Saturday, August 31, 2019

Cross cultural relations with film analysis

The movie â€Å"Boyz in the Hood† deals with issues of racism and cultural stereotyping. It also deals with issues of personal identification and ambition and the issue of equality in opportunity, regarding schools, money, jobs, and personal safety. The characters in â€Å"Boyz in the Hood† represent a diverse group of young African Americans who must find their way through a world of violence, poverty, gangs, drugs, and broken families.Throughout the movie, the audience is reminded that many of the problems facing the movie's main characters are not of their choosing or making but are issues and problems which they have been made to deal with simply because of the circumstances of their birth, their skin color, and their socio-economic standing in society. Early on in the film, the audience is able to see Tre, Ricky, and Darin (Doughboy) as fairly typical kids who want to play football and enjoy being with one another.But Tre has already seen his house broken into, the three friends have passed by crime scenes and an impoverished neighborhood, There doesn't seem to be anywhere they can go to just be regular boys. Instead, they are made to be a part of crime and suffering from a very early age. The part of the movie that isn't actually shown, but the audience can imagine as a contrats is neighborhoods were kids can play and have parks and baseball games and not worry about gunfire or police or gangs or drugs.This vision which is not in the film, of a normal life, is the opposite of what the characters in the film have to deal with and the only difference is their racial origin, being African American. The characters in the movie as they get older seem to want to be a part of this â€Å"other† world, the world of whites and even though they remain true to their own cultural identities and participate in the â€Å"hood† culture, each of the characters seems to either want or is actively looking for a way out of the â€Å"hood. â€Å" Doughboy is sent to prison and looks to be the one who is most likely to become a thug. Still, due to the early scene in the movie where he is beaten up by an older kid who takes Ricky's football, the audience knows that Doughboy had to get tough in order to survive in the hood. It is almost as though his own acceptance of being a thug in the hood helps protect his brother, Ricky, and Trey from the violence around them in the hood. Later in the story, Doughboy's â€Å"fatherly† personality will start the chain of conflict that results in his brothers' death and eventually his own.But until that crises happens, Doughboy is like the father of the other two friends and the audience understands that despite his rough exterior he is really a compassionate person who sees a lot of potential in his brother and wants good things to happen for his friends and family. Because the characters in Boyz in the Hood, the main ones, are good people, the tragedies that happen to them are viewe d as not being of their making. Tre is stopped by an African American police officer who shoves his gun in his face and threatens to kill him simply because he, the police officer, does not like African Americans.Even though this is a short scene, it is a very important scene. It shows how an African American (the police officer) can be so alienated from their own race, and so hateful toward them that they actually become a part of the oppressive system which causes African Americans to suffer in poverty and be thought of as criminals and dangers to society. In the long run, Tre cannot bring himself to become an avenger for Ricky's murder. This is a demonstration that not all African Americans are alike, they are not prone to violence or revenge or gangs or shooting their enemies.Tre decides his life is more important than revenge. When he does so, he is both embracing his culture and refusing the more negative aspects of it. He is an African American who wants to improve his life a nd his family and his neighborhood and not become a thug like Doughboy even if he understands the reasons for Doughboy's actions. In each case, with the main characters of â€Å"Boyz in the Hood† their actions and options seem to be somehow influenced by the â€Å"white world† that they never really see.they aspire to become a part of that society and make good of their lives. They long for another life, but their life is filled with gunfire, helicopters, thugs, prostitutes, drugs, and violence. The reason they have been placed in such terrible circumstances are based in racism. The backdrop to the story is that white money-makers want to bring the property values in the Hood down as low as possible so they can but cheap real-estate; whites sell guns and liquor and drugs to the people in the Hood, but they would never set foot in the place themselves.There is no real sense of justice in â€Å"Boyz in the Hood† the only thing which comes close is when Doughboy do es kill the gang-bangers who killed Ricky. But even this is sad because it is not true justice but vigilantism and everyone knows Doughboy will be killed himself, eventually. The message is: no-one in official capacity care bout what happens to the people in the hood. In order to survive, they must often â€Å"lower† themselves, despite their best efforts, to the level of stereotype which has been used against them in a racially motivated way in the first place.

Friday, August 30, 2019

Pharmocology

The exact mechanism of action of ingloriousness is unknown however it is known to researchers and medical professionals that ingloriousness suppress the immune response of Re- negative pats. To Re- positive red blood cells as well as reestablishing normal importunately pathways (Apostate). Side Effects of MOA – Octagon and Privilege both have black box warnings however this black box warning does not apply to all Ingloriousness.The black box warning consists of increased risk of acute renal dysfunction/failure as well as thrombosis. The risk of thrombosis is increased in patients over the age of 65 years old, prolonged manipulation, etc. (Apostate). Other serious side effects include hypersensitivity, nonphysical, rather multiform, hyperinflation, hypersensitivity, aseptic meningitis, psychotherapeutic, viral transmission risk, and hemolytic anemia Teaching – It Is common for the patient to experience headache, cough, (Apostate). Cause and vomiting, rash, Uralic, fever, rigors, flushing, back pain, fatigue, chest tightness, muscle cramps, and elevated BUN Cry elevated lab values (Apostate). It is important to alert your doctor of any allergy before beginning to take these medications. Do not get any type of immunization while taking ingloriousness without getting an okay from your doctor (Monoclinic). Administration Consideration (Special timing, take with/without food, etc. ) – It is important to take this medication on a very regular schedule as well as making sure to take the medication with food.There Is a serious risk of nonphysical with these medications so the Importance of telling your doctors your allergies is very great (Monoclinic). Drug/Drug Interactions Major – proportioning most concerning) – Consult your doctor if you are on any medications for heart problems, blood clotting, or atherosclerosis as ingloriousness can cause an increased risk for blood clotting and a higher risk when these other types of medication s are Involved (Monoclonal).Taking other immune globulins at the time of administration can cause a very serious side effect of nonprescription (Apostate). Required Labs – Numerous ingloriousness labs must be completed to determine which mucilaginous within the body has quit working. (Gig, leg, LCD, IGMP, and Gig). Doctors use these tests to determine what type of indemnification disease the patient is suffering from by seeing which mucilaginous levels are increased or decreased from the normal lab values (Kids Health).

Thursday, August 29, 2019

The Economic Impact of Outsourcing Essay Example | Topics and Well Written Essays - 1500 words

The Economic Impact of Outsourcing - Essay Example There were several reasons this practice gained a following in this time period. What was needed desperately was a way to improve asset management, cash flows and margins. The infrastructure demands for the industry were growing but there was a greater need for the business organizations to cut overheads more drastically if they wanted to survive because the budgets were shrinking at an even faster pace. It was this need for cost cutting that spurred the use of the practice of outsourcing in the industry. Of the numerous other benefits of outsourcing, some of the most prominent ones are reducing operating costs, reducing the effect of obsolete technology, using newer technology as soon as it is available for use and letting specialists handle challenging issues etcetera. The lobby against the practice of outsourcing bases their argument on the fact that when a company outsources it loses quite a bit of control over the firm’s operations and additional cost of services rendered etcetera. But a holistic view of the situation makes it clear that the advantages of outsourcing far outweigh any costs that company will have to incur in the process. One factor that cannot be overlooked-however great the benefits-is that of possible risk, but with some modern day transparency measures in place it is easier to make sure that the firm being outsourced to remains committed to what is expected of them. The third party that is outsourced to has a core competency in the services that the firm wants. They use the quickest, most efficient production methods and the latest technology which enable them to produce in more cost effective methods while still preserving the expected quality of production. And the firm that is outsourcing can invest the money saved more wisely, in more productive ventures. (Haynes, M., 2009). People who are against the practice of outsourcing argue that this is a major cause of layoffs in the first world. However, supporters argue that even tho ugh the costs for the local industry in terms of layoffs cannot be ignored, the benefits gained tend to overpower the adverse impacts. It is basically a question of going for the overall economy’s gain at the personal expense of a small part of the economy’s labor force. Supporters further argue that if outsourcing is banned, it won’t save a lot of people from being laid off; they say that any protection measures of the sort will result in overall economic loss. Regulation will thus cause inefficiency in the economy. Opponents however, stick to their side of the argument. They want to preserve jobs and prevent livelihoods form being destroyed. To objectively analyze the economic benefits of outsourcing, one needs to look beyond the aspect of jobs lost in the local economy and take a more macro view of the situation. Outsourcing lets firms cut costs and improve efficiency all in one go. Supporters expand on this by saying that outsourcing allows companies to acce ss the latest resources and the best capabilities. Outsourcing allows these companies to share the workload and risk of production processes and frees resources for investment purposes that would otherwise be invariably tied up. But that’s not all, outsourcing aids innovative practices by making it possible for firms to invest in research and development, customer service and

Wednesday, August 28, 2019

Ethical issues in Financial Companies Lending practices Research Paper

Ethical issues in Financial Companies Lending practices - Research Paper Example The overall wheel of development of humanity is almost entirely hinged on the decisions, policies, strategies, and plans of financial institutions. However, as these institutions continue to grow in relevance so does the problems of mankind. The almost direct relationship between the growth of financial institutions and the level of humanitarian crises and predicaments in different times and places underlie some fundamental truths of their complicity in these situations. The dual potential of the lending institutions to create both good and evil in same measure has placed these institutions under scrutiny by analysis’s and rights watchdogs for suspected complicity in the geopolitical, and environmental dilemma that have been witnessed in modern times (Weiss, 2005). Some of the crises that have dominated the global stage since the second half of the twentieth century include the spread of HIV/AIDS pandemic, global warming resulting from the green gas emissions, mechanization of the labor market which has led to job losses, wars and violent conflicts, several forms of environmental degradation, among other many situations. The process of creation of these situations has been made possible by the willful involvement of human beings working within structural organizations that spend millions of dollars to create these situations. The source of these money has been chiefly through lending from financial institutions. These institutions have knowingly given loans to questionable organizations even amid protests from activists regarding the ethical ends of the borrower’s missions. Moreover, these same lending institutions have sought every opportunity to merge, link up, or buy stakes in some of the organizations with disastrous missions around the globe. The bottom line of profits has often blinded the lending institutions from the horrible missions

Tuesday, August 27, 2019

Corhn's Disease Annotated Bibliography Example | Topics and Well Written Essays - 750 words

Corhn's Disease - Annotated Bibliography Example The authors aimed to deteremine the effect of using corticosteroids as a therapeutic intervention for Crohn’s disease, particularly Azathioprine and Infliximab, studied individually and subsequently, in combination. Through expounding on the study design and the patients who were selected to be part of the study, the authors presented the study treatments and an evaluation of deemed efficacy, as well as safety of the interventions noted. The findings noted the highest effective rate of efficacy in treatment for combining the two corticosteroids, to wit: â€Å"infliximab monotherapy and combination therapy with infliximab plus azathioprine, as compared with azathioprine alone, resulted in significantly higher rates of corticosteroid-free clinical remission among patients with moderate-to-severe Crohns disease† (Colombel & et al., 2010, p. 1393). The Crohn’s & Colitis Foundation of America (2012) provided an online comprehensive discourse regarding Crohn’s disease through a discussion of various sub-topics ranging from: understanding the diagnosis, an overview of the illness, it being identified as a chronic illness, population or people at risk, its causes, signs as well as symptoms, types, patterns, and treatment with recommended medications. Other relevant considerations were likewise expounded such as options for surgery, the required diet and nutritional intake, alternative and complementary interventions, coping techniques as one lives with the illness, and additional information and support systems which could assist people interested to find out more on Crohn’s disease. This site is very informative and useful for researchers and those found to have family members afflicted with the illness. The authors presented a comprehensive study regarding management of Crohn’s disease through initially providing

Monday, August 26, 2019

In Bacon's rebellion, why was it said to be only a rebellion, not a Essay

In Bacon's rebellion, why was it said to be only a rebellion, not a revulation - Essay Example Bacon thought the Indians, all Indians, were the enemy. After warring Indians made raids on the white population, Bacon wanted to eradicate them. The common men liked this sentiment, so started following Bacon. Fear and racism led to Bacons successful recruitment of his followers. Bacon did not have a revolutionary statement. His rallying cry to the men was kill the Indians, not overthrow the government. Since, the government wanted to capture and execute the warring Indians, Bacons ideas were not revolutionary. Bacon rebelled because the government would not give him permission to kill the Indians. Even the permission that Bacon did receive was forced by Bacons men. The King never gave Bacon permissio to lead this band of men. If Bacon would have stuck to fighting Indians, his actions might not have even been considered a rebellion. However, his men started plundering richer citizens that sided with Berkeley. Racism against the Indians motivated Bacon, but so did greed. He plundered not only from the Indians, enslaving them, but Berkeleys friends and the richer class. When Bacon died of the bloody flux, his followers quickly disbanded. Other than a few followers, when Berkeley came back the men switched allegiance to him. The Bacon followers who did not vow allegiance to Berkeley were executed. No real change was made in the government by Bacons influence. Bacons original message about eradicating Indians was the intent of the Berkeley led government all along. Thus Bacon did not even influence this aspect of governmental policy. Berkeley had made up his mind that all Indians were bad. Bacon did not give Berkeley a chance to implement this idea, until after Bacons own death. Both men shared their hatred of the Indians. If Berkeley would have focused on taxes, corruption, or lack of protection from the Indians, a revolution could have occured. Real change could

Sunday, August 25, 2019

Issues in global business Essay Example | Topics and Well Written Essays - 500 words - 1

Issues in global business - Essay Example In addition, if the firm has specialized products or services, which cannot be found or found in minor varieties in a foreign market, then also firms will adopt internationalization and become an MNC. Instead of competing in a saturated local environment, if the firm becomes MNC, it will have access to new markets and new customers. In foreign countries, people will always view foreign products with big expectations, particularly if it is a well known brand. If the MNCs are able to provide superior quality product than the local companies, it can attract many customers and earn good profits. However, the disadvantage is, in most cases, the MNCs have to launch a new and localized marketing campaign, to build a brand from scratch. As the local companies would have been operating for a long time, they will be in the minds of the people, but MNCs has to carry out campaigns and this could take time. There are a number of entry paths available to the MNCs to enter foreign countries. However, the common paths are Direct Investment, Joint Ventures, Franchising, Mergers, etc. Although, Direct Investment will be the favourable mode of entry for the foreign firms, if there are any government regulations against it, then they will go for joint ventures and franchising. Franchising has become one of the common entry paths because franchises have local knowledge and expertise that can be leveraged to a competitive advantage. (Neelankavil and Rai

ELL Learners Today Research Paper Example | Topics and Well Written Essays - 1000 words

ELL Learners Today - Research Paper Example These are (a) imitation theory, (b) reinforcement theory, and (c) active construction of grammar theory (Lindsay, Roberts, & Campbell, 2005; College of Education, 2010; Mixed Sources, 2007). Imitation theory follows a procedure where a child is permeated to hear speech sounds and be encouraged to imitate it (Lindsay et. al, 2005). For instance, English couples teach their child to speak English or a Japanese couple would teach their children Niponggo as its native language. In this imitative process, first learners would encounter problems and errors which are generally acceptable, predictable and consistent (Ontario Ministry of Education, 2007). Reinforcement theory refer to a process of language acquisition where adults take the role of supporting or coaching the children in the learning processes, and are constantly appraising the child’s communicative progress through affirmation, appreciation, and by correcting children’s errors either by form, by statement’ s content and/or the truthfulness what a child conveyed (OME, 2007). Moreover, in the active construction of a grammar, a child start to learn formal statement construction that is sensitive to lessons learnt from linguistic inputs. This means that the children are already receiving language input following the lessons they learned from adults or from their coaches (OME, 2007). In this stage, they can start to communicate formally with others in better form or sentence construction and they are able to convey meanings clearly using better language performance (OME, 2007). 2) How can we as teachers ease new ELL students into our classrooms in ways that help them become a contributing member of our classroom community? What do you plan to do to help new ELLs feel a part of your classroom from the beginning? To help learners ease in the learning process, teachers must develop a learning environment that will permeate continued development of children language

Saturday, August 24, 2019

Mechanical lock and phisical model Research Paper

Mechanical lock and phisical model - Research Paper Example fectiveness of the remotely controlled Security System since it decides the systems electrical requirements, physical security, installation and operation, as well as the industrial design of the end product. While the lock provides for the physical security of the Electronic Security System, the access control devices actuate the locking mechanism after validating the credentials of the owner and generating the signal for locking or unlocking the lock (Abloy, 2011). The monitoring system is to keep an eye of the lock tracking the movement of any object nearby, to maintain a database for the access control and to keep the recorded data available for ready access. The mechanical locks form the heart of the security system and are available in a variety of designs. A pin tumbler lock is proposed to for the heart of the locking mechanism. In the pin tumbler lock, the key fits into a rotatable tube, called a plug, which sits within a fixed cylinder known as the shell (Phillips, 2005). Rotating the plug within the shell operates the locking mechanism. When the lock is locked, the plug is prevented from rotating by little sticks of metal under spring pressure that protrude from the plug into the shell. Each stick, known as a pin stack, is cut into two (or more) pieces (pins) at one or more of a standard, discrete set of positions. When the lock is empty, the cuts in the pin stacks sit inside the plug and the ends of the outermost pins protrude into the shell. When a correct key is inserted, it lifts each pin stack to a height where the cut is precisely aligned with the boundary between plug and shell. This enables the plug to turn and operate the mechanism. The design of the electromechanical lock utilizes solenoid as main power in order to activate the lifting mechanism of the pin stack. Solenoid in general creates linear motion due to its force stroke characteristics. Energy efficient and forceful operation of the solenoid is vital for proper operation and longevity

Friday, August 23, 2019

A New World for Women Essay Example | Topics and Well Written Essays - 250 words

A New World for Women - Essay Example Moreover, the history of American women also motivates current generation to become productive and beneficial for the American society. Answer: No: 2 When I think of an American woman, a very constructive and positive image comes to my mind. As far as my observations about American women are concerned, they are the most hardworking, talented, generous, and attractive women in the whole world. They not only give proper attention towards their personal lives but also work with full dedication and commitment in their professional lives. An American woman is also religious and spiritual. â€Å"She goes to church and does her best to live and treat others right† (Richardson, 2010). I have personally contacted many American women and have found them generous, style-oriented, and intelligent. The best thing I can say about American women is that when they are at homes, they are perfect wives and mothers, and when they are at work, they are perfect professionals. References Richardson , R. (2010). Why African American Women Are Right For You - Part 2?. Retrieved from http://ezinearticles.com/?Why-African-American-Women-Are-Right-For-You---Part-2&id=5410190

Thursday, August 22, 2019

Madurai Essay Example for Free

Madurai Essay Madurai has been a major settlement for two millennia and is one of the oldest continuously inhabited cities in the world with a recorded history from 3rd century BC. [3]Megasthenes visited Madurai during 3rd century BC, with the city referred as Methora in his accounts. [9] The view is contested by some scholars as they believe Methora refers to the north Indian city of Mathura as it was a large and established city in the Mauryan Empire. [15] The city is also mentioned in Kautilyas (370–283 BC)[16] Arthashastra. Madurai finds mention in the works of Roman historians Pliny the Younger (61 – ca. 12 CE), Ptolemy (ca. 90 – ca. CE 168), those of the Greek geographerStrabo(64/63 BCE – ca. 24 CE). and also in the Periplus of the Erythraean Sea After the Sangam age, most of present day Tamil Nadu, including Madurai, came under the rule of the Kalabhras dynasty, who were ousted by the Pandyas around 590 CE. The Pandyas were outsted from Madurai by the Chola dynasty during the early 9th century. The city remained under control of the Cholas until the early 13th century, when the second Pandyan empire was established with Madurai as its capital. After the death of Kulasekara Pandian (1268–1308 CE), Madurai came under the rule of the Delhi Sultanate. , The Madurai Sultanate, then seceded from Delhi functioned as an independent kingdom till its gradual annexation by the Vijayanagar Empire in 1378 CE. Madurai became independent from Vijayanagar in 1559 CE under the Nayaks. Nayak rule ended in 1736 CE and Madurai was repeatedly captured several times byChanda Sahib (1740 – 1754 CE), ArcotNawab and Muhammed Yusuf Khan (1725 – 1764 CE) in the middle of 18th century. In 1801, Madurai came under the direct control of the British East India Company and was annexed to the Madras Presidency. The British government made donations to the Meenakshi temple and participated in the Hindu festivals during the early part of their rule. The city was devolved as a political and industrial complex through the 19th and 20th centuries to become a district headquarters of a larger Madurai district. With the effect of urbanisation, the temple no longer retained the unitary form, but continued to remain the centre for Hindus. In 1837, under the order of the then collector John Blackburn, the fortifications around the temple were demolished to accommodate the growing population of the city. The moat was drained and the debris was used to construct the new streets – Veli, Marat and Perumaal Mesthiri streets. The city was constituted as a municipality in 1866 CE. The British government faced initial hiccups in land ceiling and tax collection in Madurai and Dindigul districts under the direct administration of the officers of the government. The district at large was resurveyed between 1880 and 1885 CE and settled between 1885 and 1893 CE. The survey showed an under assessment of around 8 per cent in the old survey. Five municipalities were constituted in these two districts and six taluk boards were derived for local administration. Police stations were established with Madurai city as the headquarters of the District Superintendent. It was in Madurai, in 1921, that Gandhi, pre-eminent leader of Indian nationalism in British-ruled India, adopted loin cloth for the first time as his mode of dress after seeing agricultural labourers wearing it. [29] The independence movement in Madurai was led by leaders such as N. M. R. Subbaraman and Mohammad Ismail Sahib.

Wednesday, August 21, 2019

Identifying the ideal self

Identifying the ideal self Page | 1 Contents Introduction 1. Identifying my Ideal Self 2. My Real Self 3. Feedback From Others 4. My Learning Agenda Conclustion References Introduction My name is Gavin le Roux and I am currently the Parts Manager at Hatfield VW Braamfontein. I have been employed in my current company almost 6 years, been a Parts Manager for the past 9 years and been in the Parts environment for over 13 years. I have many goals and aspirations, both personal and within my department, many of which I have achieved and excelled at and some which I am still working towards. One of my major goals is to become a Dealer Principal, and for me to be able to peruse this and be successful in achieving this I will need to become a more effective leader. So how do I become a more effective leader? Well first I to identify my Ideal Self which is the person I would ideally like to be and invasion myself to be, and to take the necessary steps and actions to work towards becoming that person. Second would be to understand myself better by means of acknowledging who I currently am, my core values, causes of my behavior. Thirdly I would need to gather honest feedback from others as to attain my current positive and negative behaviors. Lastly would be to populate a personal growth learning agenda to identify key growth areas. 1. Identifying my Ideal Self As a Manager at my company I have vision to both grow my department and myself. In being able to be successful at this I need to identify my Ideal Self, which is the person which I ideally desire to be. I have spent some time reflecting on where I currently am and what I have achieved at my company and where I would to take my department and myself to. During this process I have identified both strengths and weaknesses and have identified key characteristics and traits which I would require to master in being able to achieve in being my Ideal self within my company. These characteristics and traits are as follows: To be an effective and successful leader To be enthusiastic and have a positive attitude To support my team at all times and with all aspects Have excellent Interpersonal skills To be confident To communicate effectively with my team Inspiring Through these values I believe I can grow both my department and myself and be able to take my team and department to the next level and also reach my personal goals within the company which is to become a Dealer Principal. I want to leave a legacy behind me in my company and be known as the leader that took his department from zero to hero. A leader that set solid foundations, had great vision and implemented strategies to achieve his visions, a leader who was innovative and continually contributed to the growth of his department. Growth in my department will not come from me alone, but from me and my staff as a unit. For me to be able to get my staffs support and buy in I first need to master myself and understand myself in depth before I can master others and become a successful leader. The next step is achieving the necessary changes to myself in being able to get closer to being my Ideal Self is to apply Personal Mastery. Personal Mastery is the ability to see where I am as a person at present vs. the Ideal person I want to be, and to continually work towards improvement in being that person. As I have already identified my key traits in being my Ideal self within my company, Personal Mastery will now assist me in my journey towards continuous improvement towards applying my desired traits. It’s all about self-discipline and taking responsibility to implement the necessary changes. â€Å"People with a high level of personal mastery are acutely aware of their ignorance, their incompetence, their growth areas. And they are deeply self-confident† (Senge, 1990). In addition to Personal Mastery, Emotional Intelligence (EI) is another tool which will assist me in my journey to getting closer to my ideal self as it will assist me with the ability to deal effectively with my team. Daniel Goleman describes emotional intelligence as managing feelings so that they are expressed appropriately and effectively, enabling people to work together smoothly toward their common goals. Emotional intelligence is the ability to perceive emotions, to access and generate emotions to assist thought, to understand emotions and emotional knowledge, and to reflectively regulate emotions to promote emotional and intellectual growth (Mayer Salovey,1997) The ability to understand, interpret, and respond to the emotions of my staff will be a huge benefit for me in being a more effective leader. I am going to integrate my results from my Myers-Briggs Type indicator (MBTI) Personality report into EQ to illustrate my stronger areas and areas I need to focus on in terms of EQ. My MBTI results listed me as an ISFJ (Introversion, Sensing, Feeling, Judging) Personality. My Strong areas in relation to EQ are: I notice what needs to be done to help people, I am sympathetic, tactful, and supportive to others in need and I notice and do little things that help others feel good. Now looking at key components in EQ, Empathy is vital in understanding the others emotions and being able to handle them in accordance to their emotional reactions. I accept responsibility beyond the call of duty and follow through until my work is completed. This relates back to a key factor in EQ Motivation, which is the passion to work for reasons beyond money or status and to peruse goal with energy and persistence. My areas which I would need improvement on in relation to EQ are: When I am in a crisis, I find it difficult to remain calm and composed. I find it hard to hide my distress and worry until the situation is resolved. EQ is very much about self-awareness and self-regulation, I need to train myself to be more in tune with my moods and emotions, to control them better and be able understand them and use them more effectively. I am an Introvert and am hence reserved, quite, private. EQ requires Social Skill for the ability to manage relationships and build networks. Understanding Emotional Intelligence will play a key role in helping me grow as a leader. 2. My Real Self â€Å"Waking up to who you are requires letting go of who you imagine yourself to be.† (Alan Watts) I’ve learnt we as people often hide parts of our core personality behind a mask in an effort to cover-up our flaws and insecurities. We’ve been brought up in a world where people around us are like mirrors, reflecting distorted images of who we are and these distorted images are actually of their own brokenness and pain. This unfortunately submerges our true self beneath the surface. As soon as we try to reveal our trues self we are quickly judged and this pushes our true self even deeper under the surface and we replace it with a more acceptable self, a fake. I’m going to use a few tools to give you a look into my Real-Self or alternatively worded as my â€Å"True-Self†. First tool is the â€Å"My Ice-burg† concept which is based on an iceberg floating in the ocean with part of it above the waterline and the rest of it below the waterline. Above the waterline my mask, my cover-up to the world and also my conscious mind. Below the waterline is my True self, which has been suppressed over time by numerous factors, and this area is also my unconscious mind. I have identified myself as illustrated below: I need to allow all of which lays below the water line to surface and to face it head on to be able to unleash my true self. â€Å"Our true self is here now, but it has been pushed beneath the surface by the hands of time and pain and fear† The second tool is Life Positions which is based on views and beliefs about ourselves and others. There are 4 basic Life Positions and Franklyn Ernest (1971) created the diagram below to illustrate these positions: Franklyn Ernst (1971) After spending some time trying to be brutally honest with myself in identifying where I am positioned in this grid, I found myself to be between two quadrants which are â€Å"I am OK / You are OK† and â€Å"I am OK / You are not OK. So why between two quadrants? Well, I see myself as someone who is quite happy with both myself and others, I feel very much in control of my own life and don’t rely on others to achieve this, I have high standards and I don’t always look at others as having lower standards for themselves. In short I’m very much happy go lucky. Now, on the other hand I can also be find myself sometimes blaming others and wanting to be right and being firm. This is why I find myself to be between two quadrants, as I see mixed traits in my Real Self from both â€Å"I am OK / You are OK† and â€Å"I am OK / You are not OK. 3. Feedback From Others 4. My Learning Agenda Conclustion References Anon., n.d. [Online] Available at: http://www.mountain-associates.co.uk/life_positions.html Anon., n.d. [Online] Available at: http://www.becomeselfaware.com/the-importance-of-knowing-your-self.html Anon., n.d. [Online] Available at: http://www.mytowntutors.com/2013/10/sigmund-freud-the-tip-of-the-iceberg/ Flanagan, D. K., n.d. [Online] Available at: http://drkellyflanagan.com/2013/01/18/the-secret-to-finding-your-true-self/ [Accessed 23 March 2013]. McCarthy, D., n.d. [Online] Available at: http://www.greatleadershipbydan.com/2010/01/top-12-development-goals-for-leaders.html [Accessed 03 April 2014]. mmolloy, n.d. [Online] Available at: http://www.mytowntutors.com/2013/10/sigmund-freud-the-tip-of-the-iceberg/ [Accessed 28 March 2014]. Montenegro, O., n.d. [Online] Available at: http://thethreestrategies.com/full-free-online-version/section-i-accountability/chapter-1-whats-your-excuse/mapping-the-archetypes/ [Accessed 26 March 2014].

Tuesday, August 20, 2019

The Tourism Industry Is A Complex System

The Tourism Industry Is A Complex System The tourism industry is a complex system where its necessary to look at all different sectors which are influencing each other, to get a clear understanding how this system works. A helpful tool to use already models and theories, apply them on different example and evaluate them. The individual as a potential customer has to be analysed and categorised, which is ensuing a better understanding of tourist behaviour. Furthermore it helps to recognize their decision making progress for a destination, as well as getting knowledge about their needs and expectation. This essay will show the usage of these models and theories on example of the Dominican Republic. Tourism can be defined as a combination of services and activities for people who travel to places outside of their familiar surroundings. The definition of a tourist is wide-ranging, because the purpose of travel ranges from holidays, business trips, and visits to friends and relatives to various other reasons such as study, religion, shopping and so on. More than an industry, it is rather like a system that sells packaged holidays, activities, attractions, accommodations, and entertainment. It is offering the opportunity to break away from normal life and enjoy leisure time in different locations. Tourism normally does not provide just one single product; mostly it is a bundling of various products to satisfy the demand of the tourist. For example, someone going on holiday to London would not merely consume one product from one supplier. It is more likely that he is utilizing a package of services. He might arrive by plane, go by bus/train to his hotel, dine in a restaurant, and ta ke a sightseeing tour. Due to the fact that nearly every tourism product is interlinked, there is no owner or manager with complete control of his own destiny (Gunn A.C. 2002, p.243). Additionally, other industries, such as the oil industry, are linked to the tourism industry. In recent years tourism become a part of daily life because people have more leisure time than they used to have 50 years ago and the view of the work-life balance has changed. Another important point to mention is that the tourism industry is one of the largest in the world and is creating millions of temporary and permanent jobs. In 2006 the travel and tourism industrys percentage of the world gross domestic product was 10,3%, with a turnover of US$6,477.2 billion. The industry supported 234 million jobs, 8.7% of total world employment (Cooper, et al 2006: 3). This data represents the global importance and significance to the world economy. Tourism does not include just the supply of hotels, beaches and travel agencies but also economical, environmental and socio-cultural impacts. These three areas are always commingling and conflicting. There are people whom are simply interested in making a profit, other people wanting to protect the environment, and yet another group of people concerned with the social and cultural impacts of a tourist region. All three groups must achieve a balance to enable sustainable tourism. This idea is shown on the following graphic: 3. Tourist typology and their implementation to tourism models Stanley C. Plog One approach to understand tourist behaviour is to identify different types of people, whereupon they can be categorised into a series of organised psychographic types. In 1973 Stanley C. Plog created a model for the American population showing how personal motivation influences the decision for a vacation destination. He divided tourists into four types: allocentric, near-allocentric, mid-centric, and near-psychocentric/psychocentric. The allocentric type views travelling as an opportunity to discover foreign cultures and prefers exotic destinations. They are self confident and open for new experiences. The near-allocentric type is sporty, seeks challenges and views the journey as a chance to test a new lifestyle. The mid-centric type looks for relaxation and pleasure in a well-known environment. They want to escape from the daily routine and enjoy comfortable accommodation. The near-psychocentric and psychocentric types are focused on themselves and are scared to discover something new. These people tend to look for a safe place to holiday. Their choice of destination will be a place they know and where they are not that far away from their home city (Johnson Thomas, 1992: 19). Plog considered that there are just a few psychocentric or allocentric types because the majority of tourists are mid-centric. However, Plogs model is hard to apply in reality. For example the Dominion Republic has a lot of organised mass tourism and it is possible to organize a journey by yourself as well. Every tourist is an individual, so they cannot be generalized. One trip can have a completely different occasion and characteristic than the other one (Cooper, 2008: 48). Cohens tourist typology Another model which classifies tourists is Cohens tourist typology. He divides tourists into the organised mass tourist, the individual mass tourist, the explorer and the drifter. Cohen explains that organised mass tourists are typically purchasing a ready-made package tour where they have no or just a little contact with the local people and stay most of the time inside a resort. This is similar to Plogs psychocentrics` type. In Cohens theory most of the tourists are individual mass tourists. They are similar to the organised mass tourists, but they have more flexibility and scope for personal choice. They want to have contact to the local people. This category is comparable to Plogs midcentric tourists and most tourists fall into this category. The third tourist type is the explorer, who organises the trip by himself and looks for something special, something away from the typical interests of a mass tourist. However, he is still interested in comfortable accommodations. The last t ype, the drifter, is completely independent, wants to live with local people and wants to take part in the native culture. Cohens last two tourists theories, the explorer and the drifter, which are also the minority in this industry, are similar to Plogs allocentric tourists. (Cooper et al, p.51). 5. Demand for the creation of tourist typologies and their practice on the example of the Dominican Republic The reason why we need these typologies for different tourists is to help and to be able to develop tourism destinations. Expectations and needs from tourists on a perfect holiday can be identified, so the desired service can be supplied. As soon as we know the different motivations for individuals travelling to a particular destination, a specific tourist type is going to be targeted. This means that in example of the Dom. Rep. the organised mass tourists in the majority, which are looking for a safe holiday, we know their behaviour and know how to plan for them. Most of the resorts in Dom.Rep. are designed for this clientele and have been developed very fast during the last 20 years to satisfy the demand from tourists. At the first stage resorts were build for explorer or drifter, and since the creation of package tourism, a lot of individual mass tourists came to this area. With the creation of all-inclusive, there is no need for tourists to leave the hotel. Because of investigati ng the different desire of tourists and define them, it was possible to develop this area (National and regional tourism planning 1994, p.147). 6. Doxeys Index: The socio-cultural impact of tourism The Doxeys Index describes the relationship between visitors and the visited. He developed a five stage model which describes the first step as the upcoming  ´euphoria ´ when a small number of tourists arrive thus stimulating the economy and a large number of new jobs are created. The next steps are apathy and annoyance. At this stage local people get first used to tourists in their familiar surroundings, and afterwards annoyed, because too many people are visiting the destination. Antagonism and acceptance are the last steps in this theory. Native people start to avoid tourists and at the last step they accept them. Acceptance means, that they accept tourists in their usual life and forget how the area was before tourists arrived (Cooper et al, p.47). Top priority should be always building better relationships between residents and visitors, which improves social life for both sides. In Punta Cana, where the proportion of tourists is high to the number of residents, cultural problems occur because of different society expectations (National and regional tourism planning 1994, p.147). While Punta Cana has grown within twenty years, the local community did not have enough time to adjust to the high number of tourists. The three models of Plog, Cohen and Doxey are coextensive whith each other because when the first visitors (drifter) arrive at a destination, local people are euphoric. These tourists (allocentric) are not scared to discover new areas. In the midcentric are the explorer and the individual mass tourists. At this stage the community becomes apathetic and annoyed. The last step is the organized mass tourist who belongs to the psychocentric and native people start to accept them. The relationship between the models is linear (Cooper et al, p.47). 7. Butlers Tourism Area Lifecycle (TALC) The Tourism Area Lifecycle(TALC) is a well-known model Butler created to illustrate the dynamic of a tourist -destination or -product through different stages. The graph describes a characteristic function due to the natural interrelation between the exposure and intensity of tourism. It shows the evolutional process where every tourism product is going through, which can help manager to find a way out in case of a crisis or new developed destinations to establish themselves. Butler first stage is exploration, where small number of visitors arrive in an undeveloped area. These people been identified as Plogs allocentric or Cohens explorer type. After their trip they are responsible for Involvement, because they tell others about place they been to (Ryan 2003, p.269). A following rise of the curve during the development stage is logical, because more tourists can be carried. Butler says that the number of tourists decrease until the carrying capacity is reached, this is the consolidation stage. New development has to happen again to rejuvenate, otherwise it would come to a decline of visitors (Butler 2006). While developing new strategies is important to investigate the existing facts and concentrate on the potentials the destination is already providing. At this point it is necessary to make a decision. To develop this place, to leave the place how it is and increase the price or let it decline. Decline is the next stage of Butlers TALC. This happens if t oo many tourists are arriving at a destination at the same time and the capacity is too low. Visitor are disappointed and the number of tourists will therefore start to fall. An option to avoid decline is Rejuvenation. That means that the area has to be developed for example with new hotels and beaches. 8. The 5As model The 5As model was helpful to rejuvenate the Dominican Republic when it had been reached the stagnation point. A new development of Attractions, Accessibility, Activities, Amenities and Accommodation were necessary to bring facilities up to the level demanded by international tourists. When the carrying capacity was reached, an essential element in the tourism take-off was government investment in the infrastructure of tourism zones. Over $76 million went into the Puerto Plata region between 1974 and 1982. New hotels and transportation networks were built, to get electric power and satisfy water supply. Infrastructure was one of the main important things which had to be developed and when the airport in Punta Cana was built, a lot of new different tourists begun to visit this area. (http://kiskeya-alternative.org/publica/afuller/rd-tourism.html#ecsoc) Today the Dominion Republic is one of the most visited countries and popular for family holidays. This destination fits perfect in Butlers TALC because at first it was an undeveloped place and started to grow, decisions by the policy had to be done for example to rejuvenate the place, to let the area how it is or to let it decline. The Dominican government decided for rejuvenation because of the high potential of this area. With new roads, attractions, airports and hotels the resort development strategy was successful (National and regional tourism planning, 1994, p.147). 9. Multiplier effect In tourism the multiplier effect is used to illustrate how many times money spent by a tourist circulates through a countrys economy. In other words when a new tourist destination is created, the local economy benefits as new jobs are being created and tourist bring additional trade to local businesses. The most common example is when a new hotel is being built it does not only create jobs directly in the hotel, but also indirectly in other sectors of the economy. The hotel has to buy food from local farmers, who then spend some of this money, for example, on domestic expenses. When tourists spend money for local products the demand for those products increases, which also increases secondary employment. However the multiplier effect continues until there is a leakage out of the economy through imports, which is the purchase of goods from other countries. The most common example would be a Third World country, such as Dominican Republic, much of the money spent by tourist end up leaving the countrys economy via foreign-owned airlines, hotels, imported drinks and food, etc. A typical luxurious four star hotel would be more likely to import most of its goods and services; if that means that better quality would be provided which would ensure better customer satisfaction. (http://geographyfieldwork.com/TouristMultiplier.htm 10. Conclusion Models could be helpful to develop a successful tourism destination and understand the different motivations of tourists. When the policy changes the supply for example to develop an area for package tourism, the demand will also change. That means that the supply has to meet the demand side when at the descriptive side the object and services changing. Plogs, Cohens and Doxeys models are descriptive because they just describe a situation but Butlers model is descriptive and prescriptive. TALC explains what is happening in an area and makes diagnose. After this diagnose the problem becomes clear and it is easier to make a decision for solving this problem. It is always necessary to find out how much potential a place has to make substantial development it in the right way. For this fact tourism models are helpful. 11. References Cooper, C, Fletcher, J, Fyall, A, Gilbert, D and Wanhill, S (2008) Tourism Principles and Practice (4thedn), Prentice Hall, Essex Gunn, C.A (2002) Tourism Planning (4th edn), Routledge, London Howie, F. (2003 a,b), Managing the Tourist Destination: A Practical Guide (1st edn), Cengage Learning EMEA Johnson Thomas (1992), Choice and Demand in Tourism, Mansell Publishing Limited National and regional tourism planning (1994) Methodologies and Case Studies (World Tourism Organization) (1st edn), Routledge, London Ryan, C (2003), Recreational Tourism and Impacts (1st edn), Channel View Publications, Clevedon Dominican Republic tourism, Tourism Development in the Dominican Republic: Growth, Costs, Benefits and Choices, avaible from http://kiskeya-alternative.org/publica/afuller/rd-tourism.html#ecsoc (accessed on 11.12.2009)

Monday, August 19, 2019

Divorce Impacts a Child Emotionally, Mentally and Academically Essays

Divorce Impacts a Child Emotionally, Mentally and Academically Over 60 percent of couples seeking a divorce have children still living at home. ( 6) What some parents don’t realize when they file for a divorce is the great impact that it will have on their kids. Divorce affects children in many ways. It affects kids emotionally and causes them to experience feelings such as fear, loss, anger and confusion. Divorce also hurts a child’s academic achievement. Children whose parents divorce generally have poorer scores on tests and a higher dropout rate. (3) Children react differently yet similarly in divorce. Every child caught up in the distress of divorce has a hard time coping with it and imagining their life without a parent. Their anxiety levels peak as they feel they are going to be abandoned. They experience feelings of loneliness due to the loss of the other parent. Different children go through these emotions at different levels and at different times depending on the child’s age. How bad or how well children handle the divorce depends on how the situation is handled. It can throw the child's entire life into a whirlwind. Young children, up to age five or six, are the most confused and the most disoriented by their parents’ separation. They often fear they are going to be abandoned by their parents, which causes great anxiety. The loss of a parent is extremely sad to a child of this age because they feel that their needs are not going to be attended to as well as they had before, when their needs are not going to be attended to as well as they had before, when their family was together. Many of the children in this group are worried that they will be left without a family or their parents might have money troubles and they will be deprived of food and toys. These thoughts that children of this age have cause them to have feelings of guilt, being unloved and fear of being alone. Some children will be extremely sad and show signs of depression and even sleeplessness. They might feel rejected by the parent who left and think that it is all their fault, that they weren’t good children and th eir parents stopped loving them. They also sometimes have increased tantrums, or may cry more easily than usual. Children at this age may develop physical complaints, like headaches, or stomachaches due to this depressing situation and time they are going thr... ...ng up in a single-parent home (usually female-headed) is seven times as likely to be a delinquent. The rate of violent crime and burglary is related to the number of single parent households with children aged twelve to twenty. (1)In a new study of 72 adolescent murders and 35 adolescent thieves, researches for Michigan State University demonstrated that the overwhelming majority of teenage criminals live with only one parent. Fully 75 percent of those charged with homicide had parents who were either divorced or had never been married at all.( 5) So, in conclusion, divorce is very bad for children. It ruins their lives and happiness. Losing a parent destroys a child emotionally, mentally and even academically. They would rather live with both parents because both of them are an important part of their lives. Two parents are better than one! Bibliography: 1) http://www.alfra.org/risks2.htm 2) http://www.canadianparents.com/articles/feature08b.htm 3) http://www.divorcereform.org/crime.html 4) http://www.ksu.edu/psych/bartel/adolescence/divorce-yes.html 5) http://www.theallengroup.com/members/Fr_flammer.html 6) http://www.womentodaymagazine.com/family/kidsdivorce.html

The Gentle Art of Web Pages Essay -- Web Internet Design Essays Papers

The Gentle Art of Web Pages For the last millennium, adventurous souls have been accessing new and unfamiliar frontiers in search of adventure and a taste of the exotic. The last decade ushered in with it an appeal to the more intrepid members of this small group of people: The Internet. Access to this particular medium has hit an all-time high in the 1990's, and every tekkie has his own celebration of self occupying space on it. However, not all of the sites on the Internet are shameless celebrations of self. Some of these pages can be found to have their roots in the archaic designs of the past; some are the logical progression for a technological innovation such as the internet. One of these progressions, cyberpunk, the 90's answer to the technological underdog, has made its presence known on the Internet; science fiction pages also abound. These sites have brought with them some of the most innovative and artistic features of hypertext mark-up language (HTML) ever conceived. One site in particular, the Sci-Fi Channel homepage, Sci-Fi Channel: The Dominion , has properties unlike any other seen on the Internet. Sci-Fi Channel: The Dominion is the shining example of a good web site because it contains the characteristics of a flawless page: the information is concise and well-organized, the graphics displayed are both aesthetically pleasing and practical, it contains features that are not seen anywhere else, and it is easy to use and understand. The creators of the Sci-Fi channel felt it their professional obligation to carve out their own section of cyberspace; hence the existence of the page at "http://www.s... ...enced web surfers and internet neophytes will find this page easy to use and understand. The first hurdle overcome by the designers (which is getting users to find and understand the site), the visitor can now concentrate on delving deeper into the site. Sci-Fi Channel: The Dominion is one of the most innovative web sites on the Internet at this time. It's use of aesthetically pleasing and practical graphics, of HTML features not seen anywhere else, and of information which is concise and well-organized, as well as the fact that it is easy to use and understand make this the template from which all other homepages should be made. What's more, the fact that it is a commercial site makes it more credible than a one made by a fan of the channel. As a result, the Internet would be easier to utilize and more accessible, catapulting society into the 21st generation.

Sunday, August 18, 2019

Home Schooling Provides Parents More Control :: Exploratory Essays Research Papers

Home Schooling Provides Parents More Control For most students, school begins with the first bell of the day and ends with the last, but for 228 pupils in the Smallville school district and roughly 1.5 million nationwide, the structure of a typical school day is anything but typical. These are home-schooled students, and their reasons for dropping out of standard educational systems are almost as varied as the hours which they keep. While some families want more time together, others focus on the special needs of children, and still others hope to instill values that they feel are not addressed in public or even private schools. Nearly all seek more control over the education of their children. "With home schooling, you can take your child's learning style and develop curriculum that fits how your child learns best. You're not trying to put a square peg in a round hole," said Sheri Cramer, whose ninth-grade son Jordan recently left public schooling to enroll under a new part-time policy adopted by the Lakota Board of Education last August. Under the policy, home-schooled students can enroll in up to two classes in the district each year and take part in extracurricular activities while maintaining their home-schooled status. "Through the policy, Jordan gets the best of both worlds †¹ he can still take part in school activities, but can work at his own pace and get individual attention also," says Cramer. It is this individualization that draws families to home schooling. "Because of the direct one-on-one interaction, you can tell if material is too boring or too difficult for your child and can make adjustments to that," says West Chester CHEC(Christian Home Education of Cincinnati) support group leader Susan Schechter, who has home schooled her two children for eight years. "I've always felt that I was able to do with home schooling what most teachers would like to do if they had the time and money." While expenses are not always a problem for home schoolers, they receive no financial aid from the government, and come from mostly single-paycheck families so that one parent can teach at home. "The idea is for parents to participate and share the skills they have with others so that we (home schooling families) don't have to hire as many teachers," says Schechter. For the majority of home schoolers, the primary teacher is the parent, though many are involved in home-schooling co-ops for special classes or hire private tutors for difficult subjects.

Saturday, August 17, 2019

Black Orpheus

Composition and literature December, 1, 2010 Film: â€Å"Black Orpheus â€Å" Marcel Camus The film black Orpheus portrayed some of the essential elements of the ancient myth very well and in a peculiar matter. Whiles watching the movie certain parts of the myth were very different and not depicted well. There were three parts of the movie in which really caught my eye in which had deviated from the myth. They were Orpheus and Eurydice initial relationship, the role of death and Hades. These three factors deviated slightly than the original Greek myth.In the original myth Orpheus and Eurydice were originally together and everyone was happy for their love. Their relationship was blossoming and all was good till a snake bite Eurydice and she dies. In the film† black Orpheus† on the other hand Orpheus and Eurydice are strangers and Orpheus is engaged to Mira. There are a lot of struggles before they are finally able to get together. In the myth everyone is happy for their love in the movie though they spend so much time trying to hide from Mira. In the ancient myth death was represented through the snake, which just bit Eurydice. n the movie death was a reoccurring figure in which continually kept searching for Eurydice. Death in the movie even was able to warn Mira not to harm Eurydice claiming she was his property . In the movie death was given too much power compared to the ancient myth. in the movie death continually haunted Eurydice eventually causing her own death. In the myth she was not haunted by death she just got bitten by the snake and died. In the film death was given too much power. The third and final thing that wasn’t well depicted in the movie was the role of Hades.In the original myth Orpheus goes down to the underworld with Hades and through music convinces the whole under world to allow him take Eurydice back to the world of the living. In the film Hades is represented as a mere janitor. Orpheus never tries convincing the j anitor though music. The janitor feels pity on him and leads him to the Macomb ritual. In the myth Hades is the only person who has the main say on whether Eurydice can leave the underworld and it takes much convincing though great music from Orpheus .In the film Hades level of respect and honor has been reduced to a mere janitor who doesn’t provide Orpheus with the answer but actually leads him to those who can help . The relationship between Orpheus and Eurydice, the role of death and Hades were all poorly depicted in this movie. It was a great attempt but one watching the film without knowing the myth might be confused about the original myth. The film could have made better attempts at making these three things more like the ancient myth. The film attempted to capture the significance of the myth but failed in actually conveying that to its viewers.

Friday, August 16, 2019

Operating System Differences

UNIX/Linux, Mac, Microsoft Windows Operating System Differences University of Phoenix Abstract This paper will elaborate on the major differences of the main Operating Systems (OS), which are UNIX/Linux, Mac ®, Microsoft ® Windows ®. The areas of discussion for this paper will be on Memory Management, Process Management, File Management, and Security for each operating system. Operating Systems (OS) for a computer is the main processing software program used to allow the computer processor to communicate with the software and hardware I/O devices.Computers as SUN, SUSE use UNIX/Linux operating system, Mac ® (Macintosh) computer uses Apple operating system, and Personal Computers (PC) and most business computers use Windows ® Microsoft ® operating systems. Operating System Computers as SUN, SUSE use UNIX/Linux operating system, Mac ® (Macintosh) computer uses Apple operating system, and Personal Computers (PC) and most business computers use Windows ® Microsoft ® ope rating systems. Each operating system is a multi-user system, multiprocessing, multitasking, and multithreading.An operating system capable of allowing multiple software processes to run at the same time is a multiprocessing and multitasking computer. Operating systems that allow different parts of a software program to run concurrently are considered multithreading. Computer processing uses memory for instructions and subroutines. The use of memory and managing is not simply just reading and writing to the computer. Each computer memory in the system uses it differently. Memory Management is a vital part of the processing of data. Virtual, cache, processor, data, direct access, random ccess, single in-line memory (SIMM) are types of memory used in a computer system. Processor speed is dependent on memory management, which allows the use and operation of the computers. Requirements for memory management are; Relocation, Protection, Sharing, Logical organization, and Physical organiz ation. Each of these mechanisms of memory assists the processing of data between the processor, I/O, Direct Access Memory (DMA) and software packages (Stallings, 2012). Memory management of UNIX/Linux, Mac, and Microsoft Windows Operating Systems (OS) are very similar and different in execution of memory management.The operating structure of UNIX computers is on an end terminal type configuration using their memory for servers, main-frame, engineering computers, workstations, and terminal to terminal use (Hass, 2012). Memories for these are large and fast operating. The UNIX computers use three different types of memory uses. The three named memories for a UNIX computer are Kernel, Cache, and virtual. Kernal memory is the OS’s own (semi) private memory (â€Å"Data Expedition†, 2012). This is always in Main memory. Cache memory’s main function is to hold the File System and other I/O operations.Virtual memory is an addressable memory space for processes to run on the computer. Virtual memory is divided into pages. Windows computers are also based on personal computer and server environments. Memory is large, fast, and used for software packages. Memory management in Microsoft Windows operating systems has evolved into a rich and sophisticated architecture. Capable of scaling from the tiny embedded platforms (where Windows executes from ROM) all the way up to the multi-terabyte NUMA configurations, taking full advantage of all capabilities of existing and future hardware designs (Solomon&Russinovich, 2010).Windows memory is more versatile in use than UNIX and Mac. The modern day personal home computer has Windows OS systems on them. Memory is used based on the operator use and software packages installed onto them. Memory management is different in each application for the different Operating Systems because of the way in which the memory is used. UNIX is more a business server use, needing more memory, and larger data transferring. Mac is a personal computer usage environment not needing as much memory for operating system, but for the software execution and data storage.Windows is also a personal computer environment with a server type environment growing in use. This memory management is both needing large sections of memory for data and operating systems transferring. Along with the processor speed, memory management is one of the most important parts of computer operation. The operating systems also rely on process management. Computers today have developed from running single program capability and running run one program at a time to having the ability to run multiple programs at the same time.They are also able to use multiple threads to provide more than one task to be run at the same time. Processes were created to help manage the execution of the programs. A process is defined as a unit of work in a modern time-sharing system during the execution of a program. There are five states that a process may be in n ew, running, waiting, ready, and terminated. Only one process can be running on a processor and the other processes are in a ready and waiting state. Operating systems use processes to execute the system code, which executes and runs the main programs to process and operate the computer.Operating systems may use the state of a process in different ways. A process control block represents a process in the operating system and contains the process state, program counter, CPU registers, CPU scheduling information, memory-management information, accounting information, and the I/O status information. To maximize the CPU processes need to be running at all times. As a process enters the system, they are placed in a job queue. A process scheduler is used to select the next available process for program execution. Process can be executed concurrently in most operating systems.Because all operating systems use processes to execute programs, This paper will compare and contrast some of the m ain systems like UNIX, Windows, and Mac. A UNIX operating system creates a process through a fork() system call and uses an identify processes by a unique identifier typically an integer number. The new process will contain a copy of the address of the original process known as the child. The child inherits the privileges and scheduling attributes from the parent. The parent could communicate easily to the child processes. The return code for the fork() call is zero for the child process and non- zero for the parent processes.To begin the execution of the process, the exec() after the fork() system call. The process memory space will be replaced with a new program. This allows two processes the ability to communicate and go their separate ways. A parent process will issue a wait() command whereas the child process is running so that it is completely removed from the active queue. Once the child process is terminated the parent will begin processing. Windows operating system is simil ar but offers some differences to process management than the UNIX operating system. The Win32 API uses the CreateProcess() function to create new processes.A specific program is loaded into the address space of a child process to create a new process. The CreateProcess() request expects at least 10 parameters. The first two parameters that pass through the command are START UPINFO and PROCESS_INFORMATION. The STARTUPINFO advises the new process what the window size and the appearance and handles to the I/O files. PROCESS_INFORMATION contains a handle and the identifiers for the new process and thread. A default parameter is used for the child process and the thread handles the specifying of no creation flags.The parent process waits for the child to process by using the waitfor singleobject() command and will be processed after the child has been terminated. The Mac operating system uses a process manager to schedule process. The number of processes are limited to the amount of mem ory available. The manager will maintain the information about the process. Process serial number identifies each process. The process serial number identifies a particular instance of an application. The foreground process has priority to access the CPU because the process is to allow only one foreground process at a time.A Multiple accesses process can be in the background. The process manager will automatically terminate a process when it exits its main routine or encounters a fatal error condition. The process manager will remove the process from the list of open processes and release memory occupied the application. Management of the processes is important to the operating system, but is also important on how files are managed. File management is primarily handled by the operating system software installed on a computer. Files are a sequence of logical records that are abstract and implemented by the OS.The user is primarily exposed to the file system portion of the operating s ystem making it even more important to have a user-friendly approach to the management of files. â€Å"A file system is a part of the operating system that determines how files are named, stored, and organized on a volume. A file system manages files and folders, and the information needed to locate and access these items by local and remote users (â€Å"What Is NTFS? † Local File Systems†,  2012). Systems for managing files provide users and applications with services like file access, directory maintenance, and access control or security.Windows NTFS, or New Technology File System, file system is intended to handle high-end applications like client/server applications, engineering, and scientific systems, and network applications for large companies and schools. One of the key differences in the Windows file system from other file systems is that it treats each file as two separate streams of bits within the same file. Key features offered by NTFS are recoverabilit y, security, larger files, and disks, journaling, compression, and encryption, and hard/symbolic links. Files are generally stored as clusters, which are one or more sectors side-by-side on the disk, or as a volume.NTFS does not recognize sectors, which are the smallest physical storage unit on the disk. Each volume consist’s of a partition boot sector, master file table, system files, and a file section. The master file table contains information about all of the files and directories on the volume. It is a table of 1,024-byte rows, or records with each row describing a file in the volume. A file can take up more allocated space, but tracked by pointers that point to additional clusters within the volume. Recoverability is not extremely robust but the NTFS does provide recoverability for directory/file structure if a crash occurs.Full recovery would require far more resources if it were implemented. Linux/UNIX supports a broad variety of file systems that map back into the u nderlying system it uses to support them. All UNIX file systems maintain a tree structure that runs under a root directory. Inodes are control structures that contain information pertaining to a file. An inode stores information like control information, size of the file, th etime the file was created, and any other information specified by the particular inode structure implemented. There are a various different file types utilized in the UNIX file system.Included are regular files, which encompass all software or data, and directories which contain files and other directories with at least a name and identification number for each file. Symbolic links are essentially an alias for another filename or directory, and IPC end points that communicate from one process to another process running on the same computer. Special files allow access to external devices, and physical devices. File access is controlled by a set of 12 protection bits comprised of nine bits of permissions, and thr ee bits that define special behavior.When files are accessed their inode is called into the main memory and stored. In UNIX all file allocation is dynamic, or on an ass needed basis. An indexed method is utilized to keep track of files and their locations on the Disk. Inodes contain both direct and indirect pointers to store index information for the file they are attached to. Macintosh systems utilize the hierarchical file system approach, but have updated the system to accommodate more modern utilization. HFS plus allows for smaller file sizes and more efficient utilization of larger storage spaces.It offers 32 bits of block allocation allowing for more files to be stored, and for the space on the hard disk to be utilized more efficiently. A Unicode file length of 255 will allow for more specific naming of files and easier differentiation between them. Dynamic inode length allows for larger branching in the file tree and less wasted space. The way files are stored is similar to th at of NTFS, but varies slightly in the way the volumes are broken down. The volume header is 1024 bytes in length and contains information about the contents.A catalog file contains information about the hierarchy of the files and folders within the volume, and an extents overflow file handles information pertaining to files with more than eight fork extensions. Attributes files are not fully explained but are a B-tree file that will be implemented in later named forks. Allocation files are bitmaps utilized to determine if there is a file allocated to an allocation block. Startup files are special files that hold information utilized when booting a system without a built in ROM. All operating systems have security issues and need good security protection of the operating system.Operating system security (OS security) is the process of ensuring OS integrity, confidentiality, and availability. OS security refers to specified steps or measures used to protect the OS from threats, virus es, worms, malware, or remote hacker intrusions. OS security encompasses all preventive-control techniques, which safeguard any computer assets capable of being stolen, edited, or deleted if OS security is compromised. (Stuart Ellis) As memory management, process management, and file management all are part of the operating systems vital elements, security is important, and even more important.Having unwarranted and unwanted access to files, data from outside source can be damaging and detrimental to the organization. The Unix/Linux systems have many security features that help in securing the system. UNIX has User Accounts protection, Password, file permissions, data verification, encryption, system firewalls, and application isolation. Each of the following security features has unique security for the Unix/Linux operating system (Sans. org). A widely used UNIX password security technique is the use of hashed passwords and a salt value (Operating systems, 2012).This type of passwo rd security is used on a UNIX-based system. When a password input into the system, it is combined with a fixed length word to complete the pass word. This added word is computer generated and is associated with the time of input. For the Apple/Mac user the Apple OS/X operating system is and has been very reliable and not prone to the virus attacks as other operating systems. For the general Macintosh user, the chances of getting hacked are low, especially if that user does not frequent any online chat facilities or make any on-line purchases; things of that nature.Apple/Mac computers have software package called, â€Å"SecureMac† which is a virus protection software only for Apple/Mac computers. Microsoft Windows has been most of the target for security issues and breeches in security. Virus’s, malware, spyware have all been problems with accessing Windows-based operating systems. Security for these is ongoing and because of the changing threats from viruses. Windows s ecurity has access control; password, file protection, and all can be protected by using the windows configuration files on the operating systems.Conclusion for this paper shows that each Operating System has memory management, processing management, files management, and security for the system to operate. The Operating Systems of UNIX/Linux, Apple/Mac and Microsoft Windows each have operating systems with these features. Each operating system is different but operate in the same manner for the computer system to work. The memory of each operating system is the same as it needs the memory to cache, save, and execute programs within the systems.File processing for each system also is similar but uses other software packages to process the files and deposit the data and execution files for operation. Process management is different because of its dependency on the executable programs in each operating system type. Security for each system is different as the way it is executed in the operating system. Security does the same purpose on each system, it provides security to not allow unauthorized access, system protection, and prevents data loss. The operating system is the main executable program that operates the computer, without it will not operate.As there are different operating systems, they are all making each computer sytem operate to the best way for users. References Haas, J. (2012). WHY UNIX. Retrieved from http:/Linux. about. com/cs/Unix101/a/Whyunix. html Data Expedition. (2012). Retrieved from http://tips. dataexpedition. com/memory/html Inside Windows 2000 by David A. Solomon & Mark E. Russinovich (2012). Operating Concepts (8th ed. ). New York, New York: John Wiley and Sons. (2012) Operating Systems(7th ed. ). New York, New York: Pearson Education Inc. What is NTFS? Local File Systems. (2012). Retrieved from http://technet. icrosoft. com/en-us/library/cc778410(v=ws. 10). aspx Stallings, W. (2012). Operating systems: Internals and design principles (7th ed. ). Boston, MA: Prentice Hall. MAC OS X File Systems. (1994-2010). Retrieved from http://osxbook. com/book/bonus/ancient/whatismacosx/arch_fs. html Technical Note TN1150. (2007). Retrieved from http://dubeiko. com/development/FileSystems/HFSPLUS/tn1150. html#HFSPlusBasics http://www. washington. edu/lst/help/computing_fundamentals/computermgmt/secure_winxp Operating Systems. (2008). Retrieved from http://www. mywikibiz. com/Operating_system? amp;lang=en_us&output=json&session-id=e48fac3a399120f77fb76caecd40b9b1 Janssen, C. (ND). Operating Systems Security. Retrieved from http://www. techopedia. com/definition/24774/operating-system-security-os-security? &lang=en_us&output=json&session-id=e48fac3a399120f77fb76caecd40b9b1 Introduction to Processes and Task. (ND). Retrieved from http://3 [email  protected] com http://www. stuartellis. eu/articles/unix-security-features/ http://www. sans. org/course/securing-linux-unix http://its. virginia. edu/unixsys/sec/ Memory Management. (ND). Retrieved from http://www. s. uah. edu/~weisskop/Notes490/mych7_mm1. ppt? &lang=en_us&output=json&session-id=e48fac3a399120f77fb76caecd40b9b1 Windows Memory Management. (nd). Retrieved from http://wiki. answers. com/Q/Difference_between_MS-DOS_and_Window_XP_Memory_Management? &lang=en_us&output=json&session-id=5eb449a7f1ebcb74325b62cb62158562 How NFTS Works. (2003). Retrieved from http://www. keppanet. netfirms. com Mac OS X security guide. (nd). Retrieved from http://www. securemac. com/macosxsecurity. php? &lang=en_us&output=json&session-id=de09de61be8aec54504d05a42635bfc1

Thursday, August 15, 2019

I Know Why the Caged Bird Sings Essay

The American Dream is true equality and freedom of the citizens of The United States. In Maya Angelou’s I Know Why The Caged Bird Sings, Marguerite struggles with the thought of feeling unwanted as a child and the discrimination against blacks. As Marguerite grows up, she experiences first-hand the cruelty of racism. Her struggles reflect on all the hardships the citizens of America went through when they were fighting for equality as well. It first started in 1607 when English settlers travelled to America for religious freedom. The freedom they sought out for eventually grew to be something more important than just religious freedom. Marguerite defies authority and segregation and eventually gains the equality she deserves. Even though the era of slavery has ended, segregation between blacks and whites were still present. The town that Marguerite lives in is separated from where the white population is and she barely knows what they are like and she wonders if they are even human. Early on in the story, Marguerite first experiences the cruelty of the local â€Å"powhitetrash† when her family is warned of the white men searching her town for a scapegoat. This causes her Uncle Willie to hide in a potato bin even though he is innocent. In chapter blank, Marguerite watches three white girls mock Momma and she feels anger towards their cruelty and unfairness. As Momma finds her crying in anger, this is the first time she felt the need to defy the white people and fight against them. This encounter foreshadows Marguerite’s future acts of defiance against white people, as the English settlers defied their kind and moves to America. Marguerite’s first true act of defiance was when she was working for a white woman named Viola Cullinan. Mrs. Viola Cullinan is rude and her friends mistreat Marguerite. In order for Marguerite to stop working for her, she broke her prized china. This was a sign of Marguerite finally taking a stand against being mistreated. Her resistance gains Marguerite back her pride and she is getting closer to the freedom that she yearns for. There are times in the story where Marguerite feels an extreme sense of pride for her and her people. At Marguerite’s graduation, a white man named Edward Donleavy degrades the black population by stating that they can only excel in sports. He causes the eighth grade class to feel ashamed of themselves because they feel unintelligent. Marguerite starts to regret the fact that Columbus discovered the new world and she wishes that he hadn’t. She feels so embarrassed, but Henry Reed, the valedictorian of her class brings their spirit back up. He has the crowd sing the Negro National Anthem and as his speech ends, everyone feels great pride swell inside of them. Marguerite feels proud of her heritage and education and ignores what harsh words of Mr. Donleavy. Another time when Marguerite feels proud of the black population is when she envisions Ms. Henderson standing up to Dr. Lincoln. She pictures Ms. Henderson turning into a superhero and scaring Dr. Lincoln. She states that she feels proud to be her granddaughter. The American Dream cannot be fulfilled unless the people have an extreme sense of pride of who they are and their country. Marguerite’s feelings were the start of the journey towards equality between all races. Marguerite first experiences a sense of equality when she attends a school in San Francisco. All the students are rude to her and act as if she is inferior to all of them. On the other hand, Marguerite meets a teacher names Mrs. Kirwin who doesn’t discriminate. She treats every single one of her students the same, no matter what their race is. She only remembers Mrs. Kirwin because she didn’t treat her differently. Marguerite experiences one final act of equality when she runs away from her father. She discovers a mix of young teens consisting of several races working together in equality. They give her certain rules that allow her to appreciate diversity and how everyone is the same. For example, everyone must work and put in an equal amount of effort to survive. Like the American Dream, everyone living in the junkyard is equal and treated fairly. There was no oppression or segregation when Marguerite lived in the junkyard. As it says in The Declaration of Independence, every American citizen is â€Å"endowed by their Creator with certain unalienable rights.† In chapter 19, the Store is filled people listening to the boxing match with Joe Louis, a hero from the black population. When he wins, Marguerite feels that he proved that black people are powerful people. The black population develops a sense of hope, feeling that things will start to change because Joe Louis made a difference and because he is a black man. They feel as if they finally took a stand to all the unjust lynching and discrimination against blacks. Near the end of the story, Marguerite becomes the first black person to have a job as a streetcar conductor. At first, there was a policy forbidding any black person to have this job, but Marguerite fights and against all odds, she is successful. This proves that regardless of social standing, one can achieve what they desire if he or she really wants it. Just as us Americans fought for freedom, Marguerite fought for equality.

Wednesday, August 14, 2019

Human Trafficking for Sexual Exploitation Essay

Subject: Human trafficking is the illegal trade in persons used for reproductive slavery, sexual exploitation, forced labor, organ removal, and other forms of slavery. In Argentina, it is a crime punishable by law, however the country continues to be a source and hub for trafficking. Executive Summary: Human trafficking is an international crime, and a violation of human rights; however, it is a felony that is still committed frequently throughout the international community. The issue stems from a lack of communication between provincial and federal governments, as well as the lack of tri-border control. In order to combat this, government officials and law enforcement officers need to be educated on the red flags of human trafficking. There also needs to be more funding and support for legal systems and organizations advocating to end human trafficking. Additionally, there needs to be more border control on the three borders that surround Argentina. Discussion: According to the  ­Protocol to Prevent, Suppress and Punish Trafficking, trafficking is defined as â€Å"the recruitment, transportation, transfer, harboring or receipt of persons, by means of the threat use of force or other forms of coercion, of abduction, of fraud, of deception, of the abuse of power or of a position of vulnerability† (UNODC). Trafficking is not  limited to sexual exploitation; practices include: forced labor or services, slavery, servitude, or the removal of organs. This is an ongoing issue because the United Nations as well as individual countries have laws against these crimes but no one to ensure that the laws are being followed. In Argentina, human trafficking is now part of the political agenda because of its link to organized crime. Official policy in Argentina has made progress in dealing with human trafficking, they have signed and ratified all UN conventions and protocols dealing with human trafficking as a crime. In 2000, Argentina signed the â€Å"Protocol to Prevent, Suppress and Punish trafficking in Persons, Especially Women and Children†, this supplemented the United Nations Convention against Transnational Organized Crime (UNODC). The protocol was later ratified in 2002, however there is still progress to be made because the number of people being trafficked it still high. In 2010, more than 600 women were abducted in 18 months, â€Å"for each known case there are 6 others which remain invisible† (Pichà ©). Argentina is a central point for human trafficking trade; men, women, and children from northern and rural areas are forced into prostitution in urban centers or wealthier provinces in central and southern Argentina. Many of those trafficked through the triple frontier are destined for the illegal labour market in Argentina. However in Argentina, it is estimated that 90 percent of the trafficking victims are sexually exploited women. Additionally, women from Paraguay, Bolivia, Peru, and the Dominican Republic are subjected to trafficking in Argentina. According the United States Department of state, â€Å"in 2011 the number of labor trafficking victims identified was over three times the number of sex trafficking victims identified during the year† (Trafficking). Argentina has consistently attracted migrants from Latin American regions seeking better economic opportunities. There are about 2 million immigrants from Chile, Bolivia, Paraguay, Brazil and Uruguay. Illegal immigration fuels the trafficking business because they are smuggled into the country, and they are easy victims for trafficking rings (Project Protection). At the same time, Argentineans from the northern provinces are at high risk for  trafficking because of extreme poverty, lack of education, and access to health services. Police in the northwestern province of Jujuy have received more than 50 reports of missing young women since September 2005. Most of these women have gone to see about jobs and were never seen again (Project Protection). Most end up in major cities and tourist areas Corruption within the police force has also prevented Argentina from decreasing trafficking rates in the country. It has been reported that police officials have participated in criminal activities related to trafficking, which thwarts government efforts to prevent trafficking from happening. According to a report released by the Office to Monitor and Combat Trafficking in Persons, authorities are currently investigating over 75 federal officials who have been removed from their positions after turning a blind eye to trafficking related problems. However as of 2011, the government did not prosecute or convict any government officials involved in human trafficking. Officers have looked in the other direction when coming across sex and labor trafficking activity, or tipped off brothel owners about raids coming up. The Argentine government has made progress over the past few years collecting data and stopping human trafficking. Over the past year, the government has reported and recorded the number of trafficking victims found, and implemented protocols and guidelines to eliminate trafficking, the country has increased prosecutions and convictions of trafficking. Further, the Argentine government funded five shelters to set up throughout the country as safe-havens. Part of the progress made is due to one of the most well known cases in Argentina, the case involving Marita Veron. Maria de los Angeles Veron (Marita) went missing in 2002, when she was kidnapped. A few days later she was seen escaping from a house, but was taken on to a bus where she was never seen again. Her mother launched a campaign to find her daughter, and soon became a symbol of the fight against human trafficking in Argentina. The Ministry of Security reported identifying about 1,000 victims, most of these victims being brought into Argentina from other countries such as Paraguay and Bolivia. A majority of human trafficking cases reported are reported as forced labor cases however, recently their have been more sex trafficking cases than labor cases. The quality and legal treatment of the victims varies from region to region, and many provinces lacked resources to care for trafficking victims, especially those in forced labor trafficking situations. Once the initial testimony is recorded, it is up to the Secretariat for Childhood, Adolescence, and Family (SENAF) of the Ministry of Social Development to provide follow-up care and assistance alongside the provincial authorities. The government officials in each province, as well as SENAF officials should have greater access to resources needed to provide the best care possible to human trafficking victims. According to the NGO, the office’s effectiveness in providing sufficient care for human trafficking victims is consistently questioned based on flawed data reports and the inability to provide service to the victims. Poor coordination among officials in Argentina is preventing the human rights laws from being as effective as they could. The lack of communication between the federal and provincial governments continues to hinder the effectiveness of anti- trafficking efforts. In many provinces, there is limited or no funding for the provincial and local efforts working to combat human trafficking in their area which creates an issue in making sure victims receive the proper care. Authorities reported funding campaigns for public awareness and public service announcements about trafficking. These PSA’s are being shown on long distance buses and aired on television, but until the country receives the proper funding, support for legal systems, the human trafficking problem will continue. In December 2010, the new Ministry of Security attempted to coordinate the  efforts of different federal law entities, create a database system for human trafficking crimes, and establish protocols with other ministries to strength federal-level collaboration. NGO’s also targeted the Ministry of Security, government officials, and federal law officers in order to improve the enforcement of human trafficking laws in Argentina. Specialized services for trafficking victims remain uneven across the country; competing mandates and lack of coordination between federal and provincial authorities caused delays in some investigations, and significant allegations of trafficking-related complicity of government officials at the local and federal level prevented more comprehensive anti-trafficking efforts. With the corrupt police force, and lack of funding, Argentina will never be able to successfully implement the programs. NGOs and some officials asserted that poor coordination among the federal and provincial governments continued to hinder the effectiveness of anti-trafficking efforts, as did limited or nonexistent funding for provincial and local efforts to combat trafficking. The Argentine Government, in collaboration with the International Organization of Migrations, has recently published a report on human trafficking. The report identified crucial gaps in the fight against human trafficking that need to be addressed: 1. The lack of qualification of judiciary personnel and the lack of knowledge concerning the dynamics of human trafficking networks and international and national laws and treaties. 2. The lack of security along the Tri-Border area. 3. The lack of human and material resources to carry out adequate investigations. 4. The absence of programs for the middle and long-term assistance to the victims and lack of protection for the witnesses. The biggest issue for Argentina comes from the Tri-Border area. Along the border between Argentina, Brazil, and Paraguay, young prostituted children and adolescents can be seen on the streets of towns such as Puerto Iguazu,  Argentina; Foz do Iguazu, Brazil; and Ciudad del Este, Paraguay. After years of debate within the Senate in Argentina, a law was passed to â€Å"prevent trafficking in persons, protect victims of trafficking, and punish perpetrators of human trafficking† (Project Protection). Under the new law, prison sentences were established for those convicted of participating in the recruitment, transportation, or reception of people for the purpose of sexual or labor exploitation. The law provides protective measures for victims of trafficking, and gives victims the right to free psychological, medical, and legal assistance, in addition to the right to privacy. The Organization of American State has closely watched Argentina’s anti-trafficking efforts. the Argentine government has partnered with an institute in Buenos Airs to create incentives in urban areas for companies that obey the country’s labor laws. Based on the issues identified above, it is recommended that the Argentine government uses a multilateral approach to stop trafficking. Recommended action : In order for Argentina to successfully combat human trafficking at a national level, the government needs to continue to implement the anti-trafficking law with increased efforts to investigate, prosecute, convict, and punish trafficking offenders, including public and police officials who are involved in trafficking crimes. An increase in funding for victim assistance, particularly through shelters and specialized services, on a local and national level would also be beneficial to stopping internal trafficking. There should be continued education for law enforcement officials, public figures, a judiciary actors to know how to stop a trafficking ring. To prevent trafficking in individual provinces in Argentina, the government must develop and implement protocols for provincial officials to identify and assist trafficking victims. Continued investigations of labor  trafficking in urban and rural areas of Argentina, and holding companies whose supply chains benefit from labor trafficking accountable for their actions. The government needs to have better communication between the federal and provincial officials to develop and national anti-trafficking plan, and continue to raise awareness nationwide. The multilateral approach to educating and preventing trafficking in Argentina involves an agreement between the Defense Ministry, and the Buenos Aires provincial Education Ministry. This partnership would create protection by educating military and law enforcement officials, in addition to students to be aware of the human trafficking issue, and how to prevent and protect themselves. The final solution is better border control across the tri-frontier. The geography already creates an area that is hard to protect. It is hard to monitor traffic coming in and out of three countries, and some people just completely surpass border control and show no identification when passing between one country and the next. This area annually generates over $6 billion of illicit money and is nearly devoid of all governmental control. Most governments among the TBA deny the problem claiming they have not detected activity in the regions, but other countries disagree. It is vital that Paraguay, Brazil, and Argentina start paying closer attention to the border in order to stop trafficking among other illicit activity. The Argentine government’s multilateral approach to stopping trafficking by educating, training, raising awareness, and implementing better border control will help to decrease trafficking rates in Argentina, and eventually put a stop to it. Thank you for your time, Melanie Rose Sources: http://www.protectionproject.org/wp-content/uploads/2010/09/Argentina.pdf http://www.avijorisch.com/9560/tri-border-region http://www.state.gov/j/tip/rls/tiprpt/2012/192366.htm http://www.unodc.org/documents/data-and-analysis/glotip/Trafficking_in_Persons_2012_web.pdf