core industries contain: Communications systems contain broadcasting, cable / broadband, telecommunications, and other program that distributes the systems. Computer systems including, network engineering, robotics, electronics, technical support and computer engineering. Software and digital media contains Internet security, web portals, web design, data management, computer animation, simulations, computer games, video games and computer programming. Information communication technology is the technology that needed for information processing such as for the creation, manipulation, storage, retrieval and communication of information. They are of immense value in a world in which there is an information explosion, and where knowledge is complex, ever-changing and cross-disciplinary in nature. Many of the skills of ICT are important aspects of Information Literacy, which relates to the ability to select, organise, analyse and use information effectively. Quick and effective access to information is regarded as essential for everyone in contemporary society; and the ability to construct knowledge from the information gathered has become crucial in Hong Kongs knowledge-based society. Citizens in the 21st century need to understand and be able to use ICT in order to function efficiently in modern society. To maintain the competitiveness of Hong Kong in the world economy, we need to develop interest and nurture talent in our students i n this area. The importance of ICT does not lie in the technology as such, but in its enabling function for access to knowledge and for communication with others. Rapid advances in ICT have continued to drive economic change, restructure businesses, affect education and employment, and contribute significantly to growth and wealth creation. (NATIONAL OPEN UNIVERSITY OF NIGERIA) 2.0 Answer Question 1: Ways severely harm your businesss effect 2.1 Virus: Computer viruses may be benign and result only in amusement or slight annoyance. The best known examples of such a virus are some versions of the Stoned virus which simply write Your computer is stoned on the monitor. Other viruses are more malignant and malicious, destroying or altering data. Once a virus is active in a host computer, the infection can spread rapidly throughout a network to other systems. A virus may attach itself to other programs and hide in them. Or it may infiltrate the computers operating system. All computer operating systems, (for example, MS- and PCDOS, Unix and Macintosh OS) are vulnerable, some more than others. Viruses enter computer systems from an external software source. Just as flowers are attractive to the bees that pollinate them, virus host programs are deliberately made attractive to victims. Often the attraction will be a new game made available for downloading from a computer bulletin board. Or it may be disguised as an executable file attached to an electronic mail message from a friend or business associate. Aside from viruses, there are other threats to user systems, including: Worm and Logic Bombs. (McAFEE Network Security Management) 2.1.2 Worm: Viruses are far from the only maverick programs that can disrupt a computer system. Worms are constructed to infiltrate genuine data processing programs and destroy or alter the data. Often what people believe is a virus infection is, in fact, a worm program. This is not as serious because worms do not replicate themselves. But the damage caused by a worm attack can be just as serious as a virus, especially if not discovered in time. For example, suppose a worm program instructs a banks computer to transfer funds to an illicit account. The fund transfers may continue even after the worm is destroyed. However, once the worm invasion is discovered, recovery is much easier because there is only a single copy of the worm program to destroy since the replicating ability of the virus is absent. This capability may enable it to re-infect a system several times. A worm is similar to a benign tumour while a virus is like a malignant one. (NC STATE UNIVERSITY) 2.1.3 Logic Bombs: Writing a logic bomb program is similar to creating a Trojan Horse. Both also have about the same ability to damage data, too. Logic bombs include a timing device so it will go off at a particular date and time. The Michelangelo virus is embedded in a logic bomb, for example. Other virus programs often include coding similar to that used in logic bombs, but the bombs can be very destructive on their own, even if they lack the ability of the virus to reproduce. One logic bomb caused major problems in the Los Angeles water departments system. Logic bombs are usually timed to do maximum damage. That means the logic bomb is a favoured device for revenge by disgruntled former employees who can set it to activate after they have left the company. One common trigger occurs when the dismissed employees name is deleted from payroll records. On one occasion, a student left a logic bomb timed to explode and wipe out his universitys records well after he had collected his degree and was long gone. This example illustrates the pernicious nature of logic bombs which can be written literally decades before they explode. (Virus Removal Support) 2.1.4 Phishing: The phishing is a common term for the creation and utilize by criminals of websites and e-mails, created to show people they come from well-known, trusted businesses and legitimate, government agencies and financial institutions attempt to gather personal, sensitive information and financial information. These criminals scam Internet users into disclosing their financial and bank information or other personal data for example passwords and usernames, or into unwittingly downloading malicious computer code onto their computers that can allow the criminals subsequent access to those computers or the users financial accounts. Nowadays most people wont reveal their credit card number, password and bank account to just anyone, extra action need to be taken by the phishers to trick their victims into giving up this information. Most of people trust automatic processes nowadays, believing them to be free from human error. However, many messages claim that a computerized audit or other automated process has revealed that something is amiss with the victims account. The victim is more likely to believe that someone has been trying to break into his account than believe that the computer doing the audit made a mistake. (HowStuffWorks, Inc ) 2.1.5 Pharming Besides, there is another threat called Pharming. Pharming means using technical means to redirect of an individual to an illegitimate entity, typically is Web site. Pharming collects personal information via redirecting Internet domain name of people requested to false Web sites. The sites can collect the information and there may be used to commit fraud and identity theft. For instance, an Internet user wishes to log in to his personal online banking account via the banking website, he/she is not really accessing the banks Web site if he/she was redirected to an illegitimate Web . Static domain name spoofing: A person or entity, normally called Pharmer, who tricks Internet users into inadvertently visiting the pharming Web site with advantage of slight misspellings of the domain names. For instance, a pharmer may use maybnk.com instead of maybank.com to redirect user. (Websense, Inc.) 2.1.6 Hacker: A hacker is someone who experts using electronics or computer systems and professional in programming. Hackers like to learn and explore how computer systems function and finding method to make them do what they do better, or do things they werent intended to do. Hacker is separate in two types which is White Hat and Black Hat: White Hat: These are considered the good guys and computer security experts. White hat hackers do not use their hacking skills to hack other people computer or some illegal purposes. They normally help other users protect from the black hats. Black Hat: These are considered the bad guys and they like to hack into other people computer to steal information such as deface websites, steal credit cards or hack bank. Black hat hackers like to use their hacking skills to do bad things for illegal purposes. A hacker can easily hack in the computer to steal information and look into the private things. The benign hacker is the person who likes to get into his/her own computer and understand how it works. The malicious hacker is the person who likes getting into other peoples systems. The benign hackers wish that the media would stop bad-mouthing all hackers and use the term attacker instead. (Introduction to Ethical Hacking) 3.0 Answer Question 2: E-Government: Terms used in this research are defined in this section to facilitate smooth and clear reading for all categories of readers. Some of the terms defined are e-Government, e-Government value chain and stakeholders, effective e-Government, and efficient e-Government. A number of definitions for e-Government have been offered in existing literature. Many terms such as digital government, inter-networked government (Tapscott, 1995) and government online has been used. The researcher deems all these terms to be synonymous. E-Government in simplest terms can be described as the use of ICT within government to make operations more efficient, improve quality of service and offer an easy access for citizens to government information and services (Kraemer and King, 2003). Kraemer also cited that Senators Lieberman and Thompson defined e-Government as a wayto better use IT advances to achieve greater effectiveness and to provide citizens easy, electronic access to government programs, services and information. (Axelsson, Karin, Linkà ¶ping University) The term e-Government also refers to the planned and coordinated use of ICT to strengthen the core functions of public institutions. Not every computer in use in the public sector amounts to e-Government. When electronic data processing emerged on a more widespread basis, its initial focus was on isolated and targeted modernization efforts in a limited number of key sectors. Today, however, the focus is on the networking of workplaces, administrations, and political institutions as well as on Information and Communications Technology based communication with customers or citizens. This calls for concepts that are geared to integrating the modernization goals and investment planning of various institutions and based on a thorough examination and analysis of service portfolios and the demand for public services. The implementation of e-Government requires strong leadership and a vision. It also requires a comprehensive strategy that is not only benchmarked on global best practices, but also sensitive to existing political and economic conditions and realities. For E-Government to become a reality, governments, in consultation with stakeholders, should follow a common nationwide strategic framework, which articulates the governments vision, targets and milestones, technical approach and standards for e-Government systems. Such a framework should also address information privacy, security, maintenance, and interface standards. (Axelsson, Karin, Linkà ¶ping University) 3.1 Four main components of E-Government: An implementation framework is designed to guide and manage the execution of the E-Government strategy. This framework is an adaptation of Accentures Business Integration Framework and can be broken down into four main components which are Programme Management, Technology, Process, and Strategy. Each E-Government project has its own version of the framework, where elements within the four components may differ according to the individual agencys business or technical needs. 3.1.1 Programme Management: The Program manager of E-Government chooses an initiative to be implemented and establish the strategy and goals that is aimed at accomplishing through this initiative. Next, the government agency that would lead this initiative is identified and agreed upon. The agreement or commitment gained from the chosen agency and governing body, acts as the green-light to go ahead with the implementation. With this, the project committee can begin to assess the policies that are dependent on the initiative. Policy amendments that are possibly required are highlighted. The framework is where all the planning processes are placed. A project plan will be planned and documented by the Program managers. Functional areas that will be targeted are identified. Critical success factors for this initiative are identified in order to maintain a focus on the objective and goals. Policies that were identified to be amended will be planned for according to relevant standards and regulations. New infrastructure that will be required are identified, planned for and scoped. With the policies in place, the program managers would now need to assess whether in-house skills and staffing resources are sufficient. Otherwise, alternatives such as short-term contracting and outsourcing would have to be selected. This is where procurement planning comes into place. (Roslind Kaur) 3.1.2 Technology: Although e-Government is often defined as online government or Internet-based government, many non-Internet based e-Government technologies can be named in this context, including telephone, fax, personal digital assistants (PDA), short messaging service (SMS), multimedia messaging service (MMS), and third-generation technology (3G), general packet radio service (GPRS), WiFi, Worldwide Interoperability for Microwave Access (WiMAX) and Bluetooth. Other technologies can include closed-circuit television (CCTV), tracking systems, radio-frequency identification (RFID),road traffic management, biometric identification, and regulatory enforcement, smart cards, identity cards, and other communication applications, polling station technology (for non-online e-voting), television and radio-based delivery of government services, online chat, electronic mailing lists and newsgroup, online community facilities, email, and other messaging technologies. Other aspects of technology to be considered in the implementation of e-Government are enablement, interoperability such as the e-Government interoperability framework (e-GIF) and semantic web issues, legacy technology, and implications for software choices (open source or proprietary software, and suitable programming languages). (OOH KIM LEAN) 3.1.3 Process: In contrast to traditional government processes, e-Government is characterized by extensive use of communication technology, the impersonal nature of the online environment and the ease of information can be collected (data-mining), processed and used by multiple parties (Warkentin, Gefen, Pavlou Rose, 2002). However, e-Government has the implicit uncertainty of using an open technological infrastructure for transaction via the newness of the communication medium interact with a government website. This would indirectly increase the spatial and temporal separation between citizens and government; more uncertainty and concern about the reliability of the underlying Internet and related government infrastructure interfaces. As overall these unique differences increase uncertainty and reduce perception of citizen control, imposing a barrier to e-Government adoption. (OOH KIM LEAN) A number of research papers in e-Government were published in recent years to help practitioners to improve government service quality, responsiveness, convenience and accessibility to both citizens in urban and rural area. Their effort can be categorized into few issues: (i) The concept, theories, history, structure, initiatives, policy, key principles, impact, challenges, and development success factors of e-Government; (ii) The technology application, 13knowledge spillover, innovative efforts and approach to facilitate e-Government implementation and evaluation; (iii) Management support or implementation strategies such as framework for managing the lifecycle of transactional e-Government services to facilitating the e-Government services. To provide more intuitive and maintainable lifecycle for electronic tax submission (one of the e-government service to citizens), government must overcome shortcoming happen during the lifecycle such as implicit knowledge, user interaction, code reusability, communication with back-end system, business reengineering required to upgrade to workflow flexibility and resolve security issue (Vassilakis, Laskaridis, Lepouras, Rouvas Georgiadis 2003) (iv) the assessment, measurement of e-Government services provided to public sector and its effects on economic, social benefits of the implementation; (v) key factors affecting acceptance , expectation and usage intention of e-Government services. (OOH KIM LEAN) 3.1.4 Strategy: The process of adopting advanced ICT solutions for the transformation of e-government faces many challenges. Due to the complex nature of these projects and the sheer number of stakeholders involved, effective visualization and management of such initiatives is highly critical but needs to be simple in order to accelerate understanding off and buy in into the framework. However it is important that the framework represent all important aspects of the e-government strategy. That said, despite years of governmental efforts to implement e-government initiatives, there are no commonly established methods and frameworks for the visualization of an overarching e-government strategy. A comprehensive framework needs to account for how the different supporting and impeding forces impacting projects being implemented as a part of such a strategy. Given that such a framework will also have a long lifecycle and encompass a broad scope, the framework also needs to remain applicable regardless of changes in the environment. As most projects go through much iteration of technical and process changes, any changes within the ecosystem should not risk the validity of the strategy framework. Hence the framework needs to be adaptable to changing environments and should be defined in a technology neutral manner. Such an approach will also allow the framework to act as the bridge between decision makers and implementers, thus reducing the mismatch between the expected versus realized outcomes. (Roslind Kaur) 4.0 Conclusion and Recommendation: In my opinion, Information is the life wire of todays business organizations, institutions and industries. Information and Communication Technologies (ICT) covers all advanced technologies in manipulating and communicating information. Information is an organized, meaningful and useful interpretation of data. However, Information and Communication Technologies is very important and much of benefit. Viruses are designed to proliferate and propagate. This means each and every contact between your system and any other system is an opportunity for infection. That can include floppy disks and contacts via modem (or other network connection). Be especially careful of users who frequently use a number of different systems outside your company. Hacker is also dangerous to all the computer users, a hacker can easily hack in the computer to steal information and look into the private thing. Governments around the world have pursed e-government programs seeking to electronically govern internal and external operations and to provide coherence between the various administrative government units so that they work to complement and complete each other. However, and despite the fact that many governments have injected substantial investments, most e-government initiatives in our view have not delivered the transformation environment sought from their implementation. This research study was developed to support the United Arab Emirates in pursuing its objective towards e-government transformation. It presented an innovative framework developed from a government practitioners viewpoint and in light of the existing literature in the field. The recommended approach is an amalgamation of learnings from various e-governments initiatives across the globe.

Saturday, January 18, 2020

Blackwater USA security

Blackwater Worldwide in the past called Blackwater USA Security-Blackwater is the name for the peat-colored water of the swamp, is the U. S. government has inaudibly hired to maneuver in international war zones and on American soil. The contacts run from deep within the military and intelligence agencies to the upper echelons of the White House. This company that is a self-described private military company founded in 1997 by a man named Erik Prince and Al Clark which is also the same company also referred to as the security contactor or mercenary organization by the international reporters, the founder Erik Prince a former Navy SEAL.Prince attended the Naval Academy, graduated from Hillsdale College, and was an intern in George H. W. Bush's White House. Prince is a major financial supporter of Republican Party causes and candidates emerged from ancestors that was one of the top reservoir rollers of, not only the â€Å"Republican revolution† of the 1990s that brought Newt Ging rich and the Contract with America to authority, but also the growing of what the spiritual accurate or the Christian conventional lobby group. Erik Prince’s family gave the kernel money for Gary Bauer to found the Family Research Council.The founder Erik Prince of the Blackwater USA security is a major bank roller of President Bush, his cronies, and the Christian conservative movement in this nation and in 2002 Blackwater Security Consulting (BSC) was formed. It was one of several private security firms employed following the U. S. invasion of Afghanistan. BSC is one of over 60 private security firms employed during the Iraq War to guard officials and installations, train Iraq's new army and police, and provide other support for occupation forces.Blackwater was also hired during the aftermath of Hurricane Katrina by the Department of Homeland Security, as well as by private clients, including communications, petrochemical and insurance companies in Overall; the company has r eceived over US$1 billion in government contracts. In administration Blackwater's president Gary Jackson, is also a former Navy SEAL and Cofer Black, the company's current vice chairman, was director of the CIA's Counterterrorist Center (CTC) at the time of the September 11, 2001 attacks.He was the United States Department of State coordinator for counterterrorism with the rank of ambassador at large from December 2002 to November 2004. After leaving public service, Black became chairman of the privately owned intelligence gathering company Total Intelligence Solutions, Inc. , as well as vice chairman for Blackwater. Joseph E. Schmitz holds an executive position in Blackwater's holding company, Prince Group. He was previously inspector general of the Department of Defense, an appointment of George W.Bush. Robert Richer was vice president of intelligence until January 2007, when he formed Total Intelligence Solutions. He was formerly the head of the CIA's Near East Division. [20][21] Black is presently senior advisor for counterterrorism and national security issues for the 2008 Presidential election bid of Mitt Romney. Blackwater is based in the U. S. A in the state of North Carolina, where it operates a tactical training facility that it said to be the world's largest.The company trains more than 40,000 people a year, from U. S. A or foreign military and police services, as well as other U. S. A government agencies. The training consists of military offensive and defensive portioning and in smaller scale human resources security. Expertise and modus operandi trained are not limited by U. S. domestic law although we are not yet sure what legal status Blackwater operates in the U. S. and other countries and the fortification of the U. S. extends to Blackwater which is operations globally.Blackwater is the mysterious story of the ascending of a powerful mercenary army, ranging from the blood-soaked streets of Fallujah to rooftop firefights in Najaf to the hurric ane-ravaged US gulf to Washington DC, where Blackwater executives are hailed as new conquerors in the war on terror. Blackwater USA Security has massive of about 6,000 acres of the Great Dismal Swamp acre training facility as part of its headquarters, Moyock in North Carolina (just south of the Virginia border).The firm has additional offices in Baghdad, Iraq, and Kuwait City this is according to The â€Å"About Blackwater† section of its website states: â€Å"Blackwater Training Center which was founded in 1996 to fulfill the anticipated demand for government outsourcing of firearms and related security training. Blackwater has the finest private firearms training facility in the U. S. Blackwater has set a new standard for firearms and security training and is recognized as the industry leader in providing government outsource solutions in training, security, canine services, aviation support services, range construction and steel target equipment.Since its inception howeve r, the main work of Blackwater has been deploying its own mercenary army– recruited from elite U. S. military forces especially from Navy SEALS and Marine Recon, SWAT police forces, and international â€Å"soldiers of fortune. † In February it started training former Chilean commandos–some of whom served under the dictatorship of Augusto Pinochet–for use in Iraq. Blackwater has trained over 50,000 military and law enforcement personnel and provided solutions to hundreds of satisfied customers.This is an extraordinary delineation by one of America's most exciting young radical correspondents called Jeremy Scahill the undercover journalist in his new book â€Å"Blackwater† talks about The Rise of the World's Most Powerful Mercenary Army where he says that Blackwater is the honored Praetorian Guard for the global war on terror with its own military base. Blackwater is presently the largest of the U. S. State Department's three private sanctuary contra ctors, providing a total of 987 contractors.The correspondent in his book writes that Blackwater mercenary firm vehemently demonstrates the grave jeopardy of outsourcing the government’s cartel on the use of force many of which are U. S. citizens. At least 90 percent of its proceeds come from government contracts, two-thirds of which are no-bid contracts. Blackwater Worldwide is currently contracted by the United States government to provide security services in the Iraq War. In October 2007, Blackwater USA rebranded them as Blackwater Worldwide.Blackwater Worldwide has played a substantial role during the Iraq War, as a contractor for the United States government, especially in 2003; Blackwater received its first high-profile contract when it received a $21 million no-bid contract for guarding the head of the Coalition Provisional Authority, L. Paul Bremer. Since June 2004, Blackwater has been paid more than $320 million out of a $1 billion, five-year State Department the fi nancial statement for the Worldwide Personal Protective Service, which protects U. S. officials and some foreign officials in conflict zones. In 2006, Blackwater won the remunerative contract to protect the U.S. embassy in Iraq, which is the largest American embassy in the world. It is anticipated by the Pentagon and company representatives that there are 20,000 to 30,000 armed security contractors working in Iraq. Of the State Department's dependence on private contractors like Blackwater for security purposes, U. S. ambassador to Iraq, Ryan Crocker, told the U. S. Senate: â€Å"There is simply no way at all that the State Department's Bureau of Diplomatic Security could ever have sufficient full-time personnel to staff the security occupation in Iraq. There is no unconventional except through contracts.According to the republicans of early this year 2008, Blackwater USA security will leave the bureau armed and dangerous because Blackwater is the absolutely mesmerizing an explosiv e story of how the Bush Administration has spent hundreds of millions of public dollars edifice a comparable corporate army, an army enthusiastic to grounds it constitutes nothing less than a Republican Guard which is the most imperative and unnerving book about the death throes of U. S. egalitarianism in the estimative coverage about how insane Bush privatization efforts, not an iota is more worrisome than the corporatizing of military struggle forces.Jeremy Scahill admirably exposes a overwhelming example of this baleful scheme, the writer says that the only person interested in the privatization of the military is president Bush due to the advantages that we will gain from keeping the military force in the course of the Iraq fight. This engrossing investigative piece exposing, in shocking detail, a U. S. government-outsourced Frankenstein replete with helicopter gunships may leave you unconvinced. But you better believe it, for it poses a grave and gathering danger to the future of our Republic.According to Ray McGovern, CIA veteran and former intelligence briefer for George H. W. Bush, in this terrorizing and thrillingly written book, Jeremy Scahill initiates us to the shape of things to come, and to the kind of people and conglomerates apt to preside over our lives if we don't do something marvelous about it promptly. According to research from the writer Jeremy Scahill's comprehensive research and reporting elevates the shroud off the ever-tightening relationship between the federal administration and unaccountable private military corporations such as Blackwater USA.This type of mercenary army has no whatsoever reason to have this type of civilian military organization due to its relationship with the US government which is considered to be of intrinsic danger and moral conflicts involved in the using of public funds to engage a clandestine corporation which exists to generate profit to supplement and to supersede the military in its role to endow with for the common defense. Alarming issues leap to mind like a panther springing upon its prey.Moreover the Social Darwinists sitting atop the food chain in the wealthiest, most powerful nation in humanity's history now have access to their own paramilitary force. They can unleash their private army on the unfit when the need arises, whether it be within America's borders or otherwise. New Orleans is a prime example. 150 highly trained Blackwater quasi-military professionals openly armed with assault weapons descended on a tragedy-stricken city. As hurricane victims taking necessities were called â€Å"looters† and shoot to kill orders were in effect, those who value property over people saw to it that their interests were well-protected.Thankfully, Blackwater was there to protect the patrician class from the â€Å"savages† from the Lower Ninth Ward who had the audacity to attempt survival; also Blackwater's global presence includes Iraq, where the murder of four of their employees triggered the US military's revengeful attack on Fallujah in which it committed scandalous war crimes and mayhem against hundreds of Iraqi civilians. Why the four Blackwater contractors were near Fallujah the day of their deaths remains unclear. The mainstream media, Blackwater and the US government claim that they were on security detail shielding a food delivery.However, some suggest that the claims of protecting a food caravan were a ruse to cover the fact that Blackwater employees were completing a military operation. While the facts remain ambiguous, it is certain that the conventional media's description of the Blackwater victims as civilian contractors was significantly inaccurate, this led to the Blackwater's license to operate in Iraq being revoked by the Iraqi Government on September 17, 2007, resulting from a highly contentious incident that occurred the previous day during which seventeen (initially reported as eleven) Iraqis were killed.The fatalities occurre d while a Blackwater Private Security Detail (PSD) was escorting a convoy of U. S. State Department vehicles en route to a meeting in western Baghdad with United States Agency for International Development officials. The US State Department has said that â€Å"innocent life was lost. An anonymous U. S. military official was quoted as saying that Blackwater's guards opened fire without provocation and used excessive force, the incident has sparked at least 5 investigations, with the FBI now saying it will begin a probe.Blackwater helicopters were dispatched to evacuate the Polish ambassador following an insurgent assassination attempt. On October 2, 2007 Erik Prince was subject to a congressional hearing conducted by the Committee on Oversight and Government Reform following the controversy related to Blackwater's conduct in Iraq and Afghanistan. Blackwater hired the public relations firm BKSH & Associates Worldwide, a subsidiary of Burson-Marsteller, to help Prince prepare for his testimony at the hearing. Robert Tappan, a former U. S.State Department official who worked for the Coalition Provisional Authority in Baghdad, was one the executives handling the account. BKSH, a self-described â€Å"bipartisan† headed by Charlie Black, a prominent Republican political strategist and former chief spokesman for the Republican National Committee, and Scott Pastrick, former treasurer of the Democratic National Committee. The case went on until when testifying before Congress came and Prince complained about the lack of remedies his company has to deal with employee misdeeds.When asked why an employee involved in the killing of a vice-presidential guard incident had been â€Å"whisked out of the country† he replied, â€Å"We can't flog him, we can't incarcerate him. Asked by a member of Congress for financial information about his company, Prince declined to provide it. â€Å"We're a private company, and there's a key word there private, he later stated that the company could provide it at a future date if questions were submitted in writing when the term â€Å"mercenaries† was used to describe Blackwater employees, Prince objected, characterizing them instead as â€Å"loyal Americans†.A Committee on Oversight and Government Reform staff report based largely on internal Blackwater e-mail messages and State Department documents, describes Blackwater as â€Å"being staffed with reckless, shoot-first guards who were not always sober and did not always stop to see who or what was hit by their bullets. A staff report compiled by the House Committee on Oversight and Government Reform on behalf of Representative Waxman questioned the cost-effectiveness of using Blackwater forces instead of U.S. troops. Blackwater charges the government $1,222 per day per guard, â€Å"equivalent to $445,000 per year, or six times more than the cost of an equivalent U. S. soldier,† the report alleged, during his testimony on Capitol H ill, Erik Prince disputed this figure, saying that it costs money for the government to train a soldier, to house and feed them, they don't just come prepared to fight. â€Å"That sergeant doesn't show up naked and untrained†, Prince stated.In the wake of Prince's testimony before Congress, the US House passed a bill in October, 2007 that would make all private contractors working in Iraq and other combat zones subject to prosecution by U. S. courts and Senate Democratic leaders have said they plan to send similar legislation to President Bush as soon as possible. The legal status of Blackwater and other security firms in Iraq is a subject of contention, before he left Iraq; L.Paul Bremer signed â€Å"Order 17† giving all Americans associated with the CPA and the American government immunity from Iraqi law. A July 2007 report from the American Congressional Research Service indicates that the Iraqi government still has no authority over private security firms contracte d by the U. S. government. On October 5, 2007 the State Department announced new rules for Blackwater's armed guards operating in Iraq. Under the new guidelines, State Department security agents will accompany all Blackwater units operating in and around Baghdad.The State Department will also install video surveillance equipment in all Blackwater armored vehicles, and will keep recordings of all radio communications between Blackwater convoys in Iraq and the military and civilian agencies which supervise their activities.Also on September 23, 2007, the Iraqi government said that it expects to refer criminal charges to its courts in connection with a shooting involving Blackwater guards. However, on October 29, 2007, immunity from prosecution was granted by The U. S. State Department, delaying a criminal inquiry into the Sept. 16 deadly shooting of 17 Iraqi civilians. Immediately afterwards, the Iraqi government approved a draft law to end any and all immunity for foreign military co ntractors in Iraq, to overturn Order 17.The U. S. Department of Justice also said any immunity deals offered to Blackwater employees were invalid, as the department that issued them had no authority to do so. Legal specialists say that the U. S. government is unlikely to allow a trial in the Iraqi courts, because there is little confidence that trials would be fair. Contractors accused of crimes abroad could be tried in the United States under either military or civilian law; however, the applicable military law, the Uniform Code of Military Justice, was changed in 2006, and appears to now exempt State Department contractors that provide security escorts for a civilian agency.Prosecution under civilian law would be through the Military Extraterritorial Jurisdiction Act, which allows the extension of federal law to civilians supporting military operations; however, according to the deputy assistant attorney general in the Justice Department’s criminal division Robert Litt, try ing a criminal case in federal court would require a secure chain of evidence, with police securing the crime scene immediately, while evidence gathered by Iraqi investigators would be regarded as suspect.To conclude the Backwaters should not have this type of civilian military organization in any part of the world including in the U. S. A because it is too costly especially to the Government of president Bush including the civilians who get to pay a lot to taxes to keep the military running. The innocent people dying all over the world where the mercenary army controls is an abuse of the human rights especially in Iraq, Bagdad and Somalia. References: 1. www. blackwaterusa. com/new/btwarchive. html 2. Blackwater by Jeremy Scahill 2007 by Jeremy Scahill.