Saturday, December 28, 2019

In the context of the years 1485 to 1603 to what extent...

In the context of the years 1485 to 1603 to what extent was the government of England dysfunctional in the mid-Tudor period? During the Tudor Dynasty it is easily thought that the years between 1547 and 1558 were ones of crisis. With the succession of a child and the first woman within England, people have assumed that the years between Henry VIII and Elizabeth I were an unproductive interlude. The mid Tudor period is seen as negative years within the Tudor Dynasty. It is regarded that Henry VIII and Elizabeth I’s reputations were a factor in why historians such as A.F Pollard and S T Bindoff supported the ‘Mid Tudor Crisis’ . The ‘two little Tudors’, referring to Edward and Mary, seemed colourless in comparison to their surrounding†¦show more content†¦He then failed to re-marry and achieve stronger diplomatic relations outside of England following the death of Elizabeth creating a weak government in England. Also the death of Isabella of Castile was another problem for Henry as he would have Ferdinand as his rival instead of an ally over territorial gains in Eur ope and in the New World. The later years of Henrys foreign policy were definitely his most challenging and difficult period of foreign affairs allowing the government to be weak and therefore vulnerable to a crisis. His son, Henry VIII was a commanding figure who immediately set about wanting to gain respect and authority in Europe. Henry VIII’s foreign policy can be divided into two separate periods of time in which he went to war. The first period was at the beginning of his reign, in 1509-1515, Henry enforced a policy of aggressive and glorious warfare, this policy allowed invasions to occur within in France and Scotland. He was victorious within both invasions however it was an expensive policy to initiate. The second time period was during the years 1540-1547, this is when Henry, yet again, wanted more glory and domination over foreign affairs. This period of foreign policy was extremely expensive and came at a great financial cost. The gaining of Boulogne and loss of military personnel, costing  £2,144,765, achieved nothing greater than personal glory for Henry showing his reign as one of dysfunction. The disastrous

Friday, December 20, 2019

Christian Beliefs Of The Trinity - 852 Words

A cornerstone teaching of many Christian beliefs is that of the Trinity. It is also a debated and misunderstood concept. Besides being just outright refuted, there are a couple of ways in which the Trinity is misunderstood. These misunderstandings can relate to other religions which a person may be more familiar with, or might believe. God as the Father the Son and the Holy Spirit is a difficult concept to embrace fully but is not much unlike the concept of understanding an omniscient and omnipotent being that exists before during and after time. There are several explanations that help our human brains comprehend the concept and differentiate the Trinity from other religions. Two common religions view the Trinity as three gods such as Paganism or is one God that reveals himself in three different forms or persons such as Monism. An individual with a Pagan view might see the Trinity as three gods. The Father, the Son, and the Holy Spirit as separate and different but related gods wit h the same purpose. This would be a similar view similar a few that of the Greeks with their many different God of the Pantheon. A person looking at the Trinity with a background in something like Hinduism, might see the mentioning of the Trinity and related back to their beliefs or knowledge. Hindu might see the Father as one God while the Son is a manifestation of the father but not a true God. The same could be seen for the Holy Spirit. By explaining the Trinity, it is seen of these views areShow MoreRelatedThe Christian Beliefs Of The Trinity783 Words   |  4 PagesThroughout this semester I have learned many of the different christian doctrines. Many of them were challenged and also accepted in my weekend trip throughout Saint Louis. I think one of the most important topics that was discussed during my weekend was the consideration of the Trinity. In the Christian thought the word â€Å"trinity† is a term used to talk about the Christian doctrine that God exists as a unity of three distinct persons: Father, Son, and Holy Spirit. Three of the staple thoughts include;Read MoreThe Beliefs that Effect Christianity Essay1228 Words   |  5 PagesChristianity is a diverse religion with a multitude of beliefs that comprise the core of the religion. There are an abundant number of sects within Christianity however there are a few core principles which are generally true for all of them, for example the belief of the Holy Trinity or better known as the Father, the Son, and the Holy Spirit. This is what would be considered a primary belief. A primary belief is an idea that is a generally universal idea that is accepted by all the differentRead MoreThe Doctrine Of The Trinity861 Words   |  4 PagesBefore discussing the Trinity, it is essential to first understand the Doctrine of the Trinity and what it states. Unfortunately for Christians, an exact definition for the Trinity is not provided in the Bible, actually the word ‘trinity’ is n ever even used in the Bible. Fortunately, however, the Bible is saturated in the belief of a Triune God. The Doctrine of the Trinity states that there is only one God. The Father, the Son, and the Holy Spirit are all one God, but the Father is not the Son whoRead MoreChristianity And The Holy Trinity955 Words   |  4 PagesBible. Along with the teachings of Jesus, Christians believe in the Old Testament, that has biblical records that date back to 1500 B.C.E.. Some of these beliefs include the Holy Trinity, salvation, afterlife, and the Bible. The belief in the Holy Trinity is what I believe to be the most important belief in Christianity. The Holy Trinity consists of the Father, the Son, and the Holy Spirit. The first part of the Trinity is the Father or God. Christians believe that God created the world, and thatRead MoreThe Doctrine Of The Trinity978 Words   |  4 PagesThe word Trinity cannot be found in the bible, but neither can omnipresent or omniscient; yet they all describe the Biblical expression of who God is and how he is revealed to humanity. Furthermore, the doctrine of the Trinity is so crucial to Christianity, that if it was removed Christianity would crumble and fall into cult status. Even through the doctrine of the Trinity took almost a three hundred to be formally stated at the Council of Nicea (325) and the Council of Constantople (381);1 RogerRead MoreThe Five Principle Beliefs Of Christianity1642 Words   |  7 PagesPRINCIPLE BELIEFS OF CHRISTIANITY The principle beliefs associated with Christianity exuberate the understanding of life for its adherents, whilst perpetrating an influence on society. This therefore allows for the comprehension of sacred texts and its cohesive meaning on an entity. The principle beliefs of Christianity include the divinity and humanity of Christ, his death, resurrection and ascension, the nature of God, revelations and salvation. The correlation between these beliefs ultimatelyRead MoreWhat Is Christian Doctrine?938 Words   |  4 PagesWhat is Christian doctrine? Christian doctrine tells us the truth about God, ourselves, and our world. Doctrine means teaching or instruction. A Church historian once defined Christian doctrine in this way: â€Å"Christian doctrine is what the church believes and teaches.† A doctrine is what the whole Bible teaches us about a particular topic. Christian doctrine may be defined as the fundamental truths of the Bible arranged in systematic form. The Assemblies of God has 16 fundamentals of truth or doctrinesRead MoreGod, God And The Creator Of The Earth And Living Things1010 Words   |  5 PagesThe definition of the word religion is known as the belief or worship of a superior power, which can be known as God. God plays a major role within many different religions. However, religions with similar beliefs can differ in numerous ways as well. For instance, both the Jewish and Christian scriptures share a few beliefs in common. Both scriptures identify the belief of one God, who is almighty and the creator of the earth and living things. Both scriptures express the understanding that the EarthRead MoreBook Review Of The Christian God By Richard Swinburne1623 Words   |  7 PagesThe book I’ve chosen for the book review was The Christian God by Richard Swinburne. The Christian God book is the third volume in Swinburne’s tetralogy on the philosophy of the Christian Doctrine. His other two volumes are Responsibility and Atonem ent and Revelation. Swinburne was from Britain and a Professor of Philosophy at the University of Oxford before he retired. For the past 50 years Swinburne helped influence the philosophical argument for the existence of God. His work was influenced fromRead MoreThe Sacred Text And The Principal Beliefs Of Christianity1738 Words   |  7 PagesChristianity has organised its beliefs into a systematic theology that draws from its sacred writing and tradition. While the main beliefs of Christianity are shared by all Christian variants, there are degrees of different in the interpretation of these beliefs and how they are lived out in everyday life. This can be seen in the important of sacred text, principle belief of the concept of salvation in John 3:16, principle belief of divine and humanity in ‘John 1:14’, principle belief of resurrection in ‘Mark

Thursday, December 12, 2019

Addie Bundren conjures up the central darkness der Essay Example For Students

Addie Bundren conjures up the central darkness der Essay ived from her death and directly or indirectly causes actions in which each Bundren character takes advantage of Addie. With the characters actions revolving around her death, William Faulkners As I Lay Dying reveals the truth about the people who surround a person may take advantage of him or her. The death of Addie Bundren shapes all of the characters actions in life including Addies final request before her death. Addie takes advantage of her death by using it for revenge and inflicting final pains upon some characters, while the other characters use her to get what they want for their personal needs. Addie causes all the painful actions around her family either directly or indirectly. Addie is foremost the prominent abuser of her upcoming death in As I Lay Dying. She predetermines her time to die, and she makes sure that the people in her family whom she dislikes must experience her wrath before she moves on to the next life. Addie is the one who is dying, but she makes revenges run throughout the family and extend beyond (Wadlington 35). Inflicting pain mostly on Anse, Addie enjoys herself. Anse, a lazy man, is forced by his wife to take her to Jefferson to be buried as her final request.Addies revenge on Anse was payback for all the times when he just sat around while Addie, her children, and sometimes neighbors do all the hard work for him. Also Addie reacts to Anses arid conventionality by having a clandestine affair with minister Whitfield (Wadlington 31). Addie also indirectly hurts one of her favorite sons, Cash. Cash is hurt indirectly when he helps !his kinfolk carry his mothers coffin to Jefferson, where along the path, he breaks his leg while crossing a flooded river. Although Cash is one of Addies favorites besides Jewel, Addies cruel revenge carries over to Cashs broken leg, which later becomes infected. Besides her indirect action on Cashs leg, Cash is the most favorite of Addie. As Wadlington states, He is very much his mothers son in express ing his feelings through physical action rather than through words by building a coffin for the mother he loves (Wadlington 41). Jewel, Addies second favorite next to Cash, seems to be cursed by his callous mother. Jewel can only express himself through physical actions by being cruel. Yelling and screaming is the only way Jewel shows his love for his mother, but Jewels ferocity begins to wear him down physically. Saving his mothers coffin from going downstream and rescuing the coffin from the burning barn were some ways Jewel showed his love, although those actions are quite extreme because Jewel could have been killed. Addies revenge could have killed Jewel, but luckily it did not happen. Addies revenge also affects her little son Vardaman. Teaching of the world is usually the mothers job in the family especially on Addies case since Anse is a lazy bum. As for Vardaman, his unknowingness comes from his mothers death compounded by his familys failure to communicate reassurance and explanation to him (Wadlington 56). Addie did not teach him what was in the world and manners; so as a result, when his mother dies, Vardaman confused his mothers death with a dead fish he caught that day. Vardamans manners are reckless against Dr. Peabody when he came to nurse Addie. Vardaman action was quite extreme when he tried to chase the doctor away because Vardaman is quite irrational in not understanding that Dr. Peabody did not kill his mother. Dewey Dell, Addies daughter, is deprived of a central motherly figure. Addies action in not caring enough for her daughter leads her to become irresponsible with Lafe where Lafe impregnates Dewey Dell. Darl, one of Addies least favorites, is rejected by his mother which injured him psychologically and led him to burn the barn where Addies coffin lay resting in peace (Wadlington 30). Darl is sent to an asylum for that demented deed, but could have been prevented if Addie showed more affection toward Darl. Darl is gradually revealed a s a rejected son who feels that his mother is not even alive because he calls her Addie Bundren instead of calling her Mother (Wadlington 41). If Addie had cared more for her children and spent more time with her children before her death, then possibly none of painful actions that resulted from Addies presence would have happened. As a result her selfishness towards her children in not giving enough tender love and care, her children become deprived in her life which leads to all the characters taking advantage of Addie. .u88d11f978bc108a66e5f53a4224f8ca8 , .u88d11f978bc108a66e5f53a4224f8ca8 .postImageUrl , .u88d11f978bc108a66e5f53a4224f8ca8 .centered-text-area { min-height: 80px; position: relative; } .u88d11f978bc108a66e5f53a4224f8ca8 , .u88d11f978bc108a66e5f53a4224f8ca8:hover , .u88d11f978bc108a66e5f53a4224f8ca8:visited , .u88d11f978bc108a66e5f53a4224f8ca8:active { border:0!important; } .u88d11f978bc108a66e5f53a4224f8ca8 .clearfix:after { content: ""; display: table; clear: both; } .u88d11f978bc108a66e5f53a4224f8ca8 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u88d11f978bc108a66e5f53a4224f8ca8:active , .u88d11f978bc108a66e5f53a4224f8ca8:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u88d11f978bc108a66e5f53a4224f8ca8 .centered-text-area { width: 100%; position: relative ; } .u88d11f978bc108a66e5f53a4224f8ca8 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u88d11f978bc108a66e5f53a4224f8ca8 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u88d11f978bc108a66e5f53a4224f8ca8 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u88d11f978bc108a66e5f53a4224f8ca8:hover .ctaButton { background-color: #34495E!important; } .u88d11f978bc108a66e5f53a4224f8ca8 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u88d11f978bc108a66e5f53a4224f8ca8 .u88d11f978bc108a66e5f53a4224f8ca8-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u88d11f978bc108a66e5f53a4224f8ca8:after { content: ""; display: block; clear: both; } READ: My Little Quiet Place Essay Addies death also reflects upon the attitudes between Cash, Darl, and Jewel. Between the three, jealousy is prevalent. Jewel and Darl envy the love that Addie gives Cash, while Darl is Jealous of Jewel; therefore, Darl teases him by always asking him Who was your father? (Faulkner 213). Cash, Darl, and Jewel do not get along because of their bitter jealousy of each other. Jewel can never please his mother enough, so he gets mad at Cash while Darl continues to pick on his origin of birth which causes a bitter rivalry between the three (Wadlington 32). Away from her family, Addies cruelty leads into her former teaching career where she hates her children and wishes they where vanquished. Addie resents her children similarly in the way she resents her students when she expressed, When school was out and the last one had left with his dirty snuffling nose, instead of going home, I would go down a hill to the spring where I could be quiet and hate them (Faulkner 169). Addie seems to portray her hatred for her schoolchildren the same way she hated her own children. Addies death results in more character actions in which all characters except Jewel take advantage of her death in order to obtain what they want. The characters use Addies death as an incentive to look forward to her death and quickly take her to Jefferson. Anse, the prime tributary, grasps Addies death so he can go to Jefferson to get his long and awaited false teeth. At the end of the journey to Jefferson, he meets his new wife whose name is only presented as Mrs. Bundren to replace his old wife, Addie.Vardaman seems to forget about his mothers death and begins to think only about the cars in the toy store at Jefferson where he tries to get a toy train. Dewey Dell uses Addies death to have a chance to go to the pharmacies at the end of the journey to get an abortion with Lafes ten dollars. Cash seems to want new tools, while Darl just wants to get the burial over with, but his task is not finished because he is sent to an asylum. Overall, Addie uses her deat!h to her advantage, by making her family pay and make them take her to be buried in Jefferson, while the other characters use Addies death to attain what they want. Addie is the central monstrosity against all people who surround her, which leads to the day when she dies where her surrounding community would eventually begin to take advantage of her. All the characters take advantage of Addies death even Addie herself as she gets her revenge on her whole family. The curse of Addie enchanted over her family resembles similarly to a type of hex. If Addie is more sincere and more of a motherly figure to her children, then possibly she would enjoy life, and her family would enjoy her and no pain would be inflicted. If Addie expressed her love, then many people would not dare imagine taking advantage of her, but instead, eminently respect her. Works CitedFaulkner, William. As I Lay Dying. New York: Vintage International, 1985. Wadlington, Warwick. As I Lay Dying: Stories out of Stories. New York: Twayne Publishers, 1992.

Wednesday, December 4, 2019

Extension of Anxiety and Uncertainty Management †MyAssignmenthelp

Question: Discuss about the Extension of Anxiety and Uncertainty Management. Answer: Introduction: One of the most important skills that a person can hone is communication. The capability to communicate clearly and effectively in personal and professional environment and outside ones comfort zone may appear challenging enough. However, it allows an accurate representation of the idea that a person wants to convey. There are two aspects of communication that hold true irrespective of the setting the person is in: verbal and nonverbal communication. This reflective essay will help me analyse my communication skills based on evidences I have gathered by using 5 diagnostic tools related to communication that are presented hereafter. The essay will illustrate 2 major communication issues, which will be identified from the diagnostic tool results. Moreover, this essay will also elaborate on a literature review that focuses on essential theories related to communication issues. This reflection process will help me gain practice in communication assessments and will also include an action plan that I intend to utilize in future. 5 different diagnostic tools have been used to help me analyse my communication drawbacks in different environment. The first tool I used was based on Personal Report of Intercultural Communication Apprehension (PRICA-24). This tool is based on an instrument that measures apprehensions or uneasiness associated with communication. The high reliability of the tool (0.90) helped me to obtain sub-scores related to dyadic interaction, public speaking, large and small groups (Blume, Baldwin Ryan, 2013). I measured my degree of agreement and disagreement with the 24 statements present in the tool. The second tool I used was Self Perceived Communication Competence questionnaires. It provided me information on how competent I felt in different communication contexts and among a plethora of receivers (McCroskey, 2015). A high SPCC score indicated higher competence as perceived by me. Willingness to listen was the third diagnostic tool. I responded to the 24 statements associated with the tool to analyse whether I was a good listener. Active listening is an essential prerequisite of effective communication (Goh, 2012). The scores helped me evaluate a high or low willingness to listen. The fourth tool used was Talkaholic scale. It measured the degree to which I over communicated in a compulsive and consistent manner. Scores aboe two standard deviations helped in measuring whether I was talkaholic. The last tool used was Non-verbal immediacy scale self report that described my behaviour to express positive feelings towards other person. The Self-Perceived Communication Competence scores of 88.75 for friends showed that I feel most comfortable in a one-to-one interaction with friends. Moderate score of 76.66 for groups and a 63.33 for public demonstrated my uncomfortable feelings while communication in large groups or in public. The 43 score of talkaholic scale showed that I was a compulsive communicator and could not control my talking most of the time. Personal Report of Intercultural Communication Apprehension score of 40 verified that I had moderate levels of intercultural communication apprehensions. The score 78 for non-verbal immediacy was low. Willingness to Listen showed a score of 93 indicating a high willingness to listen. I realized that there was a need to improve my non-verbal immediacy and talkaholic nature for effective communication. I always continue to communicate my ideas and opinions even when I know it is not in my best interest. This often leads me to trouble in situations where I should have kept quite. My peers and friends often become impatient and irritant due to this behavior of mine. This often acts as a major communication barrier and leads to misinterpretation of thoughts. My lack of non-verbal immediacy was reinforced by the fact that I always felt hesitant to express closeness, warmth or positive feelings while communicating with another person. I often fail to keep cultural differences in mind and use verbal signals that are often considered inappropriate. I would like to reflect on an incident that occurred a month ago, that helped me realize my shortcomings when it comes to non-verbal immediacy. I wanted to reach out to my friend who was distressed and upset over some family matters. My friend wanted emotional support as he trusted me and perceived me competent enough to respond to her worries with a caring attitude. When my friend started narrating the problems that she faced at home, he became emotional and started to cry. He was expecting some empathy or attentiveness on my part. I was should have given my friend a hug or a pat on the shoulder to provide comfort. I failed to respond accordingly. I leaned forward and tried to show attentiveness. However, I avoided eye contact when my friend cried, turned my face away and refrained from showing empathy through my facial expressions. My friend would have felt better had I held his hand to show my support. Failure to reduce his distress made the situation worse and created a sense of embarrassment. The second event was related to my talkaholic nature. The end of a typical day at my workplace usually involved all colleagues sharing their experiences of the day and what they intended to do on reaching home. Usually my peers say a few words about their daily experience and move on. However, when it comes to my turn, I continue sharing my opinion on my experience at the office, my views on religion, politics, family and friends. This often irritated my colleagues and it decreased productivity at work. The morale began to decline dramatically. This continued for several months till the day when one of my close colleagues called me up to a private meeting and discussed with me the issue. He explained that my compulsive talking was creating frustration among others. He helped me identify that when others stare out of the window, look around or fidget with their phones, I should get the cue that I need to stop talking. I was also advised by the friend to finish up fast while communicat ing or else other employees may complain to the management about my compulsive behavior. I understood that there was a need to check my level of talkativeness to advance my career. Literature review- Studies have established that compulsive talkers are self aware of their habit of talking past a point in all situations. The need to talk and communicate their thoughts become excess in such person and reaches an extreme level. The problems that others face due to compulsive talkative behaviors are most often not recognized by the compulsive talker and they do not find any damaging effects of this behavior. A twofold study was conducted to determine the negative associations that can possibly occur between the communication satisfaction of a student and the compulsive behavior of an instructor. The study also used a framework based on the Expectancy Violations Theory (Sidelinger Bolen, 2016). This was done to test the extent of negative association that was mediated by the credibility of an instructor and its effects on student satisfaction. The study linked low student satisfaction to compulsive communication on the part of instructors. Furthermore, four kinds of apprehensions in communication related to anxiety were identified by a particular study that focused on the audience involved, the context and situation of the event and the trait observed in the person suffering from it (McCroskey, 2015). Evidence from studies suggests that a person often become nervous by the fact that he will be evaluated or scrutinized by others. This leads to stage fright and the person experiences several emotional and physical changes that create a hindrance while giving a presentation (Vsl? et al., 2013). Combinations of psychological, social and cultural factors also contribute to making a person incompetent of speaking before public or groups. Studies have shown strong negative correlations between communication ability and its apprehensions in the context of public speaking (Fall et al., 2013). A particular study focused on assessing the relationship among ethnocentrism, intercultural communication apprehensive, communication satisfaction and uncertainity reduction during interactions that involved various cultures. The Uncertainity Management Theory (AUM) was proposed that predicted negative effects of ethnocentrism and intercultural communication on intercultural encounter satisfaction (Neuliep, 2012). The research utilized uncertainty reduction studies that were conducted earlier and divided participants into intracultural and intercultural dyads. Regression and correlation analysis negatively correlated intercultural communication with communication satisfaction. Intercultural communication competence and apprehensions were measured among Chinese international students in another study. The PRICA tool was used to measure the degree of apprehension among the participants. A significant relationship was obtained between Chinese intercultural communication apprehension and competence (Lin, 2012). The results revealed that age, gender or educational level don not directly influence such apprehension. However, the frequency of communicating in English language often acted as a contributing factor. Similar results were obtained by another study that investigated the variables the affected cultural adjustment of international students. The PRICA tools were used to measure individual apprehensions while interacting with people who belong to different cultures. Education levels, travel experience and language proficiency contributed to cross-cultural adjustment differences and led to apprehensions while interacting (Mustaffa Ilias, 2013). A particular study examined the relationship between learning preferences and communication apprehension in a workplace setting. The results suggested a correlation between concrete experience preference, accommodating learning style and low communication apprehension (Russ, 2012). A study examined the role of students perceptions of clarity and nonverbal immediacy of the teachers and their role on empowering learning in students. Structural equation results revealed that clarity and non verbal immediacy of teachers influenced student perceptions and improved their learning skills (Finn Schrodt, 2012). A similar study was conducted to the effects of nonverbal immediacy behavior on human-robot interaction and found significant learning gains among children who interacted with robots that exhibited more nonverbal behavior (Kennedy et al., 2015). Several studies have identified the effect of verbal communication skills in business performance and have evaluated their expressiveness, precise nature and aggressiveness (Wright et al., 2013). Most of the time, the expectations of a particular organization or industry are not met by the communication skills of its employees. Differences in cultural and educational background play a role in the business context. Nonver bal skills generally include expressing empathy or concern through facial expressions, listening carefully by leaning forward, using all forms of tough to demonstrate involvement, looking directly at the eyes of a distressed person and maintaining close distance. It was also found that an employee needs to identify the demands of the audience and make necessary changes in communication style based on ethnic and cultural preferences to gain benefits. One study conducted by Jia, Cheng Hale, (2017) demonstrated the positive implications of non-verbal communication on preventing conflicts and disagreement in workplace. Such communication skills increase the ability to interact with non-native speakers, thereby abolishing language barriers. People with such communication skills are more self-aware of the intercultural aspects in a workplace and are better able to appreciate differences between people (Cleveland-Innes Ally, 2013). Non-verbal skills involve expressing through nods or smiles. Several studies have shown that good listening forms an active part of business performance and client satisfaction (Malachowski et al., 2013). Active listening enhances the ability of the concerned individual to remember events, cope with others and garner cu stomer trust than the less proficient people (Bodie, 2013). Willingness to listen acts as a motivation and leads to better socio-economic development and increases the likelihood of higher mobility in the workplace. Research finds that less willingness to listen negatively impacts interpersonal relation and the overall wellbeing of an individual (Akdemir, 2016). Incorporation of this skill in business framework can influence a person to present personal views or speech in a skilful manner (Bodie, 2012). I have developed a 6 month action plan to overcome my communication issues. I would be maintaining a personal diary to keep track my improvements in communication skills. It will help me identify the areas where I need to emphasize more and would act as a good tool for future development. Moreover, I intend to attend an online training on verbal and nonverbal communication at TAFE Queensland to learn tones and words that will help me develop a sense of effectiveness and leadership. It will help me gain a deeper understanding of verbal and non-verbal skills that will improve personal and professional interaction. It would provide better outcomes. I will also read books to improve my verbal and non-verbal communication skills (Weger et al., 2014). I wish to enroll at a postgraduate course at the University of Queensland on Language and Intercultural Communication. This course will help me learn the various aspects of communication related to cultural backgrounds and will assist me in l earning non-verbal communication skills and politeness. I also intend to take training on Active Listening offered by Professional Development Training in Sydney, Melbourne. It will help me to develop crucial skills like attentive listening, and showing interest. It will also help me reduce my compulsive talking behavior (Figure 1). Thus, it can be concluded that the essay elaborated on 5 key communication diagnostic tools that helped me gather knowledge on my communication issues. My communication shortcomings directly affect my workplace performance and disturb interpersonal communication. By taking cues from the evidences provided by several studies, I have finally developed an action plan for improvising my communication incapabilities. References Akdemir, A. S. (2016). The Development and Validation of Willingness-to-Listen in L2 (WTL) Scale.PASAA: Journal of Language Teaching and Learning in Thailand,51, 127-154. Blume, B. D., Baldwin, T. T., Ryan, K. C. (2013). Communication apprehension: A barrier to students' leadership, adaptability, and multicultural appreciation.Academy of Management Learning Education,12(2), 158-172. Bodie, G. D. (2012). Listening as positive communication.The positive side of interpersonal communication, 109-125. Bodie, G. D. (2013). Issues in the measurement of listening.Communication Research Reports,30(1), 76-84. Byrne, M., Flood, B., Shanahan, D. (2012). A qualitative exploration of oral communication apprehension.Accounting Education,21(6), 565-581. Cleveland-Innes, M., Ally, M. (2013). Affective learning outcomes in workplace training: A test of synchronous vs. asynchronous online learning environments.Canadian Journal of University Continuing Education,30(1). Fall, L. T., Kelly, S., MacDonald, P., Primm, C., Holmes, W. (2013). Intercultural communication apprehension and emotional intelligence in higher education: Preparing business students for career success.Business Communication Quarterly,76(4), 412-426. Finn, A. N., Schrodt, P. (2012). Students' perceived understanding mediates the effects of teacher clarity and nonverbal immediacy on learner empowerment.Communication Education,61(2), 111-130. Goh, E. C. (2012). Integrating mindfulness and reflection in the teaching and learning of listening skills for undergraduate social work students in Singapore.Social Work Education,31(5), 587-604. Jia, M., Cheng, J., Hale, C. L. (2017). Workplace Emotion and Communication: Supervisor Nonverbal Immediacy, Employees Emotion Experience, and Their Communication Motives.Management Communication Quarterly,31(1), 69-87. Kennedy, J., Baxter, P., Senft, E., Belpaeme, T. (2015, October). Higher nonverbal immediacy leads to greater learning gains in child-robot tutoring interactions. InInternational conference on social robotics(pp. 327-336). Springer, Cham. Lin, Y. (2012).Chinese International Students' Intercultural Communication Competence and Intercultural Communication Apprehension in the USA(Doctoral dissertation, East Tennessee State University). Malachowski, C. C., Martin, M. M., Vallade, J. I. (2013). An examination of students' adaptation, aggression, and apprehension traits with their instructional feedback orientations.Communication Education,62(2), 127-147. Mustaffa, C. S., Ilias, M. (2013). Relationship between Students Adjustment Factors and Cross Cultural Adjustment: A Survey at the Northern University of Malaysia.Intercultural communication studies,22(1). Neuliep, J. W. (2012). The relationship among intercultural communication apprehension, ethnocentrism, uncertainty reduction, and communication satisfaction during initial intercultural interaction: An extension of anxiety and uncertainty management (AUM) theory.Journal of Intercultural Communication Research,41(1), 1-16. Russ, T. L. (2012). The relationship between communication apprehension and learning preferences in an organizational setting.The Journal of Business Communication (1973),49(4), 312-331. Sidelinger, R. J., Bolen, D. M. (2016). Instructor Credibility as a Mediator of Instructors Compulsive Communication and Student Communication Satisfaction in the College Classroom.Communication Research Reports,33(1), 24-31. Vsl?, A., Cristea, I. A., T?tar, A. S., David, D. (2013). Core beliefs, automatic thoughts and response expectancies in predicting public speaking anxiety.Personality and Individual Differences,55(7), 856-859. Weger Jr, H., Castle Bell, G., Minei, E. M., Robinson, M. C. (2014). The relative effectiveness of active listening in initial interactions.International Journal of Listening,28(1), 13-31. Wright, K. B., Rosenberg, J., Egbert, N., Ploeger, N. A., Bernard, D. R., King, S. (2013). Communication competence, social support, and depression among college students: a model of facebook and face-to-face support network influence.Journal of Health Communication,18(1), 41-57.

Thursday, November 28, 2019

Invasive Species

Abstract Some pests and weeds are considered by the Australian government to be of national significance. Most of these species were introduced from other countries and continents. Red fox (Vulpes vulpes) and the Alligator Weed (Alternanthera Philoxeroides) are some of the invasive species which threaten the ecology and several sectors of the Australian economy.Advertising We will write a custom report sample on Invasive Species specifically for you for only $16.05 $11/page Learn More This document discusses why and how these species were introduced in Australia, factors which ensured their successful establishment in the country, as well as, their ecological and economic impacts. Finally, it examines the advantages and disadvantages of the control methods used to manage them. Introduction Numerous invasive species have been introduced in Australia over the years. These species are considered pests and have become a serious threat to biodiversity as well as agriculture in the country. Generally, pests have a direct effect on the environment/ecosystem as well as on human life wherever they exist. Their rate of reproduction is high making it difficult to control them. Most of them were introduced either deliberately or by accident, including some brought in to assist with the control of other nuisance species. Among the animal pests in Australia is red fox (Vulpes vulpes) also known as the European red fox was introduced in Australia in 1855 from Europe (Department of Sustainability, Environment, Water and Communities 2010). Since its introduction in Australia, it has spread across most parts of the country, although it is no longer found in the tropical north as well as some off-shore islands (Tasmanian Department of Primary industries, Parks, Water and Environment, 2010). Vulpes vulpes is classified as a serious invader to native animals as it kills them. On the other hand, one of the weed species which has invaded the ecological s ystem of Australia is the Alligator Weed (Alternanthera Philoxeroides). It was also introduced from Parana River region, South America (Everitt, Little Lonard, 2007, 55).Advertising Looking for report on biology? Let's see if we can help you! Get your first paper with 15% OFF Learn More They have spread in Queensland, Victoria, Western Australia, New South Wales, Northern Territory, Tasmania and South Australia. According to Bonila and Gunasekera (2001, 17) Alternanthera Philoxeroides is among the top 20 weeds posing serious threats and therefore causes significant concern in Australia. How and why the species were introduced in Australia According to Cuthbertson and Parsons (1992, 155) Alternanthera Philoxeroides was first introduced in Newcastle, New South Wales from South America and has since spread to all states in Australia. It has viable seed which aids its dispersal. As a result it spread from South America through pieces of mud which it used to attach itself to ships which sailed from South America. It was first introduced in this region during in 1946 when ship ballast was abandoned near New Castle (Cuthbertson and Parsons 1992, 155). According to the Rural Industries Research and Development Corporation (2011) Alternanthera Philoxeroides was introduced to Newcastle, New South Wales as a culinary herb. Red fox which has also greatly contributed to serious breakdown of Australian ecology was first introduced in the country from 1855 (Cowan Tyndale-Biscoe 1997, 31). They were first released in Melbourne, Victoria. They were deliberately introduced to the country for recreational hunting. European red fox was hunted by humans beginning 1865. Hunting had started back in 1839 in Australia as people sought after kangaroos, rabbits and dingoes. Factors which contributed to their successful establishment The weed has the ability to survive in terrestrial, Aquatic as well as semi-aquatic habitats in temperate, tropical plus in sub-tropical reg ions. All the regions in Australia where the weed has spread all have the characteristics of these climatic regions. The existence of rivers, wetlands and river tributaries provided the optimum condition for their survival. Red fox can survive in various habitats which include alpine, urban, as well as, arid areas (Pearson Pyres 1998, 87). It can also live in lightly wooded regions, and grasslands. Australia has wooded areas which are found in the country’s agricultural landscapes. This offers a wide range of food and shelter for the fox. The fox can also survive in a cleared farming land which has some livestock such as lambs which it can prey on.Advertising We will write a custom report sample on Invasive Species specifically for you for only $16.05 $11/page Learn More Besides, the fox can eat almost anything including small animals, insects and fruit (Larivià ¨re Pasitschniak-Arts 1996, 6). In each environment, red fox is at the apex of the food chain. This enables it to survive even when its preferred prey, small animals, is less available during the summer seasons. Australia has all types climates which the fox can survive in, and due to this, red fox has established itself firmly across the country. On the contrary, native animals of Australia have not yet evolved to protect themselves against the fox because of the circumstances in which red fox was introduced. The fox was introduced so suddenly that the native animals were killed to feed the young foxes. This helped sustain the population of the red fox, which has since become the head of the food chain. Ecological effects Red foxes have had several long-term effects on the Australian environment. One major effect is the decline of biodiversity. Predation by red fox has contributed significantly to the decline of native species in the country and still continues to undermine the efforts of the Australian community to conserve the threatened species which includes the night parrot, malleefowl, as well as, the bridled nail-tail wallaby. The fox has greatly contributed to the reduction in populations of ground-nesting birds, reptiles like the green turtle, as well as, small-to-medium sized mammals like the greater bilby. The fox often loots loggerhead turtle nets. Furthermore, it eats eggs in nests found on the beach. Loggerhead turtles are protected at Mon Repos Conservation Park in Queensland since they are endangered. If these foxes are allowed to continue to breeding, as well as remain among the wild animals for much longer period, the fragile ecology of Australia will be destroyed. This means that it will be difficult to recover this unique environment. In addition, they are carriers of rabies. The spread of rabies could destroy the fragile Australian ecosystem. The disease affects both human beings and animals. Thus eradicating it would be very difficult.Advertising Looking for report on biology? Let's see if we can help you! Get your first paper with 15% OFF Learn More Red foxes normally eat berries in summer seasons when their favourable food resources are not available. In addition, the fox competes alongside native predators which include eagles. In the past, the fox has competed against Tasmania Devils which were once abundant across the mainland; however, it is now found in Tasmania only. Others included Tasmania Tiger, Thylacine, and Tasmania Wolf which are now extinct in the country. Even though the red fox endangers the existence of many native animals, it is itself endangered by some animals. These animals include the Western Quoll, Red-Tailed Phascogale, Numbat, as well as, Brush-Tailed Bettong which are majorly found in South-Western Australia. These animals are poisonous to the red fox since they eat Gastrolobium, as well as, Oxylobium plants, which are poisonous to animals especially the red fox (Cowan Tyndale-Biscoe 1997, 31). These plant species have flouroacetate which is the chemical used to make the poison baits used in 1080 (Co wan Tyndale-Biscoe 1997, 31). On the contrary, these animals considered to be dangerous to the fox have developed immunity to the chemical, and therefore they store the poison in their flesh. When the red fox eats the animal, it dies. Alligator weed disrupts the aquatic environment by covering the surface and therefore hindering penetration of light into the water or soil (Groves, Richardson Shepard 1995, 07). This adversely distresses aquatic fauna as well as flora. Economic impacts Economic Impacts Alligator weed has impacts on several sectors of the economy. The plant has increased the would-be costs to irrigation farming (Groves, Richardson Shepard 1995, 10). It is expected that should the alligator weed not be controlled, then, the Barren Box Swamp infestation will cost about $250 million annually (Department of Sustainability, Environment, Water and Communities 2010). It is also threatening the sustainability of the turf industry in the Sydney Basin. The vegetable industry in the Hawkesbury-Nepan region is also threatened; the industry is estimated to be worth $150 million a year (Department of Sustainability, Environment, Water and Communities 2010). Other than the vegetable industry, there is the extraction industry in the same region, which also under threat. Should these resources be contaminated with the alligator weed, then the resources will have to be restricted. Moreover, it also threatens soy bean as well as sugar cane industries in the Richmond region (Groves, Richardson Shepard 1995, 11). Alligator weed also interferes with livestock farming. The plant contaminates grazing pastures and causes cancerous lesions in cattle. At some point, they become so dense that they deny livestock access to drinking water. This also implies that it limits access to, as well as, use of water. It can also block and damage pumps. In Warragamba Dam in Sydney, the weed causes sedimentation and therefore its major water supply, as well as, storage system (Depar tment of Sustainability, Environment, Water and Communities 2010). It obstructs stream flow of water and as a result leads to sedimentation. This contributes to flooding of the region, and structural damage to infrastructure. Red foxes have significant impacts on the Australian economy. It threatens the existence of native species as well as ecological communities. This impacts on the national heritage as it reduces species population (wildlife resources) in the country. The night parrot, malleefowl, as well as, the bridled nail-tail wallaby are some of the species which have been identified as threatened by red fox (Department of Sustainability, Environment, Water and Communities 2010). Red fox also causes losses to farmers especially those who keep livestock. The fox preys on the kid goats, poultry, as well as, newborn lambs. Moreover, they can also pass rabies on to livestock as well as native mammals. This costs the Australia economy millions of dollars per year since they kill livestock as well as by being a pest to farmers. Advantages of the methods used to control red fox Among the methods the government and the Australian community has employed is the prevention of the spread of red foxes to new regions which includes islands. Protection of the islands has been major priority in controlling red fox population. Islands have often been used as refugee habitats for species which are not available on the mainland any more. This has been effective in eradicating red fox from high-conservation-value islands. Adoption of poison baits on fences has also been successful in reducing the population of red foxes. This has been applied in south-west Western Australia and Eastern Australia. It has enabled native mammals to start to recover, and as a result, return to their former habitats. This method has also reduced the pressure on native species threatened by the red fox. It helps promote the maintenance, as well as, recovery of native animals together with the e cological communities which have been affected by red fox predation. Demerits of the methods used to control red fox Although the Australian community has adopted payment of bounties to encourage people to remove red foxes from among the wild animals, reduction of damages from the fox has not been effective (Tasmanian Department of Primary industries, Parks, Water and Environment, 2010). Again, hunting has not been able to achieve significant or long-term impact red fox population as well as the damage they cause. The application of poison baits in controlling red fox could have effects on other animals which are the target for elimination. Poison baits may also have similar effects on other animals, and therefore lead to their decline in areas where they are used. Besides, poison baits are very expensive and requires much resources to maintain them indefinitely. In south-west Western Australia, a large scale 1080-poison baits is used to control red fox. Advantages of the methods us ed to control alligator weed There are several methods which have been applied in Australia to control alligator weed. These control methods include physical, chemical and biological controls, and through legislation. Physical control method which involves the manual digging and burying of the alligator weed after having applied herbicides which kills any above-underground plant growth. This ensures immediate eradication of the alligator plant (NSW Department of Primary Industries 2008). It has successfully reduced floating mats which grow in Georges River as well as parts of Hawkesbury-Nepean region. Disadvantages of the methods used to control alligator weed One of the methods which have been applied in managing alligator weed is the adoption of alternative vegetable as part of the eradication program. The most notable alternative vegetable that has been adopted is the lesser joy weed which is scientifically known as Alternanthera denticulata (Bonila and Gunasekera 2001, 19). Howe ver, this does not help eliminate alligator weed as most of it grows wildly. Wetlands and river habitat where the weed grows is not affected by this program. Chemical control method applied in Australia is not effective as it takes long to eradicate the weed. Alligator weed can tolerate most herbicides. This means that application of these herbicides may only suppress the weed. Consequently, this method may take as a long as 6 years to completely eradicate the weed since in some cases, the herbicides are applied annually. Again, since the alligator weed is tolerant to most of these herbicides (NSW Department of Primary Industries 2008), it implies that large quantities are used in process. This can be dangerous to other plant species and could lead to their death. This means that chemical control method may lead to further loss of biodiversity. Application of chemicals could also lead to the death of soil micro-organisms which play key role in breaking and enriching the soil. Physic al control on the other hand, cannot be adopted in large and extensive alligator coverage areas. It is difficult to carry out deep manual digging for burying the weed that covers a wide area. Besides, applying herbicides to prevent above-underground plant growth could affect many plant and animal species which were not intended. Conclusion Red fox and alligator weed are among the invasive species which are of great significance to Australia. Both of them cause great damage to the environment, which in turn affects the country’s economy. If they are not carefully controlled, then they may cause reduction of population of various species and even lead to their extinction. Thus, it is important to devise better and more environmentally friendly ways of managing them and their impacts. This means that more research has to be done to enable the Australian community understand their impacts and develop more advanced ways of controlling their population and impacts on the ecology, o ther species and human life. It is also important to understand that these species also play vital roles in the ecosystem, and therefore the control measures adopted should not aim at eliminating them, but also protecting them. Finally, the local community should be involved in controlling these pests and weeds in order to achieve sustainable environmental management. Reference List Bonila, J., Gunasekera, L., 2001, Alligator weed: Tasty vegetable in Australian backyard. Journal of Aquatic Plant Management, 39: 17-20. Burgman, M., Lindenmayer, D., 1998, Conservation biology for the Australian Environment. Sydney: Surrey Beatty Sons. p. 83. Cowan, P. E., Tyndale-Biscoe, C. H., 1997, Reproduction, fertility development: Australia and New Zealand mammal species considered to be pests or problems. CSIRO, 9: 27-35. Cuthbertson, E., Parsons W., 1992, Noxious weeds of Australia. Plant Protection Quartely, 3: 154–157. Department of Sustainability, Environment, Water and Communi ties, 2010, European red fox (vulpes vulpes). Canberra ACT: Commonwealth of Australia. Everitt, J. H., Little, C. R., Lonard, R. L., 2007, Weeds in South Texas and Northern Mexico. Lubbock: Texas Tech University Press. pp. 55. Groves, R., Richardson, R., Shepard, R. 1995, Biology of Australian weeds, Vol. 1. Taipei City: Kluwer Academic Publishers. pp. 1–12. Larivià ¨re, S., Pasitschniak-Arts, M., 1996, Vulpes vulpes. Mamallian Species, 537: pp. 1-11. National Land Water Resources Audit, 2008, Assessing invasive animals in Australia 2008, NLWRA, Canberra./SEWPaC (2010). Web. NSW Department of Primary Industries, 2008, Alligator weed control manual: Eradication and suppression of alligator weed in Australia. Orange: NSW Department of Primary Industries. Pearson, J., Pyres, G., 1998, Ecosystem of Australia: Deserts. Port Melbourne: Heinemann Library. p. 87. Tasmanian Department of Primary industries, Parks, Water and Environment, 2010, Locations of fox activity inTasmania . Web. This report on Invasive Species was written and submitted by user Kamille Riley to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, November 24, 2019

Present Perfect Tense in Spanish

Present Perfect Tense in Spanish Despite its name, the present perfect tense in Spanish (and English as well) is used to refer to events that happened in the past. Its use in Spanish can be tricky, however, because its usage varies with region and it sometimes is used in slightly different ways than it is in English. In Spanish, the present perfect tense is formed by the present tense of haber followed by the past participle. (In English its the present tense of to have followed by the past participle.) It generally indicates that an action has been completed that has some bearing on the present. Forms of Present Perfect Tense Here are the forms in which the present perfect would be stated. Pronouns are included here for clarity but often arent necessary: yo he past participle (I have ...)tà º has past participle (you have ...)usted/à ©l/ella ha past participle (you have, he/she has ...)nosotros/nosotras hemos past participle (we have ...)vosotros/vosotras habà ©is past participle (you have ...)ustedes/ellos/ellas han past participle (you have, they have ...) Note that while in English, as in some of the examples above, it is possible to separate the have from the past participle, in Spanish you normally dont separate  haber  from participles. However, if haber applies to two participles, the second haber can be omitted, as in the second sample sentence below. Sample Sentences Here are some examples of sentences using the present perfect tense along with the way theyd most commonly be translated: Me he comprado una esponja rosa. (I have bought a pink sponge.) ¡Es lo mejor que he visto y escuchado en mi vida! (Its the best thing I have seen and heard in my life!) ¿Alguna vez has hablado con las ranas a medianoche? (Have you talked with the frogs at midnight?)Todos lo hemos pensado. (All of us have thought it.)Minerva ha conocido ya a los padres de su novio. (Minerva has already met her boyfriends parents.)Siempre he anhelado tener un metabolismo con el cual pueda comer lo que quiera. (I have always wanted to have a metabolism that would let me eat whatever I want.)Hay videojuegos que han hecho historia. (There are video games that have made history.)He leà ­do y acepto la polà ­tica de privacidad. (I have read and I accept the privacy policy.) Subjunctive Use The subjunctive present perfect functions in much the same way: Mi amiga niega que su madre haya comprado un regalo para el perro. (My friend denies that her mother has bought a gift for the dog.)Titular: 14 piscinas que no se parecen a nada que hayas visto antes. (Headline: 14 swimming pools that dont seem like anything you have seen before.)Es probable que hayan escondido micrà ³fonos en la casa y està ©n escuchando nuestras conversaciones. (It is likely that they have hidden microphones in the house and are listening to our conversations.)El la eleccià ³n ms sucia que hayamos conocido en los à ºltimos tiempos. (It is the dirtiest election that we have known in recent times.) Present Perfect With Meaning of the Preterite You should be aware, however, that the Spanish present perfect tense should not always be thought of as the equivalent of the English present perfect tense. In many regions, it can be used as the equivalent of the English simple past tense. Sometimes the context will make this clear: Ha llegado hace un rato. (She arrived a little bit ago.)Cuando lo he visto no he podido creerlo. (When I saw it I couldnt believe it.)Leo la carta que me han escrito esta maà ±ana. (I am reading the letter they wrote to me this morning.)Esta maà ±ana he estado en Madrid. (This morning I was in Madrid.) But even where the context doesnt dictate so, the present perfect can be the equivalent of the English preterite, also known as the simple past. This is especially true for events that occurred very recently. Youre also more likely to hear the present perfect used in this way in Spain than in most of Latin America, where the preterite may be preferred (e.g., llegà ³ hace un rato). Key Takeaways The present perfect tense is formed by following the present tense of haber with a past participle.No words should intervene between haber and the participle.The Spanish present perfect sometimes is used to indicate than an action recently took place rather than merely that it has occurred.

Thursday, November 21, 2019

Homework3 Assignment Example | Topics and Well Written Essays - 500 words

Homework3 - Assignment Example The two factors or characteristic of power are highly conspicuous in the film. James sharper uses his political position (power) to influence people’s way of thinking. Ideally, the character influences people’s thinking and decisions through voting and rigging of elections. According to the film, Sharpe has been in office for four consecutive terms. His political success can be traced back to a network of corrupt city workers who protects his interests in Newark streets. Ideally, Sharpe threatened city workers with demotions and false accusations. In addition, traders who did not concur with his political ambitions were either accused of being terrorists or criminals. Consequently, their businesses were denied mayor’s protection and, hence subjected to sabotage. Although power is instrumental in social development, power can be applied in a negative sense, as depicted in the film. James Sharpe uses power for his own interests without considering people’s n eeds. Power gives authority to leaders and, therefore essential in leadership. However, power does not determine the quality of a leader. If it did then Sharpe would have been a better leader than his opponent was. Although the film does not reveal most of Booker leadership qualities, he seems a credible leader. His profile and academic qualifications makes him an outstanding leader compared to his political rival. Power is exercised through influence. In this context, leaders can also influenced by the very power they owe the people. It is unclear whether Booker can sustain his credibility if elected the mayor of the city. The first election illustrates the relationship between power and leadership. Ideally, candidates who had most power won the elections. Although James and Booker were both African-Americans, James had more political power than Booker did. Despite Booker having the best manifestos and visions for Newark and NJ, James had better chances of

Wednesday, November 20, 2019

Credit Cards - Phase 2 - ip Essay Example | Topics and Well Written Essays - 500 words

Credit Cards - Phase 2 - ip - Essay Example While we know that you have now become a responsible adult, I would nevertheless, like to tell you something about the most crucial factor of one’s life. The management of money, especially the use of credit card is an important aspect of life and becomes all the more critical for the freshman because they not only need to know the advantages of the credit cards but also the pitfalls of its mismanagement. This is the one type of paper currency that gives you instant access to goods and services without actually having it in hard cash so it is easy to forget the value of money. Judicious use of money and credit cards shows responsible behavior and inculcates habits that would never let you fail in life. As you know, the credit cards have great advantages. One of the most important is that it helps you to meet emergency situations with ease and confidence. You do not have to carry large amount of cash while on traveling or shopping. They make it easy to buy goods and protect your purchases in case of theft or loss thus considerably increasing your purchasing power. Sometimes, credit card purchases may also give additional benefits of extra discounts. But the most important advantage of credit card is that they help you to establish credibility in the market which you would be a huge help when you require money for important matters of your life. Good credit card credibility is a great asset for securing loans from financial institutes, facilitates rental application and sometimes even jobs. You can acquire good credit history by making prompt payments of all your bills without resorting to part or installment based scheme of payment schedules. The biggest pitfall of credit cards is that it gives you indiscriminate power of spending and encourages people to spend money that one does not possess! This often leads to debts that keep accruing because as a

Sunday, November 17, 2019

Church Reformation in the 16th and 17th century Research Paper

Church Reformation in the 16th and 17th century - Research Paper Example This group rejected to live the previous ways; thus believed that the Judgment Day was near. They formed new societies and much confusion in the social order. The reformation contributed to issues such as the dead of the blacks, western rupture and eroding faith of people in the catholic churches. The fall of the Roman Emperor contributed to the reformation and circulation of protestant churches. Under the Roman Emperor Christianity spread and many churches evolved. The Roman Catholic Church, which became one of the most prominent churches to the councils evolved. It organized in Trent, which is an education centre for church teachings especially in the tradition and scripture issues. Council of the Trent is a convention of cathedral councils or theological professionals whose purpose is to resolve church policy matters or practices. The councils provide teaching programs for the community priests in order to augment pastoral care. This was initiated by the Roman Catholic Church unde r Pope Paul 1112 (Becchio and Johannes 98). The council of the Tent provided teachings, reasserted traditional practices and articulated dogmatic of the Catholic Church doctrines. These doctrines include the seven sacraments, celibacy, belief of taking wine and bread during the mass services, which they translated as the body and blood of Jesus Christ. Other doctrines included worship of remnants and saints whom they referred as the Holy Virgin Mary. Others included the significant of having faith and working towards achieving salvation. Moreover, the ecumenical councils of the Roman Catholic Church made a significant reform on dogmatic issues in the 16th and 17th century. The transformation known as the catholic reformation was the restoration era for the Catholics and it began with the Council of Trent. Some scholars consider the council of Trent as being responsible for Protestant Reformation. They laid strict issues, which the protestant minster nearly disputed. Pope Paul 111 re formed the Roman Catholicism in many European areas. In the first period of the Roman Catholicism, they church accepted the 3Nicene Creed as the basis for the catholic conviction (Queen, Prothero and Shattuck 76). They set the old and New Testament canons and fixed seven sacraments. However, this dogmatic ruled out the doctrines of Martin Luther’s beliefs of faith jurisdiction. The general council established the transubstantiation of doctrines and offered Episcopal authority verdict and other doctrine issues. However, many issues that contributed to protestant reformation started disappearing, and the church began to reclaim many of its followers by the end of the 16th century. The council of the Trent focused so much on education of the clergy because of varied reasons. First, they wanted to eradicate the mistreatments of the 4Catholic cathedral such as alms treats in order to advance the superiority of bishops. This was seen essential to the Catholics because they protesta nt churches criticized their teachings. Hence, they emphasized on the importance of the church teachings and created new rules that clergies were to follow. They followed the teachings of Martin Luther and Calvin and rejected any other reformation leaders. The council of Trent played considerable roles in renewing the catholic cathedral5 of Europe

Friday, November 15, 2019

Obfuscated Data Storage For Cloud Environment

Obfuscated Data Storage For Cloud Environment Ravi Pandey, and Kamlesh Chandra Purohit Abstract. Data storage service is one of the most attractive services provided by the cloud service provider. Despite the benefits of cloud computing threat to data confidentiality, integrity and availability may stop the data owner from switching to a cloud environment. Handing over the data to a third party to store and manage may generate data security issues as owner of the data cannot deploy its own security policies in storage service provider’s premises. A storage service provider may misuse the client’s data. In a cloud environment data is stored in the service provider’s premises so there should be a mechanism which hides meaning of the data from the service provider or any other unauthorized entity. In this paper, we propose a mechanism which utilizes some existing schemes like erasure correcting code, AES, SHA256 and some new techniques to achieve data security guarantees against any unauthorized entity. Keywords: Data storage service, cloud computing, erasure correcting code, AES, SHA256. 1. Introduction Cloud computing technology, which is popular for its pay as you go model attracts enterprises and individuals to host their data in a cloud environment. Based on results from IDCs 2012 North American CloudTrack Survey â€Å"more than 30% of organizations expect that within five years, the majority of their IT capability will be delivered through public cloud services and that within three years, they will access 45.5% of IT resources through some form of cloud — public, private, or hybrid†. As Cloud Computing has advantages for both providers and users, it is developing in an amazing pace and predicted to grow and be adopted by a large amount of users in the near future [1]. Cloud storage is an important service of cloud computing, which allows data owners (owners) to move data from their local computing systems to the cloud [2]. The storage space requirement is increasing every day as rate of data generation is very high. According to IDC Digital Universe Study, June 2011, â€Å"In 2011, the amount of information created and replicated will surpass 1.8 zettabytes (1.8 trillion gigabytes), growing by a factor of nine in just five years. That’s nearly as many bits of information in the digital universe as stars in the physical universe†. Various surveys show that the issue of data security is highest among clients who wish to switch their data in the cloud. Existing encryption schemes assure security guarantee for data while traversing in the network, where data resides for very short time. In case of data stored in a cloud environment, data resides for a long time in the service provider’s storage premises, so the service provider or its any employee can attempt brute force attack to get information from the client’s stored data. In a cloud environment there can be some internal attackers like employee of service provider who can behave dishonestly. Some applications stored by other client on the same server may be malicious which try to access data of other clients. Although it becomes difficult for an external attacker to attack intended data as in cloud where data is stored is not known to attacker but they can try to attack any random data. Therefore, client expects a secure network in which client can upload data, an honest service provider and a third party auditor who can take responsibility to check integrity of data stored in cloud server. This paper is extension of our previous paper []. Here we will explain proposed scheme in more detail and we will analyze the complexity of our algorithm. 2. System Model Cloud storage auditing system consists of three entities client, cloud server and third Party auditor. Client is the owner of data to be stored in cloud. Client generates the data to be hosted in cloud and can access, modify or delete the data to be hosted. Cloud storage server stores the data and provides mechanisms to access, modifying or deleting the data. Fig. 1. Cloud data storage architecture. Storage servers are geographically distant located, data is redundantly stored in multiple servers for security reasons. Third party auditor is an authorised system to check integrity of data storage. Data flow in between any pair of entity happens in encrypted form. We know that system is prone to internal and external attacks; other issues like hardware failure, software bugs, networking may also impact the system. We believe that, the third party auditing scheme, proposed by many researcher with some modification can make the whole cloud storage environment more reliable and secure. 3. Design Goal In Existing scheme key problem is that data stored in cloud data storage server is in meaningful manner. Our design goal is to obfuscate data before uploading it to the cloud server. After that we utilize existing data encryption techniques and hashing algorithm for providing user authentication and ensuring data integrity. 4. Proposed Work 4.1. Data Obfuscation Algorithm Let F be the private file, which is to be uploaded in the cloud environment. (we can see file F as an array of bytes from 0 to Flength.) Select a key K, an array of 10 digits from 0 to 9 without any repetition. Initialize 10 files f0,f1,f2,f3,†¦f9., we call them file components. For each byte F[i] of file F, calculate j= i %10; For each j, look for K[j] and append F[i] byte on fK[j] component. Figure 1. Demonstration of the file F, which is to be uploaded in the cloud environment. Figure 2. Demonstration of the key K. Figure 3. Demonstration of the file component fj. 4.2. Program Code for data obfuscation algorithm Program code in python for splitting file in components. count=0 n=0 path=I:\abcd; khol = open(path,rb) clone1=open(I:\115,wb) clone2=open(I:\116,wb) clone3=open(I:\117,wb) clone4=open(I:\120,wb) clone5=open(I:\121,wb) clone6=open(I:\123,wb) clone7=open(I:\124,wb) clone8=open(I:\125,wb) clone9=open(I:\126,wb) myL=[clone3,clone5,clone2,clone7,clone1,clone9,clone4,clone8,clone6] byte=start while byte!=: byte = khol.read(1) n=count%9 count=count+1 if byte: if n==0: clone=myL[0] clone.write(byte) elif n==1: clone=myL[1] clone.write(byte) elif n==2: clone=myL[2] clone.write(byte) elif n==3: clone=myL[3] clone.write(byte) elif n==4: clone=myL[4] clone.write(byte) elif n==5: clone=myL[5] clone.write(byte) elif n==6: clone=myL[6] clone.write(byte) elif n==7: clone=myL[7] clone.write(byte) elif n==8: clone=myL[8] clone.write(byte) else: break khol.close() clone1.close() clone2.close() clone3.close() clone4.close() clone5.close() clone6.close() clone7.close() clone8.close() clone9.close() Program code in python for regenerating main file from components. clone1=open(I:\115,rb) clone2=open(I:\116,rb) clone3=open(I:\117,rb) clone4=open(I:\120,rb) clone5=open(I:\121,rb) clone6=open(I:\123,rb) clone7=open(I:\124,rb) clone8=open(I:\125,rb) clone9=open(I:\126,rb) recover=open(I:\abcd,wb) myL=[clone3,clone5,clone2,clone7,clone1,clone9,clone4,clone8,clone6] byte=start while byte!=: if byte: for x in myL: byte=x.read(1) recover.write(byte) else: break clone1.close() clone2.close() clone3.close() clone4.close() clone5.close() clone6.close() clone7.close() clone8.close() clone9.close() recover.close() 4.3. Erasure Correcting Code After division of File F in 10 components, we use erasure correcting code [] to achieve data availability against byzantine failure. Erasure coding (EC) is a method of data protection in which data is broken into fragments, expanded and encoded withredundantdata pieces and stored across a set of different locations or storage media. Erasure coding creates a mathematicalfunctionto describe asetof numbers so they can be checked for accuracy and recovered if one is lost. Referred to aspolynomial interpolationor oversampling, this is the key concept behind erasure codes. In mathematical terms, the protection offered by erasure coding can be represented in simple form by the following equation: n = k + m. The variable â€Å"k† is the original amount of data or symbols. The variable â€Å"m† stands for the extra or redundant symbols that are added to provide protection from failures. The variable â€Å"n† is the total number of symbols created after the erasure coding process. For instance, in a [10:16] method six extra symbols (m) would be added to the 10 base symbols (k). The 16 data fragments (n) would be spread across 16 drives, nodes or geographic locations. The original file could be reconstructed from 10 verified fragments. 4.4. Component Encryption (AES) Now we can encrypt each file component with AES using 128 bit, 192 bit, or 256 bit key for encryption. 4.5. Token Generation(SHA256) We calculate hash function SHA256 for every data component H(fi)=xi. TheSHA algorithm is a cryptographic hash functionwhich produces a 64 digithash value. We use this token as a challenge token for auditing the storage server. Third party auditor keeps token value of each encrypted file component. File components are identified by a random_number generated by the client. Size of random_number depends on the requirement of the storage space by the client. 4.6. Database description After uploading files in the data storage server the client can delete the files in its local machine. Client keeps database of each file which contains file name, AES encryption password , file distribution password. Besides this for each file client keeps database for file component of that file. It contains random_number associated with each file component. Third party auditor keeps clients id, random_number associated with file components and challenge token corresponding to each component. Storage server stores client id and file component named with random_number generated by the client. 5. Third Party auditing TPA sends random_number to the cloud storage server. On receiving this random_number, cloud storage server calculates hash function of corresponding file component. Storage server encrypts this hash value with a shared key among TPA and storage server and sends encrypted hash value to TPA. TPA matches this received value with its database. If the stored hash value of a file and received hash value are same then file component is stored correctly, otherwise TPA sends alert message to the corresponding client of that file. 6. Algorithm Analysis In this section, we evaluate the complexity of the proposed scheme under the section 4.1. We took files of size 10 kb, 100 kb, 1000 kb and 10,000 kb for analyzing time complexity of the algorithm. Using time function of python we majored repeatedly the time of execution of proposed algorithm. We found that time of execution linearly (O(n)) depends on the size of file. Similarly, we majored time of execution at the time of regeneration of file from its components, and we found that time of regeneration of file is also linearly (O(n)) depends on file size. After execution of algorithm we found that total size of file components generated from the file to be uploaded is equal to the size of original file. In this way proposed scheme do not impose any extra storage burden. 7. Conclusion To ensure cloud data storage security, it is essential to hide meaning of data from all the third party entities like storage service provider and third party auditor. This is only possible when owner of data obfuscate the file to be uploaded in its own machine before uploading. The scheme which we have proposed ensures that information stored in the file cannot be interpreted by the third party auditor and storage service provider. Hence, client’s file is safe from both internal and external attackers. Utilization of existing scheme erasure correcting code ensures security against byzantine failure and use of random_number associated with file components together with secure hash algorithm allows third party auditor to audit file components without sharing any information which can help storage service provider to interpret the meaning of stored file. References Agrawal, R., Srikant, R.: Fast Algorithms for Mining Association Rules. In Proceedings of the 20th International Conference on Very Large Databases. Morgan Kaufmann, Santiago, Chile, 487-499. (1994) Garcia-Molina, H., Ullman, D. J., Widom, J.: Database Systems: The Complete Book. Prentice Hall, New Jersey, USA. (2002) Wang, X., Bettini, C., Brodsky, A., Jajoida, S.: Logical Design for Temporal Databases with Multiple Granularities. ACM Transactions on Database Systems, Vol. 22, No. 2, 115-170. (1997) Bruce, K. B., Cardelli, L., Pierce, B. C.: Comparing Object Encodings. In: Abadi, M., Ito, T. (eds.): Theoretical Aspects of Computer Software. Lecture Notes in Computer Science, Vol. 1281. Springer-Verlag, Berlin Heidelberg New York, 415–438. (1997) van Leeuwen, J. (ed.): Computer Science Today. Recent Trends and Developments. Lecture Notes in Computer Science, Vol. 1000. Springer-Verlag, Berlin Heidelberg New York (1995) Ribià ¨re, M., Charlton, P.: Ontology Overview. Motorola Labs, Paris (2002). [Online]. Available: http://www.fipa.org/docs/input/f-in-00045/f-in-00045.pdf (current October 2003)

Wednesday, November 13, 2019

Struggle between Romantic and Enlightened Thought Essay -- Enlightened

We are often presented with potential explanations or answers to current philosophical dilemmas through temporally relevant works of literature. The late eighteenth and early nineteenth century, or the Romantic Era, is characterized as a time in history in which aristocratic social and political norms of the Enlightened Era were radically questioned and investigated. For Enlightened thinkers, the idea of â€Å"being† was composed of three essential parts, the true, the beautiful, and the good. Isaac Newton’s contributions to scientific method were fascinating in the respect that they seemed to provide truths regarding quantitative matter. Yet his science failed to provide us with knowledge of all qualitative matters, such as morals and aesthetics. With Newton’s laws held in such high regard, the model of being was decomposed to simply the â€Å"true,† or scientific knowledge which is recognized and confirmed through his laws of motion, proceeding to exclud e all matters which Newton’s lens could not be pointed. It is apparent that problems would arise as a result. Qualitative matters could not be explained through Newton’s science, which created a sense of bewilderment. People began to question whether certain quantitative matters actually pertained to all aspects of life. Rousseau, whose writings contributed immensely to Romanticism, proposes a new model of â€Å"being,† which is later confirmed by Kant and Schiller. His new model strengthens the enlightened ideas of being, and allows for the application of â€Å"being† to both the quantitative and qualitative. Mary Shelley’s â€Å"Frankenstein† provides an explanation to the struggle dealing with â€Å"true being† between Enlightened and Romantic thinkers while exemplifying Romantic thought on happiness. ... ...nize the monster as more then a hideous being. Instead Walton understands the morals and ethics that lie beneath the monsters flesh, eventually appreciating his true goodness, in a similar fashion that Schiller and Kant propose. The significance of the philosophical dilemma between Enlightened and Romantic thinkers is exemplified through Mary Shelley’s Frankenstein. This symbolic literary work provides readers with insight to the problem philosophers of the time faced when dealing with the idea of true being. Through the monster, the townspeople and Walton, we are able to gain a complete understanding of the situation Rousseau, Kant, and Schiller dealt with. In the end, it is clear that in order to experience true being and beauty one must not rely solely on Newton’s scientific lens, but must also understand the quantitative matters such as morals and ethics.

Sunday, November 10, 2019

Civil War in Sierra Leone

I. IntroductionBetween 1991 and 2002, Sierra Leone was heavily damaged by a tremendously violent civil war. This civil war erupted because of the mounting dissatisfaction of the people, especially the youth that were engrossed by the rebellious Revolutionary United Front (RUF), towards the politics of the country that was set apart by its corruption, negligence and electoral violence. It took the lives of over 50,000 individuals, displaced over two million inhabitants and also heavily ruined their national economy.According to Paul Collier and Marguerite Duponchel (2010), Sierra Leone was at the lowest level of the United Nations Development Programme’s (UNDP) Human Development Index (HDI) after the civil war came to an end. The aim of this paper is to draw attention on how this civil war was carried out, the efforts made to resolve the conflict as well as the effects the war brought on its economy and civilians.Therefore, section one of this paper will examine how the resourc es of Sierra Leone contributed to the civil war. Section two will demonstrate the demographics of the parties involved in the war. Section three will focus on the repercussions that the civil war brought on Sierra Leone and the final section will show the efforts made to bring peace into Sierra Leone.II. Section one: How have Sierra Leone’s natural resources contributed to the war?Let’s begin with a background history of the political situations that mainly caused the civil war in Sierra Leone. In the years after the death of Sierra Leone’s first Prime Minister Sir Milton Margai in 1964, the politics of the country was progressively distinguished by several negative factors, such as corruption and mismanagement, that led to the weakening of the civil society resulting in the frustration of a large amount of the youth who engrossed themselves in the unruly message of the RUF. This was because of leaders, such as Albert Mergai, who used Sierra Leone for their own selfish interests rather than in the people’s interest.Mergai, unlike his brother Milton Margai, used the country for his own personal gain by even using the  military to curb multi-party elections which threatened to end his rule. When Siaka Stevens succeeded, there was continued destruction of state institutions.His rule was characterized by corruption and pet projects financed by the treasury, which eventually became bankrupt, only benefiting those closest to him. After turning Sierra Leone into a one-party state, Stevens finally stepped down in 1985. Major General Joseph Momoh received the position of Prime Minister and followed in the footsteps of Stevens by welcoming corruption resulting in complete economic disintegration.The fact that the leaders used the abundant resources of Sierra Leone for their own self-aggrandizement made the country one of the poorest countries in the world by the time the civil war took place in 1991. (Gberie, 1998)The Sierra Leone war began on March 23rd, 1991, when the student-led RUF began its revolt against the Serra Leone government, which commenced in Liberia and spread to the border regions of Kailahun and Pijehun. Several members of this insurgent group were jobless dissatisfied young men who were motivated by Charles Taylor’s rebel National Patriotic Front invasion in Liberia.With the backing of Lybia and Charles Taylor, RUF’s goal was to remove from power the government of the All People’s Congress (APC) that was run by the presidencies of Siaka Stevens and Joseph Momoh which prolonged corruption, among other things. (Humphreys and Weinstein, 2008)Several researches indicate that the presence of alluvial diamonds, found in regions such as Kono and Kenema, ushered in a civil war in many ways. Firstly, during the presidency of Stevens, the highly uneven benefits of the diamond mining frustrated everyday Sierra Leoneans.Profits from the National Diamond Mining Corporation (DIMCO) only enrich ed Stevens, government members, and influential business people that were close with Stevens. Subsequently, the government lost direct control of the diamond mining areas when DeBeers, one of the world’s leading diamond companies, ceased doing business with the Sierra Leonean government in 1984.As a result, there was illegal smuggling and trading of Sierra Leone’s diamonds with the proceeds going into the private investor’s pockets. Although the National Provisional Ruling Council (NPRC) seized power in 1992, with the goal of diminishing corruption and restoring the revenues of the diamonds  back to the state, the RUF acquired control of these abundant alluvial diamond areas to finance the purchase of weapons and ammunition obtained from countries like Liberia and Guinea. The simple availability of these diamonds was an incentive for violence. (Harsch, 2007) Although diamonds were a noteworthy commodity, other ways to fund the Sierra Leone Civil war were also present.A mixture of iron, bauxite, coffee and cocoa were in abundance in the country. There was gold mining in some areas of Sierra Leone as well as cash crop farming which were even more common through forced labor. Along with the high demand of diamonds, several of these minerals financed the fighting in Sierra Leone with exports revenues as high as USD 25 million and USD 125 million a year.Sierra Leoneans who joined the rebel group RUF also ransacked cars, livestock and money which helped them in gaining more energy and force. (Lujala, 2005)III. Section two: The demographics of the parties involved in the warWhen the RUF was first founded by Foday Sankoh, it was popular among several Sierra Leoneans because of the resentment they felt towards the corrupt Freetown elites.It had a slogan that read â€Å"No More Slaves, No more Masters. Power and Wealth to the People† that pledged free education, health care and a fair sharing of the diamond proceeds to the people. It did no t claim to fight for a particular ethnic group or district and did not support any Marxist, Socialist or Communist way of thinking. Its only goal was to remove the corrupt government from power although they provided little insight on what kind of government would follow it. (Denov, 2010) However, as time passed, the RUF developed a reputation for being a massively brutal rebel group during its ten year war.Although there is no precise data to verify the number of children that were involved in the war, it has been found that the RUF were the first to recruit children as soldiers. According to the United Nations Assistance Mission in Sierra Leone (UNAMSIL), over 10,000 children of both sexes were involved in the fighting in one way or another. They were kidnapped in their villages and towns during attacks executed by the RUF.With their allies, the African Forces Revolutionary Council (AFRC), girls and boys were organized in separate units such as the Small Boys Units (SBUs) and Smal l Girl’s Unit (SGUs) which were commanded by several officers. The difference between how girls and boys were used is that, in addition to being used as fighters, girls were also sex slaves. Younger  girls were primarily used for domestic labor, since they could not properly fight yet, and then became sex slaves as they grew older.The brutality of the war had frozen their senses, which were also damaged by drug abuse. In order to stay alive, they had to frequently become merciless. Most of these children had to either amputate or kill their loved ones to show that they were loyal. (Denov, 2010)An additional feature of the mobilization of children against their will was the â€Å"re-enlistment† of children after the disarmament process took place in 1998. Several children were re-enlisted back into the armed groups. This especially concerned children who did not have families to go back to even before the war started. Children who were let go from centers like the Int erim Care Centre, which was a center created to help displaced children, had no other place to go after demobilization.They eventually got captured by the rebels and were forced to tell them if they had any brothers or sisters that ran away. (Jow, 2004) The Sierra Leone government also followed in enlisting children under Momoh’s rule. Momoh’s government encouraged chiefs and district leaders to arrange civilians into local unofficial groups to add soldiers into the Sierra Leone Army (SLA).When Momoh fled to Guinea, the NPRC government of Valentine Strasser was mainly responsible for the highest recruitment of children into the army to boost the amount of soldiers they previously had. There was an illicit enlistment of children while the income and benefits of the deceased soldiers was stolen by senior officers for whom this war had become a money-making business. (Jow, 2004)When the war was over, many children did not return to their existing families. This was mainly because some of them were abducted so young that they did not even have any recollection of their families. Some were so afraid of being rejected by their families like others have been that they refused to go back home.Girls were especially afraid of rejection for being sex slaves to the rebels especially if they had babies from them. Rather than face shame, a number of these people ended up on the streets with significant health problems since most of them were addicted to the drugs that were initially forcibly administered by the rebels during the civil war. (Kamara, 2004)IV. Section three: Efforts made to stop the civil warIn March 1995, a few years after the war started, a military group known as  Executive Outcomes (EO) entered Sierra Leone. Its mission was to return the diamonds and mineral mines back to the government, obliterate the command centers of the RUF and to organize a program that would persuade ordinary Sierra Leoneans to encourage the Sierra Leone government. EO was a military group that hired Angolans and Namibians that were considerably skillful in operating counter attacks against the RUF.EO joined forced with the Kamajors, another paramilitary group that surfaced against RUF, and the SLA to force the RUF rebels out of the diamonds centers they firmly controlled for several years. After EO took over RUF’s centers of operation near a town called Bo, the RUF had to own up to their losses and sign the Abidjan Peace Accord. This accord, however, demanded that the EO leave the country. EO was told to leave by the Sierra Leone government even before the arrival of another peacekeeping force. (Bellows and Miguel, 2005)The AFRC, supported by members of the RUF, took power after Executive Outcomes left the country causing President Kabbah to flee to Guinea in exile. The AFRC partnered with the RUF rebels naming Foday Sankoh the deputy Chairman of the AFRC. The â€Å"Operation Pay Yourself† introduced a whole new level of violence against the innocent inhabitants who had their limbs chopped off.As a result, many were against the AFRC because their actions violated the civil rights of the people. The AFRC coup of the presiding government was also condemned by the Economic Community of West African States (ECOWAS), the United Nations and the Organization of African Unity (OAU). Diplomats were sent back to their countries, missions were cancelled, and the country’s membership in the Commonwealth was put on hold. (Olonisakin, 2008)In October 2007, the involvement of the Economic Community of West African States Monitoring Group (ECOMOG) brought the AFRC and RUF insurgents to the negotiating table. The rebels agreed to a ceasefire by signing the Conakry Peace Plan. The fighting, however, still continued. Although ECOMOG forces were able to restore the Kabbah government, they had poor training in counter-insurgency attacks from the RUF.Therefore, the rebels went to Freetown to loot neighborhoods and rape ci tizens without discrimination. This battering of citizens is known as â€Å"Operation No Living Thing†. This  led the Kabbah government consider making considerable compromises in the Lome Peace Agreement. (Wright et al., 2010)The conditions of the Lome Peace Accord, signed on July 7th, 1999, were that Sakoh would be allowed to go unpunished. He would also be appointed as Vice-president of the committee that supervised the diamond mines of the country. In return, the RUF agreed to demobilize and disarm its rebels under the custody of peace keeping forces led by ECOMOG and the United Nations.This agreement led to many Sierra Leonean protests along with other human rights activist because of the fact that Sankoh, the leader of the RUF responsible for unspeakable atrocities, got away scot-free and was also given control over Sierra Leone’s diamond mines.However, this accord was very crucial for the government to regain peace through a process known as Disarmament, Demob ilization and Reintegration (DDR). During this disarmament, demobilization and reintegration process, ex-soldiers were trained to use their skills for a peaceful line of work for six weeks. (Williams and Alfred, 1999)The United Nations Mission to Sierra Leone (UNAMSIL) also joined to disarm and implement the conditions that were set up by the Lome Peace Agreement and brought along military personnel, who increased over time, to supervise the diamond mines and the RUF who were still undermining their authority.By March 2001, the number of soldiers present through the UN was up to 17,500. In May 2000, RUF detained UNAMSIL peacekeepers to use their weapons and gain control of Freetown once again which made UNAMSIL avoid getting involved in diamond mining areas controlled by the rebels.This re-armament of the RUF by UNAMSIL called for another military involvement that was made to rescue the peacekeepers and the Sierra Leone government known as Operation Palliser. This operation, which c onsisted of British Royal Marines, helped in stabilizing the country. These marines evacuated foreign citizens out of the country and saved UNAMSIL from collapsing. The rebel forces were repelled from regions further than Freetown, under the command of General David Richards, and power was given back to the government. (Anon, 2000)As awareness spread about the diamonds of Sierra Leone, the Kimberly Process  met to assemble in Kimberly, South Africa. The United Nation took notice of the diamonds, also known as conflict diamonds, and its implications. The United States government followed, under the command of President Bill Clinton, by devising a plan to keep the conflict diamonds out of the market legally.With 49 members representing 75 countries, the Kimberly Process has made diamond industries stop exportations to Liberia, Canada and other leaders in the business. Although there are no diamond-fueled wars any longer, the Kimberly Process is still playing an important role by mai ntaining stability.It helps in developing improved trading centers that are licensed as conflict-free and provides ways to promote legal legislative structures that lead to peace treaties helping those in poverty. (Anon, 1998) V. Section four: The aftermath of the civil war on the economy and the Sierra Leonean peopleThe civil war has had devastating effects on the socio-economic order of Sierra Leone. Agriculture was greatly damaged causing high inflation of goods and unemployment. Sierra Leone’s infrastructure was also heavily destroyed. Roads were ruined and the power supply system depreciated due to lack of maintenance. The public health division was also in a terrible condition because of the looting of the hospitals and clinics during the war.The civil war caused a lot of health professionals to leave the country out of fear instigating an acute shortage of qualified staff members present in hospitals. As living standards fell to the ground, hitting the poorest even har der, many citizens moved from rural areas to the cities and towns hoping for better living conditions. However, access to health services depended on how much one could pay. Others were forced to seek refugee status in other countries while they lived in deplorable conditions moving from one area to another. (Kargbo, 2002)As years went by, several Non Governmental Agencies and the Sierra Leonean government have tracked Sierra Leone’s recovery. The country is recovering well from it civil war scars with the help of the international community and its partners. According to the data collected by the government of Sierra Leone Institutional Reform and Capacity Building (IRCBP) in 2004 and 2005, districts that experienced greater violence have had slightly better  results.To some extent, they seemed to be more politically organized then other areas that were less affected by the violence of the civil war. Voter registration was notably higher in these areas. Community meetings were also considerably elevated statistically. When an IRCBP survey asked people how the war affected their ability to work together, 60% of people declared that it had a positive impact to their society. Theoretically, these changes could have improved the public of Sierra Leone. (Mutwol, 2009)Peace remained in the country with the help of the United Nations peace missions. Four years after the war was over, in 2006, the last group of the 17,500 soldiers flew out of Freetown and left the newly trained police in charge. Nowadays, the country is advertised as a tourist attraction with the help of British travel companies. They want sophisticated and adventurous travelers, who usually visit other more established tourist destinations, to come to Sierra Leone and have cocktails by their beautiful beaches.One example is Lakka beach, which was a luxury destination before the war. It is trying to attract tourists by running several restaurants and organizing fishing excursions for Europea ns tourists. Sierra Leone’s goal is to be recognized for its chocolate coconut bars rather than by the awful civil war that occurred. (Desai, 2010)Although there has been considerable progress over the last ten years, there are still plenty of challenges that Sierra Leone must face. Most of the former child soldiers have returned to their former lives without any education or jobs. Children are still found working in the diamond mines. Work still remains in providing jobs for the massively unemployed youths, shelter for the orphans and rehabilitation for children who were forced to commit a number of crimes along with women of all ages who were also abused in many different ways.Since these women have been ostracized by members of their own community for being sex slaves, there is a need for more counseling and support services to help them get back to their communities. The predicaments of these people can also be decreased by increasing the amount of educational and profess ional training. This country also faces great challenges in restructuring its judicial institutions to fairly bring perpetrators of the war to justice. (Collier and Duponchel, 2010) VI.ConclusionThere are many misconceptions as to why the civil war in Sierra Leone occurred. What needs to be understood about the civil war is that it was not based on economic benefits acquired by the alluvial diamond mines. Although these diamonds have significantly contributed to the war, there was more than twenty years of poor governance, poverty, corruption and oppression that helped in forming the RUF as frustrations against the government increased over the years. This civil war has crippled many people for life, in one way or another.Sierra Leone is still sustaining itself through the help of donors although it is very rich in natural resources. Much work needs to be done to further improve the lives of the people in Sierra Leone who are still living in poverty. It is yet to been seen if peace will remain in the country with the amount of unemployed young people wandering in the streets. Any threat to the stability of the country should be dealt with peacefully as soon as possible.