Wednesday, August 26, 2020

Analysis of The Allegory of the Cave by Plato :: Philosophy Plato

An Analysis of The Allegory of the Cave by Plato The Allegory of the Cave is Plato's clarification of the instruction of the spirit toward illumination. He considers it to be what happens when somebody is taught to the degree of savant. He fights that they should return into the cavern or come back to the ordinary universe of legislative issues, voracity and force battles. The Allegory additionally assaults individuals who depend upon or are captives to their faculties. The chains that dilemma the detainees are the faculties. The fun of the purposeful anecdote is to attempt to place all the subtleties of the buckle under your understanding. As it were, what are the models the gatekeepers convey? the fire? the battle out of the cavern? the daylight? the shadows on the cavern divider? Socrates, in Book VII of The Republic, soon after the purposeful anecdote revealed to us that the cavern was our reality and the fire was our sun. He said the way of the detainee was our spirit's climb to information or edification. He compared our univ erse of sight with the astuteness' universe of supposition. Both were at the base of the stepping stool of information. Our universe of sight permits us to see things that are not genuine, for example, equal lines and flawless circles. He considers this higher understanding the world theoretical Reality or the Intelligeble world. He likens this theoretical reality with the information that originates from thinking lastly understanding. On the physical side, our universe of sight, the phases of development are first acknowledgment of pictures (the shadows on the cavern divider) at that point the acknowledgment of articles (the models the gatekeepers convey) To comprehend dynamic reality requires the comprehension of arithmetic lastly the structures or the Ideals of all things (the world outside the cavern). Yet, our comprehension of the physical world is reflected in our brains by our perspectives. First comes creative mind (Socrates barely cared about inventiveness), at that point o ur unwarranted however genuine convictions. Supposition offers approach to information through thinking (adapted however science). At long last, the acknowledgment of the structures is reflected by the degree of Understanding in the Ways of Thinking. The way in to the battle for information is the thinking abilities procured through arithmetic as they are applied to getting ourselves. The shadows on the cavern divider change persistently and are of minimal worth, yet the truth outside the cavern never shows signs of change and that makes it significant.

Saturday, August 22, 2020

Reflection on Perceptions and Meaning of Health - Illness and Death

Question: Talk about theReflection on Perceptions and Meaning of Health, Illness and Death. Answer: Presentation Maggies story of expectation, recuperation, and mending in the wake of being associated with a terrible mishap clarifies the patients viewpoint on wellbeing and ailment. She had continued hip and spine wounds just as mind and lung wounds. The main individual to react to the mishap scene was a volunteer fireman inside the primary hour of the event which appeared to Susan as the best thing to happen to her that has added to her being alive. She was traveled to a clinic where she remained in a comma for a month. Subsequently, she got incredible empathy and comprehension from relatives and companions as well as from the medicinal services suppliers and the general clinic staff (www.youtube.com, 2013). This contributed a lot towards enthusiastic, mental and physical recuperation in the midst of sadness, uncertainty of ever recouping, and dread. Maggies story brought me blended sentiments of being sorry a for what she needed to experience and a feeling of motivation of the trust she had in social insurance suppliers. I think it is the duty of care suppliers consistently to give consolation and any help to empower the patient to recover. Since most patients have a self-care shortfall, they in many cases feel that their circumstance may deteriorate. Hence, the patient-nurture relationship ought to be given top need as it straightforwardly impacts the patients clinical experience. These sentiments incited me to consider the passionate effect attendants have on their patients. One of the essential jobs of attendants is to ease uneasiness in patients to advance physical recuperation. In this manner, the attendants are required to accomplish more than the characterized jobs by making a remedial relationship with the customer. This can be urging to the patient as it additionally advances tolerant pride. Rather than what I had consistently known to be valid, patients have a more noteworthy trust in medicinal services suppliers, and they ought to endeavor to keep up it by giving quality consideration. This consideration gave me an understanding of what patients experience and what are their desires from medical caretakers in the circumstances that they are required to settle on hard decisions about their conditions. It is basic for medical caretakers to move toward every circumstance while thinking about its uniqueness and tending to comprehensive needs of the customer, family, and family members (Burton Ludwig, 2014). In addition, the reliance of patients on the consideration suppliers contrasts starting with one then onto the next, an inclination that is controlled by pre-created ways of dealing with stress. Recuperation is a huge accomplishment for a patient and along these lines attendants should show concern and enthusiasm to enable the patient to recover wellbeing. References Burton, M., Ludwig, L. J. M. (2014).Fundamentals of nursing care: Concepts, Connections aptitudes. Philadelphia: Davis Company Www.youtube.com (2013, August 29).Maggies story of expectation, recuperation healingRetrieved from https://www.youtube.com/watch?v=fb0FwrZH2q4

Tuesday, August 18, 2020

A Brief History of Debtors Prisons

A Brief History of Debtors Prisons A Brief History of Debtors Prisons A Brief History of Debtors PrisonsDoes a prison for not paying your debts sound like something from a nightmarish future? Wrong! Its a real thing from our nightmarish past!You know what would be really messed up? A prison for people who weren’t able to pay their debts. It just doesn’t seem fair, does it? Good thing we just made it up!Except we didn’t! Debtors’ prisons were real institutions, and many would argue they’ve never really gone away. It’s as interesting as it is depressing. That’s why we compiled a brief history of debtors’ prisons, which we’re now presenting to you.But first, something nice and cute before we get into the downer stuff. Check out this corgi!OK, got your fill? Let’s head back to the Middle Ages.Debtors  prisons: Origins.Systems of debt bondage have existed for thousands of years. It was a common practice throughout Ancient Greece and the Roman Empire. A person who owed a debt could be compelled into serving their creditor for many years. These sorts of practices spun-off into debtors’ prisons in the Middle Ages, though debt bondage continued to exist and is still practiced in many parts of the world.“A debtors’ prison is a prison where people who were unable to pay legal debts were incarcerated until they worked off the debt, or they got enough money from the outside to pay the amount,” explained Joe Bailey, operations manager at My Trading Skills (@MyTradingSkills).“These prisons are speculated to have begun during the Middle Ages in Europe where debtors were thrown into cells until their families were able to pay off these debts.”You’ve probably heard someone refer to jail as “the clink.” What you may not have realized is that it’s the name of a real prison in England. The Clink was built in 1144 and was in operation for centuries. That means it housed all manner of prisoners over the years, including many debtors.Even the famous could end up in debtors’ prison. William Hughton, playwright an d Shakespearean contemporary, found himself in The Clink for failing to pay back a loan from London entrepreneur Philip Henslowe.One can only imagine that the common folk with less connections would often be even worse off.Coming to America.When Europeans began colonizing the Americas, many of them put themselves into debt bondage to pay for the trip. And much like smallpox, the tradition of debt prisons also made its way across the ocean.“Debtors’ prisons began popping up in America during the 19th century,” continued Bailey. “At that time, locking up people for failing to pay their debts was considered a legal practice.”Once again, even American bigwigs (and they were often wearing literal big wigs back then) could end up in debtors’ prison. Robert Morris, one of the Founding Fathers, had a big part in helping the young nation get its finances in order. Unfortunately, he wasn’t as capable when it came to managing his own finances.Morris borrowed significant sums of m oney to buy Western land, overextending his credit obligations without a means to repay them. He was thrown in debtors’ prison in 1798 and spent the rest of his years in poverty.“These prisons were prevalent across the US until federal law made it illegal to imprison debtors in 1833,” concluded Bailey.The end … Or is it?Much like the villain in a slasher movie, debt prisons didn’t really die. Despite much celebration when the law seemed to have killed them, the camera panned down and the hand of the debt prison emerged from the swamp.“Debtors prisons have taken many forms over the years,” reiterated criminal justice journalist Dan King (@Kinger_Liberty). “In the 1800s, there were specific jails dedicated to housing those who had failed to pay their debts. In 1833 Congress outlawed debtors prisons and in 1983 the Supreme Court ruled that in order to jail a person for failure to pay a fine or fee, the judge must first consider if the person was willfully choosing not t o pay.“This has not stopped law enforcement agencies from jailing poor folks over an inability to pay fees, often before they are even charged with a crime. For example, in 2015 a bedridden Missouri man who was living on a $488 Social Security check was jailed for not paying $464 worth of fees after his house was condemned by the city and he chose to continue living there. Certainly, his inability to pay such a fee was not willful.“Another form of modern debtors prisons is the practice of suspending individuals drivers licenses for unpaid fines or fees, which is currently done in 40 states across the country. When a persons license is suspended, especially in rural neighborhoods, it makes it nearly impossible to maintain steady work and thus to pay off the fines and fees they owe. Often these people will choose to drive without a license, so they can get to work and pay off these fees. But, if they are caught driving without a license, they can end up behind bars.”Getting arre sted isn’t free, and even though “innocent until proven guilty” is supposed to be the underlying principle of the justice system, in practice, you can spend a lot of time in jail without having ever been convicted of a crime.Being unable to afford court fees or bail can lead to a modern form of debtors’ prison, and unlike the previous debtors’ prisons we’ve discussed, these are just for poor people. The big wigs will almost always find a way to make bail, assuming they aren’t just released on their own recognizance because they’re a “pillar of their local community,” unlikely to avoid their trial dates.While debtors’ prisons may be officially gone, it’s obvious there’s a long way to go. It really makes us wish we had made it up.  To read more stories about financial history, check out these other posts and articles from OppLoans:The Secret Financial History of VotingA Brief History of Point-Shaving in College BasketballHow Have Movie Stars’ Salaries Chang ed Over Time?National One Cent Day: The Long History (and Murky Future) of the U.S. PennyDo you have a   personal finance question youd like us to answer? Let us know! You can find us  on  Facebook  and  Twitter.  |  InstagramContributorsJoe Bailey is the Operations Manager at  My Trading Skills (@MyTradingSkills), a financial trading courses provider. His experience includes web development, UX and conversion rate optimization for both B2B and B2C.Dan King (@Kinger_Liberty) is a Young Voices contributor, communications professional justice writer residing in Arlington, Virginia. Dan writes extensively on issues of surveillance, privacy, and civil liberties. He’s been published in The American Conservative, Reason, The Weekly Standard, The Week, and has been seen on FOX 5 DC and CRTV’s “Kibbe On Liberty”.

Sunday, May 24, 2020

Essay On Hassan As An Archetype - 1014 Words

The use of Archetypes in literature is highly prevalent. A common archetype is the saviour archetype, also known as the messianic or Christ-like figure. Usually the protagonist, the Christ-like figure exhibits qualities that parallel that of the biblical Jesus, through characterization, and symbolic actions. There are a few common traits exhibited by this character, including, but not limited to, being self-sacrificing and loyal, manifestations of divine qualities, displaying kindness or forgiveness. With the advent of postmodern literature, authors tend to avoid the theme of resurrection, but rather focus on a symbolic martyr; sacrificing himself for the greater good. Authors frequently and consistently make use of this archetypal figure†¦show more content†¦The novel The Kite Runner is a work of art, worthy of investigation and analysis, not only due to the use of the archetypal savior figure in advising the theme of the novel, but also due to the interesting literary tech niques employed by Hosseini, in developing this archetypal figure. The research question allows me to have a greater understanding of the conventional archetypal characters, which opens me up to a new perspective and lens, when viewing all forms of literature. Hosseini incorporation of cultural conventions and hierarchy introduces the complex relationship between Hassan and Amir. Hassan was a member of the Hazara caste; a historically socially, politically and economically oppressed group. In contrast, Amir was a Pashtun, a historically dominant, richer and overall higher caste. The conflict between Hazaras and Pashtuns stems from a difference in religious beliefs. The Hazaras were Shi’a Muslims, whereas Pashtuns were Sunni Muslims. Their conflict regarding the successor to Prophet Muhammed, translated into social, and economic oppression and persecution. â€Å"Throughout Afghan History, the Pashtuns [held] the highest influential rank above other ethnic groups, specifically the Hazaras†. Hosseini directly infuses this historical context into the text when Amir found a history book, wherein he learned that â€Å"†¦the Pashtuns†¦had persecuted and oppressed the

Wednesday, May 13, 2020

Essay on Early American History and Traditions of Excellence

In 1607, the first colonists came to settle America and founded Jamestown Virginia. Hoping to escape religious persecution, the Puritans followed in 1620 after trekking across the Atlantic Ocean in the Mayflower. The first winter faced the homeless and foodless Puritans with brutal conditions. After only being there for eight months, half of the original group died, leaving them with only four women. Following the first harvest, those still alive celebrated their well being with the first Thanksgiving. From 1630 to 1647, more Puritans came over and settled in the Massachusetts Bay Colony. At the same time relationship tensions with the neighboring Native Americans became heightened (Campbell, 2011, para. 5). By 1636, the first war against†¦show more content†¦By 1738, the Puritan religion began to decline. Increasingly more people drifted away from the church, or did not attend at all. Even more only went through the motions instead of having a true relationship with the Lo rd. This started a religious revival, known as the Great Awaking, which swept through the colonies. Hoping to promote this, priests delivered sermons encouraging the congregation to devote their life to Christ. One man known for his particularly fiery sermons was Jonathan Edwards (Campbell, 2007, para. 8). Despite all efforts, the Great Awakening failed and within a few decades the Puritan religion vanished completely. In the years following the Great Awakening, the mainstream of the French and Indian battles began. At the time, a massive conflict known as the Seven Years War was occurring in Europe. The French and Indian wars were a part of this bigger war. While the treaty of Paris ended this war in Great Britain’s favor in 1763, it was only the beginning of hostilities between the colonists and Great Britain. Great Britain used their newfound control over America to their advantage. Wishing to alleviate the massive debt Great Britain encountered after the Seven Years War, the King, King George III, taxed the colonists. This angered the colonists, as they did not have any representation in the British parliament. America declared themselves free in the Declaration of Independence in 1776 and the Revolutionary War officially broke out in 1779.Show MoreRelatedThe Negro Digs Up His Past1700 Words   |  7 Pagesthe Past? This article â€Å"The Negro Digs Up His Past’’ by Arthur schomburg on 1925, elaborates more on the struggles of slavery as well as how history tend to be in great need of restoration through mindfully exploring on the past. The article, however started with an interesting sentence which caught my attention, especially when the writer says ‘’The American Negro must remark his past in order to make his future’’ (670). This statement according the writer, explains how slavery took away the greatRead MoreThe 7 Ten Empire : The Global Expansion Essay958 Words   |  4 PagesThe 7-Eleven Empire: The Global Expansion Introduction History The evolution of an empire in the coming years. As the coming was emerging in early 1927, when there were General stores or street vendors. The first store was established from an ice factory called Southland Ice by an employee named John Jefferson Green. John decided to sell some quick assessable items like bread, eggs, and milk in the location in Dallas, Texas. In 1946, Tote’m store change the empire to global industry revamping theRead MoreWomen in Psychology - Margaret Washburn1458 Words   |  6 PagesWomen in Psychology – Margaret Floy Washburn PSY/310 May 23, 2011 Women in Psychology Margaret Floy Washburn was an accomplished and highly-recognized woman within the field of psychology in the late 19th and early 20th centuries. Her interests were equally divided between science and philosophy and thus, Washburn made the decision â€Å"†¦to pursue â€Å"the wonderful new science of experimental psychology†¦Ã¢â‚¬  (Goodwin, 2008, pg. 200, para. 2). Under the tutelage of E. B. Titchener, a British psychologistRead MoreThe Mount Sinai Hospital Ecosystem1466 Words   |  6 Pagescomprised of 45 beds. At its inception, the hospital was named the Jews’ Hospital. â€Å"Although the hospital was a sectarian institution, the Jews Hospital accepted emergency patients of any religious affiliation† (Mount Sinai Hospital). During the early years, the hospital relied on donations and help from the government to fund its operations. The social event the drastically shaped the future, and was a catalyst for the expansion of the hospital was the Civ il War, fought 1861-1865. In additionRead MoreSocial Construction Theory Of The National Football League1403 Words   |  6 PagesRecently, an increasing number of African American football players have been leaving their respective colleges with years of eligibility left, to pursue a dream of playing in the National Football League. This year alone, 101 athletes will be forgoing their remaining years of college eligibility to enter the NFL draft. Thus representing a staggering increase from the 40 early entrants in 2007 (Heitner). This decision seems deceptive, in that it appears explicitly based on utility maximization andRead MoreThe Disintegration Of Blacks Own Beliefs And Cultures1468 Words   |  6 Pagesand cultures are due to the lack of Black history in schools. The repeated exposure of Black history pressures schools to incorporate more material about black people in their libraries and classrooms in order to coincide with what is being taught. Black emphasis on its concepts eventually urges sc hools in â€Å" reinforcing the concept that all cultures must be respected and appreciated for their cultural attributions to America as well as to World History†(Hale 269). This will provoke Blacks to haveRead MoreThe Negro Digs Up His Past By Arthur Schomburg1549 Words   |  7 Pages The article â€Å"The Negro Digs Up His Past’’ by Arthur schomburg on 1925, elaborates more on the struggles of slavery as well as how history tend to be in great need of restoration through mindfully exploring on the past. The article, however started with an interesting sentence which caught my attention, especially when the writer says ‘’The American Negro must remark his past in order to make his future’’ (670). This statement according the writer, explains how slavery took away the great deal freedomRead MoreKing Of Jazz : Louis Armstrong1617 Words   |  7 PagesKang Sun *20355591 Clint Rohr Jazz History 30 March. 2015 King of Jazz - Louis Armstrong At the mention jazz music, that person will first think of is likely to be a great figure with a clown image, nicknamed Satchmo. The man was Louis Armstrong. He is a husky singer, often with a trumpet in his hand. He played dramatic works of simple structure in Orleans jazz style and with the accompaniment of Dick jazz music. Each of the books on jazz music will mention his name. Louis Armstrong was to jazzRead MoreKing Of Jazz : Louis Armstrong1617 Words   |  7 PagesKang Sun *20355591 Clint Rohr Jazz History 30 March. 2015 King of Jazz - Louis Armstrong At the mention jazz music, that person will first think of is likely to be a great figure with a clown image, nicknamed Satchmo. The man was Louis Armstrong. He is a husky singer, often with a trumpet in his hand. He played dramatic works of simple structure in Orleans jazz style and with the accompaniment of Dick jazz music. Each of the books on jazz music will mention his name. Louis Armstrong was to jazzRead MoreNontraditional Casting944 Words   |  4 PagesHollywood looks for actors that fit the physical and talent description directors are looking for. Hollywood work with what they only have, not based on color. Hollywood actually takes advantage of the multicultural world. If they need an African American, American Asian, Indian, Mexican actor they’ll scout out for the ones they desire. It’s true that majority of movies and TV shows are Caucasian actors, that is only because this is America. If we were to go to Mexico, majority actors on movies and TV

Wednesday, May 6, 2020

Planning a Birthday Free Essays

Planning a birthday party may seem like a simple project, but it may be difficult and require a lot of work. In order to plan a successful party, you need to have excellent organizational skills, find a good location, secure a sufficient budget and have plenty volunteers. Beginning the process, you will need to have excellent organizational skills. We will write a custom essay sample on Planning a Birthday or any similar topic only for you Order Now This comes in handy as you figure out a list of people to invite including, family relatives, friends, and co-workers. You may fill out invitation cards and get them in the mail at least one week before the party. You need to give the guests enough time to R. S. V. P, so you will know how many people will be attending the birthday party. If you have the party at your house you will need to invite your neighbors. Having a party at your home sometimes comes with a lot of noise, your guests may park their cars by your neighbor’s house and you don’t want to trouble your neighbors. After you know how many people will be joining the birthday party, you need to start compiling a list of food, alcohol beverages, soft drinks, and party supplies such as paper plates, plastic forks, cups, napkins, decoration, games and possibly entertainment. Next choose an appropriate location to have your event. Possible places are: restaurants, clubs, hotel suites, ballrooms or your house. Let’s say you decide to have a party at your house. You have an advantage because you do not necessarily have to hire a catering company. Instead you can show off your cooking skills, and impress your guests. Another reason is that most of your guest already knows your home location and it will be easy for your guest to find the birthday party. Also having a party at your home will save some budget as compared to renting a place. If you decide host a party at some type of venue then more goes into preparing your party. For example, you choose your house as the place for the party. On the other hand, if you have a good budget and your home cannot fit a lot of guests, then you probably need to rent a place such as a hall. Final step, you will need to have a budget. One of the worst things that could happen is you plan everything and realize you do not have enough money. A good budget will help you watch your expenses. For example, if your budget is $1,000. 00 dollars for a birthday party, you can spend $600. 00 on food, drinks, and supplies and $300. 00 for hiring a DJ and $100. 00 for decorations. In conclusion throwing birthday parties take lots of planning and time management. How to cite Planning a Birthday, Essay examples

Tuesday, May 5, 2020

Human Resource Management Organisational Process

Question: Describe about the Human Resource Management for Organisational Process. Answer: Introduction Organizational changes can be deemed as a major part of the progress of an organization. A span of time may arise when the need to restructure or reorganize becomes eminent. But it is to be duly noted that organizational changes should not be made only for the sake of making them, but taking into account the pros and cons of it, as well as a thorough analysis of how it will impact the organization is to be made before the implementation of these changes. In this report, the researcher discusses the Atlassian organization, which is an Australia-based software firm. The discussion would focus on the changes that this organization has brought about recently and its impact in terms of strategic focus and sustainability. The report also evaluates the success ratio that the implementation of the change has achieved along with the reason behind its implementation. Identification of an organization in Australia that has recently implemented a significant change Atlassian is a software organization, based in Australia which has very recently implemented a significant change in their organization. This significant change proved to be an essential factor in the growth of the organization, and this organizational change was named as performance management overhaul. This organization decided to entirely restructure their performance review system (Lusthaus, 2002). According to the administrative department of the organization, the bi-annual performance review system was not producing the desired results. The system was not suitable for the employees as well as it was largely infrequent, so the system was deemed as incompetent. Adding to these issues, as the employee's bonuses depended on upon the numeric performance ratings; the review system did not prove to be helpful at all as an employee with three rating and another with four rating did not have much difference in performance but their bonuses and payouts varied immensely. As a result of al l these issues, Atlassian changed this review pattern and introduced a brand new review model which comprised of more of a continuous system than a numeric one. The new review process involved performance reviews once in every month instead of a biannual formal review, and the whole process is now carried out in a one on one system involving the manager and an employee (Humphreys Brown, 2002). Fundamental points from the interview with the manager of the organization While preparing this report, the researcher conducted a survey interview with the departmental manager of the Atlassian organization, based in Australia, in order to procure his perspectives about the recently implemented organizational change. The manager was asked questions such as whether he was feeling comfortable with the new changes that were implemented, how did he think that the new changes will affect the organization and its employees, in his opinion what sort of impact the new changes could bring about in this competitive market. The key areas of discussion with the manager are elaborated in this section of the report (Carson, Carson, Fontenot, Burdin, 2005). The manager was primarily of the opinion that he was immensely comfortable with the implementation of the changes in the performance review process in the organization. He stressed that the employees were getting more and more agitated with the old bi-annual performance review system as the system was both incompetent and infrequent. The manager further clarified the fact that the introduction of the new performance management system has rejuvenated the employees of the organization for various reasons, the urge to perform has increased and a sense of healthy competition has developed in the organization as a result (KlovienÄ—, 2012). He was also of the opinion that the new changes will bring about higher rates of productivity from the employees which will, in turn, help the organization to strive in this competitive market. Explanation of the organizations change initiative in terms of strategic focus and competitive sustainability The administrative level management of Atlassian introduced a new less numeric and a more continuous performance review system. This change in the organizations approach brought about a sense of focus among the employees regarding their work and productivity for the organization. In terms of strategic focus, this organizational change ticked every box in a positive sense. As Atlassian did not change a particular aspect of the performance review system but restructured it entirely, it shifted the employee's focus and acted in a way of a support plan (Ravasi Phillips, 2011). Once the employees were comfortable with the more continuous performance review process, the working environment became alter which in turn resulted in a beneficiary way for the organization. In a nutshell, it can be easily stated that the strategy behind implementing the change was proven to be spot on (Lee, Ahn, Park, Park, 2016). As long as competitive sustainability is concerned, this organizational change played an essential part in that as well. Atlassian managed to attract more efficient and talented employees with this new system than the other software firms in Australia, and as a result, the productivity of the organization reached new benchmarks resulting in making Atlassian one of the leading software organizations in this part of the world. Explanation of the reason behind implementation of the change The performance management overhaul was performed by Atlassian in the year 2011. There were various reasons behind taking this huge step by the administrative department of the organization. The foremost reason behind the implementation of this organizational change was the internal observation by the management heads in the organization that the biannual performance reviews were a bit too formal and not so effective (Mazur, 2013). Further, the traditional rating based system was unjust in the viewpoint of the majority of the employees. As the performance review system was biannual, it was deemed as infrequent and was a cause of major concern for the employees. Another fundamental reason for bringing about change in the performance review system was the fact that it created a sense of disarray amongst the employees of the organization (Halachmi, 2002). Based on this review system the employee's bonuses were sanctioned, and as it was a traditionally numeric rating based concept, some of the employees were bound to get lesser payouts than the others, and by a very small margin of difference in performance. This scenario understandably created an undesirable working environment in the firm, and thus the administrative department of the Atlassian organization decided to implement this organizational change in order to get satisfactory results on every front (Schreider Mostovaia, 2001). Evaluation of the success brought about by the change or likelihood of success it is about to bring The introduction of the new performance review system has brought about a considerable amount of success for Atlassian organization, based in Australia. It can be clearly observed that after the year 2011, that is, after the implementation of the above mentioned organizational change, Atlassian went big and went on to be one of the leading software companies in the whole of Australia. Transparency between the employees and the employers became more evident after the implementation of the new performance review system and that helped in the organization's cause in an immense manner (Welch-Devine, 2012). Post implementation of the new performance review system, the performance bonuses were assigned in a justified manner and it pleased the employees of the firm. This scenario also brought the best out of the employees as they knew that their performance is getting noticed and monitored by the top level management and this, in turn, created a healthy competition between them in terms of improvement in performance and enhancement in productivity, in turn benefiting the organization as a whole (Hoontis Kim, 2012). In this way, it could be safely stated that the implementation of the mentioned organizational change has brought about immense success in terms of productivity and performance in the Atlassian organization and it is proven statistically as well, as after 2011 the organizations market took off immensely (Stetler, McQueen, Demakis, Mittman, 2008). Report to the CEO about the implementation of the change In this section of the discussion, the researcher is creating a brief report on the implementation of the change for the CEO of the Atlassian organization, based in Australia. From the thorough assessment of the traditional numeric rating based bi-annual performance review system, it can be observed that the system has proved to be inappropriate as it has failed to deliver the expected results. The employees of the organization were immensely unsatisfied with this system as well. In order to revive this scenario, a more continuous and a less numeric method of a performance review system is required, so that both the employees and the organization can benefit from the new system and the company could reach its desired potential in the near future. Conclusion Implementations of organizational changes are such high stake moves which can easily prove to be a make or break strategy for an organization. It is deemed as utterly necessary for the administrative heads of an organization, to judge the requirements before taking such steps otherwise it may prove to be fatal for the organization itself. This report can be concluded by stating the fact that the Australia-based software organization Atlassian, implemented the organizational change in the correct time using the correct approach and as a result, they have set a new benchmark of success for all the software based organizations in Australia. References Carson, K., Carson, P., Fontenot, G., Burdin, J. (2005). Structured Interview Questions for Selecting Productive, Emotionally Mature, and Helpful Employees.The Health Care Manager,24(3), 209-215. https://dx.doi.org/10.1097/00126450-200507000-00004 Halachmi, A. (2002). Performance Measurement, Accountability, and Improved Performance.Public Performance Management Review,25(4), 370-374. https://dx.doi.org/10.1080/15309576.2002.11643674 Hoontis, P. Kim, T. (2012). Antecedents to Municipal Performance Measurement Implementation.Public Performance Management Review,36(1), 158-173. https://dx.doi.org/10.2753/pmr1530-9576360108 Humphreys, M. Brown, A. (2002). Narratives of Organizational Identity and Identification: A Case Study of Hegemony and Resistance.Organization Studies,23(3), 421-447. https://dx.doi.org/10.1177/0170840602233005 KlovienÄ—, L. (2012). PERFORMANCE MEASUREMENT SYSTEM COMPATIBILITY WITH BUSINESS ENVIRONMENT.Ecoman,17(2). https://dx.doi.org/10.5755/j01.em.17.2.2163 Lee, S., Ahn, S., Park, C., Park, Y. (2016). Development of a Resource Allocation Model Using Competitive Advantage.Sustainability,8(3), 217. https://dx.doi.org/10.3390/su8030217 Lusthaus, C. (2002).Organizational assessment. Ottawa: International Development Research Centre. Mazur, K. (2013). Isolating mechanisms as sustainability factors of resource-based competitive advantage.Management,17(2). https://dx.doi.org/10.2478/manment-2013-0053 Ravasi, D. Phillips, N. (2011). Strategies of alignment: Organizational identity management and strategic change at Bang Olufsen.Strategic Organization,9(2), 103-135. https://dx.doi.org/10.1177/1476127011403453 Schreider, S. Mostovaia, A. (2001). Model sustainability in DSS design and scenario formulation.Environment International,27(2-3), 97-102. https://dx.doi.org/10.1016/s0160-4120(01)00067-8 Stetler, C., McQueen, L., Demakis, J., Mittman, B. (2008). An organizational framework and strategic implementation for system-level change to enhance research-based practice: QUERI Series.Implementation Science,3(1). https://dx.doi.org/10.1186/1748-5908-3-30 Welch-Devine, M. (2012). Searching for Success: Defining Success in Co-Management.Human Organization,71(4), 358-370. https://dx.doi.org/10.17730/humo.71.4.y048347510304870

Tuesday, March 31, 2020

Zoroastrians Essays - Zoroastrianism, Monotheistic Religions, Demons

Zoroastrians Zoroastrians believes that Ahura Mazda is the one, good, and eternal god. A constant battle rages between a good and an evil force, and the good is to be worshipped. The term Ahura originally referred to 33 ruling gods in ancient, pre-Zoroastrian religions in Persia and India. Between Ahura Mazda and the humans is by a number of Attributes, called Amesha Spentas or Bounteous Immortals. Within the Gathas, which is the original Zoroastrian sacred text, these Immortals are sometimes described as concepts, and are sometimes personified. Zoroastrianism is based on the classic epic of good versus evil. Ahura Mazda or Ormuzd (the good and wise god) and Angra Mainya or Ahriman (the evil god) are always in conflict, but Ahura Mazda is assured eventual victory. The resulting cosmic conflict involves the entire universe, including humanity who is required to choose which to follow. Man was created by Ahura Mazda with free will; therefore, man takes part in the conflict between good and evil. It is necessary for all men to do what is right to not only enter heaven, but to help good triumph in the world. By a true confession of faith, by every good deed, word and thought, by constantly keeping pure his body and his soul, he impairs the power of Ahriman and strengthens the might of goodness, and establishes a claim of reward upon Ahura Mazda. By a false confession, by every evil deed, word and thought, and defilement, he increases the evil and renders service to Ahriman. Ahura Mazda, symbolized by fire and a winged ring, is expected to return and destroy all wicked people in a flood of molten metal. The end of the world will constitute the destruction of Ahriman and the resurrection of the dead into a creation of paradise on earth. Fire, seen as the ultimate symbol of Ahura Mazda, remains to this day a precious and sacred element representing the continuing presence of Ahura Mazda. Hence, in Zoroastrian shrines, the ritual flame must never be allowed to extinguish: the flame carries such import that the physical structure of the temple centers around maintaining its life. Due to the sacredness of the flame, the fire is dependant upon the priests to remain lit, these priests are required to constantly purify themselves in order not to contaminate it. Required is the use of the padan, a covering for the mouth and nose to prevent the priest's exhaled breath or saliva from making the sacred fire impure. So pure is the flame that in India, even the presence of a non-Zoroastrian in a consecrated place (such as the location of the fire or even the temple itself) is regarded as a contamination. Bibliography Encyclopedia.com. HP. 2000 [copyright]. Online. The Concise Columbia Electronic Encyclopedia, Third Edition Available: http://www.encyclopedia.com/articles/14202.html 03 Jan 2001 McGuinness, J Peter. Zoroastrianism. HP. 1999 [Copyright]. Online. Peter J McGuinness. Available: http://zoroastrianism.homepage.com. 03 Jan 2000 Religion

Saturday, March 7, 2020

Gatsby - nick carroway essays

Gatsby - nick carroway essays Nick Carraways character is both part of the story and at the same time the medium through which we perceive it. One must assume that because he is an independent character he is not a completely objective source of information. As everything in the novel passes through him there is no other un-biased source of information, so one must interpret his thoughts and opinions carefully. There is also another important factor about Nick Carraways narration that should be considered; he is a fictional character created by Fitzgerald and used by him as a tool for narration so anything that Carraway relates to the reader is simply Fitzgerald communicating to the reader by proxy. There fore he is telling the reader what Fitzgerald wants us to know, so his narration is at least reliable in that sense, although perhaps not always completely clear and objective he is nevertheless fundamentally reliable. Whether or not Nick Carraway is a likeable character or not is very central to the novel. One must ask whether Fitzgerald wants us to like him or not. This will govern the way that the reader interprets the opinions and descriptions that he relates to us. Crucially, the judgements that Nick sometimes passes on people will carry much more weight if the reader actually finds Nick an amenable character. Nicks opinions of him self are interesting...he tries to be as impartial as possible...he sees himself as an extremely tolerant person, willing to hear people out....says he does this from the advice of his dad...he likes people to be well behaved....he is perhaps slightly hyporitcal when he says that everything Gatsby represents he regards with unlimited scorn but then goes on to speak of his admiration for the man. Nicks opinions of himself can be very revealing, the first two pages of the novel are very interesting as he reflects upon his own character. His opinions of himself are quite high, he even admits to being so ...

Thursday, February 20, 2020

1.Water should be privatized rather than made a public good. 2.Water Essay

1.Water should be privatized rather than made a public good. 2.Water should be piped out of the Great Lakes to provide to water-restricted states - Essay Example te more social gains such as increased coverage and quality but on the other side, it creates low political benefits such as loss of employments as well as hiked prices (Mandri- Perrott 24). US has enjoyed abundant supply of water for the last half of 20C but considering the rate of poor water management practices as well as the persistent droughts, these privilege will surely last for a short time. As much as future generations will demand more water systems, climate change predicts to decrease the currently available supplies. A Government Accountability survey of the Unites states found out that water managers in 36 states are likely to face water shortages during the first two decades of this century. A sustainable approach to using water resources is the only remedy to ensure regulation of water usage besides ensuring supply of quality water to Americans. The remedy to this critical water situation may just be the privatisation of water sources instead of making it a public good (Mandri-Perrott 24). As much as others may claim that water is a natural resource and should not be economic, they are wrong because the same water faces the forces of economics such as supply and demand. Despite the fact that God gives water freely for all humanity, water has to go through various economic processes such as collection, management, processing, treating as well as packaging of drinking water( Frerot 104). In addition, to supply this water to the Americans, there has to be installation of expensive systems of reservoirs, channels, treatment plants as well as pipes. Those who claim that providing clean water by the government is a responsibility duty fail to understand that the government has to invest a lot (Frerot 104). The government cannot afford the investment needed in ensuring removal of dirty wastewater and human wastes in sanitation systems hence making privatization necessary (Mandri-Perrott 24). Water is a limited natural resource and humankind should

Tuesday, February 4, 2020

Journal of learning style Essay Example | Topics and Well Written Essays - 3000 words

Journal of learning style - Essay Example I decided to begin with a short ‘Study Skills Assessment’ questionnaire provided on-line by Columbia Basin University (Appendix 1), containing fifty-six questions; received feedback indicates that I could improve strategies used for reading as well as for concentration and memory. Thinking about this I wrote up a personal SWOT analysis in an attempt to find further evidence of my strengths and weaknesses. I found a downloadable example from Bristol Business School, belonging to the University of Western England (Appendix 2), which helped me with the questions I should ask myself. This exercise proved quite time consuming and needed much effort on my part to really think about and answer each question as fully and as honestly as I could; nevertheless I did persevere and ascertained my strengths as an outgoing, imaginative and very personable at a social level. My weaknesses include writing, especially long assignments or reports – this Journal assignment is not too difficult because it is broken into manageable sections, oral presentations and making decisions. The most useful aspect of this task was that it induced me to really think about my strengths and weaknesses, as well as any considered threats and how I intended to deal with them. Next I completed a learning approaches questionnaire (based on Approaches to Study Inventory (Tait & Entwistle 1996) and provided on-line by Bournemouth University (Appendix 3). Results indicate that I have a surface/passive approach to learning and that I tend to reproduce information and try to memorize subject matter rather than delving further or seeking to extend that information, that I keep closely to the syllabus provided by the lecturers and do not follow up interest of my own. At this point I wanted to know more, so because a discussion on learning styles is a component of this Learning Journal, I decided to spend time researching learning styles and

Monday, January 27, 2020

Phishing and Pharming Attacks

Phishing and Pharming Attacks In this report, it provides overview about phishing and pharming like what is phishing, what is pharming, what are the impacts that caused by phishing and pharming and what are the solutions can be apply to remediate or minimize the chance of being attack by phishing and pharming. Phishing are internet frauds or identity thefts that use to acquire or steal targeted victims sensitive information like personal identity data or financial account credentials. Phishing can be carried out by attackers using social engineering like sending email, through instant messaging (IM), peer to peer (P2P) networks, search engine and other techniques to redirect users to fraudulent website. Pharming is the new twist of internet fraud or identity theft. It is the evolutionary of phishing that used to achieve the same goal, but pharming is more sophisticated. Pharming can be carry out by using technical subterfuge such as DNS cache poisoning, domain hijacking and other techniques to redirect users to fraudulent website or proxy server to solicit users sensitive personal information. Phishing and pharming attack will cause financial impacts on the targeted victims or hard-hit to small organization. It will also cause the undermining of consumers confident in using internet over secure transaction or communication. Beside from this, phishing and pharming will also cause the law investigation become harder. Table of Content Summary2 Table of Content-3 Table of Tables and Figures4 Introduction-5 Method of Phishing Attack-6 2.1. Link Manipulation6 2.2 Filter Evasion7 2.3 Website Forgery7 2.4 Phone Phishing-8 2.5 Example of Phishing9 2.6 Phishing Report-10 Method of Pharming Attack13 How Pharming Works13 DNS cache poisoning16 Domain Hijacking16 Registration of similar sounding domains17 Impact caused by phishing / pharming18 Prevention of phishing and pharming20 Prevention: What to do?20 Prevention: What not to do?-21 Classic phishing defenses 21 Client-side21 Server-side22 Enterprise-22 Additional Pharming-Specific defenses23 Change Management, Monitoring and Alerting-23 Third-party Host Resolution Verification Services-24 DNS Server Patching, Updating and Configuration25 Search Engine Control-26 Conclusion-27 Recommendation29 Reference30 Bibliography31 Appendix32 Template 1.032 Template 2.034 TABLE OF TABLES AND FIGURES Figure 1-9 Figure 210 Figure 311 Figure 412 Figure 514 INTRODUCTION Phishing and Pharming are two of the most organized crimes of the 21st century requiring very little skill on the part of the fraudster. These result in identity theft and financial fraud when the fraudster tricks the online users into giving their confidential information like Passwords, Social Security Numbers, Credit Card Numbers, CVV Numbers, and personal information such as birthdates and mothers maiden names etc. This information is then either used by fraudsters for their own needs such as impersonate the victim to transfer funds from the victims account, purchase merchandise etc., or is sold in a variety of online brokering forums and chat channels for a profit. The Anti-Phishing Working Group (APWG) study indicates that 26,877 phishing attacks were reported in October 2006, a 21 percent increase over Septembers 22,136 attacks and an increase of 70% as compared to October 2005. Through these attacks the fraudsters hijacked 176 brands resulting in huge financial losses and loss of reputation to enterprises. The Gartner study reported that more than 2 million Americans have had their checking accounts raided by criminals in 2004, the average loss per incident being $1,2002. With phishers developing evermore sophisticated attacks, these numbers are bound to increase in the near future. Hence, battling these attacks has become a high priority for Governments and Industry Groups. METHOD OF PHISHING ATTACK Link Manipulation Most methods of phishing use some form of technical deception designed to make a link in an e-mail (and the spoofed website it leads to) appear to belong to the spoofed organization. Misspelled URLs or the use of sub domains are common tricks used by phishers, such as this example URL, http://www.yourbank.example.com/. Another common trick is to make the anchor text for a link appear to be valid, when the link actually goes to the phishers site, such as http://en.wikipedia.org/wiki/Genuine. An old method of spoofing used links containing the @ symbol, originally intended as a way to include a username and password (contrary to the standard). For example, the link http://[emailprotected]/ might deceive a casual observer into believing that it will open a page on www.google.com, whereas it actually directs the browser to a page on members.tripod.com, using a username of www.google.com: the page opens normally, regardless of the username supplied. Such URLs were disabled in Internet Explorer, while Mozilla and Opera present a warning message and give the option of continuing to the site or cancelling. A further problem with URLs has been found in the handling of Internationalized Domain Names (IDN) in web browsers, that might allow visually identical web addresses to lead to different, possibly malicious, websites. Despite the publicity surrounding the flaw, known as IDN spoofing or a homograph attack, no known phishing attacks have yet taken advantage of it.[citation needed] Phishers have taken advantage of a similar risk, using open URL redirectors on the websites of trusted organizations to disguise malicious URLs with a trusted domain. Filter Evasion Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails. 2.3 Website Forgery Once the victim visits the website the deception is not over. Some phishing scams use JavaScript commands in order to alter the address bar. This is done either by placing a picture of a legitimate URL over the address bar, or by closing the original address bar and opening a new one with the legitimate URL. An attacker can even use flaws in a trusted websites own scripts against the victim. These types of attacks (known as cross-site scripting) are particularly problematic, because they direct the user to sign in at their bank or services own web page, where everything from the web address to the security certificates appears correct. In reality, the link to the website is crafted to carry out the attack, although it is very difficult to spot without specialist knowledge. Just such a flaw was used in 2006 against PayPal. A Universal Man-in-the-middle Phishing Kit, discovered by RSA Security, provides a simple-to-use interface that allows a phisher to convincingly reproduce websites and capture log-in details entered at the fake site. To avoid anti-phishing techniques that scan websites for phishing-related text, phishers have begun to use Flash-based websites. These look much like the real website, but hide the text in a multimedia object. 2.4 Phone Phishing Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the phisher, and provided by a Voice over IP service) was dialed, prompts told users to enter their account numbers and PIN. Vishing (voice phishing) sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization. EXAMPLE OF PHISHING As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up windows. They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites. The following is an example of what a phishing scam e-mail message might look like. Figure 1: Example of a phishing e-mail message, which includes a deceptive URL address that links to a scam Web site. To make these phishing e-mail messages look even more legitimate, the scam artists may place a link in them that appears to go to the legitimate Web site, but it actually takes you to a phony scam site or possibly a pop-up window that looks exactly like the official site. These copycat sites are also called spoofed Web sites. Once youre at one of these spoofed sites, you might unwittingly send personal information to the con artists. PHISHING REPORT Figure 2: The number of websites hosting key logging crime ware systems raise by over 1,100, reaching 3,362, the second highest number recorded in the preceding 12 months. Web sense Security Labs believes much of this increase is due to attackers increasing ability to co-opt sites to spread crime ware using automated tools. Figure 3: The number of unique key logger crime ware variants detected in January reached a new high of 364, an increase of 1.4% from the previous high in October, 2007. Figure 4: Anti-Phishing Working Group, Phishing Activity Trends Report, June 2005 Phishing undermines consumer confidence. Corporate websites of valid, well-respected companies are being cloned to sell nonexistent products, or to get consumers to participate in money-laundering activities while believing that they are dealing with a legitimate organization. The public relations consequences for the company that has had its website cloned can be as severe as the financial losses. 3.0 METHOD OF PHARMING ATTACK You must be well aware of phishing and its potential to cause damage. They bait bank customers with genuine looking emails and manage to usurp money or personal information from unsuspecting customers with reasonable success. You are also aware that responding to mails sent by your bank may not be a good idea because banks never require to send emails to get your credentials. They have more secure channels to get that information. However, pharming attacks do not require an attacker to send mails. By carrying out pharming attacks, a criminal can get access to a wider target than phishing emails and as quickly as possible. Hence the ph effect on the word farming. They are not fishing, they are farming for gullible people! By the way, pharming is a real dictionary word. HOW PHARMING WORKS Pharming attacks do not take advantage of any new technique. They use the well known DNS cache poisoning, domain spoofing and domain hijacking techniques that have been around for quite long. However, the motives of carrying out these attacks have changed. Earlier they were interested in just disrupting services and causing nuisance. But now, the game has become a matter of money than that of chest thumping. These techniques continue to exist because administrators and website owners dont care to secure and monitor their DNS servers while they have invested millions of dollars in application firewalls. How a typical pharming attack is carried out: Figure 5: 1. The attacker targets the DNS service used by the customer. This server can be a DNS server on the LAN or the DNS server hosted by an ISP for all users. The attacker, using various techniques, manages to change the IP address of www.nicebank.com to the IP address of a web server which contains a fake replica of nicebank.com. 2. User wants to go the website www.nicebank.com and types the address in the web browser. 3. Users computer queries the DNS server for the IP address of www.nicebank.com. 4. Since the DNS server has already been poisoned by the attacker, it returns the IP address of the fake website to the users computer. The users computer is tricked into thinking that the poisoned reply is the correct IP address of the website. The user has now been fooled into visiting fake website controlled by the attacker rather than the original www.nicebank.com website. Once the attacker has managed to get the user to visit the fake website, there are many ways in which the user can be tricked into revealing his / her credentials or giving out personal information. The beauty, or lets say, the notoriety of pharming over phishing is evident from the fact that one successful attempt in poisoning the DNS server can be potentially used to trick all the users of that DNS service. Much less effort and wider impact than phishing. DNS cache poisoning All DNS servers cache the queries that users have made for a certain period of time. This is done to speed up the responses to users for frequently used domains. This cache maintained by the DNS server can be poisoned by using malicious responses or taking advantage of vulnerabilities in the DNS software itself. Domain Hijacking This is an actual incident that took place a year ago. Panix, an ISP based in New York was the target of a domain hijack attack. All domains are typically registered with registrars which store information about the owner of a domain and location of the domains DNS servers. If any of this information is required to be changed, the approval of the domain owner is required. A domain owner can even switch registrars depending on costs and convenience. However, confirmation of the switch is required from all three parties, the domain owner, the old registrar and the new registrar. In case of Panix, a change was initiated by an unknown person in Australia. The person managed to skip confirmation from the old registrar and the domain owner. This was because the new registrar was not following the domain transfer process strictly. The result was, the unknown person managed to gain control over the panix.com domain completely. The person managed to divert all the web traffic of panix.com and customer emails to another server located in Canada. Domain hijacking has the widest impact because the attacker targets the domain registration information itself. Registration of similar sounding domains Similar sounding or similar looking domains are another source of security issues for internet users. An attacker can register a domain www.n1cebank.com and carry out pharming and phishing attacks on unsuspecting customers who dont notice the difference in the letter i being replaced by a 1. Also domain names created by typos on the original words (e.g. www.nicebqnk.com) manage to attract a lot of traffic. One such study on a popular domain cartoonnetwork.com shows that one in four people visiting the website incorrectly type a simple name like cartoonnetwork.com. So what about typo domains? One quick search in Google reveals that it is quite a big concern. An attacker can easily buy typo domains and setup his fake website on these domains to fool unsuspecting visitors. IMPACT CAUSED BY PHISHING AND PHARMING There are impacts that caused by rising of phishing and pharming. One of the impacts that caused by phishing and pharming is the lost of financial on both organizations and consumers. According to the InternetNews.com, there are about $1.2 Billion lost in financial of banks and credit card issuers at year 2003, while at year 2004, there is about  £12 Million lost in financial reported by the Association of Payment Clearing Services in United Kingdom. Due to the credit card association policies, the online merchants that accepted and approved transactions made by using credit card numbers which solicit through internet fraud may need to liable for the full amount of those transactions. This may cause hard-hit to those small organizations. Another impact that caused by phishing and pharming is the undermining of the consumers trust in the secured internet transaction or communication. This situation occurred because the internet fraud like phishing and pharming made consumer feel uncertain about the integrity of the financial and commercial websites although the web address display in the address is correct. Phishing and pharming also caused some impact on the Law investigation. It makes the law investigation become harder because the technique that used by attackers to perform phishing and pharming is more sophisticated. In nowadays, those attackers can perform all of the phishing and pharming attack at a location that provided with the internet connection. With the available of internet connection, they can make use of it to perform attacking activities. Those activities included the control of a computer located in one place to perform phishing and pharmings attack by using computer located at another place. The investigation become harder also because of the division of attacking tasks to several people located in different locations. PREVENTION OF PHISHING AND PHARMING Pharming attacks tend to be harder to defend against that traditional Phishing attacks due to the distributed nature of the attack focus and the use of resources not under the control of the victim organisation.   In addition, the manipulation of the DNS resolution process occurs at such a fundamental level that there are very few methods available to reliably detect any malicious changes. 5.1 PREVENTION WHAT TO DO? By using anti-virus software, spyware filters, e-mail filters and firewall programs and make sure that they are regular updated to protect your computer. Ensures that your Internet browser is up to date and security patches applied. Be suspicious of any e-mail with urgent requests for personal financial information or threats of termination of online account. Dont rely on links contained in e-mails, even if the web address appears to be correct, and use only channels that you know from independent sources are reliable (e.g., information on your bank card, hard copy correspondence, or montly account statement) when contacting your financial institution. When submitting credit card or other sensitive information via your Web browser, always ensure that youre using a secure website. Regularly log into your accounts. Regularly check your bank, credit and debit card statements to ensure that all transaction are legitimate. PREVENTION WHAT NOT TO DO? Dont assume that you can correctly identify a website as legitimate just by looking at its general appearance. Dont use the link in an e-mail to get to any web page, if you suspect the message might not be authentic. Avoid filling out forms in an e-mail messages or pop-up windows that ask for personal financial information. CLASSIC PHISHING DEFENCES Many of the defences used to thwart phishing attacks can be used to help prevent or limit the scope of future Pharming attacks. While readers are referred to the detailed coverage of these defence tactics explained in The Phishing Guide, a brief summary of these key defences is as follows: Client-Side Desktop protection technologies Utilisation of appropriate, less sophisticated, communication settings User application-level monitoring solutions Locking-down browser capabilities Digital signing and validation of email General security awareness 5.3.2 Server-Side Improving customer awareness Providing validation information for official communications Ensuring that the Internet web application is securely developed and doesnt include easily exploitable attack vectors Using strong token-based authentication systems Keeping naming systems simple and understandable 5.3.3 Enterprise Automatic validation of sending email server addresses, Digital signing of email services, Monitoring of corporate domains and notification of similar registrations, Perimeter or gateway protection agents, Third-party managed services. ADDITIONAL PHARMING-SPECIFIC DEFENCES While Phishing attacks typically use email as the attack delivery platform, Pharming attacks do not require any email obfuscation attacks to succeed therefore Phishing defences that rely upon email security play a lesser role. The defences that will be most successful in preventing Pharming attacks focus upon the following areas: Change management, monitoring and alerting Third-party host resolution verification DNS server patching, updating and configuration Search engine control 5.4.1 Change Management, Monitoring, and Alerting The potential for an administrator or other authoritative employee to maliciously modify DNS resolution information without detection is great.   As financial incentives increase, organisations and ISPs will need to ensure that adequate change control, monitoring and alerting mechanisms are in place and enforced. It is recommended that: Wherever editing is possible, access to DNS configuration files and caching data is limited to approved employees only. A change management process is used to log and monitor all changes to DNS configuration information. Auditing of DNS record changes is instigated by a team external to any DNS administrative personnel; with automatic alerting of changes conducted in real time. Regular audits and comparative analysis of secondary DNS and caching servers should be conducted. Third-party Host Resolution Verification Services Toolbars Many third-party developed plug-in toolbars originally designed to detect Phishing attacks are deceived by Pharming attacks.   Typically, these Phishing toolbars show the IP address and reverse lookup information for the host that the browser has connected to, so that customer can clearly see if he has reached a fake site.   Some managed toolbars (normally available through a subscription service) also compare the host name or URL of the current site to an updatable list (or real-time querying) of known phishing sites. Some toolbars now offer limited anti-pharming protection by maintaining a stored list of previously validated good IP addresses associated with a particular web address or host name.   Should the customer connect to an IP address not previously associated with the host name, a warning is raised.   However, problems can occur with organisations that change the IP addresses of their online services, or have large numbers of IP addresses associated with a particular host name. In addition, some toolbars provide IP address allocation information such as clearly stating the geographic region associated with a particular netblock.   This is useful for identifying possible fake Pharming sites that have been setup in Poland pretending to be for an Australian bank for instance. Server Certificates To help prevent pharming attacks, an additional layer can be added to the authentication process, such as getting the server to prove it is what it says it is.   This can be achieved through the use of server certificates. Most web browsers have the ability to read and validate server identification certificates.   The process would require the server host (or organisation) obtain a certificate from a trusted certificate authority, such as Verisign, and present it to the customers browser upon connection for validation. 5.4.3 DNS Server Patching, Updating and Configuration As with any Internet-based host, it is vial that all accessible services be configured in a secure manner and that all current security updates or patches be applied.   Failure to do so is likely to result in an exploitation of any security weaknesses, resulting in a loss of data integrity. Given the number of possible attacks that can be achieved by an attacker whom manages to compromise an organisations DNS servers, these hosts are frequently targeted by attackers.   Therefore it is vital that security patches and updates be applied as quickly as possible typically organisations should aim to apply fixes within hours of release. Similarly, it is important that organisations use up to date versions of the service wherever possible.   As we have already discussed in section 3.6, each new version of the DNS software usually contains substantial changes to protect against the latest attack vectors (e.g. randomising DNS IDs, randomising port numbers, etc.) 5.4.4 Search Engine Control Internet search engines are undergoing constant development.   Many of the methods used by attackers to increase their page ranking statistics are known of by the search engine developers, and a constant cycle of detection and refinement can be observed by both parties.   For instance, Google modified its search algorithm to reset the page rank statistics of web sites that had recently changed ownership this was to reduce the impact of instant backlinks and the weighting they attach to a ranking. Traditionally the emphasis on increasing a pages ranking has been for revenue or lead generation most closely associated with advertising.   However, the increasing pace at which customers are relying upon search engines to access key services (such as online banking) means that a Pharmer who can get his fake site ranked at the top is likely to acquire a high number of victims. Organisations should ensure that they regularly review keyword associations with their online services.   Ideally automated processes should be developed to constantly monitor all the popular search engines for key search words or phrases customers are likely to use to locate their key services.   It is also important that region-specific search engines also be monitored. CONCLUSION The term phishing is about the use of social engineering by performing online imitation of brands to send spoof email that contain of hyperlink to fraudulent website to solicit users sensitive personal information like credit card number, PIN, mothers maiden name and etc. Phishing can also be done through installing keylogger at users computer. Pharming use technical subterfuge like DNS cache poisoning, domain hijacking, routers setting or firmware malconfiguration to redirect users to a fraudulent website. Pharming may also perform by sending the targeted victims an email that contained of viruses or Trojan horse that will install small application that will redirect user to fraudulent website. There are impacts that caused by both phishing and pharming. Those impacts included the lost of financial, undermining of user confident in secured online transaction or communication, hard hit to small organizations and cause the law investigation harder. As a web developer, SSL certificate, switching of the recursion queries or DNS security extension should be apply because it can protect the DNS or website from phishing and pharming attack. Visual clues can also be use so that user can easily differentiate between authentic website and fraudulent website. Token based authentication also one of the technique that can be apply to protect the website or DNS server from phishing and pharming attack. Users are also responsible to protect their self from phishing and pharming attack by not opening email or download attachment from unknown sender or email that required user to respond by clicking on the hyperlink contained in the email. User should also double confirm the URL at the address bar when a warning message like SSL certificate do not match with the sites appear. User can also install security suite or firewall in the computer in order to protect user from phishing and pharming. User can also look for the lock or key icon at the bottom of the browser that lock the site they want to enter their sensitive personal information. As a user, we can also report the attack of phishing and pharming to the related agencies or company through internet or telephone to assist the work of minimize the attack. In addition, laws are also being introduced to against phisher and pharmer. RECOMMENDATION To prevent from becoming the victims of phishing and pharming, I suggest to users that must install security suite or firewall in their computer and the detection signature of the security suite should be up to date. Besides from this, I also suggest that users should beware in opening any email or attachment that they receive in order to prevent their self from becoming the victims of phishing and pharming. I also suggest to web developers that they should use SSL certificate, switch off the recursion queries, install DNS security extension in protect

Sunday, January 19, 2020

Dramatic Dialogue Analysis Essay

Language is a natural process of living. It plays a great part in our lives. Its effects are remarkable, and include much of what distinguishes man from animals. We use it to interact with one another, to construct and maintain our interpersonal relations and order. In doing so, we interpret and represent the world for one another and for ourselves. Language is used to store the experiences built up, both personal and collective. It is a tool for constructing knowledge and for constructing meaning. The study of language is an inquiry into the nature of mind and thought on the assumption that languages are the best mirror of the human mind (Stainton, 1999). Analysis of everyday language use affirms that it is in the realm of art that their challenges are most evident and tangible (Gerbig and Muller-Wood, 2006). Linguistics shares a common tradition with literary study. Not so long ago, language and literature were studied together by philologists, who saw the study of both areas as mutually beneficial. Later development and the advent of specialization in both fields have oven produced scholars whose work does not cross over form one field to another (Oaks, 1998). Even so, scholars in either discipline regularly voice the truism that there is natural conjunction between literature and linguistics. After all, both fields deal with the raw material of human communication and expression – language. There is a need for interdisciplinary cooperation between the disciplinary identity of linguistics as empirical and descriptive while literary study being interpretative and analytical (Gerbig and Muller-Wood, 2006). Linguistics helps us to â€Å"trust the text† (Gerbig and Muller-Wood, 2006), to interpret the text, rather than impose interpretations upon on it. Application of linguistic empirical tools to literature may not lead to ultimate truths. It can nevertheless bring precision to otherwise often impressionistic treatment of text. There is a need to treat text as interchangeable products of a discursive system. Mogliola (1981) posed the question: â€Å"what are the structural conditions for the valid reading of a text, in so far as these conditions are revealed by a phenomenology of interpretative experience? † Heideggerian hermeneutics takes as its origin the pre-objective oneness of interpreter and phenomenon (be the literary text) – sees in interpretation a reading that is faithful to this oneness. Interpreter is never neutral, but always approaches a text with an explicit or implicit question. Interpretative activity manifests three functions: the interpretative question, the textual aspect, and the interpretation which is the meaning. Any given interpretative question should select and illuminate its affiliated â€Å"textual aspect†, an aspect which is there is the text. Linguistics can place literature more firmly and credibly in its context for other aspects of meaning depend more on the context and the communicative intention of the speakers. Communication clearly depends not only on recognizing the meaning of words in an utterance, but recognizing what speakers mean by their utterances. The principles and rules of grammar are the means by which the forms of language are made to correspond with the universal form of thought. The study of generative grammar represented a significant shift of focus in the approach to problems of language. The shift focus was from behavior or the products of behavior to states of mind/brain that enter into behavior, the central concern becomes knowledge of language: its nature, origins, and use. The three basic questions arise: ‘What constitute knowledge of language? ’, ‘How is knowledge of language acquired? ’, and ‘How is knowledge of language put to use? ’. The answer to the third question would be a theory how the knowledge of language attained enters into the expression of thought and the understanding of presented specimen of language, and derivatively, into communication, an other special uses of language (Stainton, 1999). The third question takes an important part in this study, particularly in the performance of the language which main purpose is communication. Communication is conceived as a relation that binds together the three elements: sender, receptionist, and topic. Corresponding to the three elements are three distinct functions: expression, appeal, and representation. These functions consist communicative function depending on what takes the center-stage. The function does exclusively what is represented or depicted in the communicative act. The three functions become the explicit focus of conversation (Medina, 2005). Alongside communication is conversation. Smith (2001) describes conversation as a process of two people understanding each other. Thus it is a characteristic of every true conversation that each opens himself to the other person, truly accepts his point of view as worthy of consideration and gets inside the other to such an extent that he understands not a particular individual, but what he says. The thing that has to be grasped is the objective rightness or otherwise of his opinion, so that they can agree with each other as a subject. Furthermore, in conversation, knowledge is not fixed thing or commodity to be grasped. It is an aspect of process. It arises out of interaction. In conversation, there is a to-and-fro play of dialogue. Dialogue is the encounter between men, mediated by the world, in order to name the world. It is culturally and historically specific way of conceiving certain verbal transactions and as such has considerable rhetorical force (Maranhao, 1990). The root sense of dialogue is that of talk (logos) that goes across or back and forth (dia). In contemporary English, dialogue is a conversation of two persons. At formal level, it is an economics of verbal exchange. In the functional usage of dialogue, a text or social interaction is treated as a social field across which multiple voices and multiple cultural logics contend with each other (Tedlock and Mannheim, 1995). What makes something as dialogue? The spirit of its participants of the form its utterances take? In Plato’s inception, dialogue has always been and continues to be programmatically liminal: interstructural, between two states or conditions, essentially unstructured rather than structured by contradictions; because of its deliberate avoidance of closure and finality. It serves perpetually as a vehicle for reformulating old elements into new patterns. Dialogue provides a meeting ground, community, and manifests itself in a variety of spontaneous and ritual modes of discourse in which nature and structure meet. Understood as a conceptualization of a kind of discourse and also a way of viewing and interpreting discourse, dialogue shares with narrative the characteristic of being atemporal, existing in many times and places. As discourse phenomena, it is internally atemporal. It does not talk about events in time; instead it spans in ‘dialectic event (i. e, discourse event) and meaning’; it presents utterances, ideas, and undertakings in nonlinear, recursive, diaeretical, and synthesizing sequences (Maranhao, 1990). Treating dialogue as an ideal evidently has an ethical implication. Furthermore, when a particular mode of communication is chosen as a model of dialogue, it becomes identified with the sense of goodness or rightness adhering in the ideal to the exclusion of other modes of communication. (Maranhao,1990). Spoken and written languages are what Maranhao (1990) termed as modes of communication. Although written and spoken languages are very different, they are not easy to separate. In fact, they are closely intertwined, and in daily life people participate in literacy events where reading and writing are mixed with spoken language and with other means of communication. Writing is based on speech in some very real ways; spoken language is the basis for the most people’s learning of written language, for instance, and the very form of written language gets inspiration form spoken language. However, other aspects of communication come into play with written language. Most significantly, it is visual: laid out in some way and displayed. The importance of the role design, layout and other aspect of the physical context should be evident and they form part of what is meant by writing. Writing enables us to go much further than spoken language: its ability to fix things in space and time. Writing results in text. It extends the functions of language, and enables to do different things (Barton, 2006). It is in the realm of art where study of language is evident and tangible. Dramatic dialogue, the interplay between written and spoken language, fits for the study. It is therefore desirous to investigate the workings of dramatic dialogue. Dramatic dialogues usually serve a number of purposes such as developing the plot, and presenting the characters and providing information about them. Playwrights attempt to achieve balance between some features of actual speech and the employment of dialogue by putting not too much closeness to actual speech so as not to make dialogues dull and uninteresting (Al-Rubai’i and Al-ani, 2004). Dramatic dialogues (plays) exist in two ways – on the page and on the stage. It is therefore necessary to adhere to the argument that sensitive understanding of plays (explicitly contains dramatic dialogue) can be arrived at through â€Å"mere reading† through linguistic analyses that dramatic text contains very rich indications as to how they should be performed. Dramatic dialogue takes into account that one crucial aspect in which drama differs from poetry and fiction is in its emphasis on verbal interaction, and the very relationship between people are constructed and negotiated through what they say. It is where linguistics takes into its own. Linguistics, and the techniques of discourse analyses in particular, can help analyze the exchanges between characters, in order to: help us understand the text, help us understand how conversation works, and allow us to appreciate better the skill demonstrated by the playwright (Thornborrow and Wareing, 1998). Chapter 2 Dialogue as discourse is characterized by a fundamental structural principle: it is interactive and interactional. It is a mode of speech exchange among participants, speech in relation to another speech not merely the verbal expression of one character or actors’ part. In the study of dialogue as interaction, the dramatic text as written text, addresses a context of performance which requires a change in mode of discourse – the transformation and transmutation of the written lines into dynamics of speech, which involve more than recitation of the lines by the actors (Herman, 1995). In the study of dramatic dialogue, understanding the workings of the dialogue as interaction and conversational speech versus dramatic speech are taken into account. It is also important to note that dramatic dialogue, taking part in the speech exchange system, must be safeguarded from conversation in order to preserve the formers’ ‘literary’ quality (Herman, 1995). In the construction of conversational practices and actions, participants use co-occurring structures and devices from different levels of linguistic organization as well as the employment of linguistic features in conversation. In the linguistic analyses of dramatic dialogue, Gricean semantics and analyses on the linguistic features: turns, pauses or silences, adjacency pairs, chaining, and back channel support, will be employed. According to Gricean Semantics, in ordinary conversation exchanges, there is much more to the meaning of an utterance than what appears on the grammatical and logical surface: utterances often convey things other than what they literally mean and they often imply things other than what they strictly entail. The adequate understanding of meaning requires the processing of what has been termed as ‘an invited inference’. Grice formulated the maxims as follows: ‘Make your contribution to the conversation as informative as possible, but not more informative or less informative that is required (Maxims of Quantity); ‘Do not say what you believe to be false’ and ‘Do not say that which for you lack adequate evidence (Maxims of Quality); ‘Avoid obscurity’, ‘Avoid ambiguity’, ‘Be brief’, Be orderly’ (Maxims of Manner), and ‘Be relevant’ (Maxims of Relevance). According to Grice, all these different maxims are corollaries of the most fundamental principle of communication that governs all conversation. This is what he called as Cooperative Principle which read as follows: ‘Make your conversational contribution such as is required, at the stage at which it occurs by the accepted purpose or direction of the talk-exchange in which you all engaged. ’ (Medina, 2005). The central premise of the Gricean approach is that the communicative intention of a normal speaker under normal circumstances conforms to the cooperative principle and the conversational maxims that derive from it. For Gricean semantics, the speakers’ conversational contributions are governed first and foremost by these general rules of cooperative communication, rather than by the semantic conventions that fix word-meanings and sentence-meanings. It is also important to note that intended meanings of speakers can depart sometimes even wildly like that of ironic utterances. Grice’s analyses of intended meanings put a lot of weight in the speaker’s communicative intentions undermining the traditional emphasis on linguistic conventions, which on his view become mere tools to be used and bent in all kinds of ways (Medina, 2005). One of the linguistic features in conversation which tends to be modified in dramatic dialogue is the way turns are taken, the way people having a conversation organize who is going to speak next. Schegloff (1995) had the idea that syntax of spoken language in interaction should be looked upon as resource that is deployed and exploited for the organization of turns and sequence in conversation. Turn-taking is one important communication skill emerging during preverbal routines. It is a mechanism use to reorganize conversation so that interactants smoothly exchange speaking consequences. Through turn-taking, participants coordinate their conversational contributions to each other. Turn-taking works as the onset of dialogue and is a prerequisite for latter emergence of communicative rule (Haslett and Samter, 1997). In general, for the construction of conversational practices and actions, participants use co-occurring structures and devices from different levels of linguistic organization, not only from prosodic, phonetic-phenological, but also form morpho-syntactic and lexico-semantic structures in turns-at-talk in their sequential context. The possible types for turn constructional units (TCU), for English, are sentential, clausal, phrasal, and lexical. Syntactic units are important resources for the construction of TCU and turns. TCU is a linguistic unit in talk constructed in the interplay of syntax and prosody in its sequential context. For spoken language in interaction, syntactic entities like sentences are not to be conceived as static or fixed, but flexible. That is why when talking about transmission relevance placed as the relevant loci for the negotiation of turn-taking; ends of sentences, clauses or phrases etc. are not talked about but the ‘possible completion points’ of sentences, clauses, phrases, and one-word construction. It is the flexibility of the possible syntactic unit that enables them to be used for the organization of turn-taking in conversation (Hakulinen and Selting, 2005). In the construction of conversation, participants are not concerned with the construction of units as such, but the construction of units is contingent upon practices or activities such as holding, organizing, and yielding the turn. TCUs are not themselves relevant for participants, but for the practices and activities of turn-taking and activity constitution (Haslett and Samter, 1997).

Saturday, January 11, 2020

They Are Made Out of Meat

They’re Made Out of Meat is a short story by Terry Bisson. It consists entirely of dialogue between two characters. The beginning of this dialogue seems to be rather strange and incomprehensible; the characters are speaking about meat and it is difficult to understand what this â€Å"meat† means in this particular context. But gradually the reader begins to tune in, and soon he finds out that they use the word â€Å"meat† to imply human beings. And these two creatures themselves are aliens, sentient beings that are capable of travelling faster than light and their mission is to meet with human beings, to welcome them and to set contacts with them. The fact that they use such words as Orfolei, Weddilei, C space, G445 zone proves that they come from a different planet (from outer space). The speech of the creatures is rather informal. There are a lot of contracted forms, colloquial words and elliptical sentences in their conversation (â€Å"They’re made out of meat. †; â€Å"That’s impossible. †; â€Å"†¦they’re like†¦Ã¢â‚¬ ; †¦crackpots†¦, â€Å"A dream to meat! †). This fact proves that they know each other well and besides they are absorbed in the topic of their conversation and do not pay much attention to their speech. Judging by the dialogue, it is obvious that one of the creatures is better aware of the way people are organized (â€Å"I’m not asking you, I’m telling you. These creatures are the only sentient race in the sector and they’re made out of meat. †). And he tries to explain it to the other one who is skeptical and incredulous (â€Å"That’s impossible. †; â€Å"That’s ridiculous. †; Thinking meat! You’re asking me to believe in thinking meat! †). The situation is really incredible and at first the second creature does not believe in the story, but a bit later accept this theory as true (â€Å"Omigod. You’re serious then. They’re made out of meat. † â€Å"Finally, Yes. †). The story represents a critical glance from outside at humans’ behaviour. The aliens consider human beings to be curious and predictable (â€Å"†¦they’ve been trying to get in touch with us for almost a hundred of their years. †; â€Å"First it wants to talk to us. Then†¦to explore the universe, contact other sentients, swap ideas and information. The usual. â€Å"). Besides people are viewed as inferior creatures (â€Å"†¦but what do you think is on the radio? Meat sounds. You know how when you slap or flap meat it makes a noise? They talk by flapping their meat at each other. â€Å"; â€Å"It seems harsh, but there is a limit. Do we really want to make contact with meat? â€Å"). So, taking into accounts all these points, the aliens decide not to fulfill their initial mission. They come to a conclusion that it is better to ignore â€Å"meat†, erase all the records and mark this sector unoccupied. The thing is that they are sure that they know a lot about humans, but in fact they do not know anything. They consider themselves to be much more superior, they feel themselves to be the centre of gravity. But actually, they are biased and hostile towards human beings just because humans are different. The whole story rolls around the concept of meat. First of all the repetition of this word sets the rhythm. Besides the meat is personified and it makes the story funny and humorous. (â€Å"†¦thinking meat, conscious meat, loving meat, dreaming meat†¦Ã¢â‚¬ ). The fact that these creatures are talking like humans also provides humorous effect. (â€Å"Omigod.  Singing meat. This is altogether too much! †). At first it may even seem that they are scientists or researchers, who are discussing a recent experiment or discovery in the sphere of astronomy. The topic of the story is the relation between different creatures, nationalities and civilizations. The author is mocking these two characters because of their hostile and stereotypical attitude towards other creatures and civilizations; and wants to show that it is important to be patient, clarify controversial things and not to be too presumptuous.

Friday, January 3, 2020

Biography of Jose Maria Morelos, Mexican Revolutionary

Josà © Marà ­a Morelos (September 30, 1765–December 22, 1815) was a Mexican priest and revolutionary. He was in overall military command of Mexico’s Independence movement in 1811-1815 before the Spanish captured, tried, and executed him. He is considered one of the greatest heroes of Mexico and countless things are named after him, including the Mexican state of Morelos and the city of Morelia. Fast Facts: Jose Maria Morelos Known For: Priest and rebel leader in the war for Mexican independenceAlso Known As: Josà © Marà ­a Teclo Morelos Pà ©rez y Pavà ³nBorn: September 30, 1765 in Valladolid,  Michoacà ¡n,  New SpainParents: Josà © Manuel Morelos y Robles, Juana Marà ­a Guadalupe Pà ©rez Pavà ³nDied: December 22, 1815  in San Cristà ³bal Ecatepec,  State of Mà ©xicoEducation: Colegio de San Nicolà ¡s Obispo in Valladolid, Seminario Tridentino in Valladolid, Universidad Michoacana de San Nicolà ¡s de HidalgoAwards and Honors:  The Mexican state of  Morelos  and city of  Morelia  are named after him, and his picture is on the 50-peso noteSpouse: Brà ­gida Almonte (mistress; Morelos was a priest and could not marry)Children: Juan Nepomuceno AlmonteNotable Quote: May slavery be banished forever together with the distinction between castes, all remaining equal, so Americans may only be distinguished by vice or virtue. Early Life Josà © Marà ­a was born into a lower-class family (his father was a carpenter) in the city of Valladolid in 1765. He worked as a farm hand, muleteer, and menial laborer until entering the seminary. The director of his school was none other than Miguel Hidalgo (leader of the Mexican revolution) who must have left an impression on the young Morelos. He was ordained as a priest in 1797 and served in the towns of Churumuco and Carà ¡cuaro. His career as a priest was solid and he enjoyed the favor of his superiors. Unlike Hidalgo, he showed no propensity for dangerous thoughts before the revolution of 1810. Morelos and Hidalgo On September 16, 1810, Hidalgo issued the famous Cry of Dolores to kick off Mexicos struggle for independence. Hidalgo was soon joined by others, including former royal officer Ignacio Allende, and together they raised an army of liberation. Morelos made his way to the rebel army and met with Hidalgo, who made him a lieutenant and ordered him to raise an army in the south and march on Acapulco. They went their separate ways after the meeting. Hidalgo would get close to Mexico City but was eventually defeated at the Battle of Calderon Bridge, captured shortly thereafter, and executed for treason. Morelos, however, was just getting started. Morelos Takes up Arms Ever the proper priest, Morelos coolly informed his superiors that he was joining the rebellion so that they could appoint a replacement. He began rounding up men and marching west. Unlike Hidalgo, Morelos preferred a small, well-armed, well-disciplined army that could move fast and strike without warning. He would often reject recruits who worked the fields, telling them instead to raise food to feed the army in the days to come. By November, he had an army of 2,000 men and on November 12, he occupied the medium-sized town of Aguacatillo, near Acapulco. Morelos in 1811-1812 Morelos was crushed to learn of the capture of Hidalgo and Allende in early 1811. Still, he fought on, laying an abortive siege to Acapulco before taking the city of Oaxaca in December of 1812. Meanwhile, politics had entered the struggle for Mexican independence in the form of a Congress presided over by Ignacio Là ³pez Rayà ³n, once a member of Hidalgos inner circle. Morelos was often in the field but always had representatives at the meetings of Congress, where they pushed on his behalf for formal independence, equal rights for all Mexicans, and continued privilege of the Catholic Church in Mexican affairs. The Spanish Strike Back By 1813, the Spanish had finally organized a response to the Mexican insurgents. Felix Calleja, the general who had defeated Hidalgo at the Battle of Calderon Bridge, was made Viceroy, and he pursued an aggressive strategy of quashing the rebellion. He divided and conquered the pockets of resistance in the north before turning his attention to Morelos and the south. Celleja moved into the south in force, capturing towns and executing prisoners. In December of 1813, the insurgents lost a key battle at Valladolid and were put on the defensive. Morelos’ Beliefs Morelos felt a true connection to his people, and they loved him for it. He fought to remove all class and race distinctions. He was one of the first true Mexican nationalists and he had a vision of a unified, free Mexico, whereas many of his contemporaries had closer allegiances to cities or regions. He differed from Hidalgo in many key ways: he did not allow churches or the homes of allies to be looted and actively sought support among Mexico’s wealthy Creole upper class. Ever the priest, he believed it was God’s will that Mexico should be a free, sovereign nation: the revolution became almost a holy war for him. Death By early 1814, the rebels were on the run. Morelos was an inspired guerrilla commander, but the Spanish had him outnumbered and outgunned. The insurgent Mexican Congress was constantly moving, trying to stay one step ahead of the Spanish. In November of 1815, the Congress was on the move again and Morelos was assigned to escort it. The Spanish caught them at Tezmalaca and a battle ensued. Morelos bravely held off the Spanish while the Congress escaped, but he was captured during the fighting. He was sent to Mexico City in chains. There, he was tried, excommunicated, and executed on December 22. Legacy Morelos was the right man at the right time. Hidalgo started the revolution, but his animosity toward the upper classes and his refusal to rein in the rabble that made up his army eventually caused more problems than they solved. Morelos, on the other hand, was a true man of the people, charismatic and devout. He had a more constructive vision than Hidalgo and exuded a palpable belief in a better tomorrow with equality for all Mexicans. Morelos was an interesting mixture of the best characteristics of Hidalgo and Allende and was the perfect man to carry the torch they had dropped. Like Hidalgo, he was very charismatic and emotional, and like Allende, he preferred a small, well-trained army over a massive, angry horde. He notched up several key victories and ensured that the revolution would live on with or without him. After his capture and execution, two of his lieutenants, Vicente Guerrero and Guadalupe Victoria, carried on the fight. Morelos is greatly honored today in Mexico. The state of Morelos and city of Morelia are named after him, as are a major stadium, countless streets and parks, and even a couple of communications satellites. His image has appeared on several bills and coins throughout Mexicos history. His remains are interred at the Column of Independence in Mexico City, along with other national heroes. Sources Estrada Michel, Rafael. Josà © Marà ­a Morelos. Mexico City: Planeta Mexicana, 2004Harvey, Robert. Liberators: Latin Americas Struggle for Independence. Woodstock: The Overlook Press, 2000.Lynch, John. The Spanish American Revolutions 1808-1826. New York: W. W. Norton Company, 1986.