Monday, February 28, 2011

Management by Objective (MBO)

Management by Objective (MBO)
Management by Objectives, which is also known as MBO, which involves a mutual understanding of the supervisors and the employees. In MBO, the supervisors and the employees are set goals bilaterally with the mutually understanding of each other for the sake of the organization. This technique is generally occurring twice in a year, “One at the beginning of the fiscal year, then at the end of the budget year”. In the beginning understanding, supervisors and subordinate agrees upon the subordinate’s targets of performance, while in the end they meet again to compare the targets with results.
There are three steps included in the practice of management by objective performance appraisal, let’s see each of them in a bullet form.
  • Common goals for the entire organization taken into consideration while setting the goals among the subordinate and supervisors.
  • When the time arrives to compare the performance of the year as a whole, then the managers wants from each employee to write a brief statement of their own performance and also include such points, where the organization lacked.
  • If the manager or subordinates feel any lacking in the method which may intervene the net result then either manager or employee has the right to take a counter action or abrogate any proposal.
 MBO technique is quite familiar within the organization and it is commonly used in the current scenarios because of its wonderful attributes. MBO, not only revolves around individuals improving his pr her performance but it also help out the whole organization to directed or adequately driven the employees towards achievement of organizational goals. The best part of the MBO technique is that, it includes the involvement of the employees which is really an integral tool to boost up the moral among the employees. Rational remedy and judgment for any arising problem in the premises of the organization become relatively easy if both the supervisor and the employees work together to solve out the problem. A small sort of beam of disadvantage has also seen while implementing the MBO technique on the performance appraisal which is that, the technique is merely emphasized on results and the main concerned is that exactly how a goal will be achieved, which sometimes over burden the work pressure on the employees as well as on the subordinates, which leaves an adverse effect on their health. Abundance of paper work usage is also a disadvantage of the MBO technique, which are in the light of research and soon be mitigating accordingly. MBO system will change people’s performance if it is sturdily supported by the senior management and immediate managers.

TYPES OF PERFORMANCE APPRAISAL

TYPES OF PERFORMANCE APPRAISAL
There are an enormous methods of appraisal persists. Under this heading we will examine in details regarding the diversified techniques used by the organization to evaluate the performance of the employees in the organization.

Critical Incident Technique (CIT)
Outstanding success and outstanding failures are the two basis of this method. The method is commonly known with the name of CIT. The main prospective of the critical incident techniques is to avoid the problems of the recency effect which can be done by keeping a log over time of incidents rather than recence at the time of appraisal. In this technique the evaluator listed down the observable behavior of the employees from time to time and assists in producing the records for the employees. CIT doesn’t follow a hard and fast rule to evaluate the performance of the employees.  In this evaluation the evaluators have specified expected responsibilities of the job of every employee. The comparison between the performances of the employees will be done by compare the list of two employees. The most dominating characteristic of the CIT is that, this method focus upon the most important aspects of a job or more precisely we can say that the method mostly emphasized on the job description and the job specification of the employees. In CIT different kinds of logs and charts are also maintain to provide very specific examples for the evaluator at the time of the appraisal. Managers and evaluators often used the charts to gauge the performance of an employee and after their assessment they present the progress before the employee with due diligence. 

Essay or Narrative Evaluations
Observation of the performance of specific job duties is described in this method. Every organization made some kind of standards to evaluate the performance of their employees in an impeccable manner. Likely, the evaluator is following some pre-determined standards and with the help of these standards evaluation of the employee’s responsibilities, strengths and weaknesses becomes relatively easy. To work on a standardized format is mandatory in order to ensure the consistency among the evaluation process. In an essay evaluation method a series of questions has been include in the evaluation form which have to be duly filled by his immediate manager or supervisors to estimate the performance of the employee. The main flaw which persists in this evaluation is the lack of writing skills of the evaluator. Another drawback of the process is that it halts the employee to viewed his/her own performance and the evaluator is not suppose to describe the performance of the employees in front of them in a proficient manner. Uncertainty in the validity in comparing the performance of the employees are also found by using this process, which is one of the major causes why a number of organizations doesn’t like this process to adapt. However the method is quite useful to direct the right part for the employee’s strengths and weaknesses, areas of improvement and career direction. One of the biggest advantages of the method is that it enhances the level of interaction between the employees and the supervisors which ultimately boost up the moral and satisfaction level of an employee.  

Rating Scales
The easiest technique or method uses by the managers or the evaluators is the rating style methods. It seems relatively easy to grade the employees as compared with the other set of measurement scale. Accumulation of the information regarding the performance of the employees become more precise and specific with the help of rating scale which excrete out a meaningful result for the employees in the end of the day because the method is totally based upon the predetermined standards. An employee’s performance has been judged through the numbers or adjectives or both can be used to rate an employee. Ethical issue arise in the utilization of this method because a numerous amount of peoples percept that estimating the performance through number seems bit impersonal. On the contrary the adjectives can provide great feedback which are totally relevant to the specific area of a job of an employee. A number of peoples still contradict the ranking method with the rating process or methods and thinks that both the methods are congenial in nature but it is not true, both the things are totally differ in nature. On of the great advantages of the rating scale method is that they are easy, to the point, quick, specific and accepted well by the managers and the supervisors as well. One thing must be bare in mind while applying the rating method to weigh the performance of the employees that the method is suitably applied in the correct manner because the overall goal can be overlooked if too many people involved in this method. 

Love on the Dole Gender Book Review


Love on the Dole Gender Review
            “Love on the Dole” by Walter Greenwood, published in 1933,  turned out an enormous influential novel in the view of British public in relation to unemployment and social deprivation that encouraged an inquiry by the Parliament which became the cause of reforms. This novel is a piece of fiction, but this type of fiction portrays a close look of people’s life and Greenwood himself.  It presented that the people he brought up with and later on he studied from coroners of street. In this regard he always keeps a diary to note down the facts and realities in order to use at later stage.
            The book pursues the family of Hardcastle as they are forced not together by mass joblessness. Harry Hardcastle, 16-year-old, begins the book when he is working on a store of pawn, but Harry is so much interested in working in the engineering factory that is called Marlowes. By working in that company as a trainee after 5 years he is suspended in the difficult time of Great Recession, and is thereby incapable to discover job. Meanwhile in the unemployed period he falls into love with a girl of his street whose name is Helen. He invites her to his home and he gets Helen pregnant and this pregnancy pushes him to marry with that girl. And it is the fact now Harry is not only a jobless but also dole is taken from Harry by the Means Test. At the same time Harry’s elder sister whose name is Sally Hardcastle engaged into love with Larry Meath who is a socialist and they both undergoes the unwelcome concentration of Sam Grundy who is an illegal bookmaker. His sister feels incapable to struggle with socialist intellectualism of Meath, identifying not only the financial but also the rational scarcity of the domestic lower-class society. (Constantine, 1999)
The book’s climax concentrates on a genuine march, in which the NUWM protested in October 1931 on Salford Town Hall. Itself the march faced with aggressive police challenge; in the novel, as a consequence Larry Meath dies because of blows to the head from a police officer’s stick. After the death of Larry Meath, Sally sadly surrenders to the Sam Grundy’s concentrations that enable both her brother and father eventually to find job. (Speakman, 1986)
The book received so much response from authors, reporters, and politicians, who were all stimulated by its consideration of poverty, but significantly, by its explanation of a lower class society trying to cope with that poverty with cleverness and self-esteem. Finally, the dole was extracted even if the means test demonstrated that other participants of the family contribute enough to help them. It means that often the daughters would wind up helping whole families; in fact her saving was not sufficient to live on (Constantine, 1999). Regardless of the widespread poverty and the realization of gloom and doom there is abundance of humor between the characters as well, that is identified in the tale and stop it from being totally miserable and other things don’t finished too badly for the Hardcastle home in the end.    

References
Speakman, Ray. (1986). Introduction to Love on the Dole by Walter Greenwood. London:
Heinemann Educational Books.

Constantine, Stephen. (1999). "Love on the Dole and Its Reception in the 1930s," in Literature
and History. Manchester: Wiley.  



Sunday, February 27, 2011

Child Pornography

Abstract
Child pornography access through the Internet is easier than ever before. While most researchers and policymakers agree that this media is both enveloping and harmful to our community, we have yet to come to a harmony on how to remove this threat to kids worldwide. This assessment reviews fences the global society must overcome to successfully react to the abuse of children whose sexual maltreatment is chronicled by websites and Internet distribution. Mystery, lack of harmony on pertinent definitions, poor resource allocation, not consistent enforcement, and new threats are examined. To really attack the issue of child pornography, nevertheless; a coordinated reaction of education, cooperation, standardized legislation, and resource allocation is needed.

Introduction
The Internet has opened a virtual Pandora’s Box of sexually explicit images, containing child pornography. New and enhanced equipments/tools such as digital cameras and editing program/software have made it easier to make and deliver child pornography (Meier, 1999; Ong, 2005). And while there is argument as to the utility and legitimacy of sexually explicit images of adults, most would agree that there is no satisfactory disagreement in support of legalizing portrayals of children forced to involve in sexual activity or poses.
Child pornography can be observed as a higher amount of offense than simple child sexual maltreatment in that the sexual exploitation is chronicled by pictures or videos, for the executor or whomever he/she selects to view again and again. In this, the pictures are a permanent record of the child’s maltreatment (Medaris and Girouard, 2002). Yet, the harm in child pornography is not limited to the inherent harm to its sufferers. Certainly, the injury can be extended to how the material is employed by sexual predators, who may display sexually explicit photos of kids to potential sufferers in an attempt to break down hurdles and desensitize them to sexual action and/or activity (Adler, 2001; Medaris and Girouard, 2002; Ong, 2005).
What constitutes ―child pornography is hard to express given the vagaries of the law. In New York v. Ferber, the American Supreme Court established that child pornography is not constituted under the 1st Amendment and that it should be banned because of the harm sustained by sufferers during its making (1982) in addition to the severe continuing consequences for sufferers’ self-respect (Ong, 2005). In the wake of NY v. Ferber, American Congress passed the 1984 Child Protection Act, which described child pornography in very wide terms (Adler, 2001). One more Supreme Court ruling permitted states to ban depictions of child nakedness if there was graphic concentrate on the genitals, thus making control of child pornography prohibited (Adler, 2001).
Current American statute describes child pornography as ―a visual portrayal of a minor involved in sexually explicit conduct (18 U.S.C. 2256 [8]). On an international level, though, definitions differ from area to area, state to state. Erotica, degrading pornography, aggressive pornography – there is no harmony on major terms associating to this area. What is measured unlawful material in one state may be lawful in others. Furthermore, statues have to be written very cautiously because if they are too wide and far-reaching, they can be struck down as violations on people rights. Akdeniz warns that rules planned to defend children should not contain categorical prohibitions against Internet use to supply substance in areas where the material is willingly accessible to adults in other types. Some have resisted Internet regulation by the regime arguing that that it should be self-controlled by site owners, parents, and global collaboration.
Definitional problems also contain what constitutes a child and what constitutes pornography (Mitchell et al, 2007). In the America, the minimum lawful age for sexual activity can range from fourteen to eighteen. As well, the age of mainstream differs from one state to another, and various states have unlike standards as to what constitutes obscenity or pornography (Ong, 2005). For instance, while American believes computer produced sexually explicit pictures of children legal, they are prohibited in the United Kingdom, Hong Kong (Ong, 2005), and Canada. Additional, not all states make illegal sexually explicit images of kids. Furthermore, cultural mores may prohibit an open debate of problems such as sexual maltreatment, sex, and pornography, which may delay passage of legislation prohibition child pornography (Ong, 2005).

New Threats
Internet child pornography introduces a lot of challenges that conventional printed stuff does not. For instance, the Internet permits criminals the ease of anonymity  (Medaris and Girouard, 2002), and it is feasible that this capability to remain unrecognized may be a participating factor to the raised number of child porn users who may not otherwise seek this kind of stuff (Mitchell et al, 2007). In addition, the secrecy of the Internet permits adults to make online profiles demonstrating they are kids, thus giving them easier access to kids (Ong, 2005).
Compounding the issue is the comparative comfort in which online abusers can use anonymous proxy servers, several of which are free and situated in other states. Proxy servers enable a single computer linked to the Internet to act for one or more other computers. By utilizing a proxy server, a person’s online illegal activity emerges to have been done by the proxy server (Mitchell et al, 2007).
On the other hand, law enforcement tries to track online criminals are aided by secrecy as well. In the same way possible abusers can pretend to be kids when online, it is comparatively easy for an undercover agent to impersonate a child in chat rooms or social networking sites (Friel, 2006).
One more new challenge in addressing the issue of child pornography is that sexually open stuff is comparatively cheap and easy to make and access. Professionals worry Internet availability is leading to the abuse of more kids (Mitchell et al, 2007; Mueller, 2006) by generating a demand for new sufferers or moving from fantasy or voyeuristic action to hands-on crimes against kids (Medaris and Girouard, 2002). Additionally, this increased availability to online child pornography appears to be desensitizing abusers (Friel, 2006; Mueller, 2006; Schell et al, 2007); pictures are displaying younger children and more aggressive/graphic acts against them.. Alarmingly, several professionals agree that pornography performs a role in employing and controlling new sufferers by not only making kids believe sex between adults and kids is normal, but using the images taken of the sufferer as possible blackmail to make sure the sufferer’s silence (Medaris and Girouard, 2002). Furthermore, some online pornographers are taking additional measures to stop detection, such as utilizing file-sharing networks and encrypted web pages, anonymous proxy servers, utilizing stolen credit cards, and traveling to distant states to abuse kids (Mueller, 2006).
Not only are online abusers utilizing the computer to find potential sufferers, they are utilizing the technology to find other like-minded people. Computers permit pedophiles to interact with each other to find sufferers as well as to exchange and deliver sexually explicit pictures. For pedophiles, this online society assigns status based on the amount and quality of their photograph collections. This collecting behavior adds creditability to the disagreement that sexually explicit pictures of kids are both trophies and supplies (Quayle and Taylor, 2002).
As growing numbers of kids employ the Internet on a frequent basis, the possible of unwanted sexual solicitations also raises (Mitchell et al, 2007). Criminals may take benefit of the trusting nature of kids by obtaining personal information and increasing online contacts for the purpose of luring them away from home for sexual intentions (Medaris and Girouard, 2002). Mitchell et al 2007 discovered one in four youths who employ the internet got requests for sexually explicit images, therefore engaging kids to self-produce heir own pornography (2007). In addition, it is projected that kids between the ages of twelve to seventeen are among the largest users of pornography (Meier, 1999).

Resources Allocation
As several states concentrate law enforcement resource allocation on attempts to inspect terrorism, referrals for prosecuting suspected terrorists have raised (Mueller, 2006). In spite of the threat of terrorism, associations must locate a balance between distributing resources for counterterrorism with the demand for analyzing data in child abuse cases (Mueller, 2006). Internet child pornography cases are difficult and time taking endeavors and often need networking with other jurisdictions. Often, by the time examiners have effectively traced the supervisor of suspected child porn websites, the websites have transferred elsewhere on the Internet. Additionally, specifically sophisticated web admins can make their sites seem to be managed from overseas or can conceal the true “Internet protocol” IP address in order to hide their online locations (Medaris and Girouard, 2002, Mueller, 2006).
For several years, a lot of law enforcement agencies have relied on free software applications to help track IP locations of suspected online abusers, there is no responsibility for the programs to work precisely, there is no technical assistance, and the proof obtained utilizing freeware is not always admissible in court (Medaris and Girouard, 2002, Mueller, 2006). On the other hand, more recently, some agencies are utilizing a network analyzer program to capture and show user IP addresses, which increases some of the issues of freeware. Like several other industries, Internet child porn sites promote to potential new customers.
While the advertisements assist law enforcement in finding the sites, several sites use a sophisticated system of registering consumers so that only paying users are connected to the prohibited stuff, often masking the true location of the content (Medaris and Girouard, 2002, Mueller, 2006). In addition, some sites use 3rd party collection sites to get user payments. While American firms have been willing to help law enforcement with consumers records, foreign firms have not been as supportive (Medaris and Girouard, 2002, Mueller, 2006).
American Federal Bureau of Investigation (FBI) presents training on their Image Scan program, which permits examiners to recognize, isolate, and store images from a suspect’s computer onto a portable jump drive. Not only is this training presented to law enforcement within the America, it is presented to partner agencies in other states as well (Medaris and Girouard, 2002).
In addition, in response to the growing threat of online sexual abusers, the Internet Crimes Against Children Task Force Program was started in the America in 1998. The program helps state and local law enforcement agencies make policies for addressing problems associated to sexually-motivated cyber offenses, containing training and technical support, investigative and forensic components, sufferer services, and public education (Mueller, 2006).
Nevertheless, without enough resource allocation, tries to inspect online child pornographers effort. In police agencies without enough technological expertise or the funding to obtain advanced tools for conducting forensic computer inspections, several cases are possibly ignored (Medaris and Girouard, 2002).

Public Policy Issues
Given the definitional problems of what constitutes a kid or child pornography, one of the most significant policy problems of this issue is developing a uniform, cross-cultural definition or guidelines on what constitutes child pornography. In doing so, the legal action worldwide can be more successful and both purveyors and users can be held lawfully responsible for the harm they cause. Cassanova suggests a stress on protecting kids in enacting legislation as this concentrate usually supersedes right to privacy and free speech problems. Furthermore, legislation should contain provisions that enable for prosecution of child pornography processes, providers, sellers, and users in their home states for materials produced, supplied and sold in other states (Akdeniz, 2001).
A major component in capturing sexual abusers is cooperation (Mitchell et al, 2007) between global, national, state, and local law enforcement agencies (Medaris and Girouard, 2002, Mueller, 2006). Global support is an essential component as the technology branches across national limitations. Internet child pornography is an international threat. As a result, global collaboration is an essential (Mueller, 2006). Police agencies, specifically small agencies or those rural regions that might not have the resources to have trained employees must be willing to ask for support from agencies with employees particularly trained to carry out this type of inspection.
Cooperation with the private sector can also be a major element in fighting child pornography (Ong, 2005). Not only can private people assist the police in reporting suspected online abusers, but private business may be useful in developing policies for tracking criminals.
One more component for policymakers in addition to the media is to make sure the message of prevention and detection is given to the public, particularly parents (Mueller, 2006), educators, trainers, and child caregivers (Ong, 2005). It has been disputed that it is the parents’ duty—not the regime’s—to observe what their kids are evaluating on the Internet in addition to those with whom their children are interacting on the Internet (Akdeniz, 2001). On the other hand, while public awareness is growing, several parents and kids remain unaware of the possible threats of disclosing personal information to the strangers they meet online (Medaris and Girouard, 2002). Parents may not recognize web cameras and chat rooms as possible for child maltreatment (Mueller, 2006). And, parents may not be conscious that online abusers have approached their kids with unwanted sexual solicitations or demands to take sexual photos of themselves. Nevertheless, the message needs to be passed on to both kids and adults; public need to be aware that these kinds of requests are prohibited and should be informed to the police (Mitchell et al, 2007). Public service declarations and training for parents on strategies used by online abusers can be helpful tools in assisting the public realize how these offenders operate (Mueller, 2006). But the bottom line is that parents require to be more positive in observing their children’s Internet employ, containing keeping the computer in a public area of the house instead of the bedroom, teaching kids how to defend their personal information, discouraging the employ of webcams, and discussing to kids about those with whom they interact online (Mueller, 2006).
Additionally, attempts should be made to partner with Internet service suppliers in reporting prohibited content. By saving and giving this data to law enforcement, Internet service suppliers can play a major role in effectively prosecuting online abusers (Quayle and Taylor, 2002; Mueller, 2006). In the America, coordination between Federal law enforcement organizations and Internet service suppliers has been a comparatively smooth procedure, but more agencies should have approach to child pornography associated tips to the National Center for Missing and Exploited Children. And, some statutes limit distributing these tips with state and local agencies (GAO, 2002).

Conclusion
Obviously, there is much work to be accomplished to truly eliminate the availability of online child pornography. But, growing numbers of parents and kids are becoming conscious of the possible threats of the Internet and how to defend against online abusers. In addition, law enforcement officials are developing expertise sets to inspect and coordinate efforts to track and apprehend online criminals. Such coordination is necessary in decreasing the risk of a criminal having advance notice that the police have detained co-conspirators and may be on the way to arrest him (Medaris and Girouard, 2002, Mueller, 2006). Eventually, policymakers must develop standardized reactions to people arrested for this conduct. Laws addressing the making, sharing, and control of child pornography differ from area to area and state to state, allowing criminals ―safe pockets from which they can manage. Coming to a harmony on what constitutes child pornography and developing similar results for those who select to involve in this activity would eliminate safe havens for criminals.
Child pornography is a dangerous, destructive, and abusive act toward the adolescence of the world. On the other hand, with additional educational endeavors, raised resource distribution to police organizations and/or agencies, and a more coordinated, standardized reaction from policymakers, we can move forward in pulling the plug on child pornography.
 
References
Akdeniz, Y. (2001).  Governing pornography  and  child pornography on the Internet: the UK
approach.Cyber-Rights, Protection, and Markets: A Symposium.  University of West Los Angeles Law Review, 247-275.

Meier, E. (1999). Child pornography, the Internet, and congressional activity.  Pediatric Nursing, 25: 661

Ong, R. (2005).  Child pornography and the Internet in Hong Kong. Rutgers Computer  and
Technology Law Journal, 32(1): 81-108.

Schell, B. H., Martin, M. V., Hung, P. C. K., and Rueda, L. (2007).  Cyber child pornography: a
review paper of the social and legal issues and remedies – and a proposed technological solution.  Aggression and Violent Behavior, 12: 45-63.

Medaris, M. and Girouard, C. (2002).  Protecting children in cyberspace: the ICAC Task Force
ProgramOffice of Juvenile Justice and Delinquency Prevention Juvenile Justice Bulletin, January.

Adler, A. (2001).  The perverse law of child pornography.  Columbia Law Review, 101 (2): 209-
273.

Quayle, E.  and  Taylor, M. (2002).  Child pornography and the Internet: perpetuating a cycle of 
abuse. Deviant Behavior: an Interdisciplinary Journal, 23: 331-361.

Mueller III, R. S. (2006). Child pornography and the Internet: protecting the most vulnerable
among us.  Washington, D.C: Address delivered to the Project Safe Childhood Conference

Mitchell, K., Finkelhor, D., and Wolak, J.D. (2007).  Online requests for sexual pictures from 
youth: risk factors and incident characteristics.  Journal of Adolescent Health, 41: 196-203.

Jewkes, Y.  and  Andrews, C. (2005).  Policing the filth: the problems of investigating online
child pornography in England and Wales.  Policing and Society, 15 (1): 42-62. 

Confucius


Confucius
     Confucius was China’s most well-known Theorist and/or Philosopher. He resided in Ancient China in the Zhou Dynasty (Freedman, 2003). Confucius was a regime official, and in his lifetime (551 to 479 B.C.) he saw growing chaos and turmoil in the system. Perhaps due to the chaos and prejudices he saw, he set himself to establish a new moral code based on reverence, honesty, education, benevolence and strong family bonds. His teachings later became the foundation for spiritual and ethical life all over the China (Freedman, 2003).
     Confucius’ main beliefs gained broad acceptance primarily because of their basis in common Chinese tradition and belief. He obtained strong familial allegiance, ancestor worship, reverence of elders by their kids, and the family as a foundation for a model administration (Freedman, 2003). Although Confucianism is often pursued in a spiritual manner by the Chinese, arguments carry on over whether it is a religion. Confucianism does not lack a life after death; the texts explain simple views about Paradise, and are comparatively unconcerned with some religious matters often measured necessary to spiritual thought, such as the nature of the soul (Freedman, 2003).
     The Confucian philosophy of morals as represented in Li is based on three significant conceptual features of life: ceremonies related with give up to ancestors and deities of different kinds, social and political foundations, and the manners of everyday behavior. It was considered by some that li originated from the paradises (Freedman, 2003). Confucius’s philosophy was more nuanced. His style stressed the development of li through the actions of intellectual leaders in human history, with less stress on its link with paradise. His negotiations of li seem to redefine the term to refer to all actions committed by an individual to establish the ideal community, rather than those simply in compliance to canonical standards of rite (Freedman, 2003). In the early Confucian custom, li, though still connected to conventional types of action, came to point towards the balance between keeping these standards so as to perpetuate a moral social structure, and infringing them in order to do moral good. These theories are about doing the appropriate thing at the appropriate time, and are related to the belief that training in the li that past philosophers have devised develops in people virtues that contain moral decision about when li must be implemented in light of situational contexts (Freedman, 2003).
     Confucius’ political concept is based upon his moral thought. He disputes that the best administration is one that principles through “rites” and people’s natural ethics, rather than by employing corruption and coercion. He described that this is one of the most significant analects. “If the individuals be led by rules, and uniformity sought to be provided them by sentences, they will attempt to evade the sentence, but have no sense of embarrassment. If they be led by good quality, and uniformity sought to be provided them by the laws of politeness they will have the sense of the embarrassment, and furthermore will become good” (Freedman, 2003). This “sense of shame” is an internalisation of responsibility, where the sentence precedes the sin action, instead of subsequent it in the type of rules as in Legalism.
     Eventually, Confucius’s works are researched by several scholars in several other Asian nations, specifically those in the Sinosphere, such as Korea, Japan and Vietnam. Several of those nations still hold the conventional memorial ceremony every year (Freedman, 2003). His methods, preserved in the Lunyu or Analects, shape the base of much of following Chinese speculation on the education and behavior of the perfect man, how such a person should reside his live and communicate with others, and the forms of community and regime in which he should contribute. Fung Yu-lan, one of the great twentieth century powers that be on the history of Chinese thought, evaluates Confucius’ affect in Chinese history with that of Socrates in the West.

Reference
Freedman, Russell. (2003). Confucius: The Golden Rule. New York:
Arthur A. Levine Books.

Saturday, February 26, 2011

Motivations of an Arsonist


Arsonist
            Arsonist is a person who sets anything on fire intentionally. This intentional act is called the arson. Generally a home or another type of structure has been targeted by the Arsonist. Arson is committed for a number of reasons, and the crime is strictly punished throughout the world because arsonist sets property and lives at risk. “In certain parts of the globe, if somebody expires in an arson fire, it is deemed to be a murder, instead of neglectful homicide or manslaughter because arsonist is considered such a reprehensible criminal. In all cases, an arsonist holds a prison term.” (Holmes & Holmes, 2008, pp. 3)
            In the majority of states, arson has been extended to comprise burning arrangements in addition to dwellings, burning the own assets for unlawful purposes, and destruction caused by an explosion or a fire. Currently “if someone arson his/her house to avail the insurance benefits because the amount of insurance is higher than the actual real value of property that would be linked to arsonist” (Stewart, 2006, 15-16). Other motives for arsonist would be to bomb or burn a religious place in a hate crime, or burn the property in vengeance for a denial to sell it. If an arsonist burns down his building as a figure of cheap destruction and unintentionally sets half the neighborhood on fire that may or maybe not an arsonist, depending on the legislation of the state.
            Fire by an arsonist includes the induction of a heat source that can be as unadorned as a match or as compound like dangerous chemicals with very low explosion temperatures. By the rule of legislation a fire is thought to be an arson fire when all other unintended causes have not been met. We can say that reason of a fire was arson and consequently intentional, the detective must have adequate proof the one of the issues in the arson triangle was interfered with.

Motives for Arson
            The motives of that motivate arsonist vary from situation to situation and much research has been established to determine the motives of arsonists, which has allowed the Neighborhood Fire Team, to compile a list of ten broad groups of motives, drawn from current study and from the experience of group members. Such motives contain:
  • Vandalism: This group covers intentional and willful firesetting that is “just for the sake of it” (Stewart, 2006, 18). It also contains firesetting due to dare and colleague group pressure. Vandalism motivated arson is usually spontaneous and impulsive and engages manifold executors. Schools are often the target of vandalism motivated arson, as are abandoned or empty properties and, in the experience of this project, abandoned vehicles. Unfriendly behaviour fires are also often motivated by vandalism.
  • Curiosity/ Fire Play: This group is usually utilized when the fire has been set by young kids who do not realize the hazards of fire and were playing with, for instance, discarded cigarette lighter or matches. The people concerned are generally taken onto the firesetters intersession program.
  • Excitement: This group contains those who set fires for thrills, attention seeking, identification and sexual perversion. It can be seen already that none of these groups are clear-cut and one may lead to another: for instance vandalism may lead to the arsonist setting fires for the thrill of it; and childhood fire play may lead to setting fires intentionally for the amount of concentration it generates from adults.
  • Revenge: This group contains fires set for individual retaliation (e.g. against a spouse, partner or other family member); retaliation against regime or other institutions: and fires which are set as retribution against rival gangs or groups or in order to intimidate. In fact, much arson has a component of retaliation (aware or unaware) as part of the motive. Arsons of this category are often much greater planned and carried out than other types, and may be one-off events.
  • Crime-concealment: This is used to explain arson fires which are set in order to hide another offense or vital proof. For instance, a room that a murder had taken place might be fired by the executors in order to destroy the body and destroy the crime scene. Stolen vehicles are often set alight after being abandoned in order to try and destroy any forensic proof. (Schulz, 2007, pp. 55)
  • Profit: This type contains insurance fraud and arson executed against a competitor to try to put them out of business.
  • Extremist: This type contains arson perpetrated by terrorists or other extremists (e.g. animal rights activists) and also arson which happens during or as part of disturbances or other civil riot.
  • Racial: This type is fairly self-explanatory and covers all fires which are set for reasons of ethnic tension or intolerance.
  • Psychological illness: Neighborhood Fire Team employees have attended many incidents, both within housing units and in the wider society, where firesetting has been due to psychological illness.
  • Serial Arson: This is where one person working alone sets a series of fires, often over a long period of time. Serial arsonists may have one or more of the other causes also involving to their firesetting behaviour. (Pawson, 2006, pp. 91)
           
            Although the causes for arson are sometimes difficult, the law is generally crystal clear: anybody who intentionally sets fire to something will be punished for it. In some areas, a fire that is caused by great negligence or disregard will also be classified as arson. The punishment for committing arson depends on the degree of the offense: how much property was damaged the total cost of the damages, and whether or not people were trapped in the fire. The intent also performs a role: whether the fire was set to defraud an insurance agency, cover up an offense, was part of a retaliation offense, or was intended to amuse or entertain the arsonist, for instance.
            Most parts of the world have arson researchers, who examine the sites of suspicious fires to decide the cause of the fire and whether or not it was arson. This job can sometimes be quite complex, particularly when proof is obscured by the efforts of those attempting to put out or clean up the fire. Arson examiners use a range of methods to inspect the sites of fires containing chemical analysis of proof, the use of sniffer dogs, and simple powers of surveillance.


References
Holmes, Ronald M. & Holmes, Stephen T. (2008). Profiling Violent Crimes: An Investigative
            Tool. New York:  Sage Publications, pp. 1-5.

Stewart, Gail. (2006). Crime Scene Investigations – Arson. New York: Lucent Books, pp. 15-25.

Pawson, Stuart. (2006). Some by Fire. Washington: Allison & Busby, 92.

Schulz, Karen K. (2007). Crime Scene Detective: Arson. New York: Prufrock Press, Inc, pp. 54-
            60.

Flood’s Potential Impact on Agriculture in 2008


Flood’s Potential Impact on Agriculture in 2008
            Rarely cool, wet spring weather followed by extensive June flooding across much of the Corn Belt has cast substantial uncertainty over 2008 United States corn and soybean production prospects. As much as five million acres of crop production may be either lost entirely or subject to important yield reductions. Assessments of crop damage vary broadly, and could alter based on the extent of plant recovery or replanting. The likely effects, nevertheless, cannot be evaluated until August 12, when USDA research data becomes accessible. Considerable damage also was encountered by agricultural processing facilities, grain elevators, livestock operations, and storage facilities, and transportation infrastructure.
            In light of new record high market prices for corn and soybeans, and the attitude for very tight supplies by late summer, product market prices are likely to remain unstable through the remainder of the production season. If flood-associated crop losses eventually prove adequately large (to be decided at harvest time), they will likely participate to higher product prices, thus adding to pressure on policymakers over concerns about customer food price increase, global food aid accessibility, and the reliability of strategy that dedicates commercial agricultural crops to bio-fuels production, especially corn used for ethanol.
            The US performs a critical role in international markets for both feed grains and oilseeds. The US is the world’s top producer and exporter of both corn and soybeans. In 2007 the US had 43% percent and 63% percent shares, respectively, of world corn production and trade, and 32% percent and 42% percent shares of world soybean production and trade (Mutel, 2010). As a consequence of this leading role, unanticipated changes in United States production for either corn or soybeans, such as those stemming from the Midwest floods of 2008, can have a major effect on both United States and international commodity markets.
            During the first half of 2008, Unites States and world agricultural markets for most grains and oilseeds experienced tight supplies and record high prices. “The high prices provided a tantalizing incentive for U.S. farmers as they ready to plant their crops this last spring” (Rosenberg, 2009). In comparison, the dramatic, unpredictably sharp price raises of the past year have increased costs for livestock feeders and agricultural processors, evoked great concern about customer food-price increase and global food aid accessibility, and sparked an international debate referred to as the “food versus fuel” debate about the raising strategy trend of dedicating commercial agricultural crops to bio-fuels production, especially corn used for ethanol.
            Flood crop land concerns had been discussed on higher level in both floods. In the 2005 floods, 10 million acres land had been affected by the flood (Mutel, 2010). However, the lost land had been anticipated to produce six percent of the harvest in the region for that year. The crop losses that had been estimated were 8 billion dollars. Those states that had faced the huge loss were Minnesota 12%, Missouri 11%, Iowa 8% and South Dakota 7%. However, in this Iowa has faced 3 to 4 million acres of corn and 3 million acres of soybean losses. The United States’ Farm Bureau provided that crop losses have been reached to 9 billion dollars for the whole region, with 5 billion dollars of the total loss in Iowa.  In short, the 2008 flood may seem to be milder in its overall monetary effect on the larger area and the country, but it is just as devastating for those who have suffered it as it was for those in previous flooding. The eventual expenses and effects can only be known over time as damages become known, as the extent of relief is decided and as households, businesses and towns determine how to respond to the disruption.

References
Sene, Kevin. (2008). Flood Warning, Forecasting and Emergency Response, 1st Edition. New        York: Springer, pp. 15-21.

Mutel, Cornelia F. (2010). A Watershed Year: Anatomy of the Iowa Floods of 2008. Iowa: University Of Iowa Press, pp. 23-25.

Rosenberg, Janice. (2009). “Dealing with disaster: IREM Members survive the Midwest Floods     of 2008.” An article from Journal of Property Management. Institute of Real Estate   Management, pp. 55-67.

Friday, February 25, 2011

The Burj Al Arab


The Burj Al Arab
            The purpose of this paper is to provide critical analysis of the World’s only “7-Star” hotel in Dubai called Burj Al-Arab. The Burj Al Arab, the main attractive hotel in Dubai, is the most famous hotel in the world. It is also known as the Tower of Arabs Its iconic structure is designed to represent Dubai’s urban revolution and to imitate the sail of a boat. This splendid and luxurious hotel which is leading the skyline soars above Dubai approximately over 320 meters (1). A visitor can get pleasure from unquestionable five-star luxury to the highly trained brigade of butlers that are on call 24-hrs a day through the chauffeur-driven Rolls Royce that takes guests to the private reception. This remarkable hotel’s all suites, consisting each with two floors, are broad and spacious to say the least from the ceiling to floor glass windows providing striking views of the Arabian Gulf. Dining system of the Burj Al Arab is an evenly unforgettable experience, with a variety of eight special restaurants, although the signature dining room with its huge aquarium offering both the attraction, and an expedient location to accumulate the seafood items on the menu.
            The Burj Al Arab pride itself on the largest lobby of any hotel on the Globe. Its lobby is over the third interior space which is inside to the hotel with a height of 180 meters (1). Today it is the largest building in Dubai while before Burj Al Arab the Dubai World Trade center was the highest building in Dubai. The entrance of Burj Al Arab provides accommodation for its 38 stories.
            The architectural structure of Burj Al Arab is turned out to be one of the vital structures of present world. The cost incurred to erect this notorious hotel is over $650 million (4). This legitimately tallest and largest hotel of the world has been created on artificial formed island which is approximately 280 meters from the mainland of Jumeirah beach. Its unique structure attracts praises and condemnation from the world’s architectural critics.
            The builders herd 130 feet (230 40) long piles of concrete into the sand so that the foundation of hotel can be secured (3). In designing and building the hotel, architectures bent a surface layer with large stones in order to protect foundation from erosion. To make it safer, this surface layer of stones was covered with such a concrete prototype which was like a honeycomb. Although the building was erected in less than three year but the foundation reclaim the land from sea took approximately more than three years. Burj Al Arab’s magnificent building contains steel of over 9,000 tonnes and concrete of 2,500,000 cubic feet (70,000 m3) (3).
            Because of its structure, design and services, Burj Al Arab promotes and claims itself as the only “7-Star” hotel in the world. This status is also considered by the by travel professionals to be exaggeration. However, there is only a “5-Star” rating system for all the major hotels and guides, but few of these “5-Star” hotels claims themselves as “6-Star” by out performing. Although according to the official website of Burj Al Arab hotel, it is “5-Star luxurious Hotel”. But its claim, as the World 2nd and “7-Star” hotel, is on the bases of its tallest structure with façade covering which surpass the height of 1,000 feet (305 meters) (2).
            The rooms of Burj Al Arab are suitable for a king, which are lavishly built. Different suites in the hotel contain different cost which ranges from $1,000 to $28,000 per night. The most expensive suite is Royal Suite which cost $28,000 per night (2). The combination of east and west cultures can be seen into the detailed designs of suites. Spiral stairway wrap in marble with self created iron gold leaf railing and white Tuscan columns represent culture from art nouveau and classicism. Bathrooms similar to spa-like are highlight by mosaic tile outline on the walls and floors, with geometries influenced from Arabian, which are also come across to another place in the building.
            If we analyze restaurants in Burj Al Arab hotel, we’ll find one of the best restaurants named as “Al Muntaha” which means highest or ultimate. “Al Muntaha” is situated 660 feet (200 meters) above the Persian Gulf providing a complete view of Dubai. It is hold up by a cantilever which extends 89 feet (27 feet) from any side of Burj Al Arab pole (3). The architectures make its accessibility through panoramic elevator. The quality meal is provided by the Chef named Edah Semaj Leachim who also owns the restaurant in agreement with Burj Al Arab hotel. Edah Semaj Leachim holds the award of Chef of the year in 2006.  
            Al Mahara is another restaurant which is located in the bottom of Burj Al Arab. Al Mahara means “The Oyster”. The restaurant accessibility is through imitating submarine voyage. The main feature of this restaurant is its large seawater aquarium which approximately holds 35,000 cubic feet (990,000 liters) of water. The aquarium tank is made with 7.1 inch thick glass of acrylic which controls the pressure of water (2).
            The top of surface of Burj Al Arab hotel contains a large helipad which is also supported by cantilever. Now a days this helipad becomes a significant place of advertisement by the world stars. In recent times Ronan Keating, a singer; take a shot of his video for new album. While the World sports stars Roger Federer, Andre Agassi and Tiger Woods played tennis and gulf matches on helipad.
            Despite of containing world’s unique features, Burj Al Arab faces the criticism from a lot of architectures. One of them argue that Burj Al Arab is “magnificent, hideous, and the very high point of tawdriness”. While other criticize that hotel is hard to resist them in that sense and consider it as success of money over realism. However the disagreement here appears to be related to the extreme richness of Burj Al Arab. This unusual investment in situation of construction technology extends the restrictions of the determined urban imagination practically that is mostly because of power of extreme richness. Another opponent embrace the city of Dubai also both the city and the hotel, nevertheless, are headstone to the conquest of wealth over practicality. Both promote style over matter.
            In conclusion, the Burj Al Arab has turned out one of the rarest of ornaments that can be seen in the world. It is one of the most opulent hotels in the world, which has received the name of first “7-Star” hotel; and so far the tallest and largest hotel in the world. It is certainly a must see magnetism.

Notes
Thomas, Gavin. (2010). Frommer's Dubai and Abu Dhabi Day by Day. UAE: Frommers Publishers, pp. 1-19.

Christensen, Shane. (2009). Frommer's Dubai, 1st Edition. UAE: Frommers Publishers, pp. 50-70, 110-115.

Yasser Elsheshtawy. (2009). Dubai: An emerging urbanity? Planning, History and Environment. USA: Routledge Publisher, pp. 71-85.

Elizabeth Faier, Rebecca L. Torstrick. (2009). Culture and Customs of the Arab Gulf States: Culture and Customs of the Middle East, 1st Edition. USA: Greenwood Press, pp, 132-135.

Narrative Structure of “The Great Gatsby”



Narrative Structure of “The Great Gatsby”
            The Great Gatsby by Fitzgerald, with the combination of its form and content, as an ideal work of modern narrative art, fully provides the Fitzgerald’s effort for the improvement of traditional narrative steps and techniques. By using the unique and new narrative techniques the Fitzgerald creates remarkable effects to reinforce the specific creative charm and draw attention to the content concept of novel. This research paper explores the narrative steps and techniques in novel “The Great Gatsby” in terms of “I” as witness, the shift of the author’s position and the transgression to concentrate on the distinct and special techniques.
            The novel “The Great Gatsby” is about American dreams. A youngster from the Middle Western American, named as Nick Carrawlly, left home for East American to live. During his wander life, he understands the hero of fiction Gatsby and stares at the complete process of tragedy in Gatsby. This young man uses a specific narrative technique to depict a tragic story of this indigent Middle American Westerner Jay Gatsby.
            In the start of novel, we ascertain that people are familiar who Gatsby is, that he lives near to our other characters and that he has a lot of money. We also ascertain a little about the marriage of Daisy and Tom. This is exposition or introduction. Then, we realize that Gatsby and Daisy had an affiliation previously and that intentions of Gatsby in turning back were to triumph back Daisy. He passes through great troubles to organize this. These are examples of rising action.
            The conflict or climax arises when the novel’s central character confront a change in authority. Until that point, Gatsby was leisurely gaining power in the persuading of Daisy. The climax appeared in the hotel room when Tom forces Gatsby and Daisy to formulate a decision and she doesn’t formulate a straightforward one. Falling action occurs very quickly in the novel with Tom and Daisy going to home so that they can stay there. Most of the falling action occurs outside to the narration as Tom has an undisclosed conversation with Wilson directing Wilson to head over to the house of Gatsby. The exact determination of this novel is the assassination of central character and the challenge of Daisy and Tom to live together.
            The narrative structure of Great Gatsby involves retrospective remembrance of events. The whole story of Gatsby concentrate on Nick’s past memories, writing the first person “I”. Nick is not merely the narrative of the story, but also an important character in the story. He is an eyewitness of numerous events. This narrative technical step is called “‘I’ as witness” (Pilip Sterik 1967:125) in the theory of novel of Pilip Stevik. It turns the story more rational and communicable and makes “ruthless critics and intensified connotive meanings” (Fitzgerald, 1982).
            As an ethical criticizer, Nick rather than the author observe all character of the story counting him himself. This step of narrative escalating reality and theme of story turns the story as an essential complete and impenetrable. In this novel, Nike is “both internal and external to the story” (Poupard, 1984, pp.105). Because of his various positions, he is internal to the story. Nick is the neighbor of the central character of story Gatsby; brother of Daisy once detached; classmate of Tom in college and the beloved of Jordan who is Daisy’s close friend. He is a strap, which linkages many disagreements and conflicts between an important figure and characters in the confuse relation are net, being all over and everything. Fitzgerald allows him to use curious sights to view the actions of Gatsby and grasp consideration to suppose thoughts of Gatsby. This makes dissimilar art impacts.
            Nike is external to the story because those disagreements and conflicts are no means to him. He can bring a purpose and set a peaceful attitude to achieve them. Through the eyes of Nike, readers perceived everything occurred in the story. Nike provides the glamour and attraction, the deterioration and disgracefulness in the higher class at the front of readers. As an eyewitness who “has solid flexibility and wide and a variety of information” (Sterik, 1967, pp.125), he can examine Gatsby’ actions settled far from him and acquire various information about Gatsby distinctiveness from guesses and conversations of people in the party. He also can observe the depressing sight after the death of Gatsby, which establish a comparison with flashy live of Gatsby throughout his lifetime. This terrible effect cannot be understood by other narrative techniques.
            Using “I” as eyewitness to narrate the story, Fitzgerald allows readers realize things in a straight line of story. But as a writer he conceals himself at the back of case. “This unusual method turns down the novel to get an accurate effect” (McMichael, 1984, pp.302). Moreover, using a main character in the story as the story teller and being a first person to tell the story allow readers understanding personally. All of these turn the story more dramatic and persuasive.
            Although “I” as eyewitness can carry the persuasive and vivid effect on audience, it has some limitations. The narrator can only explain things which are into his knowledge but cannot highlight the other characters’ minds and wins their thoughts. This prevent the narrator to expose characters’ internal matters depriving readers to understand their’ facts more evidently. Consequently, the narrator must go beyond his narrative perimeter to present things clearly. This fact is called the contravention of the point of view. In “The Great Gatsby,” when Nike has a perception to Gatsby, Tom, Daisy, and other characters in his or other people’ opinion, he has exceed his narrative confines as a first person story teller. There are numerous obvious examples about such transgression.
            In conclusion, Fitzgerald is competent and artistic enough to utilize different types of distinct narrative steps to develop the intensity of the novel and concentrate the theme. Through implementing the unique and new narrative viewpoint, he effectively uplifts the novel more appealing and impressive in the fiction of Modern America, even in the Fiction World. The famous opponent, Thomas Stearns Eliot, who is known as his severity on literature principles treasured “The Great Gatsby” as “the primary step after Henry James in American fiction” (Poupard, 1984, pp.149). Such towering comment adequate lights us to identify correctly the literature values in novel and the well-known status in the history of American fiction.


Works Cited
Fitzgerald, F. Scott. The Great Gatsby. Shanghai: Shanghai Translation Press, 1982.

Poupard, Dennis & James E. Person. Twentieth-Century Literary Criticism, 14th volume. Detroit      & London: Gale Research Inc, 1984.

Sterik, Pilip. The Theory of the Novel. New York: The Free Press, 1967.

McMichael, George. Anthology of American Literature. New York: MacMillan Publishing Co.          Inc., 1980.