Saturday, August 31, 2019

memory is a constructive and active process Essay

Memory is a subject that has been of much interest to psychologists for many years and various research has been carried out in aid of trying to understand how memory works. It can be understood that memory is compromised of three processes and three key subsystems which enable it to work and perform efficiently on a daily basis. The encoding process is where information is retrieved via what is known as sensory memory which is encoded either visually or semantically by attaching a meaning to a word. In terms of storage of memory, the information in the sensory memory is either held in short term memory where it can be recalled for a few minutes or long term memory where it can be recalled for several decades. However a topic of much debate is whether memory is a constructive or passive process. Memory as an active process can be explained as the concept of memories being altered, distorted or even constructed from external sources whereas passive memory is where information is recal led exactly as it is encoded. A claim has been made that memory is active and constructive therefore in order to evaluate this claim it is important to consider the relevant studies carried out in this area of cognitive psychology. (Brace and Roth, 2007) When looking at the processes involved in memory, it is clear that the circumstances play an important role in whether retrieval becomes an active or passive process. When information is unfamiliar or leading questions are asked about memories, this can affect our recall and the memories can become distorted which implies a constructive aspect when recalling information. A number of studies examining specific circumstances and their effects on memory support this concept. Encoding follows a similar principle, where depending on the circumstances the information is either encoded passively or constructed with a mix of new information and information stored in long term memory in order to attach meaning to the information. Storage on the other hand is primarily passive as the information is recorded  automatically. It is also important to take into account that there is not just one type of memory but that it can be split into two different categories, short term memory and long term memory.(Brace and Roth, 2007) When looking at short term memory specifically, it becomes clear that there is a conscious and active aspect to the process therefore supporting the claim at least partially that memory is constructive. This is demonstrated in Baddley and Hitch’s model of short term memory (as cited in Brace and Roth 2007) they claim that the short term memory is comparable to a â€Å"workbench† concept where new information is mixed with old memories and stored information in order to carry out a variety of processes depending on the specific circumstances. The main weakness with this theory or concept is the inability to visually see what is occuring in the brain. Although we can look at PET scans and see relative differences in the posterior Hippocampus when investigating the active part of memory as can be seen in Maguier et al’s study (as cited in Brace and Roth 2007) of taxi drivers where that specific section of the brain was enlarged. We are still unable to see the actual information being encoded or stored however the speculation and theories put forward support the concept of some aspects of short term memory being constructive. Moving onto the main memory processes, Bartletts â€Å"The war of the ghosts† study (as cited in Brace and Roth 2007) is particularly relevant when evaluating the claim of memory being an entirely constructive and active process. He chose a story specifically aimed to contain unfamiliar concepts to the participants. This allowed him to examine the effects of social and personal experiences on memory and recall. This study supports the concept of memory being constructive and dynamic because the evidence shows that instead of the story being encoded and stored in a manner that allowed the participants to recall it accurately and undistorted, the participants used previous experiences and concepts that made sense to them in order to encode and retrieve the information. This distortion or transformation of the facts directly points to memory being active as during the processing of the story, it is likely that elaborative rehearsal played a part in the method of encoding and storage as the participants were linking information to  existing knowledge in order to make sense of the story. However it is important to consider there was no control over any of the variables in the study therefore the findings from the experiment would be difficult to measure in terms of accuracy and reliability in relation to the claim proposed. Further support for the claim comes from a study carried out by Loftus and Palmer (1974, as cited in Brace and Roth 2007) which was designed to look at the effect of leading questions and the influence of linguistics on our memory of events. This study further supports the concept of memory being constructive as the information is being distorted through the participants own experiences, this shows that the memories are not being recalled accurately but are being recalled in a manner that the participant is merging past experiences and knowledge along with the study material. This combined with the suggestive nature of the verbs used could also affect the retrieval of memories by misattributing the source resulting in the participants believing something that may not be entirely accurate, in this case the speed of the cars and presence of glass in the video. Although when interpreting the findings, it is important to consider the confounding variable of individual differences I.e personal perception of speed which could effect the validity and generalisability of the data. The study also lacks ecological validity as witnessing the car crash via a media source would not evoke the same emotional response as a witnessing it first hand, which could effect the quality and detail of the information stored. In contrast, certain aspects of memory imply a passive aspect of memory as some types of memories are accurately stored and recalled with little or no distortion and rarely forgotten. In the Bahrick et al (1975, as cited in Brace and Roth 2007) study which looked at the recollection of faces and names of people from their graduating classes it was found that even after 35 years there was almost no forgetting and accurate recall of names and faces. This Study supports the aspect of memory being a passive process as the information encoded is being recalled accurately and over a long period of time. These types of memories are classed as enduring memories and little or no loss or distortion occurs until very old age where other factors could  be responsible. However a weakness of the study was that it only tested names and faces which is a small representation of the types of knowledge stored in long term memory so would be difficult to apply the findings to all aspects of long term memory. Brown and Kulik (1977, as cited in Brace and Roth 2007) created the term ‘flashbulb memories’ in relation to autobiographical memories and carried out an experiment to demonstrate this theory. This experiment focused on events that are surprising and provoke strong emotional responses. This study further supports the notion of memory being passive as long as certain conditions are met. In this particular case the event has to be important to the individual and has to evoke a strong emotional response. As long as these conditions are met an individual is able to store and recall their memories of the event very accurately or at least the reception of the event i.e. who they were with and when they first found out etc. The emotional aspect of the event and the importance to the individual means the information can be recalled exactly as it was encoded with little or no distortion. However, it is important to consider that the rehearsal effect may play an important part in the storage of the memories due to the emotional nature of the event it is possible that these memories are replayed or rehearsed more often than other memories. After evaluating the evidence in relation to the claim that memory is constructive and active, taking into account both the results and the inherent problems with the studies methodology the conclusion has to be drawn that whilst some aspects of memory are indeed constructive there are also passive elements in all three processes of memory. The studies carried out on the retrieval process of memory certainly show strong indication of memory being constructive and show that memories can be altered or distorted by a variety of factors meaning the information retrieved is subject to change. However looking at both the encoding and storage processes these have been shown to have both passive and constructive elements depending on the circumstances such as emotional responses and personal relevance. Therefore looking at memory as a single entity, it has to be seen as an amalgamation of both constructive and passive elements. (Brace and Roth,  2007) References : Brace, N and Roth, I (2007) ‘Memory : structures, processes and skills’ in D. Miell, A.Phoenix, & K.Thomas(Eds.) Mapping psychology, Milton Keynes, The Open University.

Friday, August 30, 2019

Complexity of Poetry

Allison Gilpin Dr. Jones English 102 20 July, 2012 Complexity of Poetry Poetry is a way for the reader to openly interpret a poem in almost any way they see fit. Because there is so much freedom of interpretation with poetry, there leaves a lot of room for discussion and opposition. Billy Collin’s poem, â€Å"Introduction to Poetry†, breaks down the basic ways for interpreting and understanding a poem. In summary, he explains that the reader cannot focus on trying to figure out one specific meaning of a poem, but instead, try to piece together small parts to understand a deeper meaning.Collin’s rules on how to interpret a poem can be applied to Hughes’s poem about a young student writing a poem for homework. Instead of looking at Hughes’s poem as a whole, the reader can better understand it by breaking it down and figuring out why each line is important and how it ties together with the poem as a whole. Understanding Collins rules to interpret a poe m, help the reader decipher Hughes poem on a deeper, more academic level. Langston Hughes’s poem explains how a black, twenty two year old man and the rest of his white classmates are given an assignment to write a paper.The narrator, who is also the student, explains his thoughts about the assignment and how him being the only colored one in his class might be reflected on his grade on the assignment. At the beginning of the poem, he explains how he has to get to class everyday by traveling across some of the â€Å"better† parts of town. The student goes on to explain how even though he is colored, he likes the same things and has the same wants as everyone else. He states that he is no different than the rest of his class and that he too has knowledge to share.By stating this, the student is expressing to the reader how he thinks him and the instructor are equal. In the last few lines the student writes, â€Å"As I learn from you, / I guess you learn from me† (37-38). This explains how even though their skin color and age is different they are still able to learn from each other. The student has a somewhat optimistic and confident tone throughout the poem. He is aware of his capabilities and knows that he can be just as successful as anyone else.Billy Collins â€Å"Introduction to Poetry† explains how whenever people analyze a poem they do not try to find the true message of it. By writing, â€Å"But all they want to do / is tie the poem to a chair with rope / and torture a confession out of it,† explains how the majority of people are lazy and want everything handed to them effortlessly (12-14). This last stanza explains how some people look at poems from one point of view and expect the meaning of the poem to be written out for them.The author is stating that people should look at the poem from different angles just as one would look at the world from a color slide. He tries to explain to the reader that if one were to in terpret the poem from a whole new approach, then they could find a deeper meaning than just the surface meaning. After reading Collins â€Å"Introduction to Poetry†, the reader should have a better sense of how to interpret Hughes’s poem. Throughout the first part of Hughes’s poem the reader may think all of the characters background information including his address, age, and hometown is pointless.After reading an entire stanza about this â€Å"pointless† information the reader may try to stop understanding the poem before they even finish it. If the reader uses Collins instructions about analyzing a poem, they may find that all of this â€Å"pointless† information is actually important and helps contribute to the characters feelings of insecurity. Collins poem explains that not all poems have one specific answer or meaning the writer is trying to get across.Keeping this idea in mind, the reader may realize that Hughes’s poem, in fact, does not state an answer or solution to the characters mixed feelings. Although both of these poems leave room the readers own special interpretation, there is a basic meaning and idea to each one. Both of these poems fit well together because Collin’s thoughts and ideas can be directly applied when reading Hughes’s poem. The poems are an effective example of how even though a poem may seem short and simple, there is usually a deeper and greater meaning beneath the surface.

Thursday, August 29, 2019

Business law case study Essay

This essay will discuss the Case study by firstly identifying four elements of contract, then justifying duties of Mr. Martin with applying the principles of pre-existing contractual duties. Finally a discussion about part payment of debt and promissory estoppel will be explained. Likewise, this essay will evaluate the knowledge of common law and agency relationship. QUESTION 1 a) Four essential elements of a contract should be Offer, Acceptance, Intention to create legal relations and Consideration. Firstly, offer, according to Adams(2012), is a full and clear statement of the terms†(p79) send to a party(the offeree) by another party(the offeror). Otherwise there could be a misunderstanding of an invitation to treat or negotiation which are similar statements. If an offer intends to be legally binding, acceptance, by which the offerees can show their agreement of all the terms of the offer, is needed. Acceptance needs to be valid and informing the offeror, while the terms should as same as the previous ones. Another element, i.e. consideration, aims to make sure the promise made is of value. As defined by Jones (2011), the consideration needs to give benefits to the one, who is suffering a loss at the same time. Last but not least, while making an agreement to be legally enforceable, intention to create legal relations is important. While judging whether it is a binding contract or not, the situation to make this contract needs to be considered, in other words, according to Adams(2012), contract made in a domestic or social environment will not be legally bound. Otherwise, if parties are willing to do a commercial agreement, it will be regard as legally bound(Jones, 2011). b) Mr. Martin need to pay the  £750 due to two reasons, based on three cases existed as judicial precedents, which are Stilk v Myrick(1809), Hartley v Ponsonby(1857) and Williams v Roffey bros(1990)One perspective is that there is an additional value within the new contract, though Mr. Martin and Bob the builder were being under a pre-existing contract. Hold that the old contract is not over, due to the other aspect of reason, Mr. martin needs to pay the extra money in order to avoid the loss. These afore-mentioned two points will be justified by cases. Stilk v Myrick(1809) indicates that a  captain promised the seamen extra money if they did successfully return back home. The court finally hold that the captain is not duty to pay the extra money because the old contract is existed as there is not of additional value. While Harley v Ponsonby(1857) was held that the captain needs to pay the extra money, though the situation is similar, because the court consider there is extra value added to the new contract, whilst the old contract is discharged. There are some similarities among these two cases and Mr. Martin’ s case. Mr. Martin also have an existed contract as both parties are agreed to terms of the contract, but comparing to Stilk’s case, Bob the builder suggest a sub-contract with consider an additional value, which is the value of Martin’s seafood. Meantime, because of the bad weather and sick crews, Marin need to pay extra money to ensure this additional value is secured, however, this does not means the old contract is over because the contract can be fulfilled though it may probably be expiry, as Martin has to pay extra  £750 in spite of the payment of the previous contract. On the other hand, in Williams v Rpffey bros, the claimant consider the loss of defendant if the task is not finished on time, so the defendant do have to pay the claimant the extra money as promised. In this case, Bob the builder consider the benefit of Martin so that they suggest the sub-contractor. As Mr. Marin accepted Bob’s counter offer and Bob help him avoid the loss of an amount of seafood. According to the precedent of Williams’ case, since new value to considered, Mr. Martin should pay the extra  £750. To be concluded, by referring to pre-existing duties, Mr. Martin is obliged to pay the extra  £750. c) Mr. Martin needs to pay the full  £750, as he violates the rule of part payment of debts. When consider the part payment of debt, it is necessary to concern the rule in Pinnel’s Case(1602), by which illustrated that part payment is not a sufficient consideration. Because debtors obtains a benefit with giving nothing of value to the creditors. In Marin’s case, Bob agreed to accept a lower payment( £350) in full settlement despite of any excuse Mr. Marin has used. Obviously, Mr. Martin got a benefit of  £400, whereas Bob gained nothing. Therefore, Mr. Marin provided no consideration in this case, because being sympathizing Martin’s bankrupt cannot gain more value for Bob. Since two parties failed to achieve benefits of two sides, the promise of  Bob is not binding. As a result, Martin has to pay the full  £750 as a legal duty. Apart from that, with regard of the classical High Trees House Case(1947), the principle of promissory estoppel by held that the claimants can acquire the arrears after the end of the war because they have the capacity of claiming the recover the previous price before the war started. However, they are prevented to take back the amount of arrears failed to pay because of their previous promise. In High Tress House Case, the promise was make on a real situation where two parties would consider their benefits therefore achieve benefits of both sides. Specifically, the defendants get the right of lease whilst the claimants obtained a number of profits. While in Martin’s case, no matter whether Mr. Martin have difficulties in his financial situation or not, there is still no consideration for Bob the builder, although Mr. Martin do have a benefit of saving  £400. Since there is no consideration exist, Bob is not obliged to obey the rule of promissory estoppel. To be summarised, by discussing the part payment of debt and promissory estoppel, it is responsible for Mr. Martin to pay the full  £750. As Promissory estoppel is on the doctrine of equality. QUESTION 2 According to PPP(n.d.), the common law is the law comprises the custom and judicial precedents of the courts. First feature of common law is that it is not codified, making it is not coming from the comprehensive legislation which is created through Parliament. Apart from EU enforceable law, common law depends on the distributed courts, in where legislative decisions are made. In other words, common law is the certain law made by judges. The decisions have been made in similar cases would become precedents, which mainly compose the common law. These precedents will be collected and recorded as historical documents or files over time. When coming up a new case, these precedents would be applied in the decision, which means precedents make future decision legally bound. Hierarchy has to be referred to when talking about the precedent, whereas not every precedent will be used in judging a new case. The precedent made in a higher court can be applied in a lower court, otherwise it will not be applicable. For example, a judicial decision, i.e. precedent, already made in court of appeal should be applicable in high court or county court, but a decision made in county  court should not obliged to follow for high court. On the other hand, the courts can overturn the decisions of those in same level. Last but not least, the common law make contract more freedom, which means there are few regulations to restrict contracts. Basically, everything could be acceptable even if there is extremely forbidden by law(Adams, 2012 and Jones, 2011). QUESTION 3 According to Adams(2012) and Jones(2011), the relationships between agency and principal are fiduciary ones. Basically, agents do not have legal right to payment unless the principal authorise the right. Generally payment must not be due until the agent have fulfilled the expected result of principal, otherwise, payment can not be used among any certain process on the relationship. However, agent can be regularly paid when agreement express willingness of both sides. Another right of agent is to claim indemnity if there is any expenses incurred when agent conduct the authority, no matter the agent is gratuitous or not. On the other hand, agents do have duty to possess reasonable care and skill, moreover, an agent with professional or trade skill is expected to preserve the skills as conducting a trade or profession. Then, a contractual agent must carry out the agreed tasks and the whole process of achieving the result should follow the principal’s orders. Therefore, an agent needs to perform his duties himself. The performance of the duties cannot be delegated to any third party. Likewise, the agent is required to be accountable for any profits arising from the performance of the duties and to record the benefits of exercises of authority. Besides, an agent has duty to avoid the possibility of being conflict of interest without principal’s permit, though agent must not sell his own property or shares to principal. Last but not least, an agent not only cannot take any form of bribe, but also cannot make secret profit, whereby the principal can dismiss the agent and make the contract voidable for fraud. In conclusion, case study has been discussed by applying the related law knowledge in terms of consideration of contract particularly. Therefore, basic explanation of common law and, duties and rights within agency relationship are demonstrated. Bibliography Adams, A (2012), Law for business students(7th ed), London: Pearson Education Limited. Public private partnership(n.d.), Key features of common law or civil law systems, Available at: http://ppp.worldbank.org/public-private-partnership/legislation-regulation/framework-assessment/legal-systems/common-vs-civil-law. (Assessed 22 February 2014) Jones, L (2011), Introduction to Business Law, New York: Oxford University Press. Central London Property Trust v High Trees House (1947) KB 130, 44, 53, 110, 119, 595 Hartley v Ponsonby(1875) 7 EL BL 872, 106 Pinnel’s Case (1602) 5 Co Rep 117, 108, 109, 117, 595 Stilk v Myrick (1809) 2 Camp 317, 106, 107, 589 Williams v Roffey Bros (1990) 1 ALL ER 512 CA, 107-109, 118, 119

Wednesday, August 28, 2019

Supply chain management Essay Example | Topics and Well Written Essays - 2250 words - 1

Supply chain management - Essay Example 1). This paper will discuss what a supply chain is and how managers can effectively and efficiently generate positive integration and response of its operations and services. Porter and supply value analysis Michael Porter  (1980) posited that there are values required in the operational chain of an organization or an industry to attain certain competitive leverage and advantage (p. 12). Porter suggested that evaluating the internal dynamics and activities of an organization will add more value to the supply, product, and services cost-efficiently—targeting that this will gain marginal value for products or services (Porter, 1980, p. 20; Fawcett, Ellram & Ogden, 2007, p. 15). If the business operations, marketing, sales, and systems are smoothened, it is expected that the company will gain marginal value for these products and services (Gadde & Hakansson, 2001, p. 1). This precluded the fact that the company is able to strategize and identify the targeted market where their products and services can be delivered satisfactorily and in less cost (Porter, 1980, p. 20). Experts contended that if managers are able to concretely apply the supply chain analysis well as a power tool for strategic planning, the administrative and organizational model can be applied and be extended in the entire supply chain and distribution networks (Porter, 1985, p. 3). Thus, it must be understood that the successful delivery of product and the ensuing economic reward it can generate for the organization (Porter, 1985, p. 3). Business strategists likewise opined that the best possible value can only be attained if the relevance of the processes in all stages is valued and if proper synchronization of all related activities is also logically synchronized (Hugos, 2006, p. 1; Christopher, 2005, p.20; Gadde & Hakansson, 2001, p. 10). Porter (1985) cited an example of the application of value chain analysis led by a manufacturing industry. The company acquired raw materials and opt imized them in the production of a certain product deemed useful and demanded by the market. The company network with retailing industries and presented the products conveniently to targeted customers either through advertisement or any form of rigorous promotion to appeal to its customers its usefulness and the entailing services it could support them (Mindtools, 2013, p. 1). Often, the retailers will package the promotion and use of the products to which it targeted to distribute. Porter’s formula on this is shown below (Mindtools, 2013, p. 1): Value Created and Captured – Cost of Creating that Value = Margin When the organization value what it produces, the more profitable it will be and the more customers are enticed to purchase these products, the more competitive advantage is therefore built (Mindtools, 2013, p. 1). Porter contended that if the human resources of the company understand how they created value and if they are able to participate in creating more va lue, they are likely be able to develop the critical elements

Tuesday, August 27, 2019

Management Accounting 2 Essay Example | Topics and Well Written Essays - 2000 words

Management Accounting 2 - Essay Example The present CEO of the company, Sylvia Trott had realized that the company is inclining towards past achievements and the employees were not satisfied with this behaviour of the management towards them. So in order to measure the performance of the company, a sustainability approach has been adopted to identify certain key performance indicators of the company, such as: a) Social Indicators, b) Economic Indicators, and c) Financial Indicators. a) Social Indicators: The social indicators of WealthWise are the satisfaction level of the employees, percent of female employees in the top tiers of the management, number of employees recruited, who used to unemployed teenagers, ethical ranking that were given by the customers for the sales staff, and the number of native employees in the company. b) Financial Indicators: The major financial indicators that were considered are the return on investments, insurance premiums, and the net profit of the company. c) Economical Indicators: The econ omical indicators were the practices, and policies that the company implemented for the local suppliers and the expenses to maintain them, the method of recruiting or hiring the native staffs, and the projects that were developed for the benefit of the public. The mission of WealthWise during its inception was to offer environmental and social benefit to the people along with profit maximization. Further, with the progress and growth of the company, the mission of WealthWise extended to assist the customers in achieving a desired lifestyle through financial planning. Apart from this, employee satisfaction is also important because if the employees were dissatisfied then they cannot satisfy their customers. The philosophy of the company is to reflect financial growth, trust and strength through growing upwards, communicate positively, with energy, so as to achieve its mission (WealthWise, 2013a) In order to achieve the mission by the company, all the major performance indicators have to be considered. The social and the environmental benefit can be provided to the customers and society through assessment of the level of employee satisfaction, issues like gender parity in the top tiers of the company, pay scales, and performance evaluation techniques for the employees (Ladley, 2010). The mission to grow and generate revenue can be achieved by observing the financial indicators of the company, which consist of gross insurance premiums that the company can generate through insurance sales, the return of the company on investment, and the net profit. Apart from this, the economic indicators would provide a view of the effects of policies, practices of WealthWise, relationship with the suppliers, hiring process, etc (Rose, & Hudgins, 2010). Answer 3 Performance indicators are the elements that are assessed to evaluate the performance of the company. The term key performance indicators (KPIs) are used by the companies to scrutinize the success factors of various acti vities of the company. The KPIs can be quantitative, directional, financial, actionable, and practical. In case of WealthWise few KPIs, such as economical, financial and social, were considered for evaluating the performance and

Cross ultural Management Essay Example | Topics and Well Written Essays - 750 words

Cross ultural Management - Essay Example We can therefore clearly differentiate the different components of this concept that is; have, think, and do. The three components are very much connected and hence hard to clearly separate them. Language, food or dresses have been viewed as external products of the term culture. Beyond this external layer, we find culture in an invisible way. This includes society’s deeper values and norms which are quite difficult to identify. Characteristics The code of conduct among people of a given society differs from culture to culture. This is true to a small-homogenous society where gender, age, religion and ethnicity could show differences in culture. A good example is one person from a rich family compared to a second of same gender but from a poor family. The two individuals might show cultural differences in terms of values and behavioural expectations. Culture delineates different groupings and society units on the basis of similar ways of seeing and interacting with the whole w orld. According to Willcoxson and Millet (2000), adaptive patterns of behaviours in a given society generate new beliefs which can be recognised. Behaviours, values and beliefs, and their related rituals and myths over time have a great effect on the main assumption of the concept of culture. It gives people a great sense of belonging through collective identity other than defining individual characteristics. It defines a given group based on their similarities rather than differences (Bendrups 2008). Songs and dances Ceremonial performances are core aspects of culture. Related ceremonies including songs and dances can bring different cultural characteristics together. Songs and dances were very specific on every occasion including special occasions. Up to date, songs and dances remain a vital and part of the aboriginal life and customs (Chirwa 2001). They are therefore considered special and sacred. They are performed and composed for different ceremonies such as burial and wedding s. In some past instances, both old and young men were positioned in one group where as old women and young girls formed a different group. Most of them would paint their bodies with ochre in a moonlit and flickering camp fires stage. Men would carry spears with them and their dances where more vigorous compared to women and young girls. At present, ceremonial dress and ornamentation are worn when dances and songs are performed by different groups (McIntosh 2006). The old didgeridoo which is a wind instrument is commonly considered the main instrument of Australian Aborigines. It originated from North Queensland, and is now played in many communities in Australia differently. Therefore, diversity and complexity of cultural and spiritual practices exists among Aboriginal communities in Australia. Song and dance form an important part of culture today and though practiced by only a small number of contemporary societies, for most Aboriginal people they remain a significant part of cer emonies (Willcoxson and Millet 2000). The importance of songs and dances is demonstrated by people travelling long distances to learn new songs in exchange for goods. All people who demonstrate greater talent than others members of the aboriginal societies are normally awarded and honoured. Aboriginal religion and the beliefs which early investigators learnt about from ancient Aboriginal informants were different from Christian beliefs and practices. According to Bendrups (2008), during

Monday, August 26, 2019

History Education in Primary Schools Essay Example | Topics and Well Written Essays - 2000 words

History Education in Primary Schools - Essay Example The pedagogical imperative of such historic education was to harbor conformity, rather than the modern notion of enabling critical though. 1 Colonialism and the World Wars brought about a change in how history would be taught, especially after Education became the state’s function. The emphasis then shifted towards a nationalistic approach of teaching history, what we term as propaganda. We now we live in an era where history is studied in a global context, with the supplementary aim of creating a sense of multiculturalism and diversity. Among the roles of history education, especially in the current context of increased cross cultural interaction, the role of History Education includes: 2 Schools as Social transmitters Promoting active Citizenship Making History Real Promoting Positive Values The same study suggests that debate on the role of history education usually occurs on: Nature of truth Tempering truth Avoiding Moral Relativity While the methodology and focus of histo ry education might be a matter of debate, the importance of this area of study remains uncontested, particularly from a functional aspect. FOCUS OF HISTORY EDUCATION: The focus of history education has often been a matter of debate between politicians and the academia, the crux of which has primarily been the purpose of teaching history. Politicians like the British education secretary, Michael Gove3, claim that the purpose of history education is to inculcate a sense of nationalism in the students so that they are in touch with their political and cultural roots. A score of policy makers believe that the history currently being taught in schools deviates from important British history and is more inclined towards European history and global events. This would obviously imply trimming and framing the curriculum with selected facts and information that would reinforce patriotic sentiments in the targeted students. Academians like Dr Marcus Collins, of Loughborough University, claim t hat such a selective approach of history education is reminiscent of a subtle form of propaganda, that has been a feature of undemocratic nations. This school of thought believes that the most pressing issue with history education isn’t the curriculum, but the amount of time that is devoted to teaching history. Where history education should be made compulsory to higher levels of education, policymakers are bent towards further curtailing the time that is allotted to teaching history. If this notion is translated to educational policies, then history education will indeed become impotent in imparting the necessary analytical skill set it sought out to cater to. It is believed that British history cannot be isolated from European history as much of Britain’s political activity took place beyond its borders, across continents. This debate is part of the government’s frustration over the liberal academic approach that is prevalent in schools, citing a lack of focus and discipline as major issues. As a consequence, the government4 has erected a new program where military officials will be planted as teachers in school to maintain decorum and cement a more focused approach to teaching with the notion of the ‘

Sunday, August 25, 2019

Law of Criminal Evidence Essay Example | Topics and Well Written Essays - 1500 words - 1

Law of Criminal Evidence - Essay Example This right is based on the Latin maxim nemo tenetur se ipsum accusare (no man is bound to accuse himself’). This principle is found, explicitly or by convention, in many of the worlds legal systems including England and wales. (Murphy, P Murphy) Criminal justice and Public Order,1994, section 38, provides that no conviction shall be based wholly on silence of the accused. Furthermore, though not explicitly found in Europpean Convention of Human Rights, (Dennis, I H ,2002) still in the rulings of Europan Court of Human Right, right ot keep silence is maintained. ( Murray v. UK. 1996) It is therefore, found that Imtiaz’s silence during pre-trial period is based on his legal right and will not esteblish any offence against him. For this purpose, the prosecution can not equate his silence to his confession in a court of law. In order to esteblish any guilt, prosecution shall have to maintain his case beyond admission during custody and the case should be suported by the evi dence. To keep silence in pre-trail inquiry by police is an esteblished right of the accused. He may maintain his position even when there is no advice by his solisitor or his solicitor advices against silence. It is found in this case that the accused Imtiaz had kept silence on advice of his solisitor and he also mentioned the same in his statement. However, he did not mention any reason for the same. Now, would there be a change in situation and legal consequences on the ground that accused had given any reason for solicitor’s advice? To be very simple, it must be seen in view of accused’s right. Accused is not bound by the advice of his solicitor as in the case of co-accused, Shannan, who refused to have a solicitor altogather and gave her statement. Solicitor is supposed to guide you as per law and no advice against the law of the land is expected from a legal counsel. In this case, too, the advice by Imtiaz’s solicitor is based on

Saturday, August 24, 2019

Construction Technology 2 Essay Example | Topics and Well Written Essays - 2000 words - 1

Construction Technology 2 - Essay Example Because the fire curves are modelled on the basis of design fires, the analysis becomes vulnerable to the difference between design fire parameters and the real fire situations that may occur. Furthermore, varying conditions and the global proliferation of standards for fire tests make it imperative that an approximate approach to different situations/standards, for structures (at sea and on land) be adopted. This work aims to analyse fire curves in terms of their vital components/features, simultaneously considering the critical levels at which these vital variables of the standard curves experience a change, with the associated consequences of such, regarding the effectiveness of fire curves at carrying out their function of fire resistance determination. A further look will be taken at the applicability of these curves at sea, with analysis involving a look at the means and extent to which these applications vary, in the approach associated with them. The level of fire resistance in structures (onshore) is generally assessed or analysed by the use of engineering fire design curves. Different types of fire curves and standards are adopted in various parts of the world. Different assumptions are also associated with these different curves. Technically speaking, fire curves are applied to determine the fire resistance rating of passive fire protection systems. This rating is a measure of the time over which a passive fire protection system can resist or withstand a standard fire protection test. Some of the most commonly used standard fire curves include the ISO-834 (BS 476 or DIN 4102), which are relevant to cellulosic structures. There are also the ASTM E119 and UL 1709(or Eurocode 1), applicable to hydrocarbon situations. Engineering design practice generally uses these curves in the context of design fire temperatures, which attempt to

Friday, August 23, 2019

Summary about the book Boston tea party Essay Example | Topics and Well Written Essays - 1000 words

Summary about the book Boston tea party - Essay Example The story talks about how the United States of America walked its way into the top of the western hemisphere and settled in a country that has become the most powerful nation in the world. Philbrick explained in this book that the issue of race, religion and violence has always taken center stage in American polity. Nathaniel Philbrck uses the account of William Bradford and Benjamin Church to describe the story of the Mayflower. The book is the story of a ship and its journey on a large and stormy sea into a land that nothing much was known about. Mayflower talks about how the Pilgrims came to settle in New England, the risky ocean crossing that they embarked upon and the sharing of the first Thanksgiving. He gives the true story of the Pilgrims and their tragic but heroic experience at the ocean. Philbrick described how a group of Pilgrims endured the raging of the storms in order to find a very suitable place to worship. The Mayflower ship clumsily moved through winds and storms f or sixty-five days. According to Philbrick, â€Å"For sixty-five days, the Mayflower had blundered her way through storms and headwinds, her bottom a shaggy pelt of seaweed and barnacles, her leaky decks spewing salt water onto her passengers’ devoted heads.† (3). There were 102 humans and 2 dogs in the ship and Phulbrick explained that they were not the usual group of colonists that people are familiar with. They were neither noblemen or servants, but a group of men, women and children who were ready to sacrifice their lives in order to have the assurance that they could worship their God as they pleased. The arguments that the Pilgrims put forward for embarking on such a deadly voyage was that God was in support of their emigration to America (Philbrick 259). Philbrick dedicated a chapter to Thanksgiving with a good account of the events of the feast that lasted for days. The people that took part in the Thanksgiving feast were 100 Pokanoket Indians and 50 colonists. Philbrick noted that the Pilgrims did not originally arrive at Plymouth Rock as people have been made to believe. They first arrived at an Indian graveyard, the Pokanoket tribe had been hit by a strange plague that weakened majority of their population and they did not have the strength to fight against the Pilgrims. The Pokanoket tribe had no other choice than to make peace with the Pilgrims. It is clear from the description of Philbrick that the Thanksgiving feast did not take place in November, but by the end of September or October. There is a possibility that the men that took part in the Thanksgiving feast went fowling for their Thanksgiving feast. The Thanksgiving feast that took place at the fall gave the Americans a glimmer of hope as the events that took place during this period gave signs that things would turn out for their good (Philbrick 104-108). The book talks about how the Pilgrims or people that could be described as religious refugees landed in Plymouth Harbor du ring a period of catastrophe for the Native Americans. The Native Americans had to struggle with an alien disease that was brought into their lands by the European fishermen and this drastically reduced their population. Philbrick talked about the relationship between the Pilgrims and the Wampanaoags. The Pilgrims were led by the belligerent military officer, Miles Standish while the Wampanaoags were led by the enigmatic and scheming Chief Massasoit. The Wampanaoags were

Thursday, August 22, 2019

Two different business organisations Essay Example for Free

Two different business organisations Essay Introduction M1 Unit 1: Business Purposes Red Group 10A/Eb1 Asid Ashraf 10L Assignment 6 (M1) Scenario: The Editor has asked me to identify and research two different businesses in the area to help promote them to the local community. Requirements of M1: Contrast the ownership and purposes of two different business organisations. Task 6(a): Select two businesses to contrast (your choices must be checked and approved by your teacher). The two businesses are Tesco and Oxfam. Task 6(b): Use the same format for the table as shown below to contrast the two different businesses and add a summary at the end: Aspects of ownership Name of 1st organisation: Tesco Name of 2nd organisation: Oxfam Similarities Differences Ownership type Public Limited Company Charity The differences are that Tesco is a PLC and Oxfam is a charity. Middle Type of liability Limited liability for all shareholders They form the Council of Trustees, which is the governing body of the Association of Oxfam (a not-for-profit limited-liability company). The similarities of both organisations are that they are limited liability company. Control The directors appoint shareholders to control the day-to-day duties and responsibilities of the business. Oxfam have a number of trustees who control the organisation which are: Karen Brown, Chair Sandra Dawson, Vice Chair David Pitt-Watson, Hon. Treasurer Vanessa Godfrey James Darcy Maja Daruwala Andy Friend Rajiv Joshi Matthew Martin Marjorie Scardino Nkoyo Toyo Tricia Zipfel They have various duties and responsibilities for example some are executive directors, vice chairmen and CEOà ¢s. The similarities are that both organisations have control on the day-to-day duties and responsibilities. Each organisation have been appointed directors and CEOà ¢s. The differences are that both organisations have different types of control. Conclusion The differences are that Tesco are here to make a profit which is divided between their shareholders used for new shops and to save. Whereas Oxfam are  not due to being a non-profit-organisation. Number of owners 2 or more. Changing all the time as shares are bought and sold and the stock exchange. Oxfam do not have owners they have trustees who run the charity. They currently have 12 trustees. The similarities are that both organisation have people to run there Tesco and Oxfam. The differences are that Tesco have owners to run their business this is because they are making a profit. Whereas Oxfam have trustees to run their non-profit- organisation. and who do not get a share of the profit Summary: I have learnt that both organisations are very distinct this is due to having different organisation type, number of owners, control, capital and sources of finances. I also learnt that Tesco is a PLC and Oxfam is a charity organisation and that they have similarities and differences bet ween themselves. The above preview is unformatted text This student written piece of work is one of many that can be found in our GCSE Business, Companies and Organisation, Activity section.

Wednesday, August 21, 2019

Importance of reading Essay Example for Free

Importance of reading Essay ?Kids who read often and widely get better at it. This is pretty much just common sense. After all, practice makes perfect in almost everything we humans do and reading is no different. 2. Reading exercises our brains. Reading is a much more complex task for the human brain than, say, watching TV is. Reading strengthens brain connections and actually builds new connections. 3. Reading improves concentration. Again, this is a bit of a no-brainer. Children have to sit still and quietly so they can focus on the story when they’re reading. If they read regularly as they grow up, they develop the ability to do this for longer and longer periods. 4. Reading teaches children about the world around them. Through reading, they learn about people, places and events outside their own experience. They are exposed to ways of life, ideas and beliefs about the world which may be different from those which surround them. This learning is important for its own sake however it also builds a store of background knowledge which helps younger children learn to read confidently and well. 5. Reading improves a child’s vocabulary, leads to more highly-developed language skills and improves the childs ability to write well. This is because children learn new words as they read but also because they unconsciously absorb information as they read about things like how to structure sentences and how to use words and language effectively. 6. Reading develops a child’s imagination. This is because when we read our brains translate the descriptions we read of people, places and things into pictures. When we’re engaged in a story, we’re also imagining how the characters are feeling. We use our own experiences to imagine how we would feel in the same situation. 7. Reading helps kids develop empathy. This is something I’ve only recently realised but it makes sense. As my fifteen-year-old son said to me when we were discussing it, ‘Of course it does because you’re identifying with the character in the story so you’re feeling what he’s feeling. ’ 8. Because reading does all the things I’ve mentioned above, children who read do better at school. And they don’t just do better at subjects like reading, English and history. They do better at all subjects and they do better all the way through school. 9. Reading is a great form of entertainment! A paperback book doesn’t take up much space so you can take it anywhere and you’ll never be lonely or bored if you have a book in your bag. You can read while waiting in a queue, while waiting for a friend who’s running late or during a flight delay at an airport. 10. Reading relaxes the body and calms the mind. This is an important point because these days we seem to have forgotten how to relax and especially how to be silent. The constant movement, flashing lights and noise which bombard our senses when we’re watching TV, looking at a computer or playing an electronic game are actually quite stressful for our brains. When we read, we read in silence and the black print on a white page is much less stressful for our eyes and brains. So there you have it – the Top 10 benefits of reading! . Reading has at all times and in all ages been a source of knowledge, of happiness, of pleasure and even moral courage. In todays world with so much more to know and to learn and also the need for a conscious effort to conquer the divisive forces, the importance of reading has increased. In the olden days if reading was not cultivated or encouraged, there was a substitute for it in the religious sermon and in the oral tradition. The practice of telling stories at bed time compensated to some extent for the lack of reading. In the nineteenth century Victorian households used to get together for an hour or so in the evenings and listen to books being read aloud. But today we not only read, we also want to read more and more and catch up with the events taking place around us. The various courses and classes being conducted in rapid reading support this belief. The amount of reading one should get through is of course nobodys business. There is no end to it for there is a variety of subjects to read about. The daily newspaper or the popular magazine while it discusses topical issues and raised controversies, it also provokes thought and throws light on human nature. It brings the news of wars, rebellions, organizations, political stances, heroic deeds etc. , together and helps knit a world of some sort. There is then the serious reading undertaken for research and for satisfying ones longing for knowledge. It may be a subject of scientific significance, or a subject of historic or philosophic importance varying according to the taste of the person. This kind of reading disciplines the mind and trains one for critical and original thinking. There is yet another kind of reading -reading for pleasure. Though serious reading is also a source of pleasure, reading which is devoted mainly to it differs in one respect. It grows upon one, it gives before demanding and it soothes and relieves tension and loneliness. The only kind of reading which neither stimulates thought nor provides knowledge is one which is approached negatively, with the simple motive of escape and of killing time. A person who is widely read is able to mix with others: he is a better conversationalist than those who do not read. He can stand his ground. Reading broadens the vision. it is in a way a substitute for travel. It is not possible to travel as much as one would like to and reading can fill in the gap created by the lack of travel. Reading, as Bacon wrote in his essay. Of Studies. maketh a full man: conference a ready man: and writing an exact man. Thus a widely-read man is a better conversationalist and is able to see the other point of view. Literature is a form of art which can cross barriers and if one does not know the language in which a piece of literature is written, one is willing sometimes to learn the language. Even if one does not learn a language one reads the literary work in translation. This contributes to the growth of understanding and tolerance amongst people. Reading also helps one to see the present in relation to the past and the future, and thus develop a historical perspective. Care is needed to ensure that reading does not become a substitute for real life. The moment one ceases to enjoy the ordinary pleasures and happiness of life and is content to enjoy them vicariously through fictional and historical representations, one loses all the benefits of reading and loses contact with life. With the cinema and television taking up a great deal of attention of children, teenagers and even adults, the habit of serious reading is dying out. People are content to read abridged versions. see films, go through illustrated comics and be content. But just as reading should not become a substitute for the joy of living or drive out the other forms of entertainment, other substitutes should not be accepted for the pleasure of reading which lies in the act itself. One may be selective, may be discriminating but no one can afford to shut himself off from this rich and ever-growing world of literature.

Tuesday, August 20, 2019

Secure Sockets Layer in Security Technology

Secure Sockets Layer in Security Technology SSL (Secure Sockets Layer) the most widely used and most powerful measure in security technology for creating an encrypted link between the Web Server web browsers. If the link is encrypted, they use https protocol. Secure receptacle Layer (SSL) and Transport Layer Security (TLS) is the protocol above TCP, which can protect users confidentiality when they sending data from a customer side to a web server; this is an important protocol due to the extension of Internet. In fact, it is a long way to make the SSL/TLS protocol fully . However there are still flaw and problems during the development of SSL/TLS, and we cannot deny that theremaybe some other potential security hole in the latest version. sequential attack is fatal for both the user and the company in using these protocols to establish a safe channel to transfer information. This article will introduce three typical attacks: Cipher suite rollback attack, narration rollback attack and password exception in SSL/TLS channel.[1]. As the web and World Wide web become common, it is necessary to think about the system security. this can be because the plaintext flowing through the web is unencrypted, it is for cracker or hacker, even a user with none programming information, to intercept the message and modify it. The way to defend personal privacy, and a way to guarantee a secure on-line commerce.. These square measure the challenge for info Technology. SSL/TLS will created a legitimate secure channel between server and shopper which may code the plaintext, then the third party who intercept the message can not disclose the first message without decrypt it.[1]. The Secure Sockets Layer (SSL) could be a methodology for providing security for web primarily based applications. it is designed to create use of TCP to produce a reliable end-to-end secure service. SSL is not one protocol however rather two layers of protocols as illustrated It will be seen that one layer makes use of TCP directly. This layer is understood because the SSL Record Protocol and it provides basic security services to various higher layer protocols. an freelance protocol that creates use of the record protocol is that the hypertext language (HTTP) protocol. Another 3 higher level protocols that also create use of this layer are a part of the SSL stack.SSL include two phases: handshaking and information transfer. throughout the handshaking method, the consumer and server use a public-key encoding algorithm to work out secret key parameters, during the information transfer method, each side use the key to inscribe and decode successive information transmissions[1]. SSL (Secure Sockets Layer) is a technology to encrypt communications between the user and the web server. It helps to prevent hacker attacks that are based on eavesdropping. When you use a web page that is protected by SSL, you see a padlock icon that assures you that the page is secure. 3.1 Is the web site really secure with SSL? No. SSL secures the network communication link only. Although this is an important security layer for sensitive applications, most attacks on websites are not actually done this way. Most attacks on websites are actually done in one of the following ways: The server is attacked directly. SSL does not protect you from this. Rather, you need to have a good IT security policy to protect your server. The user is attacked directly, either by infecting their PC with malware, or by using phishing to steal their passwords. SSL does not protect you from this, either. To protect your own PC from this, you need to use a good anti-virus program, and use lots of common sense and a small amount of paranoia when on the Internet. However, it is unrealistic to expect that all the PCs of all of your website visitors will be adequately protected. In other words, SSL does very little to prevent the website from being hacked. It only prevents 3rd parties from listening to communications between the user and the website. In that case, when is SSL important to have? If you are transmitting sensitive private data over the internet, SSL is an important additional security layer. Although eavesdropping may be a less common form of attack on the website, there is no reason not to protect against it if the consequences are serious. Although the risk to the website may not be that great, the risk to individual users may be significant in some cases. For instance, any user accessing your website from a public wifi connection (such as at a coffee shop) can be eavesdropped on fairly easily by other users at the same location. Eavesdroppers can see what is typed into forms on non-SSL sites, so the risks will depend on what sorts of forms you have. The most obvious high-risk form is your login form, which asks for username and password. An eavesdropper can potentially obtain these login credentials and then log in as that user. How risky or dangerous that is depends on what personal information the eavesdropper can obtain, or what harm they can cause with this information. Even if the risk is low with regards to your website, you should also consider that some users will re-use passwords on many websites, so the risk may extend to sites and situations that are beyond your control. What kind of sensitive private data needs protection? Private data is information that should only be known to you (the website owner) and the user. The most obvious example is credit card numbers. If you outsource your credit card processing to an external e-commerce gateway, the transactions are protected by your e-commerce providers SSL. Adding SSL on your website is not necessary in this case. Passwords are the next most obvious thing to protect, as noted above. If you do not have a membership or public user base, then your own personal admin passwords may be the only ones you need to think about. If you do not do website administration from public wifi networks, then this is not a major concern. Note that personal information such as names, email addresses, phone numbers, and mailing addresses are not private. This is information that is meant to be shared with others. SSL does not really protect information that is already publicly available in more accessible formats such as the phone book. (However, you do need a good privacy policy when storing and using peoples personal information, to assure your users why you need their personal information, and what you intend to use it for. This is mostly because some organizations have a history of selling their databases of personal information against the wishes of their clients. SSL does not help with this, however.) There is a grey zone between private data (which should be known only to you and the user), and personal data (which is known and used by many others). Individual pieces of personal data may not be a big deal, but if you collect enough personal data, identity theft may become a plausible threat. Special account or identity numbers (SSN, SIN, drivers license, health care, or passport numbers for example), along with birth dates, common security questions (eg. mothers maiden name, names of family members), and information of that nature may collectively comprise an identity that could be stolen for nefarious purposes. The more of this sort of information you collect, the more SSL might be a worthwhile addition to your security policy. The Secure Sockets Layer (SSL) Protocol was adopted by Netscape in 1994 as a response to the growing concern over Internet security. Netscapes goal was to create an encrypted data path between a client and a server that was platform or OS agnostic. Netscape also embraced to take advantage of new encryption schemes such as the recent adoption of the Advanced Encryption Standard (AES), considered more secure than Data Encryption Standard (DES). Indeed, by June 2003, the US Government deemed AES secure enough to be used for classified information. 4.1 Birth of SSL When web browser developed their applications programmer, they found that in the dealings between internet server and web browser, there should be some security methodology to guard the message alternated between shopper and server, particularly for a few business poppers. At first, web browser established some secret writing in their applications. However, they found that the secret writing didnt support non-HTTP applications. SSL (Secure Sockets Layer) protocol was developed that is simply above the TCP (Transmission Control Protocol) to form this security.[1]. 4.2 Development of SSL During the previous few years, SSL developed rapidly, as a result of theres invariably some secure holes and a few previous versions of SSL cannot forestall attacker to eavesdropping or intercept properly. as an example, Version 3.0 of SSL was destined to right a flaw in previous versions 2.0, the cipher-suite rollback attack, whereby Associate in Nursing entrant might get the parties to adopt a weak cryptosystem.[1]. TLS was discharged in response to the net communitys demands for a standardized protocol. The IETF provided a venue for the new protocol to be overtly discussed, and inspired developers to provide their input to the protocol. The Transport Layer Security (TLS) protocol was discharged in January 1999 to create a customary for private communications. The protocol allows client/server applications to communicate in an exceedingly approach thats designed to prevent eavesdropping,tampering or message forgery.According to the protocols creators, the goals of the TLS protocol square measure crypto graphical security, ability, extensibility, and relative potency. These goals square measure achieved through implementation of the TLS protocol on two levels: The TLS Record protocol and also the TLS handshake protocol. TLS Record Protocol The TLS Record protocol negotiates a private, reliable connection between theclient and also the server. although the Record protocol will be used while not secret writing, ituses bilaterally symmetrical cryptography keys, to make sure a private connection. This connection issecured through the utilization of hash functions generated by employing a MessageAuthentication Code.TLS handshake ProtocolThe TLS acknowledgment protocol permits genuine communication to startbetween the server and client. This protocol permits the client and server to talk thesame language, permitting them to agree upon Associate in Nursing secret writing algorithmic rule and secret writingkeys before the chosen application protocol begins to send data. Using constant handshake protocol procedure as SSL, TLS provides forauthentication of the server, and optionally, the client. many changes were created tothe handshake protocol, and people are going to be mentioned during a later section. [2]. 5.1 what different between SSL and TLS: difference between TLS and SSL area unit their assortment of cipher suites. SSL cipher suites generally begin with SSL, whereas TLS cipher suites begin with TLS. Notably missing in TLS area unit the FORTEZZA cipher suites, that area unit supported in SSLv3. On the opposite hand, notably present within the later versions of TLS (more specifically, beginning at TLSv1.1) area unit the AES cipher suites. The Advanced coding normal (AES) cipher suites were integrated into TLS by virtue of RFC 3268[3]. Im pretty positive there area unit many different variations however these area unit those that actually stand out for USA. If there are a unit those you think that we should always add, be at liberty to allow us to grasp. 6.1 Public key and private key What is public key and private key? The association of public key (sometimes known as asymmetric key) and personal key (also known as symmetric key or secret key) will make sure the safe dealing between internet server and browser, the most perform of this combine of secret is encrypting and decrypting info. privateKey, that saves in web server, can decode the data being sent from browser. However, browser encrypts its info within public key. [1]. 6.2 Public-key encryption The sender uses public key to cipher the message, and the receiver uses private key to decipher it. So every public key owner will send his or her encoded message and solely a non-public key owner will scan the message inside decoded the message. but decrypting a message, that encrypted with public key, may be a CPU intensive, like RSA ( Rivets -Shamir-Adelman) Another usage of public keys the sender encodes the message inside secret key, and the receiver use the non-public key to decipher that message with the associated public key. this is often economical for message authentication, like a bank server sending their digital signature encrypted with private key, so any client will decipher the message inside private key and verify the message.[1]. 6.3 How SSL secure a transaction Figure 2SSL renegotiation messages SSL renegotiation messages (including varieties of ciphers and secret writing keys) ar encrypted and so sent over the prevailing SSL connection. This feature is sweet as a result of it will produce a secure SSL session supported the very fact that a secure affiliation is already established. SSL renegotiation is helpful in many things wherever a normal SSL session is already established. Here ar some examples[2]: Client authentication is required A different set of encryption and decryption keys are needed A different set of encryption and hashing algorithms are used. The shopper or the server will request renegotiation at any time. For the shopper to request renegotiation the shopper sends a Client Hello message within the already-established encrypted channel and also the server responds with a Server Hello and so the negotiation follows the conventional shake process. The server will initiate the renegotiation by causing the shopper a hello Request message. once the shopper receives the request, the shopper sends the Client Hello message and also the shake process takes place.[4]. One fast note of clarification: the shopper and server also can complete a session beginning vice a session renegotiation. A session beginning essentially resumes a previous session (using a previous session ID), and it saves the shopper and server the computing work of generating new cryptography keys. Renegotiation could be a method by that the complete shake method takes place over an already existing SSL association[1]. 6.4 SSL/TLS From PHP (Server to Server) As much as I love PHP as a programming language, the briefest survey of popular open source libraries makes it very clear that Transport Layer Security related vulnerabilities are extremely common and, by extension, are tolerated by the PHP community for absolutely no good reason other than its easier to subject users to privacy-invading security violations than fix the underlying problem. This is backed up by PHP itself suffering from a very poor implementation of SSL/TLS in PHP Streams which are used by everything from socket based HTTP clients to the and other file system functions. This shortcoming is then exacerbated by the fact that the PHP library makes no effort to discuss the security implications of SSL/TLS failures. If you take nothing else from this section, my advice is to make sure that all HTTPS requests are performed using the CURL extension for PHP. This extension is configured to be secure by default and is backed up, in terms of expert peer review, by its large user base outside of PHP. Take this one simple step towards greater security and you will not regret it. A more ideal solution would be for PHPs internal developers to wake up and apply the Secure By Default principle to its built-in SSL/TLS support. My introduction to SSL/TLS in PHP is obviously very harsh. Transport Layer Security vulnerabilities are far more basic than most security issues and we are all familiar with the emphasis it receives in browsers. Our server-side applications are no less important in the chain of securing user data. Lets examine SSL/TLS in PHP in more detail by looking in turn at PHP Streams and the superior CURL extension. Figure 3example of google chrome Our attacks are supported the subsequent scenario: the assaulter sniffs an oversized number of SSL connections encrypted with RC4,waiting for a hit; thats the arrival of a weak key. Once a weak key arrives, the assaulter predicts the LSBs of the key streambytes, and uses these to extract the LSBs of the plaintext bytes from the cipher text with important advantage. In order to satisfy this state of affairs, the assaulter has to determine that SSL sessions ar those within which weak keys were used. For this isolation, the assaulter will use the actual fact that the primary encrypted bytes embrace the SSL Finished message and HTTP request, both having foreseeable data. Thus, once a weak key is used, the plaintext patterns are XOR-ed with key streampatterns, generatingcipher text patterns visible to the assaulter. and different previous attacks on SSL use little applied math biases to combination little items of plaintext data. so as to make this aggregation doable, the target object sh ould be encrypted over and over, with a similar key in and with totally different keys.[5]. 7.1 Decrypting traffic where the private key used for encrypting the information is available. This is useful for situations where the traffic in the network is relayed through a transparent SSL proxy and the user has access to the private key used by the proxy for encrypting the traffic sent to the clients.[6]. 7.2 Decrypting traffic in situations where the session keys are available. This situation applies for traffic generated by Mozilla Firefox and Google Chrome browsers in rectify mode. The browsers can dump SSL session keys in NSS (Network Security Services) log format. The file is made within the path such that by the SSLKEYLOGFILE atmosphere variable.[6]. 7.3 How Is the Attack Accomplished? Using the renegotiation attack, associate degree attacker will inject commands into an HTTPS session, downgrade ahttps association to a HTTP association, inject custom responses, perform denial of service, etc. That explains to some extent however serious the matter is. its easier to know however the attack is accomplished.[7]. 8.1 Advantages of SSL Certificates. Entrust Advantage SSL Certificates secure ecommerce, communications and personal data passed from browser to internet server and between servers. Entrust Advantage SSL Certificates supply bigger set-up and preparation flexibility by permitting you to add a second absolutely qualified name for free of charge and secure domain.com once your certificate is for WWW.domain.com. Plus, you get added security services that notice malware on your website} and protect it site from obtaining blacklisted. 8.2 Disadvantages of SSL With such a large amount of blessings, why would anyone not use SSL? are there any disadvantages to exploitation SSL certificates? value is a noticeable disadvantage. SSL suppliers ought to started a trustworthy infrastructure and validate your identity therefore theres a value concerned. as a result of some providers are so renowned, their costs are often overpoweringly high.[8]. BEAST leverages a kind of science attack called a chosen-plaintext attack. The attacker mounts the attack by selecting a guess for the plaintext that is associated with a famed cipher text. to see if a guess is correct, the attacker wants access to AN encoding oracle7 to visualize if the encoding of the plaintext guess matches the famed cipher text. To defeat a chosen-plaintext attack, common configurations of TLS use 2 common mechanisms: an data formatvector (IV) and a cipher block chaining mode (CBC). an IV is a random string thats XO Red with the plaintext message before cryptography even if you encrypt the same message double, the cipher text are totally different, because the messages were every encrypted with a special random IV. The IV isnt secret; it simply adds randomness to messages, and is sent along with the message within the clear. it might be cumbersome to use and track a new IV forevery coding block (AES operates on 16-byte blocks), so for longer messages CBC mode sim ply uses the previous Cipher text block as the IV for the following plaintext block.[9]. 9.1 ATTACKERS PERSPECTIVE In a single session the same secret/cookie is sent with every request by the browser. TLS has an optional compression feature where data can be compressed before it is encrypted. Even though TLS encrypts the content in the TLS layer, an attacker can see the length of the encrypted request passing over the wire, and this length directly depends on the plaintextdata which is being compressed. Finally, an attacker can make the client generate compressed requests that contain attacker-controlled data in the same stream with secret data. The CRIME attack exploits these properties of browser-based SSL. To leverage these properties and successfully implement the CRIME attack, the following Conditions must be met: The attacker can intercept the victims network traffic. (e.g. the attacker shares the victims (W)LAN or compromises victims router) Victim authenticates to a website over HTTPS and negotiates TLS compression with the server. Victim accesses a website that runs the attackers code.[9]. Secure sockets layer (SSL) is used to protect voluminous network users however how vulnerable is it? Over the last several years, there has been associate array of attacks designed to subvert SSL. whereas the technology is basically secure, attackers are invariably probing for loopholes to bypass security protocols and standards. And SSL could be a huge target. its wont to protect sensitive hypertext Transfer Protocol (HTTP) traffic. Attackers, United Nations agency prefer to assume outside the box, are invariably seeking new ways in which to realize access to sensitive data. Lets consider a number of the different ways in which hackers are attempting to break SSL. Trick, no treat: Trick the user to accept a foul certificate. this is often the classic approach once targeting users of SSL. the concept is to get the user to click through to a website despite the fact that a warning or error is flaunted to the tip user. whereas this attack is simple to launch, it needs the victim to just accept a certificate that clearly has issues. Most users can notice this kind of fraudulent activity; so, the threat level is low. Fraudulent certificates: whereas this approach might seem far-fetched, its been winning within the past. in a very few cases attackers are able to acquire valid certificates and use them maliciously. In one case, hackers breached a Dutch certificate authoritys security in 2011 and so created phone certificates for sites like Yahoo, Google, WordPress et al. With possession of valid certificates, the attackers got past HTTPS protections. Still, the threat level of this attack remains low. Take away the SSL and send data via clear text: In 2009, a new technique to subvert SSL was pioneered with one thing known as SSLStrip. rather than trying to urge the user to click through warnings, this tool acts as a proxy and strips off the S in httpso the user is instead bestowed with HTTP. SSLStrip conjointly permits the assaulter to gift the user with the favicon lock therefore the solely indication that one thing is wrong is that the browsers show of http rather than HTTPS. If the user doesnt notice this one small detail, the attacker will gain access to secure data. The threat level of this attack is medium. Crack the keys: Most certificates presently use 1,024-bit or 2,048-bit keys. The 2,048-bit-length keys are extraordinarily robust and would need eons of your time to crack employing a standard PC. That said, its been reportable that the National Security Agency has created nice strides in gaining access to SSL traffic. whereas some theorize that the NSA could have discovered new quantum computing techniques, its additionally entirely potential that the agency has merely obtained cryptography keys or maybe placed backdoors (entry points) into computer code and hardware. The threat level of the NSA or others accessing secure data during this approach is unknown. Man in the middle: This attack may be a style of active eavesdropping within which the attacker makes independent connections with the victim and relays messages to the server. Case in point: Lucky 13, named once 13-byte headers in Transport Layer Security Media Access management calculations. whereas this ciphertext attack is in theory potential, itd need a controlled setting and a awfully long quantity of time; so, the threat level is taken into account terribly low. Side-channel attacks: Over the last several years, several side-channel attacks are incontestable that may be used to recover http requests and cookies used for authentication. Browser intelligence operation and Exfiltration via adaptive Compression of hypertext (BREACH) is one example. BREACH leverages compression and takes advantage of http responses, that are compressed victimisation mechanisms like gzip. For the applying to be vulnerable, it should use HTTP-level compression, mirror user input in http responses and expose cross-site request forgery tokens in http response bodies. whereas on paper attainable, controls is accustomed mitigate this attack, and therefore its thought-about an occasional threat. 10.1 What is DROWN? It is a heavy loophole infect protocol HTTPS and different services that consider TLS, SSL and a few of the essential secret writing protocols for the security of the internet. These protocols enable everybody on the web to browse sites and electronic messaging, looking and transfer of vital data while not permitting a third party the flexibility to ascertain whats being changed between a user and also the World Wide internet.The name of the shortcut Decrypting RSA with Obsolete and Weakened encryption. 10.2 What do you get it from penetrating this gap? Gets anything is passed between the user and the server, and includes, for example, user names and passwords, account numbers, e-mails, instant messages, important documents, and according to some Scenarios can also forward the work of spoof secure site content and intercept the requests and what the user sees.[10]. When you log in to an Access Enforcer, or any UTM device, you will see a number of network attacks detected and blocked. The number may be in the thousands, or even hundreds of thousands. Many of these attacks are scans precursors to attack. Depending on your settings, a good number might also be firewall policy violations. But what are other types of network attacks? What are the most common ones today? One answer comes from the latest Threat Report from McAfee Labs. The chart below aggregates data from the companys network of millions of sensors across the globe. It shows the most common network attacks detected in Q1 2015.[5]. SSL is important to net security. It provides a robust sense of confidentiality, message integrity, and server authentication to users. The business of e-commerce is tied closely to client confidence within the operation of SSL across world wide web. within the future, SSL termination devices are able to handle additional transactions at a quicker rate. The secret writing of key lengths and therefore the cipher suites used also will still evolve so as to ensure the safety of sensitive info over the net. This way, e-commerce are ready to still grow in quality as users grow additional intimate in searching and banking on-line, and clutches new on-line applications . [1]Three attacks in SSL prot ocol and their solutions. Hong lei Zhang , https://www.cs.auckland.ac.nz/courses/compsci725s2c/archive/termpapers/725zhang.pdf . [2]SANS Institute.pdf.Holly Lynne McKinley,https://www.sans.org/reading-room/whitepapers/protocols/ssl-tls-beginners-guide-1029 . [3]Secure Socket Layer (SSL) Secure Socket Layer (SSL). Raj Jain,http://www.cse.wustl.edu/~jain/cse571-09/ftp/l_15tls.pdf . [4]Transport Layer Security..Giuseppe Bianchi,http://www.uniroma2.it/didattica/iss/deposito/4_tls.pdf .

Peer Mediation and Conflict Resolution are the Solutions to Teen Violence :: Teens Teenage Violence

Every year, nearly one-million twelve to nineteen year olds are murdered robbed, or assaulted many by their peers and teenagers are more than twice as likely as adults to become the victims of violence. Although the problem is far too complex for any one solution, teaching young people conflict resolution skills, nonviolent techniques for resolving disputes seems to help. To reduce youth violence, conflict resolution skills should be taught to all children before they reach junior high school. First and most important, young people need to learn nonviolent way of dealing with conflict. In a dangerous society where guns are readily available, many young teens feel they have no choice but to respond to an insult or an argument with violence. If they have grown up seeing family members and neighbors react to stress with verbal or physical violence, they may not know that other choices exist. Behavior like carrying a weapon or refusing to back down gives young people â€Å"the illusion of control,† but what they desperately need is to learn real control for example, when provoked, learn to walk away. Next, conflict resolution programs have been shown to reduce violent incidents and empower young people in a healthy way. Many programs and courses in Charlotte Mecklenburg are teaching teens and preteens to work through disagreements without violence. Tools include calmly telling one’s own side of the story and listening to the other person without interrupting or blaming; skills that many adults don’t have! Peer Mediation, a Charlotte Mecklenburg public school program, starts in middle school; it trains students to be mediators, helping peers find their own solutions to conflicts ranging from a fight over a boy or girl friend to interracial gang disputes. Finally, although this appears as just a â€Å"Band-Aid† solution that does not address the root causes of teen violence: poverty, troubled families, bad schools, and drugs. Conflict resolution training saves lives. The larger social issues out there must be addressed, but they will take years to solve, whereas teaching students new

Monday, August 19, 2019

Machiavelli Essay -- essays research papers

"The term Machiavellian refers to someone who is unscrupulous, cunning, cynical, and unprincipled"(Goods 1998). Many scholars agree that this particular adjective would have dismayed Niccolo Machiavelli, the man from whom the term is derived. In reality he has been attributed as being one of the brightest lights of the Italian Renaissance through his works as not only a writer, but also as an influential philosopher of history and political thought. His most famous work The Prince has been misunderstood due to the motives discussed and the blatantly honest language used. Many of his critics have condemned him for his pessimistic outlook of man as a whole and in doing so try to negate the bulk of his work. Yet even after over 470 years his works are still thought provoking and influential in the political arena. This paper looks at some of the influences that may have created such a man. Machiavelli was born in Florence on May 3, 1469, a time of political upheaval and a strong political influence from the Roman Catholic Church. Although Machiavelli was never what would today be considered middle class, he himself states â€Å"I was born poor and learned earlier to stint myself than to prosper†(Gilbert 1961, 102). While the extent of this poverty is not known, it is known that his family owned land and was able to pay for his education. In fact, through some of his father’s letters we learn that he had an excellent education in Latin, arithmetic, history, and poetry, but that he was not well off enough to afford other more expensive forms of training (Gilbert 1961, 56). However, his financial hardship from earlier on seems to display itself in his cautious approach to most of his political activities. In fact, the lessons Machiavelli learned early on set a precedent of conservatism that carried on throughout his life. Machiavelli’s first position in government was given to him in 1498 at the age of twenty-nine. His position was that of Second Chancellor or Secretary and was the second most important paid position in the city (Gilbert 1961, 12). This position was advantageous in the fact that it provided him with experience dealing with both international negotiations and domestic business within the city. These early experiences were evident influences in his political beliefs and he himself commented on them occasionally. It was these early lessons in ... ...61, 141) while describing to a friend his daily activities. It can be argued that this type of leisure activity may have been part of his informal training into the realm of philosophy. It was during this time that he composed some of his more famous works, but he also composed a comedy called The Mandrake that displays the less serious and rigid side of Machiavelli. Although he does show himself to be as much of a dreamer as he was a politician, Machiavelli believed knew that emotion held no place in politics. He himself stated that in order to fairly rule â€Å"†¦calculation of what must be done in a given situation being unduly affected be passions or the contemporary conventions and ideals of right and wrong† (Fleisher). Through personal experiences, education, and the lessons learned from the past Machiavelli was able to influence the world for generations with his political insights and theories. Even after 470 years his works still inspire and create debate as to the true nature of politics and the behavior of those that rule. While the true contributors to the development of these beliefs may never be truly known, the impact that they have had upon the world cannot be denied.

Sunday, August 18, 2019

The Greatest Commandment Essay -- Bible, God

The Greatest Commandment â€Å"to love God† is the first and greatest commandment of all. In researching this commandment I have found that to love God is truly what God really wants from all of us. The commandment is referenced in all four of the gospels of the New Testament as well as being referenced in the Old Testament through the Ten Commandments in which the New Testament was based on. This commandment is so powerful it is found in Luke 10:25-37, Mark 12:28-34, John 13:34-35 and Matthew 22:34-40. It is also found in Deuteronomy 6:5 and also based on the Ten Commandments in Exodus 20:1-17. Take for instance the gospel of Matthew in where the New Testament begins with the book of Matthew revealing the fulfillment of the prophecies in Jesus Christ, the long-awaited Messiah. Matthew was a Jewish tax collector for the Roman government who was called upon by Jesus to become one of the 12 apostles which often in his gospel will give us an eye witness account. Matthew wrote the gospel while living in Antioch, Syria after following Jesus between the years of A.D. 50-70. Matthews’s gospel provides an essential link between the Old and New Testament. Matthew 22:34-40 teaches us of the greatest commandment and what God wants from us foremost. In the scripture of Matthew 22:34-40 where this commandment is told by Jesus to the religious leaders, the Sadducees and the Pharisees who were attacking him and challenging him with one of the Pharisees in particular who was a lawyer decided to test Jesus in hopes of embarrassing him by asking: â€Å"Teacher, which is the greatest commandment in the law?† (NIV, Matthew 22:36) Knowing that this was a difficult question because of the Ten Commandments in the Old Testament in which all are from ... ...merciful, for they will be shown mercy" and "Blessed are the pure in heart: for they shall see God" (Holy Bible, Matthew 5:3-11). These scriptures say a lot to us reinstating what Matthew has written in how we should live our lives and follow the laws stated by Jesus in The Greatest Commandment so that we can obtain our peace of heart and give our love, ourselves selflessly to God. For when Jesus answered this question, the religious leaders and the Pharisees knew that he had answered well. After this question was answered Jesus also asked and answered a question about his son ship to God and from then on his answers showed his wisdom and those that questioned him never dared to ask Jesus any more questions. They knew that he was the son of the Lord. All knew and understood that these two Greatest Commandments were to be the law and the prophecies to live by.

Saturday, August 17, 2019

Diet Aids and FDA Approval

The diet industry is huge, a multimillion dollar industry. The introduction to products that help individuals lose weight will always be popular and interest never wanes because of the frequency in which new products arise from the market. Now comes the big question, just how important is it for diet aids to have Food & Drug Agency (FDA) claims? Most health supplements, vitamin supplements, and diet aids do not have FDA approved on them. But does this really matter? In some cases, yes and in others no. The FDA is an organization that is part of the US department of Health and Human Services.The center for drug evaluation and research (CDER) makes sure that all prescription and over the counter drugs are safe for consumers, including diet supplements. Most diet aides are released without being regulated from the FDA but every now and then one is, the most recent being ephedra, and its ban. It is important to remember two things when reading claims whether they are for health benefits or for dangerous side effects. The first is that if there is a warning on the label it is unknown whether 50% of all those that used the product or if on 0.1% had side effects. Companies must put the side effect warning on the label if only one person in the study had side effects. This is mainly for insurance, if you take the diet aid and experiences side effects out of thousands of individuals that don’t then you can’t sue the company; the warning was on the label. Secondly just because there are health benefit claims on the label doesn’t actually mean that they will happen to the individual taking the product. It simple means that it may happen not that it definitely will.However having FDA approval is always a good thing. Unlike a company the FDA will conduct research or contract researchers to conduct a thorough and correctly structured clinical study. Any results will show good conclusions that can be trusted. The FDA is looking out for the consumer, not t he companies whose bottom line is to make as much product as possible. Here is an outline of the regulation of diet aids with ephedra. Ephedra was a popular weight loss product, particularly when paired with caffeine and aspirin.However the use of ephedra was linked to heart problems and over 155 deaths. Like many diet aids it increases your metabolism by increasing your heart rate, which causes many problems. The FDA could not actually ban ephedra but it sent out a ruling that the FDA does not support and products containing ephedra as it had unreasonable risks of illness or death associated with it. The FDA collected information about ephedra from independent experts and studies on both the benefits and dangers of ephedra.However it should be noted that Chinese herbal medicines and teas that contain ephedra are not regulated under this ruling. (Nelson, 135). Now it is very likely that a vast majority of individuals using ephedra did not experience any side effects or heart problem s at all. However there was enough of the population that did, and most importantly quite a few deaths were found to be directly linked to ephedra in diet supplements that the FDA felt there was a significant cause for concern.Due to it’s ruling many states in the US banned the selling of ephedra products causing many companies to reformulate their diet products. Also if you look at the history of the FDA and its rulings you will find a very tangled web. The FDA during the 1940s and 50s in diet aids approved amphetamines and amphetamine like products. Since then the FDA has been trying to define the parameters in which these products can be safely taken (Colman, 380-385). The FDA has been found to change its mind over time, particularly as science is improving and research tools are becoming available.Now I should let you know that a product containing ephedra is still all-natural because ephedra comes from the Ma Huang plants. Incidentally most health supplements and diet ai ds all come from plants, so they are â€Å"all natural†. Just because it is labeled all natural doesn’t mean it isn’t dangerous. Almost anything at the wrong level will kill you. It is simply the products that are dangerous at small amounts that cause the most concern. Eating carrots can cause blindness and eventually death, but you have to eat a lot of carrots for a long time.Many of the substances found in diet aids are at concentration higher than they would be found in nature and this is what can make them harmful. Now comes the consumer, just who should they believe. You are standing in a store reading a label that lists some pretty fantastic benefits, but it is not FDA approved (Allen). Many products are being marketed as helping you lose weight, improve your life span or have anti-aging properties. Without the correct clinical trials, which can take years, it is unknown if the benefits outweigh the risks.As previously stated Ephedra was first approved and then found to be dangerous as was another product called Fen-phen. (Keim). There are many health claims available to help your memory, expand your age, make your heart healthier etc. You can achieve this by taking ginkgo boloba, cinnamon extract, grapefruit extract, acai juice, resveratrol etc. There are other diet aids that act as appetite suppressants or are thermogentic (raise your metabolism), fat blockers, and meal replacement.The real danger is not using the diet aids in a correct manner as there are significant risks of developing eating disorders when using dieting aid (Celio, 492-497). This takes away from the benefits you will have by losing weight because you will be lighter but you won’t be healthy. It is amusing to actually read the directions on diet aids. The majority of the time the directions give dosage information and then state that it is only effective eating a healthy diet and exercise. Now most medicinal practitioners and athletes can get an individual to lose weight by eating sensible and exercising.The diet aid may actually work not because of the diet aid but because you are eating a healthy diet and exercising. There is a large psychological part to dieting that many people do not understand. On a personal note I would feel much more secure and confident using a diet aid that was approved by the FDA but that does not mean that I would rule out using other products. I would first research and collect some information about products. I would stear clear of any product that says has side effects relating to heart problems or internal organ failure.If the side effects are not minor and research shows that cultures have been using it successfully for years then I probably would try it. It is important to pay attention to detail such as concentration in the diet aid as well as follow the directions and pay attention to what is going on in your body. If I had any concerns I would see about speaking to a nutritionist or doctor about any risks. It is fine to use diet aids but don’t just pick one on a whim. You do need to be careful and determine what the risks are and if you think the benefits are greater than the risks.

Friday, August 16, 2019

Comments on Student’s Critique

These comments relates to the student critique on the article, â€Å"Is credit card fraud a Real Crime? Does it really cripple the E-commerce sector of E-business? † The student views that, the article is missing on presentation aspects which should be part of the article. The student argues that the introduction is very long and agrees with it that it is useful for it elaborate the inside of the story given that it captures issues which ought to be the main discussion.In addition, the English used needs few adjustments and that the structure of the article is poor. The article is said to present facts rather a discussion which the questions imply. Consequently, the student view that the second question has been neglected and that the author should have focused on both questions in the discussion. The conclusion is viewed that it lacks definitive outcomes and the student attributes this to the fact that it contains little discussion.Despite all the mistakes in the article, the student view that the article contains usable facts that could be used in the future works and investigations. In my view, the student appears to be negative towards the presentation of the article. If those aspects could have been addressed, the article would have been much better. The student is right given that this was a discussion article and it should have suitable structure and clear English with no errors in it.