Saturday, August 31, 2019

Language Teaching Methodology Essay

One would expect that students who consistently perform well in the classroom (tests, quizes, etc. would also perform well on a standardized achievement test (0 – 100 with 100 indicating high achievement). A teacher decides to examine this hypothesis. At the end of the academic year, she computes a correlation between the students achievement test scores (she purposefully did not look at this data until after she submitted students grades) and the overall g. p. a. for each student computed over the entire year. The data for her class are provided below. What does this statistic mean concerning the relationship between achievement test prformance and g. p. a.? 3. What percent of the variability is accounted for by the relationship between the two variables and what does this statistic mean? 4. What would be the slope and y-intercept for a regression line based on this data? 5. If a student scored a 93 on the achievement test, what would be their predicted G. P. A.? If they scored a 74? A 88? A professor in the psychology department would like to determine whether there has been a significant change in grading practices over the years. It is known that the overall grade distribution for the department in 1985 had 14% As, 26% Bs, 31% Cs, 19% Ds and 10% Fs. A sample of n=200 psychology students from last semester produced the following grade distribution:for independent- online calculator Research has demonstrated strong gender differences in teenagers approaches to dealing with mental health issues (Chandra & Minkovitz, 2006). In a typical study, eight-graders are asked to report their willingness to use mental health services in the event they were experiencing emotional or other mental health problems. Typical data for a sample of n=150 students are shown in the table.  Do the data show a significant relationship between gender and willingness to seek mental health assistance?

Friday, August 30, 2019

Residential Schools

IntroductionFor years, the aboriginal people have been discriminated in Canada. They were perceived as inferior because their native traditions were very different from the white Canadian traditions. In the 19th century, the Canadian government created mandatory residential schools to assimilate the Natives into English speaking and Christian Canadians. The schools were church-run and government funded. They did so thinking their traditions would diminish or be completely eliminated in a few generations. However, the residential schools affected the Natives and the Government negatively, despite it’s original objectives.The residential schools did not provide the proper education for the Natives. Also, many of them were living under poor condition and got abused which lead to different types of traumas in their  adult lives. To continue, the government`s goals were not reached and they had to apologize to the Natives to try to gain their respect. The impact of poor education The education in residential schoolsThere was a total of 130 residential schools across Canada, and about 150 000 children attended those institutes. The main goal of the schools was for the Natives to learn English and adopt the Christian and Canadian culture. To do so, the children were prohibited to speak their language or practice their culture, or else they would receive severe punishments. Aboriginal residential schools provided an inferior education to students than the general population in the public school system. They focused on training students for manual labor in agriculture, industries and domestic work such as cooking, sewing and laundry work. Over 40 pour cent of the teaching staff had not received any kind of professional training. Many students had to work for the school involuntary and unpaid after class because the school could not run without it.The impactWith such a poor education, students who reached the age of eighteen only had up to a fifth grade education . This caused a lot of problems later on when the government tried to incorporate Aboriginal students into public schools. Many of them struggled to keep up with the adjustment and those who wanted to attend university were often restrained to do so. That incident made it difficult for Aboriginal communities to break the cycle of poverty.Residential school conditionsThe poor conditionsMany students were taken away from their families, and were not able to communicate with their siblings who attended the same school. The students were forced to do labour work during their stay at the school and were fed poor quality food. The food that was given was sometimes rotten, moldy and infested with maggots. As a form of punishment, many of them were sexually, mentally and physically assaulted. Also, some of them were forced to sleep outside in the winter and they were used for medical experiments. Survivors remember having needles pushed into their tongue if they were caught  speaking thei r language.These abuses, along with the poor hygiene, overcrowding and inadequate food and health care, resulted in an outrageously high death toll. In 1907, a study by the government medical inspector P.H Bryce reported that 24 pour cent of the kids died ar the schools and 47 to 75 pour cent of those who were discharged from the schools died months within returning home (http://indigenousfoundations.arts.ubc.ca).The impactThe negative impact of the residential schools on the Native communities still remains to this day. Even the people who did not attend those schools still share the same millstones as their ancestors. These include domestic violence due to personal trauma and the loss of Aboriginal language, culture and traditions. Some of those who have attended the schools suffer from post-traumatic stress syndrome and the effects make it challenging to take part in social, family and professional environments. Many of the children grew up without experiencing a nurturing family life and without the acquaintance and skills to raise their own families.Also, the sense of worthlessness that was implanted in the students resulted to self-abuse. The extremely low self-esteem contributed to a high rate of substance use, alcoholism and suicide. The damage caused by the residential schools has caused intergenerational trauma which is the cycle of abuse and trauma from one generation to the next (http://indigenousfoundations.arts.ubc.ca).The government’s roleThe government’s main goalThe government believed that the socio-cultural difference between themselves and the aboriginal people was too wide. They described the Natives as a savage, ignorant, uncivilized and in need of guidance group of people. They assumed that by creating residential schools, they would be able to easily assimilate the Natives, â€Å"If anything is to be done with the Indian, we must catch him very young. The children must be kept constantly within the circle of civilized con ditions,† ( Davin). Their strategy was to rapidly adapt them to mainstream society through education.However, it did not go as intended. In 1950, despite all their efforts to extinguish the Native culture, the government realised that the integration was not working. Regardless all the  damage that was done, their culture was still surviving. It is at that point that the government recognized the devastating effects of the residential schools. Nevertheless, it wasn`t until 1986 that all doors of the residential schools were closed. The government’s apologyIn 1980, survivors of the residential schools started suing the government and churches for all the destruction the residential schools had caused to their individuals and communities. The federal government and churches involved approved to pay collective and individual rewards to the survivors of the residential schools, in 2007. They also promised to the Native culture that they would establish supporting programs to help heal their grief, and to launch a Truth and Reconciliation Commission. The Truth and Reconciliation Commission is used when a country wants to reconcile and resolve policies or practices, in other words, unify Canada. In 2007, the government announced they would be giving 1.9 billion dollars to the aboriginal people who were forced to attend the schools as a compensation package.They also provided 120 million dollars to the Aboriginal Healing foundation as well as 100 million dollars given by the churches to finance services towards healing initiatives ( www.CBC.ca). On June 11th 2008, a ceremony was held by the House of Common to publicly apologize for the government`s participation and to recognize the negative impact it has done. That apology was left with a wide range of reactions. Some believed that it was a positive step for the government to build a relationship based on mutual respect while others believed that it would not change the government`s connection with th e Aboriginal people. The idea of the residential schools did a lot of harm to the government`s image because many Canadians lost respect towards the government after the truth behind those schools came out.ConclusionTo conclude, residential schools affected the Natives and the Government negatively despite their original objectives in many ways. The residential schools did not provide the proper education for the Natives. Also, many of them got mentally, physically and sexually abused which lead to a cycle of trauma and abuse for the future generations.To continue, the government`s initial goals were not reached and they lost the respect and trust of many  Canadians. Although the government tried to help the Native population financially and through healing support, it is difficult for the victims to leave the past behind. The Aboriginal communities still struggle to adapt to our society, which proves how persistent a nation can be.

Thursday, August 29, 2019

Reasons for Free Trade Essay

Free trade can be defined as the situation whereby governments impose no artificial barriers to trade that restrict the free exchange of goods and services between countries with the aim of protecting domestic producers from foreign competitors. The argument for free trade is based on the economic concept of comparative advantage. Comparative advantage is the economic principle that nations should specialize in the areas of production in which they have the lowest opportunity cost and trade with other nations, so as to maximize both nations’ standards of living. FREE TRADE |Advantages |Disadvantages | |Free trade allows countries to obtain goods and services that the |An increase in short term unemployment may occur as some domestic | |cannot produce themselves, or in sufficient quantities to satisfy |businesses may find it hard to compete with imports. However, the short| |domestic demand. |term rise in unemployment should correct itself in the long term, as | | |the domestic economy redirects its resources to areas of production in | | |which it has a comparative advantage. | |Free trade allows countries to specialize in the production of the |Free trade can create barriers that make it more difficult for new | |goods and services in which they are most efficient. This leads to a |businesses and new industries to emerge as they are not protected from | |better allocation of resources and increased production within |larger foreign companies. | |countries, and throughout the world. | | |Free trade encourages the efficient allocation of resources. Resources |A process called ‘dumping’ may occur wherein production surpluses from | |will be used more efficiently because countries are producing the goods|some countries are sold at  unrealistically low prices on the domestic | |in which they have a comparative advantage. |market, pricing efficient domestic industries out of the market and | | |harming them. | |A greater tendency for specialization leads to economies of scale, |Free trade may produce negative externalities i.e. child labor. | |which will lower average costs of production and increase efficiency | | |and productivity even further. |Free trade may encourage environmentally irresponsible production | | |methods because some producers in some nations may produce goods at a | | |lowest cost due to weaker environmental protections and environmentally| | |damaging practices within that nation. | |International competitiveness will improve as domestic businesses face |Allocation of resources will tend to move to the more efficient and | |greater competitive pressures from foreign producers, and governments |competitive producers. | |will encourage domestic industrial efficiency. | | |Free trade encourages innovation and the spread of new technology and | | |production processes throughout the world. | | |The opening up of global markets leads to higher rates of economic | | |growth and increased real incomes. Hence, free trade leads to higher | | |living standards. This is a result of lower prices, increased | | |production of goods and services and increased consumer choice as | | |countries have access to goods that a lack of natural resources may | | |otherwise prevent. | | REASONS FOR PROTECTION Protection refers to government policies that give domestic producers an artificial advantage over foreign competitors. Infant Industries New industries generally face many difficulties and risks in their early years. They usually start out on a small scale, with costs that are proportionately and relatively higher than the more established films competing in the international arena due to economies of scale. Hence, it is argued that these ‘infant industries’ require protection in the short run to enable them to expand their scale and reduce their costs of production so that they may compete with the rest of the world. For this argument to be valid, protection should only be temporary, otherwise there would be no real incentive for industries to reach a certain level of efficiency so that they can compete viably without protection. Historically, industries that have received assistant as infant industries have continued to rely of this assistance for many years. The infant industries argument has been used as a pretext referring to industries that would never have survived otherwise, hence economists do not generally accept the infant industry argument as an argument in favor of protection. When governments provide help to new industries now, this tends to involve direct assistance and lasts for a very limited time. Prevention of Dumping The process of dumping may be used to dispose of large production surpluses or to establish a market position in another country. These low prices are usually only of a temporary nature however they can harm domestic producers as they cannot compete, forcing them out of business, hence causing a loss in a country’s productive capacity and resulting in higher unemployment. The only gain from dumping is that consumers will benefit from lower prices in the short term, but is is only temporary as producers will put up their prices again once the local competition is eliminated. Under such circumstances, it is generally into economy’s best interest to impose restrictions on such imports. Using protectionist methods to prevent dumping is considered to be the only reason for protection that is widely accepted by economists. Despite this, in recent years the WTO has questioned whether countries might be abusing their entitlement to prevent dumping and falsely accusing efficient low-cost foreign producers of dumping as an excuse to give domestic producers an artificial advantage. Protection of Domestic Employment One of the most popular arguments in favor of protection is that it saves local jobs. If local producers are protected from competition with cheaper foreign imports, the demand for local goods will be greater – labour as a derived demand of the demand for goods and services, will be in higher demand, hence creating more domestic employment. Despite this, there is little support amongst economists for this argument. Protection tends to distort the allocation of resources in an economy away from more efficient production towards areas of less efficient production. In the long run, this is likely to lead to higher levels of unemployment and lower growth rates. On the other hand, by phasing out protection it is is hoped that better and more lasting jobs will be created in sectors that are more internationally competitive. Furthermore, if a country protects its industries, it is possible that other countries could retaliate and adopt similar protectionist policies. The net result could be that the economy would maintain employment in less efficient protected industries but lose employment in more efficient export industries. Defense and Self-Sufficiency Non-economic reasons Defense: so that they can be confident that in a time of war that they would still be able to produce defense equipment. Self-sufficiency of food supplies. Historical reasons†¦ When a country adopts this approach it must accept that it may gain self sufficiency at the expense of higher living standards that would be achieved from specialization and free trade. Other Trade unions often argue that producers should be protected from competition with countries that produce using low-cost labour. This is seen as a means to protect the better living standards of workers in high income economies. It is related to another argument that it is unethical to buy products from countries that may use unethical practices I.e. child slavery, because it would further encourage the exploitation of these people. Countries may sometimes block trade in goods because of environmental factors, such as the environmental harm involved in the production of certain goods. Overseas producers may be able to produce some items cheaply because the producers are environmentally irresponsible and do not have to comply with the tougher environmental standards that apply in advanced economies. Eg: 2011 Live Cattle Export Crisis Australian export restrictions of live cattle were imposed in 2011 because of the deemed unethical treatment that Indonesia treated the live cattle with. Offended by Australian criticisms of its animal welfare standards, Indonesia announced that it would reduce the number of import permits issued for Australian cattle by around 2/3rds, and buy more live cattle from other countries instead. METHODS OF PROTECTION A tariff is a government imposed tax on imports. It has the effect of raising the price of the imported goods, making the domestic producer more competitive domestically. Figure 2.2 reveals the following: The curves SS and DD represent domestic supply and demand. P is the price of imported goods if there was no tariff applied. At this price consumers demand Q1 domestic producers supply Q1 and the quantity imported would be QQ1 If a tariff of PP1 is imposed, all of which is passed to the consumer, demand will contract to Q3, domestic supply will expand to Q2, and imports will fall to Q2Q3 Following the imposition of the tariff the government will raise revenue of ABCD |Economic Effects of a Tariff | |Domestic producers supply a greater quantity of the good. Tree fore the tariff stimulates domestic production and employment | |More domestic resources are attracted to the protected industry. This leads to a reallocation of resources towards less efficient producers | |Consumers pay a higher price and receive fewer goods. This redistributes income away from consumers to domestic producers. | |Tariff raises government revenue | |Retaliation effect can be experienced. In that case any increased production and employment gains for the import-competing industries would be | |offset by losses in the nation’s export industries. | An import quota controls the volume of a good that is allowed to be imported over a given period of time. The quota guarantees domestic producers a share of the market. Figure 2.3 reveals the effect of an import quota: The curves SS and DD represent domestic supply and domestic demand P is the price at which the imported goods would sell if there was no quota imposed. At this price consumers demand Q1, domestic producers would supply Q, and the quantity imported would be QQ1 If the government imposed a quota restricting the imports to Q2Q3, this would have the effect of raising the price of imported goods to P1. This price would allow domestic supply to expand to Q2 |Economic Effects of a Quota | |Domestic producers supply a greater quota of the good. Therefore the quota stimulates domestic production and employment | |More resources in the economy are attracted to the protected industry. Therefore there will be a reallocation of resources from other sectors | |of the economy | |Consumers pay a higher price and receive fewer goods. This redistributes income away from consumers to domestic producers in the protected | |industry, and results in lower overall levels of economic growth. | |Quotas do not generate revenue, however govt can raise a small amount of revenue by administering the quota through selling import licenses | |allowing firms to import a limited number of goods | |As with tariffs, the imposition of a quota on imports can invite retaliation from the country whose exports may be reduced because of the | |quota. This can result in lower exports for the country that initiated the import quota. | Countries may also use tariff quotas. Goods imported up to the quota pay the standard tariff rate, whereas goods imported above the quota pay a higher rate. Subsidies involve financial assistance to domestic producers, which enables them to reduce their selling price and compete more easily with imported goods. In Figure 2.4 this is shown by a rightward shift of the domestic industry’s supply curve from SS to S1S1, which results in a lower market price P1. Businesses will be able to sell a higher quantity of their product on both domestic and global markets. The quantity produced increases from Q –> Q1 The size of the subsidy in per unit terms is the vertical distance between the S and the S1 curves |Economic Effects of a Subsidy | |Domestic producers supply a greater quantity of the good. Therefore, the subsidy stimulates domestic production and employment in the protected| |industry. | |More resources in that economy are attracted to the protected industry, leading to a reallocation of resources from other sectors of the | |economy where production and employment will fall. | |Consumers pay a lower price and receive more goods, however they pay indirectly whether they buy it or not through higher taxes. | |Subsidies impose direct costs on government budgets. This means that governments have fewer resources to allocate to other priorities | |i.e.education and health care | |While economists are generally opposed to protectionist policies, they often prefer a subsidy over a tariff because subsidies tend to be | |abolished more quickly since they impose costs on the budget, rather than generating revenue. | Local Content Rules specify that goods must contain a minimum percentage of locally made parts. The return is that the imported component does not attract a tariff. AUS used this to protect its motor vehicle industry in the past. Export Incentive Programs give domestic producers assistance such as: Grants Loans Technical advice (marketing, legal info) Encourage businesses to penetrate global markets or expand their market share The popularity of such programs has grown considerably in recent years as nations have moved to a greater focus on capturing foreign markets, rather  than protecting import-competing businesses, as a strategy to achieve higher rates of economic growth and employment. Technically, export incentives do not protect businesses from foreign competition in the domestic market, but they are nevertheless artificial barrier to free trade. |Overall Economic Effects of Protectionism ($$) | |In addition to the effects that protectionist policies have on domestic economies, they can also have overall impacts on the global economy. | |Global protectionist policies have the overall effect of reducing trade between nations. The WTO has cited research estimating that a | |far-reaching Doha agreement would remove protectionist policies that are currently costing the global economy between $US 180billion to $US | |520billion in exports every year. | |Overall, protectionist policies reduce living standards and reduce global economic growth by shielding inefficient producers. The Institute for| |International Economics in Washington DC has estimated that protectionism is reducing gross world product by between $US 300billion and $US | |700billion each year. | |Protectionist policies make it more difficult for individual economies to specialize in production in which they are most efficient. Businesses| |are less able to achieve economies of scale and therefore have lower profits and lower dividends. With less competitive pressures, prices for | |goods and services in individual economies are higher. | |The negative economic impact of the protectionist policies of trading blocs tends to be greatest for developing economies, which are excluded | |from access to the markets of advanced economies. | Doha agreement: an agreement that is aimed at achieving major reform of the  international trading system through the introduction of lower trade barriers and revised trade rules. A trading bloc occurs when a number of countries join together in a formal preferential trading arrangement to the exclusion of other countries. THE ESSAY Different countries have different factor endowments and intensities. Nations engage in international trade as a means of specializing in production, increasing the productivity of their resources and realizing a larger output and economies of scale than by pursuing self sufficiency or autarky. Free trade occurs when there is an absence of protective barriers such as tariffs, quotas, subsidies and voluntary export restraints, which tend to divert trade, rather than create trade or new trade flows. [economic independence or self sufficiency]. A reason for a country specializing in the production of goods in which it has a comparative advantage–the economic principle that states that even if one country can produce all goods more efficiently than another, trade will benefit both countries if each specializes in areas of production that have the lowest opportunity cost and trade with other nations–is that overall standards of living will be maximized for the nations in which trade is occurring between. Figure 1 shows this. Country X has an absolute advantage in the production of both computers and wheat. According to the principle of comparative advantage, Country X is more efficient in producing computers than Country Y since the opportunity cost of wheat production is 1 unit of wheat in Country X, compared to 2 units of wheat in Country Y. Hence Country X has a comparative advantage in computers. However, Country Y has the comparative advantage in wheat, with an opportunity cost of 0.5 computers per unit of wheat, while Country X has an opportunity cost of 1 computer. Through specialization, Country X can produce 100 computers and Country Y 80 units of wheat, or 90 computers and 10 units of wheat for an overall 90  computers and 90 units of wheat within the hypothetical economy, 20 more than the aggregated 70 computers and 90 units of wheat if each country was to produce with half their resources for one good and half on the other. Free trade has several other advantages: Free trade allows countries to obtain goods and services that they cannot produce themselves, or in sufficient quantities to meet domestic demand due to a lack of adequate resources. Free trade allows countries to specialize in the production of goods and services in which they have a comparative advantage. This leads to a better allocation of resources and increased production within countries, and throughout the world. Free trade encourages the efficient allocation of resources. Resources will be used more efficiently because they are being used in the production of goods in which they have a comparative advantage. Free trade leads to a greater tendency for specialization, which should result in economies of scale as seen in Figure 2 wherein average costs decrease with an increase in output. International competitiveness will generally improve due to free trade as domestic businesses face greater competitive pressures from foreign producers, and because of governments encouraging domestic industrial efficiency. Free trade encourages innovation and the spread of new technology and production processes throughout the world because of increased competition. Free trade typically leads to higher rates of economic growth and increased real incomes, leading to higher living standards; this is a result of low prices, increased production of goods and services and increased consumer choice. Although free trade has clear benefits in theoretical terms, it can lead to a number of disadvantages. The imposition of free trade tends to result in a short term increase in unemployment as some domestic producers may find it hard to compete with imports. However, this generally corrects itself in the long term as the domestic economy redirects its resources to areas of production in which it has a comparative advantage. Free trade may make it more difficult to establish new businesses and new industries if they are not protected from larger foreign competitors as new businesses and industries generally have higher costs in the starting phases because of a lack of scale, hence they would find it harder to compete. Free trade may result in ‘dumping’ wherein foreign countries may sell goods in the domestic market for unrealistically low prices to sell off their production surpluses or to establish a market position, hurting efficient domestic industries. Free trade may encourage environmentally or ethically irresponsible production processes because producers in some nations are able to produce goods at a lower cost due to weaker regulations or enforceability of these deemed irresponsible production practices. Alternatively to free trade is protection. Protection refers to any artificial advantage given by governments to domestic industries to protect them from international competition. Free trade relies upon the interplay of market forces to secure the benefits that derive from it[efficient resource allocation, higher living standards and greater competition from international specialization and exchange]. However, in reality, historically most countries have tended to impose at least some forms of protection to assist local producers in the face of foreign competition. This is primarily for these reasons: ‘Infant Industries’ arguably need temporary protection to expand their scale and reduce their costs of production so that they can compete viably in the global market as they usually start on a small scale with higher costs (see Figure 2). In theory this argument is plausible, however in practice, industries have tended to rely on this assistance for many years without a real incentive to reach a level of efficiency so that they are able to compete without protection. For this reason, governments tend to involve direct assistance when helping infant industries that lasts for a very limited time. Protection is used to prevent dumping that may harm domestic producers, potentially forcing them out of business and causing a loss in a country’s productive capacity and higher unemployment. Using protectionist methods to prevent dumping is considered to be the only reason for protection that is widely accepted by economists. Despite this, in recent years the WTO has questioned whether countries might be abusing their entitlement to prevent dumping as an excuse to give domestic producers an artificial advantage. One of the most popular arguments for protection is that it saves local jobs. This is on the premise that if domestic producers are protected from foreign competition, the demand for local goods will be greater and hence, labour as a derived demand of the demand for goods and services, will be demanded at a higher level. Despite this, protection tends to distort the allocation of resources in an economy away from efficient production towards area of less efficient production and in the long run, this is likely to lead to higher levels of unemployment and lower growth rates. Furthermore, other countries may retaliate with similar protectionist methods. Some arguments used to justify protection may not be solely based on economic grounds. For example, major powers generally want to retain their own defense industries so that they can be confident during times of war that they would still be able to produce defense equipment. Similarly, protection  may be used for self-sufficiency of food supplies – for example, Japan experienced famine twice in the 20th Century due to wartime blockades that prevented imports of food supplies. Trade unions in advanced economies often argue that producers should be protected from competition with countries that produce using low-cost labour. This is to protect the better living standards of workers in high income economies and to not endorse unethical practices that exploit people in less developed nations. Countries sometimes block trade of goods because of environmental factors, such as the environmental harm involved in the production of certain goods in some foreign nations. Environmental regulations across countries are not universal, hence protection is arguably better for the global environment overall. Main protectionist policies include: tariffs, quotas, subsidies, local content rules and export incentives. A tariff is a government-imposed tax on imports, making domestic producers relatively more competitive. [pic]

Compare and contrast the ethical issues concerned with due process v Essay

Compare and contrast the ethical issues concerned with due process v. street justice. in U.S - Essay Example On considering the ethics behind whether to implement 'due process' or 'street justice', it may be of ample relevance to point out inquisitively about up to what extent is one necessary over the other. By 'street justice', policing in the U.S. takes its origins out of the increasing urgency to develop a community-based politically decentralized institution to manage social regulation within communities that barely cope with keeping norms as urbanization progresses in them (Sykes). This is especially true during the early years when accredited justice institutions overlooked adequate fulfillment of tasks that the police was summoned over for complementary aid and allowed thereby to conduct informal procedures on peacekeeping to settle tolerable disputes at least. Since local governments admit imperfection and inefficiency or neglect on certain aspects that seem quite inevitable at times of facilitating criminal cases, police officers are hence granted the opportunity to exercises flex ible authority to apply measures they suppose may be suitable for a particular occasion. As this tradition proceeds so that American policemen fully recognize the functional worth of 'street justice', it readily yields for these law enforcers the thought of having broader options in performing their designated duties. More often than not, the idea of versatility with role naturally comes out as an initial impression that lasts as long as each police officer assumes that their overall job equates that of the judiciary system. Having a wider sense of responsibility in the process is remarkable, however, the risk of operating beyond the required control occurs at a stage of reasoning that locates community-based policing as more of a privilege. This way, there are cops who, reportedly, have become abusive of their profession to obtain favor which satisfies personal interests. The disadvantage of accruing potential greed or inclination to corrupt practice as from such eventually obscure s the sight of justice in achieving fair ends upon targeted goals with which the welfare of the innocent is the chief concern. On the other hand, subjecting moral issues under the 'rule of law' is known to be a classic organized way of evaluating which side deserves a specific portion of verdict. Though it is conventionally tedious to hold court proceedings, appeals and positions of each of the people involved are thoroughly examined, with scientific investigation in the process, and are judged accordingly in this setting in order that one is assured of fair and equal treatment with the rest during prosecution. Where evidences are adequately presented, an appreciable chance of attaining to just consequences duly deserved follows after the most reliable scrutiny by a number of lawfully educated individuals. Typically, a systematic means of arriving at righteous judgment is unquestionable for being objective by nature, but the harsh realities of officiating a correct yet rigid or aust ere punishment is unlikely translatable to a form which is rather compassionate and life-transforming for a culprit who might so profoundly hope to change and be wholly renewed apart from the former immoral character. Dr. J.M. Pollock further argues that by 'due process' in the 'rule of law', â€Å"

Wednesday, August 28, 2019

Payments and Finance in International Trade Essay

Payments and Finance in International Trade - Essay Example In sharp contrast to the results, we find that liberalization has, on average, robust positive effects on growth, openness and investment rates within countries. We have some examples of Trade Liberalization (Arnold, 2007). The payment instruction was subsequently misplaced on the desk of a clerk at Mega Bank and accordingly the relevant accounting entries for crediting Alpha's account were not made by Mega Bank, and Alpha was not notified that payment from Delta had been received. On July 5th, Delta instructed its bank, Grand Banque in Paris, to make a funds transfer to Alpha's account at Mega Bank in London to be credited on or before July 7th. On the morning of July 6th, in order to effect the payment, Grand Banque debited Delta's account and simultaneously sent payment instructions via SWIFT to its correspondent bank in the UK, Royal Bank PLC, instructing it to make an inter-bank transfer to Mega Bank in sterling for credit to Alpha's account on or before close of business on July 7th. Royal Bank went ahead and sent the payment order to Mega Bank on July 6th, with instructions to credit the account of Alpha on or before close of business on July 7th. White barle... Alpha is frustrated that it has not yet been paid and advises Delta on 8th July that it is no longer liable to perform under the contract (Balamurugan and Madhura, 2002). Many of the hurdles to international trade took the shape of high tariffs on imports of manufactured goods. The typical aim of such tariffs was to protect domestic industries from foreign competition. On consequence, however, were "beggar of neighbor" retaliatory trade policies with countries progressively raising trade barriers against each other. Ultimately, this depressed world demand and contributed to the Great Depression of the 1930s. This event was the boom that woke the world up but it was not the only reason that led to liberalization. People begun to realize that their basic necessities were not satisfied because they are not available in their home country or too expensive because of the imposed tariffs. They also realized that they will gain advantages through engaging in international trade, like improving their living standard and satisfying more needs (Brennan and Cao, 1996). If the country is going to export, it will need to expand it output which means more people will be hired and living standard will improve. Moreover when removing tariffs imposed on imported goods that my country doesn't produce, people will be able to purchase them at reasonable prices therefore satisfying more needs. The developed countries realized that even if they have comparative advantage in some products, they should specialize in the production of those goods that it produces most efficiently and to buy the goods that it produces less efficiently from other countries, even if this means buying goods from other countries that it could produce more efficiently itself (Brinblatt,

Tuesday, August 27, 2019

Active Volcanoes Essay Example | Topics and Well Written Essays - 500 words

Active Volcanoes - Essay Example Mount Merapi literally means â€Å"Fire Mountain† in Indonesia and is an active stratovolcano located on the border between central Java and Yogjakarta. On the other hand, Laki is a legendary Icelandic volcano, which has lain dormant since its huge eruption in 1783. Satellite technology now makes it possible to monitor volcanic activity in even the most isolated corners of the globe and to routinely observe changes in the Earth’s surface that may signal an impending eruption. This help identifies those volcanoes presenting the greatest danger. The MODIS Thermal Alert System, also known as MODVOLC, now enables scientists to detect volcanic activity anywhere in the world within hours of its occurrence. Using MODVOLC, volcanologists have seen many active volcanoes that previously went undetected. Aside from serious disasters posed to humans and property, active volcanoes also produce serious environmental effects. The commonly-known threat a volcano can present is the flow of super-heated rock known as lava. This lava causes fires and will destroy everything in its path. In addition, a tsunami can develop and damage shorelines. Furthermore, active volcanoes have an intense impact on the stratosphere, the second layer of the atmosphere. Gases released from the eruption convert sulfur dioxide to sulfuric acid, which condenses in the stratosphere. This greenhouse gas traps heat in the atmosphere. Volcanoes produce sulfate aerosols, which affect the surface temperature of the earth. A volcanic eruption promotes chemical reactions that alter chlorine and nitrogen which destroys the ozone layer. Moreover, hydrogen chloride and hydrogen fluoride are released by volcanic activity and dissolved in water droplets in steam clouds.

Monday, August 26, 2019

18th and 19th century creative artists role Essay

18th and 19th century creative artists role - Essay Example The features of art movements reveal a lot about the times in which the artists lived. The mid-eighteenth century saw the rising of an art movement called rococo. Previously, baroque dominated art in Europe, specifically in France where rococo emerged. The emergence of rococo resulted from the extreme use of the baroque in court paintings during the reign of Louis XIV (Sheriff and Watteau 27). Architecture, painting, sculptures and any art form in that era exhibited the baroque features. With some creative artists feeling that it was time for France to explore more in art and its different tastes, rococo emerged. With the new art culture, artists assumed the role of â€Å"social leaders.† During the emergence of rococo, the creative artists played the role of conveying changes in society to the people. Creative artists represented each of the social changes in their work. The death of Louis XIV motivated artists to adopt a new art style to mark the end of reign (Sheriff and Watteau 27). Artists sought to create a transition from the stringent use of baroque effects. In addition, the control of artwork shifted to aristocrats. Before rococo emerged, artists emphasized the value of power in society in most of the art pieces. In the period of rococo, many artists utilized art to emphasize the importance of entertainment. In this era, the attitudes of society had changed because of a new reign in the royalty. Creative artists sought to represent the political changes in society in their artwork and opted for a relaxed style that could emphasize the shift. In addition, the artists also acted to sensitize people on the changing roles of women in society. Europe was beginning to accept contribution of women to society. Although this was to a less extent and women did not have many rights, the theme appeared greatly in rococo work. The creative artists were sensitizing society on the change of attitude towards women. Moreover, some paintings and sculptures by

Sunday, August 25, 2019

Business system analysis Essay Example | Topics and Well Written Essays - 500 words

Business system analysis - Essay Example ructure is created to visually demonstrate the clients what their needs can seem similar to when they are applied into a completed system (Sommerville, 2009). Evolutionary prototyping method is a software development lifecycle model in which software prototype developed for illustration and requirements explanation. There are four main phases in Evolutionary prototyping model: (SoftDevTeam) Evolutionary Prototyping is also recognized as breadboard prototyping. Evolutionary Prototyping is moderately dissimilar from Throwaway Prototyping. The major objective to utilize Evolutionary Prototyping is to develop an extremely strong prototype in a prearranged way and continuously process it. The cause intended for this is that the Evolutionary prototype, at what time developed, shapes the compassion of the novel system, as well as the developments and additional requirements will be developed (Hanna Kulas, 2009). A class diagram graphically demonstrates classes and subclasses in a system(Shelly, Cashman and Vermaat). A class diagram is a diagram that demonstrates the associations as well as source code dependability amongst classes in the UML or Unified Modeling Language (Ambler, 2009). A class outlines the techniques and variables in an object that is a precise body in a plan or the component of code instead of that entity. The Class diagrams are practical in the entire shapes of OOP or object-oriented programming. The idea is a number of years mature on the other hand have been advanced like object-oriented programming modeling paradigms have developed (Searchsoa, 2009). Below is an example of Class diagram: A use case is a task that an actor who interacts with an information system can carry out(Shelly, Cashman and Vermaat). A Use case is intended to elucidate a series of events that offer something of quantifiable worth to an actor as well as is drawn like a horizontal ellipse (Ambler, UML 2 Use Case Diagrams, 2009). In software engineering, the utilization of a

Saturday, August 24, 2019

Comparison Critique Essay Example | Topics and Well Written Essays - 1000 words - 1

Comparison Critique - Essay Example To begin with, "48 Hours Mystery" is a news program broadcasted by the CBS media house on Saturdays at 10.00 pm. ET/PT. This program was revamped in 2002 after Lesley Stahl took over as the chief host from Dan Rather thus changing its name to â€Å"48 Hours Investigate.† Not so long, the name was again changed to â€Å"48 Hours Mystery in the 2004†, which has remained the program’s name up to date. Under its current single-topic format topic, the program does not use a single host however, it is narrated by a specific narrator assigned to each story that is broadcasted depending on which reporter was assigned which story. The current format of the program mainly deals with real life mysteries that have never been solved as well as crime stories. The program airs investigative pieces that have a sense of reality. Throughout the airing, a focus on the consistency of footage that has been shot weeks apart is always maintained. 48 Hours Mystery’s demands for B roll and interviews with the main characters are always kept the same; thus, nothing jumps of the screen or rather conveys an out-of-place feeling to the viewer. Moreover, the footages are of variety and are usually shot during different times and settings. The picture on the screen has been made warmer with a lot of saturation and contrast as well. The use of colour in the production of the program usually looks tint and the interoperability makes the footages to run efficiently while at the same time keeping their tight timeliness in order. A perfect example of some of the 48 Hour Mystery’s program broadcasted was the special â€Å"9/11: 10 Years Later† episode. The two-hour program recapped most of the 2002 documentary done by two French filmmaking brothers Jules and Gedeon Naudet. These brothers were following a New York City probationary firefighter on a distinctive day when he was rushing to respond to the emergency inside the World Trade Center. Apparently, the

Friday, August 23, 2019

Intercultural Paper Essay Example | Topics and Well Written Essays - 1000 words

Intercultural Paper - Essay Example This culture simply identifies itself with codes of conduct that promote love and respect with the main aim of maintaining modesty and purity. Institutions lead to the establishment of norms that support individual survival in a social setting. Stability and functionality of society depend upon roles and responsibilities that are created and defined by different institutions. However many societies may differ, they all have institutions that influence the culture or rather the way of life of individuals. Religious institutions for instance control behaviour and determine the actions of individuals. The religious institution that defines the Hindu culture comprises of various religious practices of which people are expected to abide by. Being the most dominant religion in India, the religion emphasizes with humility, respect, purity and modesty. There are various religious practices that promote these four doctrines. For instance, touching people’s feet is considered a sign of respect. Touch the feet of individuals who are considered to be holy is considered a sign of humility (WordPress, n.d). Hindus also consider i t a tradition to offer gifts to priests and gurus as a sign of appreciating the spiritual blessings they receive. Religious institutions in the Hindu Culture consider purity to be of great essence. Purity takes three forms: purity of body, purity of thoughts and purity of deeds. In their daily activities, Hindus protect this purity through following their religious codes of ethics and living wisely (Sharma, 2002). Religious offerings are usually given to deities from time to time. These offerings are usually in the form of food or flowers. Sniffing of offerings is not allowed based on the belief that sniffing is meant for the gods. All items that are intended to be offered for offerings are cleaned and covered as a sign of purity. Their temples and shrines are

Thursday, August 22, 2019

Outside Speech Assignment Essay Example for Free

Outside Speech Assignment Essay After I watched the speech which was gave by Bill Gates in June 08, 2007 on the Harvard commencement, I felt more interesting in Bill Gates. According to the information offered by woopidoo. com, we can find the Biography of Bill Gates, which said, â€Å"Bill Gates is one of the most influential people in the world. He is cofounder of one of the most recognized brands in the computer industry with nearly every desk top computer using at least one software program from Microsoft. Bill Gates is the richest man in the world and has held the number one position for many years. Gates was born and grew up in Seattle, Washington USA. His father, William H. Gates II was a Seattle attorney and his mother, Mary Maxwell Gates was a school teacher and chairperson of the United Way charity. Gates and his two sisters had a comfortable upbringing, with Gates being able to attend the exclusive secondary Lakeside School. Bill Gates started studying at Harvard University in 1973 where he spent time with Paul Allen. Gates and Allen worked on a version of the programming language BASIC, which was the basis for the MITS Altair (the first microcomputer available). He did not go on to graduate from Harvard University as he left in his junior year to start what was to become the largest computer software company in the world; Microsoft Corporation. † 30 years later since Gates left Harvard; Gates came back to Harvard and gave a speech to those students who were graduated from Harvard. The reason why Bill Gates gave this speech is that he wanted to deliver what he had thought about a successful person should do to the world after graduated from school. His topics were appropriate for the audience, because the audience were all students who graduated from Harvard. Also, his topics were appropriate for the occasion, because it was Harvard commencement Day. For the general purpose of this speech, it was the special occasion speech, because this speech was a presentation that highlights a special event. The special event was the Harvard commencement. For the mode of delivery for this speech, I think it should be the manuscript mode, because during Bill Gates were giving the speech; he looked down on the speech table. Bill Gates used his voice effectively. He adjusted his rate very well. He did not speak very fast so that everyone there can get what he said. Also, he used pause for effect, such as when he said, Ive been waiting more than 30 years to say this: Dad, I always told you Id come back and get my degree. † Between â€Å"to say this† and â€Å"Dad† he used a pause, so that audience would think about what would he going to say. And it made the speech more interesting. Also, he used duration for attention, pitch for expression, volume for emphasis, enunciation for clarity and fluency for fluidity during his speech. He spoke clearly and smoothly, so that everyone could understand what he was talking about. Bill Gates used eye contact to hold audience attention, because he would look at audience usually, not kept reading his manuscript all the time. He did not use facial expression a lot, but audience still could see him smiling sometimes. Thus, for the delivery part, I think Bill Gates did very well. He gave the speech by using a manuscript; however, he gave the speech without kept reading the manuscript all the time. He used voice to get audiences’ attention; he used eye contact to kept audiences’ attention. And everything he talked was clear and smooth. For the speech organization, Bill Gates used a very good attention getter by saying, â€Å"Ive been waiting more than 30 years to say this: Dad, I always told you Id come back and get my degree. I want to thank Harvard for this timely honor. Ill be changing my job next year†¦and it will be nice to finally have a college degree on my resume. But I also want to be recognized as the guy who got Steve Ballmer to drop out of business school. Im a bad influence. Thats why I was invited to speak at your graduation. If I had spoken at your orientation, fewer of you might be here today. I applaud the graduates today for taking a much more direct route to your degrees. For my part, Im just happy that the Crimson has called me Harvards most successful dropout. I guess that makes me valedictorian of my own special class†¦I did the best of everyone who failed. † These were part of the manuscript I found from networkworld. com. After his introduction, he began to recall his school life when he was studying in the Harvard. By telling his story, he told audience how he began his business. After his business, he talked about what he had thought about during the 30 years. Then, his main point came out: â€Å"In your years here, I hope youve had a chance to think about howin this age of accelerating technologywe can finally take on these inequities, and we can solve them. † Then, Bill Gates gave an example for the inequities: there were millions of children were dying from poverty and disease. Then, Gates started talked about how to help these children from dying, â€Å"If we can find approaches that meet the needs of the poor in ways that generate profits for business and votes for politicians, we will have found a sustainable way to reduce inequity in the world. This task is open-ended. It can never be finished. But a conscious effort to answer this challenge will change the world. We can make market forces work better for the poor if we can develop a more creative capitalism? If we can stretch the reach of market forces so that more people can make a profit, or at least make a living, serving people who are suffering from the worst inequities. We also can press governments around the world to spend taxpayer money in ways that better reflect the values of the people who pay the taxes. At the last, he gave the conclusion by calling action, â€Å"Knowing what you know, how could you not? And I hope you will come back here to Harvard 30 years from now and reflect on what you have done with your talent and your energy. I hope you will judge yourselves not on your professional accomplishments alone, but also on how well you have addressed the world’s deepest inequities †¦ on how well you treated people a world away who have nothing in common with you but their humanity. † I think the organization of Bill’s speech was very good, because everything was included and nothing was unnecessary. For the materials to support the speech, Bill Gates used the AIDS as an example, â€Å"The broad goal, of course, is to end the disease. The highest-leverage approach is prevention. The ideal technology would be a vaccine that gives lifetime immunity with a single dose. So governments, drug companies, and foundations fund vaccine research. But their work is likely to take more than a decade, so in the meantime, we have to work with what we have in handand the best prevention approach we have now is getting people to avoid risky behavior. Pursuing that goal starts the four-step cycle again. This is the pattern. The crucial thing is to never stop thinking and workingand never do what we did with malaria and tuberculosis in the 20th centurywhich is to surrender to complexity and quit. The final stepafter seeing the problem and finding an approachis to measure the impact of your work and share your successes and failures so that others learn from your efforts. † This example told people how to help those people who were suffering from disease. Also it told people to solve the problem when they met. The audiences were responded lively. When Bill Gates stood on the stage, all the people stood and began to clap. When Bill Gates used humor to deliver his points, audiences would laugh or clap. When Bill Gates was talking, the audience would be silence. It showed that the speech was interesting and meaningful that they would like to listen. Also, they showed the respect to the people who were the richest one in the world. After I watched the video, I think Bill Gates did very well on his speech. He gave an interesting and meaningful speech to people. He let people laugh; at the same time, he let people think.

Wednesday, August 21, 2019

How to achieve peace in Pakistan Essay Example for Free

How to achieve peace in Pakistan Essay Pakistan was founded. Pakistan was built to fulfill the needs of the Muslim community by providing them equality, Justice and freedom. However, soon enough it failed to fulfill the promises it had made to its society thus instability, restlessness and wretchedness reigned throughout the nation. Achievement of peace in Pakistan is actually the desire of every follow Pakistani or at least a huge majority of them. To devise a proper strategy we need to analyze and understand the causes f unrest and chaos in Pakistan. Factors causing disturbance in Pakistan can be categorized in internal and external factors. Internals factors consist of social, economic, political and administrative whereas external factors are related to regional instability and international so-called war on terror involving Kashmir, Iran, Afghanistan and Baluchistan. For achievement of peace and stability we need to address the huge gap between haves and have nots. Firstly socially, there seems to be a huge gap between the different classes within the country. A large majority when sees a small minority enjoying a very luxurious life style they naturally rebel and resort to unlawful activities to become rich overnight. We can say this is a poor vs. rich tension, which disturbs the peace of society in various ways such as crime and law breaking. Secondly, politically, in Karachi different political parties have armed wings. Karachi being the biggest city has greater influence. Respective political leaders protect crimes of members of these gangs. While political leaders re enjoyingi government position at the same time they are patronizing criminals, murderers, target killers, extortionists and land grabbers. Thirdly, economically, Karachi being port city and major economic hub affects Pakistan. One day of strike and unrest in Karachi costs billion of rupees to national exchequer. Lastly, on the administrative side, law enforcement agencies are plagued by corruption. They are packed with cronies of influential people along with lack of proper training and sufficient resources. In some cases sources of trouble and unrest outnumber civil law nforcement agencies. Furthermore criminals are able to get relief from tax and justice procedures. They can even intimidate eyewitnesses and thus obstruct dispensation of Justices. This further erodes confidence of public on the prevailing system and thus increases unrest and instability. Therefore, to achieve peace we need to address all these issues immediately. The first step should be to break the vicious cycle of illiteracy, poverty and disease by providing educational and health facilities and equal Job opportunities on merit. We have to uplift standard of general public through a fair system based on social Justice by educating general public through print and electronic media about the responsibilities and rights of a citizen. Law enforcement agencies need to be revamped by selecting officers and cadres on merit, proper training and equipping them with latest equipment and technology and where necessary paramilitary forces can be used to assist them. A fair and speedy Justice system, which ensures that troublemakers are taken to task without ny delay, should be formed. Similarly, on the international front we have to get out of Afghan war. We should not allow proxy wars to be fought in our territory. In KPK and Baluchistan political reconciliation is required since administrative measures alone have failed to give desired results. To sum up, peace in Pakistan cannot be achieved in bullet but a set of social, economic, political and administrative system could help our country to gradually move towards the right path and a path towards stability.

Cyber Crime: Strategies and Types

Cyber Crime: Strategies and Types Cyber Crime: Identity Theft A. Introduction In this era of globalization, one of many things that can distinguish a developed country to a developing country is its progress of science and technology. This is because along with the development of a countrys science and technology, will also developed the countrys ability to enrich their own potential. Great advances in science and technology in developed country are due to their well-established information system. Meanwhile, in the developing country, the information system is still minimal, which make the development of science and technology become blocked. Thus, whether a country will become a developed country or not, is highly depend on their mastery of information system. In times like these, the mastery of the information system will not enough by merely mastering. We need to conquer the speed and accuracy too, because there is almost no point in mastering outdated information. Moreover, the very rapid progress of information makes the age of the information shorted. In other words, substitution of old and new information becomes faster. Old information will be ignored because of the more recent information. But, the development of science and technology, in which also means the development of information system, does not always have good effects. It has bad effects too. One of them is the increased rate of the computer crime. B. Computer Crime Computer crime issues have become high-profile, particularly those surrounding hacking, copyright infringement through warez, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. A computer crime is any illegal action where the data on a computer is accesed without permission. This access does not have to result in loss of data or even data modifications. Computer crime is often attributed to rogue hackers and crackers, but increasingly organized crime groups have realized the relative ease of stealing data with low-level of risk. There are three major classes of criminal activity with computer: 1. Unauthorized use of a computer, which might involve stealing a username and password, or might involve accessing the victims computer via the Internet through a backdoor operated by a Trojanhorse program. Unauthorized use of computers tends generally takes the following forms: Computer voyeur. The attackers read or copy confidential or propietary information, but the data is neither deleted nor changed. Changing data. Example, changing a grade on a school transcript. Unauthorized changing of data is generally a fraudulent act. Deleting data. Deleting entire files could be an act of vandalism or sabotage. Denying service to authorized users. 2. Creating or releasing a malicious computer program (e.g., computer virus, worm, Trojanhorse). Malicious computer program are divided into these following classes: 1) A virus is a program that infects an executable file. After infection, the executable file functions in a different way than before: maybe only displaying a benign message on the monitor, maybe deleting some or all files on the users hard drive, or maybe altering data files. There are two key features of a computer virus: The ability to propagate by attaching itself to executable files (e.g., application programs, operating system, macros, scripts, bootsector of a hard disk or floppy disk, etc.) Running the executable file may make new copies of the virus. The virus causes harm only after it has infected an executable file and the executable file is run. 2) A worm is a program that copies itself. The distinction between a virus and a worm, is that a virus never copies itself, a virus is copied only when the infected executable file is run. In the pure, original form, a worm neither deleted nor changed files on the victims computer, the worm simply made multiple copies of itself and sent those copies from the victims computer, thus clogging disk drives and the Internet with multiple copies of the worm. Releasing such a worm into the Internet will slow the legitimate traffic on the Internet, as continuously increasing amounts of traffic are mere copies of the worm. 3) A Trojan Horse is a deceptively labeled program that contains at least one function that is unknown to the user and that harms the user. A Trojan Horse does not replicate, which distinguishes it from viruses and worms. Some of the more serious Trojan horses allow a hacker to remotely control the victims computer, perhaps to collect passwords and creditcard numbers and send them to the hacker, or perhaps to launch denial of service attacks on websites. Some Trojan Horses are installed on a victims computer by an intruder, without any knowledge of the victim. Other Trojan Horses are downloaded (perhaps in an attachment in e-mail) and installed by the user, who intends to acquire a benefit that is quite different from the undisclosed true purpose of the Trojan Horse. 4) A logic bomb is a program that detonates when some event occurs. The detonated program might stop working, crash the computer, release a virus, delete data files, or any of many other harmful possibilities. Atimebomb is a type of logicbomb, in which the program detonates when the computers clock reaches some target date. 5) A hoax is a warning about a nonexistent malicious program. 3. Crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device (cyber crime) Examples of crimes that merely use computer networks or devices would include : Cyber stalking Fraud and identity theft Phishings scams Information warfare The third type of Computer Crime has become the most famous right now, because it produce more benefits than the other two. C. Cyber Crime The Internet is a new frontier. Just like the Wild, Wild West, the Internet frontier is wide open to both exploitation and exploration. There are no sheriffs on the Information Superhighway. No one is there to protect you or to to lock-up virtual desperados and bandits.This lack of supervision and enforcement leaves users to watch out for themselves and for each other.A loose standard called netiquette has developed but it is still very different from the standards found in real life.Unfortunately, cyberspace remains wide open to faceless, nameless con artists that can carry out all sorts of mischief. And that is why the cyber crimes can be as they are right now. Cyber Crime is a criminal activity done using a computers and the internet. This includes anything from downloading illegal music files to stealing millions of dollars from online bank accounts. Cyber crime also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the internet. Cases of cyber crime, 1970 2005: 1970 1990 1. John Draper discovers the give-away whistle in Capn Crunch cereal boxes reproduces a 2600Hz tone. Draper builds a ‘blue box that, when used with the whistle and sounded into a phone receiver, allows phreaks to make free calls 2. Robert T. Morris, Jr., graduate student at Cornell University and son of a chief scientist at the NSA, launches a self-replicating worm (the Morris Worm) on the governments ARPAnet (precursor to the Internet). The worm gets out of hand and spreads to over 6000 networked computers, clogging government and university systems. Morris is dismissed from Cornell, sentenced to three years probation, and fined $10K. 3. After a prolonged sting investigation, Secret Service agents swoop down on organizers and members of BBSs in 14 US cities, including the Legion of Doom. The arrests are aimed at cracking down on credit-card theft and telephone and wire fraud.(1990) 1991 2000 1. Five members of the Aum Shinri Kyo cults Ministry of Intelligence break into Mitsubishi Heavy Industrys mainframe and steal Megabytes of sensitive data. (1994) 2. Hackers adapt to emergence of the World Wide Web, moving all their how-to information and hacking programs from the old BBSs to new hacker Web sites.(1994) 3. Russian crackers steal $10 million from Citibank. Vladimir Levin, the ringleader, uses his work laptop after hours to transfer the funds to accounts in Finland and Israel. He is tried in the US and sentenced to 3 years in prison. All but $400K of the money is recovered. (1995) 4. The French Defense Ministry admits Hackers succeeded in stealing acoustic codes for aircraft carriers and submarines. (1995) 5. FBI establishes fake security start-up company in Seattle and lures two Russian citizens to U.S. soil on the pretense of offering them jobs, then arrests them. The Russians are accused of stealing credit card information, attempting to extort money from victims, and defrauding PayPal by using stolen credit cards to generate cash. (2000) 2001 2005 1. Microsoft become victim of a new type of attack against domain name servers, corrupting the DNS paths taking users to Microsofts Web sites. This is a Denial of Service (DoS) attack. The hack is detected within hours, but prevents millions of users from reaching Microsoft Web pages for two days. (2001) 2. The Klez.H worm becomes the biggest malware outbreak in terms of machines infected, but causes little monetary damage. (2002) 3. Two men hack into wireless network at Lowes store in Michigan and steal credit card information. (2003) 4. Brian Salcedo sentenced to 9 years for hacking into Lowes home improvement stores and attempting to steal customer credit card information. Prosecutors said three men tapped into the wireless network of a Lowes store and used that connection to enter the chains central computer system in NC, installing a program to capture credit card information. (2004) 5. Secret Service seizes control of the Shadowcrew Web site and arrests 28 people in 8 states and 6 countries. They are charged with conspiracy to defraud the US. Nicolas Jacobsen, is charged with hacking into a T-Mobile computer system, exposing documents the Secret Service had e-mailed to an agent. (2004) Australian Institute of Criminology, 9 types of cycber crime: 1. Theft of telecommunication service The phone phreakers of three decades ago set a precedent for what has become a major criminal industry. By gaining access to an organisations telephone switchboard (PBX) individuals or criminal organisations can obtain access to dial-in/dial-out circuits and then make their own calls or sell call time to third parties. Offenders may gain access to the switchboard by impersonating a technician, by fraudulently obtaining an employees access code, or by using software available on the internet. Some sophisticated offenders loop between PBX systems to evade detection. Additional forms of service theft include capturing calling card details and on-selling calls charged to the calling card account, and counterfeiting or illicit reprogramming of stored value telephone cards. 2. Communication in furtherance of criminal conspiracies There is evidence of telecommunications equipment being used to facilitate organised drug trafficking, gambling, prostitution, money laundering, child pornography and trade in weapons (in those jurisdictions where such activities are illegal). The use of encryption technology may place criminal communications beyond the reach of law enforcement. 3. Telecommunications privacy Digital technology permits perfect reproduction and easy dissemination of print, graphics, sound, and multimedia combinations. The temptation to reproduce copyrighted material for personal use, for sale at a lower price, or indeed, for free distribution, has proven irresistable to many. 4. Dissemination of offensive materials Content considered by some to be objectionable exists in abundance in cyberspace. This includes, among much else, sexually explicit materials, racist propaganda, and instructions for the fabrication of incendiary and explosive devices. Telecommunications systems can also be used for harassing, threatening or intrusive communications, from the traditional obscene telephone call to its contemporary manifestation in cyber-stalking, in which persistent messages are sent to an unwilling recipient. 5. Electronic money laundering and tax evasion With the emergence and proliferation of various technologies of electronic commerce, one can easily envisage how traditional countermeasures against money laundering and tax evasion may soon be of limited value. I may soon be able to sell you a quantity of heroin, in return for an untraceable transfer of stored value to my smart-card, which I then download anonymously to my account in a financial institution situated in an overseas jurisdiction which protects the privacy of banking clients. I can discreetly draw upon these funds as and when I may require, downloading them back to my stored value card (Wahlert 1996). 6. Electronic vandalism, terrorism and extortion As never before, western industrial society is dependent upon complex data processing and telecommunications systems. Damage to, or interference with, any of these systems can lead to catastrophic consequences. Whether motivated by curiosity or vindictiveness electronic intruders cause inconvenience at best, and have the potential for inflicting massive harm (Hundley and Anderson 1995, Schwartau 1994). While this potential has yet to be realised, a number of individuals and protest groups have hacked the official web pages of various governmental and commercial organisations (Rathmell 1997). http://www.2600.com/hacked_pages/ (visited 4 January 2000). This may also operate in reverse: early in 1999 an organised hacking incident was apparently directed at a server which hosted the Internet domain for East Timor, which at the time was seeking its independence from Indonesia (Creed 1999). 7. Sales and investment fraud As electronic commerce becomes more prevalent, the application of digital technology to fraudulent endeavours will be that much greater. The use of the telephone for fraudulent sales pitches, deceptive charitable solicitations, or bogus investment overtures is increasingly common. Cyberspace now abounds with a wide variety of investment opportunities, from traditional securities such as stocks and bonds, to more exotic opportunities such as coconut farming, the sale and leaseback of automatic teller machines, and worldwide telephone lotteries (Cella and Stark 1997 837-844). Indeed, the digital age has been accompanied by unprecedented opportunities for misinformation. Fraudsters now enjoy direct access to millions of prospective victims around the world, instantaneously and at minimal cost. 8. Illegal Interception of telecommunications Developments in telecommunications provide new opportunities for electronic eavesdropping. From activities as time-honoured as surveillance of an unfaithful spouse, to the newest forms of political and industrial espionage, telecommunications interception has increasing applications. Here again, technological developments create new vulnerabilities. The electromagnetic signals emitted by a computer may themselves be intercepted. Cables may act as broadcast antennas. Existing law does not prevent the remote monitoring of computer radiation. It has been reported that the notorious American hacker Kevin Poulsen was able to gain access to law enforcement and national security wiretap data prior to his arrest in 1991 (Littman 1997). In 1995, hackers employed by a criminal organisation attacked the communications system of the Amsterdam Police. The hackers succeeded in gaining police operational intelligence, and in disrupting police communications 9. Electronic funds transfer fraud Electronic funds transfer systems have begun to proliferate, and so has the risk that such transactions may be intercepted and diverted. Valid credit card numbers can be intercepted electronically, as well as physically; the digital information stored on a card can be counterfeited. Right now electronic funds transfer fraud is the most famous type of cyber crime. Every year the rate of case about electronic funds transfer fraud always increasing especially in credit card information stealing. From www.spamlaws.com they wrote about credit card stealing in 2005,†Credit card fraud statistics show that about $2.8 million was lost due to credit card fraud, from fraudulent use of MasterCard and Visa alone. In total, credit card fraud costs cardholders and credit card issuers as much as $500 million a year.† Identity Theft Identity theft is really identity fraud. This criminal uses someone elses identity for their own illegal purposes.Examples include fraudulently obtaining credit, stealing money from the victims bank accounts, using the victims credit card number, establishing accounts with utility companies, renting an apartment, or even filing bankruptcy using the victims name. The cyberimpersonator can steal unlimited funds in the victims name without the victim even knowing about it for months, or even years. Anyone who relies heavily on credit cards, Social Security Numbers or network blogging is more susceptible to credit identity theft. Many of our modern conveniences also come with a risk and less protection. The digital age is the perfect age for the Cyber criminal to commit it. Think of the internet as a dark alley in the middle of the night. And these cyber criminals are those people hiding there waiting for the victims to make a mistake. Credit identity theft is a very damaging crime because it not only damages the person financially but also damages the persons reputation as well. Imagine someone borrowing money using your name and never telling you. You will both bear with the burden of paying back the money he borrowed and suffer the humiliation of having this blunder under your name. Identity theft has been referred to by some as the crime of the new millennium. It can be accomplished anonymously, easily, with a variety of means, and the impact upon the victim can be devastating. Identity theft is simply the theft of identity information such as a name, date of birth, Social Security number (SSN), or a credit card number. The mundane activities of a typical consumer during the course of a regular day may provide tremendous opportunities for an identity thief: purchasing gasoline, meals, clothes, or tickets to an athletic event; renting a car, a video, or home-improvement tools; purchasing gifts or trading stock on-line; receiving mail; or taking out the garbage or recycling. Any activity in which identity information is shared or made available to others creates an opportunity for identity theft. It is estimated that identity theft has become the fastest-growing financial crime in America and perhaps the fastest-growing crime of any kind in our society. The illegal use of identity information has increased exponentially in recent years. In fiscal year 1999 alone, the Social Security Administration (SSA) Office of Inspector General (OIG) Fraud Hotline received approximately 62,000 allegations involving SSN misuse. The widespread use of SSNs as identifiers has reduced their security and increased the likelihood that they will be the object of identity theft. The expansion and popularity of the Internet to effect commercial transactions has increased the opportunities to commit crimes involving identity theft. The expansion and popularity of the Internet to post official information for the benefit of citizens and customers has also increased opportunities to obtain SSNs for illegal purposes. Victims of identity theft often do not realize they have become victims until they attempt to obtain financing on a home or a vehicle. Only then, when the lender tells them that their credit history makes them ineligible for a loan, do they realize something is terribly wrong. When they review their credit report, they first become aware of credit cards for which they have never applied, bills long overdue, unfamiliar billing addresses, and inquiries from unfamiliar creditors. Even if they are able to identify the culprit, it may take months or years, tremendous emotional anguish, many lost financial opportunities, and large legal fees, to clear up their credit history. Identity theft occurs in many ways, ranging from careless sharing of personal information, to intentional theft of purses, wallets, mail, or digital information. There are some reasons why the attacker can steal the credit card information: 1. Unsecured network Example: 1. Poisoning Poisoning technique is quiet complicated. First, the attackers need to connect to the same network with the target. After that, the attackers have to look for the IP address of the target. The next step, the attackers should poison the target computer with ARP poisoning or with trojan horse. Then the computer target will move following the attackers track. The attackers will bring the target into fake shop site, and make the target unrealized that he/she has entered the credit card information. 2. Sniffing This technique is unstable, why? Because its depend on the attackers luck. Just like poisoning, the attackers have to connect to the same network with the target. After that, the attackers should scan all of MAC address in the network. Next, the attackers start the sniffing program, such as Cain and Able or Wireshark. Last, the attackers should wait until someone in the network open a shop site and enter the information of the credit card. 2. Vulnerabilities on the site Example: 1. SQL Injection With this vulnerability the attacker can enter admin panel without knowing the username and password. They just need to enter a right syntax as username and password to enter the admin panel. If they are already in admin panel they can see the complete information of the buyer. 2. Blind SQL Injection Blind SQL injection is the most favorite vulnerability for the attackers. The attackers will only need the web browser to do this technique. First, the attackers have to found a right page to be injected with some syntax. After that the attackers should drop all database table, and looking for user table or admin table. If there is user table the attackers can drop the column and the attackers could get the full data of the user, included the credit card information. But, if user table doesnt exist, the attackers should use the admin table. The attackers should drop the admin column and search for the admin password. After the attackers cracks the admins username and password, the attackers could go to the admin panel and look for the information of the buyer. 3. Order log Order log is an old vulnerability, but theres still websites that have this vulnerability. With this vulnerability the attackers only need to use search engine and look for the order log. If the order log has already founded the attacker will open it, and suddenly get full information about the buyer. 4. Admin Directory This vulnerability makes visitor of the site be able to open admin directory freely. So, the attacker could use this chance to see the database. Order database is always in the database. In the order database, the data of the buyer will be saved completely, including credit card information. 3. Human error Example: Social Engineering or Human Manipulating Attacker could use security weakness which is human. Why? Because human is easy to be manipulated. First, the attackers could request the target to do something unimportant, and then set a trap for the target. Attackers will manipulate the target to follow the attackers scheme. Then, if the target has already been trapped, the attacker could make the target gives the complete information about the credit card. There are several ways that can be done to avoid the potential victims from identity theft : The potential victims should request a complete credit report every once a year and check it closely. When get unwanted pre-approved credit card offers, shred them up before tossing them. When in public, do not recite social security number outloud to a bank teller or store cashier. Use a secure mailbox that locks. When asked to give mothers maiden name as a code access, use another key word instead. Change the personal identification numbers on accounts regularly. Pick up and keep printed receipts at bank machines or gas pumps. Even if have been victimized, there are still things that can be done : Before calling the police, contact bank or credit card company and freeze the account. The reason for this is twofold: first, it will help minimize monetary loss, and two, most banks and creditors have a time period in which the notification still valid and can be used to protect the victims. Then call the police department. It does not matter if the identification is being used in the victims city or halfway across the world because the police are required by federal law to take the report. After making police reports, the victim could contact any of national credit bureaus and put a fraud alert on their account. While dealing with the credit bureau, the victim should get a current copy of their credit report. And read it carefully. Then, the victims can contact their insurance company and ask for compensation. At least one insurance company has developed an insurance policy to help deal with identity theft. REFERENCES Anonymous. Computer Crime Definition. cited from http://www.mariosalexandrou.com/definition/ computer-crime.asp [21 November 2009] Anonymous. Cybercrime. cited from http://www.techterms.com/definition/cybercrime [21 November 2009] Australian Institute of Criminology. Nine Types of Cybercrime. cited from http://www.crime.hku.hk/ cybercrime.htm [21 November 2009] Hoar SB. Identity Theft: The Crime of The New Millennium. cited from http://www.cybercrime.gov/ usamarch2001_3.htm [5 December 2009] Karnow CEA. Cybercrime. cited from http://www.davislogic.com/cybercrime.htm [5 December 2009] Herries S. Overcoming Identity Theft: What to Do After You Have Been Comprimised. cited from http://www.associatedcontent.com/article/272448/overcoming_identity_theft_what_to_do_pg2.html?cat=17 [5 December 2009]

Tuesday, August 20, 2019

Social Work :: essays research papers

Service Learning Research Paper Dictionary.com defines homelessness as the state or condition of having no home (especially the state of living in the streets), people without homes considered as a group, having no home or haven. The homeless are the most noticeable of America’s social tribulations. You can see homeless individuals everywhere in cities, town, suburbs, and rural areas. Believe it or not everyone has a reason to why they are homeless.   Ã‚  Ã‚  Ã‚  Ã‚  Well if that is the case, why do many individuals choose to be homeless is the question? Who are the homeless? Are they comfortable with their living situation? Do they have any family? What are wrong with shelters? Who actually goes to shelters? These are many questions you ask yourself. As an issue homelessness first really hit the public consciousness in the early 1980s. By 1987, the federal government had decided to help, passing the McKinney Act, which directed federal money to support homeless shelters. Yet 15 years later, the cycle continues.   Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"It has been suggested that newly homeless people are more likely to bypass the shelters and use their homeless assistance money to stay in a motel. Because the government assistance is not sufficient to help the most needy† (Seltser & Miller, pg 48). Again you ask yourself what is the meaning of being homeless? Just think about people who sleep on a park bench thinking warm thoughts, while you’re sleeping in a bed as comfortable as a cloud. Talley, Eitzen, & Timmer stated that, public welfare fails to supply adequate levels of wages and housing support that would avoid them from becoming homeless. People might lose their homes due to loss of employment, overwhelming medical expenses and debt, or domestic violence. Homelessness can affect people of any age or gender, but the majority of homeless people are elderly men, single women with young children, and teens who have run away from home. You can categorize homelessness as a social class. Race also plays an important role, since people of color are among the extremely poor. There are people with many different problems that force then to become homeless. They do however all have one thing in common they have nowhere to live. Some factors that contribute to homelessness in America that make it unpreventable are the lack of education, economic factors and mental illness. Lack of education is something that is looked down upon in today’s society.

Monday, August 19, 2019

Seamus Heaney & Tony Curtis Essay -- English Literature

Seamus Heaney & Tony Curtis On initial reading both the Follower and Strongman are simply about a son's relationship with their father. Whilst this relationship is a central theme of both poems, the poems also explore a range of issues including cultural identity, guilt and social class. This essay will attempt to analyse both poems individually and to also identify areas of conflict and similarity between the poems. The first two words of Follower by Seamus Heaney are "My father" which immediately establishes the poet's emotionally involved relationship with the subject of the poem. In contrast the poet of Strongman writes in the third person for the majority of the poem and it is only really in the last two lines that the poet establishes that he is addressing the poem to the son. Both poems create a vivid picture of physically strong fathers who draw on their physical strength by undertaking skilled manual jobs to support their families "My father worked with a horse-plough" and "A carpenter who could punch nails into wood with a clench fist". Seamus Heaney employs the use of a number of sea images in helping the reader to visualise the immense strength and stamina of his father's body "His shoulders globed like a full sail strung" and "Sometimes he rode me . Dipping and rising to his plod". Similarly Tony Curtis employs powerful visual imagery to illustrate the father in his poem as the pivot of a roundabout with his five sons as seats/chairs swinging from his arms as he "would stretch his arms and hang his five sons from them, turning like a roundabout". This is a very successful simile as it encapsulates the swinging motion of the father playing with his children and on a deeper note the fathe... ...man focuses on the reversed roles of the father and son. The original role of the father as the provider and central axis in the family has now disappeared to the extent that it is now the son who not only cares for the father physically but also emotionally as he reassures the father with "No trouble - he said, no trouble, Dad". The final likes of the poem encapsulate the indignities of sickness and old age. The use of minimalist, stark language, without the use of unnecessary adjectives heightens the poignancy of the last lines. In conclusion both Follower and Strongman are brief but effective poems that successfully portray father - son relationships. The readers are allowed an intimate snapshot/glimpse into these relationships. Both poems describe the permanent bonds between fathers and sons whilst also effectively addressing how these bonds evolve.

Sunday, August 18, 2019

Cahills How The Irish Saved Civilization Essay -- essays research pape

Cahill's How the Irish Saved Civilization Thomas Cahill opens his story describing Rome's fall, â€Å"For as the Roman Empire fell, as all through Europe matted, unwashed barbarians descended on the Roman cities, looting artifacts and burning books, the Irish who were just learning to read and write, took up the just labor of copying all of western literature - everything they could get their hands on. These scribes then served as conduits through which Greco-Roman and Judeo-Christian cultures were transmitted to the tribes of Europe, newly settled amid the rubble and ruined vineyards of the civilization they had overwhelmed.† (Cahill, p.3) The theme of this book is that the scribes did something unique, they saved civilization, not the masses of people, but literature, the content of â€Å"classical civilization.† (Cahill, p. 58) One reads of the time from Rome's fall to medieval times learning through the stories of the characters, most notable Augustine and Patrick.   Ã‚  Ã‚  Ã‚  Ã‚  Augustine, his faith based on Roman Chrisitanity, â€Å"looked into his own heart and found the anguish of each individual.† (Cahill, p. 115) Patrick, the slave turned Christian, escapes only to return to convert the Irish. He was the first missionary to the barbarians beyond Greco-Roman law â€Å"who looked into the hearts of others.† (Cahill, p. 115)   Ã‚  Ã‚  Ã‚  Ã‚  Cahill notes Ireland is the only land where Christianity is introduced without violence - there were no murdered Irish...

Saturday, August 17, 2019

Methadone Maintenance Treatment

Methadone Maintenance Treatment (MMT) has been in place for over 30 years.   Initially used as an analgesic before the Second World War, it was used to rectify the heroine epidemic in the post-World War II era.   At present, MMT is used as a harm-reduction strategy – a tool to help withdrawing heroine addicts, reduce crime and deaths associated with opiate use and to reduce incidences of HIV/AIDS that results from heroin injection and needle use.   There is still however a controversy surrounding the treatment basically because of the misconception associated with MMT.   Health officials believe that MMT should be kept in a short duration as possible while researchers contend that higher doses and longer treatment duration may lead to lower cases of relapse. Heroin addiction is a persistent problem in the United States especially in New York City where heroin abuse, replacing opium smoking, started in the early 20th century (Frank, 2000).   The post-World War II era saw an epidemic rise in the number of heroin addicts such that between 1950 and 1961, heroin injection became one of the leading causes of death among young adults in New York City (Joseph, Stancliff & Langrod, 2000).   The average age of heroin-related deaths was 29 years old, both for men and women. Initially used as an analgesic in Germany before the Second World War, methadone was considered as an answer to the prevalence of the illicit drug and the consequent criminal offenses and deaths associated with its use.   This started in 1949 when Isbell and Vogel demonstrated methadone to be effective in helping addicts withdraw from heroin (Joseph et. al, 2000).   In 1964, methadone maintenance treatment (MMT) was launched as a research program in Rockefeller Institute under the direction of Dr. Vincent P. Dole and Dr. Marie E. Nyswander. At present, methadone maintenance treatment is one of the common medications used to treat heroin and other opiate addiction.   Judging from the number of researches and assessments on MMT, it is evidently the drug abuse treatment that has received the most thorough evaluation and has been shown to be effective in reducing opioid use, HIV incidences, criminal activity and mortality (â€Å"Literature Review – Methadone Maintenance Treatment†, 2007).   Consequently, it has also been demonstrated to improve physical and mental health and a person’s ability to regain normal social functioning. Despite the staggering number of studies associated with MMT and the scientific data resulting from these studies showing that the treatment is an effective medication for withdrawing opiate addicts, controversies still surround the treatment.   There seem to be  conflicting views between scientists/researchers and health officials as to how the treatment must be dispensed.   Aside from discussing those controversies, this paper will also: a) present methadone facts b) present the advantages and disadvantages of MMT and determine the people that can benefit from such a treatment; and c) assess whether MMT is an effective harm-reduction strategy. Methadone Facts Methadone, initially used as an analgesic, is a synthetic narcotic that has been used to treat opiate addiction for more than 3 decades (Office of National Drug Control Policy [ONDCP], 2000).   Heroin and opioid addicts feel the need to continually take in these substances because opiates occupy a receptor in the brain which sends a signal to the body when opiate levels are low.   Methadone works by â€Å"occupying† these receptor sites and consequently hinders the euphoria caused by heroin use, relieves the craving for opiate and reduces the withdrawal symptoms associated with abrupt cessation of opiate use (Centers for Disease Control and Prevention [CDC], 2002). Taken orally once a day, the effect of methadone can last from 24 to 36 hours. As with any medication, there is the risk of abuse and dependency.   In a controlled and supervised treatment, a former heroine addict may remain physically dependent on methadone but does not experience the highs and lows resulting from the increase and decrease of heroine in blood levels (ONDCP, 2000). A person on methadone treatment can therefore be integrated into the society and become a functional citizen. Who Benefits From MMT Methadone will only be effective for those recovering from opiate addiction and will have no effect for those who are taking other mood-altering substances apart from opiates  (Stimmel & Kreek, 2000).   In the past, admission to MMT was limited only to applicants between the ages of 21 and 40 with a minimum of 4 years narcotic addiction.   Joseph, et. al. (2000) noticed that the admission criteria is much more liberal now as rehabilitation clinics now admit patients younger than 21 and older than 40. Because the link between heroin abuse and alcoholism has long been acknowledged, the New York State Office of Alcoholism and Substance Abuse Services (OASAS) changed its former rules of separating treatment for heroin addicts and alcoholics and instead ordered that Addiction Treatment Centers (ATCs) admit methadone patients into alcoholism rehabilitation programs and vice versa (Kipnis, Herron, Perez & Joseph, 2001). Even pregnant women can be treated using methadone as long as the mother is closely monitored and has to be enrolled in a comprehensive program that not only includes MMT but also prenatal care, nutritional counseling and other medical services that the pregnant woman may need (Joseph, et. al, 2000).   Ward (1998) as cited in â€Å"Literature Review – Methadone Maintenance Treatment† (2207) asserted that nobody should be excluded from the treatment (in the context of heroin and opiate use) because no reliable criteria exist that has determined a group of people that will not respond to treatment. Key Issues in MMT The guiding principle of most rehabilitation centers is that an addict is â€Å"cured† if he is able to abstain from the use of an illicit drug.   Critics of MMT claim that the treatment is just a substitute for the stronger opiate (heroin) addiction.   This is viewed as the major disadvantage of MMT, especially by health officials.   Kipnis, et. al. (2001), Stimmel and Kreek (2000), Joseph, et. al. (2000) and a host of other researchers contend that there is a misconception and misunderstanding between health officials and researchers of MMT.   Even at present, there is a stigma associated with MMT because it still viewed as a physical dependence on a drug. This explains why most patients in rehabilitation clinics receive  insufficient doses which would lead to a likely relapse. A lot of health care officials believe that therapy using methadone has to be ceased as soon as possible.   Researchers disagree, arguing that there should not be a limit as to the duration of the treatment because patients may respond well to a short treatment while others may respond better to a longer treatment, possibly even a lifetime treatment.   Joseph et. al. (2000) also noted that higher doses lead to a higher treatment retention rate.   Even with increasing evidence pointing to the effectiveness of MMT as a therapy for heroin and opiate withdrawal, there is still only partial acceptance for the treatment by the public.   The media has also distorted the public’s view on MMT which resulted to a stigma associated to the treatment. MMT as a Harm-Reduction Strategy Drug Policy Alliance (2007) cited dozens of authors that supported MMT as a tool used to reduce crime, death and disease.   Researchers agree that methadone is the most effective treatment for heroin addiction.   Furthermore, methadone reduces criminal offenders because those who are in MMT are able to lead stable lives and can acquire legitimate employment. Cases of HIV and other diseases caused by needle-sharing are also reduced by the treatment.   Methadone treatment is also a point of contact between the patient and the health official and an opportunity for the patient to learn about the techniques to prevent HIV/AIDS, hepatitis and other diseases that may inflict drug users. MMT is also cost-effective, costing only $13 per day and is a better alternative than incarceration (ONDCP, 2000).   Kipnis, et. al. (2001) however believes that there must be an organizational overhaul in order for MMT to be more effective.   The staff of ATCs must lose their held principles that MMT does not work or that it is a form of addiction.   Discrimination for MMT patients must have no place in the 12-step rehabilitation programs and the public also needs to be educated of the proper and real function of MMT in the community. Conclusion MMT has been proven to be effective in more than 3 decades of its use.   Social factors however prevent it from being used properly.   Misconceptions that health officials have regarding the treatment, its use and the dosage to be dispensed lead to a great number of relapses.   Staff culture and beliefs have to be changed in order for methadone maintenance treatment to be fully accepted in the community and for its effectivity to be optimized. References Drug Policy Alliance (2007). Methadone Maintenance Treatment. Drug Policy Alliance. Retrieved September 1, 2007 from http://www.lindesmith.org/library/ research/methadone.cfm Frank. B. (2000). An Overview of Heroin Trends in New York City: Past, Present and Future. The Mount Sinai Journal of Medicine, 67 (5-6). Kipnis, S., Herron, A., Perez, J. & Joseph, H. (2001 January). Integrating the Methadone Patient In the Traditional Addiction Inpatient Rehabilitation Program – Problems and Solutions [electronic version]. The Mount Sinai Journal of Medicine, 68 (1). Retrieved August 31, 2007 from http://www.mssm.edu/msjournal/68/PAGE28_32.pdf Joseph, H., Stancliff, S. & Langrod J. (2000). Methadone Maintenance Treatment (MMT): A Review of Historical and Clinical Issues. The Mount Sinai Journal of Medicine, 67 (5). 347-364. Retrieved August 31, 2007 from http://www.mssm.edu/msjournal/67/page347_364.pdf Literature Review – Methadone Maintenance Treatment (2007). Health Canada. Retrieved August 31, 2007 from   http://www.hc-sc.gc.ca/hl-vs/pubs/adp-apd/methadone/policy-politique_e.html#adm Stimmel, B & Kreek, M.J. (2000). Neurobiology of Addictive Behaviors and Its Relationship to Methadone Maintenance [electronic version]. The Mount Sinai Journal of Medicine, 67, (5-6). 375-380. Retrieved September 1, 2007 from http://www.mssm.edu/msjournal/67/page375_380.pdf U.S. Centers for Disease Control and Prevention [CDC] (2002 February). Methadone Maintenance Treatment. IDU HIV Prevention. Retrieved August 30, 2007 from http://www.cdc.gov/idu/facts/MethadoneFin.pdf       Â