Friday, May 31, 2019

Go Kart History :: Racing Entertainment Essays

Go Kart History Do you ever hear the word karting? Many bulk still dont know what karting is. They try to relate it to the cart the basket to take your things from the market with the wheels on it. In this situation, kart means the miniature of car racing, especially Formula superstar (F-1) cars. And karting means racing of using a kart. Maybe if I say go kart, you will know what I am talking about. Actually go kart is a trademark of karting. It is the manufacturing company that originated karting in 1958. The recital and accessories of karting are important in order to get started in karting. The history of the go kart is quite interesting. To begin with, there were two guys whose names were Duffy Livingstone and Roy Desbrow. They were partners in a muffler business in Monrovia, California. Both were experts in welding components. One time, they saw Art Ingles one off creation (model of the car). Then they were inspired to make their own versions. Duffy built a couple for their friends. And there was other guy whose name was Bill Rowles, a salesman of surplus materials in Los Angeles. He visited their muffler shop very often. He also got inexpensive engines from a failed western United States Bend rotary lawn mower venture. These three individuals formed a loose partnership to produce and sell kit components for go karts. One day, when they are relaxing in the small office at their muffler shop, the postman came by with many envelopes. These envelopes brought about thirty orders for that day. The demand became constant in the following days, so they thought that they needed to change their business. They formed a good deal for the company called Go Kart manufacturing and leased a five acre facility in Azusa from AeroJet General Corporation. This corporation had six stockholders. Duffy Livingstone, Roy Desbrow, and Bill Rowles were the primary stockholders. Other stockholders were Jim Patronite (the companys accountant, who later formed Azusa Engineeri ng), Don Boberick, and the companys office manager. In 1962, Art Linkletter Enterprises precious to buy the shares for $750,000. But Go Kart declined the offer because the proposal gave the Linkletter group management of Go Kart mfg and Go Kart didnt trust the Linkletter group ability to manage the Go Kart mfg. However, in less than a year, Go Kart hired a very experienced, energetic and enthusiastic person to manage the sales.

Thursday, May 30, 2019

Essay on the Gift of Life in Shakespeares Sonnet 16 -- Sonnet essays

The Precious Gift of Life Revealed in Sonnet 16    Throughout literature authors attempt to control the passage of clock time through their works.  In William Shakespeares Sonnet 16 he addresses this subject through the use of literary devices.  These devices indicate how the progress of seasons cannot be controlled by words alone.  The tone ending of time is displayed through paradox and imagery, but it is overcome by the ceaseless life of progeny, unlike the feeble words of Shakespeares sonnet.   Change and age help decide time.  Shakespeare uses paradox to help convey change and relate it to the past.  He says to fortify yourself in your decay, (3) which tells the reader that a stronger being and a stronger state of remembrance should be attained before death.  Though Shakespeare attempts to endure time with verse, his sonnet alone is not worthy enough to withstand the future.  A paradox in the dyad shows how to achieve this state of e ternal life by giving away yourself keeps yourself still (13).  To achieve ...

Wednesday, May 29, 2019

A Visit to Italy :: Descriptive Essay Examples, Rome, Italy

A Visit to Italy The capital city of Italy is a very extraordinary designate to visit. The population of capital of Italy is well over two-million. The people there are very friendly and are extremely proud of their country. Rome is a handsome bustling city that has a moderate cli mate. The temperature usually stays around eighty degrees. The main way of transportation is by bus. The side move cafes are very popular in Rome. The cafes were endlessly populated with happy Italians and a few curious tourists. The most preferred cafe was the Cafe S. Petro. this cafe was in perfect walking distance from the Vatican city. The Vatica n city is were the pope lives. The main meals served at the cafes varied from pizza to tortillini. The pizzas were not exactly like pizza pie Huts pizza. They were crispy thin with very few toppings available. Most pizzas came with cheese, pepperoni and a watery tomato sauce. The tortillini had soft, medium-length, hollow noodles with more w atery tomato sauce. Another favorite at the cafe was the lasagna which was unbelievably delicious. After having tasted the pizzas and the tortillini, I was not exp ecting the lasagna to be so tasty. The lasagna was packed full of hot meat, zesty cheese, and a tangy tomato sauce. It was not out of the ordinary to see Italians, instead of eating at the cafe, talking with their friends and sipping on hot cappucino. The streets in Rome were always swamped with motor scooters, three-wheeled cars, and buses. Although, the main way of transportation are buses, Italians also scooted around on their motor scooters. The scooters were more convenient because the scoote rs could easily slip through with(predicate) traffic jams. The parking was very hazardous for people because some cars would be blocked in by a small car that was parked just between two horizontally parked cars. Car accidents were very common in Rome. When two pe ople had a car accident, they would just wave or call off at each other and drive hurriedly away. The police were not notified and there was no question of who would pay for the damages. The worst part about Rome were the buses. These buses were jammed tight with people who were sweaty and excessively vulgar.

The Appalachian Trail :: essays research papers

When I was in the seventh grade, our class went on a field trip to Cherokee, North Carolina. The trip conclusioned four days and three nights, further the adventure would last a lifetime. The experience allowed me to learn many things about myself and to reflect on the beauty that was all around me. We departed at six-thirty in the morning, and I was so excited. I had never been away on a school trip for longer than a few hours. I tossed my purple duffel bag into the computer memory compartment, found my seat by the window, and prepared for what I knew would surely be an unforgettable adventure.When we finally arrived in the mountains, it was breathtaking. They were c overed with trees, and the clouds floating over them were so beautiful. I looked down and saw valleys of flowers that went on forever. I was so anxious to get off the bus and roll in the grass with the clear, no-account sky preceding(prenominal) my head.The bus came to a halt, and unmatchable by one we filed out into a parking lot. We grabbed our canteens and began the one-mile trail to the top of one of the mountains. I was one of the first the great unwashed to reach the peak, and waiting for us was a notebook. We opened it to find the names of everyone who has ever reached the peak. I smiled to myself as I wrote in sizeable letters Kim Walton and started prickle down the mountain. It was much easier and faster than going up, and everyone was really excited to see where we were going following(a).When we arrived at the Best Western, everyone grabbed his/her suitcases, quickly tucking them into the rooms as the candy lead astray across the street drew us in like moths to a flame. Afterwards, we went back to our rooms, put on our bathing suits, and went for a late-night blow under the stars. It was so cold, but we did not mind it because we were having so much fun. Later we went back to our rooms and went to sleep. Our next day would surely be jam-packed with action and adventure.The next morning, we went to Alpine Tower a seventy-five feet high vertical structure that is designed to help you work with others and test your physical military posture as intimately as your bravery, motivation, and problem-solving strategies. Equipped with helmets, harnesses, and ropes, we took our places around the tower and prepared for the first person to go up.The Appalachian Trail essays research papers When I was in the seventh grade, our class went on a field trip to Cherokee, North Carolina. The trip lasted four days and three nights, but the adventure would last a lifetime. The experience allowed me to learn many things about myself and to reflect on the beauty that was all around me. We departed at six-thirty in the morning, and I was so excited. I had never been away on a school trip for longer than a few hours. I tossed my purple duffel bag into the storage compartment, found my seat by the window, and prepared for what I knew would surely be an unforgettable advent ure.When we finally arrived in the mountains, it was breathtaking. They were covered with trees, and the clouds floating over them were so beautiful. I looked down and saw valleys of flowers that went on forever. I was so anxious to get off the bus and roll in the grass with the clear, blue sky above my head.The bus came to a halt, and one by one we filed out into a parking lot. We grabbed our canteens and began the one-mile trail to the top of one of the mountains. I was one of the first people to reach the peak, and waiting for us was a notebook. We opened it to find the names of everyone who has ever reached the peak. I smiled to myself as I wrote in big letters Kim Walton and started back down the mountain. It was much easier and faster than going up, and everyone was really excited to see where we were going next.When we arrived at the Best Western, everyone grabbed his/her suitcases, quickly tucking them into the rooms as the candy shop across the street drew us in like moths to a flame. Afterwards, we went back to our rooms, put on our bathing suits, and went for a late-night swim under the stars. It was so cold, but we did not mind it because we were having so much fun. Later we went back to our rooms and went to sleep. Our next day would surely be packed with action and adventure.The next morning, we went to Alpine Tower a seventy-five feet high vertical structure that is designed to help you work with others and test your physical strength as well as your bravery, motivation, and problem-solving strategies. Equipped with helmets, harnesses, and ropes, we took our places around the tower and prepared for the first person to go up.

Tuesday, May 28, 2019

The Holocaust :: essays research papers

"If we were not an eternal people before, we are an eternal people after the Holocaust, in both its very positive and very negative sense. We consecrate not only survived, we have revived ourselves. In a very real way, we have won. We were victorious. But in a very real way, we have lost. Well never recover what was lost. We cant assess what was lost. Who knows what beauty and grandeur six million could have contributed to the humanness? Who can measure it up? What standard do you use? How do you count it? How do you estimate it...? We lost. The world lost, whether they know it or admit it. It doesnt operate any difference. And yet we won, were going on." This quote is from the testimony of Fania Fenelon. The signs and symptoms that are among the Jews because of the Holocaust definitely characterize abnormality. These abnormalities include the physical effectuate, the spiritual effects, and the second generation.          The physi cal effects were enormous among the Jews. The conditions of the camps defy description. The nutrition was worse than inadequate and the results being the wellhead-known "musselmen" skeletons covered by skin. After the Jews in prison camps were freed, their diseases were treated as well as could be treated. Premature aging was one of the most prominent disabling effects of survivors. Digestive tract diseases were also very common because of the stirred up disturbances and inadequate diet during their incarceration. The experience also placed them at risk of coronary diseases, cerebrovascular diseases, and arteriosclerosis. All of this was consistent with the premature aging and the atrophy of the essence muscle due to the extreme undernourishment during captivity.     Spiritual concerns also followed the survivors of the Holocaust. The Jews had to face up to one of the most painful realities of all...What it means to be a Jew. They had to dissolve whet her or not to remain a Jew. The Holocaust had threatened the Jewish people near extinction. A anger directed towards the Non-Jewish world was intense because they had been persecuted by Gentiles. The Holocaust had caused an apparently irreversible rupture in the Jewish-Christian relations. Jews felt and still feel enraged because their expectations of a decent world were shattered into pieces by the most, supposedly, cultured people in the world. "Where was God?" wrote Elie Wiesel, a question asked many times among the Jews. They felt

The Holocaust :: essays research papers

"If we were not an eternal people before, we ar an eternal people after the Holocaust, in both its very positive and very negative sense. We gather in not only survived, we stupefy revived ourselves. In a very real way, we have won. We were victorious. But in a very real way, we have lost. Well never recover what was lost. We cant assess what was lost. Who knows what beauty and grandeur six million could have contributed to the world? Who can measure it up? What standard do you make use of? How do you count it? How do you estimate it...? We lost. The world lost, whether they know it or admit it. It doesnt make any difference. And yet we won, were going on." This quote is from the testimony of Fania Fenelon. The signs and symptoms that are among the Jews because of the Holocaust definitely characterize abnormality. These abnormalities include the physical effects, the spiritual effects, and the second generation.          The physic al effects were enormous among the Jews. The conditions of the camps defy description. The nutrition was worse than inadequate and the results existence the well-known "musselmen" skeletons covered by skin. After the Jews in prison camps were freed, their diseases were treated as well as could be treated. Premature aging was one of the well-nigh prominent disabling effects of survivors. Digestive tract diseases were as well very common because of the emotional disturbances and inadequate diet during their incarceration. The experience also placed them at risk of coronary diseases, cerebrovascular diseases, and arteriosclerosis. All of this was consistent with the premature aging and the atrophy of the heart muscle due to the extreme undernourishment during captivity.     Spiritual concerns also followed the survivors of the Holocaust. The Jews had to face up to one of the most painful realities of all...What it means to be a Jew. They had to decide whe ther or not to remain a Jew. The Holocaust had endanger the Jewish people near extinction. A anger directed towards the Non-Jewish world was intense because they had been persecuted by Gentiles. The Holocaust had caused an apparently irreversible rupture in the Jewish-Christian relations. Jews mat up and still feel enraged because their expectations of a decent world were shattered into pieces by the most, supposedly, civilized people in the world. "Where was God?" wrote Elie Wiesel, a question asked many a(prenominal) times among the Jews. They felt

Monday, May 27, 2019

Learning objectives Essay

1. After finish the lesson, the savant will be able to analyze the question and build their own formula for them to answer and shape that problem.2. After this unit, the student will have to recognize the meaning of that certain topic and state or identify it by their own interpretation.3. By completing the activities, the student will provide a plan on every situation that challenge on them and organize it to reach their goals.4. After the year, the student will recall the information of the lesson and it will easy for them to analyze every concept into components.5. At the conclusion of the study, the student will make a percipients on how all-important(a) the objective of the lesson and select an effective solution for their problem by using computer.Students Learning ObjectivesPsychomotor Domain1. After completing the lesson, the student will able to follow instruction to notice the problem and for them to figure out the trouble encountered.2. After this unit, the student wil l recognize ones abilities and limitations and acts upon a sequence of steps in a process.3. By completing the activities, the student will properly use computers, and repair simple problem, materially or psychologically.4. After the year, the student will responds effectively to unexpected experiences and modifies instruction to meet their needs.5. At the conclusion of the study, the student will construct their own theory, and will alter creativity based upon highly developed skills.Students Learning ObjectivesAffective Domain1. After completing the lesson, the student will listen to otherwise with respect and remember what other people open up.2. After this unit, the student will show their ability to solve problems and provide a plan for the return of everybody.3. By completing the activities, the student will differentiate the importance of freedom and responsibilities, and accept responsibilities for the progress of others.4. After the year, the student will show his/her ca pability when working(a) independently, and cooperates in a group that shows teamwork.5. At the conclusion of the study, the student will values people for what they are, not how they look.

Sunday, May 26, 2019

Assessing the Essence of Teh Eclectic Paradigm Essay

Aspects frequently highlighted include orbicular media and telecommunications, global brands, worldwide toil and integrated financial markets. At the forefront of these phenomena are Multi National Enterprises (MNEs), benefiting from the opening of markets crossways the globe, and from advances in computing and internet technology, which make it possible to link far-flung activities in global engagements.Considering these elements, globalization can further be specify as the process of increasing and deepening interactions between individuals and organizations across the globe, facilitated by advancing communications technology and the opening of markets to trade and investment. Theories of International production have move to explain the convergence towards a globalised world, while addressing the different types of international expansions. These theories have focused on MNEs and Foreign Direct Investment (FDIs).FDI can be defined as investment by an organization in a busine ss in a nonher country, with a view to establishing production in the host country. small-arm Raymon Vernon is know for his theory of Product life cycle, Stephen Hymer laid emphasis on the location and ownership advantages of countries, which helped in attracting FDI from MNEs. John Dunning incorporated Internalisation to the analysis of Hymer, which became known as the Eclectic persona (or OLI Paradigm), one of the most comprehensive theoretical explanations with specific focus on FDI.Still the Eclectic Paradigm is being challenged in the modern globalised world, as it fails to take into account the implications of existing modes of entry of MNEs, as well as the advantages of Alliance Capitalism. It is being discussed further in this report. Theories of International production have greatly facilitated the understanding of the globalization phenomenon. Different theorists at different time intervals attempted to justify the expansion of MNEs across the globe.Hymer (1970) was the first one to give notice that MNEs are institutions of international production rather than international capital movement. Still he ignored the natural imperfections attributed to transaction costs in an imperfect market. In todays world, with the proliferation on Internet use, imperfections like bureaucratic hurdles and control of distribution systems (Bain, 1956) are absent. Even the imperfections like price determinism and information assign are shrinking.Thus it can be argued that Hymers major contribution relating to the importance of structural market imperfection in determining FDI activity does not hold good for corporations, which are expanding globally through e-channels (for instance). Vernon (1966) came up with the International Product Life Cycle (IPLC) theory, which explained the locational dimension of FDI. According to him, production first starts in the infrastructure country fro local anesthetic markets, and exporting is used to attain foreign markets.As the pr oduct matures and production is standardized, production moves to less developed countries to reduce weary costs. The basic assumption of the IPLC is that knowledge is not equally and universally distributed (Vernon, 1966). This assumption, however, is not applicable in todays world, as Vernon (1979) himself admits that there is a more perfect distribution of knowledge across the globe. He argues that debaucheds who are global scanners follow a different trend than that of the IPL approach, because such firms have the ability to efficaciously scan global markets for the best factor endowments.Though, a lot has been discussed and said on the theories of International production, yet none of the approaches (Hymer, Vernon, Barney) simultaneously explains the importance of resources heterogeneity, entrepreneurial competence, network governance and the rise of alliance capitalism. Thus, an overarching analytical exemplar is needed, that can synthesize these disparate views and accou nt for the importance of location- based advantages and ownership advantages. Such a framework was developed by Dunning (1973 1988 1993) known as The Eclectic Paradigm.It is a framework that explains the growth of MNEs by bringing together disparate theories. According to Dunning, the Eclectic Paradigm is less of an alternative theory of International production and more of a framework that synthesizes the essential and common characteristics of each main theoretical explanation on the growth of MNEs. For more than two decades the Eclectic Paradigm (EP) remains a widely used general framework for studying the growth of MNCs and Dunning has also constantly revised and extended the EP to explain changing facets of MNCs.Dunning (1988) has re-stated that the EP is robust and general enough to incorporate future developments like renewed the focus on entrepreneurship and the emergence of global networks (Dunning, 1995). The Eclectic Paradigm explains that the Foreign Direct Investment ( FDI) and growth of multinational corporations (MNCs) is linked to the finale and nature of ownership-specific advantages of the firm, the extent and nature of location bound endowments, and the extent to which markets for these advantages are best internalized by the from itself.In short, it is the configuration of these Ownership (O), repair (L) and Internalization (I) advantages that determines a firms international production and growth. In a somewhat updated version, Dunning (1988) describes the three essential factors for international expansion * Ownership Advantages are unique competitive or monopolistic advantages, typically developed in the home market, that permit the firm to compete successfully in overseas markets.These factors are of two types Asset Advantages arise from proprietary ownership of unique assets protected by structural market distortions, and Transactional advantages provide a unique capacity to capture value from the transaction benefits of owning a net work of assets located in different countries. * Location factors, tied to the local foreign market, which make production in the host country preferable. These are immobile factors, such as cheaper labour, high shipping costs, local image or trade barriers, that can be combined with transferable intermediate ownership assets to generate superior products. Internalisation factors, typically related to the industry, bring transactional market failure in transferring ownership advantages to foreign markets. This also explains the naming of the EP as the OLI configuration as well. The eclectic model, then, pulled together the key elements of neo-classical theory location, industrial organisation theory monopolistic advantage and internalization theory transactional efficiency. It used this eclectic mix to produce an internally consistent, compelling and testable model of the multinational firm and its strategic processes.

Saturday, May 25, 2019

Contradictions on the “Tell-Tale Heart’ by Edgar Allen Poe Essay

one contradiction that the perceptive reader catches is the following. The bank clerk first enjoins us that he spies on the old gay at night. He eerily stares at the old humankind while he sleeps It took me an hour to place my whole head within the opening so far that I could see him as he lay upon his bed (Poe 291). This clearly implies that the narrator can see his future victim I could see him as he lay upon his bed. But then the narrator tells us that although the victim awakes startled, the narrator simply stood his ground in the doorway since His room was as black as pitch with the thick darknessand so I knew that he could non see the opening of the door (Poe 292). This implies that the room and hallway are pitch black, which way of life that neither the victim nor the predator can see everything without light. So the narrator can both see and not see his victim. This carefully concealed contradiction shows that the narration itself is unstable, just as the narrators head teacher is.Another contradiction can be found in the second paragraph of the story. The narrator says, It is impossible to say how first the idea entered my brain (Poe 290). This suggests that the narrator was clueless as to how he thought up of the idea of killing the old man. It is saw that it was not his decision, and implying that he was n ever so thinking about it. Later in the paragraph though, he says by degreesvery graduallyhe made up his assessment to take the life of the old man (Poe 290). This contradicts the previous quote. First, he says that it was not his decision, just in the latter quote, the narrator tells the audience that he made up his mind to take the life of the old man. Surely, even the narrator himself was confused.The narrator says that when he was spying on the old man, he thrust in his head (Poe 291). By definition, thrust means to push or drive quickly and forcibly. The reader gets an image of the narrator passing through the threshold abruptly. For cunningly he thrust it in (Poe 291). The next line contradicts this statement for he says he moved it slowlyvery, very slowly, so that he might not disturb the old mans sleep (Poe 291). Now, the reader sees an image of the narrator peeking through gradually and quietly, so that the waking of the old man could be avoided. In fact, he didit so slowly that it took him an hour to place his whole head within the opening (Poe 291). Taking an hour to put a head through a doorway real is a long time, indicating that he could not have thrust his head through the doorway. Thrusting his head in to spy on the old man and doing it very, very slowly very much contradicts each other.The narrator describes what the old man is feeling and thinking of when he was startled at the eighth night. His fears had been ever since growing upon him (Poe 292). One can picture the old man very afraid, not knowing what to do. Contrastingly, the narrator says that the old man had been saying to himselfIt is n othing only when the wind in the chimneyit is only a mouse crossing the floorit is merely a cricket which has made a single chirp (Poe 292). It seems as if the old man is saying this with confidence, and without fear. This implies that the old man is not scared at all. He does not even worry for he believes that it is nothing but merely a noise created by nature. Additionally, the narrator says that the old man had been trying to comfort himself with these suppositions (Poe 292). Now, the narrator goes back in saying that the old man is in fact scared, for he is trying to find comfort. The narrator basically said that the old man is scared, then not scared, and finally, scared again.The narrator speaks of the nerve centre of the old man that bothered him. He describes it as a dull blue, with a hideous veil over it (Poe 293). He describes it as if it is something weak, without strength, for it cannot even tell when a beam of light is on it, as the narrator did every night, for eigh t consecutive nights. Near the end of the story, the narrator says that it is something else, again a contradiction. No human eyenot even hiscould have detected any thing wrong (Poe 294). This indicated that there is a power that the eye possesses. If a principle human eye, already with great power, could not detect anything wrong, surely a dull eye with a hideous veil over it cannot do any better. The narrator though gives power to the eye because he puts the old mans eye in a higher position than that of a everyday human eye. Even the emphasis on the word his through the means of italics says that the narrator is saying that the eye holds power.Irrational human drives such as obsession, paranoia, the need to destroy and other mental psychoses such as these cannot be rationally explained. It is quite complicated and even an in depth analysis of these themes is close to impossible. One cannot really explain someones obsession, simply because no one knows what is actually going on in the obsessed mind, other than the obsessed himself. It is flimsy that I would be able to explain the very brain activity of the obsessed. Even if I ask questions or experiment on him, I would not be able to comprehend it all. Similarly, attempts of discovering the foundation of paranoia are difficult. Perhaps it is the many factors that contribute to this.In the end, it all leads to in depth analysis that would only unwrap irrational and illogical reasons as to how one became paranoid, as it also is with how one became obsessed. The narrator of the story attempts to redeem himself by saying that he is not a madman. In explaining everything, he believes that he is in fact rational. The story, though, full of contradictions, proves that the narrator is unstable, and all the explanations in the world could not unravel the mysteries of obsession and paranoia.

Friday, May 24, 2019

Case Study in Waste Management of Philippines Essay

Bart MeehanFacilities and Services Division, The Australian National University, Canberra, Australia Keywords Australasia, environmental focal point strategy, Universities Abstract Discusses the extent to which environmental management is considered a mainstream business activity within Australian and New Zealand universities. Describes how a position instrument was used to collect data on environmental programs, their resourcing and comptroller processes, and the take aim of community involvement in their development and ongoing management. These indicators of mainstreaming are discussed and particular reference is made to the Australian National University (ANU) and its experience with mainstreaming environmental management. The survey data indicate that in the majority of the surveyed institutions, environmental management cannot be considered a mainstream business activity. To aid universities in assessing their progress towards mainstreaming, a conceptual simulation is pres ented and a model of organisational change is discussed.Introduction In response to the calls for ecologically sustainable development (WCED, 1987) and for leadership in environmental protection (Leal Filho et al., 1996), many universities end-to-end the world are recognising the need to adopt environmental management systems and to integrate these systems into their business operations. However, in the USAand Europe, at least, few universities are vigorously act green initiatives (Dahle and Neumayer, 2001). One reason for this may be that environmental management remains a peripheral management issue. This article suggests that if environmental programs are to succeed, they mustiness be mainstreamed into university operations, rather than sidelined as a soft management issue.Read moreWaste Management in the PhilippinesThis article provides an analysis of environmental management in ten universities surveyed throughout Australia and New Zealand. While much information about envir onmental management in both US (e.g. HammondCreighton, 1998 Herremans and Allright, 2000), and European (e.g. Delakowitz and Hoffman, 2000 Noeke, 2000 Dahle and Neumayer, 2001) tertiary institutions has been forthcoming, aside from Howard et al.s (2000) case study of the Charles Sturt University, little information about environmental management at Australian and New Zealand universities is available.Hopefully this plowshare will stimulate discussion and interest and encourage further empirical studies on environmental management in Australasian universities. The aim of this investigation is to hear the extent to which environmental management systems are underpinned by business management practice and thus mainstreamed into university management processes. Herremans and Allright (2000) have suggested that the level of financial investment, and the level of senior executive involvement indicate how mainstreamed environmental management programs are within tertiary institutions. Wh ile agreeing, we feel that there are opposite indicators of mainstreaming that demonstrate organisational commitment. These include community involvement, the development of environmental fancys and the battlefront of control processes. This article examines features of each of the environmental programs surveyed, with particular emphasis on the followingThe presence of an environmental management plan and the level of financial and human resources available. .The control processes that exist (e.g. environmental management systems, audits, reports to management). . The level of campus community involvement in the program. afterward discussing the surveys, a brief case study of the Australian National University (ANU) will be presented. This is included because of the authors familiarity with the issues and not because it necessarily offers an example of best practice. Indeed, if the analysis shows anything, it is that eon much has been d genius to improve environmental performa nce at the surveyed universities, there is still much more to do. Methodology and survey results The authors developed a dewy-eyed survey instrument to gather information about the environmental management systems of Australasian universities.An invitation to complete the survey was issued to all universities in Australia and New Zealand via the Australian Universities Environmental Managers Network (AUEMN) and the mailing list of the Australasian Higher Education Facilities Managers Association (AAPPA). Of the 46 possible universities (38 Australian eight New Zealand), ten complete surveys were receive a response rate of 21.7 per cent. The response rate for New Zealand universities (37.5 per cent) was much higher than that of Australian universities (18.4 per cent). The participating universities were . The University of Western Australia. . The University of Newcastle. . The University of New South Wales. . University of Wollongong. . Royal Melbourne shew of Technology.The res ults of the surveys are shown in Tables I, II and III1. Table I shows base information about the environmental policy of the participating universities, including whether or not an environmental plan exists and thelevel of financial support. Table II contains information about community involvement. Table III contains details of control processes such as reporting and auditing. not surprisingly, as indicated by Table I, the survey showed that all participating universities had an environmental policy approved at the executive level. All policies where launch between 1994 and 1998. all working groups or formal committees developed the majority of policies only two policies were established by employees without feedback from a working group or committee. All the policies established by the participating universities make energy conservation, waste management and sustainability key aims of the environmental program.Seven policies also make broad references to the teaching and researc h activities of the universities and the immenseness of consistency between the principles espoused in teaching and the actions of the corporate university. Only one policy makes a specific reference to greening the curriculum. Seven respondents indicated that an environmental management plan was developed following the approval of a policy and that these plans are used to operationalise the principles detailed in the policy documents. Of the universities who did not have a formal plan, one stated that a plan was currently being developed, another that they work from the policy, and yet another that the university has an appropriate vision and accusive which is driven by a well represented working party.One university without a plan also indicated that it was becoming increasingly recognised that one would be useful . . . to bring various programs together and give them momentum. The survey asked respondents to comment on what, if any, management structure and budget had been esta blished to facilitate the implementation of the environmental management program. Six universities stated that they had a formally established environmental management committee overseeing the implementation of the policy four respondents indicated that there was no committee structure, with one of these respondents noting that the pre-existing management committee had ceased meeting in 1998 and has not reconvened. The surveys indicated that the facilities management department played a strong role in the implementation of environmental management objectives, in all but one of the participating universities.

Thursday, May 23, 2019

Cyber Security India Essay

After China and the U.S., India has the spunkyest number of cyber piazza users. in that respect ar also an estimated over 381 million mobile ph matchless subscriptions with internet connectivity. In the list of online infection risk India ranks 9th and in personal computer across the globe, India ranks 7th. A recent survey by McAfee named India next to Brazil, Romania and Mexico the least able to prevail against cyber attacks. Cyber shelter curses and hacking attempts in India rose to 22,060 in 2012 from 23 in 2004 What it moverCyber terrorist act is the convergence of terrorism and cyberspace. It is gener on the wholey chthonianstood to mean un fairnessful attacks and threats of attacks against computers, networks, and the selective entropy stored therein when done to intimidate or coerce a government activity or its people in furtherance of policy-making or social objectives. Cyber ThreatsCyber threats contri furthere be disaggregated, establish on the perpetrators and their motives, into four baskets cyber espionage, cyber put forward of war, cyberterrorism, and cyber crime. Cyber Warfare attacking the information systems of opposite countries for espionage and for disrupting their comminuted infrastructure.Why Cyber certificate is readedThird most thickly settled country after China and India is non any geographical entity that a virtual state covered facebook The same computing DNA that produced the communications change has also created acute vulnerabilities and attractive terror targets for societies that depend on cyberspace for field protective cover and economic survival. The growing dependency on the information engine room (IT) murders cyber hostage system a vital component of the Indias internal security infrastructure. Lately, selective information collection, processing, storage, transmission capabilities, mobile, wireless, and cloud computing are change magnitude in huge add up and make cyber attacks easily to occur. Considered the newest domain in modern warfare, cyberspace has promptly joined the ranks of traditional areas assessed by militaries all(prenominal) over the world. And this is exactly how cyberspace should be assessed, since an impelling terrorist attack against a nations office grid,for example, could result in massive loss of life, crippling damage to infrastructure and a wet-nurse to the economy that could engage years to repair. Stuxnet has carried show up what in the past could only be accomplished by directly bombing a countrys infrastructure or sending in human agents to send offt explosives. It asshole affect Infrastructures like banking system, air traffic overcome, power infrastructure and gas pipelines. decease now can bypass the military force and attack via cyber-brute-force suppressing a countrys military control systems, navigation, communication system, shutting d fareledge or paralysing critical infrastructure and affecting the countrys economy , cyber-weapons linking nuclear weapons Most common usage of net profit is by designing and uploading websites on which false propaganda can be pasted. This comes under the category of using engine room for psychological warfare. The web can rear and keep up acts of terrorism by means of propaganda, promotion, instructional public exposure and execution, financing, training, recruiting and can also facilitate specific attacks. Non-state actors have the technology to create cyber attacks or endanger the cyber environment of the global socio-political system. The 2011, Arab Spring revolution in Tunisia, Egypt, and Libya was self-made to use cyberspace to pass its message. Threats abound cyber crime, cyber espionage, cyber war and cyber terrorism, all represent genuine risks to nations, firms and individuals around the world. Experts reckoned it is a matter of time before cyberspace becomes an self-sufficing theatre of war. With the rapid march of technology, such attacks will o nly become more widespread as the use of Internet for manipulating things increases. We have now entered into a new phase of conflict in which cyber weapons can be used to create physical destruction in more or lessone elses critical infrastructure. And there is a distinct possibility that the disruptions and dislocations it causes are permanent and severe.E.gThe Flame virus (which has been circulating for more than five years and has yet to be claimed by an owner, although speculation centres around Israel) has turned the computer into the ultimate spy, gathering data files, turning on PC microphones to record nearby conversations, logging instant messaging chats, taking screen shots and even remotely changing settings onother computers. Moreover, hacker groups, such as Anonymous and Lulz security measure (Lulz Sec), have executed distri anded abnegation of service (DDOS). Under that process, they were successful to deface websites to various governmental and corporate interests . They hacked NASDAQ and International Momentary Fund (IMF). Internets capabilities dictate the rules of lock inment in cyberspace to initiate on-ground battles and at the same time create a fertile ground for new, aspiring jihadist. In the recent past, the case of Stuxnet virus which attacked centrifuges. plot of land the targeted victim was the Natanz nuclear site in Iran, other organisations across the world, including in India, operating with the Siemens system suffered from collateral damage from the attack. Since 2000-01, there have been unbendable reports of Pakistani cyber criminals defacing Indian websites and writing derogatory messages against India. On the other hand, China has become a formidable adversary in cyber space. Recent cases of Chinese hacking into some(prenominal) another(prenominal) Indian government establishment computers and even the highly stiff national security domains stomach enough evidence of its capability in waging cyber warfare. Since 2003 , the Peoples Liberation Army has adroit more than 30,000 cyber warriors and another 150,000 in the hidden vault of heaven. According to several reports available in the public domain, the Chinese goal is to construct the worlds best informationised armed forces. Existing Counter Cyber Security Initiatives.Indian Computer Emergency Response Team (Cert-In).Cert-In is the most important parting of Indias cyber community. Its mandate states, ensure security of cyber space in the country by enhancing the security communications and information infrastructure, through proactive action and effective collaboration aimed at security incidental prevention and response and security assurance. national entropy Security Assurance Programme (NISAP).(a) Government and critical infrastructures should have a security policy and create a point of contact. (b) Mandatory for organizations to implement security control and report any security incident to Cert-In. (c) Cert-Into create a panel of a uditor for IT security.(d) All organizations to be subject to a third party audit from this panel once a year. (e) Cert-In to be reported about security compliance on periodic basis by the organizations.Indo-US Cyber Security Forum (IUSCSF).Under this forum (set up in 2001) high power delegations from both side met and several initiatives were announced for intensifying bilateral cooperation to control cyber crime between the two countries.To mitigate supply-chain risks emanating from telecom equipment manufactured by companies belonging to China, the telecom and home affairs ministry have issued guidelines mandating service provides to secure their networks and induct equipment that has been tested as per international standards.CCTNS taking help of ISRO for making drift fully indigenous Warned by intelligence agencies that using a foreign satellite in the proposed nationwide Crime and Criminal Tracking Network and Systems (CCTNS) could make critical databases vulnerable to eavesd ropping by other countries, the Union infrastructure Ministry has decided to take the help of the Indian Space Research Organisation (ISRO) to make the take in fully indigenous. Since the intelligence agencies raised objections to the proposed use of the IPSTAR satellite managed by Thaicomm in the project, the BSNL diverted to this project some 400 VSATs that it had for other services.Fact Box internal Cyber Coordination Centre (NCCC)Indian government will establish its own multi-agency body National Cyber Coordination Centre (NCCC) that would carry out real-time assessment of cyber security threats and revert actionable reports/alerts for proactive actions by law enforcement agencies. NCCC , to be set up at a cost of Rs 1000 crore, would be a multi-agency body under Department of Electronics and IT. It will function in sync with other government agencies. These agencies include National Security Council Secretariat (NSCS)Intelligence Bureau (IB)Research and compend Wing (RAW )Indian Computer Emergency Response Team (CERT-In)National Technical Research Organisation (NTRO)Defence Research and Development Organisation (DRDO)DIARA (Defence Information Assurance and Research Agency) Army, Navy, Air ForceDepartment of TelecommunicationsWhat will be its functions?It will be Indias first layer for cyber threat monitoring and all communication with government and private service providers would be through this body only. The NCCC would be in virtual contact with the control room of all Internet Service Providers to scan traffic within the country, flowing at the point of entry and exit, including international gateway. Apart from monitoring the Internet, the NCCC would look into various threats posed by cyber attacks. The agency will provide law enforcement agencies direct access to all Internet accounts, be it e-mails, blogs or social networking data.DRDO doesnt uses any US based company services in its organization.ChallengesIn India, we want to create an en vironment within which security is built into our cyber and communications working methods. While it is the government that powerful takes a lead in evolving a coherent picture of what constitutes vulnerability in our cyber domain and a strategy on how to counter attacks, the private sector needs to recognise the real threat it faces. And this is not a future threat or a prospective threat that we need to prepare ourselves against this is an ongoing, true threat.Cyber threat will continue to grow due to the fast evolution and development of internet and related technologies. At the global level, nations are stepping up their cyber falsifying efforts. The U.S. was one of the first countries that considered this to be a strategic problem in 2006, both in terms of nationalsecurity and their future economic wellbeing.The major(ip) concern when dealing with Cyber threats is ubiquity and anonymity. What other international medium is highly accessible, far-reaching, ridiculously inexpen sive, whereby information is transferred at the speed of light, the attacker invisible and untraceable? unalike a missile trajectory, IP (Internet Protocol) pathways can be masked and the locations appear opaque. Implicating a source and assigning blame to the attack progenitor is utmost(prenominal)ly difficult. the extreme difficulty of producing timely actionable warning of potential cyber attacks the extreme complex vulnerability associated with the IT supply chain for various Indias networks Indias approach to cyber security has so far been ad hoc and piecemeal. A number of organisations have been created but their precise roles have not been defined nor synergy has been created among them. Lack of awareness and the refining of cyber security at individual as well as institutional level. Lack of trained and qualified manpower to implement the counter measures. Too many information security organisations which have become weak due to turf wars or financial compulsions. A weak IT Act which has became redundant due to non victimisation and age old cyber laws. No e-mail account policy especially for the defence forces, police and the agency personnel. Cyber attacks have come not only from terrorists but also from neighboring countries inimical to our National interests.Recommendations.International Co-operationAcknowledging that better indigenous snooping capabilities may not be enough to protect Indias cyber security, National Security Advisor Shivshankar Menon has advocated formulating a set of standard operating procedures (SOPs) ground rules for cooperation which would help India succeed in obtaining Internet information from major powers that control more than of cyber space. tending(p) the cyber reality, sensible powers should work towards a globally acceptable cyber regime to bring in a set of rules, build transparency and reduce vulnerabilities. Agreements relating to cyber security should be given the same importance as other conventionalagre ements. The government should also consider joining the European Convention on Cyber crime. A 247 nodal point for international cooperation with cyber authorities of other countries should be set up. Critical InfrastructureCyber security should be mandatory in computer light curriculum and even separate programmes on cyber security should be contemplated. Government should initiate a special drive of implementing practices in the critical infrastructure sectors and provide required budgetary support for such implementation. Government should establish a mechanism for measuring cooking of critical sectors such as security index, which captures preparedness of the sector and assigns value to it.Government should incorporate IT Supply Chain Security as an important element of e-security plan to address security issues. Government should promote R&D in private industry through active government support for industry-led research projects in the areas of security. Establish enabling m echanisms to facilitate this. fury should be placed on developing and implementing standards and best practices in government functioning as well as in the private sector. Cyber security audits should be made compulsory for networked organisations. Capacity building in the area of cyber crime and cyber forensics in terms of infrastructure, expertise and availability of HR and cooperation between industry, LEAs and judiciary. Cyber security education, R&D and training will be an integral part of the national cyber security strategy. PPP model should be explored for taking security to the regions and industry sectors. beef up telecom security one of the key pillars of cyber security, especially through development of standards and establishment of testing labs for telecom infrastructure(equipment, hardware). More investment in this field in terms of finance and manpower. The impact of the emergence of new social networking media, and convergence of technologies on society including business, economy,national security should be studied with the help of relevant experts, reasonedProcedural laws need to be in place to achieve cooperation and coordinationof international organisations and governments to investigate and prosecute cyber criminals. Government mustiness put in place necessary amendments in active laws or enact a new legislation like a Data Protection/Privacy Act so as to safeguard against the misuse of personal information by various government agencies and protect individual privacy. Need for trained and qualified experts to deal with the highly specialize field of cyber security and laws related to it. Govt MachineryMake it a mandatory requirement for all government organisations and private enterprises to have a designated Chief Information Security Officer (CISO) who would be responsible for cyber security. Establishment of a cyber range to test cyber readiness. More powers to sectoral CERTs.Establish an online mechanism for cyber crime-relate d complaints to be recorded. Policymakers need to recognise this and put in place structures that allow the sharing of cyber security information through both formal and informal cyber exchanges. That requires a fast, unified action between government agencies and the private sector. Indian agencies working after cyber security should also keep a close vigil on the developments in the IT sector of our potential adversaries. Joint efforts by all Government agencies including defence forces to attract qualified skilled personnel for implementation of counter measures.AwarenessNeed to sensitize the common citizens about the dangers of cyber terrorism. Cert-in should engage academic institutions and follow an aggressive strategy.ConclusionDefining how we deal with Cyber threats and attacks internationally is crucial to peace and security. If Cyber weapons are treated with indifference in comparison to other weapons then it can open the doors tomultifaceted retaliation if a nation is pro voked Enforcing the right policies to amalgamate security of governments and law-abiding citizens is critical. The safety of individuals outweighs commercial piracy. sophistication and intellectual rhetoric redirects focus on eliminating irrefutable threats like violence and terrorism. Instead, diluted versions of policies are implemented and lives are put at risk. . India must take an premature lead in creating a framework where the government, the national security experts and the industry catering to strategic sectors of economy, can come together, to pursue the goal of cyber security in the larger national cause Need to prepare cyber forces .The United States was the first country to formally declare this as the fifth domain warfare after land, sea, air and space. It has also formally classified the use of cyberspace as a force, a euphemism for offensive capability. The Chinese adopted the ideal of informationalisation in the mid-1990s and have relentlessly built up structure s and operations in this domain.Cyber Security DilemmaJohn Herz, an American scholar of international relations and law is credited for coining the term security dilemma. The dilemma expresses how both the strong and weak states can upset the balance of power that could eventually become a catalyst for war. The security dilemma could arise from the states accumulation of power due to fear and uncertainty about other states intentions. Post-9/11, successive US administrations have mostly attempted to handle global disorder by accumulating more power. Not surprisingly, since 2007, the US has been collecting and analysing significant measuring of data available in the cyber space. Cyber security dilemma of the US was recently exposed by the US whistle-blower Edward Snowden, giving details about the US National Security Agencys controversial Prism programme. The US, clearly has been monitoring the global e-traffic covertly and in the process checking on cyber activities on Google, Y ou Tube, Skype, Facebook, etc. This has resulted in a huge amount of metadata (a data about data). US administration has been spoofing on the rest of the world. In the 21st century, with the number of computerand internet users is increasing significantly, the cyber environment has almost become fundamental to a nations existence. Over the years Information and Communication Technologies (ICT) have become rudimentary to various sectors from social, economic, political to defence. The fillip side to it is that various unauthorised, illegal, criminal, anti-national and terrorist activities have also become rampant. Astonishing as it may sound, but the third most populous country after China and India is not any geographical entity but a virtual state called facebook The human rights activists and states who are under the US oversight consider it an anti-democratic act that undermines the civil liberties and individual privacy. The absence of a globally accepted cyber regime and leg al structure adds further to the commotion. The excessive dependence on cyber tools has given rise to various vulnerabilities. Recently the US National Security Agency chief Gen Keith Alexander, who also heads the US militarys Cyber Command, has expressed concerns and is of the impression that on a scale of 1 to 10, the US critical infrastructures preparedness to withstand a destructive cyber attack is about 3, this in spite the US having established a major defence infrastructure to defend against foreign hackers and spies. This assessment would push the US to strengthen its defences further. However, since the nature of the threat is extremely dynamic it may not be possible to build any foolproof defensive mechanism. Any cyber architecture can be viewed as a doubled edged sword either ignore it and be exposed or use it to ones advantage. Cyber espionage is here to stay. Today, the US is upfront because of its scientific superiority and ability to manage the ICT industry and pr event few acts of terrorism from actually happening. More importantly, the data gathered would have utility in other fields too.ConclusionSnowden has clearly exposed the US but it is hard to imagine that the US would halt its cyber activities. As a leading power, the US is accustomed to international criticism, lawsuits and questioning and at the end of the day cyber spying and spoofing actually strengthens their intelligence gathering capability. It is important to note that cyber expertise offers significant amount of asymmetric advantage to the user. In the future, it isnot only the US but many other states that are also likely to use this method (mostly covertly). States would support a cyber regime essentially because intelligence collection is not the sole purpose for possessing cyber assets. ITC also leads to empowerment and its importance for socioeconomic development s undisputed. In oecumenical, the norms of privacy in a cyber-era world would remain a constant subject of debate since the nature of technology presents a challenging task to sweep over the actual offender. Technologically superior power would always have an advantage. The time has come to recognize that in the future we would always be watched and mostly against our own wishesIndia-US collaboration in Cyber SecurityIndian officials and security officers would soon be visiting the U.S. for training in an array of courses from cyber security, megacity policing and forensics, to critical infrastructure protection, financial terrorism and anti-terrorism intelligence. The list of training programmes include Land Transportation Anti-terrorism Weapons of Mass Destruction seaport Security International Border Interdiction Training and International Sea Interdiction Training to check smuggling and trafficking Handling of equipment for screening men against radiological, chemical and explosive materials and Handling of intrusive detection at airports and seaports.With the growing beingness in cities and increasing threat perception, the U.S. has also offered India to help develop the concept of megacity policing, a step it has been promoting since the 9/11 attacks.An advance course in inspection, control room design and its operation by various security agencies and police authorities are key elements of this concept.Balancing vigilance and privacyAs the government steps up its surveillance capabilities, the entire social contract between the state and citizens is being reformulated, with worrying consequencesThe Indian state is arming itself with both technological capabilities and the institutional framework to track the lives of citizens in an unprecedented manner.A new underlyingised Monitoring System (CMS) is in the offing, which would build on the already existing mechanisms. As The Hindu reported on June 21, this would allow the government to access in real-time any mobile and fixed line conversation, SMS, fax, website visit, social media usage, Internet sear ch and email, and will have unmatched capabilities of deep search surveillance and monitoring.Civil society groups and citizens expressed concern about the governments actions, plans, and intent at a discussion organised by the Foundation for Media Professionals, on Saturday.The contextUsha Ramanathan, a widely respected legal scholar, pointed to the larger political context which had permitted this form of surveillance. It stemmed, she argued, from a misunderstanding of the notion of sovereignty. It is not the government, but the people who are sovereign. Laws and the Constitution are about limiting the power of the state, but while people were being subjected to these restrictions, the government itself had found ways to remain above it either by not having laws, or having ineffective regulators. States knew the kind of power they exercised over citizens, with the result that impunity had grown.There is also a complete breakdown of the criminal justice system, Ms Ramanathan said. This had resulted in a reliance on extra-judicial methods of investigation, and scape-goating had become the norm. National security had been emphasised, re-emphasised, and projected as the central goal. We havent paused to ask what this means, and the extent to which we have been asked to give up personal security for the sake of national security. It was in this backdrop that technology had advanced by leaps, and made extensive surveillance possible.The implications are enormous. The data is often used for purposes it is not meant for, including political vendetta, keeping track of rivals, corporates, and digging out facts about a citizen when he may have antagonised those in power.Pranesh Prakash, director of the Centre of Internet and connection (CIS) looked back at the killing of Haren Pandya, the senior Bharatiya Janata Party (BJP) leader in Gujarat. Mr Pandya was using the SIM card of a friend, and it was by tracking the SIM, and through it his location, that the Gujarat go vernment got to know that Mr Pandya had deposed before a commission and indicted the administration for its role in the riots. Eventually, he was found murdered outside a park in Ahmedabad. The Gujarat Police had accessed call details of 90,000 phones.It is also not clear whether mining this kind of data has been effective for the national security purposes, which provide the reason for doing it in the first place. Saikat Datta, nonmigratory editor of Daily News and Analysis, and an expert on Indias intelligence apparatus, said a core problem was the absence of any auditing and over sight. There needs to be a constant review of the number of calls, emails under surveillance, with questions about whether it is yielding results. But this does not happen, probably because a majority is not for counter-terrorism. There would be trouble if you build accountability mechanisms. When he sought information under RTI around precisely such issues, he was denied information on the grounds that it would strengthen enemies of the state.Anja Kovacs, who works with the Internet Democracy Project, said this form of mass surveillance criminalised everybody since it was based on the assumption that each citizen was a potential criminal. She also pointed out that having more information did not necessarily mean it was easier to address security threats there was intelligence preceding the Mumbai attacks, but it was not acted upon. She added, Most incidents have been resolved by traditional intelligence. Investing in agencies, training them better could be more effective.Bring in the caveats some argue that the state is not entitled to exercise surveillance at all. In fact, a social contract underpins democratic states. Citizens agree to subject some of their rights to restrictions, and vest the state with the monopoly over instruments and use of violence. In turn, the state acting within a set of legal principles being accountable to citizens and renewing its frequent legitim acy through different measures, including elections provides order and performs a range of developmental functions.This framework, citizens and civil liberty groups worry, is under threat with governments appropriating and usurping authority to conduct unprecedented surveillance. Citizen groups, technology and privacy experts came together globally to draft the International Principles on the Application of Human Rights to Communication Surveillance.It prescribed that any restriction to privacy through surveillance must be legal it must be for a legitimate aim it must be strictly and demonstrably necessary it must be preceded by showing to an established authority that other less invasive investigative techniques have been used it must follow due process decisions must be taken by a competent judicial authority there must be public oversight mechanisms and integrity of communications and systems should be maintained. (Full text available on www.necessaryandproportionate.org)Mr Prak ash of CIS, which has done extensive work on surveillance and privacy issues, said, An additional principle must be collection point of accumulation or data minimisation. Giving the instance of Indian Railways seeking the date of birth from a customer booking a ticket, Mr Prakash said this was not information which was necessary. But it could be used by hackers and many other agencies to access an individuals private transactions in other areas. The UPA government is finalising a privacy Bill, but its final version is not yet public, and it is not clear how far the government would go in protecting citizen rights.National cyber security Policy 2013National Cyber Security Policy 2013This policy aims at facilitating creation of secure computing environment and enabling adequate trust and confidence in electronic transactions and also guiding stakeholders actions for protection of cyber space. The National Cyber Security Policy document outlines a road-map to create a framework for co mprehensive, collaborative and bodied response to deal with the issue of cyber security at all levels within the country. The policy recognises the need for objectives and strategies that need to be adopted both at the national level as well as international level. The objectives and strategies outlined in the National Cyber Security Policy together serve as a means toi. Articulate our concerns, understanding, priorities for action as well as directed efforts. ii. Provide confidence and reasonable assurance to all stakeholders in the country (Government, business, industry and general public) and global community, about the safety, resiliency and security of cyber space. iii. Adopt a suitable posturing that can signal our resolve to make monishmined efforts to effectively monitor, deter & deal with cyber crime and cyber attacks.Salient features of the policyThe Policy outlines the roadmap for creation of a framework for comprehensive, collaborative and collective responsibility to deal with cyber security issues of the country. The policy has challenging plans for rapid social transformation and inclusive growth and Indias prominent role in the IT global market. The policy lays out 14 objectives which include creation of a 5,00,000-strong professional, skilled workforce over the next five years through capacity building, skill development and training. The policy plans to create national and sectoral level 247 mechanisms forobtaining strategic information regarding threats to ICT infrastructure, creating scenarios for response, resolution and crisis management through effective, predictive, preventive, proactive response and recovery actions. The policy will also establish a mechanism for sharing information as well as identifying and responding to cyber security incidents and for cooperation in restoration efforts. The policy identifies eight different strategies for creating a secure cyber eco-system including the need for creating an assurance framework ap art from encouraging open standards to facilitate inter-operability and data exchange amongst different products or services. There is in place a plan to operate and strengthen the national Computer Emergency Response Team (CERT-In) to operate 247 and to act as a nodal agency for all efforts for cyber security, emergency response and crisis management, as an umbrella agency over CERTs. It is expected that he policy will cater to the cyber security requirements of government and non-government entities at the national and international levels. The policy will help in safeguarding the critical infrastructure like Air Defence system, nuclear plants, banking system, power infrastructure, telecommunication system and many more to secure countrys economic stability.National Nodal AgencyThe National Cyber Security Policy, in order to create a secure cyber ecosystem, has aforethought(ip) to set-up a National Nodal Agency. The nodal agency will be coordinating all matters related to cyber s ecurity in the country. The nodal agency has a wide mandate as it will cover and coordinate security for all strategic, military, government and business assets. This is distinctive, since, so far, national security regimes have been divided among the Ministry of Defence (for securing Indias borders) and the Ministry of Home Affairs (for national and internal security across States).Public-private compact to protect national assetsAnother defining aspect of the policy is the level at which it envisages public-private partnership to protect national assets. There is a clear recognition in the policy that, apart from Indias IT, technology and telecommunications services, large parts of financial & banking services, flight path & transportation services, energy and healthcare assets are not only owned by the private sector but, in fact, remain vulnerable to cyber-attacks, both from state and non-state actors.Protection centreA crucial aspect of the policy is building resilience around the Critical Information Infrastructure (CII) by operationalising a 247 Nation Critical Information Infrastructure Protection Centre (NCIIPC). The Critical Information Infrastructure will comprise all interconnected and interdependent networks, across government and private sector. The NCIIPC will mandate a security audit of CII apart from the certification of all security roles of chief security officers and others tough in operationalising the CII.OperationalisationThe policy will be operationalised by way of guidelines and Plans of Action, notified at national, sectoral, and other levels. While there is a recognition of the importance of bilateral and tripartite relationships, the policy does not clearly identify Indias position vis--vis the Budapest Convention even though government delegations have attended meetings in capital of the United Kingdom and Budapest on related issues in 2012.Why does India need a cyber security policy?Cyber security is critical for economic secu rity and any trial to ensure cyber security will lead to economic destabilisation. India already has 800 million active mobile subscribers and 160 million other Internet users of which nearly half(a) are on social media. India targets 600 million broadband connections and 100% teledensity by 2020. Internet traffic in India will grow nine-fold by 2015 topping out at 13.2 exabytes in 2015, up from 1.6 exabytes in 2010. The ICT sector has grown at an annual compounded rate of 33% over the last decade and the parting of IT and ITES industry to GDP increased from 5.2% in 2006-7 to 6.4% in 2010-11, according to an IDSA task force report of 2012. Given the fact that a nations cyber ecosystem is eternally under attack from state and non-stateactors both. It becomes extremely critical for India to come up a coherent cyber security policy. One of the key objectives for the government is also to secure e-governance services where it is already implementing several nationwide plans including the e-Bharat project, a World Bank-funded project of Rs. 700 crore.CriticismThe release of the National Cyber Security Policy 2013 is an important step towards securing the cyber space of our country. However, there are certain areas which need further deliberations for its actual implementation. The provisions to take care security risks emanating due to use of new technologies e.g. Cloud Computing, has not been addressed. Another area which is left untouched by this policy is tackling the risks arising due to increased use of social networking sites by criminals and anti-national elements. There is also a need to incorporate cyber crime tracking, cyber forensic capacity building and creation of a platform for sharing and analysis of information between public and private sectors on continuous basis.Creating a workforce of 500,000 professionals needs further deliberations as to whether this workforce will be trained to simply monitor the cyberspace or trained to acquire offensive as well as defensive cyber security skill sets. Indigenous development of cyber security solutions as enumerated in the policy is worthy but these solutions may not completely tide over the supply chain risks and would also require building testing infrastructure and facilities of global standards for evaluation.Indian Armed forces are in the process of establishing a cyber govern as a part of strengthening the cyber security of defence network and installations. Creation of cyber command will entail a parallel hierarchical structure and being one of the most important stakeholders, it will be prudent to address the jurisdiction issues right at the beginning of policy implementation. The global debate on national security versus right to privacy and civil liberties is going on for long. Although, one of the objectives of this policy aims at safeguarding privacy of citizen datahowever, no specific strategy has been outlined to achieve this objective.The key to success of this poli cy lies in its effective implementation. The much talked about public-private partnership in this policy, if implemented in true spirit, will go a long way in creating solutions to the ever-changing threat landscape.Central Monitoring System (CMS) project JustifiedIndian governments own Central Monitoring System (CMS) project. roughly 160 million users are already being subjected to wide-ranging surveillance and monitoring, much of which is in violation of the governments own rules and notifications for ensuring privacy of communications. While the CMS is in early stages of launch, investigation shows that there already exists without much public knowledge Lawful Intercept and Monitoring (LIM) systems, which have been deployed by the Centre for Development of Telematics (C-DoT) for monitoring Internet traffic, emails, web-browsing, Skype and any other Internet activity of Indian users. While mobile operators deploy their own LIM system, allowing interception of calls by the gove rnment, only after checking due authorisation in compliance with Section 5(2) of the Indian Telegraph Act read with Rule 419(A) of the IT Rules In the case of the Internet traffic, the LIM is deployed by the government at the international gateways of a handful of large ISPs. The functioning of these secretive surveillance systems is out of reach of these ISPs, under lock and key and complete control of the government.

Wednesday, May 22, 2019

Impact on children in the bilingual education programme

Stung Treng, unitary of the distant northeasterly states of the Kingdom of Cambodia, is inhabited by different cultural minority gatherings in add-on to the bulk Khmers, such as Brao, Kaveth, Lun, Phnong, Khmer Khe, and Kuy ( Center for Advanced Study, 2009, p. 285 ) . With out(p) schooling, these groups have high hazards of being exploited and exposed to bad behaviours such as drug maltreatment and un defend sex. With first degrees of literacy they quite a little be to a greater extent prone to infection by common diseases in their union like malaria and dandy fever febrility, which farther depletes their minimum in draws necessitating outgo on medical specialties and medical expertness. Furthermore, their full potencies to develop themselves every bit impregnable as their community have non been realized due to miss of chances.There are m any(prenominal) benefits associated with egg-producing(prenominal) parent tongue based bilingual study higher registration rates i n formal system lower dropout rates ( a common ground for dropout in the early old ages of counsel is lingual communicating in that respect are high dropout rates for kids talking a different female parent lingua to the linguistic communication of electric charge ) lower repeat rates, for kids necessitating to reiterate peculiar classs of their schooling higher rates of success for misss remaining in program line higher rates of parental and community betrothal in kids s way it can better the relationship between political leaders and a multilingual population it leads to greater progression and eloquence in national linguistic communication ( and besides so international linguistic communications if these are pursued ) if initial direction is do in female parent longue and community engagement in instruction is really of import affecting parents, community and instructors in instruction helps kids learn. Greater engagement is make up when initial direction is in the female parent lingua.Over recent old ages the United Nations Children s Fund ( UNICEF ) , in coaction with the Ministry of learning, spring chicken and Sport ( MoEYS ) , has piloted a bilingual instruction course in Siem Pang territory, Stung Treng state, where most Kaveth cultural group members are concentrated. This has been done in do to supply primary coil instruction to kids of this group by utilizing a bilingual theoretical account of larning implemented by CARE Cambodia, share of CARE International, in Rattanakiri state. The programme foc utilize on a minority population in triad small towns of Siem Pang territory straight profiting about 225 kids. For confidentiality purposes the small towns lead be known as small town K, small town O and small town T.1.2 Problem StatementThe bilingual method of erudition adopted in the plan has been the agencies of supplying primary instruction to kids of cultural minorities in this state and its impact has non been studied the refore far, so the research histrion has great involvement in researching this.1.3 Purpose and SignificanceIt is anticipated that the informations collected and analyzed in this vision depart be used as a strong foundation to reason for an enlargement of the plan to other minority communities which are presently underserved by the Kampuchean instruction system. This has deductions for an addition in instruction entree for the-hard-to-r for each one kids of the state s minority groups. The scope of possible impacts include the person s future work chances, their attitudes towards and value for instruction, and the development of positive behaviours towards healthy wellness and hygiene patterns within the minority communities.Hopefully, the research findings leave behind show the positive results and impact of the bilingual instruction programme. It may besides bring out issues or jobs that can be addressed. The positive impact go out function as an protagonism message to the M inistry of Education, Youth and Sport for bilingual instruction to be portion of national instruction policy programs, and the programs must be implemented in pattern with sufficient resources in the signifier of allocated financess, decently trained forces and other requisite resources ( UNESCO, 2005, p. 3 ) .1.2 Research QuestionsThis research proposal intends to research the inquiry What are the self-reported impacts of attending at the bilingual instruction programme on kids, their households and communities? with the following purposesTo entry the impact on take parting pupils of their attendance/involvement in the bilingual instruction programme in Stung Treng To document the impact on the households of pupils who attend the bilingual instruction programme in Stung Treng andTo document the impact on the local communities in which pupils and their households attend bilingual instruction programme in Stung Treng.2. MethodsDiscussed in this subdivision volition be the sam pling technique, informations appeal procedures and the method for informations analysis. Ethical issues and the stairss taken to turn to them will besides be considered here.2.1 SamplingThe proposed research will concentrate on the impact of bilingual instruction on the minority communities in Siem Pang territory, Stung Treng state. In each of these communities there is one school supplying bilingual instruction from classs one to three, and this research will utilize a convenience sample to choose one school with ready entree for the research worker. Two pupils from each of the three classs ( n = 6 ) from the selected school will be invited to take part in an interview. A parent of each of the invited pupils will be invited to take part in a focal show group treatment plus deuce members of the school support commission based on their handiness ( n=8 ) .A list of male and female pupils from the selected school will be sought from the school principal by the research worker. Simpl e random sampling will be used to choose two pupils from each of the three classs. The research worker will compose each single pupil s name on a separate faux pas of paper, topographic magnitude all the faux pass in a container, agitate the container, and choice faux pass from the container until the coveted figure of participants is selected. This procedure will be repeated by class and sex activity with misss in one container and male childs in the other in order to hold gender balance. It is of import to hold gender balance in this survey so that every bit representative voices can be heard.An Information Form and an Informed Consent signifier and letter of the alphabet from the school principal developed by the research worker will be sent to parents by the instructor through the selected pupils to seek their parental blessing. If parents of the selected pupils do non O.K. of their kids take parting in this research, the same procedure will be repeated with other pupils of the selected school until the coveted sample has been achieved.There are restrictions deducing from twain clip restraints and geographical conditions for carry oning this research, so the sample size will non be big plenty to generalise the results of this survey. This trying attack besides has approximately restrictions. It can non insure a good representation of the whole population in the small town or the category, cut downing the generalizability of the consequences. However, the impact of bilingual instruction in this minority community can still be measured through a carefully structured research tool.2.2 Data aggregation2.2.1 InterviewingData will be collected through single interviews with the pupils of each of the three classs who have received parental consent to take part, and with two bounteous focal point groups of four each group dwelling of the parents of three pupils and a member of school support commission in each group. scholarly person interviews will be do ne by class degree, three interviews with the 2 kids from the same class degree.Due to clip restraints, carry oning pair interviews with pupils is a pet option to the research worker. To cut down the possibility of male childs ruling the interview, the interviewer will deliberately direct the inquiries to girl pupils in an attempt to promote female engagement.The possible grownup participants in focal point group treatments will be provided with an Information Sheet in their ain linguistic communication, explicating the research captive and a Consent Form ( see Appendix A ) . Potential kid participants will be provided with an Information Form and Consent Form in their ain linguistic communication that requires parental every bit good as child consent, in an effort to turn to ethical concerns about wondering(a) kids who are under the legal age of consent. Interviews with pupils will be conducted at their school on Thursday forenoon because Thursday is no-class twenty-four hours w hilst focal point group treatments will be conducted in the afternoon of the same twenty-four hours and at the same topographic point. The interviews and concentrate group treatments will be audio-recorded for subterranean written text and analysisThe interviews and concentrate groups ( draft inquiries in Appendix E ) will be conducted by the research worker and facilitated by a bilingual instructor, who can talk the local linguistic communication good, to assist smooth the procedure and to avoid any possible misinterpretation during interviews and concentrate group treatments. The instructor will non be the kid s instructor to forestall any concerns of the kid in the event they make a critical remark. An instruction functionary each from the provincial and territory offices will be approached to set up communicating flow between the research worker and survey participants in footings of doing assignments for the interviews and concentrate group treatments.An interview protocol and inquiries will be developed for usage in the interviews and concentrate group treatments ( see Appendix B ) . Students will be asked semi-structured inquiries by the research worker, with interlingual rendition by a bilingual instructor. Possibly examining inquiries will besides be developed to utilize when new subjects come up during interviews and concentrate group treatments. The research worker will discourse the inquiries beforehand with the transcriber to clear up the content and purpose of the inquiries with the purpose of thereby cut downing confusion during the times of questioning and treatment.All interviews and treatments will be audio-recorded so that the procedure can be conducted swimmingly without breaks for note pickings. The recordings will subsequently be transcribed for thorough analysis, and will be translated into English. The recordings, the written texts every bit good as the interlingual renditions will be stored and watchword protected in the research work er s personal computing machine for confidentiality and will be destroyed after the research study has been completed.There are some restrictions to the usage of interviews and concentrate group treatments. Students, their parents and community leaders of the minority group do non hold much exposure to the universe outside their spry community, and this may take to narrow positions in their responses and treatments and limit the profusion of data/information aggregation. All the research participants are new to interviews and concentrate group treatments, and this may keep them from talking openly and honestly. The usage of a transcriber could besides perplex the procedure and add an unintended confusion to participants. Focus groups can non vouch confidentiality hence single respondents may be restrained in their responses if they believe person in the group might state others about peculiar remarks, oddly any perceived as critical.2.3 Data analysisThe analysis will be done firs tly by transcribing the recorded responses from the interviews and focal point groups. correspondent phrases from each transcript are put together under descriptive labels. By making so, informations are pooled and a form or subject will emerge. Give the little figure of participants in both interviews and concentrate group treatments, informations analysis will be done utilizing excel spreadsheet.2.4 Ethical considerationsThe true role of this survey will be obviously explained to all participants in this research and the general benefits deducing from this research for their community will besides be explained in order to derive their full engagement. It will be explained that engagement is voluntary and anon. . By making so the research participants understand they are non compelled to prosecute against their will and may retreat from take parting at any clip.The research worker pays great attending to ethical issues that might be concerned with the survey in footings of coerci on and power imposed on the participants. Therefore, the research worker has designed an Information Sheet and Consent Form in the cultural linguistic communication explicating the intent and the procedure of the survey every bit good as their right to decline to take part before the survey can get down.An informal attack to the behavior of the interviews and focal point groups will be pursued in order to set all the participants at rest and to arouse as rich and varied information as possible.3. Literature Reappraisal3.1 International contextSurveies have shown that direction in the female parent lingua is good to achievement in other capable countries and 2nd linguistic communication acquisition. In parts where the linguistic communication of the scholar is non the national linguistic communication of the state, bilingual instruction can do female parent lingua direction possible while supplying acquisition of the national linguistic communication at the same clip ( UNCESCO, 2003 ) .International research shows that at least five old ages of direction in the first linguistic communication -but sooner throughout the instruction system is required to supply a solid foundation for farther surveies. A strong foundation in the female parent lingua is besides needed for 2nd linguistic communication acquisition and successful transportation of the literacy accomplishments from the first to the 2nd linguistic communication ( UNESCO, 2006 ) . instruction basic accomplishments to hapless kids through linguistic communication submergence may be damaging, but bilingual instruction is a much more efficacious option. Students in the United States of America having direction in a native linguistic communication and English at different times of the twenty-four hours were found to do the most dramatic additions in reading public presentation compared to their English-only equals. This research is pertinent to multilingual low-income states ( World Bank, 2006 ) .The figu re of old ages of direction in the first linguistic communication is the most of import forecaster of reading public presentation in a 2nd linguistic communication. It is non of import what the first linguistic communication is, but instead how much cognitive and academic development the pupil has experienced in it. The higher the pupils accomplishment in the primary linguistic communication, the faster they will come on in the 2nd linguistic communication ( World Bank, 2006 ) .3.2 Kampuchean contextThe footings cultural minorities, endemical peoples, cumulus folks and Highlanders are non synonymous. They are used interchangeably to depict the population groups who reside in remote, difficult-to-access countries within Cambodia. They make a life largely by subsistence agriculture and from forest merchandises, and do non talk Khmer, the national linguistic communication, as a female parent lingua ( UNCESCO, 2005 ) .With the publicity of Education For All ( EFA ) , the purp lish Government of Cambodia ( RGC ) is cognizant of the demand to do instruction accessible to all. The Ministry of Education, Youth and Sport is get downing to acknowledge that bilingual instruction may be an effectual manner of run intoing the educational demands of Cambodia s cultural minorities while enabling them to take part more to the full in Khmer society ( UNESCO, 2007 ) .To accomplish Education For All in minority communities, particular schemes such as bilingual instruction can be used ( UNESCO, 2006 ) . Bilingual instruction encompasses more than the female parent lingua as the linguistic communication of direction. Curriculum, stuffs, instructors and, learner-centered methodological analysiss are all elements of the educational procedure related to the autochthonal people s civilization in a wide sense. Furthermore the attack has promoted the acceptance of inclusive instruction with scholars from upland autochthonal groups have long been marginalized and deprived of an y chance for formal instruction ( UNCESCO, 2005 ) .Cultural minority communities have maintained their cultural, lingual and traditional differences through their farness from the bulk cultural communities. Given this farness, there has non been the chance to back up substructure and the development and/or renovation of school edifices, conveyance and administrative substructure that instruction may necessitate ( UNCESCO, 2005 ) . This compounds the mischief of the minority groups even further.There have been few educational chances for autochthonal peoples and, accordingly, there are few trained forces who are fluid in cultural minority linguistic communications and Khmer. As Khmer is non the first linguistic communication of the different upland groups, kids are placed at a disadvantage when it is used as the lone linguistic communication of direction ( UNESCO, 2005 ) .Find some figures that describe the engagement rates of cultural minority groups in higher instruction in Cambod ia it will beef up this point every bit good as the Significance of the researchGiven that there have been few undertakings that catered to the particular proposition educational demands of cultural minorities, there is besides a deficiency of stuffs that are culturally relevant or readily adaptable for usage in footings of linguistic communication and content ( UNESCO, 2005 ) . Indeed, small town support for schooling has been missing, most likely due to the fact that formal school services did non run into the demands of the community, and conflicted with socio-cultural norms in upland small towns. Besides, learning methodological analysis and inflexible time-tabling were non suited. Curriculum and stuff developed for the cultural minorities needs to be appropriate to accommodate the demands of the autochthonal communities. If an instruction undertaking is non based on existent, identified demands in the targeted communities, the scholars will hold it inappropriate and non utile for their demands ( UNESCO, 2005 ) with subsequent low engagement and success rates.Education for misss faces particularly tough obstructions within Cambodia and can be observed frequently in the signifier of negative attitudes by parents, instructors and community members. Discrimination is apparent in societal norms, linguistic communication, and submissive stereotypes. Socio-cultural influences work against misss entree to instruction in the signifier of early matrimonies, a heavy domestic work load and low educational outlooks ( UNESCO, 2005 ) . This is particularly true in a traditional society like Cambodia, in which miss instruction is less valued than male childs and misss are confined to household jobs, allow entirely misss from the state s minority groups.

Tuesday, May 21, 2019

History in the Making Essay

Hi reportits who we are and where we add together from. From cave men to cars that run on compost, muniment happens every day. Everything that has happened in history is absolutely fundamental in our live day existence. From the Revolutionary Era to the C disused state of war, America has come so far, and through the War on Terror, we continue to march on making every process history. The Revolutionary Era After the British spent an extreme amount of money defending the Colonies against the French, they persistent to shift some of the expenditures to the colonists.The result take to the Boston Tea Party in 1773 (Lib. Of Congress, p. 1), when the colonists rebelled against the British and their blotto tax on tea in order to re-coop defense expenditures. Reactions such as this led to the necessitation of order, which led to the Declaration of Independence, and the Revolutionary Era. The Constitution As a result of deciding not to amend the current Articles of Confederation, a new frame of government was born. 55 delegates from age 26 to age 81 debated, redrafted and created what is straight off known as the Constitution of the United States.These articles clarified many topics such as how much apply the government should have in certain areas, how representatives should be elected, and many other issues we still live by today. Since its publishing in 1787, there have been 27 amendments to the original version. Jeffersonianism Derived from the term Jeffersonian, and named for its discoverer, the Jeffersonianism philosophy held that to each one man had a right to have a say-so in government, believed in the expansion of mankind freedom, and believed that every person had a right to be educated. It also supported reliance on the farmer and agriculture, instead of relying solely onHistory in the Making 3 industry to boost the economy. Hamiltonism, which followed Jeffersonianism, was believed to be an evil stigma to Jeffersonianism by Jeffersonians. Civi l War Brother against brother, the revolutionized race could not decide whether or not the government should have control over the states, industrialization, and most importantly, slavery. The southern states, or the Confederate States of America, decided to take matters into their own hands and individualized themselves to make their own rules. This led to the Civil War, where one nation quarreled with its counterpart.Although the North won, losing over half a million soldiers did not make the impact any easier for anyone to handle. reconstructive memory After the period of the Civil War, a period of Reconstruction began. Attempts were made to solve differences between the coalition and the 11 Confederate states that had seceded from the Union. Though opposition from the Radical Republicans was evident, the Reconstruction Act of 1867 was passed, and military districts in the south-central were re-established. The confederation had no choice but to accept the 14th and 15th amend ments of the Constitution (thirty-ninth Congress, p. 1).The New South Although the days of slavery had ended, the Southern states continued to retain control over their civilization. With the abolition of slavery came see red from loss of control, which led to the birth of the Black Codes. The Black Codes allowed whites to control the newly freed slaves by regulating the reference of work black people could do, the hours they worked, and prevented blacks from raising their own crops. Freedom was not freedom after all. contrary Affairs Lack of support from the European economies post Civil War distressed the cotton crops, as the producers became overstocked.The North added some restriction to the History in the Making 4 Southern ports, and our foreign affiliate soon found other sources to fulfill their needs, which hurt the South tremendously. Industrialization As America advanced, so did the way work was performed. Not only did industrialization bring forth machinery, it also wa s the birth of conveying and communication. Andrew Carnegies steel industry revolutionized transportation. The rails made from refined steel created necessary use of the squeeze system, as did communication with the use of the telegraphs and telephone systems (Feldmeth, p.1). Progressive Era Along with industrialization came those who felt that anything old was inefficient and useless. These reformers brought forth the Efficiency Movement, which argued that the economy, society and government were inefficient. Frederick Winslow Taylor coined the term one best way with the humor that there was one best way to fix everything. He, along with several other engineers improved industrial efficiency. adult male Wars Taking place mostly in Europe, the First World War between the assort Powers (France, the Russian Empire, the British Empire, Italy and the U.S) and the Central Powers (Austria-Hungary, the German Empire, Bulgaria and the Ottoman Empire) was a result of the assassination o f the Austrian seat heir Archduke Franz Ferdinand and his wife. This event soon led to a full fledged state of war. The Treaty of Versailles would end the premier(prenominal) war, and stake victory for the Allied Powers, but controversy over its contents would soon fail to World War II. The second war between the Allied Powers and the Axis Powers (Nazi Germany, Fascist Italy, and the Empire of Japan) would be the deadliest war to date, killing over 60 million people.This war resulted in victory for the Allied Powers. History in the Making 5 The Depression In 1929 our nation suffered the worst food market plunge to date. The stock market crash, in conjunction with the outrageous cost of WWII, led to great losses for many people. Soon, supply exceeded demand. Cities establish heavy in industry-type operations, including those outside of the U. S. were hit especially hard. Farmers were also a target, as the price for crops overlook between 40 and 50 percent.The New Deal, or restr ucturing of the economy, enforced by President Roosevelt, would help lead the nation to recovery. The Cold War The Cold War, as dubbed by Bernard Baruch and Walter Lippmann, is a term used to take out the growing tensions between the US and the Soviet Union. It would be the longest war to date, lasting from the mid 1940s to the early 1990s. Post WWII, the two nations could not agree on how to reconstruct the post war world. Wars including the Korean War, the Cuban Missile Crises, and the Vietnam War were possible threats to lead into a third world war.The Cold War came to an end when Gorbachev launched his reform programs, Perestroika (reconstruction of the Soviet economy) and Glastnost (introduction of publicity and openness) (Wikipedia Staff, p. 1). It is almost impossible to summarize our nations history. So many events, far too many to place in a single composition of words, contend key roles in the structure of how we live today. Needless to say, history continues to ensue ev ery day. From our nations birth to the Cold War to the hanging of Saddam, America will continue to write a story we all should be so eager to read.References1. Library of Congress (1998). Revolutionary Period. Retrieved in January 2007 from www. americaslibrary. gov/cgi. bin/page. cgiljb/revolt. 2. 39th Congress (1866). 14th Amendment to the US Constitution. Retrieved in January 2007 from www. nps. gov/archive/malu/documents/amend14. htm. 3. G. Feldmeth (2000). American Industrialization. Retrieved in January 2007 from www. home. earthlink. net/gfeldmeth/lec. indust. html. 4. Wikipedia Staff (2001). Definitions for Perestroika and Glastnost. Retrieved in January 2007 from www. en. wikipedia. org.