Wednesday, November 27, 2019

Calvin And Theocracy Teaching Essays - Forms Of Government

Calvin And Theocracy Teaching When we think of a theocracy, we usually think of a political system, governed and legislated by a religious body with religious beliefs. For the most part this is true. Historically, theocratic governments have successfully existed throughout the world, from ancient Egypt to modern Middle-Eastern Islamic states. For centuries even the Christian Church enjoyed a theocratic diversity which encompassed most of the civilized world. As well, the unprecedented spread of Islam has seeded new theocracies at a tremendous rate. Most theocratic governments had one thing in common, however; their political ideologies did not just originate from the church, they were the church. Church leaders were the political leaders. Typically, a strong theocracy was one with a superior church hierarchy in which the political system was deeply entrenched. But not all theocratic structures were intended to be this way. In Chapter XX of his masterpiece The Institutes on Christian Piety, John Calvin logically outlined his view of a theocracy. Consistent with his scripture-based reasoning, Calvin eloquently described how civil and ecclesiastical governments were different, yet uniquely related. In his classic reformation style, Calvin metaphorically compared Catholic to Protestant theology by framing his theocracy not on the church as the government, but rather he separated civil government from spiritual government into a divinely ordained, segregated Protestant theocracy. Subtlety expressed and masterfully executed, Chapter XX is dripping with figurative language, suggesting that Calvin went to great lengths to insure that his distaste for the Catholic papacy would not go unnoticed. The first third of Chapter XX concentrates on the duties and responsibilities of the magistrate. This after two opening sections which clearly divide government into two parts, and then claim these parts not to be antithetical. Indeed such a preamble is necessary since the remainder of the document is to be a separation, yet cross-self-reliance on these parts. Calvin made no attempt to separate local, regional, or national magistracy. In fact, most of the scripture references are Old Testament passages which refer to either the kings of Judah, or other post-king patriarchs. The main focus on the magistrate "is that they have a mandate from God, have been invested with divine authority, and are wholly God's representatives." In addition, God has "entrusted to them" the authority "of exercising judgement not for man but for God." This sounds very theocratic. However, no where did Calvin mention the source of this divine position to be the church. Rather he asserted, quoting Psalms 2:12, that the magistrate should "kiss the Son of God" yet not lay aside their authority. With this he follows, "By these words he entrusts the condition of the church to their protection and care." Calvin clearly separates the church from directly engaging in the politics related to the office of the magistrate. By assigning to the church the responsibility of caring for the magistrate, Calvin allows the church to be associated with government while not actually becoming part of the government, as his Catholic adversaries did. Beyond divine appointment, however, Calvin also outlines the duties of the magistrate in a way which uniquely joins the government to God. Calvin continued his blend of civil and spiritual government through a discourse on the duties of the magistrate, issues of war, and the levying of taxes. On the duties of the magistrate, for example, he returns to the question of divine appointment. "And that their sole endeavor" Calvin asserts "should be to provide for the common safety and peace of all." Continuing, he states that, "in administering punishment, [the magistrate] does nothing by himself, but carries out the very judgements of God ." In this, Calvin begins to solidify his argument concerning the divine nature of the magistracy. It is no coincidence, however, that he includes no reference which joins the magistrate to the corporate church. Supported by additional references to Old Testament kings, Calvin implies that it is inappropriate for the magistrate to be a church leader, in that King David, for example, had priests dedicated to occupying those positions. On the topic of war, Calvin makes his position crystal clear. "But kings and people" Calvin states, "must sometimes take up arms to execute such public vengeance." Calvin views war as a "lawful" undertaking, as long as the magistrate follows some fundamental Godly guidelines, namely restraint and humanity. On restraint, Calvin warns the magistrate against, "giving vent to their passions, even in the slightest degree, not giving in to headlong anger, or be[ing] seized with hatred." In a continuing effort to weave into his discourse his dislike for the papacy, Calvin follows with a

Saturday, November 23, 2019

a civil war essays

a civil war essays A civil war that has raged for seven years in the small West African country of Sierra Leone has turned increasingly brutal. (1, p.1) Rebels are mutilating civilians without much response from the international community. A strong Nigerian contingency has tried to suppress the rebellion, but the rebels continue to cause major trouble in Sierra Leone. The rebels overthrew President Ahmad Tejan Kabbah. However, President Kabbah returned to office on March 10, 1998 to face the task of restoring order to a demoralized population and a disorganized and severely damaged economy. (2, p.1) The country of Sierra Leone is located in western Africa between the countries of Guinea and Liberia, and it borders the North Atlantic Ocean. The actual area of Sierra Leone is slightly smaller than the U.S. state of South Carolina. The population of Sierra Leone is about 5,080,000 people. Its legal system is based on English law and customary laws indigenous to local tribes. Sierra Leone's government consists of three branches, the executive branch, the legislative branch, and the judicial branch. President Ahmad Tejan Kabbah was inaugurated March 29, 1996, and President Kabbah is both the chief of state and the head of government. The president's tenure of office is limited to two five-year terms. On May 25, 1997, disgruntled army personnel under the command of Major Johnny Paul Koroma overthrew the democratically elected government of President Ahmad Tejan Kabbah. (2, p.1) After President Kabbah was overthrown, he fled to exile in the neighboring country of Guinea. In Guinea, President Kabbah remained in the city of Conakry. The coup leader, a relatively unknown army major named Johnny Paul Koroma, declared himself the new head of state and invited fellow rebel leader Foday Sankoh to join the government. (3, p.1) During the rebel invasion, the rebels seized the legislature, burned the national treasury, and raided the capital of Fr...

Thursday, November 21, 2019

Statement of purpose Personal Example | Topics and Well Written Essays - 250 words

Of purpose - Personal Statement Example I believe that if one were to ask any of my friends to describe me, the first thing that would come to their mind is that I am a proactive, responsible and an ambitious woman. I have always thought that one of my most distinguishing qualities is the positive energy in me. I always try to push things further to get the best out of it. Even when sometimes I thought I failed, I could only look at the failure as another chance to make things even better. In my opinion, my children are what inspires me the most to be this way. Being a mother of five is definitely not an easy task and requires all the skills in the world. I believe I am family oriented. With this firsthand experience, I deem myself well fit for the counseling and psychology field. The skills from my life experiences have given me an opportunity to help people who are faced with various psychological problems. I did my undergraduate studies in social sciences. However, I have always thought of management and leadership to be very important in all aspects of life. It is important in small households as much as it is in big corporations. My grandmother used to say what I always thought of as a great saying, which goes something like â€Å"Governance is the salt of the earth†. I have decided to apply for a MBA degree because I believe it would guide me in the right path and give me the skills that I need to enter the world of business. I have always felt that I have the qualities of a leader, and all I need is the knowledge of how to implement those qualities in favor of the advancement of any business. I believe that the combination of different fields of study with enthusiasm is imperative for counseling. The skills that I have acquired through my experience provide a credible platform for me to study counseling. If I am given the opportunity to pursue this course, I will apply the same determination in completing it to the best of my ability. In my country, Saudi Arabia, there is a big notion

Wednesday, November 20, 2019

Ethics for Professionals - Professionals & Deception (Philosophy Essay

Ethics for Professionals - Professionals & Deception (Philosophy Topic) - Essay Example Ironically though, Nyberg (1993, p. 7) observes that despite all these public condemnations against lying and deception, everyone is actually privately culpable of it. Why so – he furthers that perhaps it is necessary to maintain equilibrium in people’s social relations, or possibly, it gives credence to moral decency. Meaning, although lying and deception is publicly acknowledged to be an immoral professional act, certain circumstances may compel or warrant professionals to resort to lying and deception. As Englehardt & Evans (1994) suggests, there are some instances when outright lying may be morally right and there may also be some instances when the simple act of not divulging information is morally wrong. Such is the heart of the matter – Is lying and deception justified in the conduct of one’s profession? Are professionals ever justified in, or even compelled to lie to or deceive their clients?  If so, in what context would this be morally permissible? If not, why? Is outright  lying worse than deception in the professions? Why would it be or would it not be? Is a professional ever entitled to lie to his/her  client, or to other people to protect the client? Such are seemingly easy questions? There may not be correct or wrong answers to them. Nevertheless, the issue of lying and deception in profession is one of the gray areas in professional ethics that warrant further inquiry and discussion. From the following definitions of lying – ‘No liar preserves faith in that about which he lies†¦ wishes that he to whom he lies have faith in him, but†¦ does not preserve faith by lying to him’ (Chisholm & Feehan 1977, p. 152); ‘A person lies when he asserts something to another which he believes to be false with the intention of getting the other to believe it to be true’ (Kupfer 1982, p. 104); ‘A person lies when he asserts a proposition he believes to be false’ (Fried 1978, p. 55); Lying is ‘making a statement believed to be

Sunday, November 17, 2019

Belmar beach Essay Example for Free

Belmar beach Essay Being from the jersey shore there is many options to choose from, but Belmar beach is the most beautiful and exciting beach. Every time you go to Belmar beach there is always someone new to sit down and have an ice cold drink with. Belmar is also known to have the best over-head waves that look smooth and glossy from the sun reflecting off the water. My favorite place to hangout is at Belmar beach on a hot sweaty day with a cool ocean breeze filled with a lot of variety of people. Belmar beach is always filled with tourist from all over the world, who tend to make the beach look filthy and covered with trash everywhere. However, on its lonely deserted days its impeccability is hard to miss. The sunlight gleaming off the ocean surface onto the lightly shaded grey boardwalk. Having a loud atmosphere as well, it’s hard to say that one won’t get distracted a little with its blissful music surrounding you corner by corner. On the contrary, when in need for a serene soothing place, Belmar can contain one of the most nerve-calming areas such as its Cafes or its nearby vast lake. My favorite days to go to Belmar beach is on a hot peaceful day with huge over-head waves that are smooth to surf. I like to sit in the water looking and listening to the peaceful waves crashing onto the jetti spraying mist in the air. After having a work out in the water from the ferocious waves and powerful currents there are many restaurants to choose from that have amazing scenery of the beach and with food that is ridiculously good. However, you can also get the softest and most delicious mouth melting ice cream right on the boardwalk. Furthermore, Belmar is filled with thrilling and exciting activities to do on the most boring and tiresome days. To begin with, individuals who are into the sport of surfing can be fascinated with its graceful dominate blue waves. For the people who prefer fishing, its resourceful waters contain one of the most beautiful fish in the seas. Now for the more reserved people who like to keep to themselves, quiet and peaceful spots are available. Since any type of environment can be seen inhabiting Belmar, not one type of individual will stand out. Overall, Belmar beach has everything to offer with the beautiful beach, amazing memories, and filled with many exciting activities to do. Going to Belmar beach will keep you occupied the entire day, filling your emotions with joy and excitement. Belmar will also give you amazing views of the ocean’s waves perpetually crashing onto the damped sand. Ultimately, making Belmar the most tranquil and relaxing beach to go to.

Friday, November 15, 2019

Competition in the coffee industry

Competition in the coffee industry INTRODUCTION Today we stand witness to a new coffee era, one made up of Caffe Lattes, Espresso Macchiatos, Cappuccinos and Frappuccinos. Specialty Coffee is here to stay and no one will be more eager to tell you that than Howard Schultz, CEO of Starbucks, the worlds largest specialty coffee bar. The study of Starbucks Corporation leads one on a multifaceted journey through an organizations insinuation into a culture, its dominance of a market and its creation of a brand synonymous with loyalty, integrity and longevity. Ever since it first spread through the Moslem world in the sixteenth century, coffee has played a pivotal role in society by providing meeting places for intellectuals from all sides of life to converge. As coffee was slowly introduced to the European world it was recognized for both its sociability and its taste. Soon Coffee houses were prevalent throughout Europe and were the natural locations for political, literary and societal debate. It crossed the Atlantic Ocean in the mid-seventeenth century and replaced beer as New York Citys favorite morning drink. Starbucks Corporation is an international coffee and coffeehouse chain based in Seattle, Washington, United States. Starbucks is the largest coffeehouse company in the world, with 16,635 stores in 49 countries, including 11,068 (6,764 Company Owned, 4,304 Franchised) in the United States, followed by nearly 1,000 in Canada and more than 800 in Japan. Starbucks sells drip brewed coffee, espresso-based hot drinks, other hot and cold drinks, snacks, and items such as mugs and coffee beans. Through the Starbucks Entertainment division and Hear Music brand, the company also markets books, music, and film. Many of the companys products are seasonal or specific to the locality of the store. Starbucks-brand ice cream and coffee are also offered at grocery stores. Michael E. Porter provided a framework that models an industry as being influenced by five forces. The strategic business manager seeking to develop an edge over rival firms can use this model to better understand the industry context in which the firm operates. Porters Five Forces of Competitive Position: Industry Rivalry The dynamics of the industry rivalry within the specialty coffee industry has changed dramatically since 1987. Unlike the early days of the specialty coffee industry when Starbucks competed primarily against other small-scale specialty coffee retailers they now compete against companies of varying sizes and different exposures to specialty coffee. Starbucks competes with a variety of smaller scale specialty coffee shops, mostly concentrated in different regions of the country. All of these specialty coffee chains are differentiated from Starbucks in one way or another. Coffee Bean competes with Starbucks. They are similar to Starbucks in their attempt to create a third-place but distinguish themselves by creating an entirely different atmosphere. Where Starbucks strives to create an upscale European atmosphere, Coffee Bean tries to implement a more American feel to their coffee houses. Often they will use knotty pine cabinetry, numerous fireplaces and soft seating. Also they offer a barrage of magazines and newspapers as well as the guarantee of speedy service and free refills. In addition, they offer free WiFi, drive through accessibility and meeting rooms for rent. Through their subsidiary VKI technologies, they have become the world leader in the design, manufacture and distribution of coffee making equipment and related products. In addition to these smaller scale specialty coffee companies, Starbucks must now compete against two of the largest companies in the fast food industry who have recently entered the specialty coffee segment. The first of these competitors is Dunkin Donuts, who claims to be the worlds largest coffee and baked goods chain. Currently, Dunkin Donuts operates about 5,500 franchises around the United States, 80 stores in Canada and 1,850 throughout the rest of the world. In the past couple years the franchise has put enormous emphasis on their coffee beverages. They serve coffee beverages in an assortment of types and styles including espresso, cappuccino and latte. They also serve their coffee in an assortment of flavors including French Vanilla, hazelnut, cinnamon and numerous others. The largest industry rival currently facing Starbucks is the McDonalds restaurant fast food chain. McDonalds originated from a single San Bernardino, California hamburger stand, which opened in 1948, and has turned into what is now the worlds largest restaurant chain with over 14,000 restaurants in the United States alone. The key to McDonalds success has been the consistent quality standards they achieve for their food, coupled with their quick service and low prices. 10 years ago Starbucks and McDonalds were at complete opposite ends of the spectrum in the restaurant industry. However, McDonalds, encouraged by the success of its upgraded drip coffee, began testing numerous drinks sold under the name McCafe. Starbucks meanwhile, with its rapid expansion, was adding drive-through windows and numerous breakfast sandwiches, similar to the Egg McMuffins served at McDonalds, to their stores. These measures have drawn the two companies closer together as competitors due to an encroachment into the demographic consumer base made by each company. In summary, the current impact of the industry rivalry force created by the competition between specialty coffee retailers is very high, especially as contrasted to what it was at the time of Starbucks rapid expansion twenty years ago. The growth of the industry has slowed while the number of competitors within the industry has increased. Both of these factors, in addition to Dunkin Donuts and McDonalds high strategic stakes in the specialty coffee industry, have caused this change from weak to strong industry rivalry. Potential for New Entrants Another of the five forces in Porters model, which has changed significantly since the late 80s when we analyze the current environment in which Starbucks competes, is the potential for new entrants. As stated earlier, the primary deterrents to entry in the specialty coffee industry are the various barriers to entry. The economies of scale within the specialty coffee industry have increased as the size of the top players has increased. Companies such as Dunkin Donuts and McDonalds have national distribution channels through which they can transport their specialty coffee at a relatively low cost compared to potential new entrants who have no such developed distribution systems. These larger companies are also able to economize on their accounting operations and marketing budgets by facilitating their specialty coffee operations from the same department as for all segments of their businesses. Finally, these larger corporations are also able to reap economies of scale through their purchasing by negotiating long term contracts with coffee farmers and purchasing coffee beans in bulk quantities at discount prices. There is numerous cost disadvantages imposed on new entrants that are independent of the economies of scale considerations. As the industry matures, the ability to access distribution channels and select from the highest quality coffee beans has becoming increasingly difficult. Most of the favorable store locations within the larger metropolitan areas have already been occupied by current competitors within the specialty coffee industry. Additionally, many companies now have proprietary product technology involved in the production of their specialty coffee as well as lower per unit costs due to an experience curve. Product differentiation within the specialty coffee industry has moved away from the purely objective and defined traits such as the taste of the coffee, convenience of the stores and prices charged. The industry has progressed toward more subjective traits such as the ambience of the store, the social responsibility of the company and brand identification. Many companies have gained very loyal customer bases stemming from their past advertisements, customer service, objective product differentiations and early entry into the industry. All of this makes it more difficult for new entrants to gain a solid customer base. From the analysis above, it can be ascertained that the barriers to entry in the specialty coffee industry have increased substantially. As a consequence, the potential threat of new entrants has gone down. Since, the industry does not have large capital requirements, smaller specialty coffee shops are still prevalent throughout the United States and the potential for more of them to enter the industry is still present. However, these new entrants can be disregarded given the unlikely nature of their concerted expansion and the inconsequential effects they have singly on the overall demand in the consumer market. Substitute Products The force created by substitute products in the specialty coffee industry has decreased. Many companies that presented the specialty coffee industry with a threat in the form of substitute products have actually entered the industry and now compete directly by offering their own premium coffee selections. The primary substitute products still posing a threat to the specialty coffee industry are the caffeinated soft drinks offered by Pepsi and Coca-Cola. However, even these substitute products pose little threat to the premium coffee industry. In the past five years, studies done on the percentage of meals or snacks that included a carbonated soft drink as opposed to coffee have shown a reversal in consumer preference. Coffee has gradually gained preference over carbonated soft drinks. This is mostly attributed to the health concerns associated with carbonated soft drinks and the new evidence showing coffee as a relatively healthy alternative. Supplier Bargaining Power With the extensive growth in the specialty coffee industry, supplier bargaining power has changed in numerous ways. In 1987, when the first Starbucks was conceived, the farmers from whom Starbucks purchased its premium coffee beans were numerous, small and unconnected to one another. Currently, many of the farmers who sell to Starbucks and other premium coffee chains are united by an initiative known as fair trade certified coffee, which was organized by TransFair USA. Under this initiative, companies such as Starbucks are given the opportunity to advertise their coffee as being fair trade certified if they purchase from coffee suppliers that are democratically owned cooperatives. This initiative was designed to ensure that the coffee farmers would be compensated fairly for their crops. Their increased unity under this initiative worked as a positive externality by increasing their ability to exert bargaining power over their buyers. The fair trade coffee certification is looked at by consumers in their decision of where to purchase their premium coffee. Thus, although the farmers are still numerous and small they are now connected through the initiative launched by TransFair USA and act in some respects like one large entity. Although the farmers of premium Arabica beans are still in constant competition with the substitute Robusta coffee bean growers, their bargaining power is not significantly diminished by this threat due to the unlikelihood of a big premium coffee retailer adopting the substitution. When Starbucks first began purchasing premium Arabica coffee beans in the late 1980s, they executed purchases incrementally throughout the year. Currently, they lock their coffee suppliers into long-term contracts to dilute potential price volatility. These contracts have stipulations within them which place a financial burden on the coffee suppliers if they choose to supply a different company. By creating these switching costs for the premium coffee suppliers, Starbucks has diminished their ability to play one buyer against another, which decreases their bargaining power. A last component to the analysis of supplier bargaining power within the current specialty coffee industry environment is the threat of forward integration. Technically, the farmers can forward integrate by setting up smaller coffee shops and brewing their own batches. This is, however, extremely unlikely and has yet to occur. When comparing the bargaining power of suppliers today in the specialty coffee industry to the bargaining power of suppliers during the late 1980s, it is apparent that suppliers are more powerful today. The increased unity among the coffee farmers, decreased significance of specialty coffee retailers purchases as a proportion of premium coffee bean sales and increased importance placed on high quality coffee beans by the purchasers have all acted to increase the bargaining power of the supplier group. Although Starbucks has locked some of the coffee suppliers into long-term contracts not all suppliers are affected; thus, the supplier bargaining power is only ma rginally diminished by that tactic. Bargaining Power of Buyers The last component of Michael Porters five forces analysis to be applied to the modern specialty coffee industry is the force created by the bargaining power of buyers. The primary buyers in the specialty coffee industry remain individual consumers, who neither engage in concerted behavior nor individually purchase in large volumes relative to the total sales of a corporation such as Starbucks. Unlike the late 1980s, however, there are a few buyers who purchase in large volumes. These large buyers are typically other multinational corporations who choose to serve Starbucks brewed coffee in their offices. However, the effects of losing one of these buyers to a competitor would not be detrimental to a company with a large sales volume such as Starbucks. Neither the individual consumers nor the multinational corporations who purchase specialty coffee commit a significant fraction of their resources to these purchases. This makes the buyers less sensitive to price fluctuations and gives the players within the specialty coffee industry more control over pricing. This acts to decrease the bargaining power of both the buyer groups. The expansion of the specialty coffee industry created a wider array of competitors who offered high quality specialty coffee. This made it much harder for the players in the specialty coffee industry to differentiate themselves through quality and turned quality into the industry standard. In addition to the increasing quality standardization which specialty coffee has undergone, the buyers face no switching costs and have an enormous selection of retailers from whom they can buy. The buyers of specialty coffee do pose a credible threat of backward integration. This threat can be carried out if a buyer chooses to start a mom and pop specialty coffee store in close proximity to an established specialty coffee store. Same-store sales are roughly 20% lower in Starbucks stores located within a two block vicinity of mom-and-pop specialty coffee stores. The ability of buyers to backward integrate is enhanced by the availability of all information regarding the demand, market pricing, and supplier costs in the specialty coffee industry through sources such as the World Wide Web. With full information, the buyer is in a better position to ensure that they pay a favorable price and receive an appropriate level of quality from the product. The amount of bargaining power that can be exerted by the buyers within the specialty coffee industry has increased as a result of the availability of information regarding market variables. This along with the other previously discussed changes to the dynamics of buyer bargaining power has increased its overall magnitude from the level it was at in the late 1980s. Limitations of Porters Five Force Model Porters model is a effective tool used to identify whether new products, services or businesses have the potential to be profitable. However it can also be very illuminating when used to understand the balance of power in other situations. Porter argues that five forces determine the profitability of an industry. At the heart of industry are rivals and their competitive strategies linked to, for example, pricing or advertising; but, he contends, it is important to look beyond ones immediate competitors as there are other determines of profitability. Specifically, there might be competition from substitutes products or services. These alternatives may be perceived as substitutes by buyers even though they are part of a different industry. An example would be plastic bottles, cans and glass bottle for packaging coffee for Starbucks. There may also be potential threat of new entrants, although some competitors will see this as an opportunity to strengthen their position in the market by ensuring, as far as they can, customer loyalty. Finally, it is important to appreciate that Starbucks purchase from suppliers and sell to buyers. If they are powerful they are in a position to bargain profits away through reduced margins, by forcing either cost increases or price decreases. This relates to the strategic option of vertical integration, when Starbucks acquires, or mergers with, a supplier or customer and thereby gains greater control over the chain of activities which leads from basic materials through to final consumption. It is important to be aware that this model has further limitations in todays market environment; as it assumes relatively static market structures. Based originally on the economic situation in the eighties with its strong competition and relatively stable market structures, it is not able to take into account new business models and the dynamism of the industries, such as technological innovations and dynamic market entrants from start-ups that will completely change business models within short times. For instance, coffee and soft drinks is often considered as being highly competitive. The industry structure is constantly being revolutionized by innovation that indicates Five Forces model being of limited value since it represents no more than snapshots of a moving picture. Therefore, it is not advisable to develop a strategy solely on the basis of Porters models Haberberg and Rieple, but to examine it in addition to other strategic frameworks of SWOT and PEST analysis. Nevertheless, that does not mean that Porters theories became invalid. What needs to be done is to adopt the model with the knowledge of their limitations and to use them as a part of a larger framework of management tools, techniques and theories. This approach, however, is advisable for the application of every business model. CONCLUSION Any company must seek to understand the nature of its competitive environment if it is to be successful in achieving its objectives and in establishing appropriate strategies. If a company fully understands the nature of the Porters five forces, and particularly appreciates which one is the most important, it will be in a stronger position to defend itself against any threats and to influence the forces with its strategy. The situation is fluid, and the nature and relative power of the forces will change. Consequently, the need to monitor and stay aware is continuous. Some issues during the implementation of these Five Forces are crucially important for organizations to build long-term business strategy and sustaining competitive advantages rather than simply list the forces. Successful use of the Porter Model Analysis includes identifying the sources of competition, the strength and likelihood of that competition existing, and strategic recommendations for the action a company should take to in order to develop barriers to competition. Having applied Michael Porters five forces model to the specialty coffee environment which confronted Starbucks in 2007, a conclusion can be logically derived regarding how the proportional effects of each force on the competition within the specialty coffee industry has changed since 1987. Specifically, the force created by industry rivalry has gone from one grounded in strategies of differentiation and focus while discouraging price wars to an extremely competitive environment where differentiation is increasingly difficult and price wars are looming. The strength of the force imposed by the potential for new entrants has decreased as a result of more formidable barriers to entry. The bargaining power of both suppliers and buyers has increased as a result of increased unity among the suppliers and the accessibility of information to the buyers. The threat of substitutes is still insignificant given the continued declining sales of carbonated soft drinks compared to coffee and speci fically specialty coffee.

Tuesday, November 12, 2019

Computer Ethics and Information Systems

â€Å"Computer Ethics and Information Security† a. Introduction The consideration of computer ethics fundamentally emerged with the birth of computers. There was concern right away that computers would be used inappropriately to the detriment of society compromising information security, or that they would replace humans in many jobs, resulting in widespread job loss. Ethics- Guidelines or rules of conduct that govern our lives, work, behavior and communication in both public and private undertaking. Ethics are a set of moral principles that govern an individual or a group on what is acceptable behaviour while using a computer.Computer ethics is a set of moral principles that govern the usage of computers. One of the common issues of computer ethics is violation of copyright issues. Duplicating copyrighted content without the author’s approval, accessing personal information of others are some of the examples that violate ethical principles. Security – is the deg ree of protection to safeguard a nation, union of nations, persons or person against danger, damage, loss, and crime. Security as a form of protection are structures and processes that provide or improve security as a condition.Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction Computer Ethics- is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct. b. Discussion Computer Ethics Ethics deals with placing a â€Å"value† on acts according to whether they are â€Å"good† or â€Å"bad†. Every society has its rules about whether certain acts are ethical or not.These rules have been established as a result of consensus in society and are often written into laws. When computers first began to be used in society at large, the absence of ethical s tandards about their use and related issues caused some problems. However, as their use became widespread in every facet of our lives, discussions in computer ethics resulted in some kind of a consensus. Today, many of these rules have been formulated as laws, either national or international. Computer crimes and computer fraud are now common terms. There are laws against them, and veryone is responsible for knowing what constitutes computer crime and computer fraud. The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute. Here is our interpretation of them: 1) Thou shalt not use a computer to harm other people: If it is unethical to harm people by making a bomb, for example, it is equally bad to write a program that handles the timing of the bomb. Or, to put it more simply, if it is bad to steal and destroy other people’s books and notebooks, it is equally bad to access and destroy their files. ) Thou shalt not interfere with other people's computer work: Computer viruses are small programs that disrupt other people’s computer work by destroying their files, taking huge amounts of computer time or memory, or by simply displaying annoying messages. Generating and consciously spreading computer viruses is unethical. 3) Thou shalt not snoop around in other people's files: Reading other people’s e-mail messages is as bad as opening and reading their letters: This is invading their privacy. Obtaining other people’s non-public files should be judged the same way as breaking into their rooms and stealing their documents.Text documents on the Internet may be protected by encryption. 4) Thou shalt not use a computer to steal: Using a computer to break into the accounts of a company or a bank and transferring money should be judged the same way as robbery. It is illegal and there are strict laws against it. 5) Thou shalt not use a computer to bear false witness: The Internet can spread untruth as fast as it can spread truth. Putting out false â€Å"information† to the world is bad. For instance, spreading false rumors about a person or false propaganda about historical events is wrong. ) Thou shalt not use or copy software for which you have not paid: Software is an intellectual product. In that way, it is like a book: Obtaining illegal copies of copyrighted software is as bad as photocopying a copyrighted book. There are laws against both. Information about the copyright owner can be embedded by a process called watermarking into pictures in the digital format. 7) Thou shalt not use other people's computer resources without authorization: Multiuser systems use user id’s and passwords to enforce their memory and time allocations, and to safeguard information.You should not try to bypass this authorization system. Hacking a system to break and bypass the authorization is unethical. 8) Thou shalt not appropriate other people's intellectual output: For example, the programs you write for the projects assigned in this course are your own intellectual output. Copying somebody else’s program without proper authorization is software piracy and is unethical. Intellectual property is a form of ownership, and may be protected by copyright laws. ) Thou shalt think about the social consequences of the program you write: You have to think about computer issues in a more general social framework: Can the program you write be used in a way that is harmful to society? For example, if you are working for an animation house, and are producing animated films for children, you are responsible for their contents. Do the animations include scenes that can be harmful to children? In the United States, the Communications Decency Act was an attempt by lawmakers to ban certain types of content from Internet websites to protect young children from harmful material.That law was struck down because it violated the free speech principles in that country's constitution. T he discussion, of course, is going on. 10) Thou shalt use a computer in ways that show consideration and respect: Just like public buses or banks, people using computer communications systems may find themselves in situations where there is some form of queuing and you have to wait for your turn and generally be nice to other people in the environment. The fact that you cannot see the people you are interacting with does not mean that you can be rude to them. Ethical Issues :- †¢Computers in the Workplace Computer Crime †¢ Privacy and Anonymity †¢ Intellectual Property †¢Professional Responsibility †¢Globalization Computers in the Workplace. Computers can pose a threat to jobs as people feel they may be replaced by them. However, the computer industry already has generated a wide variety of new jobs. When computers do not eliminate a job, they can radically alter it. In addition to job security concerns, another workplace concern is health and safety. It is a computer ethics issue to consider how computers impact health and job satisfaction when information technology is introduced into a workplace.Computer Crime. With the proliferation of computer viruses, spyware, phishing and fraud schemes, and hacking activity from every location in the world, computer crime and security are certainly topics of concern when discussing computer ethics. Besides outsiders, or hackers, many computer crimes, such as embezzlement or planting of logic bombs, are committed by trusted personnel who have authorization to use company computer systems. Privacy and Anonymity. One of the earliest computer ethics topics to arouse public interest was privacy.The ease and efficiency with which computers and networks can be used to gather, store, search, compare, retrieve, and share personal information make computer technology especially threatening to anyone who wishes to keep personal information out of the public domain or out of the hands of those who are perce ived as potential threats. The variety of privacy-related issues generated by computer technology has led to reexamination of the concept of privacy itself. Intellectual Property. One of the more controversial areas of computer ethics concerns the intellectual property rights connected with software ownership.Some people, like Richard Stallman, who started the Free Software Foundation, believe that software ownership should not be allowed at all. He claims that all information should be free, and all programs should be available for copying, studying, and modifying by anyone who wishes to do so. Others, such as Deborah Johnson, argue that software companies or programmers would not invest weeks and months of work and significant funds in the development of software if they could not get the investment back in the form of license fees or sales.Professional Responsibility and Globalization. Global networks such as the Internet and conglomerates of business-to-business network connecti ons are connecting people and information worldwide. Such globalization issues that include ethics considerations include: †¢Global laws †¢Global business †¢Global education †¢Global information flows †¢Information-rich and information-poor nations †¢Information interpretation The gap between rich and poor nations, and between rich and poor citizens in industrialized countries, is very wide.As educational opportunities, business and employment opportunities, medical services, and many other necessities of life move more and more into cyberspace, gaps between the rich and the poor may become even worse, leading to new ethical considerations. Common Computer Ethics Fallacies Although computer education is starting to be incorporated in lower grades in elementary schools, the lack of early computer education for most current adults led to several documented generally accepted fallacies that apply to nearly all computer users.As technology advances, these f allacies will change; new ones will arise, and some of the original fallacies will no longer exist as children learn at an earlier age about computer use, risks, security, and other associated information. There are more than described here, but Peter S. Tippett identified the following computer ethics fallacies, which have been widely discussed and generally accepted as being representative of the most common. The Computer Game Fallacy. Computer users tend to think that computers will generally prevent them from cheating and doing wrong.Programmers particularly believe that an error in programming syntax will prevent it from working, so that if a software program does indeed work, then it must be working correctly and preventing bad things or mistakes from happening. Even computer users in general have gotten the message that computers work with exacting accuracy and will not allow actions that should not occur. Of course, what computer users often do not consider is that although the computer operates under very strict rules, the software programs are written by humans and are just as susceptible to allowing bad things to happen as people often are in their own lives.Along with this, there is also the perception that a person can do something with a computer without being caught, so that if what is being done is not permissible, the computer should somehow prevent them from doing it. The Law-Abiding Citizen Fallacy. Laws provide guidance for many things, including computer use. Sometimes users confuse what is legal with regard to computer use with what is reasonable behavior for using computers. Laws basically define the minimum standard about which actions can be reasonably judged, but such laws also call for individual judgment.Computer users often do not realize they also have a responsibility to consider the ramifications of their actions and to behave accordingly. The Shatterproof Fallacy. Many, if not most, computer users believe that they can do littl e harm accidentally with a computer beyond perhaps erasing or messing up a file. However, computers are tools that can harm, even if computer users are unaware of the fact that their computer actions have actually hurt someone else in some way. For example, sending an email flame to a large group of recipients is the same as publicly humiliating them.Most people realize that they could be sued for libel for making such statements in a physical public forum, but may not realize they are also responsible for what they communicate and for their words and accusations on the Internet. As another example, forwarding e-mail without permission of the author can lead to harm or embarrassment if the original sender was communicating privately without expectation of his message being seen by any others. Also, using e-mail to stalk someone, to send spam, and to harass or offend the recipient in some way also are harmful uses of computers.Software piracy is yet another example of using computers to, in effect, hurt others. Generally, the shatterproof fallacy is the belief that what a person does with a computer can do minimal harm, and only affects perhaps a few files on the computer itself; it is not considering the impact of actions before doing them. The Candy-from-a-Baby Fallacy. Illegal and unethical activity, such as software piracy and plagiarism, are very easy to do with a computer. However, just because it is easy does not mean that it is right.Because of the ease with which computers can make copies, it is likely almost every computer user has committed software piracy of one form or another. The Software Publisher's Association (SPA) and Business Software Alliance (BSA) studies reveal software piracy costs companies multibillions of dollars. Copying a retail software package without paying for it is theft. Just because doing something wrong with a computer is easy does not mean it is ethical, legal, or acceptable. The Hacker's Fallacy.Numerous reports and public ations of the commonly accepted hacker belief is that it is acceptable to do anything with a computer as long as the motivation is to learn and not to gain or make a profit from such activities. This so-called hacker ethic is explored in more depth in the following section. The Free Information Fallacy. A somewhat curious opinion of many is the notion that information â€Å"wants to be free,† as mentioned earlier. It is suggested that this fallacy emerged from the fact that it is so easy to copy digital information and to distribute it widely.However, this line of thinking completely ignores the fact the copying and distribution of data is completely under the control and whim of the people who do it, and to a great extent, the people who allow it to happen. Hacking and Hacktivism Hacking is an ambivalent term, most commonly perceived as being part of criminal activities. However, hacking has been used to describe the work of individuals who have been associated with the open -source movement. Many of the developments in information technology have resulted from what has typically been considered as hacking activities.Manuel Castells considers hacker culture as the â€Å"informationalism† that incubates technological breakthrough, identifying hackers as the actors in the transition from an academically and institutionally constructed milieu of innovation to the emergence of self-organizing networks transcending organizational control. A hacker was originally a person who sought to understand computers as thoroughly as possible. Soon hacking came to be associated with phreaking, breaking into phone networks to make free phone calls, which is clearly illegal.The Hacker Ethic. The idea of a hacker ethic originates in the activities of the original hackers at MIT and Stanford in the 1950s and 1960s. Stephen Levy outlined the so-called hacker ethic as follows: 1. Access to computers should be unlimited and total. 2. All information should be free. 3. A uthority should be mistrusted and decentralization promoted. 4. Hackers should be judged solely by their skills at hacking, rather than by race, class, age, gender, or position. 5. Computers can be used to create art and beauty. . Computers can change your life for the better. The hacker ethic has three main functions: 1. It promotes the belief of individual activity over any form of corporate authority or system of ideals. 2. It supports a completely free-market approach to the exchange of and access to information. 3. It promotes the belief that computers can have a beneficial and life-changing effect. Such ideas are in conflict with a wide range of computer professionals' various codes of ethics. Ethics Codes of Conduct and ResourcesSeveral organizations and groups have defined the computer ethics their members should observe and practice. In fact, most professional organizations have adopted a code of ethics, a large percentage of which address how to handle information. To prov ide the ethics of all professional organizations related to computer use would fill a large book. The following are provided to give you an opportunity to compare similarities between the codes and, most interestingly, to note the differences and sometimes contradictions in the codes followed by the various diverse groups. Information SecurityInformation security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction Information Security Attributes: or qualities, i. e. , Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to help identify and apply information security industry standards, as mechanisms of protection and prevention, at three levels or layers: physical, personal and organizational.Essentially, procedures or policies are implemented to tell people (administrators, users and operators)how to use products to ensure information security within the organizations. Confidentiality Confidentiality is the term used to prevent the disclosure of information to unauthorized individuals or systems. For example, a credit card transaction on the Internet requires the credit card number to be transmitted from the buyer to the merchant and from the merchant to a transaction processing network.The system attempts to enforce confidentiality by encrypting the card number during transmission, by limiting the places where it might appear (in databases, log files, backups, printed receipts, and so on), and by restricting access to the places where it is stored. If an unauthorized party obtains the card number in any way, a breach of confidentiality has occurred. Confidentiality is necessary (but not sufficient) for maintaining the privacy of the people whose personal information a system holds. [citation needed] IntegrityIn information security, integrity means that data cannot be modified undetectably. [citation needed] This is not the same thing as referential integrity in databases, although it can be viewed as a special case of Consistency as understood in the classic ACID model of transaction processing. Integrity is violated when a message is actively modified in transit. Information security systems typically provide message integrity in addition to data confidentiality. Accessibility For any information system to serve its purpose, the information must be available when it is needed.This means that the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly. High availability systems aim to remain available at all times, preventing service disruptions due to power outages, hardware failures, and system upgrades. Ensuring availability also involves preventing denial-of-service attacks. Authent icity In computing, e-Business, and information security, it is necessary to ensure that the data, transactions, communications or documents (electronic or physical) are genuine.It is also important for authenticity to validate that both parties involved are who they claim they are. Non-repudiation In law, non-repudiation implies one's intention to fulfill their obligations to a contract. It also implies that one party of a transaction cannot deny having received a transaction nor can the other party deny having sent a transaction. Electronic commerce uses technology such as digital signatures and public key encryption to establish authenticity and non-repudiation. c. ConclusionImpact of Computer Ethics on Information Security The relationship between information security and computer ethics does not look, on the surface, readily obvious, and even appears remote. It is, however, credible. Culture, customs, trust and privacy that characterize security fall within the realm of ethics. Computer ethics alert information security management to ethical considerations and warn potential offenders of ethical consequences in situations where the technical tools or the legal measures fail.In these cases, an ethical decision may be helpful in bringing about a solution. Furthermore, this conclusion is consistent with the following premises with respect to technical controls, computer laws and computer ethics: †¢Premise 1: The information security management community has applied control tools to meet the information security objectives of safeguarding confidentiality against unauthorized access, upholding integrity and maintaining availability. However, detecting computer crime is difficult, because the act is either traceless or difficult to trace.Quantifying the damage is problematic since the victims all too often withhold reporting the crime for reasons including fear of recrimination and bad publicity. 8 Therefore, the technical control tools are ineffective, wi th respect to legal issues. †¢Premise 2: Computer laws have been enacted in various nations at an ever-increasing rate since the late 1980s, when business and the society at large were forced to face the magnitude and severity of damage not experienced prior to computer crimes. There has been a dramatic increase in specialized legislation to combat criminal behaviors related to computer crime, which include traditional crimes committed with the use of a computer and a variety of new, technologyspecific criminal behaviors spawned by the rapid emergence of computer technologies and the exponential expansion of the Internet. 10 However, despite the additional new laws, prosecution is deterred because the legal proceeding is a tardy, time-consuming and expensive process, even when there are well-justified intentions to proceed with legal action.Also, legislation always lags behind the event such that either no appropriate laws are found or the new law is too late for the case in ha nd. Hence, computer laws are at best a deterrent to computer crime, not a guardian of information. †¢Premise 3: Computer ethicists assert, on the one hand, that special ethical issues are raised because computers are special technology, and query, on the other hand, why there should be computer ethics since, for example, there is no such thing as telephone ethics even though the telephone is a special technology that makes a profound change on the way individuals communicate with others. 1 However, information security is worthy of ethical consideration as many decisions in information technology affect a wide range of stakeholders. National and international computer societies have promoted codes of ethical practice and even written these codes into their constitutions. As technology advances, computers continue to have a greater impact on society.Therefore, computer ethics promotes the discussion of how much influence computers should have in areas such as information securit y, artificial intelligence and human communication. As the world of computers evolves, computer ethics continues to create ethical standards that address new issues raised by new technologies. Reference http://www. isaca. org/Journal http://plato. stanford. edu/entries/ethics-computer/ http://www. cmpe. boun. edu. tr/~say/c150/intro/lit10. html

Sunday, November 10, 2019

Frankenstein and Bladerunner Essay

A holistic understanding of a text can be only be pursued by the audience only when they are able to pinpoint the intended values of the composer and resonate these values with the time and context of the text. It is evident that through a comparative study of Mary Shelley’s 1818 novel Frankenstein together with Ridley Scott’s 1992 film Blade Runner, despite the one hundred year gap between the two texts, the values each composer wishes to deliver to the audience echo the concerns of humanity and its susceptibility against themselves.Frankenstein explores how humanity’s obsession with scientific and medical developments in the 19th Century while Blade Runner explores the societal vales of consumerism and capitalism in the 20th Century. Evidently, it is clear through the comparison of the texts as to how the social values of each society bring detrimental outcomes for humanity. A theme that is seen in Frankenstein is the danger of unrestrained scientific progress and creation, a theme most evident when Frankenstein bestows the â€Å"spark of life† upon his creature in his effort to â€Å"pour a torrent of light into our dark world†.Here Shelley alludes to the sciences of the period of enlightenment or in particular, Galvanism which held the belief that corpses could be reanimated through an electrical current, or â€Å"spark†. The characterization of Frankenstein serves to symbolize the desire of humanity to be able to create and control aspects of life which were limited to god. This becomes clearer as Frankenstein states, â€Å"A new species would bless me as its creator and source; many happy and excellent natures would owe their being to me. Here, Shelley uses a listing of descriptive language which embeds positive connotations in order to depict the naive hopes of humanity’s desire to create and control life and nature. As the plot unfolds, it becomes evident that this desire only leads to false hopes as Fra nkenstein’s creation states, â€Å"You are my creator, but I am your master; obey! †. Here, the paradoxical statement by the creation is indicative of how humanity’s desires will ultimately backfire when the power to create and control is unchecked and abused.Ultimately, the monster is responsible for the death of many associates of Frankenstein as well as Frankenstein himself which shows the ultimate backfire of scientific progresses on humanity. Scott’s Bladerunner recognizes the same flaws within humanity as Mary Shelly’s Frankenstein. He portrays a world where humanity’s hunger for power, control and technological advances ultimately leads to their downfall. In the opening scene, Scott portrays the dominating figure of Tyrell’s building through the use of a panoramic shot, where the large and tall building juxtaposes with the other buildings of the society.In order to give more focus on Tyrell’s building, a dolly shot is us ed and together with eerie background music, the director creates a mysterious atmosphere concerning Tyrell’s practices. Tyrell's company alludes to the rise of capitalism and consumerism in the twentieth century, where this lead to large transnational corporations being one of the dominant forces of globalization. This can be witnessed in the low angle shot of the high rise buildings, which embed Coca Cola and Pan Am Airlines advertisements through neon lighting.The forces of globalization can be further recognized with the oriental background music which accompanies the advertisements together with a follow up mid shot depicting a large screen with a Japanese geisha dominating the screen. This alludes to the dominant Asian culture in LA alludes to the aggressive Asian Tiger Economics of the late 20th century, where the drastic rise of Asian countries such as Japan and China was seen.Hence, by blending these notions of social values with the dystopian depiction of LA, where the continuous rainfall and the absence of sunlight indicates the destruction of nature and its endowments, Scott is foreshadowing a society which humanity has ultimately destroyed with their own hands. Once the responders understand the contextual influence on the two texts, the responders are then able to grasp the core idea of both texts – humanity’s negligence in their power. Both texts indicate the self-destructive nature of humanity’s empowerment to which responders can reflect upon in correlation with their contemporary society.Firstly, Frankenstein portrays how the ambition to redefine human limitations through creation is bound to result in failure, and accordingly create something monstrous. Frankenstein’s Creature is the very embodiment of the monstrosity that humans are capable of creating. The symbolism of light in, â€Å"until from the midst of this darkness a sudden light broke in upon me† conveys Victor’s instinctive awakenin g to the possibility of creating a perfect being impervious to diseases. The contrast between the ‘darkness’ and ‘light’ hints the didactic purpose which Shelley tries to convey to her responders.Such a taboo act of trespassing the domain of the divine providence signifies the beginning of Frankenstein’s blindness. Frankenstein is quick to realize that he has created a monster, as shown by the regretful tone in, â€Å"I beheld the wretch – the miserable monster whom I had created. † This depicts that untamed human ambition can lead to the inadvertent creation of the ‘grotesque’ and through this, Shelly is alluding to the ideology that creation is the work of God and should not be attempted by humanity. Blade Runner examines this notion of the negligence of humanity’s empowerment on a much broader scale than Frankenstein.This is achieved by depicting the detrimental consequences of humanity’s misuse of power up on an entire country. Frankenstein was a forewarning of the dangers of human ambition of that context, but Bladerunner portrays the aftermath of the overambitious quest for knowledge in the future if the misuse of power cannot be contained by depicting a dystopian world. Appropriately, the human beings in this alternate future seem artificial and lacking humanity except for the protagonist Deckard. Deckard is the primary voice of the director, where Scott portrays his ideas on how humanity should be living through the actions of Deckard.In Bladerunner, Deckard is a character who distances himself from the social norm of technology and the rigid structure of society. He is indicative of the traditional ‘human’ who responds emotionally and takes part in conventional human actions. Although this notion is strongly evidenced towards the end of the film, the director foreshadows Deckard’s humanitarian characteristics from the beginning of the film. The idea of Deckard holding human qualities can be witnessed in the scene when Deckard is reading the newspaper. A dolly shot is utilized by Scott in order to capture the setting of the city and gradually focus on Deckard.Through this shot, the responders recognize the strong juxtaposition between the social values and Deckard. Deckard is reading the traditional ‘newspaper’, whilst in the background, numerous television screens showing the news can be seen. This contrast in effect highlights that Deckard abides by the more ‘traditional’ conventions of humanity and through his heroic portrayal, it becomes evident that Scott wishes to address that in order for humanity to survive, it will require us to restrain ourselves from being too consumed with social cults and conventions which invoke control, creation and power.In order to fulfill an understanding of a text, responders need to identify and understand the true intentions of the composer. When both Frankenstein and Blade R unner are read on parallel, although their contexts are different, the problematic issues resonate with each other and furthermore, responders can also illustrate that these texts induces the responders to reflect on the contemporary society to understand that the social values of our time, although they may seem standard may be in fact detrimental for humanity.

Friday, November 8, 2019

Biography of Hans Bethe

Biography of Hans Bethe German-American physicist Hans Albrecht Bethe (pronounced BAY-tah) was born on July 2, 1906. He made key contributions to the field of nuclear physics and helped to develop the hydrogen bomb and the  atomic bomb used in World War II. He died on March 6, 2005. Early Years Hans Bethe was born on July 2, 1906 in Strasbourg, Alsace-Lorraine. He was the only child of Anna and Albrecht Bethe, the latter of whom worked as a physiologist at the University of Strasbourg. As a child, Hans Bethe showed an early aptitude for mathematics and often read his fathers calculus and trigonometry books. The family moved to Frankfurt when Albrecht Bethe took a new position at the Institute of Physiology at the  University of Frankfurt am Main. Hans Bethe attended secondary school at Goethe-Gymnasium  in  Frankfurt until he contracted tuberculosis in 1916. He took some time off school to recover before graduating in 1924. Bethe went on to study at the University of Frankfurt for two years before transferring to the University of Munich  so that he could study theoretical physics under German physicist Arnold Sommerfeld. Bethe earned his PhD in 1928. He worked as an assistant professor at the University of Tubingen and later worked as a lecturer at the University of Manchester after immigrating to England in 1933. Bethe moved to the United States in 1935 and took a job as a professor at Cornell University. Marriage and Family Hans Bethe married Rose Ewald, the daughter of German physicist Paul Ewald, in 1939. They had two children, Henry and Monica, and eventually, three grandchildren. Scientific Contributions From 1942 to 1945, Hans Bethe served as the director of the theoretical division at Los Alamos where he worked on the Manhattan Project, a team effort to assemble the worlds first atomic bomb. His work was instrumental in calculating the bombs explosive yield. In 1947 Bethe contributed to the development of quantum electrodynamics by being the first scientist to explain the Lamb-shift in the hydrogen spectrum.  At the beginning of the Korean War, Bethe worked on another war-related project and helped to develop a hydrogen bomb. In 1967, Bethe was awarded a Nobel Prize in Physics for his revolutionary work in stellar nucleosynthesis. This work offered insight into the ways in which stars produce energy. Bethe also developed a theory related to inelastic collisions, which helped nuclear physicists understand the stopping power of matter for fast charged particles. Some of his other contributions include work on solid-state theory and a theory of the order and disorder in alloys. Late in life, when Bethe was in his mid-90s, he continued to contribute to research in astrophysics by publishing papers on supernovae, neutron stars,  black holes. Death Hans Bethe retired in 1976 but studied astrophysics and served as the John Wendell Anderson Emeritus Professor of Physics Emeritus at  Cornell University  until his death. He died of congestive heart failure on March 6, 2005 at his home in Ithaca, New York. He was 98 years old. Impact and Legacy Hans Bethe was the  head theoretician on the Manhattan Project  and was a key contributor to the atomic bombs that killed more than 100,000 people and wounded even more when they were dropped on Hiroshima and Nagasaki during  World War II. Bethe also helped to develop the hydrogen bomb, despite the fact that he was opposed to the development of this type of weapon. For more than 50 years, Bethe strongly advised caution in using the power of the atom. He supported  nuclear nonproliferation treaties and frequently spoke out against missile defense systems. Bethe also advocated for the use of national laboratories to develop technologies that would lower the risk of nuclear war rather than weapons that could win a nuclear war. Hans Bethes legacy lives on today. Many of the discoveries that he made in nuclear physics and astrophysics during his 70 year career have stood the test of time, and scientists are still using and building upon his work to make progress in theoretical physics and  quantum mechanics. Famous Quotes Hans Bethe was a key contributor to the atomic bomb used in World War II as well as the hydrogen bomb. He also spent a significant portion of his life advocating for nuclear disarmament. So, it is really no surprise that he was often asked about his contributions and the potential for nuclear war in the future. Here are some of his most famous quotes on the topic: When I started participating in thermonuclear work in the summer of 1950, I was hoping to prove that thermonuclear weapons could not be made. If this could have been proved convincingly, this would of course have applied to both the Russians and ourselves and would have given greater security to both sides than we can now ever achieve. It was possible to entertain such a hope until the spring of 1951, when it suddenly became clear that it was no longer tenable.If we fight a war and win it with H-bombs, what history will remember is not the ideals we were fighting for but the methods we used to accomplish them. These methods will be compared to the warfare of Genghis Khan who ruthlessly killed every last inhabitant of Persia.Today the arms race is a long-range problem. The Second World War was a short-range problem, and in the short range I think it was essential to make the atomic bomb. However, not much thought was given to the time after the bomb. At first, the work was too absorbi ng, and we wanted to get the job done. But I think that once it was made it had its own impulse - its own motion that could not be stopped. Today we are rightly in an era of disarmament and dismantlement of nuclear weapons. But in some countries nuclear weapons development still continues. Whether and when the various Nations of the World can agree to stop this is uncertain. But individual scientists can still influence this process by withholding their skills.  Accordingly, I call on all scientists in all countries to cease and desist from work creating, developing, improving and manufacturing further nuclear weapons - and, for that matter, other weapons of potential mass destruction such as chemical and biological weapons.   Hans Bethe Fast Facts Full Name:  Hans Albrecht Bethe  Occupation: PhysicistBorn: July 2, 1906 in  Strasbourg, Germany (now Strasbourg, France)Died: March 6, 2005 in Ithaca, New York, USAEducation: Goethe University Frankfurt,  Ludwig Maximilian University of MunichKey Accomplishment: Received the Nobel Prize in Physics in 1967 for his work in  stellar nucleosynthesis. Served as head theoretician on the Manhattan Project.  Spouses Name: Rose EwaldChildrens Names: Henry Bethe,  Monica Bethe Bibliography Broad, William J. â€Å"HANS BETHE CONFRONTS THE LEGACY OF HIS BOMB.†Ã‚  The New York Times, The New York Times, 11 June 1984, www.nytimes.com/1984/06/12/science/hans-bethe-confronts-the-legacy-of-his-bomb.html?pagewantedall.Broad, William J. â€Å"Hans Bethe, Prober of Sunlight and Atomic Energy, Dies at 98.†Ã‚  The New York Times, The New York Times, 8 Mar. 2005, www.nytimes.com/2005/03/08/science/hans-bethe-prober-of-sunlight-and-atomic-energy-dies-at-98.html.Gibbs, W. Wayt. â€Å"Hans Albrecht Bethe, 1906-2005.†Ã‚  Scientific American, 1 May 2005, www.scientificamerican.com/article/hans-albrecht-bethe-1906-2005/.â€Å"Hans Bethe.†Ã‚  Atomic Heritage Foundation, 2 July 1906, www.atomicheritage.org/profile/hans-bethe.â€Å"Hans Bethe - Biographical.†Ã‚  Nobelprize.org, www.nobelprize.org/nobel_prizes/physics/laureates/1967/bethe-bio.html.Irion, Robert. â€Å"A Towering Physicists Legacy Faces a Threatening Future.†Ã‚  Science, American Asso ciation for the Advancement of Science, 7 July 2006, science.sciencemag.org/content/313/5783/39.full?rss1.

Wednesday, November 6, 2019

Problems facing the Bronx clinic Essay Example

Problems facing the Bronx clinic Essay Example Problems facing the Bronx clinic Paper Problems facing the Bronx clinic Paper There are various problems facing the clinic that ranges from the institution itself in terms of the policies and the management as well as the workers. Others are the patients who place the clinic at a confused state. Further more the government and other clinic stakeholders (Richard Perez F1). The patients are ignorant of the clinic policies especially the Medicaid care. Some of them do not understand the Medicaid system like Ms. Shuler who is experiencing great problems in health care more so in enrollment of the Medicaid. Other do not even bother to sign in for the Medicaid like Ms. Watson. Some patients never goes back for appointment. In addition to all these, they even sell their drugs Some of t5he patients are very ignorant such that they wait until they are seriously sick to go the clinics (Richard Perez F1). Again, the institution as well as the The whole of New York pays the workers low salaries thus are inclined to seek for jobs in health care institutions. As a matter of fact, New York is raked as the lowest state that pays doctors good salaries for treating patients on Medicaid. There is the embezzlement of funds thus making the running of institution challenging to meeting its cost. Some of the programs implemented by the clinic cost too much of the taxpayers money and further, they are victims of fraud and abuse thus wasting a lot of money. The management of the clinic is corrupt as well as its workers as seen in the fired worker who was demanding $75from a HIV patient. Enrollment on Medicaid is rather tedious and cumbersome to the poor patients who may be having little no no education to fill in the six paged document and further to pay four cosequtive stubs and other conditions. These are just but a few of the problems the clinic faces (Richard Perez F1). 2 The stake holders of the clinic The Bronx clinic has got several number of stakeholders. Some of them are the patients, doctors, the government, clinic workers and the insurance companies among many others (Richard Perez F1). The patients include;Crystal T. Schuler who was a single pregnant mother who who went for months without care, Ronald Shinnery the asthmatic with breathing difficulties, Ms Johnson who had been insured for two months without her knowledge (Richard Perez F1). The doctors as part of the stakeholders included Dr. Tomasz Howard who examined the fifth grade girl who was suffering from chronic problem,Anita Wilenkin,is the Morris Heghts chief operating officer, Susan Bilinghurst who is the clinic physician assistant., the clinics H.I.V programs administrator is called Ralph Belloise. The government is also a stakeholder in the clinic with Dennis P. Whalen being the executive deputy commissioner of the health state department and the deputy state commissioner of health is Kathryn Kuhmerker..Hugo Garcia is an employee of the clinic while at the same time,Mr. Garcia is a co-worker (Richard Perez F1). 3 Relationship in ideas between clinical performance and quality management and leadership. Performance of an institution whether private or public go hand in hand with proper quality management as well as good leadership. The same case applies to the clinical performance. For the clinic to perform at its best, there is the need to come up with better management strategies in addition to conducting   good leadership skills to enhance transparency. In assessing the Bronx clinic,the institution has hardly performed to the expectation of the society and even to its own expectation. Many of the patients hardly receive proper care at the right time. A good example is the fifth grader girl who was treated for her irregular heart beats after one and half years (Richard Perez F1). The clinic is performing below the expectation due to its poor policies. Some of the systems like Medicaid which is cumbersome to enroll especially by poor and uneducated patients. Further more they are expensive to both the taxpayer and the institution and are subjected to fraud. The leadership both within the clinic and the state also contributes significantly to the under achievement of the clinic. Due to lack of proper managerial skills in the clinic, they workers like doctors decline working in the institution. When Dr. Ortiz left the clinic, for another job almost the whole institution came to a stand still. The institution rather than calling its patients it writes letters which is a process that takes a lot of time. The workers of the clinic are corrupt and this is portrayed by the worker who was asking for money from a H.I.V patient. The state is failing the clinic when it is reluctant to update and consequently inform the insurance officials on time. It contribute to poor performance by the clinic when it fails to pay the doctors good salaries (Richard Perez F1).

Sunday, November 3, 2019

An Analysis of the Juvenile Justice System Research Paper

An Analysis of the Juvenile Justice System - Research Paper Example Because many commonalities are shared by the juvenile and adult criminal justice systems, it is often easy to confuse the overall goals and mechanisms which drive them. The most notable contrast between the juvenile justice system and the adult criminal justice system is the fact that the juvenile justice system has it its core the goal and desire to rehabilitate the offender rather than merely punish him/her for the crime. Because of the varying degrees of compatibility and comparison between the two systems, this analysis will examine Supreme Court rulings in order to show a pattern of differentiation and evolution of juvenile justice over time. 1 In re Winship 397 U.S. 358, 90 S.Ct. 1068 (1970) The first case in question is case 397 U.S. 358 (In re Winship). The case revolved around a 12 year old who was charged with stealing money from a woman’s purse inside a store. Although the defendant was seen running from the scene, the Supreme Court determined that the preponderance of evidence alone was not sufficient to convict the juvenile of the crime; instead, the court ruling upheld that juvenile justice cases must be held to the same rigor that traditional criminal justice cases are in that it must be proved beyond â€Å"reasonable doubt† that the accused was guilty. ... need not operate under the same standards of law that applied to adult courts because the juvenile justice system was intended to save rather than to punish. Rather, the Supreme Court sided with the defense and ruled that proof beyond reasonable doubt as well as the existence of a preponderance of evidence was necessary to adjudicate cases within the juvenile justice system. To an extent, this case further restricted the existing juvenile justice system. Prior to this precedent, the juvenile justice system was not beholden to many of the guiding standards that affected traditional criminal cases. As a result, the juvenile justice system encouraged an judicial atmosphere of â€Å"make it up as you go along†. Unfortunately, this type of attitude did not lend itself to the appropriate dispensation of justice. Judges were taking liberties with the notion that they were responsible for saving the accused youth; thereby encouraging the judges to err on the side of caution when handi ng down sentences in the hopes that they might reform an errant youth. Although the Supreme Court upheld the right of the juvenile justice courts to correct the youth as well as punish them, the constraints of how the judges were to go about â€Å"correcting† the youth was significantly altered. 2 McKeiver v. Pennsylvania 403 U.S. 528, 91 S.Ct. 1976 (1971) In much the same vein, 403 U.S. 528 worked to create further delineations of due process within the juvenile justice system. The case regarded a 16 year old boy who was charged with robbery, larceny, and the receipt of stolen property. The case hinged upon the fact that the youth was only provided with a few moments to meet with his attorney prior to going before the judge. Because of the overall lack of legal defense preparedness, the

Friday, November 1, 2019

Personal statement for applying master Essay Example | Topics and Well Written Essays - 1000 words

Personal statement for applying master - Essay Example As such, I enrolled myself in Bachelors of Financial Math, Leicster University. The key objective of financial math is to understand the construction of the best financial strategies which would minimize risk taking by preventing arbitrariness via means of right pricing of assets. The first two years of the course which focused on pure math, helped teach us the essential analytical skills and cultivated logical thinking. Along with this the course also dealt with micro as well as macro economics, all of which I passed in A-level. It is always good to gain on site experience of the job. As such I have interned under the Bank of China with their international trading department. Bank of Chinaï ¼Å'or Bank of China Limited is one of China’s four state-owned commercial banks.  In terms of tier one capital, it was ranked 18th among the world’s top 1,000 banks by The Banker magazine in 2005. Their business covers commercial banking, investment banking and insurance. Members of the group include BOC Hong Kong, BOC International, BOCG Insurance and other financial institutions. It has received wide recognition from its peers, customers and authoritative media for the credit and performance it achieved in past years. It has been awarded â€Å"Best Bank in China† and â€Å"Best Domestic Bank in China† by Euro money for eight times. As a preliminary test of my abilities, I was exposed to the stock market. One of the new aspects which I learnt about was the letter of credit and how the cred it crunch in the US, UK and other developed nations was affecting the economic institutions of China. The stock market taught me to use mathematics as a key to analysis of a company- of their profits as well as their potential. Undoubtedly, I made a lot of profit along with a few loses due to the credit crisis. Both these things were teachers of the real world. Other than this, when I learnt that some of the