Wednesday, August 26, 2020

Economic Conservation vs. Environmental Conservation Essay -- Economic

Monetary Conservation versus Natural Conservation Around the globe individuals are being influenced by preservation and imperiled species laws and guidelines. Some need the greatest house on the most delightful land and have the cash to get it, while others feel that we have sufficiently grown and there must be more land left to nature. I feel that while imperiled species ought to be secured, their assurance ought not change the way that nearby individuals work, and communicate with each other. This has provoked a clash of financial development versus ecological preservation that can be discovered both locally, for example, in Duxbury, Massachusetts, and overall, for example, the southern sloping area of Vietnam. Duxbury is a humble community on the south shore of Massachusetts situated on the coast among Boston and Cape Cod. The town’s boundary sea shore is a long flimsy landmass spreading over the whole length of the town’s coast. It is known as a boundary sea shore since it acts basically as a hindrance between the terrain coasts and the bigger sea waves. Access to the boundary sea shore, through the town, is constrained to a solitary wooden extension. Once over the extension, there is a stroll on sea shore, and a sandy street that gives access to the remainder of the promontory. Along the street there are various drive-on sea shores, which give over-sand access to four wheel drive vehicles, and toward the finish of the promontory are two little gatherings of homes called Gurnet and Saquish. Occasional sea shore grants, which are fundamental for anybody to roll over the scaffold, are offered to the two inhabitants and non occupants and these assets are utilized to keep up the ever-evolving sea shore. As indicated by the Town of Duxbury site, licenses for the 2003 season ran somewhere in the range of $45 and $110 for re... ... will live on. Works Cited Best of Boston 2003. (2003, July). Boston Magazine Fawthrop, T. (1996) Vietnam-Environment: Forest destroyers turned guardian angels. Worldwide Information Network. Recovered September 20, 2003 from factavia database. Hainer, R. (2003, August 21). In sea shore get to discuss, concom follows center of street course. [Electronic version]. The Duxbury Clipper. Recovered September 10, 2003 from, http://www.eduxbury.com/article_541.shtml Katz, D. (2003) Balance in the Bay Series: The battle, flight, and predicament of the plover, Pit falls of a refueling break. [Electronic version]. The Duxbury Clipper. Recovered September 21, 2003, from http://www.eduxbury.com/article_507.shtml2003 Massachusetts. Town of Duxbury. 2003 Beach Permits. Recovered September 21,2003 from, http://www.town.duxbury.ma.us/Public_Documents/DuxburyMA_BTPermits/file

Saturday, August 22, 2020

Racial profiling Coursework Example | Topics and Well Written Essays - 500 words

Racial profiling - Coursework Example To be sure, it has been progressively normal considering the apparent dangers to the populace by Islamic psychological militants. In this manner, in planes, Islamic-looking people are exposed to reviews and meetings of a power that white individuals are not ordinarily exposed to. The expanding quantities of wrongdoing, and the relationship by individuals that these violations radiate from race-based networks, for example, Hispanic people group, are likewise liable for the developing pattern towards racial profiling. While racial profiling is never truly enacted as an arrangement in its unequivocal sense, the ever-extending scope of techniques that a law implementation official are permitted to utilize permit the utilization of racial profiling as an authentic system. We currently continue to examining the expenses against the advantages of racial profiling. The individuals who bolster racial profiling accept that an utilitarian methodology must be taken. The contention is that since the facts confirm that there are violations which certain racial gatherings are more inclined to carrying out than other racial gatherings, â€Å"special endeavors at wrongdoing decrease coordinated at individuals from such gatherings are legitimized, if not required.† (Risse and Zeckhauser, 2004). This essentially implies lawfulness is a more significant thought than improving racial relations or battling racial disparity. Since wrongdoing has such malignant consequences for society, so the contention goes, the request for the day is to end it. Conversely, the individuals who are against racial profiling debate the position that a few races have a more prominent inclination to carry out certain violations than others. In reality, in an investigation led, the officers’ conduct of racial profiling isn't bolstered by any indicating that the criminal demonstrations in the prevalently white network were perpetrated by African Americans (Meehan and Ponder, 2002). Obviously, the more profound issue with racial

Tuesday, August 11, 2020

How Long Does Marinol Stay in Your System

How Long Does Marinol Stay in Your System Addiction Drug Use Prescription Medications Print How Long Does Marinol (Dronabinol) Stay in Your System? Be aware of side effects and interactions when taking Marinol By Buddy T facebook twitter Buddy T is an anonymous writer and founding member of the Online Al-Anon Outreach Committee with decades of experience writing about alcoholism. Learn about our editorial policy Buddy T Medically reviewed by Medically reviewed by Steven Gans, MD on December 15, 2016 Steven Gans, MD is board-certified in psychiatry and is an active supervisor, teacher, and mentor at Massachusetts General Hospital. Learn about our Medical Review Board Steven Gans, MD Updated on February 03, 2020 BURGER/PHANIE/Canopy/Getty Images   More in Addiction Drug Use Prescription Medications Cocaine Heroin Marijuana Meth Ecstasy/MDMA Hallucinogens Opioids Alcohol Use Addictive Behaviors Nicotine Use Coping and Recovery Marinol (dronabinol) is a pill containing synthetic THC, a class of medications called cannabinoids. It is used to treat nausea and vomiting caused by chemotherapy.?? Marinol is also prescribed to treat loss of appetite and weight loss in people who have AIDS. Understanding how it is active in your body and how long it stays in your system can help you avoid interactions and know what side effects may be expected. How Marinol Works in Your System Marinol works by affecting the area of the brain that controls nausea, vomiting, and appetite. When taking Marinol you will also experience the effects of THC on mood, memory, and the senses as you would with medical marijuana. But in a capsule form, there is no need for it to be smoked. As a prescription drug, Marinol has a standard dosage and concentration. Your doctor will prescribe when and how often to take the capsules, timing it for the best benefit around chemotherapy sessions, for example, or at certain times of day for appetite stimulation. Marinol takes 30 minutes to 2 hours to take effect. The mental, mood and physical effects last for 4 to 6 hours, while appetite stimulation can last for 24 hours.?? Side effects of Marinol include feeling high, confusion, memory loss, anxiety, sleepiness, strange thoughts, hallucinations, unsteady walking, dizziness, nausea, vomiting. Discuss any of these side effects with your doctor as it may be necessary to change your dosage. You should not operate a motor vehicle or machinery under the effects of Marinol. You could be cited for DUI even if you have a prescription.?? Side Effects, Interactions, and Overdose Discuss all of the medications, vitamins, and supplements you take with your doctor as it may be necessary to change your prescriptions due to possible interactions with Marinol. If you start or stop any medication, alert your doctor so adjustments can be made to reduce the risk of side effects. Do not drink alcohol while taking Marinol. There can be possibly dangerous interactions with alcohol and drugs such as Valium, Librium, Xanax, Seconal, and Nembutal (benzodiazepines and barbiturates) that affect the central nervous system.?? You also should not smoke marijuana while taking Marinol as that will deliver more THC and could produce an overdose. Factors That Influence THC Side Effects Possible drug interactions can be seen with medications for anxiety, asthma, colds, inflammatory bowel disease, motion sickness, Parkinsons disease, seizures, ulcers, or urinary problems, as well as amphetamines, barbiturates, muscle relaxants, sedatives, and sleeping pills.?? Marinol should be taken only as directed. To avoid possible unpleasant side-effects and possible overdose  do  not take a larger dose, take it more often, or take it for a longer period of time than prescribed by your healthcare provider. Some side effects of an overdose of Marinol include: DrowsinessInappropriate happinessSharper senses than usualChanged awareness of timeRed eyesFast heartbeatMemory problemsFeeling that you are outside of your bodyMood changesDifficulty urinatingConstipationDecreased coordinationExtreme tirednessDifficulty speaking clearlyDizziness  or  fainting  when standing up too fast Potentially dangerous side effects are seizures and a fast, pounding heartbeat. If those occur, call your doctor immediately. How Long Marinol Remains in Your System The synthetic THC in Marinol is absorbed by your body similarly to the THC naturally occurring in marijuana. It is also stored, broken down, and excreted the same. Marinol is broken down and excreted in the urine for two days to 5 weeks. During this time period, it will be detected in urine drug screens. Some of the THC in Marinol is stored unchanged in fat cells in the body. When it is released from fat into the body, it can again exert its psychoactive properties, as well as be metabolized and be excreted in the urine. The half-life of fat-stored THC is about 10 to 13 days. THC can also be stored in hair follicles, where it may be detected for up to 90 days.?? How long the THC from Marinol persists in your body depends on your metabolism, body mass, age, hydration level, physical activity, health conditions and other factors, including how long you have been taking the medication. If you have to take a drug screen for employment or other reasons, be sure to disclose you are taking a prescription for Marinol so this can be taken into account. How Long Do Drugs Stay In Your System

Saturday, May 23, 2020

Advertising Sex Sells Essay examples - 1365 Words

Advertising is a billion dollar market with a sole purpose to persuade the consumer to purchase some type of product or service. Companies use many different methods to convince the public to spend money on their products with most of their advertising focused around the idea of â€Å"sex sells†. This idea promotes a hunger in the consumer for gaining personal pleasure or acceptance of sexuality by the eye catching effects of publicly baring flesh. These ideas are promoted through TV commercials, billboards, magazines, radio ads, or any type of media targeted at the mass majority of people. Every where a person looks there seems to be some type of advertising based on sex. The illusion of making one feel they want, need, or cant live without†¦show more content†¦An average person would look at this and attach the idea of sex appeal and the view of being complete to a Nissan Altima. The Marxists would claim that this is just a fantasy that the corporate economy uses to sell goods and services. This type of advertising works because people are no longer seeing sex only as a way of reproduction, but as a way of acquiring pleasure. Another ad that sticks out is the Calvin Klein ad for perfume which has a lady wrapped in what looks like a sheet that is barley covering her breast leaving one to only imagine them selves creating this same image by buying the product. From a Marxist view the argument would be that corporations are only using sex for one thing and that is to create a desire in the consumer to buy products. They feel that the consumers, â€Å"style, grooming, or body piercing can communicate who we are or how we want others to think of us† (Seidman 17) so why not use this to their advantage to create an ideal self that people will buy. In many of the ads in this magazine there is an idea of creating attractiveness, desire, love, and a sense social acceptance that can be brought. One would argue that there is no way to buy perfect ion, but the way advertising is done it makes it hard to believe. As in most advertising this issue of Essence magazine only appears to be focused on women in sexual acts or positions to sell goods creating a concern of what is really being sold. When looking at aShow MoreRelatedAdvertising: Sex Sells Essay example1765 Words   |  8 Pagesmagazine? I would like to look like her. What do you say to your self when you see the product? Will this product help me look like her? Magazines play a part in creating the image of sex sells. Advertisers use an image to create an advertisement to sell a product. The Purpose of advertising is not to sell sex, but to attract the consumer. Their talent is the ability to transform seemingly neutral object to create a desirable product. It’s no wonder that we are so obsessed with our bodies andRead MoreEssay on Sex Sells in Advertising768 Words   |  4 PagesA Great Moment In Creativity In 2010 Diesel released their spring campaign tagged, â€Å"Sex Sells, Unfortunately We Sell Jeans.† This was a follow up on their â€Å"Be Stupid† campaign, which helped re-establish the brand amongst consumers. The brands image was able to portray a sexy idea while still having enough humour to be appreciated by a large audience. Although the idea of using sex appeal in advertising is not new, Diesel ran into trouble with this campaign as a large number of the public statedRead MoreWhat Makes Sex For Advertising So Appealing?1674 Words   |  7 Pages Sex is a very controversial subject that normally attracts a lot of attention, which forces it be extremely exploitable for attention craved advertisement creators. Sex can be defined as ways to gain consumers attention (Belch Belch 2007). What makes sex in advertising so special? Why is sex so appealing to consumers? Sexual appeal can be characterized as an emotional trigger. Sex can be construed as the soul of advert ising. (Brayan 2003) There are various emotions that an advertiser can utilizeRead MoreAdvertising Analysis : Tipalet Advertising1121 Words   |  5 PagesTipalet Advertising Tipalet was a company from the late 1960s known for its Tipalet cigarette and its provocative advertising. The company ran several advertisements focusing on a man and a woman smoking. Their most known advertisement was a magazine full-page ad featuring a man looking into a woman’s eyes and blowing smoke at her. The advert shows both young adults in a healthy state with the woman leaning in closer to the man’s exhaled smoke. Towards the bottom of the page, surely not coving theRead More Media Advertising and Sex Essay1210 Words   |  5 PagesAdvertisements are everywhere, combining images and words together to create a message to sell a product. The initial impression is that the advertisers are just trying to sell their products, but there often seems to be an underlying message. It is often heard that â€Å"sex sells.† So, many advertisers will use beautiful women and men in their advertisements to try to market a product. The hope is that â€Å"sex will sell,† and people will go out and buy what the ads are selling. There are many advertisementsRead MoreThe Problem About Using Sex in Advertisements Essay1269 Words   |  6 PagesAdvertising is an important form of communication between products and customers. How to get viewers’ attention is first thing need to consider for advertising. Sexual appeal is become very useful tool in advertising, and it use is increasing. The sex appeal has a very long history, the first sex appeal advertising was introduced in 1911 by Woodbury’s Facial Soap (Campaign,2014). Once this advertising is released it has caused an enormous controversy, it is considered so risquà © and inappropriateRead MoreSex in Advertising1358 Words   |  6 PagesSex in Advertising I chose sex in advertising for my research topic because I do not know about it well, even though a lot of sexual images and texts in advertisements. When I was a little kid, I often surprised by ads with sexy woman. Even now, I sometimes have my eyes glued to such kinds of advertising. I wonder that there are some physiological reasons why people pay attention to sex images. Also, learning about sex in advertising is useful for my career because I want to work for an advertisingRead MoreDoes Sex Sell?986 Words   |  4 PagesMandaluyong, Benhur Abalos and Valenzuela mayor, Sherwin Gatchalian (Naredo Pedrasa, 2011). Many were offended by how many innocent children can perceive those titillating images. These scantily clad models that are in the billboards are made to sell and appeal for our sexuality to our human instincts. Sexuality is both an attribute and constitutive (Cenzon, 2008). According to Thomas Hobbes (n.d.), â€Å"Man is a collection of base, animal urges. To act on them and experience sinful pleasures wouldRead MoreSex Should Not Sell865 Words   |  4 PagesSex should not sell Do not ever underestimate the persuasive influential power, of gorgeous women with more cleavage, or the power of a gentleman with a muscular body, to increase the consumer’s consumption. Tom Reichert in his book â€Å"The Erotic History of Advertising† emphasizes the idea that sometimes this frequent use of the sex sells technique increases some consumer interest and builds a strong brand identity (Reichert). In fact, Sex was used to advertisements since the 1900’s when theRead MoreNegative Effects of Sex in Advertising1151 Words   |  5 Pagescommercials that you see everyday? They simply use sex. Sex in advertising can be defined as the use of any type of sexual imagery to draw the interest of the consumer to buying a particular product or service. The use of sex in advertising as mentioned earlier is said to have boasted a lot company’s revenues, but it also has its negative side which has caused a lot of problems in societies around the world. The idea of using sex in advertising is a very smart way that advertisers use to gain attention

Tuesday, May 12, 2020

Development of moral reasoning and self-control from birth through adolescence Free Essay Example, 1000 words

Stage 2: Personal Reward Orientation Personal reward orientation stage or also known as the instrumental stage determines right or wrong through deeds and not punishment. People at this stage believe in the lines of â€Å"scratch my back I scratch yours. † People at this stage value others in terms of utility and their actions that satisfy their needs will determine a wrong or a right. Justice at this stage is two way, you do me I do you or simply â€Å"do unto others what shall be done unto you. † Individuals at this stage only do what is necessary to satisfy their own desires. Level Two Stage 3: Interpersonal Conformity This level involves an individual trying to be significant to others and to accept the rules of one’s group. Societal laws and the expectations of the society are key considerations at this stage while trying to solve a moral dilemma because an individual wants to be good to his or her people. This level affects individuals’ up to middle age and has two stages namely interpersonal conformity also known as good boy good girl orientation and the law and order conformity. We will write a custom essay sample on Development of moral reasoning and self-control from birth through adolescence or any topic specifically for you Only $17.96 $11.86/pageorder now The first stage an individual tries to conform to the stereotype behaviors of his peers and group members and good behavior is that which helps people within the group or the group approves. Individuals act in a way to please authority figures and people of a higher caliber than they do. Forgiveness at this stage is the most preferable to revenge and failure to punish is unfair because it will motivate the other individuals also to mess with impunity. Individuals at this stage try to obey their peers and show respect to their group leaders. An individual earns approval by being nice and such titles as good boy or good girl are common too refer to those whose behavior is acceptable. An individual tries to be nice to others to be seen as good. This statement however has seen Kohlberg receive criticism because of its bias against women (Eysenck, 2004) Stage 4: Law and Order Conformity The second stage of this level individuals look unto the whole society for guidelines and rules pertaining what is right or wrong. Anything that is punishable by the society, whether right or wrong is generally wrong to individuals at this stage. Individuals at this stage view the societal rules and regulations as very inflexible and they do not recognize that as the society’s needs grow the rules should change as well. Justice is when a person who has done the society wrong receives some punishment. Laws are the pivotal point at this stage and therefore members try to be good to others while at the same time obeying the laws.

Wednesday, May 6, 2020

Coach Carter Free Essays

Abydos Passion Play is mainly considered to be the first play to ever be performed and depicted as a religious ritual or event. Zen Buddism is one for most common and well-known Japanese Dada. It is the kung fu monks. We will write a custom essay sample on Coach Carter or any similar topic only for you Order Now How to read a Play according to Aristotle you must have six parts in order to read a play. Character, plot, thought, music, diction and spectacle. Blindness as it is depicted in Oedipus Rex, signifies the ignorance a character possesses (Oedipus was blind to the clues of his birth). The Noh Play Production is an interesting Japanese production that contains only male actors, and revolves around Zen Buddism. The Noah play is very simplistic in terms of the design, usually with prayer and front-center stage. It also involves musical structure. Character * Physical * Socio-economical * Psychological * Moral/Ethical Noah and his sons is a play with major dramatic structure. It was written in the middle ages, depicting the Great Food. Noah is the main character of the play. In my opinion the major question in this play is, will Noah fulfill God’s orders on a consistent basis? He argued and fought with his wife at all times, they could never be on one accord, and have more good days then bad days in terms of their marriage. His physical appearance in this play was around his 50s and 60s in terms of age. He is introduced in the play to be considered as an old, still aging 600 and some years old. He has a wife and has children. The socio-economical of this play Noah and his sons is that they were believers in Christ but really never obeyed God especially Noah he was very stubborn and never listened to anyone. The Psychological perspective of this play is that Noah mentally disobeyed God in all of his ways in orders. He also threaten to beat his wife, then as they play goes on he and his wife agree stop fighting and become together as one. The moral/ethical perspective of this play is God. It’s simple to respect God and his orders. The flood only happened because the flood and the only way they were saved are because of the Arc. Personally if I was them I would always listen to God, because disobedience to God could lead to consequences. How to cite Coach Carter, Papers Coach Carter Free Essays Questions for Movie Coach Carter Spring 2011 1. In the first scene of the movie the team members were arguing and even fighting in the locker room. One member identified himself to the news media that he was the â€Å"star player†. We will write a custom essay sample on Coach Carter or any similar topic only for you Order Now As Coach Carter identified in the movie, they had only won 4 games. By the last scene of the movie, the team went to the championship games. What do you think made the difference in the team’s ability to become winners? 2. In a scene of the movie, Coach Carter made two of the best players leave for failing to follow his instructions, knowing that this would hurt the team’s possibility to win games. One player even pointed out that they were the highest scoring players. Coach Carter’s response was, â€Å"I guess we will have two more high scoring players. † What do you think was Coach Carter’s rationale behind his decision? 3. What was the significance of the contract Coach Carter had the team members sign? Why did the contract include the team members having to wear a tie on game day? Why did they have to maintain a 2. 3 grade point average to play? 4. What did Coach Carter mean when he told the team, â€Å"The losing stops now. Winning here means winning out there. † 5. At the beginning of the movie, Coach Carter asked the question, â€Å"What is your biggest fear? † this same question was asked by him several times throughout the movie. After the team was benched, a player stood up and gave his definition of fear (see below). Describe in your own words the significance of this summation and how it relates to living life. How does this relate to our studies of Juvenile Delinquency? 6. Upon review of the various theories we have studied over the past several classes, which delinquency theory (s) can you identify from scenes in this movie? Briefly describe those theories you observed. How to cite Coach Carter, Essay examples

Saturday, May 2, 2020

Attacks Taxonomy On Bring Your Own Devices -Myassignmenthelp.Com

Question: Discuss About The Attacks Taxonomy On Bring Your Own Devices? Answer: Introducation Aztek has a large network of employees, customers, partners, vendors and stakeholders. The primary goal of the organization is to enhance its customer base by providing better, accurate and secure financial services along with the enhancements of revenues. BYOD will allow the use of employee-owned devices which will lead to better productivity of the employees and will assist in the achievement of the goals. The project is feasible from the organizational point of view. The operations that will be carried out by the employees will be tracked and monitored using remote tracking and management. The employees will also be able to access the organizational tools and applications from their homes and outside of office premises to gain hands-on on the applications. This will lead to lesser occurrence of operational mistakes. The BYOD scheme will therefore be feasible from the operational point of view. Technical tools and applications that are being used by the organization are compatible with most of the recent and widely used operating systems. These tools will be easily integrated with the devices of the employees. Also, the security department will install the necessary technical controls and applications for enhancing the security of the device. The project is feasible from the technical point of view. There are no laws or regulations created by the Australian Government regarding the prevention of employee-owned devices in the offices. There are specific rules to financial industry that will be adhered during the project along with information privacy laws. The project is feasible from the political point of view as well. There are many risks that have been identified from the security aspect in association with the BYOD scheme. These risks may emerge as the potential disadvantages for the project. However, it is possible to put a check on these risks and avoid them by using correct set of methods, plans, policies and controls. There will be many advantages that will be offered with the implementation of BYOD in the organization. The first advantage would be in the form of reduced costs. The costs associated with the procurement of the devices, maintenance of the devices, infrastructural and operations costs will be reduced. The employees will be allowed to access most of the organizational tools and applications from any of the remote location which would enhance their operational excellence leading to better productivity and efficiency levels. The customers will also be satisfied as their demands will be met and the quality of services will also improve. This would lead to better revenues and market shares as well. Financial Services Review Aztek has decided to allow the employees to bring their personal devices at the workplace for the execution of professional tasks and activities. The company is based out of Australia and the country does not have any specific laws in place for the governance and surveillance of the employees making use of any form of application or service outsourcing. However, the specific business domains do have certain rules and regulations defined. The business domain and functional area for Aztek is finance. There are two primary jurisdiction areas in Australia that is, New South Wales and Australian Capital Territory. The use and application of the electronic communication and networking varies in these areas which shall be followed by Aztek as per the service territory. Australian Securities and Investment Commission (ASIC) is a government body that regulates all the financial transactions and services at the federal, state and territory levels. There are laws that have been set up under this body for the regulation of electronic payments under the e-payments code and for the financial access control and management as well. These laws and guidelines shall be followed (Asic, 2017). BYOD scheme would allow the employees to make use of their devices for the organizational activities outside of the office premises as well. NSW is an Act that has been defined for the surveillance of the employee activities and processes beyond the office premises. The communication and operational activities will be tracked on the employee device under this act and there would be restriction on the sharing of information with the resources outside of the office or a particular project. Aztek may also make use of overt surveillance which would involve automated software for the purpose of tracking. In this case, the employees must be told about the same 14 days prior to the conduction process. The employees may also exchange emails and messages using their devices which may include financial information and details. Workplace Privacy Act 2011 has been defined by the Australian government for the email surveillance and tracking. The data that will be exchanged by the employees on their mail servers will be monitored by Aztek as per the rules of this act (Act, 2016). Telecommunications Act 1979 has also been defined by the Australian Government to cover the permissions that are associated with communication interception. It has been established to ensure the integrity of the communications so that any of the unknown communications do not take place. This act only covers the content tracking and does not include the tracking of email address or metadata (Coe, 2011). The financial information that will be processed and managed by the devices of the employees under the BYOD scheme would also be required to abide by the rules under Intellectual Property and information privacy. The privacy and security of the information will be maintained under these laws and regulations. Privacy Act (APP 5) has also been defined for the maintenance and management of the information privacy. The devices of the employees must not store or process the personal information of other employees or the customers of Aztek. The access rules and the user privileges shall also be defined for the purpose of information access. In case of a data breach, the employees must be aware of the process that they must follow for reporting the matter to the senior management (Oaic, 2014). Security Posture of Aztek There are a number of security postures and policies that must be considered and modified in association with Aztek with the introduction of BYOD scheme. It would include the current state of security in the organization, use of mobile devices currently in use along with the future use of the devices, geographical strategies that shall be followed for the deployment of the project. The finance industries that are present in a particular country need to abide by certain rules and regulations at the federal and state level along with the territory and industry level. Such financial constraints and necessities have been discussed in the section above. In case of Aztek, another area of concern that shall be monitored and handled is the security of the devices, information and networks. There are certain weaknesses in the current security state of Aztek which are included as follows: There are numerous obsolete devices and security mechanisms that are being used in the organization. For instance, there are many of the computer systems and gadgets that are in use which are more than 5 years old. Some of these systems cannot be updated as per the latest technological concepts and security frameworks. These systems and components shall be removed and replaced by the newer systems. The use of identity and access control is Aztek is still restricted to the magnetic card readers and identification. There are newer forms of controls that can be used for this purpose, such as biometric recognition. There is an excessive use of in-house storage and management of the information that is associated with the organization. The file servers and database servers are also located in-house which makes it a single point of failure. In case the attacker succeeds in gaining access to these locations, then the security breach would be huge. The legacy systems that are being used by Aztek are also technically not sound and need a lot many updates to be done. The security loopholes that have been identified above will require a lot of investment to be done to make sure that the security infrastructure is improved. With the use of the BYOD scheme, there will be many devices that will be brought by the employees in the organization and the need to procure additional set of devices will not be required. However, this scheme will have its own security risks and concerns. Securing Devices and Information In the organizations that have a single vendor or manufacturer of the devices, it is easy to control the security status through unified management. There is a single set of security control and checks that need to be implemented to attain overall security of the devices. However, in the case of outsourcing, the security policies and plans that are required to be followed are different. The employees in this case will bring their own devices to the organization which will have different security framework, different operating systems, different data and information capabilities etc. There is no uniform security scheme that can be designed and implemented so that the overall security of all the devices is ensured. The device portfolio will also expand with the BYOD scheme with the inclusion of Smartphones, laptops, tablets etc. from different sources. The current security policy will therefore require many updates to be done and installed (Curran, Maynes and Harkin, 2015). The approach such as locking down of the devices outside of the company networks would not work as the devices are personally owned by the employees and the practice would discourage them to adapt to the BYOD scheme. A flexible approach which is also secure would be required for the management of the risks. The use of access control on the official applications that include critical and sensitive information can be done outside of the office network (Gillies, 2016). There are many risks that are associated with the device itself. For instance, the device of the employee may get lost or may get stolen by an entity that may get access to the organizational information if the device would be connected to the VPN. The confidential information would then get exposed to such unauthorized entities and for this device tracking and security would be of utmost importance. There may also be ownership issues that may crop up. The employees will be the owners of their devices and would like to have a complete ownership on their data and information. They may attempt to jailbreak the devices which may have an extremely negative impact on the device security. The terms and conditions under the BYOD scheme shall therefore be clearly explained to the employees before they agree to bring their devices at the workplace (Tokuyoshi, 2013). There are also certain basic mechanisms that can be used for the protection of the devices and the information present in these devices. The security team must investigate the devices to highlight the alignment with the security policies of Aztek. Mobile device management must be carried out by the team of the auditors and reviewers. Device encryption, remote wiping and the use of PIN codes shall be done for device and information security. The use of certified software and critical information sets must be restricted on the office networks only (Beckett, 2014). Addressing the Application specific Risks With the use of BYOD scheme, there can be two categories of application specific risks that may be observed. These risks include the malware attacks through the applications that are installed which would demand the highest level of malware protection. There may also be exploitation of the security vulnerabilities present in the application which may lead to the compromise of the security of sensitive and confidential information. Enhanced application management will be necessary for this purpose so that such risks are avoided and controlled (Romer, 2014). There shall also be upgrades and security updates that must be installed in the devices and for the applications that are present in the devices to make sure that the security risks specific to device version or application version are avoided. Risk Assessment The Cybersecurity framework that is followed in this case is based upon the flexible and high performance mechanisms that can be used for the enhancement of the security posture in an organization. The core of the framework includes the definitions for the functions along with the categories and sub-categories along with the references that come under the security checklist. The set of functions comprise of the risk identification, asset protection, incident identification, planning of the responses along with the recovery of the data. There are different categories that are used including asset management and control, access management and control, detection and prevention systems. The information security mechanisms against the security risks that are defined have been done for the information in transition along with the information at rest. There are different tiers to security that Aztek must follow and consider and it must be ensured that the security state must move towards the highest tier. Tier 1 is the state in which there is a partial protection of the organizational assets and the processes are defined but not formalized in association with security. Tier 2 is the state in which the risks have been identified and a formal procedure for the management of the risks has also been created. Tier 3 is the state in which the management approves of the protection and security measures that must be used. There is a use of consistent methods in this case. Tier 4 is the state that includes adaptive risk management to make sure that the organization is efficient to handle the changing threat landscape. In case of Aztek, the BYOD scheme will bring with it a lot many new challenges and issues. The employees of an organization may also change and there may be new devices that may be added in the set of devices to be managed by the organization. There will be a continuous change in the threat landscape and therefore, the risk assessment process that is followed in this case shall be in tier-4 (Singh et al., 2014). TVA Analysis An analysis of the threats and vulnerabilities has been done in association with the BYOD scheme and the results have been summarized in the table below. Risk Name Risk Impact (1 to 5 with 5 being highest) Risk Probability (1 to 5 with 5 being highest) Risk Rank (Impact x Probability) Suggested Response Strategy Information Breach 5 4 20 Risk avoidance Information Leakage 4 4 16 Risk avoidance Information Loss 4 4 16 Risk avoidance Lost/Stolen Devices 5 2 10 Risk mitigation Insider Threats 5 4 20 Risk transfer Man in the Middle Attacks 3 3 9 Risk avoidance Spoofing Attacks 4 3 12 Risk avoidance Application and System Vulnerabilities 3 4 12 Risk avoidance Hacking of the APIs 3 3 9 Risk mitigation Denial of Service Attacks 4 3 12 Risk avoidance Malware Attacks 3 5 15 Risk avoidance Phishing Attacks 4 3 12 Risk mitigation Eavesdropping Attacks 3 4 12 Risk avoidance Social Engineering Attacks 5 4 20 Risk mitigation Table 1: Risk Register Countermeasures Security Programs There are several countermeasures and security programmes used to make sure that the risks that have been assessed above are handled carefully. Aztek must define the scope, objectives and the set of goals in association with outsourcing the use of BYOD scheme. These definitions must be based upon the security aspect and must consider the use of devices in the office premises along with the outside networks as well. The next step shall include the prioritization of the risk handling and the implementation of the treatment strategies. These shall include the treatment of the risks with higher impacts in the first phase followed by the treatment of the risks that may have a low probability and impact (Kumar and Singh, 2015). There would also be risks that may have an impact on the specific information sets and categories. The risks that may have an impact on the sensitive and critical data sets must be identified and the mapping response strategies shall be created. These risks shall be handled at the top priority. Once the initial round of planning and analysis is completed, there shall be mapping on the type of the countermeasure that shall be applied. For example, there are certain risks that can be controlled and avoided by using administrative checks only while there are a few risks that may demand a technical tool and application for the avoidance and management of the risk (Stoecklin et al., 2016). There are several countermeasures that have been developed which can be applied in order to overcome, avoid, prevent, detect and control the security risks that are associated with the decision of Aztek to provide the employees with the permission to bring their devices at work. These controls and countermeasures are as described below: Preventive Controls: These are the control measures that shall make sure that the occurrence of security risks does not take place by using mechanisms like advanced access control and authentication. Also, the setting up of firewalls and proxy servers would come under this category. These controls form the basic approach towards the maintenance and management of security. Detective Controls: There may be cases when the preventive controls may fail and the malevolent entities may succeed in violating the access or basic security measures. In such cases, these controls shall be applied which shall highlight the activities of the attackers by making use of integrity checks, security logs and audits along with intrusion detection tools. Corrective Controls: There are advanced methods that are used by the attackers to give shape to the security attacks. They may succeed in passing through the preventive and detective controls. The corrective controls are the ones that shall be used for the control and minimization of the damage. The use of encryption is one of the examples of such controls which would protect the information even if it gets exposed to the attackers (Blizzard, 2015). Deterrent Controls: The attackers must be made aware of the readiness of the organization to deal with the security risks and attacks. These controls are the measures that send across this message by using advanced network monitoring and maintenance of the network and security logs. Recovery Controls: There are security controls that have been set up with the purpose of disaster recovery. These controls are similar to the corrective controls but are applied in more significant damages and impacts. There are various attempts that the organization must make so that the continuity of the business operations is maintained and the backup of the data is also created and updated at the regular intervals. Compensating Controls: There may be cases when the required security control may take time to be developed and implemented. In such cases, the security of the application, service, system or device shall be maintained by using an alternative measure, such as use of patches in case of security updates or installations. Data Security Data is one of the biggest assets for Aztek as it is the case with every other organization and there are various measures that may be used and implemented for making sure that the risks associated with the data and information are avoided. Some of these measures include access control, incident recording and resolution, privacy standards, codes of conduct, use of social media, encryption techniques, anti-denial and anti-malware tools etc. These may also include the employee and user awareness along with training sessions on the security practices to be followed. In case of the BYOD scheme, the probability and the types of probable risks increase as there are different access points that may be used for giving shape to the attack. The attack surface would increase along with the attack window. Aztek would be required to make use of end-to-end data protection techniques to make sure that the security risks and attacks are avoided. The mismanagement of the devices that will be owned by the employees may be the biggest contributor in the occurrence of the data security attacks and risks. There must be policies that must be created for data protection in case of employee resignation and transfer. The tools, applications and information present in the device of the employee shall be allowed to be remotely wiped out and a cross examination of the same shall also be carried out. There can be severe implications in terms of financial and legal obligations that may be caused with a weak data security. There are certain measures that must be used to avoid the same. There shall be advanced log maintenance maintained in the organization in terms of the device activity in Aztek and the employee activity on the devices and applications. The company must take up the responsibility of managing the user passwords and PIN codes. In case of default passwords and PIN codes usage, there are various security vulnerabilities that come up. There shall be use of automated password managers along with the alerts on password change at frequent intervals. The use of common passwords like name, DOB etc. shall be avoided. The critical applications associated with Aztek must be installed in the devices owned by the employees but shall be accessible only when the device is connected to the corporate network. The employees must be provided with the training session on the security practices that they must use along with the common security mistakes that take place which shall be avoided. Data Classification Security Analysis There is a lot of data that is managed by Aztek that belongs to different categories and may have different security requirements. The following table defines the data classification and the corresponding security strategies that shall be applied. Type of Data Information included under this classification Damage to the Information Sets in case of security attack Security strategy to be used Highly sensitive data Social security numbers of the employees and customers, PIN codes and passwords to access the bank accounts In case of a security risk or an attack to this type of information, there may be legal or financial obligations that the organization may have to face in terms of legal punishments or financial penalties The highest form of security shall be applied to protect this information. Only the CEO and CIO of the organization shall be allowed to access this data category and there shall be no modifications allowed by any entity (Morrow, 2012). Sensitive and Confidential Internal Data Contract information with the third part vendors, details of the projects taken up by the organization The reputation of the organization in the market may suffer as the customers will not be able to invest their trust in the organization and the competitors may gain advantage of the disclosed information (Yoo, Park and Kim, 2012) The administrative and technical controls must be used to protect this category of information. There shall also be physical controls set up with data access provided only to the CEO, CIO, Data administrator and Security Manager. Private Data Internal organizational charts, communication mechanisms, project methodologies and approaches There may be negative implication in terms of the stakeholder engagement as the internal details of the organization will be revealed in public The administrative and technical controls must be used to protect this category of information. There shall also be physical controls set up with data access provided only to the CEO, CIO, and Data administrator, Security Manager, Security Analyst, Stakeholders and Data Scientists. Public Data Solutions provided by the organization, list of products offered, names of popular clients The data shall be disclosed only as intended by the management of the organization. In case of the early disclosure, there may be negative implications in terms of the competitive advantage to the other entities in the market The information shall be protected by using the security controls and mechanisms and the stakeholders shall be able to view the information with modifications to be applied only by the data administrator. Table 2: Data Classification Security Analysis Conclusion The management and administration at Aztek has decided to implement the Bring Your Own Devices (BYOD) project. BYOD scheme would allow the employees to make use of their devices for the organizational activities outside of the office premises as well. The finance industries that are present in a particular country need to abide by certain rules and regulations at the federal and state level along with the territory and industry level. Such financial constraints and necessities shall be followed by Aztek in the implementation of BYOD, such as adherence to ASIC guidelines, Intellectual Properties laws etc. The device portfolio will also expand with the BYOD scheme with the inclusion of Smartphones, laptops, tablets etc. from different sources. The current security policy followed at Aztek will require many updates to be done and installed. There may be risks to the devices, information in the devices, applications, systems and databases. There shall be upgrades and security updates that must be installed in the devices and for the applications that are present in the devices to make sure that t he security risks specific to device version or application version are avoided. There shall be use and implementation of advanced security plans with controls such as preventive, detective, corrective, deterrent, recovery and compensatory controls. For the protection and safety of data, measures like access control, incident recording and resolution, privacy standards, codes of conduct, use of social media, encryption techniques, anti-denial and anti-malware tools etc. shall be used. These may also include the employee and user awareness along with training sessions on the security practices to be followed. References Act (2016). Workplace Privacy Act 2011. [online] Available at: https://www.legislation.act.gov.au/a/2011-4/current/pdf/2011-4.pdf [Accessed 26 Sep. 2017]. Asic (2017). ASIC Home | ASIC - Australian Securities and Investments Commission. [online] Asic.gov.au. Available at: https://asic.gov.au/ [Accessed 26 Sep. 2017]. Beckett, P. (2014). BYOD popular and problematic. Network Security, 2014(9), pp.7-9. Blizzard, S. (2015). Coming full circle: are there benefits to BYOD?. Computer Fraud Security, 2015(2), pp.18-20. Coe (2011). Telecommunications (Interception and Access) Act 1979. [online] Rm.coe.int. Available at: https://rm.coe.int/1680304330 [Accessed 26 Sep. 2017]. Curran, K., Maynes, V. and Harkin, D. (2015). Mobile device security. International Journal of Information and Computer Security, 7(1), p.1. Gillies, C. (2016). To BYOD or not to BYOD: factors affecting academic acceptance of student mobile devices in the classroom. Research in Learning Technology, 24(1), p.30357. Kumar, R. and Singh, H. (2015). A Proactive Procedure to Mitigate the BYOD Risks on the Security of an Information System. ACM SIGSOFT Software Engineering Notes, 40(1), pp.1-4. Morrow, B. (2012). BYOD security challenges: control and protect your most sensitive data. Network Security, 2012(12), pp.5-8. Oaic (2014). Chapter 5: APP 5 Notification of the collection of personal information| Office of the Australian Information Commissioner - OAIC. [online] Oaic.gov.au. Available at: https://www.oaic.gov.au/agencies-and-organisations/app-guidelines/chapter-5-app-5-notification-of-the-collection-of-personal-information [Accessed 26 Sep. 2017]. Romer, H. (2014). Best practices for BYOD security. Computer Fraud Security, 2014(1), pp.13-15. Singh, M., Sin Siang, S., Ying San, O., Hassain Malim, N. and Mohd Shariff, A. (2014). Security Attacks Taxonomy on Bring Your Own Devices (BYOD) Model. International Journal of Mobile Network Communications Telematics, 4(5), pp.1-17. Stoecklin, M., Singh, K., Koved, L., Hu, X., Chari, S., Rao, J., Cheng, P., Christodorescu, M., Sailer, R. and Schales, D. (2016). Passive security intelligence to analyze the security risks of mobile/BYOD activities. IBM Journal of Research and Development, 60(4), pp.9:1-9:13. Tokuyoshi, B. (2013). The security implications of BYOD. Network Security, 2013(4), pp.12-13. Yoo, S., Park, K. and Kim, J. (2012). Confidential information protection system for mobile devices. Security and Communication Networks, 5(12), pp.1452-1461.

Tuesday, March 24, 2020

Finding Forrester-Persuasive free essay sample

The main character in the movie is a sixteen-year-old boy named Jamal who is from the Bronx in New York. He is a very intelligent young man and a gifted writer. The fact that he goes to a poor school with students who are mostly unsuccessful affects the showmanship of his intelligence. He feels that if he shows how smart he is than he will be made fun of. After taking a test his superb scores gave him the opportunity to get a full ride scholarship to a prestigious prep school called Mailor-Callow where he can continue to play basketball. Throughout his journey he has many literacy sponsors. Some of his main sponsors are his family, his friends, William Forrester, and his English teacher Mr. Crawford. Jamal lives with his mother in an apartment in the Bronx. His mother believes that he is very intelligent and wants him to succeed in school. We will write a custom essay sample on Finding Forrester-Persuasive or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page She knows that his main focus is playing basketball, but she is also aware of his writings that he does. Ever since his father recently left him and his mother, he began writing. He would write in journals every day and he kept them all in his backpack. The only person that knew of these journals was his mother, but even she didn’t know what was written in them. She knew that he was a gifted writer but even his high test scores shocked her. His mom and his brother both wanted him to go to Mailor-Callow because they wanted Jamal to do better things with his life than they had. His family is one of his literacy sponsors because they push him to succeed in school. His father could be considered as his most important literacy sponsor because it wasn’t until he left them that Jamal started writing. Either way, all three of his family members helped him in becoming the writer that he is now. Close friends can have just as much influence on someone as their family can. For Jamal this is also the case. His friends were negative literacy sponsors for Jamal. All they cared about was playing basketball. They didn’t care if they got good grades or did well in school because they didn’t think that they would have a future anyways. Jamal kept his writings from his friends because he knew that they would all judge him. At the school he went to it would have been considered â€Å"uncool† and uncommon to be smart and actually enjoy intellectual activities. One day while Jamal is playing basketball outside of his school in the Bronx he and his friends notice â€Å"the window man†. He lives in a tall building by the court and never comes out of his house, he just watches the boys as they play basketball. Jamal gets dared to break into his house one night. When he is inside of Forrester’s apartment he gets caught. While he is dashing out of the house he drops his backpack that contains all of his writings ever since his father had left them. A few days go by and as Jamal is walking past â€Å"the window man†, who later is found out to be William Forrester, a Pulitzer Award winning author, throws his backpack from the window. When Jamal gets home he opens his bag to find that all of his journal writings were edited and revised by Forrester. That is what begins their relationship as him being one of Jamal’s literacy sponsors. Jamal goes back to his house and leaves more writing for Forrester to revise. Forrester will not let Jamal come inside his house. He keeps everything very secretive about himself and does not want any visitors. As time goes on Forrester finally allows him to come inside. Forrester says that he will continue to help him with his writing as long as he follows some rules, Jamal is not allowed to ask personal questions, he is not allowed to take any of the writing that they do together out of the apartment, and he is not allowed to tell anyone that they have any sort of relationship. From working with Forrester Jamal learns to write from the heart. He is told not to think about writing, just to sit down and let the words flow. When Jamal gets stuck and cannot think of what to write, Forrester gives him something that he wrote once and told him to start copying it. Once Jamal gets the rhythm of typing he can start typing his own ideas (http://www. youtube. com/watch? v=O6O7V2g7H8wamp;feature=related). That tip helps Jamal out immensely and he writes a fabulous paper in which he turns into his teacher Mr. Crawford, who is another one of his literacy sponsors. Mr. Crawford is Jamal’s English teacher at Mailor-Callow. Just like Jamal’s friends he is also a very negative literacy sponsor. Mr. Crawford doesn’t want to see Jamal succeed. He thinks that Jamal is useless to the school except to play basketball and he tries to do everything he possibly can to stop Jamal in succeeding at the school. He thinks that Jamal isn’t writing his own essays because the work that he turns in is of such high quality. When Jamal turns in the paper that he writes at Forrester’s house, Crawford realizes that the title and first paragraph are copied work off of Forrester that Jamal did not cite, meaning that his essay is plagiarized. Crawford brings this to the school board to try to take Jamal’s scholarship away from him. That is a terribly negative literacy sponsor. He goes out of his way to somehow find fault in Jamal’s work. With all of Jamal’s literacy sponsors there comes complications. His family is complicated because they have not gone through the schooling that Jamal has and they do not have the intelligence to help him prosper in his writing, so all that they can do is push him to continue to succeed. Another complication with his family is that the whole reason that Jamal started writing was because of his father’s abandonment. It is horrible that he didn’t start writing until his father left because now his father cannot read what he wrote and help him prosper. He has a complicated relationship with his friends because they don’t understand what is going on. They never knew that he was a good writer and they think that Jamal is leaving them when he goes to Mailor-Callow. His friends don’t realize that he is doing that to better himself and that he doesn’t want to leave them behind, but that he does have a lot of new obligations since he moved to his new school. The most complicated literacy sponsor that Jamal has is Forrester. His relationship with Forrester is complicated because for starters Forrester doesn’t want to leave his house. At first he doesn’t even want to let Jamal in, although he eventually does. So every time Jamal wants to see Forrester he has to go to his apartment, they can never meet anywhere. Another complication with Forrester is that Jamal has to promise to never tell anyone about their relationship. Forrester doesn’t want anyone knowing that Jamal and him see each other or even that Forrester still lives in that apartment. He also doesn’t want Jamal to take any of Jamal’s essays out of his apartment. That causes a huge confliction when Jamal fails to listen and turns in an essay that is partially plagiarized because he didn’t know that Forrester published it. The essay that is plagiarized is the same essay that Crawford turns Jamal into the school board for. Crawford and Jamal have a complicated relationship because Jamal cannot always say the things he wants to say or do what he wants to do because Crawford is his superior and his teacher and Crawford does not like when students talk back or embarrass him in class. During one of his classes Jamal sticks up for himself and he beats Crawford at his own game which gets him kicked out of class (http://www. youtube. com/watch? v=iA4Vj-Q3HX4amp;feature=related). Even with all of the complications that are presented with literacy sponsors it is still very important to have them in life. Without literacy sponsors people cannot prosper to their full potential. Rather the literacy sponsor has the intentions of helping that person or hurting them, they still push them to be the best that they can be. If they are there to help them, they can start teaching them new ways to write and always staying positive about their writing. If the literacy sponsors are negative than they help the person because the writer will want to prove them wrong and succeed regardless of what they may think. All in all, literacy sponsors are a very big and necessary part of everyone’s lives. Works Cited Finding Forrester. Dir. Gus Van Sant. Per. Sean Connery, Rob Brown, and F. Murray Abraham. Colombia Pictures, 2000. Film. Brandt, Deborah. â€Å"Sponsors of Literacy†. College Composition and Communication 49. 2(1998): 165-85. Print.

Friday, March 6, 2020

A. Needle Exchange Controversy Essays - Drug Culture, Prevention

A. Needle Exchange Controversy Essays - Drug Culture, Prevention A. Needle Exchange Controversy Needle Exchange Programs: The Best Solution? [emailprotected] The United States of America has been contending with adverse social and economic effects of the drug abuse, namely of heroin, since the foundation of this country. Our initial attempt to outlaw heroin with the Harrison Narcotic Act of 1914 resulted in the U.S. having the worst heroin problem in the world (Tooley 540). Although the legislative actions regarding heroin hitherto produced ominous results that rarely affected any individuals other than the addict and his or her family, the late twentieth century brings rise to the ever-infringing AIDS epidemic in conjunction with heroin abuse. The distribution of clean needles to intravenous (IV) drug users is being encouraged in an attempt to prevent the transmission of human immunodeficiency virus (HIV) from sharing contaminated needles (Glantz 1077). It is the contention of this paper to advocate the establishment and support of needle exchange programs for intravenous drug users because such programs reduce the spread of HIV and do n ot cause an increase of drug use. This can be justified simply by examining the towering evidence that undoubtedly supports needle exchange programs and the effectiveness of their main objective to prevent the spread of the HIV. Countries around the world have come to realize that prohibiting the availability of clean needles will not prevent IV drug use; it will only prevent safe IV drug use (Glantz 1078). Understanding that IV drug use is an inescapable aspect of almost every modern society, Europeans have been taking advantage of needle exchange programs in Amsterdam since the early 1980's (Fuller 9). Established in 1988, Spain's first needle exchange program has since been joined by 59 additional programs to advocate the use of clean injection equipment (Menoyo 410) in an attempt to slow the spread of HIV. Several needle exchange programs sponsored by religious organizations in Australia have reported no new HIV infections resulting from needle sharing over the past three years (Fuller 9). Public safety groups in the United States are rapidly beginning to accept the effectiveness of needle exchange programs. The 113 needle exchange programs that are currently operating throughout the United States (Bowdy 26) are a result of this acceptance. These programs for the most part are established to support needle exchange more so than needle distribution (Fuller 10). Many needle exchange programs have been initiated by recovering addicts who understand the realities of addiction and the potential harm of needle sharing (Fuller 9). Perhaps addicts feel more comfortable taking advice from some one whom has been there and knows what they are going through. Social interaction between the addict and program is quite simple. Program clients are asked to donate their old injection equipment in exchange for new materials and identification cards issued by some programs, allowing the users to carry their injection equipment anywhere (Loconte 20), reducing the need to share needles. Vo lunteers keep track of old needles collected and sterile ones given out with a coding system that allows participants to remain anonymous (Green 15). Unlike some of their European counterparts, needle exchange programs in the U.S. do not advocate the use of vending machines to dispense hypodermic needles (Fuller 10). American programs understand the grave importance of regular contact between the addict and caring members of society who inform addicts about various avenues of health care and recovery during each visit (Fuller 10). The assistant director of the Adult Clinical AIDS Program at Boston Medical Center, Jon Fuller, feels that this intimate approach by American programs conveys a powerful message to addicts that their lives and well-being are still valued by the community despite their inability to break the cycle of addictive behavior (10). Addicts who can not stay clean or get admitted into a drug treatment program should be encouraged to take the necessary precautions to perform safe injections and not put others at risk as a result of their habit (Glantz 1078). From 1981 to 1997, drug related HIV cases in the United States rose from 1 to 31 percent not including infants and sexual partners infected by the user (Fuller 9). With contaminated needles infecting 33 Americans with HIV daily (Fuller 11), it was only a matter of time before an in-depth analysis

Wednesday, February 19, 2020

Introduction to Organisations and Management Essay - 5

Introduction to Organisations and Management - Essay Example The organization structure and design is essential in an organization as it enables managers to allocate duties and ensure proper utilization of resources. Activities in the organization can be allocated according to function, output, customers, territory, process or cross-functional teams (CliffsNotes, 2011). In a dynamic environment, an organic organization design is preferred as it allows for adjustments as opposed to a mechanistic design which is rigid and ill-equipped to respond to rapid environmental changes. Recent literature has emphasized the use of teamwork in organizations so as to remain competitive and cope with rapid changes. Modern organizations are encountered with new management trends such as; crisis management, use of outside directors, increased use of information technology and need for global management skills (Gitman & McDaniel, 2008). Watson engine components represent traditional organizations which were family owned and bureaucratic in nature. The organizati on thus faces frequent problems of staff turnover and absenteeism due to boredom, lack of morale, non involvement in decision making and lack of a chance for career development. The jobs are highly specialized and employees are not allowed to move from their work stations. Team work is not encouraged and poor communication between staff and the management and between various departments makes it hard for the company to accomplish its goals. H & M consulting on the other hand represents modern organizations which have taken advantage of globalization to establish branches all over the world hence complexity in organization and management. It has also taken advantage of teamwork to ensure success. A learning culture is encouraged to ensure team members personal development as well as organizational development. The organization through its mission and values has established an organization culture where customers and employees are given priority for organization success. Contrary to c ommon belief that large organizations tend to have a bureaucratic organization design, H & M consulting has an organic design that enables it to cope with the rapid environment in which it operates. The differences between the two organizations in terms of how they are operated and managed will be discussed in detail in the report. Organization Structure and Design The organization structure shows the organization is configured and relationship between positions and departments while organization design is concerned with changes to the organization structure (Hill & Jones, 2008). Organization structure reflects the degree of complexity, formalization and centralization. Organization design is determined by the size of organization, lifecycle, environment and technology. Smaller firms tend to have organic structure but as the firm grows, it establishes formal structures and more rules and regulations hence become mechanistic. Due to rapid environmental changes, organizations apply bo th organic and mechanistic structures so as to be flexible enough to adjust to the changes (Gitman & McDaniel, 2008). Watson is a small company and has no room for growth due to unavailability of capital but applies mechanistic structure while H & M consulting is a multinational corporation formed through mergers and acquisitions hence operates in a rapid environment thus uses organic structure. Mechanistic structu

Tuesday, February 4, 2020

Alternative Energy Sources Essay Example | Topics and Well Written Essays - 500 words

Alternative Energy Sources - Essay Example The liquefaction and gasification processes for coal may soon be as economical as obtaining liquid and gaseous fuels from conventional sources, and both processes seem likely to be used commercially within the 1970s. Reliance on coal for all fossil fuel needs would of course shorten the life expectancy of our coal reserves considerably. One possible alternative is the oil shelf, which constitute a potential energy resource much larger even than coal. Hydroelectric energy and the energy of the wind and tides will always be available (Manwell and Rogers 41). The rate at which these energy sources can be exploited, however, is limited by the global flow of energy in the form of falling water, wind, and tides at any given time. It is also limited by the number of sites where these processes can be exploited economically. Power is the rate at which energy flows or is used. Continuous energy sources, such as the water cycle, are usually characterized in terms of power -- say in kilowatts - - although they could easily be characterized by the amount of energy flowing per day or per yea (Beggs 76). The world's potential production of hydroelectric power is roughly half of the amount of power now being produced by fossil fuels.

Sunday, January 26, 2020

Organizational Change In Lenovo Group

Organizational Change In Lenovo Group Business organizations have to change to adapt to the changing environment. Management of change has been a hot issue in academic research for years. One popular opinion considers that nowadays corporations will go to die without change. However, how to carry out right change is a challenging question for corporations. Bland and aimless change could be a disaster causing a fast fall to the organizations. Focusing on the issue of management of change in the organization, this essay attempts to take use of the relevant concepts to research and analyze the issue of change within a real organization. The target organization is Lenovo, one of the most famous IT companies in China, where the researcher had opportunity to work. Lenovo has experienced big changes in its development road, especially in 2005, it successfully acquired IBM Personal Computing Division. This acquisition is a milestone in Lenovos history, which has also been an earthquake within the organization. In this essay, the researcher tries to identify and analyze the issues brought by the change within the organization. There are three parts in the main body of this research. Firstly, Lenovos background will be presented briefly. In the second part, an overview of management of change will be made in the first place. Based on the theories and concepts, it moves to the case of Lenovo. The nature and type of change, and the triggers for change in Lenovo will be identified respectively. Moreover, problems caused by the change and Lenovos solution will be discussed in this part. In the third part, taking Lenovo as an example, this essay will provide recommendations for Chinese corporations pursuing change in its development. Company Background The company which this essay focuses is Lenovo Group, the leading IT company in China. Its main task is the manufacture and sale of personal computer. The history of this company can be dated back to 1981. The company was founded by only 11 employees and with the name of Legend, holding the philosophy that bringing IT to more Chinese consumers and businesses. With years of efforts, this company had become the top PC manufacture in China since 1996, and carries out internationalization steps from 2000. It changes the name form Legend to Lenovo, which is the combination of the Le from Legend with novo(meaning neew) from the Latin word in 2004. And year 2005 has witnessed the most significant change of Lenovo the acquisition of IBMs PC Division. This action is considered as a milestone in history of Lenovo, because it combines the leading PC manufactures both in US and China, making a new unified international PC leader. This business decision proves to be correct by the facts. With th is acquisition, Lenovo has become one of the largest PC manufacturers in the world scope. The annual revenue of the company has reached 21 billion US dollars, with a series of brands of PCs, like Thinkpad. Nowadays, Lenovo has been an international company, operating in more than sixty countries with 23,000 employees worldwide. The company has been the third largest PC producer and the fastest growing one in the world top 5 PC manufacturers, with a world market share of 10.2% (Lenovo Official Website, 2012). Change within Lenovo 3.1 Brief Review of Management of Change The necessity of change within the organization has been widely recognized. Though the cause for changes may be different for one corporation from another, the triggers could be summarized into two types, external factors and internal factors. According to Elving (2005), the business environment is constantly changing. Corporations have to keep pace with the changing environment to achieve their business aim according to the environment. This is the external trigger for organizational change. On the contrary, the internal triggers come from the organization inside. Elving (2005) points out that technique development and personnel promotion are important internal triggers. Diefenbach (2007) considers that companies demand of development is one significant internal factor for changing, especially when performance is declining. However, change needs careful consideration. Any imprudent action could be very dangerous. Successful changes are strategic and systematic. Brian and Walter (1993) identify the changes into different types according to the strategies used. They are planned changes, small changes and imploding changes. Donaldson (2000) divided changes into structure, personnel, and technique changes. Changes always face resistance from employees. According to Morrell et al. (2004), the root for resistance against change is peoples fear for risk. Some scholars go deep into the reasons for resistance. De Jager (2001) focuses on the old employees, indicating that changes are always resisted by old employees for their worries about losing the things and interest they have owned. Robbins (2009) emphasizes the cause of refusing change is due to peoples fear of uncertainty, as change could make things from familiar to unknown. Dent (1999) thinks that some resistance may come from employees consideration about the company goal and development instead of themselves. Hence, it is necessary for enterprises to effectively communicate with their employees to make them clear about the significance, purpose and method of change. According to Altman and Iles (1998), the ways of putting forward the change should be flexible and innovative. However, in some special situation, some tough measures c ould be used to show the organizations strong determination. 3.2 Analysis on Change in Lenovo In August 2004, the chairman of Lenovo Group, has officially announced the acquisition of IBMs PC Division with a total of $ 12.5 billion (Lenovo Official Website, 2012). It is completed in 2005. It is undoubted that this business action is an enormous change within the organization. The rapid growth of Lenovo after the acquisition has proved that this decision of change is correct and well handled. The experience of Lenovo makes a good example for those who are troubled by the change within the organization. Trigger for Change of Lenovo The acquisition of IBM is a big change for Lenovo. The process of this acquisition lasts for five years from 2000 to 2005. This change is carried out with careful consideration and prudent behaviors. As mentioned above, triggers for change could be external and internal. External triggers emphasize the changing environment which enterprises have to keep pace with so as to complete their business goal, while internal triggers come from the organization inside, such as technique, personnel, etc. (Elving, 2005) Looking into the case of Lenovos acquisition of IBM, it could be found that this big change is driven by both external and internal factors. The external triggers for this change are summarized as follows. First of all, it is a necessary step for Lenovo to fulfill internationalization. Nowadays, facing competition pressure, a number of successful enterprises go abroad for more chances and bigger markets. The internationalization provides enterprises opportunities for sustained development. Lenovos choice of being internationalized is to conform the world economic development, which strengthens its competitive edge. On the one hand, before the acquisition of IBM, Lenovo has been a leading company in Chinese PC market. The company has occupied 1/3 of the segment, and the top PC company in China for 8 years. For Lenovo, the market of China is too limited for Lenovo to pursue further development, and it has the capability to go internationalization. On the other hand, with Lenovos business becoming mature, the company faces more and more challenges. After Chinas entry into WTO, a number of famous PC companies pour into Chinese market, such as IBM, Toshiba, Dell. Besides the brand advantage s, these PC giants are strong enough to provide products at attractive price. This fierce competition causes price war in Chinese PC market. Under this circumstance, Lenovo bears unprecedented competitive pressure. To Lenovo, pursuing internationalization is not only for development, but also for survival. It is proved that the acquisition of IBM is a fast rout for Lenovo to carry out international expansion, which makes it the number five top PC producer globally. Secondly, through this change, the bargaining power with suppliers has been strengthened a lot. As mentioned above, the Chinese PC market falls into a price war. Thus, the cheap price raw materials are very important. The acquisition of IBM makes Lenovo the world leading PC company. It improves Lenovos position when bargaining with the suppliers. One of the most important internal triggers for Lenovo to conduct this change is to acquire the most developed PC technology. IBM is considered the pioneer in PC producing all over the world, and the IBM PC is generally acknowledged as high-ended brand. The acquisition of IBM makes it possible to access the most developed technique. Whats more, besides technique in research and development, tactics in management, production, marketing and after service are all valuable treasures for Lenovo. The technique and management skills sharpen competitive edge of Lenovo. According to Diefenbach (2007), companies demand of development is one important internal factor for change. Following this concept, Lenovo makes the decision of change in order to acquire the brand of Thinkpad, the word-famous PC brand, and to reach more customers. In this acquisition, Lenovo makes an agreement with IBM, that takes use of the brand of Thinkpad. This agreement avoids the risks of unrecognizing the Lenovo brand in international market. It is a safe step to introduce Lenovo to international market and makes it possible for consumers to try Lenovos products. Moreover, some of the foreign consumers hold negative opinions to products made in China, which are considered as low quality and lack of technique. The use of Thinkpad brand gains the access to the new customers and tries to change their impression on Chinese PC. Problems Arising with the Change within the Organization Changes always resisted by people for the uncertainty and risks. This change in Lenovo is an earthquake to the whole company, which faces a lot of problems. The most challenging one is about people. Human resources are considered the most valuable asset for modern enterprises. Generally, the turnover of employees in acquired company is always a critical issue for the buyers, Lenovo is no exception. IBM employees have strong enterprise culture background. How to minimize the turnover and make foreign employees accept the management of Lenovo, a Chinese localized corporation, is a big challenge for the company, especially in the high-level management team in US market. In addition, this change does not only concern the overseas employees but also is closely related to the original Chinese employees. How to balance the two groups and make them harmoniously integrate together are not easy tasks. Its known that the salary and remuneration system of the US and Chinese companies are totally different. Hence, the company needs to find out an effective way to satisfy both groups of employees, making them feel equally and well treated. Moreover, problem is also shown in culture integration. Cultural differences may cause misunderstanding and conflicts within the organization. For Lenovo and IBM, the cultural differences exist not only in the level of corporation but also the nationality. Peoples behavior and form of thinking are deeply rooted in the national culture. It is inevitable that the western and eastern culture collide with each other after the change. The point is how to improve the mutual understanding and make the two groups of people working in a harmonious environment. However, as a localized company, Lenovo has no enough experiences on culture integration. 3.3 Solution of Lenovo on Problems Caused by Change Considering the problems arising from the change, Lenovo carries out a set of measures to make the change grows in a positive way. On the one hand, at the first beginning of the change, Lenovo makes a survey to investigate employees opinion to the acquisition. Data collected shows that most of the employees both in IBM and Lenovo present positive attitude towards the event, though some of the foreign staff shows worries about the future. According to the survey result, Lenovo makes guarantees to the staff in IBM that the IBM PC division is managed in international style and the salary and remuneration system is not changed. This action eliminates the biggest worries from the IBM employees, and strengthens their confidence about the acquisition, which maintains a lot of IBM original staff. On the other hand, to the Chinese employees in Lenovo, the company offers a new set of salary and remuneration scheme, which deduces the gap of the treatment so as to balance between the two groups of employees. The efforts of Lenovo are effective and efficient, which reduces the resistance in the process of change. With regards of the cultural differences, Lenovo tries to find similarities between the two in corporate culture as the starting point. In the whole process of the acquisition, Lenovo seek common ground with IBM while reserving differences, which makes the employees in both teams set up a unified identify about the future of the company. But it does not mean Lenovo evades differences. The company takes use of tactics to increase the communication between the two. For example, it holds cocktail party, sets up culture integration discussion board, and builds cultural integration committee. For the management team, special training for cross-culture management and languages is also given to the employees in the company. Recommendations on the Resistance of Change The case of Lenovo makes a good example for Chinese enterprises, which are troubled by the resistance of Change. According to the case of Lenovo, this essay gives the following recommendations. First of all, as stated by Robbins (2009), communication is an excellent way to handle the resistance. In the case of Lenovo, the company pays attention to the effective communication with its employees about the change within the organization. At the very beginning of the change, it makes survey among employees in both US and China. Though this survey, the company conveys the initiative and the importance of the change. With data collected, the company knows about employees attitude towards and worries about this change. All the worries are carefully considered by the company, and solution and strategies are made accordingly, such as the guarantee about management system and the salary and remuneration system to IBM employees, and the adjustment of Chinese employees salary scheme. The fact proves that the communication before the acquisition is effective, which guarantees the change go smoothly. In general case, the resistance comes from employees feeling of uncertainty and fear of risks. Good communication could help the employees understanding about the whole facts, thus eliminate peoples doubt and resistance. Talks and discussion are two ways commonly used in communication. Additionally, one objective of communication is to know about employees thought about the change. Therefore, it is important for company to be willing to listen to different voices and accept the suggestions about the change. Making employees involved in the decision making process is an effective way to get their support (Lawrence, 1963). It should be noticed that to make the employees involvement contributes to the development of the company, employees training and development are necessary and important Secondly, conducting a change is a systematic work, which needs a careful plan. Blind action always causes failure. It takes five years for Lenovo to complete this change. During this process, Lenovo has never stopped for adjusting the plan for the acquisition, and it involves the management philosophy, human resources, corporate culture, technique, production, marketing etc. almost every aspects in a company. Although some changes may be very small, they still need careful plan in to ensure an effective implementation. Conclusion In conclusion, management of change has been a critical issue for enterprise. This essay takes use of the relevant concepts to research and analyze the issue of change within Lenovo, the leading IT company in China. It focuses on the event of acquisition of IBM, the biggest change within the organization, going deep inside of the issues brought by the change. The triggers for change could be external and internal. Enterprises have to be adopted to the changing environment. It is the external trigger for change. Internal triggers come from the organization inside, such as the technique, personnel. Moreover, the demand for development is another important internal trigger. The triggers for the change of Lenovo are the combination of the external and internal factors. For external triggers, on the one hand, internalization is the development trend for successful enterprises. On the other hand, the company faces strong competition from international PC companies like Dell, IBM. To enhance the competitive edge, the change for internalization is necessary. One of the most important triggers for Lenovo is the demand new technique from IBM. Whats more, through this change, Lenovo can acquire the brand of Thinkpad and reach out new customers in international market. According the theories of change, organization change is always resisted by the em ployees for the feeling of uncertainty and fears of risks. The biggest problem of this change for Lenovo also comes from people. On the one hand, IBM employees worry about changing to the Chinese management style, and losing interests in salary and remuneration. On the other hand, different salary and remuneration systems make Chinese employees feel unequal and dissatisfied. Whats more, this change may also cause cultural conflicts between the Chinese and the Americans. Recognizing these resistances, Lenovo takes some effective measures which ensure the implementation of the change. Lenovo sets up a good example for organization pursuing change. Its experiences are summarized and given as recommendations in this essay. Firstly, successful change is based on the effective communication with employees. Secondly, changes either big or small need careful consideration and plan. .

Saturday, January 18, 2020

The Occupation of Japan During 2nd World War

The occupation of Japan was, from start to finish, an American operation. General Douglans MacArthur, sole supreme commander of the Allied Power was in charge. The Americans had insufficient men to make a military government of Japan possible; so t hey decided to act through the existing Japanese gobernment. General Mac Arthur became, except in name, dictator of Japan. He imposed his will on Japan. Demilitarization was speedily carried out, demobilization of the former imperial forces was complet ed by early 1946. Japan was extensively fire bomded during the second world war. The stench of sewer gas, rotting garbage, and the acrid smell of ashes and scorched debris pervaded the air. The Japanese people had to live in the damp, and col d of the concrete buildings, because they were the only ones left. Little remained of the vulnerable wooden frame, tile roof dwelling lived in by most Japanese. When the first signs of winter set in, the occupation forces immediately took over all the s team-heated buildings. The Japanese were out in the cold in the first post war winter fuel was very hard to find, a family was considered lucky if they had a small barely glowing charcoal brazier to huddle around. That next summer in random spots new ho uses were built, each house was standardized at 216 square feet, and required 2400 board feet of material in order to be built. A master plan for a modernistic city had been drafted, but it was cast aside because of the lack of time before the next winter. The thousands of people who lived in railroad stations and public parks needed housing. All the Japanese heard was democracy from the Americans. All they cared about was food. General MacAruther asked the government to send food, when they refus ed he sent another telegram that said, â€Å"Send me food, or send me bullets.† American troops were forbidden to eat local food, as to keep from cutting from cutting into the sparse local supply. No food was was brought in expressly for the Japanese durning the first six months after the American presence there. Herbert Hoover, serving as chairman of a special presidential advisory committee, recommended minimum imports to Japan of 870,000 tons of food to be distributed in different urban areas. Fi sh, the source of so much of the protein in the Japanese diet, were no longer available in adequate quantities because the fishing fleet, particularly the large vessels, had been badly decimated by the war and because the U.S.S.R. closed off the fishing g rounds in the north. The most important aspect of the democratization policy was the adoption of a new constitution and its supporting legislation. When the Japanese government proved too confused or too reluctant to come up with a constitutional reform that satisfied MacArthur, he had his own staff draft a new constitution in February 1946. This, with only minor changes, was then adopted by the Japanese government in the form of an imperial amendment to the 1889 constitution and went into effect on May 3, 1947. The new Constitution was a perfection of the British parliamentary form of government that the Japanese had been moving toward in the 1920s. Supreme political power was assigned to the Diet. Cabinets were made responsible to the Diet by having the prime minister elected by the lower house. The House of Peers was replaced by an elected House of Councillors. The judicial system was made as independent of executive interference as possible, and a newly created supreme court was given the power to review the constitutionality of laws. Local governments were given greatly increased powers. The Emperor was reduced to being a symbol of the unity of the nation. Japanese began to see him in person. He went to hospitals, schools, mines, industrial plants; he broke ground for public buildings and snipped tape at the opening of gates and highways. He was steered here and there, shown things, and kept muttering, â€Å"Ah so, ah so.† People started to call him â€Å"Ah-so-san.† Suddenly the puybli c began to take this shy, ill-at-ease man to their hearts. They saw in him something of their own conqured selves, force to do what was alien to them. In 1948, in a newspaper poll, Emperior Hirohito was voted the most popular man in Japan. Civil li berties were emphasized, women were given full equality with men. Article 13 and 19 in the new Constitution, prohibits discrimination in political, economic, and social relations because of race, creed, sex, social status, or family origen. This is one of the most explicitly progressive statements on human rights anywhere in law. Gerneral Douglas MacArthur emerged as a radical feminist because he was â€Å"convinced that the place of women in Japan must be brought to a level consistent with that of women in the western democracies.† So the Japanese women got their equal rights amendment long before a concerted effort was made to obtain one in America. Compulsory education was extened to nine years, efforts were made to make education more a traning in thinking than in rote memory, and the school system above the six elementary grades was revised to conform to the American pattern. This last mechanical change produced great confusion and dissatisfaction but became so entrenched that it could not be re vised even after the Americans departed. Japan†s agriculture was the quickest of national activities to recover because of land reform. The Australians came up with the best plan. It was basis was this: There were to be no absentee landlards. A person who actually worked the land could own up to 7.5 arcers. Anyone living in a village near by could keep 2.5 acres. Larger plots of land, exceeding these limits, were bought up by the government and sold on easy terms to former tenants. Within two years 2 million tenants became landowners. The American occupation immediately gained not only a large constituency, for the new owners had a vested interest in preserving the change, but also a psychological momentum for other changes they wanted to ini tiate. The American labor policy in Japan had a double goal: to encourage the growth of democratic unions while keeping them free of communists. Union organization was used as a balance to the power of management. To the surprise of the American authorties, this movement took a decidedly more radical turn. In the desperate economic conditions of early postwar Japan, there was little room for successful bargaining over wages, and many labor unions instead made a bid to take over industry and o perate it in their own behalf. Moreover large numbers of workers in Japan were government employees, such as railroad workers and teachers, whose wages were set not by management but by the government. Direct political action therefore seemed more meani ngful to these people than wage bargaining. The Japanese unions called for a general strike on February 1, 1947. MacArthur warned the union leadership that he would not countenace a nationwide strike. The strike leaders yieled to MacArthur†s will. The re after the political appeal of radical labor action appeared to wane. The Americans wanted to disband the great Zaibatsu trust as a means of reducing Japan†s war-making potential. There were about 15 Zaibatsu families such as – Mitsui, Mitsubishi, Yasuda, and Sumitomo. The Zaibatsu controled the industry of Japan. MacArthur†s liaison men pressured the Diet into passing the Deconcentration Law in December 1947. In the eyes of most Japanese this law was designed to cripple Japanese business and i ndustry forever. The first step in breaking up the Zaibatsu was to spread their ownership out among the people and to prevent the old owners from ever again exercising control. The stocks of all the key holding companies were to be sold to the public. Friends of the old Zaibatsu bought the stock. In the long run the Zaibatsu were not exactly destroyed, but a few were weakened and others underwent a considerable shuffle. The initial period of the occupation from 1945 to 1948 was marked by reform, the second phase was one of stabilization. Greater attention was given to improvement of the economy. Japan was a heavy expense to the United States. The ordered breakup of the Zaibatsu was slowed down. The union movement continued to grow, to the ult imate benefit of the worker. Unremitting pressure on employers brought swelling wages, which meant the steady expansion of Japan domestic consumer market. This market was a major reason for Japan†s subsequent economic boom. Another boom to the economy was the Korean War which proved to be a blessing in disguise. Japan became the main staging area for military action in Korea and went on a war boom economy with out having to fight in or pay for a war. The treaty of peace with Japan was signed at San Francisco in September 1951 by Japan, the United States, and forty-seven other nations. The Soviet Union refused to sign it. The treaty went into effect in April 1952, officially terminating the United States military occupation and restoring full independence. What is extraordinary in the Occupation and its aftermath was the insignificance of the unpleasant. For the Japanese, the nobility of American ideals and the essential benignity of the American presence assuaged much of the bitterness and anguish of defeat. For the Americans, the joys of promoting peace and democracy triumphed over the attendant fustrations and grievances. Consequently, the Occupation served to lay down a substantial capital of good will on which both America and Jap an would draw in the years ahead.