Friday, December 27, 2019

What is War and How Has It Affected Our World - 1538 Words

War is the strategic and organized conflict between two or more nations, countries, or groups. War is the inevitable aspect of human civilization and society as common disagreements and opinions often escalate at a parliamentary level leading to wide spread controversy between the opposing groups and eventually to war if a solution cannot be reached between the two groups. A good example of this was the widely known Second World War. Lasting between 1939 and 1945, World War 2 was the deadliest military conflict in history with over 60 million people killed alone. Adolf Hitler, the widely criticized Nazi leader of Germany at the time of World War Two, had different views than most of the Western World. His main objective was to serve the†¦show more content†¦This was mainly the reason why Germany poured massive funding and manpower into the further development of this technology and was able to harness the success earlier. Germany’s jet fighters and jet bombers were th e most feared air craft on the battlefield as the fighter jet was able to gun down on average five Allied fighter planes before being shot down. Rapid increases in the technologies of war and destructiveness like these are what made war so violent and bloodshed during the turn of the century. The scale that World War Two was fought on was much larger than that of the wars before the dawn of civilization. During this time, war was considered small scale as it was often between two small groups and was not recognized by any government or authority as there was none at the time. It wasn’t until the rise of state five thousand years ago that military activity started to happen all over the globe. The very first wars were fought with hand to hand combat often with improvised melee peripherals designed to injure the victim severely such as a spear. This was known as ancient warfare. Medieval warfare lasted from the beginning of the 5th century until the 15th century. The middle age s saw large cultural, social, and technological developments which changed the way war was fought into a more strategic and thought out procedure versus ancient warfare where there was rarely any strategy involved and armiesShow MoreRelatedThe World Of World War II1496 Words   |  6 PagesWorld War II was a global war that lasted from 1939 to 1945. It led to millions of deaths, and devastation across the world. Nazi Germany took control of many European countries, and Japan declared war on the United States. American soldiers were deployed and took action to protect the nation. The United States was in a constant limbo between being safe, and having war on its doorstep. Life for citizens, in the United States and other countries, was affected tremendously by the war, and has shapedRead MorePresident Dwight Eisenhower s Farewell Address Or His Warning1189 Words   |  5 Pageswarning. â€Å"We now stand ten years past the midpoint of a century that has witnessed four major wars a mong great nations...we yet realize that America s leadership and prestige depend, not merely upon our unmatched material progress, riches and military strength. (Eisenhower, 1961) Eisenhower states that we should be proud of our great country; however he warns us of the â€Å"military-industrial complex† that we will create and how it has now set its foot in American warfare. He urged that we build a strongRead MoreThe Secret War And How It Affected The Hmong People1230 Words   |  5 PagesTOPIC: The Secret War and how it affected the Hmong people. SPECIFIC PURPOSE: At the end of my speech, my audience will get a better sense of what the Secret War was and how it affected the Hmong people. INTRODUCTION: Just by the name itself, it can already be implied to what the â€Å"Secret War† was. It was a war that was kept as a secret from the public, and by public, I mean the American public. Many of you may wonder what exactly is the secret war, and I will explain that throughout my speech. ButRead MoreThe Day That Shook the World667 Words   |  3 Pages What comes to mind when you hear the word â€Å"bomb†? Is it the Boston Marathon tragedy? Is it the Pearl Harbor Bombing? How about the World Trade Center attack? All of these are major bombings that have happened in the U.S. Sadly, they aren’t the only ones. There have been numerous bombings that our world has survived, but that doesn’t mean we haven’t suffered from their outcomes. The devastation of war on our world is monumental. The atomic bombing of Hiroshima is an important event in history thatRead MoreWestern Culture : World War 2 : How Has It Affected Our Culture Today?1510 Words   |  7 PagesWestern Culture: World War 2: How has it affected our Culture Today? In the mid-twenties, the world was affected by a numerous amount of significant wars, but the one that I will be focusing on is known as World War 2 (WW2). WW2 started 21 years after World War 1 from 1939 to 1945. It was an extremely deadly war, one of the deadliest wars in war history to be exact. According to the textbook, Handbook for the Humanities during its six-year period the war left over seventeen million soldiers andRead MoreEach Event I Choose In The Timeline Was Accordingly Chosen1326 Words   |  6 Pagesfind one thing that you can relate to on a psychological level instead of just memorizing the plain facts of what happened because that way you can never forget it, it ll be less of an event, but more of an experience. The first one was the Somme, it s kind of hard to forget the Somme. I found this one wrapped around in my mind so tightly. The Somme was essentially a bloodbath war in world war 1. I find this one extremely significant as though many tried and failed and it was just a stalemate of bloodRead MoreAmerica s Involvement With World Terrorism1476 Words   |  6 PagesQaeda’s involvement with world terrorism can be traced back to 1993. After the United Sates embassy bombings in 1998 where over 220 lives were lost, the FBI put Bin Laden at the top of the ten most wanted list, offering a $25 million reward for his capture. In the year 2001 the United States was not engaged in any wars. Nobody knew about Al Qaeda and ISIS did not exist. But after the attacks on the twin towers it was clear what was happening, the U.S. would soon be going to war. On that late summerRead MoreThe Failing Fate Suffered in Rome, Nazi Germany, and the Fictional Ready Player One847 Words   |  3 Pagesperfect, without any flaws or worries? Well, thats what the Romans and what Nazi Germany thought, and where are they now? Gone. Thats where they are. Even in the fiction book, Ready Player One, they thought they were so tough, but not anymore. These Societies may have been powerful and wealthy, but they all suffered the same fate. Corrupt leaders, turned the society upside down. Poverty, affected the moral of the civilization, bringing it down. Wars destroyed the society, making it weak to attacksRead MoreEssay about Medical Advancements During World War Two650 Words   |  3 PagesMedical Advancements in World War Two. World War Two, a harsh period of time in the 1930s-1940s, filled with controversial arguments, political battles, fights to the death, but most importantly, medical advancements. Did you know that without the research and discoveries made during World War Two, our medical programs would probably be lacking the information we have today? It’s very true, and in my opinion, the war strengthened our medical abilities, and it really put our world to the test. New medicineRead MoreThe Atrocities of World War II1111 Words   |  5 Pagesatrocity of World War II was the Holocaust, but the real truth hides much deeper within. There were thousands of atrocities that occurred leading up to the war, within the years of World War II, and after the war. Many were unrecognized and undocumented and the stories of the dead still remain unknown. My purpose here is to tell the story of the men, women, and children that no one remember, or never even knew existed. The Holocaust was perhaps the most dramatic and well known atrocity of World War II because

Thursday, December 19, 2019

Disadvantages Of Drugs In Sports - 1102 Words

Today, sport is something that almost everyone is involved in or inspired by. When someone thinks of sport, what immediately comes into their head is winning. Nowadays, athletes are no stranger to the use of performance enhancing drugs in sports as a way to take shortcuts and beat the competition. The use of drugs in sports is wrong and creates an unfair advantage over everyone else. Moreover, it has many disadvantages and risks to the user which begs the question - what is the cost of using these drugs in sport? Performance enhancing drugs are on the rise in sports as they become more popular amongst athletes. However, most of them do not understand the threat involved in using these drugs. Performance enhancing drugs create many†¦show more content†¦Furthermore, another reason drugs should be not allowed in sports is due to the bad influence it could have on children. For children, sport is an enormous thing that consumes their life - from extracurricular activities, P.E classes at school, to parties involving sports like football. Due to their increased interest in sports, children are more likely to see and hear the news about these athletes taking drugs as acceptable practice and that it is ok for them to take them as the ‘adults’ are being allowed to. For instance, writer Jacqueline Stenson for NBC News states that, â€Å" Among students in grade 8 through 12 who admitted to using anabolic steroids in a confidential survey, 57% said professional athletes influenced their decision to use drugs and 63% said pro athletes influenced their friends’ decision to use them.† In addition to this, if they do go on to take these drugs, because of how young they are they have an even greater risk of ruining their body. As well as this, if children do start taking drugs at this young age, it will be a harder chain to break the addictiveness the drugs have on them. By allowing drugs in sports we are encouraging kids to be influenced to take drugs because of how athletes are acting. Also, it is showing children that you do not have to work hard and put time and effort into things to achieve something. Instead, you can just take shortcuts and easy ways out of things if you really want to be the best in what you do. With JacquelineShow MoreRelatedEssay about Steroids in Sports: Right or Wrong?947 Words   |  4 PagesSteroids in Sports, Right or Wrong? â€Å"We have to make some radical move to get the attention of everyone. Cheaters cant win and steroids have put us in the position that its OK to cheat.† (Lou Brock). Steroids in professional sports has became a major issue and has yet to be justified. Steroids boost the intensity of the game and provide the athletes with more agility and skill to play the game, but should it be fair to allow them? This would give some players an advantage in their sport over theRead MoreThe Commercialisation of Sport Essay633 Words   |  3 Pagesof Sport The commercialisation of sport is not wholly beneficial as it has many disadvantages to it. Commercialisation is the promotion and development of a product as a business within a market place. This is done by the use of sponsorship, funding, selling, publicity and advertising within the media, which is all rooted from money. People invest in sport not only for the success that comes from it, but for the great deal of money that can be made in the sport businessRead MoreUse of Steroids by Athletes Essay1538 Words   |  7 Pagessaid yes. As we can infer from the above survey, a large number of professional athletes are willing to risk their lives for the chance of victory and recognition. The controversy of doping in sports is centered on the use of drugs to increase speed, strength, intensity and endurance. Various sports regulating bodies such as the International Olympic Committee have banned certain performance-enhancing substances because of safety and fair play issues. However, many athletes feel that they haveRead MorePreventing PEDs in Professional Sports Essay1198 Words   |  5 PagesThe use of performance enhancing drugs (PEDs) among athletes in professional sports has caused an outrage all around the world for many years. The use of PEDs not only affects the athlete that chooses to use them, but also the athletes they are competing against, other teams, and the team or country they are representing (â€Å"Survey Reveals†). It is important for athletes to maintain a good reputation in competition, because they need to represent their team in a positive manner and not create suspicionRead MoreDrugs in Sport Essay1052 Words   |  5 PagesDrugs in sport The nature of sports promotes a strong desire to win, and many athletes will do anything to rise to the top. Every elite athlete wants to get an edge over their competition, causing many athletes to turn to performance enhancing drugs to gain this edge. Drug use in sport can cost players their super stardom dream career, but more seriously, their own lives. The wide-spread illegal use of drugs has eliminated the question of which athlete has the strongest raw power, to the questionRead MoreAdvantages and Disadvantages in Sport Technology Essay711 Words   |  3 Pagesand Disadvantages of Sport Technology Technology in sports is constantly changing in today’s era. This change is making a big impact, whether the technology is a disadvantage to the sport and slows down the speed of the game or uses the technology to an advantage and speeds the game up to help make accurate calls. People are always looking for the technology to be able to get ahead of other opponents. The use of technology has crept into the athletes’ games. Technology may not be a drug butRead MoreDoping is not Dope in Athletics664 Words   |  3 PagesDoping is Not Dope Should athletes be able to use performing enhancement drugs. Many athletes are trying to get a competitive edge on their competition and some start by taking performing enhancement drugs, even though taking them could be devastating and detriment to them personally. Using performance enhancing drugs comes with many risks physically and emotionally. Performance enhancing drugs is as known as â€Å"doping†. There are many kinds of steroids such as anabolic steroids, humanRead MoreSports Enthusiasts Love And Enjoy Watching Their Favorite Team Play1335 Words   |  6 PagesSports enthusiasts love and enjoy watching their favorite team play. The best student athletes have the prestige of representing and playing for their universities. These student-athletes receive various opportunities from their universities in order to continue pursuing their higher education. However becoming a student-athlete often has some disadvantages such as not getting paid for their hard work and dedication in the field. Having a poor academic achievement, consuming drugs and steroids, andRead MoreThe Legalization Of Steroids Should Be Beneficial For The World Of Sport1226 Words   |  5 PagesSteroids seem to to be having a negative view for much of history. Steroids are drugs used by athletes to become stronger and achieve a strong physique. Steroids are illegal and are strongly discouraged to be used and may be seen first expressed during high sc hool with the introduction of organized sport teams. The perspective against the legalization of steroids believes in the many benefits of legalization. The perspective for the legalization of steroid expresses the harmful effects of steroidsRead MoreEffects Of Performance Enhancing Drug Usage In Sports1056 Words   |  5 PagesPerformance Enhancing Drug Usage in Sports: Winning at any Cost Performance Enhancing Drugs are frequently used by sporting professionals, though major sports organizations have prohibited their usage as a result of the negative attributes and effects correlated with continuous intake of these drugs. Many nations are concerned by the flourishing amount of incidents during the usage of steroids advertised by the sports athletes. Professional athletes, such as baseball players, have been in the spotlight

Tuesday, December 10, 2019

Marx vs Gilman free essay sample

Marx argued that the goal of intellectual work such as his was to change the world; an opinion obviously shared by Gilman since she was also on a mission to change the world, for women. Gilman is known for her humanist-socialist perspective but, I believe that her theories also share a similar quality to Marx’s conflict theory. Whereas Marx sees the conflict, or class struggle, being between the bourgeoisie (the owners) and the proletariat (the workers); Gilman sees the conflict, gender struggle, between men and women. Marx advocated social reform for the proletariat (workers). The focus of Marx’s conflict theory is that by eliminating privilege, the overall welfare of the society can be increased. This would then create a true equality amongst members of a society. He argues that privileged groups are working to maintain their privileges, while the disadvantaged are constantly trying to attain more. The owners are making all the profit while the workers are, basically, trading their labor for bare necessities like food, shelter and clothing. Gilman advocated social reform to women, similar to that urged earlier by Marx to workers. She recognized the inequalities inherent in the social structure of the working world which excluded women from most jobs, confining them to the world of the home where they worked all day, every day; their only compensation being the roof over their heads. They had no income over which they had complete control; and this is the situation she called on them to remedy. Although Gilman was a feminist, she believed that both men and women were victims of the damaged social structure. Women are forced to lead restricted lives, and this serves to limit their human progress; while, men suffer from behaviors that their cultural habits of dominance and power have told them are social norms. Therefore, both are victims of the social norms created by society. This concept of â€Å"equality of blame† also parallels Marx. Although he advocated for the rights and equality of the mistreated workers, he also argues that the owners were victims of the overall social structure. Society created the social classes and deemed them normal; therefore, both the owners and the workers were only playing their designated roles. The main difference in the theories of Marx and Gilman is in how we will reach this social change they preach about. Marxist philosophy is based on revolution, while Gilman’s is based on evolution. Marx believed that, through class consciousness, the workers would eventually recognize they were being exploited, and put an end to privilege. That they would revolt against their oppressors and end Capitalism once and for all; and a new utopia of equality under Communism would emerge. While Gilman believed that, women would not have a revolution against the men, but we would â€Å"evolve† into equality. Society would over time, as women became more economically independent, balance its injustices. Then, women would finally be free to develop as individuals, and to offer their untapped resources to their families and society as a whole. So, in modern day society, if we have â€Å"evolved† or â€Å"revolted† into equality; why are women still paid less than men in the same jobs? What would Marx and Gilman have to say about the subject? Even in the 19th century, Marx pointed to the tendency for capitalism to make super-profits from the exploitation of women and children. He wrote: The labor of women was the first thing sought for by capitalists who used machinery. † (Marx, Capital) He would argue that the capitalists constant attempt to increase the rate of profit, has led to the ever increasing employment of women. The capitalist system regards women merely as a convenient source of cheap labor. Since, in the past, women were conditioned by class society to be politically indifferent, unorganized and passive; they are easily taken advantage of. They believe that women won’t complain like the men do, because they are weaker. Therefore, they can pay them less and increase their own profit margin without hassle. And, despite all the talk about a womans world and girl power, and despite all the laws that supposedly guarantee equality, women workers remain the most exploited and oppressed section of the proletariat. Gilman would, no doubt, rejoice in the fact that so many women are out of their homes, in the work force, and independent from men; regardless of any pay differences. And, she would surely embrace the idea of â€Å"woman’s world† and â€Å"girl power†; and see this as proof that she was right and that women were evolving. I theorize that she would be less concerned with the pay differences as long as women could still be economically important and independent. But she would see the pay differences between men and women as yet another stumbling block on the way to equality; another way that the patriarchal society is oppressing women by showing their power and dominance as men.

Tuesday, December 3, 2019

Sex, Lies and Conversation Why is it so Hard for Men and Women to Talk to Each Other Essay Example

Sex, Lies and Conversation: Why is it so Hard for Men and Women to Talk to Each Other Paper From the beginning of history of humankind gender differences have been one of the most fascinating topics for the philosophers, and scientists. Tons of books were written on this topic, and thousands of movies were filmed, but still, the secret of the relationship between men and women hasnt been revealed. The only thing that all of those books, articles, and movies achieved, is that nowadays people are certain that men and women are totally different. Some science fiction writers even made an assumption than males and females are different species, which need each other in order to reproduce.It’s a obvious that language is one of the main means of communication humans use. Some researchers presume that it is language that creates most of misunderstandings between females and males. The reason is that men and women express their thoughts differently, using different verbal and non-verbal means.Lets review the most uncomplicated example, a situation described in Samuel Shems b ook We Have to Talk: Healing Dialogues Between Men and Women. He writes about the workshop organized for couples to improve their communicational skills with the opposite gender. When the organizers of the workshop asked the group to break into the same-gender groups, people looked relieved. When, afterwards, they were given the task, groups of woman and groups of man behaved themselves differently: men shook hands, sat down, and began to write their individual answers, while woman started to talk noisily in small groups, laughing, and waving hands (1999, p.14).;Analyzing this observation we can conclude that women are more into group decisions, while men prefer the individual ones. Moreover, woman express more emotion while trying to solve a problem, they have lots of associations connected with it, which they tend to express immediately. Consequently, it is no wonder that the communication between the representatives of two genders is so complicated sometimes. The strategies of co mmunication men and women use are different, so that it is not easy for them to understand each other.Nevertheless, an objection appears concerning the statement that man tend to talk less than women do. Deborah Tannen illustrated it in her article Sex, Lies and Conversation; Why Is It So Hard for Men and Women to Talk to Each Other? She described the situation which happened in one of her workgroups. The group of woman invited men to join them, and, throughout the evening, one man was particularly talkative, and his wife sit silently beside him. When in the end of the evening the author concluded that women frequently complain that their husbands dont talk to them, this man agrees to her, and said that his wife was the a chatterbox in their family. The author concluded that: although American men tend to talk more than women in public situations, they often talk less at home. And this pattern is wreaking havoc with marriage. (1990).Its true that many women feel their husbands talk too little to them. The situation when a husband comes back home from work, and has nothing to say to his wife, is frequent in American families. The researchers have different opinions about the origins of this fact, but it is most likely that men just dont have common topics with their wives. They know what topics they should cover when they communicate with their colleagues, regardless of their gender, also they have lots of thing to talk about with their friends, but men often just dont understand what they should discuss with their women.Deborah Tannen proposes a very convincing explanation for this fact. She says that:For males, conversation is the way you negotiate your status in the group and keep people from pushing you around; you use talk to preserve your independence. Females, on the other hand, use conversation to negotiate closeness and intimacy; talk is the essence of intimacy, so being best friends means sitting and talking. For boys, activities, doing things togethe r, are central. Just sitting and talking is not an essential part of friendship. Theyre friends with the boys they do things withIt is also that for men communication means exhibiting information, which is the mean of maintaining social status. On the contrary, women see communication as transferring emotions and attitudes (2001, p.55-57). Thus men and women often just dont understand what their partner wants from them.The social status of women is usually different from that of men, thus they earn it be the means different from that men use. It is not obligatory for woman to convey information when she talks to somebody. She is more into transferring her feelings, emotions, and attitudes. In the same time, women who purport on the social status same to that males have, she has to change her communicational style.Despite of the gender and sexual revolution that have taken place in our society during the past century, men still take most of the highest positions worldwide. Thus the r equirements a human being has to fulfill for to get the high status are also set by males. As we have already noted, for men conveying information is the mean of maintaining social status. Thus, a woman who claims to have a high social status also has to learn to talk like men do. The observations indicate that lots of women are able of taking possession of this skill, in the same time being able to communicate in the feminine style. Unfortunately, little man care enough for to try to learn to talk like women do, as it is disrespected among males.J.B. Priestly, the English writer, has an opinion somehow different from that discussed above. He states that:[Women] remain more personal in their interests and less concerned with abstractions than men on the same level of intelligence and culture†¦. It is the habit of men to be overconfident in their impartiality, to believe that they are god-like intellects, detached from desires and hopes and fears and disturbing memories, general izing and delivering judgment in a serene mid-air (1926).Thus women mostly prefer to talk about the mundane things, like cooking, gardening, or clothes, while men usually cover topics like freedom, governing or philosophy. Women rarely convince their surroundings that their opinion is the only true. It is also that women can communicate freely if their views on many things differ.For man the situation is different. Males mostly talk with those, who agree with them in the majority of points. If the situation is different, they either try to persuade their opponent, or just stop communicating with him or her. For men conversation is often a form of a contest, while women perceive as one of the means of establishing and maintaining a relationship.This difference in perceiving communication is the reason for most of the misunderstandings men and women have. Those misunderstandings can ruin a marriage, or friendship. They also can create severe troubles during the working process. Solvin g them is a vital task for maintaining peace and understanding in ones life.Considering all the facts and theories listed, it is no wonder that men and women often have troubles talking. The reason for that is that they pursue different goals during this process, and their strategies are also different. Nevertheless, there are happy couples, both family and professional ones, who develop their own strategies of conveying their thoughts, ideas and emotions to each other. Likewise there are men and women who have close friends among the representatives of the opposite sex. Thus we can conclude that successful communication between man and woman is actually possible, and that we just have to spend a little time and effort for designing the one that will suit our specific case, as there are no decisions that suit all in this sphere.

Wednesday, November 27, 2019

Calvin And Theocracy Teaching Essays - Forms Of Government

Calvin And Theocracy Teaching When we think of a theocracy, we usually think of a political system, governed and legislated by a religious body with religious beliefs. For the most part this is true. Historically, theocratic governments have successfully existed throughout the world, from ancient Egypt to modern Middle-Eastern Islamic states. For centuries even the Christian Church enjoyed a theocratic diversity which encompassed most of the civilized world. As well, the unprecedented spread of Islam has seeded new theocracies at a tremendous rate. Most theocratic governments had one thing in common, however; their political ideologies did not just originate from the church, they were the church. Church leaders were the political leaders. Typically, a strong theocracy was one with a superior church hierarchy in which the political system was deeply entrenched. But not all theocratic structures were intended to be this way. In Chapter XX of his masterpiece The Institutes on Christian Piety, John Calvin logically outlined his view of a theocracy. Consistent with his scripture-based reasoning, Calvin eloquently described how civil and ecclesiastical governments were different, yet uniquely related. In his classic reformation style, Calvin metaphorically compared Catholic to Protestant theology by framing his theocracy not on the church as the government, but rather he separated civil government from spiritual government into a divinely ordained, segregated Protestant theocracy. Subtlety expressed and masterfully executed, Chapter XX is dripping with figurative language, suggesting that Calvin went to great lengths to insure that his distaste for the Catholic papacy would not go unnoticed. The first third of Chapter XX concentrates on the duties and responsibilities of the magistrate. This after two opening sections which clearly divide government into two parts, and then claim these parts not to be antithetical. Indeed such a preamble is necessary since the remainder of the document is to be a separation, yet cross-self-reliance on these parts. Calvin made no attempt to separate local, regional, or national magistracy. In fact, most of the scripture references are Old Testament passages which refer to either the kings of Judah, or other post-king patriarchs. The main focus on the magistrate "is that they have a mandate from God, have been invested with divine authority, and are wholly God's representatives." In addition, God has "entrusted to them" the authority "of exercising judgement not for man but for God." This sounds very theocratic. However, no where did Calvin mention the source of this divine position to be the church. Rather he asserted, quoting Psalms 2:12, that the magistrate should "kiss the Son of God" yet not lay aside their authority. With this he follows, "By these words he entrusts the condition of the church to their protection and care." Calvin clearly separates the church from directly engaging in the politics related to the office of the magistrate. By assigning to the church the responsibility of caring for the magistrate, Calvin allows the church to be associated with government while not actually becoming part of the government, as his Catholic adversaries did. Beyond divine appointment, however, Calvin also outlines the duties of the magistrate in a way which uniquely joins the government to God. Calvin continued his blend of civil and spiritual government through a discourse on the duties of the magistrate, issues of war, and the levying of taxes. On the duties of the magistrate, for example, he returns to the question of divine appointment. "And that their sole endeavor" Calvin asserts "should be to provide for the common safety and peace of all." Continuing, he states that, "in administering punishment, [the magistrate] does nothing by himself, but carries out the very judgements of God ." In this, Calvin begins to solidify his argument concerning the divine nature of the magistracy. It is no coincidence, however, that he includes no reference which joins the magistrate to the corporate church. Supported by additional references to Old Testament kings, Calvin implies that it is inappropriate for the magistrate to be a church leader, in that King David, for example, had priests dedicated to occupying those positions. On the topic of war, Calvin makes his position crystal clear. "But kings and people" Calvin states, "must sometimes take up arms to execute such public vengeance." Calvin views war as a "lawful" undertaking, as long as the magistrate follows some fundamental Godly guidelines, namely restraint and humanity. On restraint, Calvin warns the magistrate against, "giving vent to their passions, even in the slightest degree, not giving in to headlong anger, or be[ing] seized with hatred." In a continuing effort to weave into his discourse his dislike for the papacy, Calvin follows with a

Saturday, November 23, 2019

a civil war essays

a civil war essays A civil war that has raged for seven years in the small West African country of Sierra Leone has turned increasingly brutal. (1, p.1) Rebels are mutilating civilians without much response from the international community. A strong Nigerian contingency has tried to suppress the rebellion, but the rebels continue to cause major trouble in Sierra Leone. The rebels overthrew President Ahmad Tejan Kabbah. However, President Kabbah returned to office on March 10, 1998 to face the task of restoring order to a demoralized population and a disorganized and severely damaged economy. (2, p.1) The country of Sierra Leone is located in western Africa between the countries of Guinea and Liberia, and it borders the North Atlantic Ocean. The actual area of Sierra Leone is slightly smaller than the U.S. state of South Carolina. The population of Sierra Leone is about 5,080,000 people. Its legal system is based on English law and customary laws indigenous to local tribes. Sierra Leone's government consists of three branches, the executive branch, the legislative branch, and the judicial branch. President Ahmad Tejan Kabbah was inaugurated March 29, 1996, and President Kabbah is both the chief of state and the head of government. The president's tenure of office is limited to two five-year terms. On May 25, 1997, disgruntled army personnel under the command of Major Johnny Paul Koroma overthrew the democratically elected government of President Ahmad Tejan Kabbah. (2, p.1) After President Kabbah was overthrown, he fled to exile in the neighboring country of Guinea. In Guinea, President Kabbah remained in the city of Conakry. The coup leader, a relatively unknown army major named Johnny Paul Koroma, declared himself the new head of state and invited fellow rebel leader Foday Sankoh to join the government. (3, p.1) During the rebel invasion, the rebels seized the legislature, burned the national treasury, and raided the capital of Fr...

Thursday, November 21, 2019

Statement of purpose Personal Example | Topics and Well Written Essays - 250 words

Of purpose - Personal Statement Example I believe that if one were to ask any of my friends to describe me, the first thing that would come to their mind is that I am a proactive, responsible and an ambitious woman. I have always thought that one of my most distinguishing qualities is the positive energy in me. I always try to push things further to get the best out of it. Even when sometimes I thought I failed, I could only look at the failure as another chance to make things even better. In my opinion, my children are what inspires me the most to be this way. Being a mother of five is definitely not an easy task and requires all the skills in the world. I believe I am family oriented. With this firsthand experience, I deem myself well fit for the counseling and psychology field. The skills from my life experiences have given me an opportunity to help people who are faced with various psychological problems. I did my undergraduate studies in social sciences. However, I have always thought of management and leadership to be very important in all aspects of life. It is important in small households as much as it is in big corporations. My grandmother used to say what I always thought of as a great saying, which goes something like â€Å"Governance is the salt of the earth†. I have decided to apply for a MBA degree because I believe it would guide me in the right path and give me the skills that I need to enter the world of business. I have always felt that I have the qualities of a leader, and all I need is the knowledge of how to implement those qualities in favor of the advancement of any business. I believe that the combination of different fields of study with enthusiasm is imperative for counseling. The skills that I have acquired through my experience provide a credible platform for me to study counseling. If I am given the opportunity to pursue this course, I will apply the same determination in completing it to the best of my ability. In my country, Saudi Arabia, there is a big notion

Wednesday, November 20, 2019

Ethics for Professionals - Professionals & Deception (Philosophy Essay

Ethics for Professionals - Professionals & Deception (Philosophy Topic) - Essay Example Ironically though, Nyberg (1993, p. 7) observes that despite all these public condemnations against lying and deception, everyone is actually privately culpable of it. Why so – he furthers that perhaps it is necessary to maintain equilibrium in people’s social relations, or possibly, it gives credence to moral decency. Meaning, although lying and deception is publicly acknowledged to be an immoral professional act, certain circumstances may compel or warrant professionals to resort to lying and deception. As Englehardt & Evans (1994) suggests, there are some instances when outright lying may be morally right and there may also be some instances when the simple act of not divulging information is morally wrong. Such is the heart of the matter – Is lying and deception justified in the conduct of one’s profession? Are professionals ever justified in, or even compelled to lie to or deceive their clients?  If so, in what context would this be morally permissible? If not, why? Is outright  lying worse than deception in the professions? Why would it be or would it not be? Is a professional ever entitled to lie to his/her  client, or to other people to protect the client? Such are seemingly easy questions? There may not be correct or wrong answers to them. Nevertheless, the issue of lying and deception in profession is one of the gray areas in professional ethics that warrant further inquiry and discussion. From the following definitions of lying – ‘No liar preserves faith in that about which he lies†¦ wishes that he to whom he lies have faith in him, but†¦ does not preserve faith by lying to him’ (Chisholm & Feehan 1977, p. 152); ‘A person lies when he asserts something to another which he believes to be false with the intention of getting the other to believe it to be true’ (Kupfer 1982, p. 104); ‘A person lies when he asserts a proposition he believes to be false’ (Fried 1978, p. 55); Lying is ‘making a statement believed to be

Sunday, November 17, 2019

Belmar beach Essay Example for Free

Belmar beach Essay Being from the jersey shore there is many options to choose from, but Belmar beach is the most beautiful and exciting beach. Every time you go to Belmar beach there is always someone new to sit down and have an ice cold drink with. Belmar is also known to have the best over-head waves that look smooth and glossy from the sun reflecting off the water. My favorite place to hangout is at Belmar beach on a hot sweaty day with a cool ocean breeze filled with a lot of variety of people. Belmar beach is always filled with tourist from all over the world, who tend to make the beach look filthy and covered with trash everywhere. However, on its lonely deserted days its impeccability is hard to miss. The sunlight gleaming off the ocean surface onto the lightly shaded grey boardwalk. Having a loud atmosphere as well, it’s hard to say that one won’t get distracted a little with its blissful music surrounding you corner by corner. On the contrary, when in need for a serene soothing place, Belmar can contain one of the most nerve-calming areas such as its Cafes or its nearby vast lake. My favorite days to go to Belmar beach is on a hot peaceful day with huge over-head waves that are smooth to surf. I like to sit in the water looking and listening to the peaceful waves crashing onto the jetti spraying mist in the air. After having a work out in the water from the ferocious waves and powerful currents there are many restaurants to choose from that have amazing scenery of the beach and with food that is ridiculously good. However, you can also get the softest and most delicious mouth melting ice cream right on the boardwalk. Furthermore, Belmar is filled with thrilling and exciting activities to do on the most boring and tiresome days. To begin with, individuals who are into the sport of surfing can be fascinated with its graceful dominate blue waves. For the people who prefer fishing, its resourceful waters contain one of the most beautiful fish in the seas. Now for the more reserved people who like to keep to themselves, quiet and peaceful spots are available. Since any type of environment can be seen inhabiting Belmar, not one type of individual will stand out. Overall, Belmar beach has everything to offer with the beautiful beach, amazing memories, and filled with many exciting activities to do. Going to Belmar beach will keep you occupied the entire day, filling your emotions with joy and excitement. Belmar will also give you amazing views of the ocean’s waves perpetually crashing onto the damped sand. Ultimately, making Belmar the most tranquil and relaxing beach to go to.

Friday, November 15, 2019

Competition in the coffee industry

Competition in the coffee industry INTRODUCTION Today we stand witness to a new coffee era, one made up of Caffe Lattes, Espresso Macchiatos, Cappuccinos and Frappuccinos. Specialty Coffee is here to stay and no one will be more eager to tell you that than Howard Schultz, CEO of Starbucks, the worlds largest specialty coffee bar. The study of Starbucks Corporation leads one on a multifaceted journey through an organizations insinuation into a culture, its dominance of a market and its creation of a brand synonymous with loyalty, integrity and longevity. Ever since it first spread through the Moslem world in the sixteenth century, coffee has played a pivotal role in society by providing meeting places for intellectuals from all sides of life to converge. As coffee was slowly introduced to the European world it was recognized for both its sociability and its taste. Soon Coffee houses were prevalent throughout Europe and were the natural locations for political, literary and societal debate. It crossed the Atlantic Ocean in the mid-seventeenth century and replaced beer as New York Citys favorite morning drink. Starbucks Corporation is an international coffee and coffeehouse chain based in Seattle, Washington, United States. Starbucks is the largest coffeehouse company in the world, with 16,635 stores in 49 countries, including 11,068 (6,764 Company Owned, 4,304 Franchised) in the United States, followed by nearly 1,000 in Canada and more than 800 in Japan. Starbucks sells drip brewed coffee, espresso-based hot drinks, other hot and cold drinks, snacks, and items such as mugs and coffee beans. Through the Starbucks Entertainment division and Hear Music brand, the company also markets books, music, and film. Many of the companys products are seasonal or specific to the locality of the store. Starbucks-brand ice cream and coffee are also offered at grocery stores. Michael E. Porter provided a framework that models an industry as being influenced by five forces. The strategic business manager seeking to develop an edge over rival firms can use this model to better understand the industry context in which the firm operates. Porters Five Forces of Competitive Position: Industry Rivalry The dynamics of the industry rivalry within the specialty coffee industry has changed dramatically since 1987. Unlike the early days of the specialty coffee industry when Starbucks competed primarily against other small-scale specialty coffee retailers they now compete against companies of varying sizes and different exposures to specialty coffee. Starbucks competes with a variety of smaller scale specialty coffee shops, mostly concentrated in different regions of the country. All of these specialty coffee chains are differentiated from Starbucks in one way or another. Coffee Bean competes with Starbucks. They are similar to Starbucks in their attempt to create a third-place but distinguish themselves by creating an entirely different atmosphere. Where Starbucks strives to create an upscale European atmosphere, Coffee Bean tries to implement a more American feel to their coffee houses. Often they will use knotty pine cabinetry, numerous fireplaces and soft seating. Also they offer a barrage of magazines and newspapers as well as the guarantee of speedy service and free refills. In addition, they offer free WiFi, drive through accessibility and meeting rooms for rent. Through their subsidiary VKI technologies, they have become the world leader in the design, manufacture and distribution of coffee making equipment and related products. In addition to these smaller scale specialty coffee companies, Starbucks must now compete against two of the largest companies in the fast food industry who have recently entered the specialty coffee segment. The first of these competitors is Dunkin Donuts, who claims to be the worlds largest coffee and baked goods chain. Currently, Dunkin Donuts operates about 5,500 franchises around the United States, 80 stores in Canada and 1,850 throughout the rest of the world. In the past couple years the franchise has put enormous emphasis on their coffee beverages. They serve coffee beverages in an assortment of types and styles including espresso, cappuccino and latte. They also serve their coffee in an assortment of flavors including French Vanilla, hazelnut, cinnamon and numerous others. The largest industry rival currently facing Starbucks is the McDonalds restaurant fast food chain. McDonalds originated from a single San Bernardino, California hamburger stand, which opened in 1948, and has turned into what is now the worlds largest restaurant chain with over 14,000 restaurants in the United States alone. The key to McDonalds success has been the consistent quality standards they achieve for their food, coupled with their quick service and low prices. 10 years ago Starbucks and McDonalds were at complete opposite ends of the spectrum in the restaurant industry. However, McDonalds, encouraged by the success of its upgraded drip coffee, began testing numerous drinks sold under the name McCafe. Starbucks meanwhile, with its rapid expansion, was adding drive-through windows and numerous breakfast sandwiches, similar to the Egg McMuffins served at McDonalds, to their stores. These measures have drawn the two companies closer together as competitors due to an encroachment into the demographic consumer base made by each company. In summary, the current impact of the industry rivalry force created by the competition between specialty coffee retailers is very high, especially as contrasted to what it was at the time of Starbucks rapid expansion twenty years ago. The growth of the industry has slowed while the number of competitors within the industry has increased. Both of these factors, in addition to Dunkin Donuts and McDonalds high strategic stakes in the specialty coffee industry, have caused this change from weak to strong industry rivalry. Potential for New Entrants Another of the five forces in Porters model, which has changed significantly since the late 80s when we analyze the current environment in which Starbucks competes, is the potential for new entrants. As stated earlier, the primary deterrents to entry in the specialty coffee industry are the various barriers to entry. The economies of scale within the specialty coffee industry have increased as the size of the top players has increased. Companies such as Dunkin Donuts and McDonalds have national distribution channels through which they can transport their specialty coffee at a relatively low cost compared to potential new entrants who have no such developed distribution systems. These larger companies are also able to economize on their accounting operations and marketing budgets by facilitating their specialty coffee operations from the same department as for all segments of their businesses. Finally, these larger corporations are also able to reap economies of scale through their purchasing by negotiating long term contracts with coffee farmers and purchasing coffee beans in bulk quantities at discount prices. There is numerous cost disadvantages imposed on new entrants that are independent of the economies of scale considerations. As the industry matures, the ability to access distribution channels and select from the highest quality coffee beans has becoming increasingly difficult. Most of the favorable store locations within the larger metropolitan areas have already been occupied by current competitors within the specialty coffee industry. Additionally, many companies now have proprietary product technology involved in the production of their specialty coffee as well as lower per unit costs due to an experience curve. Product differentiation within the specialty coffee industry has moved away from the purely objective and defined traits such as the taste of the coffee, convenience of the stores and prices charged. The industry has progressed toward more subjective traits such as the ambience of the store, the social responsibility of the company and brand identification. Many companies have gained very loyal customer bases stemming from their past advertisements, customer service, objective product differentiations and early entry into the industry. All of this makes it more difficult for new entrants to gain a solid customer base. From the analysis above, it can be ascertained that the barriers to entry in the specialty coffee industry have increased substantially. As a consequence, the potential threat of new entrants has gone down. Since, the industry does not have large capital requirements, smaller specialty coffee shops are still prevalent throughout the United States and the potential for more of them to enter the industry is still present. However, these new entrants can be disregarded given the unlikely nature of their concerted expansion and the inconsequential effects they have singly on the overall demand in the consumer market. Substitute Products The force created by substitute products in the specialty coffee industry has decreased. Many companies that presented the specialty coffee industry with a threat in the form of substitute products have actually entered the industry and now compete directly by offering their own premium coffee selections. The primary substitute products still posing a threat to the specialty coffee industry are the caffeinated soft drinks offered by Pepsi and Coca-Cola. However, even these substitute products pose little threat to the premium coffee industry. In the past five years, studies done on the percentage of meals or snacks that included a carbonated soft drink as opposed to coffee have shown a reversal in consumer preference. Coffee has gradually gained preference over carbonated soft drinks. This is mostly attributed to the health concerns associated with carbonated soft drinks and the new evidence showing coffee as a relatively healthy alternative. Supplier Bargaining Power With the extensive growth in the specialty coffee industry, supplier bargaining power has changed in numerous ways. In 1987, when the first Starbucks was conceived, the farmers from whom Starbucks purchased its premium coffee beans were numerous, small and unconnected to one another. Currently, many of the farmers who sell to Starbucks and other premium coffee chains are united by an initiative known as fair trade certified coffee, which was organized by TransFair USA. Under this initiative, companies such as Starbucks are given the opportunity to advertise their coffee as being fair trade certified if they purchase from coffee suppliers that are democratically owned cooperatives. This initiative was designed to ensure that the coffee farmers would be compensated fairly for their crops. Their increased unity under this initiative worked as a positive externality by increasing their ability to exert bargaining power over their buyers. The fair trade coffee certification is looked at by consumers in their decision of where to purchase their premium coffee. Thus, although the farmers are still numerous and small they are now connected through the initiative launched by TransFair USA and act in some respects like one large entity. Although the farmers of premium Arabica beans are still in constant competition with the substitute Robusta coffee bean growers, their bargaining power is not significantly diminished by this threat due to the unlikelihood of a big premium coffee retailer adopting the substitution. When Starbucks first began purchasing premium Arabica coffee beans in the late 1980s, they executed purchases incrementally throughout the year. Currently, they lock their coffee suppliers into long-term contracts to dilute potential price volatility. These contracts have stipulations within them which place a financial burden on the coffee suppliers if they choose to supply a different company. By creating these switching costs for the premium coffee suppliers, Starbucks has diminished their ability to play one buyer against another, which decreases their bargaining power. A last component to the analysis of supplier bargaining power within the current specialty coffee industry environment is the threat of forward integration. Technically, the farmers can forward integrate by setting up smaller coffee shops and brewing their own batches. This is, however, extremely unlikely and has yet to occur. When comparing the bargaining power of suppliers today in the specialty coffee industry to the bargaining power of suppliers during the late 1980s, it is apparent that suppliers are more powerful today. The increased unity among the coffee farmers, decreased significance of specialty coffee retailers purchases as a proportion of premium coffee bean sales and increased importance placed on high quality coffee beans by the purchasers have all acted to increase the bargaining power of the supplier group. Although Starbucks has locked some of the coffee suppliers into long-term contracts not all suppliers are affected; thus, the supplier bargaining power is only ma rginally diminished by that tactic. Bargaining Power of Buyers The last component of Michael Porters five forces analysis to be applied to the modern specialty coffee industry is the force created by the bargaining power of buyers. The primary buyers in the specialty coffee industry remain individual consumers, who neither engage in concerted behavior nor individually purchase in large volumes relative to the total sales of a corporation such as Starbucks. Unlike the late 1980s, however, there are a few buyers who purchase in large volumes. These large buyers are typically other multinational corporations who choose to serve Starbucks brewed coffee in their offices. However, the effects of losing one of these buyers to a competitor would not be detrimental to a company with a large sales volume such as Starbucks. Neither the individual consumers nor the multinational corporations who purchase specialty coffee commit a significant fraction of their resources to these purchases. This makes the buyers less sensitive to price fluctuations and gives the players within the specialty coffee industry more control over pricing. This acts to decrease the bargaining power of both the buyer groups. The expansion of the specialty coffee industry created a wider array of competitors who offered high quality specialty coffee. This made it much harder for the players in the specialty coffee industry to differentiate themselves through quality and turned quality into the industry standard. In addition to the increasing quality standardization which specialty coffee has undergone, the buyers face no switching costs and have an enormous selection of retailers from whom they can buy. The buyers of specialty coffee do pose a credible threat of backward integration. This threat can be carried out if a buyer chooses to start a mom and pop specialty coffee store in close proximity to an established specialty coffee store. Same-store sales are roughly 20% lower in Starbucks stores located within a two block vicinity of mom-and-pop specialty coffee stores. The ability of buyers to backward integrate is enhanced by the availability of all information regarding the demand, market pricing, and supplier costs in the specialty coffee industry through sources such as the World Wide Web. With full information, the buyer is in a better position to ensure that they pay a favorable price and receive an appropriate level of quality from the product. The amount of bargaining power that can be exerted by the buyers within the specialty coffee industry has increased as a result of the availability of information regarding market variables. This along with the other previously discussed changes to the dynamics of buyer bargaining power has increased its overall magnitude from the level it was at in the late 1980s. Limitations of Porters Five Force Model Porters model is a effective tool used to identify whether new products, services or businesses have the potential to be profitable. However it can also be very illuminating when used to understand the balance of power in other situations. Porter argues that five forces determine the profitability of an industry. At the heart of industry are rivals and their competitive strategies linked to, for example, pricing or advertising; but, he contends, it is important to look beyond ones immediate competitors as there are other determines of profitability. Specifically, there might be competition from substitutes products or services. These alternatives may be perceived as substitutes by buyers even though they are part of a different industry. An example would be plastic bottles, cans and glass bottle for packaging coffee for Starbucks. There may also be potential threat of new entrants, although some competitors will see this as an opportunity to strengthen their position in the market by ensuring, as far as they can, customer loyalty. Finally, it is important to appreciate that Starbucks purchase from suppliers and sell to buyers. If they are powerful they are in a position to bargain profits away through reduced margins, by forcing either cost increases or price decreases. This relates to the strategic option of vertical integration, when Starbucks acquires, or mergers with, a supplier or customer and thereby gains greater control over the chain of activities which leads from basic materials through to final consumption. It is important to be aware that this model has further limitations in todays market environment; as it assumes relatively static market structures. Based originally on the economic situation in the eighties with its strong competition and relatively stable market structures, it is not able to take into account new business models and the dynamism of the industries, such as technological innovations and dynamic market entrants from start-ups that will completely change business models within short times. For instance, coffee and soft drinks is often considered as being highly competitive. The industry structure is constantly being revolutionized by innovation that indicates Five Forces model being of limited value since it represents no more than snapshots of a moving picture. Therefore, it is not advisable to develop a strategy solely on the basis of Porters models Haberberg and Rieple, but to examine it in addition to other strategic frameworks of SWOT and PEST analysis. Nevertheless, that does not mean that Porters theories became invalid. What needs to be done is to adopt the model with the knowledge of their limitations and to use them as a part of a larger framework of management tools, techniques and theories. This approach, however, is advisable for the application of every business model. CONCLUSION Any company must seek to understand the nature of its competitive environment if it is to be successful in achieving its objectives and in establishing appropriate strategies. If a company fully understands the nature of the Porters five forces, and particularly appreciates which one is the most important, it will be in a stronger position to defend itself against any threats and to influence the forces with its strategy. The situation is fluid, and the nature and relative power of the forces will change. Consequently, the need to monitor and stay aware is continuous. Some issues during the implementation of these Five Forces are crucially important for organizations to build long-term business strategy and sustaining competitive advantages rather than simply list the forces. Successful use of the Porter Model Analysis includes identifying the sources of competition, the strength and likelihood of that competition existing, and strategic recommendations for the action a company should take to in order to develop barriers to competition. Having applied Michael Porters five forces model to the specialty coffee environment which confronted Starbucks in 2007, a conclusion can be logically derived regarding how the proportional effects of each force on the competition within the specialty coffee industry has changed since 1987. Specifically, the force created by industry rivalry has gone from one grounded in strategies of differentiation and focus while discouraging price wars to an extremely competitive environment where differentiation is increasingly difficult and price wars are looming. The strength of the force imposed by the potential for new entrants has decreased as a result of more formidable barriers to entry. The bargaining power of both suppliers and buyers has increased as a result of increased unity among the suppliers and the accessibility of information to the buyers. The threat of substitutes is still insignificant given the continued declining sales of carbonated soft drinks compared to coffee and speci fically specialty coffee.

Tuesday, November 12, 2019

Computer Ethics and Information Systems

â€Å"Computer Ethics and Information Security† a. Introduction The consideration of computer ethics fundamentally emerged with the birth of computers. There was concern right away that computers would be used inappropriately to the detriment of society compromising information security, or that they would replace humans in many jobs, resulting in widespread job loss. Ethics- Guidelines or rules of conduct that govern our lives, work, behavior and communication in both public and private undertaking. Ethics are a set of moral principles that govern an individual or a group on what is acceptable behaviour while using a computer.Computer ethics is a set of moral principles that govern the usage of computers. One of the common issues of computer ethics is violation of copyright issues. Duplicating copyrighted content without the author’s approval, accessing personal information of others are some of the examples that violate ethical principles. Security – is the deg ree of protection to safeguard a nation, union of nations, persons or person against danger, damage, loss, and crime. Security as a form of protection are structures and processes that provide or improve security as a condition.Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction Computer Ethics- is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct. b. Discussion Computer Ethics Ethics deals with placing a â€Å"value† on acts according to whether they are â€Å"good† or â€Å"bad†. Every society has its rules about whether certain acts are ethical or not.These rules have been established as a result of consensus in society and are often written into laws. When computers first began to be used in society at large, the absence of ethical s tandards about their use and related issues caused some problems. However, as their use became widespread in every facet of our lives, discussions in computer ethics resulted in some kind of a consensus. Today, many of these rules have been formulated as laws, either national or international. Computer crimes and computer fraud are now common terms. There are laws against them, and veryone is responsible for knowing what constitutes computer crime and computer fraud. The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute. Here is our interpretation of them: 1) Thou shalt not use a computer to harm other people: If it is unethical to harm people by making a bomb, for example, it is equally bad to write a program that handles the timing of the bomb. Or, to put it more simply, if it is bad to steal and destroy other people’s books and notebooks, it is equally bad to access and destroy their files. ) Thou shalt not interfere with other people's computer work: Computer viruses are small programs that disrupt other people’s computer work by destroying their files, taking huge amounts of computer time or memory, or by simply displaying annoying messages. Generating and consciously spreading computer viruses is unethical. 3) Thou shalt not snoop around in other people's files: Reading other people’s e-mail messages is as bad as opening and reading their letters: This is invading their privacy. Obtaining other people’s non-public files should be judged the same way as breaking into their rooms and stealing their documents.Text documents on the Internet may be protected by encryption. 4) Thou shalt not use a computer to steal: Using a computer to break into the accounts of a company or a bank and transferring money should be judged the same way as robbery. It is illegal and there are strict laws against it. 5) Thou shalt not use a computer to bear false witness: The Internet can spread untruth as fast as it can spread truth. Putting out false â€Å"information† to the world is bad. For instance, spreading false rumors about a person or false propaganda about historical events is wrong. ) Thou shalt not use or copy software for which you have not paid: Software is an intellectual product. In that way, it is like a book: Obtaining illegal copies of copyrighted software is as bad as photocopying a copyrighted book. There are laws against both. Information about the copyright owner can be embedded by a process called watermarking into pictures in the digital format. 7) Thou shalt not use other people's computer resources without authorization: Multiuser systems use user id’s and passwords to enforce their memory and time allocations, and to safeguard information.You should not try to bypass this authorization system. Hacking a system to break and bypass the authorization is unethical. 8) Thou shalt not appropriate other people's intellectual output: For example, the programs you write for the projects assigned in this course are your own intellectual output. Copying somebody else’s program without proper authorization is software piracy and is unethical. Intellectual property is a form of ownership, and may be protected by copyright laws. ) Thou shalt think about the social consequences of the program you write: You have to think about computer issues in a more general social framework: Can the program you write be used in a way that is harmful to society? For example, if you are working for an animation house, and are producing animated films for children, you are responsible for their contents. Do the animations include scenes that can be harmful to children? In the United States, the Communications Decency Act was an attempt by lawmakers to ban certain types of content from Internet websites to protect young children from harmful material.That law was struck down because it violated the free speech principles in that country's constitution. T he discussion, of course, is going on. 10) Thou shalt use a computer in ways that show consideration and respect: Just like public buses or banks, people using computer communications systems may find themselves in situations where there is some form of queuing and you have to wait for your turn and generally be nice to other people in the environment. The fact that you cannot see the people you are interacting with does not mean that you can be rude to them. Ethical Issues :- †¢Computers in the Workplace Computer Crime †¢ Privacy and Anonymity †¢ Intellectual Property †¢Professional Responsibility †¢Globalization Computers in the Workplace. Computers can pose a threat to jobs as people feel they may be replaced by them. However, the computer industry already has generated a wide variety of new jobs. When computers do not eliminate a job, they can radically alter it. In addition to job security concerns, another workplace concern is health and safety. It is a computer ethics issue to consider how computers impact health and job satisfaction when information technology is introduced into a workplace.Computer Crime. With the proliferation of computer viruses, spyware, phishing and fraud schemes, and hacking activity from every location in the world, computer crime and security are certainly topics of concern when discussing computer ethics. Besides outsiders, or hackers, many computer crimes, such as embezzlement or planting of logic bombs, are committed by trusted personnel who have authorization to use company computer systems. Privacy and Anonymity. One of the earliest computer ethics topics to arouse public interest was privacy.The ease and efficiency with which computers and networks can be used to gather, store, search, compare, retrieve, and share personal information make computer technology especially threatening to anyone who wishes to keep personal information out of the public domain or out of the hands of those who are perce ived as potential threats. The variety of privacy-related issues generated by computer technology has led to reexamination of the concept of privacy itself. Intellectual Property. One of the more controversial areas of computer ethics concerns the intellectual property rights connected with software ownership.Some people, like Richard Stallman, who started the Free Software Foundation, believe that software ownership should not be allowed at all. He claims that all information should be free, and all programs should be available for copying, studying, and modifying by anyone who wishes to do so. Others, such as Deborah Johnson, argue that software companies or programmers would not invest weeks and months of work and significant funds in the development of software if they could not get the investment back in the form of license fees or sales.Professional Responsibility and Globalization. Global networks such as the Internet and conglomerates of business-to-business network connecti ons are connecting people and information worldwide. Such globalization issues that include ethics considerations include: †¢Global laws †¢Global business †¢Global education †¢Global information flows †¢Information-rich and information-poor nations †¢Information interpretation The gap between rich and poor nations, and between rich and poor citizens in industrialized countries, is very wide.As educational opportunities, business and employment opportunities, medical services, and many other necessities of life move more and more into cyberspace, gaps between the rich and the poor may become even worse, leading to new ethical considerations. Common Computer Ethics Fallacies Although computer education is starting to be incorporated in lower grades in elementary schools, the lack of early computer education for most current adults led to several documented generally accepted fallacies that apply to nearly all computer users.As technology advances, these f allacies will change; new ones will arise, and some of the original fallacies will no longer exist as children learn at an earlier age about computer use, risks, security, and other associated information. There are more than described here, but Peter S. Tippett identified the following computer ethics fallacies, which have been widely discussed and generally accepted as being representative of the most common. The Computer Game Fallacy. Computer users tend to think that computers will generally prevent them from cheating and doing wrong.Programmers particularly believe that an error in programming syntax will prevent it from working, so that if a software program does indeed work, then it must be working correctly and preventing bad things or mistakes from happening. Even computer users in general have gotten the message that computers work with exacting accuracy and will not allow actions that should not occur. Of course, what computer users often do not consider is that although the computer operates under very strict rules, the software programs are written by humans and are just as susceptible to allowing bad things to happen as people often are in their own lives.Along with this, there is also the perception that a person can do something with a computer without being caught, so that if what is being done is not permissible, the computer should somehow prevent them from doing it. The Law-Abiding Citizen Fallacy. Laws provide guidance for many things, including computer use. Sometimes users confuse what is legal with regard to computer use with what is reasonable behavior for using computers. Laws basically define the minimum standard about which actions can be reasonably judged, but such laws also call for individual judgment.Computer users often do not realize they also have a responsibility to consider the ramifications of their actions and to behave accordingly. The Shatterproof Fallacy. Many, if not most, computer users believe that they can do littl e harm accidentally with a computer beyond perhaps erasing or messing up a file. However, computers are tools that can harm, even if computer users are unaware of the fact that their computer actions have actually hurt someone else in some way. For example, sending an email flame to a large group of recipients is the same as publicly humiliating them.Most people realize that they could be sued for libel for making such statements in a physical public forum, but may not realize they are also responsible for what they communicate and for their words and accusations on the Internet. As another example, forwarding e-mail without permission of the author can lead to harm or embarrassment if the original sender was communicating privately without expectation of his message being seen by any others. Also, using e-mail to stalk someone, to send spam, and to harass or offend the recipient in some way also are harmful uses of computers.Software piracy is yet another example of using computers to, in effect, hurt others. Generally, the shatterproof fallacy is the belief that what a person does with a computer can do minimal harm, and only affects perhaps a few files on the computer itself; it is not considering the impact of actions before doing them. The Candy-from-a-Baby Fallacy. Illegal and unethical activity, such as software piracy and plagiarism, are very easy to do with a computer. However, just because it is easy does not mean that it is right.Because of the ease with which computers can make copies, it is likely almost every computer user has committed software piracy of one form or another. The Software Publisher's Association (SPA) and Business Software Alliance (BSA) studies reveal software piracy costs companies multibillions of dollars. Copying a retail software package without paying for it is theft. Just because doing something wrong with a computer is easy does not mean it is ethical, legal, or acceptable. The Hacker's Fallacy.Numerous reports and public ations of the commonly accepted hacker belief is that it is acceptable to do anything with a computer as long as the motivation is to learn and not to gain or make a profit from such activities. This so-called hacker ethic is explored in more depth in the following section. The Free Information Fallacy. A somewhat curious opinion of many is the notion that information â€Å"wants to be free,† as mentioned earlier. It is suggested that this fallacy emerged from the fact that it is so easy to copy digital information and to distribute it widely.However, this line of thinking completely ignores the fact the copying and distribution of data is completely under the control and whim of the people who do it, and to a great extent, the people who allow it to happen. Hacking and Hacktivism Hacking is an ambivalent term, most commonly perceived as being part of criminal activities. However, hacking has been used to describe the work of individuals who have been associated with the open -source movement. Many of the developments in information technology have resulted from what has typically been considered as hacking activities.Manuel Castells considers hacker culture as the â€Å"informationalism† that incubates technological breakthrough, identifying hackers as the actors in the transition from an academically and institutionally constructed milieu of innovation to the emergence of self-organizing networks transcending organizational control. A hacker was originally a person who sought to understand computers as thoroughly as possible. Soon hacking came to be associated with phreaking, breaking into phone networks to make free phone calls, which is clearly illegal.The Hacker Ethic. The idea of a hacker ethic originates in the activities of the original hackers at MIT and Stanford in the 1950s and 1960s. Stephen Levy outlined the so-called hacker ethic as follows: 1. Access to computers should be unlimited and total. 2. All information should be free. 3. A uthority should be mistrusted and decentralization promoted. 4. Hackers should be judged solely by their skills at hacking, rather than by race, class, age, gender, or position. 5. Computers can be used to create art and beauty. . Computers can change your life for the better. The hacker ethic has three main functions: 1. It promotes the belief of individual activity over any form of corporate authority or system of ideals. 2. It supports a completely free-market approach to the exchange of and access to information. 3. It promotes the belief that computers can have a beneficial and life-changing effect. Such ideas are in conflict with a wide range of computer professionals' various codes of ethics. Ethics Codes of Conduct and ResourcesSeveral organizations and groups have defined the computer ethics their members should observe and practice. In fact, most professional organizations have adopted a code of ethics, a large percentage of which address how to handle information. To prov ide the ethics of all professional organizations related to computer use would fill a large book. The following are provided to give you an opportunity to compare similarities between the codes and, most interestingly, to note the differences and sometimes contradictions in the codes followed by the various diverse groups. Information SecurityInformation security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction Information Security Attributes: or qualities, i. e. , Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to help identify and apply information security industry standards, as mechanisms of protection and prevention, at three levels or layers: physical, personal and organizational.Essentially, procedures or policies are implemented to tell people (administrators, users and operators)how to use products to ensure information security within the organizations. Confidentiality Confidentiality is the term used to prevent the disclosure of information to unauthorized individuals or systems. For example, a credit card transaction on the Internet requires the credit card number to be transmitted from the buyer to the merchant and from the merchant to a transaction processing network.The system attempts to enforce confidentiality by encrypting the card number during transmission, by limiting the places where it might appear (in databases, log files, backups, printed receipts, and so on), and by restricting access to the places where it is stored. If an unauthorized party obtains the card number in any way, a breach of confidentiality has occurred. Confidentiality is necessary (but not sufficient) for maintaining the privacy of the people whose personal information a system holds. [citation needed] IntegrityIn information security, integrity means that data cannot be modified undetectably. [citation needed] This is not the same thing as referential integrity in databases, although it can be viewed as a special case of Consistency as understood in the classic ACID model of transaction processing. Integrity is violated when a message is actively modified in transit. Information security systems typically provide message integrity in addition to data confidentiality. Accessibility For any information system to serve its purpose, the information must be available when it is needed.This means that the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly. High availability systems aim to remain available at all times, preventing service disruptions due to power outages, hardware failures, and system upgrades. Ensuring availability also involves preventing denial-of-service attacks. Authent icity In computing, e-Business, and information security, it is necessary to ensure that the data, transactions, communications or documents (electronic or physical) are genuine.It is also important for authenticity to validate that both parties involved are who they claim they are. Non-repudiation In law, non-repudiation implies one's intention to fulfill their obligations to a contract. It also implies that one party of a transaction cannot deny having received a transaction nor can the other party deny having sent a transaction. Electronic commerce uses technology such as digital signatures and public key encryption to establish authenticity and non-repudiation. c. ConclusionImpact of Computer Ethics on Information Security The relationship between information security and computer ethics does not look, on the surface, readily obvious, and even appears remote. It is, however, credible. Culture, customs, trust and privacy that characterize security fall within the realm of ethics. Computer ethics alert information security management to ethical considerations and warn potential offenders of ethical consequences in situations where the technical tools or the legal measures fail.In these cases, an ethical decision may be helpful in bringing about a solution. Furthermore, this conclusion is consistent with the following premises with respect to technical controls, computer laws and computer ethics: †¢Premise 1: The information security management community has applied control tools to meet the information security objectives of safeguarding confidentiality against unauthorized access, upholding integrity and maintaining availability. However, detecting computer crime is difficult, because the act is either traceless or difficult to trace.Quantifying the damage is problematic since the victims all too often withhold reporting the crime for reasons including fear of recrimination and bad publicity. 8 Therefore, the technical control tools are ineffective, wi th respect to legal issues. †¢Premise 2: Computer laws have been enacted in various nations at an ever-increasing rate since the late 1980s, when business and the society at large were forced to face the magnitude and severity of damage not experienced prior to computer crimes. There has been a dramatic increase in specialized legislation to combat criminal behaviors related to computer crime, which include traditional crimes committed with the use of a computer and a variety of new, technologyspecific criminal behaviors spawned by the rapid emergence of computer technologies and the exponential expansion of the Internet. 10 However, despite the additional new laws, prosecution is deterred because the legal proceeding is a tardy, time-consuming and expensive process, even when there are well-justified intentions to proceed with legal action.Also, legislation always lags behind the event such that either no appropriate laws are found or the new law is too late for the case in ha nd. Hence, computer laws are at best a deterrent to computer crime, not a guardian of information. †¢Premise 3: Computer ethicists assert, on the one hand, that special ethical issues are raised because computers are special technology, and query, on the other hand, why there should be computer ethics since, for example, there is no such thing as telephone ethics even though the telephone is a special technology that makes a profound change on the way individuals communicate with others. 1 However, information security is worthy of ethical consideration as many decisions in information technology affect a wide range of stakeholders. National and international computer societies have promoted codes of ethical practice and even written these codes into their constitutions. As technology advances, computers continue to have a greater impact on society.Therefore, computer ethics promotes the discussion of how much influence computers should have in areas such as information securit y, artificial intelligence and human communication. As the world of computers evolves, computer ethics continues to create ethical standards that address new issues raised by new technologies. Reference http://www. isaca. org/Journal http://plato. stanford. edu/entries/ethics-computer/ http://www. cmpe. boun. edu. tr/~say/c150/intro/lit10. html

Sunday, November 10, 2019

Frankenstein and Bladerunner Essay

A holistic understanding of a text can be only be pursued by the audience only when they are able to pinpoint the intended values of the composer and resonate these values with the time and context of the text. It is evident that through a comparative study of Mary Shelley’s 1818 novel Frankenstein together with Ridley Scott’s 1992 film Blade Runner, despite the one hundred year gap between the two texts, the values each composer wishes to deliver to the audience echo the concerns of humanity and its susceptibility against themselves.Frankenstein explores how humanity’s obsession with scientific and medical developments in the 19th Century while Blade Runner explores the societal vales of consumerism and capitalism in the 20th Century. Evidently, it is clear through the comparison of the texts as to how the social values of each society bring detrimental outcomes for humanity. A theme that is seen in Frankenstein is the danger of unrestrained scientific progress and creation, a theme most evident when Frankenstein bestows the â€Å"spark of life† upon his creature in his effort to â€Å"pour a torrent of light into our dark world†.Here Shelley alludes to the sciences of the period of enlightenment or in particular, Galvanism which held the belief that corpses could be reanimated through an electrical current, or â€Å"spark†. The characterization of Frankenstein serves to symbolize the desire of humanity to be able to create and control aspects of life which were limited to god. This becomes clearer as Frankenstein states, â€Å"A new species would bless me as its creator and source; many happy and excellent natures would owe their being to me. Here, Shelley uses a listing of descriptive language which embeds positive connotations in order to depict the naive hopes of humanity’s desire to create and control life and nature. As the plot unfolds, it becomes evident that this desire only leads to false hopes as Fra nkenstein’s creation states, â€Å"You are my creator, but I am your master; obey! †. Here, the paradoxical statement by the creation is indicative of how humanity’s desires will ultimately backfire when the power to create and control is unchecked and abused.Ultimately, the monster is responsible for the death of many associates of Frankenstein as well as Frankenstein himself which shows the ultimate backfire of scientific progresses on humanity. Scott’s Bladerunner recognizes the same flaws within humanity as Mary Shelly’s Frankenstein. He portrays a world where humanity’s hunger for power, control and technological advances ultimately leads to their downfall. In the opening scene, Scott portrays the dominating figure of Tyrell’s building through the use of a panoramic shot, where the large and tall building juxtaposes with the other buildings of the society.In order to give more focus on Tyrell’s building, a dolly shot is us ed and together with eerie background music, the director creates a mysterious atmosphere concerning Tyrell’s practices. Tyrell's company alludes to the rise of capitalism and consumerism in the twentieth century, where this lead to large transnational corporations being one of the dominant forces of globalization. This can be witnessed in the low angle shot of the high rise buildings, which embed Coca Cola and Pan Am Airlines advertisements through neon lighting.The forces of globalization can be further recognized with the oriental background music which accompanies the advertisements together with a follow up mid shot depicting a large screen with a Japanese geisha dominating the screen. This alludes to the dominant Asian culture in LA alludes to the aggressive Asian Tiger Economics of the late 20th century, where the drastic rise of Asian countries such as Japan and China was seen.Hence, by blending these notions of social values with the dystopian depiction of LA, where the continuous rainfall and the absence of sunlight indicates the destruction of nature and its endowments, Scott is foreshadowing a society which humanity has ultimately destroyed with their own hands. Once the responders understand the contextual influence on the two texts, the responders are then able to grasp the core idea of both texts – humanity’s negligence in their power. Both texts indicate the self-destructive nature of humanity’s empowerment to which responders can reflect upon in correlation with their contemporary society.Firstly, Frankenstein portrays how the ambition to redefine human limitations through creation is bound to result in failure, and accordingly create something monstrous. Frankenstein’s Creature is the very embodiment of the monstrosity that humans are capable of creating. The symbolism of light in, â€Å"until from the midst of this darkness a sudden light broke in upon me† conveys Victor’s instinctive awakenin g to the possibility of creating a perfect being impervious to diseases. The contrast between the ‘darkness’ and ‘light’ hints the didactic purpose which Shelley tries to convey to her responders.Such a taboo act of trespassing the domain of the divine providence signifies the beginning of Frankenstein’s blindness. Frankenstein is quick to realize that he has created a monster, as shown by the regretful tone in, â€Å"I beheld the wretch – the miserable monster whom I had created. † This depicts that untamed human ambition can lead to the inadvertent creation of the ‘grotesque’ and through this, Shelly is alluding to the ideology that creation is the work of God and should not be attempted by humanity. Blade Runner examines this notion of the negligence of humanity’s empowerment on a much broader scale than Frankenstein.This is achieved by depicting the detrimental consequences of humanity’s misuse of power up on an entire country. Frankenstein was a forewarning of the dangers of human ambition of that context, but Bladerunner portrays the aftermath of the overambitious quest for knowledge in the future if the misuse of power cannot be contained by depicting a dystopian world. Appropriately, the human beings in this alternate future seem artificial and lacking humanity except for the protagonist Deckard. Deckard is the primary voice of the director, where Scott portrays his ideas on how humanity should be living through the actions of Deckard.In Bladerunner, Deckard is a character who distances himself from the social norm of technology and the rigid structure of society. He is indicative of the traditional ‘human’ who responds emotionally and takes part in conventional human actions. Although this notion is strongly evidenced towards the end of the film, the director foreshadows Deckard’s humanitarian characteristics from the beginning of the film. The idea of Deckard holding human qualities can be witnessed in the scene when Deckard is reading the newspaper. A dolly shot is utilized by Scott in order to capture the setting of the city and gradually focus on Deckard.Through this shot, the responders recognize the strong juxtaposition between the social values and Deckard. Deckard is reading the traditional ‘newspaper’, whilst in the background, numerous television screens showing the news can be seen. This contrast in effect highlights that Deckard abides by the more ‘traditional’ conventions of humanity and through his heroic portrayal, it becomes evident that Scott wishes to address that in order for humanity to survive, it will require us to restrain ourselves from being too consumed with social cults and conventions which invoke control, creation and power.In order to fulfill an understanding of a text, responders need to identify and understand the true intentions of the composer. When both Frankenstein and Blade R unner are read on parallel, although their contexts are different, the problematic issues resonate with each other and furthermore, responders can also illustrate that these texts induces the responders to reflect on the contemporary society to understand that the social values of our time, although they may seem standard may be in fact detrimental for humanity.

Friday, November 8, 2019

Biography of Hans Bethe

Biography of Hans Bethe German-American physicist Hans Albrecht Bethe (pronounced BAY-tah) was born on July 2, 1906. He made key contributions to the field of nuclear physics and helped to develop the hydrogen bomb and the  atomic bomb used in World War II. He died on March 6, 2005. Early Years Hans Bethe was born on July 2, 1906 in Strasbourg, Alsace-Lorraine. He was the only child of Anna and Albrecht Bethe, the latter of whom worked as a physiologist at the University of Strasbourg. As a child, Hans Bethe showed an early aptitude for mathematics and often read his fathers calculus and trigonometry books. The family moved to Frankfurt when Albrecht Bethe took a new position at the Institute of Physiology at the  University of Frankfurt am Main. Hans Bethe attended secondary school at Goethe-Gymnasium  in  Frankfurt until he contracted tuberculosis in 1916. He took some time off school to recover before graduating in 1924. Bethe went on to study at the University of Frankfurt for two years before transferring to the University of Munich  so that he could study theoretical physics under German physicist Arnold Sommerfeld. Bethe earned his PhD in 1928. He worked as an assistant professor at the University of Tubingen and later worked as a lecturer at the University of Manchester after immigrating to England in 1933. Bethe moved to the United States in 1935 and took a job as a professor at Cornell University. Marriage and Family Hans Bethe married Rose Ewald, the daughter of German physicist Paul Ewald, in 1939. They had two children, Henry and Monica, and eventually, three grandchildren. Scientific Contributions From 1942 to 1945, Hans Bethe served as the director of the theoretical division at Los Alamos where he worked on the Manhattan Project, a team effort to assemble the worlds first atomic bomb. His work was instrumental in calculating the bombs explosive yield. In 1947 Bethe contributed to the development of quantum electrodynamics by being the first scientist to explain the Lamb-shift in the hydrogen spectrum.  At the beginning of the Korean War, Bethe worked on another war-related project and helped to develop a hydrogen bomb. In 1967, Bethe was awarded a Nobel Prize in Physics for his revolutionary work in stellar nucleosynthesis. This work offered insight into the ways in which stars produce energy. Bethe also developed a theory related to inelastic collisions, which helped nuclear physicists understand the stopping power of matter for fast charged particles. Some of his other contributions include work on solid-state theory and a theory of the order and disorder in alloys. Late in life, when Bethe was in his mid-90s, he continued to contribute to research in astrophysics by publishing papers on supernovae, neutron stars,  black holes. Death Hans Bethe retired in 1976 but studied astrophysics and served as the John Wendell Anderson Emeritus Professor of Physics Emeritus at  Cornell University  until his death. He died of congestive heart failure on March 6, 2005 at his home in Ithaca, New York. He was 98 years old. Impact and Legacy Hans Bethe was the  head theoretician on the Manhattan Project  and was a key contributor to the atomic bombs that killed more than 100,000 people and wounded even more when they were dropped on Hiroshima and Nagasaki during  World War II. Bethe also helped to develop the hydrogen bomb, despite the fact that he was opposed to the development of this type of weapon. For more than 50 years, Bethe strongly advised caution in using the power of the atom. He supported  nuclear nonproliferation treaties and frequently spoke out against missile defense systems. Bethe also advocated for the use of national laboratories to develop technologies that would lower the risk of nuclear war rather than weapons that could win a nuclear war. Hans Bethes legacy lives on today. Many of the discoveries that he made in nuclear physics and astrophysics during his 70 year career have stood the test of time, and scientists are still using and building upon his work to make progress in theoretical physics and  quantum mechanics. Famous Quotes Hans Bethe was a key contributor to the atomic bomb used in World War II as well as the hydrogen bomb. He also spent a significant portion of his life advocating for nuclear disarmament. So, it is really no surprise that he was often asked about his contributions and the potential for nuclear war in the future. Here are some of his most famous quotes on the topic: When I started participating in thermonuclear work in the summer of 1950, I was hoping to prove that thermonuclear weapons could not be made. If this could have been proved convincingly, this would of course have applied to both the Russians and ourselves and would have given greater security to both sides than we can now ever achieve. It was possible to entertain such a hope until the spring of 1951, when it suddenly became clear that it was no longer tenable.If we fight a war and win it with H-bombs, what history will remember is not the ideals we were fighting for but the methods we used to accomplish them. These methods will be compared to the warfare of Genghis Khan who ruthlessly killed every last inhabitant of Persia.Today the arms race is a long-range problem. The Second World War was a short-range problem, and in the short range I think it was essential to make the atomic bomb. However, not much thought was given to the time after the bomb. At first, the work was too absorbi ng, and we wanted to get the job done. But I think that once it was made it had its own impulse - its own motion that could not be stopped. Today we are rightly in an era of disarmament and dismantlement of nuclear weapons. But in some countries nuclear weapons development still continues. Whether and when the various Nations of the World can agree to stop this is uncertain. But individual scientists can still influence this process by withholding their skills.  Accordingly, I call on all scientists in all countries to cease and desist from work creating, developing, improving and manufacturing further nuclear weapons - and, for that matter, other weapons of potential mass destruction such as chemical and biological weapons.   Hans Bethe Fast Facts Full Name:  Hans Albrecht Bethe  Occupation: PhysicistBorn: July 2, 1906 in  Strasbourg, Germany (now Strasbourg, France)Died: March 6, 2005 in Ithaca, New York, USAEducation: Goethe University Frankfurt,  Ludwig Maximilian University of MunichKey Accomplishment: Received the Nobel Prize in Physics in 1967 for his work in  stellar nucleosynthesis. Served as head theoretician on the Manhattan Project.  Spouses Name: Rose EwaldChildrens Names: Henry Bethe,  Monica Bethe Bibliography Broad, William J. â€Å"HANS BETHE CONFRONTS THE LEGACY OF HIS BOMB.†Ã‚  The New York Times, The New York Times, 11 June 1984, www.nytimes.com/1984/06/12/science/hans-bethe-confronts-the-legacy-of-his-bomb.html?pagewantedall.Broad, William J. â€Å"Hans Bethe, Prober of Sunlight and Atomic Energy, Dies at 98.†Ã‚  The New York Times, The New York Times, 8 Mar. 2005, www.nytimes.com/2005/03/08/science/hans-bethe-prober-of-sunlight-and-atomic-energy-dies-at-98.html.Gibbs, W. Wayt. â€Å"Hans Albrecht Bethe, 1906-2005.†Ã‚  Scientific American, 1 May 2005, www.scientificamerican.com/article/hans-albrecht-bethe-1906-2005/.â€Å"Hans Bethe.†Ã‚  Atomic Heritage Foundation, 2 July 1906, www.atomicheritage.org/profile/hans-bethe.â€Å"Hans Bethe - Biographical.†Ã‚  Nobelprize.org, www.nobelprize.org/nobel_prizes/physics/laureates/1967/bethe-bio.html.Irion, Robert. â€Å"A Towering Physicists Legacy Faces a Threatening Future.†Ã‚  Science, American Asso ciation for the Advancement of Science, 7 July 2006, science.sciencemag.org/content/313/5783/39.full?rss1.