Saturday, November 30, 2019

Internet Privacy Essays (652 words) - Privacy, Digital Rights

Internet Privacy Internet Privacy Why should I worry about privacy and security? I'm not a criminal or a terrorist. I've got nothing to hide. These are things that most people think. They also believe the internet is much more secure and that their personal information is only available to them, whereas this is actually quite wrong. There are more reasons to want to protect your privacy than can be named. The important principal is that you have a right to privacy as long as that right is used within the bounds of the law. Seeking privacy should not make you feel guilty. Privacy should be expected, and demanded. The reasons might be as simple as preserving your right to express unpopular opinions without being subjected to persecution, or as serious as communicating sensitive business information, revealing credit card numbers, legal discussions with your accountant, or hiding your true identity from a secret government. Regardless of your reasons, privacy is your right. Contrary to what some governing bodies might want the public to believe, not all those concerned with security and privacy are hackers or terrorists. The internet provides one of the easiest communications tools ever afforded by mankind. It is quick, convenient, cheap....and as insecure as it is quick, convenient, and cheap. A message sent many months ago may remain on an ISP's server or as a backup, and can be easily retrieved by anyone who knows how to do so. This is information which you personally have deleted for a reason - not to be accessed by someone else after you have finished with it. There have been times where information has be retrieved up to 6 months after, and used in a court case as evidence. It can be quite simple for someone to intercept your messages or information if they want it. This may be just an administrator of your ISP or your office network. Or it might be a business competitor, legal foe, or government agency, with much more serious intentions. There are an abundant means available to protect online privacy. Some are large and complex while others are extremely simple. The important fact is that some methods are almost totally lacking in security while others are practically bulletproof. It is an all too common misconception that anonymity equals privacy. Anonymity and privacy may be related, but their significance is quite different. Do you wonder what other people know about you? Cookies are available on certain websites, and these small files are placed on your computer and record data which most often contains information that the user would rather be kept secure. Information including passwords, credit card numbers and where the user has been. There are hundreds of web-based email services that appear to offer anonymity. Few really do. These include names such as Hotmail, Yahoo, Excite and many more that could be listed. In each of these cases, the user is allowed to create a personal username that he uses for his messages. Unfortunately, through sign-up procedures and logging, it is amazingly simple to determine your ISP, and even your true identity, when you use these services. For the obvious reason, there is no point in wasting space dealing with those types of services. As the user, it is your responsibility to know that your internet anonymity is only as secure as the service's privacy policy. You should always familiarize yourself with the usage and privacy policies of any E-mail or internet service you consider using. Who wants to know what you're saying? It might be a nosey fellow employee, your employer, your ISP, a competitor, friend, or legal team. Regardless of who wants to, it is remarkably easy for someone else to read what you write. It is common sense to protect information that you don't want others to know, and people should ensure that they go to some lengths to do so. There are a large number of nonprofit organizations that specialize in protecting your rights to privacy. It is time well spent to visit these sites, as you can learn what the current laws are, what is being proposed, and what is being done to protect privacy.

Tuesday, November 26, 2019

Korean War Essays - Battles Of The Korean War, Korean War

Korean War Essays - Battles Of The Korean War, Korean War Korean War The Korean War (1950-1953) The Korean War was the first war in which the United Nations played a major role in. It was also part of the cold war between the US and Soviet Union. One of the deadliest war in history, it took many lives in such a short span of time of three years. Even after all these deaths, the conflict isn't completely resolved in Korea. There are still American troops stationed in South Korea, in case the Communists decide to take aggressive action. In WW II, Japan had gained control in Korea. At the end, when Japan was defeated by the Allies, the US and Soviet forces moved in Korea . Korea was divided to serve as the purpose to move the Japanese troops out. The line which was at the 38th parallel divided the country in about half. The Soviet forces were responsible for the north and the US for the south part of Korea. Later, this partition was made permanent. In 1947, the UN declared for elections to be held in all of Korea to decide one government for the country. However, North Korea refused to take part in the elections and didn't allow it. So on May 10, 1948, South Korea voted for a national assembly which set up the Republic of Korea. On September 9, North Korea set up the Democratic People's Republic of Korea. North and South Korea claimed the whole country and their troops fought several times between 1948-1950. The US removed it's troops from South Korea in 1949. It also said that Korea was outside of US defense line. N orth Korea saw it's chance for military action to take over South Korea. In June 1950, North Korea surprised South Korea with an attack. At the time, the North Korean Army had 135,000 soldiers, most of them veterans of WW II. It also had airplanes, tanks, and artillery that outnumbered South Korea by three to one. On the other hand, South Korea had 65,000 combat troops who had small arms and light artillery. On the day the war began, the UN Security Council issued a resolution demanding the Communist retreat back to the 38th parallel. The Soviet Union was a permanent member of the Security Council. However, it didn't go to the meeting because it had been boycotting the Council meetings. This was because the Council was denying the Communist Chinese government. If the Soviet Union had been there, it could have voted against the resolution or deliver a veto. North Korea chose to disregard the resolution. On June 27, North Korean troops reached South Korea's capital, Seoul. Seoul fell in four days. In the US, President Truman and the UN took action to stop N orth Korea from advancing. President Truman, going by his containment policy, sent US air and naval forces to help South Korea. The UN also asked its members to help South Korea. On June 30, Truman ordered the first ground troops to go to South Korea. General Douglas Macarthur was the commander of the ground forces. Congress supported Truman but didn't officially declare war on North Korea. Other troops from UN nations began soon after the US. Part of the US army on July 1, came from Japan to southernmost Korea at Pusan. Soon, these troops very moving close to south of Seoul. The first fight that took place between the US and North Korea was at Osan, south of Seoul. North Korea had already surpassed Seoul. On July 7, Truman named General MacArthur the commander of UN Commands. He had control over all of the forces in South Korea. By August 2, the North Korean army had advanced to the Pusan Perimeter. The Pusan Perimeter was on the southeast corner of South Korea. This was one of the many turning points in the war because the North Koreans lost nearly 58,000 people. The UN ground forces were led by General Walker who attacked the North Koreans with reserves. US planes helped out by destroying the enemy from above. On August 6, the North Koreans succeeded in crossing the river that stopped them from reaching Pusan. However, the UN forces counterattacked and pushed them back on August 25. North Korea tried

Friday, November 22, 2019

Causes and Effects of Post Traumatic Stress Disorder

Posttraumatic Stress Disorder (PTSD) Posttraumatic stress disorder is an anxiety disorder caused by exposure to a trauma event. When the body feels that it is in danger, it responds to flying or fighting reactions designed to protect people from harm. When the body faces horror, functions such as memory, emotions, thinking, etc. are currently not important and are turned off. This allows the body to concentrate on adding stress hormones to increase heart rate, blood movement to the muscles and in the case of injury in combating infections and bleeding (National Alliance on Mental Health Website, 2014). Post traumatic stress disorder, that is exactly that. The first response to this disease would be the pressure for over-application and trauma experience. Kay Jankowsi (2010) said posttraumatic stress disorder (PTSD) can be traced back to ancient times. History Medical literature literature began with civil war, where PTSD-like disease was called Dakosta syndrome (Jankowsi 2010). Janko wsi (2010) argues that Posttraumatic Stress Disorder (PTSD) is a mental disorder that may occur after experiencing or witnessing a life-threatening event (gospelassemblyfree.com). Post-traumatic stress disorder post-traumatic stress disorder is a mental illness that people remember repetitiously or have a dream of a terrible experience (post traumatic stress disorder 710). The explanation of post traumatic stress disorder mainly focuses on the way in which psychological trauma experience is affected. When a person is facing an overwhelming trauma, the brain can not handle information or emotion correctly (Cohen Web). Post traumatic stress disorder changes the body's response to stress. Hundreds of different types of psychiatric disorders, fourth edition are posted in the mental disorder diagnosis and statistics handbook. (DSM - IV) One of them is called post - traumatic stress disorder (PTSD). According to this study post-traumatic injuries usually experienced and witnessed life-thr eatening events such as military attacks, natural disasters, terrorist attacks, serious accidents and rape, and other violent personal attacks It will occur later (Harvard Women 's Health Watch, 2005). Causes and Effects of Post Traumatic Stress Disorder Posttraumatic Stress Disorder (PTSD) Posttraumatic stress disorder is an anxiety disorder caused by exposure to a trauma event. When the body feels that it is in danger, it responds to flying or fighting reactions designed to protect people from harm. When the body faces horror, functions such as memory, emotions, thinking, etc. are currently not important and are turned off. This allows the body to concentrate on adding stress hormones to increase heart rate, blood movement to the muscles and in the case of injury in combating infections and bleeding (National Alliance on Mental Health Website, 2014). Post traumatic stress disorder, that is exactly that. The first response to this disease would be the pressure for over-application and trauma experience. Kay Jankowsi (2010) said posttraumatic stress disorder (PTSD) can be traced back to ancient times. History Medical literature literature began with civil war, where PTSD-like disease was called Dakosta syndrome (Jankowsi 2010). Janko wsi (2010) argues that Posttraumatic Stress Disorder (PTSD) is a mental disorder that may occur after experiencing or witnessing a life-threatening event (gospelassemblyfree.com). Post-traumatic stress disorder post-traumatic stress disorder is a mental illness that people remember repetitiously or have a dream of a terrible experience (post traumatic stress disorder 710). The explanation of post traumatic stress disorder mainly focuses on the way in which psychological trauma experience is affected. When a person is facing an overwhelming trauma, the brain can not handle information or emotion correctly (Cohen Web). Post traumatic stress disorder changes the body's response to stress. Hundreds of different types of psychiatric disorders, fourth edition are posted in the mental disorder diagnosis and statistics handbook. (DSM - IV) One of them is called post - traumatic stress disorder (PTSD). According to this study post-traumatic injuries usually experienced and witnessed life-thr eatening events such as military attacks, natural disasters, terrorist attacks, serious accidents and rape, and other violent personal attacks It will occur later (Harvard Women 's Health Watch, 2005).

Wednesday, November 20, 2019

Data Communication assignment - 4G Essay Example | Topics and Well Written Essays - 1000 words

Data Communication assignment - 4G - Essay Example It all started with 1st generation mobile communications that were focused on analogue means of communication, this was followed by 2nd generation which resulted in a total shift of medium from analogue to digital(Palanivelu & Nakkeeran 2009). Ever since the introduction of digital sources of communication there has been no looking back, and the current standings are at 3rd, 4th generation and beyond. Furtherance and change being natural phenomena, mobile communications have seen a revolution in the manner in which they are operate today. State of the art technology exists in the field of mobile communication that has made the once impossible, possible. 4G is a generic term that represents a family of number of standards that are around in use. The family encompasses all those elements that are beyond 3G, namely Wimax, L.T.E, Wimax 2.0, HSDPA, Advanced L.T.E and all other standards that fulfill the demands and specifications being presented by International Telecommunication Union (W ang, Kondi & Luthra 2009). 4G standards provide data rates nearly ten times higher 3G (Aktas & Ismail 2004) with focus on resolving the last mile issues once for all by reaching to even the most remote of areas across the globe. The most prevalent of 4G family is Wimax. It has been around for 6 to 7 years now and has made inroads into the market on commercial scale. More promise is being shown by L.T.E which is termed as the true representation of 4th generation technologies that will set the platform for coming generations in telecommunication world. The journey towards 4th generation technologies started with Wimax in early 21st century. Wimax is an acronym for World Wide Interoperability Microwave Access. It is another name for ubiquitous internet connection, be it on the go or under the roof. Work was in place for last few years and it was first introduced on commercial scale for public use in South Korea. Many more countries have joined the caravan and have implemented 4G on co mmercial scale. The recently published requirements for a true 4G system specified by I.T.U, demand more than Wimax and L.T.E initial versions offered, Wimax 2.0 and L.T.E Advanced fulfill the requirements being stated by I.T.U as the just members of 4th generation(Cox 2012). Wimax has made rapid progress in last few years and has a cluster scattered in various parts of the world already. Few of the companies that have implemented Wimax include Sprint, Etisalat, and Nexter to name a few. T-Mobile is aiming at L.T.E implementation on fully commercial scale in coming days. 802.16d vs. 802.16e: Improvements have been made in the Wimax technology periodically, the initially launched version was 802.16d which provided limited or no mobility. In order to capture large scale market and attract customers to itself, a new version 802.16e was introduced later in 2005 which provided ease of movement and had focus on mobility Features of Wimax: Wimax provides large number of features compared t o its predecessors and few of them are: OFDMA (Orthogonal Frequency Division Multiplexing Access): An interface aimed to overcome the short comings of OFDM, provides the feature of entertaining multiple users at the same time and brings about more stability and reliability in the network. The use of Fast Fourier Transform (F.F.T) by the incumbent allows increased number of bits being transformed from one source to another (spectral efficiency) .802.16d made use of OFDM while the later version (802.16e)

Tuesday, November 19, 2019

LP6- Juvenile Justice Assignment Example | Topics and Well Written Essays - 750 words

LP6- Juvenile Justice - Assignment Example However, some adverse effects may vary depending on the quantity consumed, the rate of body metabolism, and individual mood. Some of the most commonly abused drugs include marijuana, cocaine, heroin and alcohol (Bruce and Tracey 2-6). Marijuana is dry shredded leaves ranging from brown to green mixture of flowers stem and leaves of a plant termed as cannabis sativa. This type of drug in its resinous form is called hashish. Marijuana contains a chemical component known as tetrahydrocannabinol (THC), this chemical subjects the body it into euphoric state (feeling high). According to center of diseases and control (CDC), marijuana contains over 70% cancer causing substances compared to cigarettes and persistence use often lead to inflammation on the respiratory system. Several studies have also indicated that this drug causes abnormalities of the brain giving a leeway to diseases such as psychosis. In male, marijuana changes the structure of the formation of sperm cell and this may lead to infertility and it interferes with the menstrual cycle in women. The drug also causes abnormal cell division leading to premature births and is one of the leading causes of leukemia amongst newborn children. In conclusion, cannabi s increases the rate of heartbeat, interferes with the physical coordination and causes dizziness (Diane and Samantha 100). Cocaine falls amongst the addictive stimulant drugs generated from a coca plant mostly grown in South America. This drug in its processed form is known as crack. Cocaine drug is inhaled through the nostril or can be directly injected into the blood stream in form of solution. This drug increases the rate of heartbeat, nausea and enhances abnormal breathing patterns (Diane and Samantha 100). Even though cocaine is mainly associated with short term effects, its abusers often suffer from damaged nose cartilage thus leading to paranoia and abnormal breathing

Saturday, November 16, 2019

Cultural evolution Essay Example for Free

Cultural evolution Essay In his article â€Å"Where Do Social Relations Come From? †, Michael Grossetti discusses the ways that human relationships are studied by sociologists, citing that often the methodology begins by starting with the relationship ad working backward to define it (Grossetti,p. 289). The most lasting relationships are the ones that come from organizations, he concludes, especially those related to family and friends. When we related this conclusion back to cultural evolution theory, we can argue that the lasting relationships of this generation because at this point in time most relationships are forged out of organizations or via our families. However, we can clearly argue that once this may not have been true as people had longer term relationships with people in their neighborhoods and those with whom they had a physical proximity. Grossetti argues that neighborhoods do not provide a basis for lasting relationships as they do not necessarily share life values or interests which draw people together (p. 292). When discussing this assertion in relation to cultural evolution, we can argue that in the recent past, neighborhoods did share a commonality that is now missing – immigrants would tend to settle in neighborhoods, neighborhoods would be divided by racial or religious lines, or at the most tangential neighborhoods would be reflective of a certain socio-economic status. Now, according to Grossetti’s study, relationships have evolved to the point that people develop relationships based primarily on organizations which they belong to –church groups, work groups, or interest organizations. When this is combined with the use of social networks, it can be observed that people are then creating a new means to segregate themselves via their interests. People have developed a new means to identify people with like interests and create new association groups. The interesting aspect of this evolving form of meeting may be that it creates relationships among people who in previous generations may never even have met. Because social networking allows people with common interests to meet without the traditional introduction of a mutual friend, they may completely change the way relationship develop in the future, dovetailing nicely with the theory of cultural evolution.

Thursday, November 14, 2019

Stereotypes about Homelessness in America in Dumpster Diving by Lars Ei

Stereotypes about Homelessness in America in Dumpster Diving by Lars Eighner Lars Eighner's short essay, "Dumpster Diving," reveals the stereotypes about homelessness in America. In order to confirm these known stereotypes about American culture, Eighner includes autobiographical accounts of the economically inferior class, as well as revealing his elitist rules that governs the life of a homeless person. According to Eighner, homeless people fall into the following categories, 'can scroungers', 'Dumpster divers', and 'scavengers.' (Eighner, 1993). In addition, Eighner's blatant demonstration of his superiority to the people he scavenges from reveals his true character of snobbery. Although Eighner reveals that his chosen lifestyle was to live on another's refuge, he kept in accordance with his acts of superiority and snobbishness by excluding himself from the term "Dumpster Diving." Instead, he preferred to be called a "scavenger because of its frankness in the term." (Eighner, 1993). Furthermore, Eighner, explains that there are rules to abide by when successfully "scavenging" through dumpsters, "using the senses†¦knowing the dumpsters of a given area†¦. [and] Why was this discarded?" It is the explanation of the three guidelines Eighner asserts to be superior to 'can scroungers' (Homeless people who rummage through the dumpsters for money). The author further elaborates his snobbishness by revealing that he has tried the heinous lifestyle of "can scroungers," and deduced that only a few dollars could be obtained. Moreover, Eighner states, "one can extract the necessities of life from the dumpsters directly with far less effort than would be requir ed to accumulate the equivalent of cans." (Eighner, 1993). The author stereoty... ...ghner, 1993). It is the authors belief that consumers are aware of their consumption, as well as realize how wasteful they are with food in general For the students who do not fit into Eighner's wasteful category, he presents a grouping of frugal consumers who, "carefully wrap up even the smallest leftover[s] and shove it into the back of the refrigerator for six months or so before discarding it" (Eighner, 1993). Through the essay, "Dumpster Diving," Eighner impresses his superiority by illustrating disinterested people and their lack to complete certain tasks the author is skillful at. His disdain and impudence of students†¦ Eighner's autobiographical essay not only shows the degradation homeless people indure, but his personal snobbery of those around him Works Cited Eighner, Lars. Dumpster Diving. http://www1.broward.edu/~nplakcy/docs/dumpster_diving.htm