Wednesday, October 30, 2019
How are the causes of the french revolution portrayed through the Essay
How are the causes of the french revolution portrayed through the visual arts - Essay Example Popular violence defined the French Revolution whose slogan was Liberty, Equality and Fraternity. Violent turmoil, which included the trial and execution of the king, warfare involving every major European power, vast bloodshed and repression during the Reign of Terror marked these changes. Napoleonic Wars, two separate restorations of the monarchy, and two additional revolutions are the subsequent events that one can trace to the Revolution as modern France took shape. Many causes brought about the French Revolution one major cause being the disputes between the different types of social classes in French society. The social structure of France was divided among three groups that included the First Estate, the Second Estate and the Third Estate. Each of these social groups had different types of people who presented the different views of the people within their structure. The Church or the Clergy was the First Estate, which during the ancient regime was equal in terms of its economic, social and spiritual power. Being the first estate, the church owned approximately 10 per cent of all the land in France. It paid no taxes but collected a tax on income or a tithe to support church activities such as running schools and caring for the poor. Of the entire clergy in France, about one-third of them served as parish priests who usually lived a hardworking life. They lived in luxury in Versailles, Paris and other major cities in France. Having approximat ely 1 to 2 per cent of the population, this Estate was the minority of the people in France. However, there were many poor clergymen in this Estate, and they too were going to support the Revolution. The Second Estate in French life was the nobility who made up less than 2 percent of the population and enjoyed extensive rights and privileges. Like the First Estate, they hardly paid any taxes but they taxed the peasantry. Nobles were generally the
Monday, October 28, 2019
Marine General Brute Krulak Essay Example for Free
Marine General Brute Krulak Essay In writing the book First in Fight, the legendry Marine General Brute Krulak has submitted an unparalleled assessment of the US Marines. The book gives details of the fighting on the battlefield as also a detail of the Marineââ¬â¢s life when not at war. He has skillfully blended autobiography with history, analysis with action and separated facts from legend. General Krulak has touched upon the core qualities of the Corps in narrating the implications of being a Marine and the reasons for its outstanding and consistent performance. The general has also addressed the most pertinent and challenging issues regarding the Corps. A thorough analysis has been made about how the Corps manages to survive and to prosper despite the awesome political hurdles and the adversities it has to face in a routine manner. In explaining the unique characteristics of the Corps, General Krulak has delved into the core structure on which it has been built. What emerges is a system that is intensely loyal to God, the country and to other colleagues. A close look has been taken at the war practices of the Marines whereby stimulating details of their actions and experiences have been outlined in regard to World War II and the wars in Vietnam and Korea. Additionally, he has also described the relationship that the Corps enjoys with other services by giving special reference to the battles of unification that were fought in the aftermath of World War II. New insights have been offered in regard to the processes of decision making during times of emergency. First in Fight is a book that makes for appealing reading. It covers details of General Krulackââ¬â¢s personal experiences while he was engaged in the battle for the union of the armed forces. The book also explains very effectively how the entire chain of command of the US Military is set up and managed (Victor H. Krulak, 1999). References Victor H. Krulak, First to Fight: An Inside View of the U. S. Marine Corps, 1999, US Naval Institute Press
Saturday, October 26, 2019
Ethical Software Development :: Engineering Technology Economics Essays
Ethical Software Development One of the most exciting times for an engineer is during conception and up front planning on a new project. Ideas dance in the mind of an engineer. A new project offers creative possibilities for job advancement, market success, design elegance, exploration, camaraderie and power over a problem. At first, engineers and their managers are motivated to consider the impact of new features and products. This paper explores some of the ethical landscape that the engineer may face in the creative stages of a software development project. I want to explore ethical issues seen by a Western engineer working with Western engineers and also working with Offshore engineers. What issues would the engineer face with those in China? All prejudices aside, this paper attempts to uncover ethical issues that affects the engineers and the software product. A person may naturally experience some fears when faced with the prospect of jointly developing software with engineers located in a different country. To get an idea of what may happen, we will need to look beyond the ââ¬Å"usâ⬠vs. ââ¬Å"themâ⬠barrier and see people in their own context. I took this paper as an opportunity to learn about ethics from a Chinese perspective. The intent, however, is to find what has positive ethical effects. Example Issues High Technology: Sometimes a project will be started that requires a technology breakthrough or else a high level of creativity. Stresses from not making those discoveries will often test an engineerââ¬â¢s ability to make good, ethical decisions. Software Process: The process is a required part of any discussion on software development. Software development occurs over many phases, requiring many different skills. The process is a management tool for making sure that everything gets accomplished. One issue with using a process is avoiding the tendency to over-regulate or bureaucratize the engineers and thus impact their sense of respect and positive responsibility. [[1]] Global: The engineer may worry about the potential for delivering a shoddy software product from, cutting corners, the language barrier or any unequal standards of excellence. In addition, will engineers from either country experience a dilution of their moral foundation or feel like they are merely being exploited? It should be clear that ethical issues like these can effect engineers in any country. Global issues will be presented by contrasting the individual morality in the West vs. the relational morality in China.
Thursday, October 24, 2019
Why Most Convicted Criminals are Young, Male and Working-Class :: Free Essay Writer
Why Most Convicted Criminals are Young, Male and Working-Class Official crime statistics show that young, working-class males commit most crime. The following are some reasons that I can think of to explain these generalisations. Young ===== I think young people commit crime as they are out of the age group when their parents closely supervise them. Their curfews may have been extended and parents tend to give them a bit more space, privacy and freedom. They are no longer treated as children but are denied the same rights and responsibilities as adults. This can make them feel deprived of status in society and suffer from what sociologists call status frustration. This simply means that they are frustrated their lack of independent status in society. They are also at the stage when their friends are an important part of their (social) life. They want to impress their mates as well as searching for thrills and status among the peer group. Their peer group provides them some support on things to do with school and family and therefore become of great significance. The majority of young people lack responsibilities that include having children, keeping a job and financial demands such as rent or mortgage. The lacking of responsibilities such as these as well as looking for thrills among the peers can often glide young people in the direction of deviant acts that sometimes collide with the law. They might give up these criminal careers, as they grow older due to things such as marriage, parenthood, buying and looking after a home of their own etc. Another reason for why young people engage in crime could be due to the fact that their parents and teachers can no longer control their behaviour. Some sort of breakdown of behaviour control at home and at school may have occurred. These are the only explanations I can find for why a lot of criminals are young. Their offences usually involve trivial things like shoplifting, under-age drinking and are usually peer group related.
Wednesday, October 23, 2019
The Beautiful Country
Most people who live in the country dream of someday moving to the city and living a different life. Upon weighing the options, one may find that although sometimes boring, country life has much more to offer than city life such as better opportunities, better environment, and fresher food. The first advantage the country has over the city is greater oppurtunity. Although the city is filled with opportunities such as better education. The Country offers more of hands on experience while learning.The city is highly Populated, which makes it a lot harder to have any teacher to student bonding. However, in the country, less students are in each classroom, so it is easier for the teacher and student to interact. The jobs in the city are considered to be more mental than physical, which can cause mental strain on a person's mind. Although, in the country the jobs are more physical than mental. Physical work can cause pain in the long run, but mental strain has a higher risk to cause life threatening issues.When it comes down to making friends in the city a person has a low chance. The city has enough people to make friends, but most of the people in the city are too busy to take time out of their lifr to even introduce theirselves to one another. However, the country is filled with nice, friendly people that are looking forward to making new friends daily. A better environment is a huge benefit to living in the country. Living in the city, the view is usually the same no matter where you go. The buildings in the city seem never ending.The tallness of the buildings and the graffiti that usually cover them eliminate any chance of a good view outside your window. Because the city is lit up twenty-four hours a day, the chance of catching a glimpse of the stars is also very rare. The constant sound of sirens and car horns eliminate any possibility of a good nightââ¬â¢s sleep as well. Pollution is also greater in the city than in the country. Because there are a lot mo re people in the city, there are many more cars on the road. There are also more factories for these people to work which also aids in the pollution in the city.In the country, there are hardly any tall buildings. Residents of the country can usually step outside of their home and see a long stretch of green grass. The stars are almost always shining at night and the only sounds one may here while trying to go to sleep are the crickets chirping. Pollution is a lesser issue in the country as well. There are fewer people in the country which means fewer cars on the road. Because many people have their own farmland and make money that way, the need for factories for jobs is not as great in the country.
Tuesday, October 22, 2019
Data Compression Essays - Archive Formats, Data Compression
Data Compression Essays - Archive Formats, Data Compression Data Compression subject = Information Theory title = Data Compression Data Compression- in beginners terms Data Compression just sounds complicated. Dont be afraid, compression is our good friend for many reasons. It saves hard drive space. It makes data files to handle. It also cuts those immense file download times from the Internet. Wouldnt it be nice if we could compress all files down to just a few bytes? There is a limit to how much you can compress a file. How random the file is, is the determining factor to how far it can be compressed. If the file is completely random and no pattern can be found, then the shortest representation of the file is the file it self. The actual proof that proves this is at the end of my paper. The key to compressing a file is to find some sort of exploitable pattern. Most of this paper will be explaining those patterns that are commonly used. Null suppression is the most primitive form of data compression that I could find. Basically, it says that if you have different fields that data is in (possibly a spread sheet), and any of them have only zeros in them, then the program just eliminates the data and goes straight from the empty data set to the next. Only one step up from null suppression is Run Length Encoding. Run length encoding simply tells you how many of what you have in a row. It would change a set of binary data like 0011100001} into what the computer reads as (2)zeros, (3)ones, (4)zeros, 1. As you can see, it works on the same basic idea of finding a series of 0s (null suppression) and 1s in this case too and abbreviating them. Once the whole idea of data compression caught on, more people started working on programs for it. From these people we got some new premises to work with. Substitutional encoding is a big one. It was invented jointly by two people: Abraham Lempel and Jakob Ziv. Most compression algorithms (big word meaning roughly program) using substitutional encoding start with LZ for Lempel-Ziv. LZ-77 is a really neat compression in which the program starts off just copying the source file over to the new target file, but when it recognizes a phrase of data that it has previously written, it replaces the second set of data in the target file with directions on how to get to the first occurrence of it and copy it in the directions place. This is more commonly called a sliding-window compression because the focus of the program is always sliding all around the file. LZ-78 is the compression that most people have in their homes. Some of the more common ones are ZIP, LHA, ARJ, ZOO, and GZIP. The main idea behind LZ-78 is a dictionary. Yet it works quite a bit like the LZ-77. For every phrase it comes across, it indexes the string by a number and writes it in a dictionary. When the program comes across the same string, it uses the associated number in the dictionary instead of the string. The dictionary is then written along side the compressed file to be used in decoding. There is a combined version of LZ-77 an LZ-78. It is called LZFG. It only writes to the dictionary when it finds the repeated phrase, not on every phrase. Then instead of LZFG replacing the second set of data with directions on how to get to the first occurrence of it, the program puts in the number reference for the dictionarys translation. Not only is it faster, but it compresses better because of the fact that it doesnt have as big of a dictionary attached. Statistical encoding is another one of the new compression concepts. It is an offshoot of the LZ family of compressors; It uses basically the same style as LZFG, but instead of assigning the numbers in order that the strings come out of the source file, statistical compressors do some research. It calculates the number of times each string is used and then ranks the string with the most number of uses at the top of the hash table. The string with the least is ranked at the bottom. (A hash table is where the rank is figured) The higher up a string is on this list, the smaller of a reference number it gets to minimize the total bit usage. This gives this compression just a slight edge on the others, but every little bit helps. (ha ha -bit- ) Beware! There are a
Monday, October 21, 2019
Louis XVI essays
Louis XVI essays I have chosen Louis XIV a.k.a. the *Sun King* as a good leader then opposed to the other leaders like Louis XVI or Marie Antoinette. His qualities are that he has some experience in military Might, he has great national pride, he has respect for the people of France, he has some control over France and he has the force of character. Although he has some bad qualities like that he has poor experience in economic strategy and knowledge of the country*s problems. He also has some experience in wars and learns from mistakes. His military might experience was better that the other rulers because he had some military experience and he lead his country with pride. He controlled nobles by building a palace and sending the nobles to live with him so they*re all in one place which makes keeping an eye on them a lot easier that sending spies (very wise and cunning). He saw himself as the centre of the French life/culture which also leads to him thinking that he was the nation which gave him high self esteem. The high self esteem made him no push over so he didn*t let everybody/anybody step all over him. He ruled in a serious and no-nonsense way which made him very powerful but eventually it lead to fights. He had no economic strategy but he was better than Marie Antoinette who had spent the country*s annual income for a diamond necklace which made the rest of the country suffer in poverty. She had no money left over from the scandal and could not feed a poor starving child. She also made high taxes to keep the country alive. He did not have any economic strategy but he did not make the mistake of putting himself before his people. The king tried to keep in touch with the nobles which gave him respect. He simultaneously kept in touch with the nobles and watched the nobles by building a palace and inviting nobles to live with him (more like an order). ...
Sunday, October 20, 2019
Stravinsky essays
Stravinsky essays Igor Sikorsky was born in 1889 and died in 1972. He was born in Kiev Russia. He was born in Russia but he would say that the proudest day of his life was when he became a U.S. citizen. Although he loved to make helicopters and work with aeronauctics, he had other interests such as astronomy. Among his many other talents he was a writer, he wrote a short book called "The Message of the Lords Prayer" and an autobigraphy called the "Story of the Winged S". Many people refer to Sikorsky as the " Father of the Helicopter." Sikorsky did not want to accept the fact that people were calling him the " Father of the Helicopter." The book did not explain exactly why he thought he wasn't the "Father of the Helicopter". Igor invented three helicopters for the army. They were the XR-1, the Platt-LePage ( which because of it's big size had to be put under developmental changes) and a later model the VS-300 the armys third helicopter. This third helicopter was Sikorsky's best helicopter. The army iked it because it had three two bladed ajustable rotors and it could operate at zero air speed. Each of the rotors were about 4 feet in diameter. Igor Sikorsky went to Yale University and received a doctors degree for all of his achievments. Igor was renowned as a constructor of safe and reliable aircrafts. Igor called all of his helicopters "heli". The most successful of all of his helicopters was the - Igor Sikorsky died in 1972. When he died his son Sergei said"mourn that he is gone, be grateful that he was". They say Igor Siorsky ws the most gentle, mild mannered, gracious, and courteous individual there ever was. ...
Saturday, October 19, 2019
Elements in life Essay Example | Topics and Well Written Essays - 500 words
Elements in life - Essay Example Simone Weil, Martin Luther King and Mother Teresa have common qualities that make them exemplary. The elements of self-denial, service and spiritual enlightenment can be seen in the lives of these persons. Their reputations are founded on these qualities that enabled them to be considered as living saints. Although Weil, King and Mother Teresa came from respectable and affluent families, they denied self in order to reach out to others. Simone Weil exercised ââ¬Å"detachment from material thingsâ⬠(ââ¬Å"Simone Weilâ⬠, Wikipedia). In the latter part of her life, she was still actively involved in her social projects despite her physical sufferings. Martin Luther King also sacrificed time and his own safety just to help fellow black Americans gain their rights as citizens of the United States of America (Carson, ââ¬Å"Biography of Martin Luther King Jr). Mother Teresa left home and school in exchange for the slums of India (ââ¬Å"Mother Teresa ââ¬â Biographyâ⬠, Nobelprize.org). This ability to deny self for the benefit of others is rare among people. But during those times when underprivileged people were neglected, these three persons were willing to sacrifice. Because of their self-denial, they served people with all heart, mind and soul. This kind of service arose from their inner desire to help alleviate the sufferings of their fellowmen. Weil aided the working class in the demand for their social rights, even joining a local factory just to experience the lives of these people (ââ¬Å"Simone Weilâ⬠, Wikipedia). King, in spite of the ââ¬Å"increasing resistance he encountered from political leadersâ⬠ââ¬â which could be the reason for his death - continued his objectives for the benefit of the black Americans (Carson, ââ¬Å"Biography of Martin Luther King Jr). Teresa devoted her resources for Indiaââ¬â¢s ââ¬Å"poorest of the poorâ⬠(ââ¬Å"Mother Teresa ââ¬â Biographyâ⬠, Nobelprize.org). Their labor of love resulted to fruits that other
Friday, October 18, 2019
Management- Case study Example | Topics and Well Written Essays - 3000 words
Management- - Case Study Example In 1983 Benetton had sales of $351 million, from 2600 stores in Europe. The supply chain can be described as the network, covering the various stages in the provision of products or services to customers (Monks, 1996). It includes not only manufacturers and suppliers, but also transporters, warehouses, distributors, retailers, etc. The number of stages in the supply chain depends on the customers' needs, and the role each stage plays in fulfilling their needs. Supply Chain Management (SCM) integrates procurement, operations and logistics to provide value added products or services to customers. Effective management of the supply chain helps organizations meet customer requirements on time, with the desired quality specifications, in a cost-effective manner, through the coordination of different activities which transform raw materials into final products or services ((ICMR), Operations Management, 2003). Supply Chain Management can provide both tangible and intangible benefits to an organization. Tangible benefits include revenue growth, improved facility utilization, optimized inventory management, etc. Intangible benefits include improvement in quality, improvement in customer satisfaction, and enhanced customer and supplier techniques (Dilworth, 1992). Supply Chain Management has become on of the key areas that organizations are focusing on to reduce costs and improve the efficiency of the production process (Chopra, 1992). Four key drivers of supply chain performance are inventory, transportation, facilities and information. They help determine not only the responsiveness and effectiveness, but also the strategic fit of the supply chain. Inventory - Inventory includes raw materials, work-in-progress, and finished goods in the supply chain. Inventory exists in organizations due to a mismatch between demand and supply. Inventory is also maintained to increase the responsiveness of organizations to sudden increases in customer demand. Transportation - Organizations use transportation to move components and products between the different stages of the supply chain. Transportation decisions are made on the mode of transportation and route to use in the transfer of products from one point to another. Facilities - Facilities are the locations in the supply chain where the raw materials and finished goods are stored, and where work-in-progress materials are assembled or fabricated, and from which finished goods are distributed. Facility's capacity and location has significant affect on the performance of the supply chain. Information - Sometimes, the value of information as a supply chain driver is undermined due to its abstract quality. However, in reality, it is one of the key drivers affecting the performance of the supply chain. As the supply chain is made up of various entities, proper coordination is the key to improving the efficiency of the supply chain system. The flow of information also affects the performance of other drivers. With proper information, organizations can predict the quantity to produce, when it is needed and where it is needed. This makes the supply chain more effective and responsive to market demand. In order to service the needs of customers and fulfil their expectations and to meet the organizations'
Becoming an Informed Voter-Researching your congressional Delegation Essay
Becoming an Informed Voter-Researching your congressional Delegation - Essay Example Such as the state of Michigan and its 9th congressional district. Presently, the representatives of this district, who also work for the state as a whole, include Senator Carl Levin and Congressman Gary Peters. With Senator Levin being an elected official for the previous three decades, it would affirm the role having been played by both the Senator, as well as his political party. The Democratic Party would further cement that hold, with the election in 2008 of Congressman Peters. Both men in their respective elections, would face Republican candidates as their opponents and win. Thus, showing that the citizens of Michigan seek to find reliable change and are open, at least when they feel the time is right, to find it where and with whomever they are able to. Historically speaking, the citizenry of the 9th congressional district, have been represented by both the Republican Party, as well as the Democratic Party. With the different roles to be played by Senators and Congressman, the fact that Senator Levin will have been in officer for as long as he has, would lead many to decipher that either the electorate of Michigan feel more comfortable with a Democrat as their Senator for an extended period of time. Otherwise, there hadnt been a strong Democratic contender for the congressional seat in the 9th district until Congressman Peters decided to run on the Democratic platform. After observing the general rank and file of most of Michigans elected representatives, those of whom influence what occurs in the 9th district and by extension the state as a whole, it would appear presently that the Democrats would in fact hold an edge as of late. From a standpoint of advantage, the Democrats would have their own advantage presently. Not only having Senators in power from their political fold, along with Congressman Peters, the Governors mansion and the Lt. Governors positions are both presently held by confirmed Democrats. Whether its been recent change,
Thursday, October 17, 2019
Cash vs. Accrual Accounting and Balance Sheets Essay
Cash vs. Accrual Accounting and Balance Sheets - Essay Example With the help of the cash accounting method any organization can identify its exact cash flow, provided if the company has entered each and every transaction in the account. Cash accounting method is comparatively easy to perform. Accrual basis accounting is the process where the transactions are taken into consideration once the order is made, the product is distributed, and service is provided. It does not consider the time when the amount is paid or received. In the accrual method of accounting, the expenses and the income would be recorded once the goods and the services have been received or the sale has occurred. It would not consider the payment at the same time of the transaction. This method essentially gives priority to the benefits or the facilities given or received and not the monetary transaction. Cash accounting method is more popular than any other accounting systems. Cash accounting method is easy to execute, on the other hand, accrual accounting method is more accur ate in case of making a balance sheet for any organization. At times, accrual accounting is difficult to execute, due to certain confusions in the balance sheets. In the cash accounting method it is easy to maintain the finance, as the entry is not allowed till the payment is received on the sale and vice versa. On the other hand, the accrual accounting method would increase the difficulties as the transactions might be entered before getting the payment, which might inturn raise problems for the organization. Both the accounting methods are helpful to evaluate and to analyze the company finance at the end of the financial year, with their distinct natures. Q2. The cash accounting method is easier to perform in case of small businesses. The cash accounting method does not record the transactions in the balance sheet until and unless the payment has been done for the transaction, either by the buyer or by the seller. Once an organization pays for the order placed, the transaction wou ld enter the balance sheet and at the same time if the organization receives the payment for the order placed to them, they would enter the detail of the transaction. It is an easy process, provided the company size is small. Cash accounting does not enter all the dealings at the time of the transaction, thus it would create difficulties and conflicts in case of larger sized organizations. Therefore, they imply the accrual accounting method for its better accuracy and clarity. Accrual accounting system includes all the transactions made either paid or not. This helps to know the exact cash flow of an organization. Therefore, the cash accounting is more popular in small businesses and the accrual accounting is more effective in case of the big enterprises. Assignment 2 Q1. Balance Sheet is one of the most vital and crucial aspects of financial accounting. It is the total or the summarized value of the finance of an organization at the end of the financial year. A balance sheet includ es partnership, proprietorship, assets of a company, and liabilities of a company and the equity of the owner among others. The date on the balance sheet after every financial year is different in case of different companies. If in any case a company does not have their balance sheet, for example Microsoft, it would be very difficult to know the transactions made by the company, whether the company has faced loss or profit, what are the liabilities and the assets of
My scheme of my school at full time Essay Example | Topics and Well Written Essays - 250 words
My scheme of my school at full time - Essay Example Normally, there is merely moderate to seldom regard for the impact which drastic technological changes create on the environment and overall welfare of men. On this ground, human nature serves as the evil root or mother of man-made creations. By examining in depth and detail how manââ¬â¢s inventions have fared insofar as the past and some current events are concerned, it would quite fall under keen investigation that the evil of greed, pride, envy, discontent, and their other similar natures, has greatly caused hostile wars as in the World War I and II. Apparently, while nuclear inventions exhibit the height of manââ¬â¢s intelligence and potentials, it is inevitable to realize that due to the evil of greed in acquiring more territories, men are further disposed to make tools of destruction in order to expand the scope of corrupt power. Similarly, the wicked side of technological innovations may be observed to have brought about strife in the criminal act of theft and robbery via online systems in particular whenever one party harbours envy over someone elseââ¬â¢s market that this leads to stealing of identity. In addition, people tend to be too proud and conceited with their possession of gadgets that they becom e neglectful of the essence of humility generous sharing with
Wednesday, October 16, 2019
Cash vs. Accrual Accounting and Balance Sheets Essay
Cash vs. Accrual Accounting and Balance Sheets - Essay Example With the help of the cash accounting method any organization can identify its exact cash flow, provided if the company has entered each and every transaction in the account. Cash accounting method is comparatively easy to perform. Accrual basis accounting is the process where the transactions are taken into consideration once the order is made, the product is distributed, and service is provided. It does not consider the time when the amount is paid or received. In the accrual method of accounting, the expenses and the income would be recorded once the goods and the services have been received or the sale has occurred. It would not consider the payment at the same time of the transaction. This method essentially gives priority to the benefits or the facilities given or received and not the monetary transaction. Cash accounting method is more popular than any other accounting systems. Cash accounting method is easy to execute, on the other hand, accrual accounting method is more accur ate in case of making a balance sheet for any organization. At times, accrual accounting is difficult to execute, due to certain confusions in the balance sheets. In the cash accounting method it is easy to maintain the finance, as the entry is not allowed till the payment is received on the sale and vice versa. On the other hand, the accrual accounting method would increase the difficulties as the transactions might be entered before getting the payment, which might inturn raise problems for the organization. Both the accounting methods are helpful to evaluate and to analyze the company finance at the end of the financial year, with their distinct natures. Q2. The cash accounting method is easier to perform in case of small businesses. The cash accounting method does not record the transactions in the balance sheet until and unless the payment has been done for the transaction, either by the buyer or by the seller. Once an organization pays for the order placed, the transaction wou ld enter the balance sheet and at the same time if the organization receives the payment for the order placed to them, they would enter the detail of the transaction. It is an easy process, provided the company size is small. Cash accounting does not enter all the dealings at the time of the transaction, thus it would create difficulties and conflicts in case of larger sized organizations. Therefore, they imply the accrual accounting method for its better accuracy and clarity. Accrual accounting system includes all the transactions made either paid or not. This helps to know the exact cash flow of an organization. Therefore, the cash accounting is more popular in small businesses and the accrual accounting is more effective in case of the big enterprises. Assignment 2 Q1. Balance Sheet is one of the most vital and crucial aspects of financial accounting. It is the total or the summarized value of the finance of an organization at the end of the financial year. A balance sheet includ es partnership, proprietorship, assets of a company, and liabilities of a company and the equity of the owner among others. The date on the balance sheet after every financial year is different in case of different companies. If in any case a company does not have their balance sheet, for example Microsoft, it would be very difficult to know the transactions made by the company, whether the company has faced loss or profit, what are the liabilities and the assets of
Tuesday, October 15, 2019
MKTG Essay Example | Topics and Well Written Essays - 500 words - 10
MKTG - Essay Example This association is based in the United States but not only does it have members in this country, but it also has members in another forty eight countries and many of these are some of the largest companies and nonprofit organizations in the world. Direct Marketing Associationââ¬â¢s work is not only done at a local level, its marketing campaigns are also done at a regional, national, and international level and this is one of the reasons that this association is one of the most successful of its kind worldwide. The professionalism of its staff enables it to compete effectively against other associations and in fact, it gives it an edge over them. The level of its competitor associations in the marketing business just helps to show the top quality of work that is done at Direct Marketing. This is an association, which any competent organization in the world would aspire to join; this is because it would be a guarantee of its success in the present and the future. Marketing Pilgrim was established as a site where marketing professionals could be able to find jobs that they wanted in marketing companies. This site has over the years since its founding became one of the most popular marketing job boards online. Because it is a leading site in marketing, this is where most companies and other institutions go to when they need to acquire people in marketing and academics in the same field. The Marketing Pilgrim site ensures that its clients stay up to date with the current marketing knowledge, training, and tools, which not only enable them to succeed in their careers, but also helps them obtain information of value and worthwhile connections. This site continuously innovates and develops according to the changes in the marketing scene in the world and it does this for assisting its clients keep up to speed of things so that they do not lose any opportunities if there are any
Jury of her peers Essay Example for Free
Jury of her peers Essay After the first reading 1. What do the women think happened at the farm? The women thought Mrs. Wright might have murdered her own husband. After the second reading 2. What is the climax of the story (When in the story does the narrative take a turn)? The storyââ¬â¢s climax is when there are more evidences compiled at the end (the dead bird, broken cage, abuse, marital oppression) this turns the story to Minnie Foster as a victim and not as a criminal. 3. How well does this story fit the model of the stages of narrative? The story shows all the stages of narrative in correct order (intro, rising action, climax, falling action) except that the conclusion is left for the readers to think. 4. What other things do you notice? The women were not allowed to be jurors but in this story, they outsmarted their husbands/men in collecting evidences that would point to who the victim and who the murderer was. The strongest evidences would be the abuse and loneliness experienced by Mrs. Wright and the irony of how the bird and Mr. Wright were killed in the same way. 5. What questions do you still have? à Will the women tell their husbands/men what they saw? Will the women stand up at the trial for the evidences?
Monday, October 14, 2019
The Role of Genomics in Cancer Medicine
The Role of Genomics in Cancer Medicine Genomics is a new science which concerns the study of genomes, the entire complement of genetic material of an individual. In fact, genomics also includes the study of gene expression, from transcription of DNA to translation, its expression as a protein. Genomics aims at understanding the structure, function and evolution of all genomes. This field is based on determining the essential nature of genome structure and will have a great impact on the development of basic biology. A genome is the total number of all genes found in an organism. Again, genomics can hence be defined as the study of all the genes in a cell at the DNA, mRNA and protein levels. The era of genomics started with Frederic Sanger who first sequenced the complete genomes of a virus and a mitochondrion. Techniques of genomics which include DNA sequencing and gene mapping were hence established. Development in the field of genomics continued at a rapid pace, and with the new technology from informatics, scientists were inspired to carry out the Human Genome Project. This scientific research had, as a primary aim, to determine the base pair sequence in human DNA and to identify about 25 000 genes in the genome. The project started in 1990 and a first draft was released in 2000. A further, complete report was published in 2003 with more details. The knowledge of the human genome sequence has created the possibility to investigate functional genomics which tries to describe gene functions and interactions during various conditions such as cancer. Cancer is a class of diseases in which cells divide uncontrollably, invade adjacent cells or spread throughout the whole body via the blood or lymph. Cancers can be either benign or malignant. Cancers can affect everyone and the risk increases with age, a certain type of lifestyle and environment and if several cases of cancer had previously been diagnosed within the family. Some environmental factors leading to cancer include tobacco smoking, prolonged exposition to radiations, obesity and pollutants. These factors lead to a mutation in the DNA base sequence resulting in the cells having new properties. Genes are affected in such a way that these new properties now include an excessive growth and cell division, protection against the bodys natural immune system, the ability to divide over other cells and into different places. Normal properties, such as the highly specific DNA replication, accurate cell cycle and interactions with the defence system, are lost to the mutated cell. Cancer can be treated in several ways including surgery, chemotherapy, radiation therapy, immunotherapy and biologic therapy. Depending on the stage the cancer has reached, surgery is performed to remove the cancerous cells or tumour. Usually, after surgery, the cancer patient has to undergo chemotherapy. Chemotherapy is the use of drugs to treat cancer by destroying the cancer cells. These drugs target cells which multiply rapidly. Radiation therapy uses energy to target the damaged DNA. Since cancer cells are sensitive to radiation, they are easily eliminated. However not all types of cancer can be treated though survival rate has increased. Cancer is still the commonest fatal diseases in many parts of the world. Genomics may play an important role in cancer medicine in the recent future. The Cancer Genome Project is using the human genome sequence and mutation detection techniques to identify the mutated base sequence in cancer cells thus mapping the genes responsible for the deve lopment of cancer. Genomic tests or assays are done to identify the specific genes in a cancer cell, which is like identifying a particular fingerprint of the cancer. Although the genomic approach is still being developed, the application of genomic technologies to cancer medicine has already generated promising results both in target identification and in disease classification. Genomics works by evaluating the genes in a sample of cancerous tissue. Genes that have mutated are hence identified along with those which have been inherited. Inherited genes which may lead to cancer are identified by genetic testing. Genomics play an important role in helping doctors to determine a patients prognosis, which type of cancer it is, to choose the most effective treatment for each individual cancer, to monitor patients who are undergoing treatment to determine if the treatment is working and those who are in remission to catch a potential disease progression early when it is more treatable. Genomic testing may play an important role in cancer medicine by giving each patient an individualized treatment.Ãâà Patients with more serious conditions can be identified and offered aggressive and innovative therapies that may prolong their lives, while patients who are diagnosed with a less serious condition may be spared unnecessary treatments. For example, some women with node-negative breast cancer will relapse after being treated with surgery alone. Genomic testing has been shown to differentiate between which node-negative breast cancer patients are more likely to relapse and therefore benefit from additional chemotherapy and which patients may not need chemotherapy. Genomic technology has been applied to several areas of cancer research. By profiling and comparing gene expression of tumours of different grades or primary and metastatic tumours, several genes involved in cancer progression or metastases have been found, new classification paradigms have been establishe d, genes have been placed into pathways, and gene deletions and amplifications have been identified. The application of genomics in cancer medicine will no doubt prove to be beneficial in the long run. The evolution of genomics and its integration in this field is a complex and challenging process. However, progress is being made and instead of treating cancer, cancer could be eliminated before its appearance by modifying the gene responsible. Genomics would also help in improving treatment and diagnosis of cancer. The shift from an organ-focused to a gene-focused approach to cancer is already having a profound effect on the way cancer is treated. The impact can be seen particularly clearly in breast cancer. Not too many years ago, breast tumors were categorized and treated primarily by their size, the degree to which they had invaded surrounding tissue or sloughed off cells into the lymph system, and their appearance under a pathologists microscope. The field of cancer genomics is relatively new compared to other fields, however it promises many things. As progress is being made in the mapping of the cancer genes, the results promise to be enormous.
Sunday, October 13, 2019
William F. Mays Rising to the Occasion of Our Death Essay examples --
There are three key audiences of the text for William F. May's ââ¬Å"Rising to the Occasion of Our Death.â⬠The first audience, in this case, would be legislative organizations or lawmakers who have researched and studied similar cases regarding euthanasia. Since May was as an ethics professor at Southern Methodist University, his tone is decidedly intellectual. An uneducated individual would find it more difficult to read his essay; for example, in declarations such as ââ¬Å"Advocates of active euthanasia appeal to the principle of patient autonomy,â⬠May's syntax and tone is formal, informative, and utilizes heavy technical jargon (May 662). In other words, it is authoritative, and enables the audience to view him as a credible source due to his syntactical confidence. Other organizations, lobbyists, or lawmakers who are researching evidence on euthanasia would certainly benefit from reading his expert opinion on the matter. Moreover, his desire to develop a ââ¬Å"ju dicious, regulated policyâ⬠is a certain acknowledgement that he is attempting to legally call for regulations on euthanasia (May 662). The second audience that May is appealing to are conservative Christians, who are distinctively pro-life. As his article was originally published in well-circulated The Christian Century magazine, addressing this audience exposes members of May's audience who are unfamiliar with euthanasia to its technicalities by debating morality. His tone is similar to that of a sermon; instead of utilizing scientific facts or statistics, May chooses to exclude a logos appeal in favor of an ethos objective. He preaches on moral values about life and death, mentioning that ââ¬Å"the best death is not always the sudden deathâ⬠(May 662). According to May, preparation... ...ploying strong technical terms and establishing an extrinsic ethos, and exercising sub-arguments that would only benefit numerous groups of people, May strongly achieves his strategy of argument through ethos in terms of rhetorical persuasion. Works Cited Agatucci, Cara. "Cora Agatucci's Toulmin-Style Analysis of May's Argument." WR 122 Course Home Page. N.p., 06 Jan. 2010. Web. 31 Mar. 2014. May, William F. "Rising to the Occasion of our Death." The Christian Century Jul 11 1990: 662. ProQuest. Web. 31 Mar. 2014 "Opinion 2.21 ââ¬â Euthanasia." Opinion 2.21 ââ¬â Euthanasia. American Medical Association, June 1996. Web. 16 Mar. 2014. Perelman, Chaà ¯m, and Lucie Olbrechts-Tyteca. Facts, Values, and Hierarchies, The New Rhetoric. N.p.: n.p., n.d. PDF. The Stases and Other Rhetorical Concepts from Introduction to Academic Writing. N.p.: n.p., n.d. PDF.
Saturday, October 12, 2019
relationships :: essays research papers
The position of thrust sheets around the margins of landslide toe blocks, and their morphology and direction of thrusting, suggests that they were formed as a result of toe block pressing and movement in the surrounding sand. Toe-thrust sheets therefore can be considered as the morphological expression of ongoing instability at the landslide toe. The upthrust nature of these sheets at West Runton suggests that rotation of toe blocks, generating forward movement of the surrounding loose beach sand, is the principal process of toe-thrust sheet formation (fig. 6). Passive pressing of toe blocks into the surrounding sand under gravity is unlikely to result in either brittle failure of the sand or differential movement of the sand away from the toe blocks (i.e., different thrust sheet widths). The presence of thrust sheets therefore suggests that landslide blocks are actively excavating into the softer and unconsolidated beach sand that is displaced outward as a result of this process. The size and extent of the thrust sheets can be used as a proxy for the scale, rate, and timing of block movement. For example, the bigger landslide blocks are associated with more extensive thrust sheets, and sheet width is likely associated with excavation depth. The presence of multiple and overlapping thrust sheets that vary in extent along the front of landslide blocks (figs. 4, 5) also suggests that different parts of the toe are active at different times and therefore that sliding rates and volumes averaged across the entire landslide (Waltham and Dixon 2000) likely conceal wide spatial and temporal variations. [Graphic omitted] The presence of delicate toe-thrust sheets within the intertidal zone at West Runton is of interest because these features are easily destroyed by waves and will be wiped out by every high tide. Figure 6 is a schematic cartoon illustrating a possible formation mechanism for these features. During high tides, the elevated position of the external water plane (mean high water level) against the landslide toe means that there is a small difference in head, and low hydraulic potential gradient, between the landslide toe and its external environment (fig. 6a). The depth of marine water also likely increases interstitial pore water pressure both within the submerged beach sand and within the fine-grained landslide sediments and influences effective pressure (cf. Dixon and Bromhead 2002). Elevated external water pressure at high tide helps to hold back toe advance (Hutchinson 1988). At low tide, when the ground water table is located within the beach sand and is under lower (atmospheric) interstitial pore water pressure, a large difference in head and therefore steepened hydraulic potential gradient exists between the landslide toe and the external environment (sea level) (fig. 6b). Under these conditions, sliding and the formation of relationships :: essays research papers The position of thrust sheets around the margins of landslide toe blocks, and their morphology and direction of thrusting, suggests that they were formed as a result of toe block pressing and movement in the surrounding sand. Toe-thrust sheets therefore can be considered as the morphological expression of ongoing instability at the landslide toe. The upthrust nature of these sheets at West Runton suggests that rotation of toe blocks, generating forward movement of the surrounding loose beach sand, is the principal process of toe-thrust sheet formation (fig. 6). Passive pressing of toe blocks into the surrounding sand under gravity is unlikely to result in either brittle failure of the sand or differential movement of the sand away from the toe blocks (i.e., different thrust sheet widths). The presence of thrust sheets therefore suggests that landslide blocks are actively excavating into the softer and unconsolidated beach sand that is displaced outward as a result of this process. The size and extent of the thrust sheets can be used as a proxy for the scale, rate, and timing of block movement. For example, the bigger landslide blocks are associated with more extensive thrust sheets, and sheet width is likely associated with excavation depth. The presence of multiple and overlapping thrust sheets that vary in extent along the front of landslide blocks (figs. 4, 5) also suggests that different parts of the toe are active at different times and therefore that sliding rates and volumes averaged across the entire landslide (Waltham and Dixon 2000) likely conceal wide spatial and temporal variations. [Graphic omitted] The presence of delicate toe-thrust sheets within the intertidal zone at West Runton is of interest because these features are easily destroyed by waves and will be wiped out by every high tide. Figure 6 is a schematic cartoon illustrating a possible formation mechanism for these features. During high tides, the elevated position of the external water plane (mean high water level) against the landslide toe means that there is a small difference in head, and low hydraulic potential gradient, between the landslide toe and its external environment (fig. 6a). The depth of marine water also likely increases interstitial pore water pressure both within the submerged beach sand and within the fine-grained landslide sediments and influences effective pressure (cf. Dixon and Bromhead 2002). Elevated external water pressure at high tide helps to hold back toe advance (Hutchinson 1988). At low tide, when the ground water table is located within the beach sand and is under lower (atmospheric) interstitial pore water pressure, a large difference in head and therefore steepened hydraulic potential gradient exists between the landslide toe and the external environment (sea level) (fig. 6b). Under these conditions, sliding and the formation of
Friday, October 11, 2019
Intellectual Property Laws of India
Intellectual Property Laws of India James Thanickan When India became a Republic in 1950, India had Intellectual Property legislations on copyrights, patents, designs and trade marks. These were mostly adaptations of the laws of Great Britain in each area and were of general international norms. Subsequently, India modified the Intellectual Property legislations to make them meet national needs and requirements. Pursuant to the countryââ¬â¢s joining the World Trade Organisation, India either modified the existing legislations or enacted new legislations in all the intellectual properties identified in the Agreement on Trade Related Aspects of Intellectual Property Rights (TRIPS Agreement), as per the obligations it committed. There are now specific legislations on Copyrights and Related Rights, Patents, Trade Marks, Designs, Geographical Indications of Goods, Plant Varieties and Farmersââ¬â¢ Rights, and Semiconductor Integrated Circuits Layout-Designs. In addition, India also has legislations on protection of biological diversity and competition. The Indian Intellectual Property legislations are now fully TRIPS compatible. A brief overview of these legislations is presented in the following paragraphs. Copyrights India has a long history of copyright law enactment. As early as 1857, India passed a law to protect copyrights. Later, another Act was passed in 1862. But the Act which became a milestone was the Copyright Act, 1914. This was based on the Copyright Act, 1911 of the United Kingdom with suitable modifications for India. This Act remained in force until replaced by the present Copyright of 1957 on 21 January 1958. The present legislation was amended periodically in 1983, 1984, 1992, 1994 and 1999 to meet requirements of the times. Presently, a set of amendments is under consideration of the Parliament. Regulations regarding procedures and other matters are prescribed in the Copyright Rules, 1958 as amended from time to time. The Copyright Act extends copyright protection to the following classes of works: (a) Original literary, dramatic, musical and artistic works (b) Cinematograph films, and c) Sound recording. The definition of literary work in the Act is an inclusive definition stating specifically that computer programmes, tables and compilations including computer databases are literary works. Artistic works include architecture but the copyright subsists only in the artistic character and design and not in the process or methods of construction. Copyright will not subsist in any design register ed under the Designs Act or an article to which the design has been applied is reproduced more than fifty times by an industrial process. There shall be no copyright in a cinematograph film if a substantial part of the film is an infringement of copyright in any work. Similarly, if a sound recording contains infringing work, then it will not have any copyright. The law makes it also clear that that the separate copyright in any work incorporated in a cinematograph film or sound recording is not affected by the copyright in the cinematograph film or the sound recording. The following rights accrue to the owners of copyright: reproduction, issuing of copies, communication to the public, translation, and adaptation. Similar rights are also available for translations and adaptations. For computer programmes, sale and commercial rental rights have also been provided. In the case of original artistic works, the author is eligible for a share of the resale proceeds also. The Indian law also provides for special rights to claim authorship of the work and to restrain or claim damages in respect of any distortion, mutilation, modification or such other acts on the work. The duration of copyright in India is life plus sixty years. However, in case of cinematograph films, sound recordings, photographs, government works, works of public under takings and international organisations, the term of copyright is sixty years. The Act permits certain acts without specific permission of the copyright owner. These include a fair dealing with a literary (not being a computer programme), dramatic, musical or artistic work for the purposes of private use including research, and criticism or review and also for reporting of current events. Such works can also be reproduced for judicial proceedings and by legislature secretariats for use by members of a legislature. Reproduction of literary, dramatic, musical and artistic works is also permitted by a teacher or pupil in the course of instruction and examination. In the case of a computer programme, making of backup copies by the lawful possessor is permitted. Decompilation and reverse engineering are also permitted under certain circumstances. Performance of a literary dramatic, or musical work or the communication to the public of such work or a sound recording in the course of any bona fide religious ceremony or an official ceremony held by the government is also permitted. While copyright accrues without any formality, facility for voluntary registration is available. The registration is made by the Registrar of Copyrights. The registration certificate is prima facie evidence of copyright. There is a copyright Board to appeal against the decisions of the Registrar of Copyrights. A person can also relinquish his copyright with the Registrar of Copyrights. All acts which are the exclusive rights of the owner when done without his permission are infringements. Similarly, importing into India, exhibiting for sale, etc. f infringing copies of a work are also infringements. Civil and criminal procedures are available to the owners in cased of infringement of copyrights. Civil suits can be filed in the district courts of the place where the owner is ordinarily resident or where his business is. Damages and accounts can be claimed in civil suits. Indian courts have now started imposing punitive damages also. All acts of infringement are criminal offences. Mand atory minimum punishments of six months imprisonment and Rs. 0,000 fine for the first offence and double that which can go upto three years imprisonment and Rs. 200,000 fine are prescribed in the Act. Knowing use of an infringing copy of a computer programme is an offence. Police have powers to seize infringing copies of copyrighted works and the machinery and equipment used for such infringement without a warrant. The Indian Act also provides for compulsory licences in certain circumstances such as non-republication and non-permission for translation after certain number of years. For administering the copyrights, the Act provides for copyright societies. There are separate societies for performing rights, sound recordings, cinematograph films and reprography rights. The Copyright Act has also provisions for extending copyright to foreign works. This is done through a special notification. At present citizens of all countries who are members of the Berne Union or the World Trade Organisation get copyright for their works in India. Related Rights Related Rights are also governed by the Copyright Act. The two categories of related rights provided are for broadcasters and performers. Broadcasters et the broadcast reproduction right which entails that no person shall re-broadcast or cause the broadcast to be heard or seen by the public on payment of any charges, make any sound or visual recording of the broadcast, or sells or rents to the public any recording without licence from the broadcaster concerned. These rights last for twenty-five years. Performers get performersââ¬â¢ right over their performance which means no one can make a sound or visual recording of his performance, or reproduce any such recording or broadcast such recording without the performerââ¬â¢s permission. This right lasts for fifty years. Both broadcasters and performers rights extend to the importation of copies of sound or visual recordings made without permission. There are exceptions to the enjoyment of the related rights on the lines of exceptions for copyright. Civil and criminal remedies are available for infringement of the related rights, again on similar lines as for copyright infringement. Patents History of patent protection in India also goes back to the late nineteenth century. The first Patent Act was that of the year 1856. This law gave certain exclusive privileges to inventors for a period of 14 years. The Act was replaced by another Act in 1859. This was patterned after the British Act of 1852. Later, the Protection of Inventions Act was passed in the year 1883. The Inventions and Designs Act of 1888 replaced all the existing Acts in these two areas. Subsequently the Patents and Designs Act of 1911 replaced all the previous Acts. This Act really established a system for proper administration of the Act by appointing Controller of Patents. Later the Patents Act 1970 was enacted on 20th April 1972. This Act was amended in 1999, 2002 and 2005 with a view to making it compatible with the provisions of the TRIPS Agreement and is now fully TRIPS compatible. Prior to 2005 amendment, products in the field of pharmaceuticals and food items were not patentable. New Patent Rules were notified in 2003. Patents are available for all new inventions, both products and processes in all fields of technology which satisfy the patentability criteria, that is, novelty, inventiveness and industrial application. The Act defines invention as a new product or process involving an inventive step and capable of industrial application and further defines ââ¬Ënew inventionââ¬â¢ as ââ¬Å"any invention or technology which has not been anticipated by publication in any document or sed in the country or elsewhere in the world before the date of filing of patent application with complete specification, i. e. , the subject matter has not fallen in public domain or that it does not form part of the state of the art. â⬠The Indian Act provides an elaborate list of what are not patentable inventions. These, inter alia, include frivolous inventions or inve ntions which claim anything obviously contrary to well established natural laws or which are meant primarily for use which could be contrary to public order or morality or which cause prejudice to human, animal or plant life or health or to the environment. Mathematical or business methods or a computer programme per se is also not patentable. Methods of treatment of humans, animals or of agriculture or horticulture are also not patentable. Traditional knowledge, literary, dramatic, musical or artistic works, topographies of integrated circuits, presentation of information, a mere scheme or rule or method of performing mental act or method of playing games and plants and animals in whole or in any part thereof are certain other non-patentable items. However, microorganisms are patentable. While submitting an application for patent, the applicant has to clearly indicate the source from which the biological material from India has been obtained and also that the necessary permission from the competent authority will be submitted. Such permission is to be obtained from the National Biodiversity Authority. A patent grants the exclusive right to the patentee to prevent third parties, who do not have his consent, from the act of making, using, offering for sale, selling or importing the patented product or process. The Indian Patent Act makes it clear that patents are granted to encourage inventions and to secure that the inventions are worked in India on a commercial scale and not merely to enable the patentee to enjoy a monopoly for the importation of the patented article. With a view to keep a balance of the rights of owners and public interest, the Act also provides for compulsory licences in certain circumstances such as an epidemic or for government use. Provisions also exist for granting compulsory licence in cases of application from countries that do not have adequate manufacturing capacity. However, so far no compulsory licence has been granted in India. Patent is granted on application to and after examination by the Patent Office. The application can be made by the true and first inventor of the invention or by any assignee or by the legal representative of any deceased person who was the true and first inventor or his assignee. As per the Act, the first person to apply gets the patent, if other conditions are satisfied. Provisional application can be made. However, in such case the complete application should be made within one year of the date of the provisional application. Ordinarily, patent applications are published in the Patent Journal 18 months after receipt of the application. However, in case the applicant applies for early publication, it will be done. After publication, the applicant or any third party can request for examination of the same. Decisions of the Controller of Patents are appealable to the Intellectual Property Appellate Board. Pre-grant representation against grant of a patent can be made upto six months from the date of publication. Opposition can also be made after grant of a patent. The grounds for opposing a patent clearly enunciated in the Patents Act. These mostly pertain to the patentability criteria and the non-patentable subject matter specified in the Act itself. The term of a patent is 20 years from the date of application or priority date, whichever is earlier, subject to annual renewal. In case of infringement of a patent right, civil action can be initiated by the patentee. Designs Industrial design protection in India can be traced back to the Patterns and Designs Protection Act, 1872. This was later incorporated in the Patents and Designs Act, 1888 which was later replaced by the Patents and Designs Act, 1911. So far as designs were concerned, this law remained in force till 11th May 2001, when the Designs Act 2000, along with the Designs Rules 2001, was brought into force. As per the Design Act, protection is extended to all registered designs. The definition of design makes it clear that only the features of shape, configuration, pattern, ornament or composition of lines or colours applied to any article by an industrial process or means, which in the finished article appeal to and are solely judged by eye are registrable. It does not include any mode or principle of construction or anything which is in substance a mere mechanical device. Nor does it include trade marks or artistic works which are protected under copyright. Both two dimensional and three dimensional articles are protectable. In order to get registration, the design must be original or novel. Original includes designs which though old in themselves yet are new in their application. A design which has been disclosed to the public anywhere in India or in any other country by publication in tangible form or by use or in any other way prior to the date of filing date or the priority date are not eligible for registration. Similarly designs which is not significantly distinguishable from known designs or combination of known designs or which comprises or contains scandalous or obscene matter are also not eligible registration. A design may be registered in more than one class. Registration of design is to be done in the Design Office at Kolkata, but application can be submitted in any one of the Patent offices at Chennai, Delhi or Mumbai. Appeals against the decisions of the Controller of Designs are to be made in a High Court. When a design is registered, the registered proprietor of the design gets copyright on that design for a period of ten years. The registration can be renewed once only for five years. Registration of a design makes it illegal for any person to apply or use the design on any article for sale or import of an article on which the design has been applied, without the licence of the registered proprietor. The penalty for piracy of design is payment of a sum not exceeding Rs. 25,000 to the registered proprietor and damages. Civil proceedings are to be instituted in a court not below that of a District Court. Design copyrights can be assigned or licensed. Trade marks The history of trade mark protection in India can be traced back to the Indian Merchandise Marks, Act 1889. Like similar legislations in the field of intellectual property rights, this was based on a British statute, in this case, the U. K. Merchandise Marks Act, 1887. A proper trade mark law was introduced with the enactment of the Trade Marks Act, 1940. This was later repealed when the Trade and Merchandise Marks Act, 1958 was brought into force on 25th November 1959. This Act consolidated the provisions of the 1889 Merchandise Marks Act and the 1940 Trade Marks Act. The present Act is the Trade marks Act 1999 which was enacted keeping in view the obligations under the TRIPS Agreement. This Act, along with the Trade Marks Rules, 2002, was brought into force from 15 September 2003. As per the Trade Marks Act, for registration, a trade mark should be capable of being represented graphically and also of distinguishing the goods and services of one person from those of others and may include shape of goods, their packaging and ombination of colours. The Act provides for registration of certification trade marks and collective trade marks. Registration can be made in any one or more classes prescribed in the Rules. India follows the Nice classification of goods and services. India also recognises the concept of well known trade marks. A Trade Marks Registry with headquarters at Mumbai with branches at Kolkata, Delhi, Chennai and Ahmedabad exists for re gistration of trade marks. Application is to be submitted at the appropriate office depending on which part of the country the registered office of the applicant is situated. Marks which are devoid of any distinctive character or which may serve to designate the kind, quality, quantity, intended purpose, values, geographical origin or the time of production of the goods or rendering of the service or other characteristics of the goods or services, or which have become customary in the current language or in the bona fide and established practices of the trade will be refused registration. Further, marks which are of such nature as to deceive the public or cause confusion, or which contains or comprises of any matter likely to hurt the religious susceptibilities of any class or section of the citizens of India, or which comprises or contains scandalous or obscene matter or which are national emblems or names will also not be registered. In addition a mark consisting exclusively of shape of goods which results from the nature of the goods themselves or the shape of goods which is necessary to obtain technical result or the shape which gives substantial value to the goods will also be refused registration. The registration is done after due examination and comparison with existing registered trade marks and after publication. Aggrieved persons can represent to the Registrar of Trade Marks before registration. The decisions of the Registrar of Trade Marks are appealable to the Intellectual Property appellate Board. Registration of a trade mark is valid for ten years, but it can be renewed from time to time. Registration gives the exclusive right to use that trade mark on the specific classes of goods or services to the registered proprietor. Use of a registered trade mark by an unauthorised person is infringement of the rights in that trade mark. Civil and criminal remedies akin to those of copyrights are available to the owners of the trade mark. In the case of trade mark, prior use claim is recognised by the Indian law. However, in the case of an unregistered trade mark, the court action will be for passing off the goodwill under the common law of torts. Geographical Indications India enacted a sui generis legislation for the protection of geographical indications through a registration process in fulfilment of its obligations under the TRIPS Agreement. The Geographical Indications of Goods (Registration and Protection) Act, 1999, along with the Geographical Indications of Goods (Registration and Protection) Rules, 2002, was brought into force on 15th September 2003. The Act provides for registration of geographical indication of agricultural, natural or manufactured goods which identifies such goods as originating or manufactured in the territory of a country or a region or locality in that territory, where a given quality, reputation or other characteristic of such goods is essentially attributable to its geographical origin. Through an explanation, the Act clarifies that any name which is not the name of country, region or locality of that country shall also be considered as the geographical indication if it relates to a specific geographical area and is used upon or in relation to particular goods originating from that country region or locality , as the case may be. The application for registration of a geographical indication is to be made to the Registrar of Geographical Indication. Any association or persons or producers or any organisation or authority established by or under any law for the time being in force representing the interests of the producers of the goods concerned, can apply for registration. The application will be examined, if necessary in consultation with a consultation group consisting of experts, and the accepted applications are advertised in the Geographical Indications Journal inviting objections if any. Opposition has to be filed within three months. The objections will be examined through a quasi judicial process and depending on the outcome, a geographical indication is registered or not. Decisions of the Registrar of Geographical Indication are appealable to the Intellectual Property Appellate Board. The registration of a geographical indication is for a period of ten years but is renewable from to time without any limit. The Act also provides for registration of the authorised users of the goods in question. These registrations are also for ten year periods. Registration confers on the authorised user the exclusive right to the use of the geographical indication in relation to the goods in respect of which the geographical indication is registered. Any unauthorised use is an infringement. No infringement action can be taken against an unregistered geographical indication. The registered proprietor and authorised user can initiate the action for getting relief against infringement . The Government can notify the goods which are entitled for higher level of protection as per the TRIPS Agreement. Civil and criminal remedies, on the lines of such remedies for trade mark infringement are available for geographical indication infringements. Geographical Indication rights are not assignable. However, legal heirs, who produce or manufacture the goods in question as per the requirements, can inherit the rights. Semiconductor Integrated Circuits Layout-Designs The Semiconductor Integrated Circuits Layout-Design Act, 2000 was enacted by India in pursuance of its obligations under the TRIPS Agreement. The Act, along with, the Semiconductor Integrated Circuits Layout-Design Rules 2001 was brought into force partially on 1st May 2004. The Act provides for registration of layout designs of semiconductor integrated circuits. A layout-design which is not original or which has been commercially exploited anywhere in India or in a convention country, or which is not inherently distinctive or which is not inherently capable of being distinguishable from any other registered layout-design will not be registered. Any person claiming to be the creator of a layout-design can apply to the Registrar of Layout-Designs for registration. Accepted applications will be advertised and any person can file opposition to the registration within three months of the advertisement. Thereafter, after due quasi judicial proceedings only the application is registered. Decisions of the Registrar of Layoutââ¬âDesign are appealable to the Layout-Design Appellate Board. Registration of a layout-design is valid for ten years from the date of filing or from the date of first commercial exploitation anywhere in any country whichever is earlier. The Act also provides for registration of authorised users. However, the authorised users do not have the right of assignment but only of use of the layout=design. Registration grants to the registered proprietor the exclusive right to the use of the layout-design and to obtain relief in respect of infringement. Infringement of layout-design occurs when any person not being the registered proprietor or a registered user thereof, does any act of reproducing, whether by incorporating in a semiconductor integrated circuit or otherwise, a registered design in its entirety or any part thereof. Infringements of the rights of a registered proprietor or authorised user are infringements which are punishable offences. The quantum of penalties and punishments are similar to those of trade marks. Protection of Plant Varieties In order to provide for the establishment of an effective system for protection of plant varieties, the rights of farmers and plant breeders and to encourage the development of new varieties of plants, the Protection of Plant Varieties and Farmersââ¬â¢ Rights Act,2001 was enacted. The Act provides for registration of any new variety of plant which is novel, distinctive, uniform and stable. Extant varieties can also be registered subject to certain conditions. Applications for registration can be made by plant breeders or their assignees. Registration confers an exclusive right on the breeder or his successor, his agent or licensee, to produce, sell, market, distribute, import or export the variety. However, researchers are free to use the variety for conducting experiment or research. Any person is also free to use the variety as an initial source of variety for the purpose of creating other varieties. A farmer who has bred or developed a new variety is also entitled for registration and other protection in like manner as a breeder of a variety under the Act. Registration of a new plant variety is valid for eighteen years from the date of registration in case of trees and vines and for fifteen years in other cases. Registration of an extant variety is valid for fifteen years only. Civil suit can be filed against infringers of the rights conferred by registration in district courts. Courts can grant relief such as injunction and at the option of the plaintiff, either damages or a share of the profits. False application of the denomination of a registered variety is an offence. First time such offences are punishable with imprisonment for a term which shall not be less than three months but which may extend to two years, or with fine which shall not be less than Rs. 50,000 but which may extend to Rs. 500,000. A person who has already been convicted of an offence under the Act is punishable for second and for every subsequent offence with imprisonment for a term which shall not be less than one year but which may extend to three years or with fine which shall not be less than Rs. 00,000 but which may extend to Rs. 2,000,000. Protection of Biological Diversity and Associated Traditional Knowledge In pursuance to the United Nations Convention on Biological Diversity, 1992, India enacted the Biological Diversity Act, 2002 with the objective of conservation of biological diversity, sustainable use of its components and fair and equitable sharing of the benefits arising out of the utilisation of genetic resources. The Act, along with the Biological Diversity Rule s, 2004, was brought into force fully on 1st July 2004. The Act contains detailed procedures and guidelines for accessing biological diversity and associated traditional knowledge occurring in India, including about Prior Informed Consent for Access and Fair and Equitable Benefit Sharing Agreements. The Act provides for prior approval of the National Biodiversity Authority for making any application for any intellectual property right, in or outside India, for any invention based on any research or information on a biological resource obtained from India. The National Biodiversity Authority may, while granting the approval, impose benefit sharing fee or royalty or both or impose conditions including the sharing of financial benefits arising out of the commercial utilisation of such rights. Further, all foreign nationals, non-resident Indians and firms, associations and organisations with non-Indian participation require approval of the National Biological Diversity Board for accessing biological resources or knowledge associated thereto for research or for commercial utilisation. For transfer of biological resource and associated knowledge also prior permission of the National Biodiversity Authority is required. The benefit sharing arrangements, inter alia, include grant of joint ownership of the intellectual property rights to the National Biodiversity Authority, or where benefit claimers are identified, to such benefit claimers. Intellectual Property Administration In India, the intellectual property laws are administered by different Departments of the Central Government. The table below presents the departments which handle various intellectual property laws. Law| Department| Copyright Act| Higher Education| Patents Act| Industrial Policy & Promotion| Designs Act| Industrial Policy & Promotion| Trade Marks Act| Industrial Policy & Promotion| Geographical Indications of Goods (Registration and Protection) Act| Industrial Policy & Promotion| Semiconductor Integrated circuits Layout-Design Act| Information Technology| Protection of Plant Varieties and Farmersââ¬â¢ Rights Act| Agriculture and Cooperation| Biological Diversity Act| Environment and Forests| Consequently, the administrative set ups for the different Intellectual Property laws are also different. The Copyright Act is administered by the Copyright Registry at New Delhi. It is headed by the Registrar of Copyrights who is assisted by Deputy Registrars of Copyrights. A copyright Board exists for hearing appeals against the decisions of the Registrar of Copyright. The Patents Act, Designs Act, Trade Marks Act and the Geographical Indications of Goods (Registration and Protection) Act are administered by the Controller General of Patents, Designs and Trade Marks (CGPDTM), Mumbai. Under the Controller General are the Patents Office, the Design Wing, the Trade Marks Registry and the Geographical Indications Registry. The headquarters of the Patent Office is at Kolkata and there are branch offices at Chennai, New Delhi and Mumbai. The headquarters of the Trade Marks Registry is at Mumbai. It has branch offices at Ahmedabad, Chennai, Kolkata and New Delhi. The Design Wing of the Patent Office is at Kolkata. The Geographical Indications Registry is at Chennai. The Controller General is assisted by different levels of Controllers of Patents and Designs and Examiners in the patents and designs office and different levels of Registrars and Examiners in the trade mark and geographical indications registries. The Intellectual Property Appellate Board hears the appeals against the decisions of the Controller General of Patents, Designs and Trade Marks. The Protection of Plant Varieties and Farmersââ¬â¢ Rights Act is administered by the Plant Varieties and Farmersââ¬â¢ Rights Authority headed by a Chairperson and consisting of fifteen Members. A Plant Varieties Registry headed by a Registrar General of Plant Varieties has been set up under the Authority to register the plant varieties. Decisions of the Authority or the Registrar can be appealed to the Plant Varieties Protection Appellate Tribunal. The Registrar of Semiconductor Integrated Circuits layout-Design administers the Semiconductor Integrated Circuits Layout-Design Act. Appeals against the decisions of the Registrar can be preferred at the Layout-Design Appellate Board. The National Biodiversity Authority in Chennai administers the Biological Diversity Act and Rules. Under the Authority, State Biodiversity Boards and at local body level Biodiversity Management Committees exist. Membership of International Treaties and Conventions on Intellectual Property India is a member of all major international treaties and Conventions on Intellectual Property. These include the Berne Convention for the Protection of Literary and Artistic Works, the Paris Convention for the Protection of Industrial Property, Agreement on Trade Related Aspects of Intellectual Property, Convention on Biological Diversity, Budapest Treaty on the International Recognition of the Deposit of Microorganisms for the Purposes of Patent Procedure, Nairobi Treaty on the Protection of the Olympic Symbol, Patent Cooperation Treaty, Phonograms Convention for the Protection of Producers of Phonograms Against Unauthorized Duplication of Their Phonograms, WIPO Convention and Universal Copyright Convention. ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â- [ 2 ]. Section 3(l) of the Patents Act, 1970.
Thursday, October 10, 2019
An Introduction to the Im Profession and Ethics Paper
De La Salle University ââ¬â Manila An Introduction to the IM Profession and Ethics Paper Presented to The Faculty of the College of Computer Studies De La University ââ¬â Manila In Partial Fulfillment Of the Requirements for the Degree of Bachelor of Science of Information Systems By: Changcoco, Amos Dimla, Ysabel Nicole Ramchand, Pavan Tanchuling, Bianca Denise Tibayan, Jan Michael 1. 0 COMPUTER AND INTERNET CRIME 1. 1 Types of Exploits 1. 1. 1Virus It is a malicious code that is attached to a file or executable program that can hack the files of the victimââ¬â¢s computer and reformat, delete or modify the files.The virus is executed only when the file that contains the virus is opened or if the program with the virus is executed as well. It leaves infections as it travels from one computer to another. The spread of the virus relies on the users whenever users would use removable media devices, download or through e-mails. An example of a computer virus would be the Pikac hu virus which was the first computer virus directed to children. It was said that the virus started on June 28, 2000 from Asia or the Pacific Ocean region.The virus was an email titled, ââ¬Å"Pikachu Pokemonâ⬠with the message, ââ¬Å"Pikachu is your friend. â⬠The email contained the image of the cartoon character, ââ¬ËPikachuââ¬â¢ from the TV series Pokemon, with the message, ââ¬Å"Between millions of people around the world I found you. Donââ¬â¢t forget to remember this day every time MY FRIEND. â⬠The Pikachu virus infected only a few companies in the United States through Microsoft Outlook email attachments or through Microsoftââ¬â¢s Internet Explorer browser.The reason why only a few companies were harmed and why the virus was not as viral is that the virus was not coded properly and would ask the user if the virus can delete the files in the user. 1. 1. 2Worm A worm is a malicious code that is used for bringing down the computer system. A worm do es not infect files, however, it monopolies the computerââ¬â¢s CPU and operating system and is capable of deleting data and programs. It infects a computer by finding vulnerability in an application or operating system. A worm is self-replicating and uses a network to replicate itself to other computer.It does not rely on human interaction for spreading to other computers. An example would be the Morris Worm or also known as the Great Worm. Created by a Cornell University student named Robert Tappan Morris in the year 1968, the Morris Worm consisted of 99 lines of code. Robert Morris wanted to know how big the Internet was and made the worm to find the answer. It is noted that the creator did not have malicious intent in making this worm; however, the worm infected immense amounts of stability problems that made many systems unusable.The damage was over 6,000 infected UNIX machines which cost between $10,000,000 and $100,000,000. This example is an ethical dilemma because the cre ator did not have evil intentions in making the worm but did have bad effects on most people in America. This dilemma would be ethical based on the psychological egoism theory because Robert Morris acted on his selfish motive whether he should or not, which made him moral. Based on the hedonism theory, it was ethical of Morris because he was only doing his duty without knowing that his actions would bring upon negative effects. 1. 1. 3Trojan HorseNamed after the Trojan horse from Troy which was used to infiltrate the enemyââ¬â¢s territory through a disguise, the Trojan horse is disguised as something else (such as a program or file) but is actually a malicious code or may contain malicious code. Similar to viruses, a Trojan horse is executed when the file with the virus is opened or the program with the malicious code is executed also. A Trojan horse can do from light damages such as changing the desktop and the like, to threatening damage, such as deleting files, stealing data, or activating and spreading other malware, to the victimââ¬â¢s software.Trojan horses are also used to create a ââ¬Ëback doorââ¬â¢ in the operating system so that the hackers can access the system. However, the Trojan horse cannot duplicate itself nor it can self-replicate. It would need the user to spread to other computers. An example of a Trojan horse would be from the pirated version of Appleââ¬â¢s suite of software, iWork. iServices was the Trojan horse part of the pirated version of iWork, which would signal the hackers that the Mac is infected and the hacker has access to the system.This is an ethical dilemma because the people who buy pirated software such as the iWork do not know that there is a Trojan horse in the software. It was unethical of the sellers to place a Trojan horse in the software without the consent of their customersââ¬â¢ because deontology theory states that it was not the duty of the vendors to hack into the systems of their customers in th e first place. Another reason why it was unethical because of the theory of altruism because the interest of others was not thought about since many people will suffer due to the actions of the vendors.This is another reason why it is unethical, because of the utilitarianism, which is consequences-based. Lastly, the social contract theory states that the actions of the vendors were unethical because it is against the law to hack and infiltrate private property. Logic bomb is a type of Trojan horse that is triggered only by a series of specific events such as a specific sequence of keystrokes or a change in a file. 1. 1. 4Botnets A botnet is a network of infected computers that are controlled by bots.Named after the word ââ¬Ërobotââ¬â¢, a bot is a type of malware that allows an attacker to take control of an affected computer. Criminal can take over the controlled computer such as sending out spam, spread viruses, attack computer and can even cause crime and fraud, without the owner knowing it. Bots are also called computer zombie because the computer has no control over its actions since hackers are in charge of its actions. 1. 1. 5Distributed Denial-Of-Service Attacks (DDoS Attacks) A Distributed Denial-of-Service Attack is when a malicious hacker controls computers through the Internet.It is an attempt in preventing the computer owner to use network resource or machine. It is composed of one or more people trying to disenable a certain host from being connected to the Internet. 1. 1. 6Rootkits The name rootkit comes from the two words ââ¬Ërootââ¬â¢, which pertains to the point it attacks, which would be the administrator or the source or the root, and ââ¬Ëkitââ¬â¢ because of the set of programs. A rootkit is a set of programs that enables its user to gain administrator level access to a computer without the userââ¬â¢s consent or knowledge.The owner of the rootkit is capable of executing files and changing system configurations on the tar get machine, as well as accessing log files or monitoring activity to covertly spy on the user's computer usage. It is hard to detect if a computer system has a rootkit malware. 1. 1. 7Spam E-mail spam is when e-mail systems send unsolicited e-mail to large numbers of people. Spam mostly comes off as cheap advertisements of strange products such as pornography, ââ¬Ëget-rich-quickââ¬â¢ schemes and the like. Spam can also be used to deliver harmful worms or other malware. . 1. 8Phishing Phishing is an attempt to steal personal identity data by tricking users into entering information on a counterfeit Web site. 1. 2Types of Perpetrators 1. 2. 1Hackers and Crackers Hackers are people who test the limits of the system, find the ââ¬Å"holesâ⬠, and check which data they could access. The knowledge that they get is actually obtainable in various media, usually the internet. They are not usually considered bad; but due to many of them who used such knowledge to cause harm to syst ems, the term became negative.A more appropriate term for these kinds of people is actually called crackers. 1. 2. 2 Malicious Insiders Malicious insiders are people who obtain goods, services, or property through deception or trickery, also known as fraud. In other words they lie to gain. 1. 2. 3 Industrial Spies Industrial spies are people who illegally obtain information from competitors for the benefit of their sponsor. The act is called industrial espionage and the opposite which is to obtain information legally is called competitive intelligence.In 1993, Opel accused the rival Volkswagen of industrial espionage after the formerââ¬â¢s chief of production and seven executives moved to the latter company due to missing documents. (Julian, 2011) 1. 2. 4 Cybercriminals These perpetrators hack to the companyââ¬â¢s system and will do anything with the information just to gain money. One of the most famous hackers of the world is Albert Gonzalez, who used hacking to steal and re sell millions of card and ATM numbers in a span of three years. He did this by attacking many systems which would eventually give him the information needed to steal the card numbers. Verini, 2010) Albert Gonzalez is in ethical dilemma because he used his skills to steal the information for money. Based on the deontological theory, itââ¬â¢s unethical because it is not the duty of hackers to steal information. Based on hedonism under the utilitarian theory, it is ethical because he found pleasure from the act. Social contract theory, however, makes this act unethical, and so does virtue theory. 1. 2. 5 Hacktivists and Cyberterrorists Hacktivists, combining the words ââ¬Å"hackingâ⬠and ââ¬Å"activistâ⬠, are people who hack to promote political ideology.Cyberterrorists attack to get the attention of the government as part of their political objectives. Anonymous is one of the most famous hacktivist groups due to their appearance on various media in which members appear wearing the Guy Fawkes mask. Their advocacy is to oppose the Internet censorship and surveillance, government corruption and homophobia. This is why they attacked several government sites. (Katich, 2013) The ethical dilemma the group faces is that they use hacking skills to infiltrate the systems yet they belong to the side of the people as their objective is to make the government hear their voice.This is ethical based on deontology because it is their duty to make the government listen to them their voice. This is also ethical based on the altruistic approach as more will benefit from their act. However, social contract theory states that it is unethical since this act has violated the law. 1. 3Laws for Prosecuting Computer Attacks 1. 3. 1Electronic Commerce Act of 2000 (RA 8792) 1. 3. 1. 1E-Commerce in Society The process of buying and selling goods electronically by consumers and from company to company through computerized business transactions.This act has the purpose of prote cting those who pursue business in electronic means through multiple communication networks through the Internet. 1. 3. 1. 2 Elements in the Law Electronic data messages ââ¬â these are generally the information that is in every transaction of the business. Electronic document ââ¬â these are the type of information specified with text, symbols, or other modes of written expression yet similar in nature with the electronic data messages. Electronic Signature ââ¬â these are any distinctive marks that approve a transaction which are done by a person or an entity using electronic means. . 3. 1. 3Relation to other Laws Such laws that are affected with this are the Intellectual Property Rights, Copyrights Protection. These laws give protection to the parties involved in any business activities through electronic means. Fraud is also related as the government can charge you when you make accept payment illegally by disguising your site as a reliable option for payment. 1. 3. 1. 4 CASE in E-Commerce Censorship is very an essential tool to distinguish the moralities of websites and the cooperation of companies to acknowledge said moralities.In China, Google's operations created a storm of criticism when the company agreed to comply with the government's wishes and censor pro-democracy and other websites. In 2010, Google relocated its Chinese operations to Hong Kong, putting it outside China's censorship regime. Supporters of the decision say Google shouldn't cooperate with China's repressive policies, while critics say Google's withdrawal cut off millions of Chinese citizens from the company's services and weakens its presence in one of the world's largest markets. This case has very evident ethical issues including the move of Google to relocate its operations to Hong Kong.This made the jurisdiction of Chinaââ¬â¢s censorship policy not reachable so that they can use their assets more freely. These however made the citizens of China that is inside the jur isdiction of the censorship policy long for their beneficial search engine. If seen in Googleââ¬â¢s benefits this is a rather good trade for them to maximize the use of their services in a commercial area such as Hong Kong yet they couldââ¬â¢ve served the citizens so they can keep up their reputation of improving life in the world and be consistent of the famous line ââ¬Å"Donââ¬â¢t be evilâ⬠.I generally disagree with their decision to relocate as they couldââ¬â¢ve followed the updated utilitarianism and give their services to those who would need them the most. Still they acted the ethical egoism to censor pro ââ¬â democracy sites which are morally good to their perspective. 1. 3. 1. 5Another Example Including Google Google gathers incredible amounts of data on people who use its search engine. As of 2011, the company's website states that although it stores records of your searches as a tool to improve corporate efficiency, it renders them anonymous after nin e months and deletes cookies used to track visitors after two years.Governments could use Google's information to investigate individuals visiting particular websites, however, and Google Earth's photo collection also has raised privacy questions: In 2008, a couple sued on the grounds the online photos of their home violated their privacy, but a judge threw out the lawsuit the next year. This case is provides insight to how Google can be of every use to our society as they can help the government catch fugitives, suspects and criminals with their records of the searches of the every person using their search engines yet this leaves them to violate certain privacy issues when they abuse that kind of power.The lawsuit of the couple may be dismissed by a judge but their lawsuit are supported by ethical theories namely the rights ââ¬â based theories which states that there are social contracts that should be acknowledged and that includes their right for privacy. They may be legal t o store records such as the photo from their Google Earth but they should have to limit their power to exercise their duty as they are also supported by the duty ââ¬â based theories due to their daily or continual task of improving corporate efficiency as well as giving us access to unlimited knowledge. 1. 3. 2 Cybercrime Prevention Act of 2012 (RA 10175) 1. . 3. 1 Preliminary Provisions 1. 3. 3. 2. 1. 1 Brief History of RA 10175 Cybercrime Prevention Act of 2012 or also known as Republic Act No. 10175 was approved on September 12, 2012. This is first law in the Philippines which specifically criminalizes computer-related crimes. The Cybercrime Prevention Act in its current form is the product of House Bill No. 5808, authored by Representative Susan Tap-Sulit of the second district of Tarlac and 36 other co-authors. The final version of the Act was later signed into law by President Benigno Aquino III on September 12, 2012. 1. 3. 2. 1. 1 Declaration of PolicyThe main objective o f this Act is to protect the people from cybercrimes and also from the harmful effects associated with it. The state also aims to recognize the vital roles of information and communications industries in the country. The state also recognizes the need to protect and safeguard the citizens of the state, and also to protect the integrity of computers and its users. The state also wants to recognize the importance of providing an environment conducive to the development acceleration, and rational application and exploitation of information and communications technology. . 3. 3. 2. 1 General Provisions 1. 3. 3. 2. 2. 2. 1 Punishable Acts In this Act, there are 10 punishable acts indicated in the bill, and those punishable acts each have penalties that are associated. In the next sentences, the punishable acts will be discussed briefly. Offenses against the confidentiality, integrity, and availability of computer data and systems: A. Illegal Access ââ¬â accessing a computer or a part of a computer without any right B.Illegal Interception ââ¬â the interception made by the use of any technical device without any right of non-public transmission of datum to or from any computer system including electromagnetic emissions from a computer system carrying such data C. Data Interference ââ¬â the intentional or any reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without any right including the transmission or transferring viruses into a system. One example is the ILOVEYOU message transmitted through electronic mail way back in the year 2000.D. System Interference ââ¬â the intentional or any reckless hindering or interference with a functioning computer system, or a computer network by inputting, transmitting, damaging, deleting, deteriorating, altering, or supressing computer data or computer program without any right or authority in doing so. E. Misuse of Devices ââ¬â the use of any material without any right of it. Acts like producing, manufacturing, selling, and distribution. F. Cyber-squatting ââ¬â the simplest way is identity theft, using another individualââ¬â¢s identity to gain profit or scam other people in the internet.G. Computer-related Forgery ââ¬â the illegal use of a computer into copying oneââ¬â¢s work, and gaining illegal access to a computer to copy the content of a system or database. H. Computer-related Fraud ââ¬â the unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system. I. Computer-related Identity Theft ââ¬â the intentional acquisition, use, transfer, or possession of any identifying information belonging to another person, whether natural of juridical. Under these are Cybersex and Child Pornography. J.Libel ââ¬â à defined as a public and malicious imputation of a crime, or of a vice or defect, real or imaginary, or any acts, omission , condition, status or circumstance tending to discredit or cause the dishonour or contempt of a natural or juridical person committed through a computer system or any other similar means which may be devised in the future. The above stated are the punishable acts by the law enforced and written in the bill, and these acts have corresponding penalties if have been proven to the court. The penalties include: imprisonment or a fine of at least two hundred thousand pesos (Php. 00,000. 00) up to a maximum amount commensurate to the damage incurred or both. Prison mayor is equivalent to imprisonment from 6 years and one day to twelve years. 1. 3. 3 Ethical/ Moral Dilemmas 1. 3. 4. 2 Situation A 16-year old male named ââ¬Å"Josh Evansâ⬠was registered on the account used for bullying messages to a girl named Megan Mier. Lori Drew, the mother of Sarah, a former friend Mier, later admitted creating the MySpace account. She was aided by Sarah and Ashley Grills, an 18-year-old employee of the elder Drew.The senior Drew and several others ran the fake account, with an aim to get information about Megan and use that information against her and also for her to be humiliated. This caused spreading gossips about Megan, and thus creating a traumatic experience not only for her but also to her family. 1. 3. 4. 3 Analysing using the Four Major Ethical Theories A. Duty-based Theory According to the Duty-based theory, an act is considered ethical if it has good intentions. Given the situation, I can clearly state that it is not an ethical thing to do. Creating or spreading false rumours is not even close to be called as a good intention.Also, gathering information about a certain person is not ethical if it will be used against or be held against to a person. Using the Duty-Based Theory, I can clearly state that the situation of gathering information of Megan is not ethical because it does not serve a good intention. B. Utilitarianism According to the Utilitarianism Theory an act is only to be considered ethical if it produces desirable consequences or outcomes. The outcome of the situation stated earlier is that the experience Megan was traumatic not only for herself, but it also affected her family.Just by looking at this outcome, we can say that it is not also considered ethical in this theory, because of the outcomes that the actions of the group had caused not only their target but also the relationship of other people to Megan. C. Social Contract Theory According to the social contract theory an act is considered ethical if the act does not violate any rules or laws; according to the Civil Code of the Philippines: Persons and Family Relations, under Chapter 2 which is Human Relations the Articles 19, 20 and 21 discusses the different rights a person possesses and how a person should exercise his or her rights.Chapter 2 Article 19 presents the basic principles that are to be observed for the rightful relationship between human beings and the stab ility of the social order. Chapter 2 Article 20 presents that you are liable for any damage that you have caused to another person, whether wilfully or negligently. Chapter 2 Article 26 presents that right must never abused, the moment that it is abused, the moment rights are abused they ceased to right. D. Virtue According to the Virtue theory, the action that is considered to be ethical is when the action is came from a good moral principle.Looking to the situation, it is not an ethical thing to do because it does only harm the person involved but also the moral principles of the suspect is to be questioned. 1. 3 Trustworthy Computing 1. 4. 1 Microsoftââ¬â¢s 4 Pillars of trustworthy Computing The 4 Pillars of trustworthy computing help identify the key elements in computing especially in an organization with numerous employees to manage. Guidance is a key to help implement a good and stable system such as how the pillars guide not just Microsoft employees but users alike. 1. 4. . 1 Security Creation of a trust worthy environment for a safe computing environment 1. 4. 2. 2 Privacy The protection and confidentiality of design, development and testing in any organization is essential as to be part of the competitive market today. 1. 4. 2. 3 Reliability Working as expected or promised by the developers and their entity 1. 4. 2. 4 Business Integrity Being responsible and transparent in you duties and expectation as part of a work force that strives to be excellent a mistake is bound to happen.Admitting a mistake is the 1st step to a growing process of learning new things to come. 1. 4. 2 Risk Assessment It is the process of assessing security related risks to an organizationââ¬â¢s computers and networks from both internal and external (Reynolds, 2011) A risk assessment is a process to identify potential hazards and analyse what could happen if a hazard occurs. (Federal Emergency Management Agency, 2013) The assessment would assure the IT security team that they will be ready when an attack comes because of the determined risk assessment they perform. 1. 4. 1 General Security Risk Assessment ProcessStep 1: Identify IT assets and prioritize ones that are of most importance Step 2: Identify the threats/risks that could occur Step 3: Assess the likelihood of threats Step 4: Determine the impact of each threat, how large to small is the impact if affected Step 5: Determine how each threat can be prevented/blocked Step 6: Which is the most effective prevention method Step 7: Perform cost benefit analysis before taking any action Step 8: Make the decision to implement or not to implement the decided risk prevention found through thorough research and development 1. 4. 3 Establishing a security policyDefines an organizationââ¬â¢s security requirements, as well as controls and sanctions needed to meet those requirements. (Reynolds, 2011) A good security policy can possibly improve and provide a smooth flow of operations within an organizati on. NIST (National Institute of Standards and Technology) is a non-regulatory federal agency within the US department of commerce. The computer security division creates security standards for organizations to implement in their own system. 1. 4. 4 Educating the Employees, Contractor and Part-Time Workers Surveys show that most security problems come from negligence and unawareness of the security policies.Teaching good security practices like not giving out your passwords, making sure you do not meddle in different departments. Knowing the Dos and DONTs of everyday computing will help guide any workplace and direct them to the good ways of being a good user. 1. 4. 5 Threat Prevention The key to a threat prevention system are layers of security systems that challenge the perpetrator to hack into the system. Firewall ââ¬â stands guard between an organizationââ¬â¢s internal network and the internet Intrusion Prevention Systems ââ¬â prevents an attack by blocking viruses, ma lformed packets and other threats from getting into a protected network.Antivirus software ââ¬â should be installed on each userââ¬â¢s personal computer to scan a computerââ¬â¢s disk drives and memory regularly for viruses. User accounts that remain active after employees leave cause an uncertain threat to the company, IT staff must promptly delete and make sure to wipe out all the privileges of the former employee. The US-CERT (United States Computer Emergency Network Team) and SANS(SysAdmin, Audit, Network,System) Institute ââ¬â regularly update a summary of the most frequent and high impact threats to a computer system specifically viruses and worms. . 4. 6 Security Audit An important prevention tool that evaluates whether an organization has a good security policy and if it is being followed. An example would be a requirement to change passwords every week or month with this in place a security for companies are much more protected compared to others without this r equirement. Basically to test, check and review the systemââ¬â¢s security and look for loop holes and easy targets. 1. 4. 7 Detection The preventive measures made for a computer system is not always enough to protect important data.Intrusion detection system ââ¬â is a software/hardware that monitors system and network resources, notifies a system admin when an intrusion occurs Knowledge based intrusion system ââ¬â contains information about attacks and system vulnerabilities, then trigger an alarm (ex. Repeated login, repeated data events) Behaviour based intrusion system ââ¬â compares users system behaviour with an admin created model that detects when a user is not following the required model, this would trigger an alarm. (Example: Unusual activity with an account in the HR department accessing the IT departmentââ¬â¢s data. 1. 4. 8 ResponseAn organization should be prepared for the worst, like a system attack that stops all operations and steals data from the co mpany. The top priority during an attack is not to catch the perpetrator but to regain control and save what is left. Who needs to be informed? And who not to notify? Reputation and credibility is at stake in any security breach. A company should document all details of a security breach and be able to review it after to assess and further study. Eradication of the damaged/breached information is essential but before everything a log is required to keep track 1. . 9 Ethical Moral Dilemmas You are a member of a large IT security support group of a large manufacturing company. You have been awakened late at night and informed that someone has defaced your organizationââ¬â¢s website and also attempted to gain access to computer files containing a new product under development. What are your next steps? How much time would you spend tracking down the hacker? -Deontological 1. 5 References * (1999, 10). Electronic Commerce. StudyMode. com. Retrieved 10, 1999, from http://www. studymod e. com/essays/Electronic-Commerce-731. tml * THE ELECTRONIC COMMERCE ACT (R. A. 8792) AN OVERVIEW OF IT? S (INFORMATION TECHNOLOGY) IMPACT ON THE PHILIPPINE LEGAL SYSTEM(2005 006). ââ¬Ëwww. ustlawreview. com/pdf/vol. L/Articles/The_Electronic_Commerce_Act_RA_8792. pdf * What Is the Difference: Viruses, Worms, Trojans, and Bots? ââ¬â Cisco Systems. (n. d. ). Cisco Systems, Inc. Retrieved from http://www. cisco. com/web/about/security/intelligence/virus-worm-diffs. html * What Is A Rootkit? (n. d. ). Internet / Network Security ââ¬â Tips, Advice and Tutorials About Internet Security and Network Security.Retrieved from http://netsecurity. about. com/od/frequentlyaskedquestions/f/faq_rootkit. htm * Julian. (2011). 10 Most Notorious Acts of Corporate Espionage. Retrieved from http://www. businesspundit. com/10-most-notorious-acts-of-corporate-espionage/ * Katich, A. (2013). Anonymous (Annie Katich). Retrieved from http://socialactive. wordpress. com/2013/02/25/anonymous-annie- katich/ * Verini, J. (2010). The Great Cyberheist. Retrieved from http://www. nytimes. com/2010/11/14/magazine/14Hacker-t. html/
Subscribe to:
Posts (Atom)