Wednesday, October 30, 2019

The Purpose of the Higher Education Essay Example | Topics and Well Written Essays - 750 words

The Purpose of the Higher Education - Essay Example In most cases, the ideas of students are rarely considered when higher learning institutions are developing the curriculum. Due to the fact that we are living in a dynamic environment that is characterized by changes, it is imperative for students to be involved in the curriculum development since they may have some enterprising ideas that can help to improve the whole education system. This idea is supported by Kelly Sousa (http://whichwaync.com/2012/07/18/a-job-offer-a-skill-set-a-higher-tolerance-what-does-college-provide/, July 18, 2012) who posts to the effect that technical skills are gaining more priority as a result of the fact that the world has significantly industrialized. Various courses that are offered at higher learning institutions are theoretical in terms of their design. Students are taught various theories related to a particular area of study and in most cases, this kind of study is mainly academic in nature. However, after graduating from different tertiary insti tutions, many people rarely apply the theoretical knowledge they are taught at universities. Instead, they often encounter different problems that may require experience in that particular area. This experience is often gained through constant practice. It can be noted that some people are offered training at their work which may be costly to the companies since they will have to retrain the newly employed people. Some studies have shown that knowledge is more important since it is regarded as a stepping stone to a career by different people. Higher education is mainly designed to develop people better so that they can be in a position to find solutions to problems they may encounter in their lives. in workplaces, people are expected to make decisions and they should try to find solutions to problems they come across in their work. This is the reason why students should also put their input in the development of the curriculum. The problem with the current curriculum is that it is s kewed in favor of generating theoretical knowledge rather than developing the skills of the students so that they can be in a better position to deal with various technical problems they may encounter in their work. Therefore, it is recommended that people who are pursuing studies in areas that are technical in nature should be exposed to more practice in the actual field of their specialty so that they gain the much-needed knowledge. These students should be attached to different companies for longer periods as part of their learning since this will help them to gain different skills that are required for them to carry out various tasks. Theory and practice should be balanced in order for the students to gain the knowledge that can be transformed in order for them to deal with different problems they may face in their work. Various people seek education for monetary reasons since they believe that they will get better job opportunities that are characterized by high salaries. The c urriculum offered at tertiary institutions is designed in such a way that it helps people with higher qualifications to get high positions in different organizations. For instance, managers, as well as other people with influential positions, are highly qualified and they are paid lucrative salaries as a result of the high qualifications they have.

Monday, October 28, 2019

Impact of the Russian revolution - Ideology matters Essay Example for Free

Impact of the Russian revolution Ideology matters Essay I. BACKDROP: GERMAN IDEALISM AND RUSSIAN REVOLUTIONARIES German philosophers in the 19th century were often Idealists, that is to say that they maintained that ideas have a force, power, and reality that is more real than that concrete, reality that so consume us in our daily lives. German idealism dominated the 19th-century Russian revolutionary movement from the Decembrist Revolt of 1825 until long after Lenins successful revolutionary coup that we call the October (or Bolshevik or Communist) Revolution of 1917. While I never want to downplay the central role of raw hypocrisy in human affairs, much of what we in the United States have interpreted as hypocrisy in the Soviet Union-the dissonance between the profound humanism of Marxs ideas and the coarse violence of the Stalinist dictatorship-this hypocrisy can also be seen as the desperate attempt to coerce reality through the power of belief-through the power of the Idea. And one way to interpret the ultimate collapse of the Soviet Union in 1991 was that the Soviets had lost their ability to convince themselves that the Leninist/Stalinist Idea had the power to transform reality into a better future. With the collapse of this self-justifying, central Myth that legitimized the Soviet experience, the Soviet Union died not with a bang but rather whimpered into Lev Trotskys dust bin of history. With this introduction, I would now like to offer three examples in the Russian Revolutionary experience where Ideas profoundly affected the future course of events. Only toward the end of the Twentieth Century have these effects begun to run out of steam. II. THREE EXAMPLES A. MODERATE SOCIALISM AND THE FEBRUARY REVOLUTION OF 1917 The first example involves the reaction of moderate socialists to the February Revolution in Petrograd in 1917. Moderate Socialists, including the Marxist Mensheviks in contrast to Lenins Bolsheviks, had adopted a position that Russia was not yet ready for a Socialist Revolution; reading Marxs Stages of History quite literally, they understood that the Bourgeois Revolution had to come first and had to take place under the leadership of the bourgeoisie. The working class movement thus had to be satisfied with playing the role of a party of the extreme opposition-the bourgeois revolution must come first and be developed, and the responsibility of the proletariat was to encourage this historical necessity. Real consequences flowed from this belief. When the women, workers, and soldiers of Petrograd spontaneously took to the streets in February 1917, it took only several days for them to overthrow the 300-year-old Romanov dynasty. They then handed power they had won in the streets to their moderate socialist leadership-none of whom were philosophically or psychologically ready to assume the mantle of power. Consistent with their beliefs, the socialists in turn handed power to the bourgeoisie who established the Provisional Government. Not having the complete courage of their convictions, however, the moderate socialists also established the Petrograd Soviet which basically held veto-power over the actions of the bourgeois Provisional Government. This compromise established the period of Dual Power which was inherently unstable. In retrospect, it is amazing that the Provisional Government, amidst the catastrophe of World War I, managed to hold on to power until October of 1917 when Lenins and Trotskys Bolsheviks managed a coup detat to take power. Lenin, like his Menshevik cousins, was a Marxist, but his Marxism focused less on the determinist element of Marxs Stages of History than on the ability of the individual to assert his will on history. For him, there was no need to wait patiently for the bourgeoisie to fulfill their historical duty at their own leisure; Bolshevism could force the pace. Lenins Will to Power and his belief in the power of the Idea to change reality made the difference between his success and the moderate socialists failure. B. LENINS IMPERIALISM, THE HIGHEST STAGE OF CAPITALISM The second example of the power of the Idea concerns Soviet influence on the developing world. Lenin wrote Imperialism, the Highest Stage of Capitalism in 1917, during the trials of the First World War and before the Bolshevik Revolution, to explain two crucial contradictions facing Marxists of the day. The first contradiction concerned the delayed outbreak of the promised world revolution. After all, it had already been sixty-nine years since Marx in the Communist Manifesto had proclaimed that A Specter is haunting Europe-the specter of Communism. What had gone wrong? The second failure of the Marxist promise involved the inability of the worlds proletariat to prevent war and its rejection of internationalism for nationalism. It had been a common belief among those of all political stripes from the far right to the far left, that socialist influence on the proletariat had made a major European war impossible. One of the central socialist beliefs was that wars are fought for the benefit of capitalist profits. Now, with the spread of democracy and the entry of powerful socialist parties into Europes parliaments, the capitalists could try to provoke war to their hearts delight but would find it impossible to vote war credits through parliament or to mobilize soldiers who, following their socialist leadership, would refuse to fight. These ideas evoke memories of the anti-Vietnam War poster: What if they gave a war and nobody came? Lenins ingenious answer to both questions came in his book, Imperialism: The Highest Stage of Capitalism. In it he argued that the concentration of production had transformed the capitalism of free competition into monopoly capitalism. The concentration of production also had dramatically increased the socialization of production. Big banks had changed from pure credit institutions into business banks and as such they dominated whole sectors of industry. Together the banks and industry were tied in with government. This coalescence of bank capital with industrial capital with strong government ties had led to the formation of a financial oligarchy that controlled large sections of the national economy. Share issues and state loans had increased the power and amount of surplus capital which flowed beyond political frontiers and extended the financial oligarchys control to other countries. The capital exporting monopolies had divided the world among themselves; international cartels formed the basis for international relations, and the economic division of the world provided the ground for the struggle for colonies, spheres of influence, and world domination. But once the world was divided up, the struggle had become one for the repartitioning of the world. Because the economic development of individual countries is uneven and sporadic, some were left at a disadvantage in this repartitioning. Imperialism represented a special, highest, stage of capitalism. The transition to a capitalism of this higher order was connected with an aggravation of contradictions, frictions, and conflicts. Monopolists assured profits by corrupting the upper stratum of the proletariat in the developed countries. The imperialist ideology permeated the working class. In other words, the burden of bourgeois oppression had been shifted from the shoulders of the domestic proletariat to those of the colonial peoples. In effect, the domestic proletariat had been bribed and they came to see that their material interests were tied up with colonial enterprise. Now, successful war to repartition the world in the favor of a particular nation made fighting war against fellow proletarians in other countries worthwhile. With his theory, Lenin seemingly had explained those two problems with Marx. The revolution had not yet swept the world because the potential revolutionaries, the proletariat, had been bribed by the illusion of short-term, material gains to forget their true, long-term interests. They had rejected their class-based internationalism for nationalism because wars fought to expand colonial holdings appeared to be in their material self-interest. Hence they did not prevent the outbreak of the Great War. This theory held long-term importance because Lenin, unlike Marx and Engels, did not see the revolutionary perspectives as centered uniquely upon advanced capitalist countries. After the Great War, in a period of Capitalist Encirclement the Soviets attacked the weak link in the chain of imperialism, the colonies. Political influence went to where the oppression was-the colonies. In the colonial and post-colonial world after World War II, given the absence of an entrepreneurial bourgeoisie with the will and capacity to transform existing conditions and to overcome the entrenched interests opposed to full-scale development, a gospel of competitive individualism seemed useless for modernization to those in the Third World. What appeared to be needed to get the underdeveloped country moving has been collective effort inspired by a national sense of political purpose. Only governments had sufficient capital, organizational skills, and commitment to make rapid development possible. Ideologically, therefore, the intelligentsia of such countries gravitated to one or another of the various socialist doctrines-something that in general might be described as state capitalism, that is, the state and not private individuals perform the entrepreneurial duties of gathering land, labor, and capital for productive enterprise. Socialist rhetoric disguised this crucial essence . For most of the twentieth century, Soviet Russia provided the model for those in the Third World who wished to rapidly modernize their countries. And rapid modernization was necessary for the sake of national prestige and independence. Russias success seemed obvious when we note that within forty short years Russia had risen from the ashes of World War I to defeat Hitler, to become one of the worlds two superpowers, and to be the first in space. Just as important as was this practical example was the vocabulary provided by Lenin. That Marx himself had had little to say to the underdeveloped world mattered little. I would argue that many Third World leaders, for two contentious examples Ho Chi-Minh and Fidel Castro, who led revolutions to assert national pride, independence, and prosperity, turned to Communism because Lenin had provided a vocabulary with a coherent explanation for colonial degradation and a means for asserting national regeneration. Additionally, of the major powers, the Soviet regime alone more-or-less consistently supported the aspirations of those wishing to throw off the oppression of colonialism and capitalism. Of course, today, the Communist model no longer holds the same allure it once did. C. TWO MARXIST HERESIES: LENINISM/STALINISM AND MUSSOLINIS FASCISM The final example of the power of ideas generated during World War I involves the intimate, kissing cousin-relationship between Stalinist Communism and Mussolinis Fascism. Despite facile assumptions, Fascism and Communism were not antipodes. Although their exact relationship remains difficult to define, there exist commonalties, as one author has pointed out: Fascism was the heir of a long intellectual tradition that found its origins in the ambiguous legacy left to revolutionaries in the work of Karl Marx and Friedrich Engels. Fascism was, in a clear and significant sense, a Marxist heresy. It was a Marxism creatively developed to respond to the particular and specific needs of an economically retarded national community condemned, as a proletarian nation, to compete with the more advanced plutocracies of its time for space, resources, and international stature. Was this kind of self-awareness present as thinkers and politicians struggled to define these two ideologies as they co-developed earlier in this century? In fact, many did recognize that their common interests held much greater weight than did the Talmudic differences between Fascism and Communism. Arturo Labriolas Avanguardia Socialista of Milan by 1903 had become the forum for Italys Sorelian syndicalist revolutionaries, who were struggling to make Marx relevant and against reformist socialism. Such luminaries as Vilfredo Pareto and Benedetto Croce graced its pages, followed shortly by a second generation of Sorelian theoreticians, who came to dominate Italian radicalism for more than a generation. Together they constructed an alternative socialist orthodoxy, which they believed was the true heir to classical Marxism. Clearly, their ideas were no more heretical to those of Karl Marx and Friedrich Engels than was Lenins Marxism. By 1904 Mussolini, then a socialist agitator in Switzerland, had begun his collaboration with Avanguardia Socialista, a relationship he maintained for the next five years. The syndicalist contributors to the journal affected the future Duces intellectual and political development. Radical syndicalists like A. O. Olivetti innovatively argued that, under retarded economic conditions, socialists must appeal to national sentiment if their ideas are to penetrate the masses. For him, both syndicalism and nationalism were dedicated to increasing production dramatically. As long as Italy remained underdeveloped, the bourgeoisie remained necessary to build the economic foundation requisite for a socialist revolution. Olivetti spoke of a national socialism, because in an underdeveloped economy, only the nation could pursue the economic development presupposed by classical Marxism. When Mussolini took over as editor of the socialist paper, Avanti!, in December 1912, he attracted anarchists and even some rigid Marxists like Angelica Balabanoff, whom he took on as his assistant editor. Paolo Orano, who served on the editorial staff of Avanti!, along with other syndicalists like Sergio Panunzio, set the tone of that socialist paper. Mussolini also founded and edited Utopia from November 1913 until December of the following year. This bi-monthly review attracted many of the most important young socialist and syndicalist theoreticians, who helped Mussolini to develop his own ideas. In the final years before the First World War, many independent national syndicalists, including Panunzio and Ottavio Dinale saw war as progressive. Helping to put together the rationale for Fascism, they supported Italys fight with the Ottomans over Libya in 1911, and, along with Mussolini, they called for Italys intervention in the First World War. Many socialists now passed into Mussolinis Fascist ranks, and syndicalists such as Panunzio, Olivetti, and Orano, became its principal ideologues. As early as October 1914, Olivetti in Pagine Libere spoke of an Italian socialism infused with national sentiment, a socialism destined to complete Italys unification, to accelerate production, and to place it among the worlds advanced nations. Over the next three years in LItalia Nostra, Olivetti spoke of the nation as uniting men of all classes in a common pursuit of historical tasks; class membership did not align an individual against the nation, but united him with the nation. Patriotism was fully compatible with the revolutionary tradition of Italian socialism. By the time of Mussolinis accession to power, Fascism had given clear evidence of its commitment to industrialization and modernization of the economy. Not only were the Futurists, Nationalists, and National Syndicalists agreed that maximizing production was the first order of business, but all also advocated urban development, the rationalization of financial institutions, the reorganization of the bureaucracy on the basis of technical competence, the abolition of traditional and nonfunctional agencies, the expansion of road, rail, waterways, and telephonic communications systems, the modernization and secular control of the educational system, and the reduction of illiteracy. What does this mean for Fascisms relationship with Soviet Russia? Mussolini by 1919 was pointing out the absolute decline in economic productivity in Russia as proving its failure to recognize its historic obligations. He suspected that the Bolsheviks ultimately had to commit themselves to national reconstruction and national defense, that is, to some form of developmental national socialism as defined by Fascisms former syndicalists. Speaking of the Bolshevik failure to comprehend their revolutionary necessities, Mussolini presciently predicted that Lenin had to appeal to bourgeois expertise to repair Russias ravaged economy. Bolshevism, he said, must domesticate and mobilize labor to the task of intensive development, something which could have been anticipated, because Marxism had made it quite clear that socialism could be built only upon a mature economic base. Russia, not having yet completed the capitalist stage of economic development, met none of the material preconditions f or a classic Marxist revolution. Russia was no more ripe than was Italy for socialism. Lenin, in the practical working out of his revolutionary government, did run headlong into many of these conundrums predicted by the syndicalists. In the months following his takeover, he had expected that the revolution in Germany would bail Soviet Russia out of its difficulties. Thus, while the first Fascists were organizing for a national revolution, the bolsheviks were still dreaming of an international insurrection. Lenin, changing horses, in 1921 proposed the New Economic Policy to replace the ideologically purer but failed War Communism. Like Fascists, Lenin now spoke of holding the entire fabric of society together with a single iron will, and he began to see the withering away of the state as a long way away: We need the state, we need coercion-certainly a Fascist mantra. After Lenins death in 1924, this logic culminated in 1925 with Stalins creative development of Marxism: Socialism in One Country, a national socialism by any other name. Mussolini suspected that Stalin might be abandoning true Communism. This, it seemed, might provide economic advantages to Italy, and to Mussolini it made sense for his country to build ships and planes for the Soviets in exchange for one-third of Italys oil supplies. For him the even more interesting possibility was that Stalin might be the true heir to the tsars and an imperialist with whom Fascism could see eye-to-eye. In 1923, the Duce predicted, Tomorrow there will not be an imperialism with a socialist mark, but . . . [Russia] will return to the path of its old imperialism with a panslavic mark. Mussolini convinced himself that Russian Communism was proving to be less revolutionary than was Fascism. The Duce and some of his followers considered it possible that the two movements were moving together closely enough as to be no longer easily distinguishable. Even dedicated Fascist party workers such as Dino Grandi, Mussolinis foreign minister from 1928 to 1932, early recognized Fascisms affinities with Lenins Bolshevism. He had taken at least part of his own intellectual inspiration from revolutionary syndicalism, and in 1914 he had talked of the First World War as a class struggle between nations. Six years later, Grandi argued that socialists had failed to understand the simple reality of what was happening in revolutionary Russia. The Bolshevik Revolution had been nothing less than the struggle of an underdeveloped and proletarian nation against the more advanced capitalist states. Not only Fascists made this sort of analysis. Torquato Nanni, a revolutionary Marxist socialist and an early acquaintance of Mussolini, as early as 1922 had anticipated these developments. He analyzed the common economic foundations of Fascism and Bolshevism, which produced the related strategic, tactical, and institutional features of these two mass-mobilizing, developmental revolutions. Both, he wrote, had assumed the bourgeois responsibilities of industrializing backward economies and defending the nation-state, the necessary vehicle for progress. Lev Trotsky, the organizer of the October Revolution, consistently, even mulishly, argued that Fascism was a mass movement growing organically out of the collapse of capitalism. He also rejected all notions of any sort of national Communism. Nonetheless, he too recognized a certain involution. Stalinism and Fascism, he said, in spite of a deep difference in social foundations, are symmetrical phenomena. In many of their features they show a deadly similarity. A victorious revolutionary movement in Europe would immediately shake not only fascism, but Soviet Bonapartism. (that is, Stalinism) He, however, refused to go as far as his sometime ally, Bruno Rizzi, who later argued that the assumption of similar developmental and autarchic responsibilities could only generate social and ideological convergence. He lamented, that which Fascism consciously sought, [the Soviet Union] involuntarily constructed. For him, the governments of Stalin, Mussolini, Hitler, and even Roosevelt were lurching toward a global system of bureaucratic collectivism, a new form of class domination. Fascist theoreticians agreed with such convergence notions. By 1925, Panunzio claimed that Fascism and Bolshevism shared crucial similarities. Fascists noted that the Soviets had created an armed, authoritarian, anti-liberal state, which had mobilized and disciplined the masses to the service of intensive internal development. The supreme state generated and allocated resources, articulated and administered interests, and assumed and exercised paramount pedagogical functions. Thus, while the first Fascists were formulating the rationale for a mass-mobilizing, developmental, authoritarian, hierarchical, anti-liberal, and statist program guided by a charismatic leader, events had forced the Bolsheviks along the same course. Both intended to create a modern, autarchic, industrial system, which would insure political and economic independence for what had been an underdeveloped national community. With forced industrialization and state capitalism, the Soviets hoped to bring Russia all the benefits of bourgeois modernization. In the face of required austerity, to mobilize their respective populations, the Communists and Fascists alike supplemented economic incentives with pageantry, ritual, ceremony, and parades. All this, coupled with territorial aggression, completed a compelling picture of systemic symmetry. III. CONCLUSION I have presented three diverse examples of the impact of the Russian Revolution on subsequent history. There are other potential examples. I find it interesting that events so crucial to the twentieth century, now seem to be fading so rapidly in their influence. One real benefit of examining the Communist Revolution within the larger question of how best to develop is that the Revolution loses its sense of seminal criticality. For all the pathos surrounding the effort, it becomes just another interesting attempt at rapid development-a failed attempt at that. While I would happily argue that Marx still has relevance for us today, especially in his critique of capitalism if not particularly in his solutions, clearly Lenin and Stalin no longer do.

Saturday, October 26, 2019

Sport, Education, and the Meaning of Victory Essay -- Athletics Greece

Sport, Education, and the Meaning of Victory Sport was included in ancient educational systems because it was thought to promote aretà ª or human excellence which could be applied to almost any endeavor in life. The goal of most modern scholastic athletic programs might be better summed up in a word: winning. Is this a sign that we have lost touch with the age-old rationale for including sport in education? I argue that it need not be by showing that we value winning precisely for the virtues associated with it. I then take Plato's traditional parts of aretà ª: piety, sophrosunà ª, courage and justice and show how they are manifest in modern athletic ideals of self-knowledge, discipline, courage and justice. To the extent that scholastic athletic programs develop these virtues, I conclude, their pursuit of winning is not at odds with the institutional mission of educating students. If an athletic program's pursuit of victory allows such character-building to fall by the wayside, however, it deserves no place in our high scho ols, colleges or universities. As in the world of the Ancient Greeks, sport plays an important role in the educational institutions of 20th century America. The reasoning for this in ancient times, as now, is a belief that sport helps to make better people — that it promotes excellence (what the Greeks called aretà ª) in individuals, excellence which can be applied to almost any endeavor in life. That said, it must be acknowledged that most athletes, coaches, and school administrations identify the goal of their athletic programs in one word: winning. Is this a sign that we've lost touch with the age-old rationale for including sport in education? Is the philosophy that "winning is everything," or "the only thing... .... 38-45. Marrou, H. I. 1956. A History of Education in Antiquity, translated by George Lamb. Madison, WI: University of Wisconsin Press. Mihalich, Joseph. 1992. Sports and Athletics: Philosophy in Action. Totowa, NJ: Rowman and Littlefield. Nettleship, R. L. 1935. The Theory of Education in Plato's Republic. London: Oxford University Press. First published in Hellenica in 1880. Plato. 1989. Collected Dialogues. Edited by Edith Hamilton and Huntington Cairns. Princeton, NJ: Princeton University Press. Sansone, David. 1988. Greek Athletics and the Genesis of Sport. Berkeley, CA: University of California Press. Simon, Robert L. 1984. "Good Competition and Drug-Enhanced Performance." Journal of the Philosophy of Sport, vol. XI. 6-13. Walton, Gary M. 1992. Beyond Winning: The Timeless Wisdom of Great Philosopher Coaches. Champaign, IL: Leisure Press.

Thursday, October 24, 2019

Plato and Augustine’s Conceptions of Happiness Essay -- Philosophy Essa

Both Plato and Augustine offer unusual conceptions of what one must acquire to live a truly happy life. While the conventional view of happiness normally pertains to wealth, financial stability, and material possessions, Plato and Augustine suggest that true happiness is rooted in something independent of objects or people. Though dissimilar in their notions of that actual root, each respective philosophy views the attaining of that happiness as a path, a direction. Plato’s philosophy revolves around the attainment of eternal knowledge and achieving a metaphysical balance. Augustine also emphasizes one’s knowing the eternal, though his focus is upon living in humility before God. Both assert that human beings possess a natural desire for true happiness, and it is only through a path to something interminable that they will satisfy this desire. In his several dialogues, Plato contends the importance of the four virtues: wisdom, courage, self-control, and justice. In The Republic, he describes a top-down hierarchy that correlates to the aspects of one’s soul. Wisdom, courage, and temperance preside control over the rational, spirited, and appetitive aspects of the soul. It is when one maintains a balance between these aspects of his soul that he attains peace within himself: â€Å"...And when he has bound together the three principles within him...he proceeds to act...always thinking and calling that which preserves and cooperates with this harmonious condition (Plato 443c).† Wisdom and knowledge consistently remain at the top of his view of happiness. During the apology, Plato is asked what punishment is best suited for him. He sarcastically answers, â€Å"to be fed...(It is) much more suitable than for any one who has won a v... ...ath is led by humility, directing one toward a better understanding of God. Perhaps it is not important, however, which source, if either, is the correct root of happiness, but merely that one’s source stretches beyond the margins of what is temporal. Works Cited: Augustine, Aurelius. Confessions. 400. Trans. Henry Chadwick Oxford: Oxford University Press, 1991. Kant, Immanuel. An Answer to the Question: What is Enlightenment? Online Essays Appropriate to Foucoult. 1997. 3 April 2001. Available URL: http://www.csun/edu/~hfspc002/ fouc.essay.html Plato. Five Dialogues. Trans. G.M.A. Grube Indianapolis: Hackett Publishing Company, 1981. Plato. The Republic. Exploring Plato’s dialogues 28 March 2001. Available URL: http://trill.cis.fordham.edu /~gsas/philosophy/quotedpassage.htm

Wednesday, October 23, 2019

Development of the Aztec, Akkadian and Hittite Empires

Chris Scarre ( 2013, p.198 ) suggests that the development of imperiums was driven by the desire for security, or for economic addition or by the mere personal aspiration of swayers and elites. To what extent do you hold with this statement? Answer utilizing grounds from, and doing mention to, at least three of the undermentioned imperiums: the Aztec, the Roman, the Chinese, the Akkadian and the Hittite. The purpose of this paper is to find as to whether I agree or disagree with the above statement. In order to find the extent of agreement/disagreement, a scope of goaded forces will be explored environing the imperiums of the Aztecs, the Akkadians and the Hittites. To get down with, the word imperium will be defined to give a unequivocal apprehension and how it fits into the three aforementioned imperiums. Empire is defined as: ‘a group of states or peoples ruled over by an emperor, empress, or other powerful crowned head or authorities: normally a district of greater extent than a land, as the former British Empire, Gallic Empire, Russian Empire, Byzantine Empire, or Roman ‘ . ( Oxford Companion to Archaeology, 2012 ) Evidence of suggested forces behind the constitution of imperiums and their possible death will be used to back up any agreement/disagreement. The first imperium to be covered is the Aztecs, which existed during the late Post-Classic period, and located in the dumbly populated basin of Mexico. The Aztecs came to command big countries of Mesoamerica North of the Gulf of Tehuantepec and were the last of the Chichimec folk to go forth their place at Aztlan by drouth or overaˆ?population which my have been the driving force to the constitution of the imperium. The desire for wealth seem to hold progressed when the Aztecs served as soldier of fortunes through which a series of confederations and rebellions formed, ensuing in growing of wealth and metropoliss. To farther confirm the rise of an imperium, the Aztecs took control of an country of 200 000 square kilometers with a public of about 10 million. This demonstrates the push for growing in set uping a powerful imperium. Having exp lored the development affecting the growing of the Aztec imperium. The societal complexness every bit good as the handiness of historical grounds of stuff remains are found amongst the ruins stating the narrative as it unfolded at the clip. To confirm archeological grounds I shall concentrate on the capital, Tenochtitlan ( C. AD 1325 ) , which grew to be the largest and most complex metropolis in the new universe. Archaeological grounds suggests that much of Tenochtitlan was destroyed in 1521 or subsequently demolished by the colonial Spaniards. It was non until the terminal of the fourteenth century that several twelve warring metropolis provinces existed, one in peculiar which demonstrates the desire for wealth is that of Mexica-Tenocha having a portion of testimonial from combined military triumphs. Further grounds of the desire for power and aspiration by the swayers during the twelvemonth 1519 whereby the mature Aztec imperium dominated some 400 antecedently independent civil o rders through bullying, confederation, and outright conquest. Such procedures of military, wealth, confederation and land size is for me a requirement to the formation of an imperium. The Aztec imperium at the clip showed no marks of failing, was extremely organised, hierarchal and warlike. With the rise of an imperium came its autumn from grace as the imperium proved delicate and did non last the reaching of aggressive European incomers who efficaciously disrupted the top degree of the societal hierarchy and so broke the coercive forces that held the imperium together. ‘The Aztec Empire came to an disconnected terminal on 13 August 1521, when Hernan Cortes and his Spanishconquistadorstook the Aztec capital and its emperor Montechzuma ( Montezuma ) II ‘ (The Aztec Empire: Guggenheim Museum, 2012 ) .Having explored factors impacting a scope of driving forces, I am certain that Scarre has provided a grade of simplification and has non omitted any factors that do non back up the development of imperiums. Not limited to the Aztecs, the rise of imperiums occurred on a planetary footing which brings us on to the second of the imperiums to be discussed which is the Akkadians. The Akkadians were initiated by the swayer Sargon, who was driven by pitiless aspiration through the conquering of the metropolis of Sumer, developing into an enlargement into the universe beyond. It can besides be argued that the Akkadians were besides driven by economic addition through the connexions with the lands of Dilmun, Magan, and Meluhha. Within this desire for economic addition it can be a plausible and a simplified procedure of economic growing and security for the people. Although the imperium was established, the capital, Akkad, has non been located archaeologically. The statement made by Scarre relies on driving forces and taking into history the Akkadian imperium, the readings made through archeological surveies seem to carry through the procedures required in the development of an imperium. Sargon a nd his replacements besides conquered the great city state of Elba, to obtain goods and natural stuffs. The cardinal site of Troy where a great trade of activity was seen from seven consecutive metropoliss, Troy I to Troy VII clearly demonstrates to lift and autumn of an imperium through natural to warfare. The wealth of Troy was apparent when a monolithic cache of about 9000 objects that have become known as the Treasure of Priam connoting power and wealth but fell merely as the Akkadian imperium did. ‘Archaeological grounds has shown that the Akkadian civilisation collapsed suddenly near 4170 Â ± 150 calendar year B.P. , possibly associating to a displacement to more waterless conditions ‘ ( Cullen, 2000 ) . Although records detailing this are rare, the alterations in regional fruitlessness are preserved in next ocean basins. There is besides grounds of volcanic ash sherds which may hold held a direct but temporal nexus between Mesopotamian aridification and societal prostration. With this sudden displacement to a more waterless status within the part, this may hold besides been a lending factor to the autumn of the Akkadian Empire. Not merely did the imperium prostration from environmental factors but besides by occupying forces from the E. Although I tend to hold with the procedures of imperiums lifting and the drive force behind them, it is more hard to confidently support factors imputing to their ruin. The Akkadian imperium is known to hold risen through conquer ing and economic addition but with two changing factors of natural and semisynthetic forces, we can non presume that warfare or environmental factors played a remarkable portion in the prostration of that imperium. I am non convinced that warfare brought down the Akkadian imperium and am non convinced that environmental factors played a exclusive portion in their death. A cardinal site which besides reinforces the desire for wealth and power. Small is known about the following imperium, the Hittites who were lost to history. What we do know are found on clay tablets (Explore/World Cultures: Hittities British Museum, 2013 ) . It was during the periods from approximately 1650/1600 to 1200 BC that the male monarchs of Hattusha ruled an imperium that reached across the wide lands of Anatolia, widening at times even into the North of Syria. ‘They conquered Babylon, and Troy was seemingly one of their vasals. Besides Egypt and Assyria/Babylonia, the Hittites were the 3rd world power of the Ancient Near East ‘ ( The Excavations at Hattusha, 2011 ) The Hittites as with any other imperium established the capital Hattusa which comprised beginnings of both written and archeological grounds, nevertheless, research into this part is still ongoing. As small is known, one thing nevertheless does come into light which surrounds the aspiration of the male monarch. It was Hattusili I who at the clip became the first male monarch to establish a run in Northern Syria. Such a run implies that the king knew of the importance environing the desire to hold entree to the sea and for the take-over of trade paths. It was through this run that the male monarch was driven strictly by economic addition through trade and power. Due to little other grounds, there is small to indicate to any concrete informations on the degrees of societal complexness either through archeological findings. From what grounds we have, there is no indicant of any complexness of growing giving the feeling of simpleness in the constitution of the imperium. Although the prostration of the Hittites is non really clear, grounds does demo devastation and forsaking which occurred around 1200-1185 BC at the terminal of the bronze age. One other indicant points to about 1200 BC when the imperium was overwhelmed by encroachers, the individuality of whom is unsure but who were likely portion of the general motions of people in the period of agitation in the Mediterranean at the clip. To reason, I can see no disagreement in Scarres statement and to the full support and agree that imperiums were and are still driven by power, economic addition, security and personal aspiration. If we take into history the procedures involved, I do non believe that there are any complexness. Social and proficient ability does nevertheless find the advancement of a civilisation but as with any other imperium, the leading determines its stableness and length of service. The greater the leader, the greater the imperium. Archaeological grounds exists sing imperiums through the Roman and Greek ruins foregrounding the desire for wealth and the push for power through warfare. I can flatly state that I agree with the statement in that imperiums do lift and fall as evidenced with the Roman imperium, the British imperium in India and the three listed above and that all are driven by one manner or another even to this twenty-four hours. ( 1588 words ) Bibliography Asher, N. ( 2012 )The Oxford Companion to Archaeology( 2nd Ed ) Available at: hypertext transfer protocol: //dictionary.reference.com/browse/empire? s=t Accessed: 31 January 2014 Cullen H.M. et Al ( 2000 ) A scholarly article on the prostration of the Akkadian imperium from Geology, April 2000, volume 28, no. 4 ; pp.379–382. Available at: hypertext transfer protocol: //leilan.yale.edu/pubs/files/cullen2000.pdf ( Accessed: 1 January 2014 ) Scarre, J. ( Ed. ) ( 2013 )The Human Past: World Prehistory and the Development of Human Societies3rdEdition London: Thames and Hudson, pp. 454, 455, 456, 457 Scarre, J. ( Ed. ) ( 2013 ) The Human Past: World Prehistory and the Development of Human Societies 3rd Edition London: Thames and Hudson, p. 198 The Guggenheim Museum, Exhibitions-The Aztec Empire-Overview Available at: hypertext transfer protocol: //pastexhibitions.guggenheim.org/aztecs/overview.html. ( Accessed 1 January 2014 ) The British Museum, Explore/World Cultures ( 2013 ) [ Hittites ] Available at: hypertext transfer protocol: //www.britishmuseum.org/explore/cultures.aspx ( Accessed 28 December 2013 )The Excavations at Hattusha – A undertaking of the German ArchaeoIogical Institute ( 2011 ) Available at: hypertext transfer protocol: //www.hattuscha.de/English/english1.htm ( Accessed 31 January 2014 )1

Tuesday, October 22, 2019

Wireless Networking Essay Example

Wireless Networking Essay Example Wireless Networking Essay Wireless Networking Essay Wireless Networking Name: Course: Institution: Instructor: Date: Wireless Networking Local access networks can be described as a network connection that limits access to the network over a specific radius. There are wired and wireless local access networks. Wired local access networks are characterized by the use of cables and adapters for network connection whereas wireless networks are characterized by the use of receptors and nodes for network access. Wireless local access networks are used in institutions such as hospitals, schools factories, offices and homes. In the named institutions, wireless LAN is used by hospitals and offices to access records and work without the use of bulky material such as paperwork. The wireless access network is considered superior to the use of wired local access networks. The advantages attributed to the use of wireless access networks are mobility, whereby the user can access the network at the comfort of the office or the workstation without having to move from one location in order to access work, documents or records. In addition, the user has low costs of installation compared to the wired local access network that has very many cables and adapters, which enable transmission in the network. The wireless local access network has low infrastructure in that no wire connections are necessary for the user to access the network. Moreover, the use of wireless networks enables the user to ease the change in the network topology into any that best works to the advantage of the network users. Wireless networks are catastrophe resistant in that they are manageable and scalable in size. Furthermore, wireless networks are easily maintained in that they do not require complex maintenance routines. However, the wireless networks are not free from problems. They are faced by interference by other signals such other networks from around the area of operation and radio signals from devices such as mobile phones and media gadgets such as radios and television sets. In addition, they also are coupled by security threats from hackers and malicious software. The wireless networks are rarely interoperable because of lack of transferability from one vendor to another owing to the very many regulations in each vendor system. Wireless networks also accrue health and safety issues in that they pose health risks associated by the electromagnetic fields associated with wireless gadgets. Moreover, the use of wireless networks is associated with lower data charges There are several technologies for wireless networking in a private local access network. They are mainly Bluetooth, HIPERLAN, Ultrawideband, cellular/Personal Computers infrastructure and custom /private protocols. The use of a standard wireless local access network is advantageous in that it serves as a guide for developing new and reliable hardware. In addition, the wireless network enables the network user to interoperate the network with other network vendors such that one network has multiple network vendors. It also reduces the risk associated with new products, which might corrupt the network and even wreck the whole system of the user. However, these advantages are countered by disadvantages whereby the use of a specific standard does not allow for innovation on the part of the users. It also may lead to dormancy in the development of technology in a fast-growing technology field. Standard sharing vendors cannot fully market and sell their products with the existence of rigi d standards. The IEEE 802.11 is a standard for implementing wireless networks. It release was by unlicensed use whereby the spectrum is free. The unlicensed bands for the wireless networks are essentially good for deploying relatively small private radio networks. Wireless networks are also forced to compete with other in-band users, which are erratic in number and interference. Unlicensed band usage is categorized into the 2.4GHZ-ISM band and the U-NII band. The 2.4GHZ ISM band is referred to an Industrial Scientific Medical band; it is specifically on the 2.4000-2.4835 GHz band. It has 83.5 MHz of free spectrum, and it has inexpensive hardware. The band is very useful to the users because of its easy compatibility with other users. The U-NII band is described as the Unlicensed National Information Infrastructure band. It lies on the bands of 5.15-5.35 GHz and on 5.725-5.825 GHz and comes with 300 MHz of free spectrum and fewer co-existing systems. It is relatively inexpensive to install and use but its radio hardware is the only expensive bit about the band. The IEEE 802.11 has more extensions to it. They are mainly 802.11a, which is a standard, which adds more Orthogonal Frequency Division Multiplexing (OFDM) to the standard for high data rates in the U-NII band. Another extension is the 802.11b whereby there are additional 5.5mbps and 11 mbps capabilities to the IEEE 802.11standard.furthermore 802.11e is a future extension that is responsible for maintaining the quality of service capability for some applications by the user. It also has the 802.11g, a future extension for 2.4 GHz links for using the OFDM for 22 mbps data rates. For security purposes, the 802.11i was developed to counter threats to the network. The IEEE 802.11 has two parts, which are PHY and MAC. The PHY correspond to the physical outlines and the operations of the standard to the OSI protocol stack. It also ahs many different specifications and its specific extensions only exist for the 802.11 standard. It entails of how the data in the network is specifically sent in and out of the network. Whereas the MAC consists of and correspond to data links and outline operations in the OSI protocol. In summary, it handles the data part of a network. The Mac is the same for all 802.11 standards regardless of which PHY is specified and its main aim is concerned with how data is framed into data packets for transmission via the network. The PHY is divided into two main parts namely the Physical Medium Dependent (PMD) and the Physical Layer Convergence Protocol (PLCP) The PMD is responsible for modulation, coding and decoding, and multiple access of the network. The PLCP is responsible for channel assessment, physical layer services t hat are independent of any physical medium. The Data Link layer is divided into two parts the Medium Access Control MAC and the Logical Link Control (LLC). The data link layer’s purpose is to transfer data within adjacent network nodes while the Medium access control is a protocol sub layer of the data link layer that provides channel access and addressing the control mechanisms between several terminals for them to communicate within a multiple access network. The IEEE 802.11 standard for wireless networks has interoperability challenges. There existed difficulties in the cross vendor operations for the users such that it was impossible for the users to change network vendors. The network vendors did not follow the IEEE 802.11 standard to the latter, which brought rise to numerous problems to both the vendors and the users. However, some issues were addressed and some were not therefore some problems regarding the standards still exist and need address. The interoperability issues prevent the public from accepting new technology thus the industry loses a lot of money and its credibility. In addition, the lack of interoperability leads to little or no innovation as new technology is prevented from the development of new technology. Interoperability issues were countered by the solution of formation of the Wireless Ethernet Compatibility Alliance. WECA is an industrial association formed on 23 August in the year1999.It sole purpose is to provide interoperability-testing services for vendors of the IEEE 802.11 wireless modem. The WECA is responsible certification of Wi-Fi enabled equipment, which gives any equipment tested by the organization a very high degree of reliability and interoperability. In the use of Wireless networks, multiple access issues also arise. For the wireless network to fully function simultaneous links must be coordinated in the same network. The interference in ISM bands and deep fading in the frequency of the bands is also another issue facing network users. The direct spread system consists of eleven overlapping channels with each channel having 22 MHz total bandwidth. The radio links can also use the overlapping channels simultaneously. Frequency hopped spread spectrum is characterized by the presence of over seventy nine channels with each channel having a total 1 MHz bandwidth. The unique hop sequence is characterized by a unique hop sequence for each length, which avoids simultaneous use. Direct sequence spread spectrum is a modulation technique favored by modem designers. It is best for coexistence of networks where there are in-band wireless systems. In addition it also woks to the contribution of more gentle interference to other in-band systems thus for this reasons it is regarded highly among the information modem designers. The Direct sequence spread spectrum enables the links to be easily modified for IEEE 802.11b extensions. Japan has the largest number of channels with fourteen frequencies followed by Europe in overall and then by the United States and France and Spain respectively. Spreading a signal in the IEEE 802.11 standard uses the Barker sequence due to the low correlation properties of the method. The method implies change of phase of the waves at 180degrees.A barker’s spread signal is similar to that of a spread signal. When signal is interfered by noise it becomes blurred and is represented by an almost straight line whereas a realistic signa l is almost similar to that of the spread signal. When noise is filtered in a despread signal, it becomes refined and it becomes easily transmittable through the network. Despreading is the art of spreading an interfered signal to come up a new signal that is ready for retransmission through the network. Spreading increases with bandwidth of the signal for increasing resistance to interference of the signal.

Monday, October 21, 2019

Security Policy for Kruger Exporters

Security Policy for Kruger Exporters Introduction An information security policy is a document that is designed by an organization for the purpose of providing employees with best practices when it comes to the use of the organizations technology equipment and related services.Advertising We will write a custom term paper sample on Security Policy for Kruger Exporters specifically for you for only $16.05 $11/page Learn More It may also be regarded as a blue print used by an organization to ensure that staff use the available technology services as intended. An information security policy is also a tool through which an organization can specify the responsibilities of different individuals concerning the security of information in the organization. It gives a framework for maintenance and provides information security policies and procedures as well as what is expected of end users (Whitman Mattord, 2010). Generally, the information security policy document is a useful guide for the successful deployment of an information security program across an organization. The information security policy must directly support an organization’s vision and mission statements. It must also be defensible in case legal challenges to it arise. It is an executive level document, drafted in consultation with the CIO and other executives. Typically, the information security policy shapes the security philosophy in an organization’s information technology environment. In most cases, the information security policy is a static document that is never subjected to frequent changes. However, it may change when the direction being taken by an organization radically changes. The information security policy will also protect the availability, integrity, confidentiality, and authenticity of information. Furthermore, it underpins such societal goods as privacy, the protection of digital identity, and the protection of intellectual property. This paper presents an information security pol icy for Kruger Exporters, an international exporter based in the United States of America. The company has its headquarters in the United States but with a presence in Africa and Asia.Advertising Looking for term paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More All transactions are centrally administered at the U.S. office. The information security policy fro Kruger Exporters is presented in two distinct sections. The first section discusses the introductory aspect of the information security policy while the second section presents the information security policy criterion which outlines how the company will go about guarantee the security of its information systems as well as the use of its technology equipment and services. Information Security Policy for Kruger Exporters With the increased use of technology, organizations are left with no choice but to work hard in ensuring that the use of technology in information management is secure and very reliable. To accomplish this, a well thought out information security policy is of paramount importance. Without an effective information security policy in place, organizations will be faced with a tough responsibility of controlling the use of its information systems and other technology services. More importantly, a working information security policy system will enable an organization to retain its customers and make good use of its information technology services. If the growth of Kruger Exporters ecommerce transactions is to be reinforced, it is obvious, that security of these transactions must be dealt with effectively. Considering that Kruger Exporters is a global organization with branches and customers located in different continents, much of its business transactions take place through the Internet. As such, the company is certainly faced with numerous challenges having to do with how to secure its ecommerce transactions besid es ensuring that its information technology equipment and services are not abused by anyone.Advertising We will write a custom term paper sample on Security Policy for Kruger Exporters specifically for you for only $16.05 $11/page Learn More As the Chief Information Officer at Kruger Exporters, I present the following security policy that will be useful to ensure that the company meets its information technology requirements. As stated earlier, this is given in two separate sections. Policy Introduction Document Information Generally, the use of technology presents serious challenges to organizations that are embracing its usage in its operations. Since its inception in the 1970s, for example, the Internet has exhibited vulnerabilities in its underlying communications network and nodes, protocols, network administration and host systems. Ordinarily, these vulnerabilities have often been located in the security mechanisms of the hosts, example being the abil ity to obtain unauthorized privileged access, and the ability to gain unauthorized access to passwords. In addition, commercial usage of the Internet has introduced new threats such as interception of data in transit by competitors or criminals. Hackers, competitors, disgruntled employees and former employees have been exploiting Internet vulnerabilities to meet their own selfish ambitions. Due to these developments, organizations have been forced to acknowledge the changed nature of the Internet environment from being friendly to being competitive and hostile. Given that Kruger Exporters conducts most of its business through the Internet, security is critical especially if the company is to gain the confidence of its distinguished customers. Apparently, there is now also increasing alarm within Kruger Exporters over threats emanating from its own trusted employees. For example, an employee can send information over the Internet to a global audience, yet falsely presenting himself o r herself as a spokesperson for the company. In other words, Kruger Exporters is not only vulnerable to Internet threats from outside its boundaries, but it also presents a threat to other Internet participants.Advertising Looking for term paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More This security policy document will provide a clear statement of the information security policy, and this must be communicated to all users as well as any other relevant parties. The policy will be placed in a file and will be available to all users at all times. Moreover, it will be communicated to the users as part of providing access to the systems within the company. In generating Kruger Exporters information security policy regarding the use of its technology related services, at least seven key areas must be addressed. These seven areas may be regarded as sub policies within the information security policy and include the organization’s technology acceptable usage policy, employee acceptable usage policy, Internet acceptable usage policy, Internet information protection policy, Internet information publication policy, Internet information access policy, and Internet employee privacy policy. Typically, these sub policies provide a strong guide for the access and use of t he technology equipment as well as Internet services offered by Kruger Exporters. Audience Considering the type of business that Kruger Exporters is involved in, this document is intended for the company’s staff who are scattered across different continents. However, it is important to note that Kruger Exporters also interacts with many other people within and outside the company in order to get certain things done. Among them are third party service providers and regulatory bodies. The audience thus goes beyond staff in the company. Ideally, this security policy will make employees at Kruger Exporters responsible and accountable for understanding and following information security rules, policies for ensuring that employees use available mechanisms to protect their systems, and site specific policies. Purpose As earlier explained, the challenges that may be faced by Kruger Exporters demand a well designed solution in the form of an information security policy embedded with p rocedures and mechanism of handling security related issues. This information security policy and associated procedures will convey security guidance and rules to be used by all staff at Kruger Exporters as far as access and usage of Internet and other technology related services in the company is concerned. Scope As noted earlier, this information security policy will cover staff and any other third party individuals and organizations that interact with Kruger Exporters in the course of carrying out its business. However, despite the fact that others may be covered by this information security policy, Kruger Exporters’ staff at the different locations are the major users of the company’s technology services, especially the Internet, and are, therefore, the main target of this information security policy. Policy Criteria Objectives This information security policy criterion is meant to ensure that all staff members at Kruger Exporters, regardless of where they are, hav e a reliable and well maintained information security policy which serves as a guide on how to using the company’s systems and information technology services in such a way that security is not compromised. When staff members have an understanding of the implications of not following the set guidelines, they are more likely to follow them without making excuses. Although not following a policy may have no major effect on the business processes of Kruger Exporters, the need to have an effective information security policy in place is very important and can not be underestimated if Kruger Exporters is to secure it operations and remain competitive (Artiges, 2004). The Chief Information Officer at Kruger Exporters will identify some members of his or her information technology department to assist other users in ensuring that information security policy is properly followed. In addition, others will be given the authority to enforce the use of the policy. Compliances All staff a t Kruger Exporters will be required to comply with all the guidelines put in place by the Chief Information Officer. Failure to comply will certainly call for tough disciplinary measures against the offenders. The guidelines are, therefore, necessary in order to get every user doing what the institution expects of him or her. Responsibilities The main responsibility of ensuring that every user abides by the set rules and regulations lies with the Chief Information Officer. However, the CIO may select members of his or her information technology department to assist with the implementation. Where necessary, the CIO will get the support of the top management to ensure that set guidelines are followed and that every user is fully aware of what they need to do as far as security issues are concerned. Despite the fact that the CIO and his team have the responsibility to train all users and make sure that they understand what has to be done, it is also the responsibility of the individual users to learn and ensure that they understand the institution’s expectations on them. Implementation The following is the criteria to be followed by Kruger Exporters to guarantee paramount security for its information and use of technology services within the institution. Considering the type of services that may be useful to staff at Kruger Exporters, two things must be addressed by the information security policy. First, there is the implementation and management of a firewall and secondly, there is the use of digital certificates. These are explained as follows. Firewall Implementation and Management Firewalls are a very critical security asset that may be used by Kruger Exporters to protect its information resources (Plotkin, Wells Wimmer, 2003). It is vital that all firewalls be configured, implemented, and maintained in a standardized and secure manner. In response to the risk discussed previously, this subsection describes Kruger Exporters’ official policy re garding the implementation and management of a firewall. Configuration and Implementation Among the most critical configuration and implementation considerations for Kruger Exporters are: Operating System Before a firewall can be implemented on an operating system, the operating system must be fully secured and tested in accordance with the regulations determined by the Chief Information Officer. Kruger Exporters’ Operating Systems Standards should be consulted for direction. Responsibility Before implementation, an administrator must be identified as responsible for the firewall. The administrator should be fully responsible for maintaining both the firewall software and the underlying operating system. The administrator may select up to two other individuals to assist in maintaining the firewall. However, these individuals must be approved by the Chief Information Officer. Access Only the administrator and his or her approved assistant or assistants may access the firewall and operating system. Only the firewall administrators may have administrative access to the operating system and firewall software. Default Rule All of Kruger Exporters’ firewalls are based on this premise. That which is not expressly permitted is, therefore, denied. Maintenance Two important considerations under maintenance are logs and the rules that accompany how these logs will be handled. Logs The firewall administrator is responsible for ensuring the daily review and archiving of firewall logs. Rules It is only the firewall administrator who is authorized to make any changes on how the firewall is to be administered. All requests must, therefore, be forwarded to the firewall administrator and be approved by the Chief Information Officer prior to the enactment of any changes. Use of Digital Certificates Generally, digital certificates are issued by Certificate Authorities and are used to authenticate users and ensure that only the right people gain access to information across the company. It is, however, important to understand that technologies themselves have never solved any problems. People must know where, when, and how to use them in the context of solving their security needs. As a major requirement, the Chief Information Officer must ensure that a company wide directive on the use of digital certificates is present and followed properly. Proper implementation of this policy will ensure that any person using digital certificates does so by following the guidelines outlined by Kruger Exporters’ Chief Information Officer. Controls In generally, controls, safeguards, and counter measures are terms that are used for security mechanisms, policies, and procedures. These mechanisms, policies, and procedures counter attacks, reduce risks, resolve vulnerabilities, and otherwise improve the general state of information systems security within the organization (Cade Roberts, 2002). In the case of Kruger Exporters three general categories of co ntrols may be implemented. These are controls for policies, programs, and technologies. Policies are documents that specify Kruger Exporters approach to security. Four types of security policies will be put in place. They include general security policies, program security policies, issue specific policies, and system specific policies. The general security policy is an executive level document that outlines the company’s approach and attitude toward information security and clearly states the strategic value of information security within the company. This document will be created by the Chief Information Officer in conjunction with the Chief Executive Officer and will set the tone for all subsequent security activities. The program security policy is a planning document that outlines the whole process of implementing security in the company. This policy is the blue print for the analysis, design and implementation of security. Issue specific policies will address the specif ic implementations or applications of which users should be aware. These policies are typically developed to provide detailed instructions and restrictions associated with security issues. To be covered in this category are policies for Internet use, email, and access to buildings. Finally, system specific policies will address the particular use of certain systems. These will include firewall configuration policies, system access policies, and other technical consideration areas. Different parts of the information security policy will be reinforced by among other, the Chief Information Officer, the system administrators, and the institution’s op management. Third party organizations will also be involved where necessary. For example, the use of digital certificates will require the cooperation of Certificate Authorities. Internet Services Providers will also be involved to ensure that security policy is not compromised. Table 1 presents a summary of some of the components of Kruger Exporters’ information security policy document. Table 1: Information Security Policy Components Security Policy Section Why it is Needed Consequence of Absence Roles and Responsibilities This will ensure that users know what is expected of them Users get confused as they do not know what is expected of them Security Awareness and Training This will help users to know security policies and how they can be accessed Users will not know the nature of the policy or even how to access it Access Control This helps to prevent unauthorized access to the institution’s resources May lead to resources being accessed by unauthorized persons Password Policy To help user understand the risk of not keeping passwords secretly Passwords may be exposed to unauthorized persons Email Policy This controls how email is used across the institution Email services may be abused by staff and students at Kruger Exporters Conclusion Information security is now every compan y’s concern. The way we live and do business is underwritten by information system infrastructures, with the Internet usage being the most foundational of them. Spoken plainly, information security today protects the ability of an organization to function. In spite of the fact that the use of technology related services has come with numerous benefits to both individuals and organizations, this has been accompanied with several challenges that must be addressed to ensure profitable use. In order to deal with such challenges, it is essential for any organization to have a strong information security policy in place that will caution it and its employees against the abuse and improper use of technology services. This paper has proposed an information security policy that should be used by Kruger Exporters to meet the above objective. This information security policy provides guidance to all staff at Kruger Exporters regarding the use of Internet and other technology related ser vices offered by the company. Beyond doubt, an effective information security policy document is of great importance and must, therefore, be a well thought out and designed document. References Artiges, M. (2004). Bea Weblogic Server 8.1: Unleashed. USA: Sams Publishing. Cade, M., Roberts, S. (2002). Sun Certified Enterprise Architect for J2ee Technology: Study Guide. California: Prentice Hall Professional. Plotkin, M. E., Wells, B., Wimmer, K. A. (2003). Ecommerce Law Business. New York, NY: Aspen Publishers Online. Whitman, M. E., Mattord, H. J. (2010). Management of Information Security. Boston, MA: Cengage Learning.

Sunday, October 20, 2019

The Real Marketing Value of a Professional Book Cover

The Real Marketing Value of a Professional Book Cover Revealed: The Real Marketing Value of a Professional Book Cover Most self-published authors already understand the importance of great cover design. When it comes to marketing their book, the cover design is their primary sales tool, the face of their project, and the thing that can elevate them to a professional standard in the eyes of readers. But, if authors know this, why do so many still create their own book covers?Most often, it comes down to resources. Professionally designed book covers cost money (but not as much as you might think), and often, authors end up asking themselves: does a professional book cover actually get you more clicks and sales? The Professional Cover TestTo answer this question once and for all, we recently ran an experiment, in which self-published authors were invited to get their book covers re-designed by an experienced professional on Reedsy.Four titles from a range of genres were selected and entered into an A/B test: over the period of a week, we ran two Facebook ads for each book. Both ads were identical in every way - except for the cover image - and exposed to approximately 1,000 users from the same audience set. That way, we would discover how much the re-designed cover impacts the click-rate rate of an advert.On average, we saw a 35% increase in the marketability of books with professional covers.What does this mean? For each test, the professionally designed cover had a click-through rate that was 12.5–50% higher than their non-professional counterparts. Let’s take a quick look at each of the redesigns and let our designers explain their approaches.Once a Bridesmaid -   48% mo re clicksBuy The Fire Within on AmazonWhy do professional covers matter?An effective cover will get relevant readers responding to your ads and heading to your Amazon page. Once there, the design will communicate the tone and content of your book and get more (of the right) readers to buy or download it. This, in turn, improves your chances of positive reviews and ratings, which will send you up Amazon’s rankings, giving your book greater visibility, leading to even more downloads. More so than in most markets, self-publishing benefits heavily from the snowball effect.And we haven’t even touched on how your cover can be used for reader magnets  and crowdfunding campaigns!To see about maximize your book’s marketing potential, head over to the Reedsy Marketplace and request free quotes from over 200 experienced book designers with experience in almost every imaginable genre.Sign up for our free online marketing course and learn how to use Facebook advertising to market your own books.If you've had a re-design of your book cover - or if you've considered getting a professional cover but decided not to - share your thoughts in the comments below.

Saturday, October 19, 2019

Describe a time you set a goal higher than you thought you could Essay

Describe a time you set a goal higher than you thought you could achieve. Explain the steps you took to achieve your goal. What was the outcome What did you learn from the experience - Essay Example Therefore, I set myself a goal of shedding 10 kilograms every week. Unfortunately, I could not achieve this target, which got me so devastated and the motivation to reduce my weight was fast waning. I realized that I was not regulating my calorie intake because I was still stuck with too much junk food. I also tried to lose weight by skipping meals, which did no good to my health. I had to review my goal and set practical ways of shedding excessive weight. I created a schedule, which included adequate gym time with guidance of a gym instructor and also set diet timetable with the help of a nutritionist. The result was so amazing. Every week I lost at least 1 kg, which was positive result towards achieving my goal. I realized that success demands specific, measurable, attainable, relevant and time Bound objective. I also realized that too high and unachievable objectives demoralize people while too easy goals undermine ones

Friday, October 18, 2019

Controlled Assessment B Coursework Example | Topics and Well Written Essays - 3500 words

Controlled Assessment B - Coursework Example Data collection is one of the central challenges in any research project. It is the process through which the opinions of people are collected and categorised. There are many methods of collecting data such as interviews; questionnaires; documents and observations provide invaluable information that is used for policy decisions, marketing strategies, and academic studies etc (Dinlersoz & Emin, 2004). Interviewing is a data collection method in which the researcher asks for information verbally from the respondents. It is the way to access people’s perceptions, definitions, meaning, situation and construction of reality, where it involves discussing or questioning issues with people to collect data unlikely to be accessible using techniques such as questionnaires or observation. Interviews are suitable when in-depth information is desired and this type of information is required in order to fulfil the purpose of this research (Palma et al,1994). Therefore the interviewing resea rch method will be better. What Amy has already done is good but nevertheless it’s better for her to adopt a wider approach to gathering data. This is the most important part in the planning of a sample survey, because a poorly designed questionnaire may ruin an otherwise well conducted survey. At this stage it is always advantageous to think in advance what variables and tabulations would be required for later analysis (International Council of Shopping Centers, 2004). It is advisable that a dummy tabulation plan should have been prepared in advance, if possible. This would ensure the inclusion of the information, which would be needed for the questionnaire. While preparing the questionnaire the following points were kept in mind in order to overcome the related problems. In this case study the method of e-mail inquiry was used. This method was applicable because most of the

MASTERPECIS Essay Example | Topics and Well Written Essays - 1000 words

MASTERPECIS - Essay Example He is talking about the loneliness he felt in the month of November accompanied by the misty lonely woods .The poet explains the beauty of the hills and experience of the trembling lake which exaggerated his loneliness. In this poem the poet is trying to connect with the objects of the magnificent nature to overcome his undying solitude. He takes the company of the nature and tries to reflect his solitude and despair with it. He finds the solitary element in all the objects of nature which is the situation of the heart of the poet. He resembles the sound of the village clock to that of a galloping horse which is full of energy. He his explaining the motion of the earth which we know is just like the moving fields shown in a passing train. He is trying hard to forma communion with nature and gets lightened by the extreme beauty and moves of nature. Comparison of William Wordsworth’s ideas with William Blake William Wordsworth and William Blake were great romantic poets of 17th century and described their feeling through the beauty of nature. Both of them had an undying love and passion for the nature and believed in the divinity existed in the universe. There can also be seen certain other comparisons between Wordsworth and Blake in how they admired the grace and benevolence of divine nature. Apparently, both these poets believed greatly in the imaginative power of the human being and praised the primitive instinct of a man. Both Wordsworth and Blake saw the characteristics of god in his vast creations and urged for the communion with the divine power. These poets are greatly influenced by the overpowering beauty and grace of the nature and strived to merge with nature to find God. According to Cutajar(2011)â€Å"In his poems such as The Prelude and Tintern Abbey, Nature is personified with Godlike characteristics and it becomes the object of love and worship. Wordsworth believed that this â€Å"natural piety† has given his life consistency and co herence†. This shows that how much Wordsworth was influenced by the nature and god Similar to Wordsworth, Blake also believe in harmony, serenity and divinity in the nature and wants to get back to the primitive nature of man.Applebaum(1996)writes that, â€Å"Serene will be our days and bright, And happy will our nature be, When love is an unerring light, And joy its own security†These lines of Blake depict the love and passion he had for nature and god same like Wordsworth. William Blake found the innocence in the nature which was real and authentic, and Wordsworth also idealized the uncorrupted glory of nature. It can be noticed that the both poets gave much emphasis on God and nature and their theme was exclusively God and universe. They both had the extreme awareness of god and divinity inside them and experienced this through the exalting beauty of nature. They instantly felt the mysterious beauty of nature which can never be altered or created by human at any cost . They were impressed by nature and is stunned by the divine play of God and craved to be a part o f him. Both these poet listen to the inner voice of their heart and connect themselves with the explicit charm of nature and God. Contrast in William Wordsworth’s ideas with William Blake Both William Wordsworth and William Blake were great poets of their time in England and Scenic beauty of the country was their inspiration. However,

Thursday, October 17, 2019

Crime, Media, Culture Essay Example | Topics and Well Written Essays - 1500 words

Crime, Media, Culture - Essay Example This can also be used to control the behaviors of the public. Information about crime is gathered from media outlets such as television, newspapers, radio, and internet (Muncie, Talbot & Walters, 2010, p. 44). This information is supplemented with the experiences of the viewer in the definition of real representation. The media has been accused of representing crime and criminal activities as the norm. Through these representations, criminals are depicted as heroes while law enforcement officers are depicted as villains.Daily news media focuses on incidents rather than conditions. This means that media does not consider ideas. By focusing on incidents, media highlights conflicts rather than solutions (Mason, 2003, p. 69). For instance, the idea that imprisonment should be used to provide opportunities for rehabilitation initially enjoyed popularity from the public. However, correction and justice professionals with support from the media overturned the perception that imprisonment wa s meant to rehabilitate people to the perception that imprisonment was a punitive way of rehabilitating criminals. A rise in crime solidified public opposition to imprisonment as a correctional strategy. The tendency of media to focus on crime has led to the neglect of human needs of people living in impoverished neighborhoods. These people have deprived security because the media created impressions that security and law enforcement agents use criminal means during the implementation of the law.

Essay Example | Topics and Well Written Essays - 750 words - 66

Essay Example As a function of this dynamic, this brief analysis will seek to discuss the ways in which non-state combatants are viewed within the modern context, the ways in which the letter of the law of the Geneva Convention’s framework necessarily deals with such individuals, and the outlook for the future that will likely exist with relation to a more widespread inclusion of non-state combatants within the umbrella of human protection and recognition that the Geneva Convention necessarily affords. With respect to the first topic, one need not look far in order to recognize the way in which al Qaeda most certainly fulfills the role of a non-state combatant within the current geo-political model (Zelikow 6). As such, countries such as the United States have had more than a difficult time determining in what ways captured al Qaeda fighters should be dealt with. Due to the fact that al Qaeda fighters are intrinsically related to terrorism and the non-state struggle of radical Islamic ideology, nations that capture their fighters do not have clear options for which to deal with these individuals. For the most part, rehabilitation is not an option. In the same way, keeping them confined without trial is openly problematic (Yoo 141). Likewise, trying them under martial or civilian court systems prove to be highly problematic due to the fact that by doing so, the state in question (prosecution) would have to engender the defendants with a degree of rights and privileges that are inco nsistent with the forces they represent or the jurisdiction that they ultimately engaged in the act of violence/theater of war. With regards to the way in which the Geneva Convention deals with such individuals as have been described, the fact of the matter is that it does not. Naturally, if a codicil to the Geneva Convention had been included that specified the way in which states could and should deal with non-state actors and members of

Wednesday, October 16, 2019

Crime, Media, Culture Essay Example | Topics and Well Written Essays - 1500 words

Crime, Media, Culture - Essay Example This can also be used to control the behaviors of the public. Information about crime is gathered from media outlets such as television, newspapers, radio, and internet (Muncie, Talbot & Walters, 2010, p. 44). This information is supplemented with the experiences of the viewer in the definition of real representation. The media has been accused of representing crime and criminal activities as the norm. Through these representations, criminals are depicted as heroes while law enforcement officers are depicted as villains.Daily news media focuses on incidents rather than conditions. This means that media does not consider ideas. By focusing on incidents, media highlights conflicts rather than solutions (Mason, 2003, p. 69). For instance, the idea that imprisonment should be used to provide opportunities for rehabilitation initially enjoyed popularity from the public. However, correction and justice professionals with support from the media overturned the perception that imprisonment wa s meant to rehabilitate people to the perception that imprisonment was a punitive way of rehabilitating criminals. A rise in crime solidified public opposition to imprisonment as a correctional strategy. The tendency of media to focus on crime has led to the neglect of human needs of people living in impoverished neighborhoods. These people have deprived security because the media created impressions that security and law enforcement agents use criminal means during the implementation of the law.

Tuesday, October 15, 2019

Turkey's membership of EU Essay Example | Topics and Well Written Essays - 750 words

Turkey's membership of EU - Essay Example This of course leaves the very prominent case of the nation of Turkey. Although not technically a part of â€Å"Europe† proper, Turkey has been highly desirous of EU membership for quite some time now and has been a valuable trading partner as well as maintaining a definitively close political and economic connection with both France and Germany; arguably the two most prominent members of the European Union. Within this context and considering this particular reality, this analysis will seek to discuss some of the major issues that currently serve as an impediment to this taking place as well as analyzing some of the key factors that serve to encourage the inclusion of Turkey as a future member of the European Union. Firstly, from the geographic standpoint, those that argue against Turkish inclusion in the European Union would be quick to point out that 97% of the entire nation of Turkey is not within the continent of Europe (Simpson, 2013). However, as history has noted time and again, Turkey serves as a valuable bridge between Europe and Asia/Mid-East and the inclusion of such a partner would definitively strengthen the ties that these regions could express in terms of trade and economic resilience. Secondly, from the perspective of economics, those that are against Turkish inclusion in the European Union might point to the fact that the GDP of the average Turkish citizen is nearly ? of what the GDP of the average EU citizen enjoys (Jameson, 2013). However, the fact of the matter is that Turkey’s economy has experienced stellar and rapid growth over the past few decades and stands in a very good position to overtake some of the EU’s weaker members in terms of GDP output per citizen within the next several years. Thirdly, from the political standpoint, naysayers would argue that the politics of Turkey are not advanced enough as compared to the mature European style democracies that are invariably evidenced within the other member states of the EU (Hancock, 2012). Although it is true that the nation of Turkey does not have a long history of democratic process as compared to the nations of Europe, it has managed to strike a pluralistic balance between elements of Islamic forces, the military, and a league of social democrats; exhibiting the very epitome of what a democracy should promote – understandings and cooperation between disparate groups of people. Ultimately, if given the chance to decide whether or not Turkey should be admitted into the European Union, it would be the decision of this author that this should indeed take place. The rational for this is nuanced. Firstly, it is clear that Europe has lost a great deal of skilled and unskilled manufacturing jobs over the past several decades to the developing nations in Asia and elsewhere. As a result of this, inclusion of a nation that is currently rapidly industrializing will bolster the overall economic strength that Europe can bring to bear on the intern ational level. Secondly, whereas the population of â€Å"old Europe† has continued to decline, and is on course for even further decline in the future, Turkey’s influx of 140 million people could help remedy the coming collapse of European productivity with regards to gaps in the labor market that are certain to take place. Finally, with regards to the political ramifications of

Video game console Essay Example for Free

Video game console Essay A video game is an electronic game that involves human interaction with a user interface to generate visual feedback on a video device. The word video in video game traditionally referred to cathode ray tube (CRT) display device, but it now implies any type of display device that can produce two or three dimensional images. The electronic systems used to play video games are known as platforms; examples of these are personal computers and video game consoles . These platforms range from large mainframe computers to small handheld devices. Specialized video games such as arcade games, while previously common, have gradually declined in use. The input device used to manipulate video games is called a game controller, and varies across platforms. For example, a controller might consist of only a button and a joystick, while another may feature a dozen buttons and one or more joysticks. Early personal computer games often needed a keyboard for game play, or more commonly, required the user to buy a separate joystick with at least one button. Many modern computer games allow or require the player to use a keyboard and a mouse simultaneously. A few of the most common game controllers are gamepads, mouse, keyboards, and joysticks. Video games typically use additional means of providing interactivity and information to the player. Audio is almost universal, using sound reproduction devices, such as speakers and headphones. Other feedback may come via haptic peripherals, such as vibration or force feedback, with vibration sometimes used to simulate force feedback. The present era is the age of modern communication technology is an integral part of youth lives in the twenty first century. The world of electronic media however is changing dramatically; the vast majority of youth have access to multiple media. Most have internet and video game access and a significant portion have cellphones and iPads. Video games have been an important part of our culture (Sherry 2001). The term Video game in the broadcast possible sense is a form of computer based entertainment. Youth play video games for fun with the goal of progressing to the next Level (stage in playing games) and eventually conquering the opponent whether that’s another player or the computer. What’s more the social aspect sharing tactics experiences and explanation helps cement what they have learned. Opportunity for gaming are everywhere and teens are playing video games frequently. Educational video games, handheld device and media production tools can allow young students to see how complex language and other symbols systems attached to the world. From the first rock arrow heads to globe spanning communication network, human have attempted to use technology in improving length and quality of life. Video games are digital entertainment media that utilize both audio and visual channels to capture the audience attention and immense the in the developers vision. In many cases, this involves putting the player in the role of the avatar that interacts with the in game cases. In essence the player is the star of an interactive movie he sees his avatars action portrayed on screen for his entertainment. It logically follows that the aesthetics for video game should attain similar standards to that of a movie, the quality of both visuals and sound should be high. According to Anderson, Buckley and Gentile 2007; Anderson and Bushman 2001: Anderson Carnagey, Flangnan, Benjamin Eubanks and Valentine 2004; Anderson Dill 2000, Experimental and longitudinal and meta-analytic data indicate that playing violent video games increase aggression hostility and aggressive thoughts. According to Hannon, 2007 Epstein, Beeches, Graf and Roemmich 2007. Games with positive content show positive effect. For Example, playing a dancing Video Game can help children lose weight Konami Dance Revolution 2007. Today, sophisticated video games require players to pay constant attention to the game rather than passively watching a movie. This has both positive and negative impact on the player. 1. 2STATEMENT OF THE PROBLEM It’s worth thinking about video game habits. The rapidly evolving nature of video game graphics, violence, and realism cautions against any definitive statement about the impact of video games on social behavior. According to an article by Sheri Rauh (2006), â€Å"Video Game Addiction No Fun† addiction was defined by Dr.Michael Brody as, â€Å"The person needs more and more of a substance or behavior to keep him going. If the person does not get more of the substance or behavior, he becomes irritable and miserable. † According to the Report of the Council on Science and Public Health on the topic of Emotional and Behavioral Effects, Including Addictive Potential, of Video Games, (2007) the committee stated that they had engaged in a thorough study of how video games were affecting lives but had insufficient evidence that playing video games for more than two hours per day could be considered an addiction. However, they did recommend that two hours of screen time, television, video games and computers was the maximum amount of time that anyone should have every day. In Samaru, due to the establishment of many game centers, many youth that nowadays find freedom too early to laze around. Sometimes some of them sneak through tightened blockages to video centers to satisfy their craving which at the long run help them in derailing them from the path of morality. It does not only constitute distraction but loss of other invaluable assets like time, money and domestic disobedience. Therefore study becomes necessary in other to know what these youth gratify from by spending so much time in game centers playing games. 1. 3RESEARCH QUESTIONS The study shall seek answers to the following questions: 1. Does regular playing of the game teachesteach you how to play the game in reality? 2. What are the pleasures derived from playing the game? 3. Why do youth prefer playing soccer play station to other games available to them? 4. Does regular playing of the game divert them away from other pressing responsibilities? 1. 4RESEARCH OBJECTIVES. The aim of the study is mainly to provide for an empirical base for understanding what gratification do youth derive from constant playing of video games. As such, the specific objectives of the study are as follows: 1. To know the pleasure youth derive from playing video games. 2. To know if playing soccer play station teaches youth how to play football in real life 3. To know the reason why they prefer play station soccer to other available game. 4. To know if the game deviate them from their responsibilities. 1. 5SIGNIFICANCE OF THE STUDY. This research work will be of significance because it will know what the youth in Samaru gratify from playing video games specifically soccer play station and what impact does playing it have on them. The research will be able to show what intension they have when packaging the content and to let us know the regulatory body controlling video game content. Finally the research work will be adding to the academic knowledge. 1. 6SCOPE Video game has been and will continue to be a highly popular form of entertainment for the last 30years. They encourage player to become part of the games, sport games like soccer, wrestling motor and bike racing etc. These games consoles have different models e. g Play Station 1, Play Station 2, Play Station 3 and the newly xBox. Therefore this study will focus on the use and gratification of video games specifically soccer play station as regards to the joy they derive craving immorality and how the usage has increase socialization among youths in Samaru. 1. 7LIMITATION The research will have much limitation which will be made know at the end of the research work. 1. 8JUSTIFICATION OF THE STUDY The study is necessary or problematic because it is important for the community and the youth at large to know the effect of video games on their ward and to know how far they can follow the laid down rules given by the gaming regulatory bodies on the type of game that their ward can be exposed to. 1. 9DEFINITION OF TERMS Video Game: The term video game generally refers to interactive entertainment programs that are projected onto television-type screens, either by coin-operated arcade games or dedicated game-playing computers called video-game consoles. Electronic Games: Electronic Games, interactive hardware or software played for entertainment, challenge, or educational purposes. Emotions: Signifies a reaction involving certain physiological changes, such as an accelerated or retarded pulse rate, the diminished or increased activities of certain glands, or a change in body temperature, which stimulate the individual, or some component part of his or her body, to further activity. Gratification: The highest stage of Satisfaction, fulfillment, indulgence, enjoyment, pleasure, delight REFERENCE Asika (2002) Research Methodology in Behavioral Science. Ikeja Logoji Longman Nig Plc. American Medical Association. (2007). Report of the Council on Science and Public Health. (CSAPH Report 12-A-07). Retrieved from www. ama-assn. org/ama1/pub/upload/mm/467/csaph12a07. doc Rauh, S. (2006). Video Game Addiction No Fun. Retrieved from http://www. webmd. com/mental-health/features/video-game-addiction-no-fun Bushman, B. Anderson, C. (2002) Violent Video Games and Hostile Expectations: Test of the General Aggression Model. Personality and Social Psychology Bulletin, 28, 1979-1986. Braun C. and Giroux, J. (1989), Arcade video Games: Proxemic, Cognitive and content Analysis, Journal of Leisure Research, 21 92. Dill, K. E. , Dill, J. C. Video game violence: a review of the empirical literature Aggressive and Violent Behaviour, 3. 407 428 Microsoft  ® Encarta  ® 2009.  © 1993-2008 Microsoft Corporation. All rights reserved. Gentile, D. A. Anderson, C. A. (2003), Violent Video Games: The newest media violence hazard. In D. A. Gentile (Ed), Media Violence and Children. Westport, CT: Praeger Publishing.