Thursday, October 31, 2019

Social Policy History Scavenger Hunt Assignment Essay

Social Policy History Scavenger Hunt Assignment - Essay Example Federal law is therefore binding on all states and is superior to state law. Historically all social policies directed towards marijuana have considered its essentially negative impact on the society. The legal history of marijuana shows that the drug has regularly been regulated by the government through different Acts. The role of government has been central in the implementation of laws pertaining to marijuana usage. On several occasions throughout history, regulations restricting marijuana usage have been relaxed and tightened. Since laws vary from state to state, laws pertaining to marijuana usage have also seen many inconsistencies. Despite federal law being superior to state laws and having made marijuana illegal, state laws continue to legalize marijuana usage. In such a case, there is increased confusion regarding what laws should be followed and how states can handle the issue. Federal law has been relatively more consistent with its stand on marijuana usage. However, state laws differ on their stand on marijuana usage. With Washington and Colorado having legalized medicinal and recreational use of marijuana within their states, many other states have been joining in. However, the vast majority of the states still continue to prohibit the use of marijuana. This is due to the social costs of marijuana legalization as a result of which social policy has historically shown great concern for marijuana legalization. The association of marijuana usage with other social vices such as crimes has led social policies to be focused more towards restricting marijuana usage. This stance is aligned with federal law which states that marijuana is illegal. The inconsistencies between state laws have also encouraged people to look for permanent answers in federalism (Reisert, 2015). The similarity between the marijuana legalization issue and social

Tuesday, October 29, 2019

Law and Morality Essay Example for Free

Law and Morality Essay 1. Criminal law is not (just) for the protection of individuals but also for the protection of society ? Moderate / Disintegration Thesis: 1 The state has power to legislate morality in order to protect itself against behaviors that may disintegrate society and its institutions ? Society â€Å"means a community of ideas; without shared ideas on politics, morals, and ethics no society can exist† (Devlin, 10). ? Devlin appealed to the idea of societys moral fabric. He argued that the criminal law must respect and reinforce the moral norms of society in order to keep social order from unravelling. Society’s morality is a crucial, if not the crucial, element that holds it together ? Societies disintegrate from within more frequently than they are broken up by external pressures. There is disintegration when no common morality is observed and history shows that the loosening of moral bonds is often the first stage of disintegration, so that society is justified in taking the same steps to preserve its moral code as it does to preserve its government the suppression of vice is as much the laws business as the suppression of subversive activities. Devlin, The Enforcement of Morals 36 (1959) ? Extreme/ Conservative Thesis: A society is entitled to enforce its morality in order to preserve its distinctive communal values and way of life HART: Hart critiques Lord Devlin’s first argument by challenging his conception of society â€Å"*He has+ a confused definition of what a society is† (Hart (1962) chapter 82). ? Attack against the Moderate/ Disintegration Thesis ? Hart argues that decriminalizing behavior, which has previously been viewed as immoral behavior, is not necessarily a threat to the society’s long-term cohesion or existence. ? [Devlin] appears to move from the acceptable proposition that some shared morality is essential to the existence of any society to the unacceptable proposition that a society is identical with its morality as that is at any given moment of its history, so that a change in its morality is tantamount to the destruction of a society. (Hart 51-52. Italics in original. ) ? The moderate thesis implies factual claims of the disintegration of society for which Devlin did not provide, and (in Harts view) could not have provided, substantial empirical support. DEVLIN: ? I do not assert that any deviation from a society? s shared morality threatens its existence any more than I assert that any subversive activity threatens its existence. I assert that they are both activities which are capable in their nature of threatening the existence of society so that neither can be put beyond the law . I would venture to assert, for example, that you cannot have a game without rules and that if there were no rules there would be no game. If I am asked whether that means that the game is „identical?with the rules, I would be willing for the question to be answered either way in the belief that the answer would lead to nowhere. If I am 1 (Hart’s term H. L. A. Hart, Social Solidarity and the Enforcement of Morality, The University of Chicago Law Review 35 (1976), pp 1-13]. ) asked whether a change in the rules means that one game has disappeared and another has taken its place, I would reply probably not, but that it would depend on the extent of the change. (Devlin, Morals 37). ? Lord Devlin does not then think that this power should be exercised against every single kind and act of immorality. Society should exercise this power only when the moral sensibility of the majority regarding a given immoral activity rises to the level of profound â€Å"intolerance, indignation, and disgust† (Devlin, Morals 17) ? DWORKIN: If society should not legislate against all immorality, because not all immoral activities and acts endanger its existence, then what standards for evidence and action will be used to justify society’s right to enforce its morality in any given case? The threshold criterion that Lord Devlin offers is public outrage, so it comes out that nothing more than passionate public disapproval is necessary after all!? (Taking Rights Seriously. Cambridge: Harvard University Press, 1977, p. 245) ? Attack against the Extreme/ Conservative Thesis Hart rejected the extreme thesis on the ground that it potentially justified legal enforcement of moral values, regardless of their content, simply because they were widely held. Such restrictions restrict society from evolving naturally in terms of its citizens’ moral beliefs practices. ? Devlin? s approach of incorporating moral values into the law â€Å"regardless of content, simply because they were widely held† places â€Å"an unjustified brake on changes in [what should be dynamic ] social mores† (Peter Cane 23). DEVLIN: 2. The content of moral legislation should be determined by what he terms â€Å"public morality†. ? This is not merely the majority position that could be determined by a public opinion poll. Public morality is the view held by the â€Å"reasonable man† /â€Å"right-minded man† ? What is acceptable to the ordinary man, the man in the jury box, who might also be called the reasonable man or the right minded man Devlin The Enforcement of Morals 38 (1959) Devlin chose the man in the jury box because: a) The verdict of a jury (12 men and women) must be unanimous (at the time he was writing) b) The jury will only reach its verdict after the issue has been fully examined and deliberated. c) The jury box is the place where the ordinary persons conception of morality is enforced. ? Elsewhere his comments suggest that the content of public morality can be identified by some kind of moral intuition ? It is the power of a common sense and not the power of reason that is behind the judgments of society†¦There is, for example, a general abhorrence of homosexuality. We should ask ourselves in the first instance whether, looking at it calmly and dispassionately, we regard it as a vice so abominable that its mere presence is an offence. If that is the genuine feeling of the society in which we live, I do not see how society can be denied the right to eradicate it (Devlin, Morals 40). ? As DWORKIN phrases the argument: â€Å"In the last analysis the decision must rest on some article of moral faith, and in a democracy this sort of issue must be settled in accordance with democratic principles. (b) It is, after all, the community which acts when the threats and sanctions of the criminal law are brought to bear. The community must take the moral responsibility, and it must therefore act on its own lights – that is, on the moral faith of its members† (Dworkin, 246-247) HART: ? Distinguishes between Positive and Critical Morality Critical Morality: A statement of what is morally true Positive/conventional morality: A statement of what most people believe is morally true. ? Hart argued Devlin always slipped into the Positive Morality approach. The problem is that beliefs about moral matters change. At any given time in a community, there may be a consensus on some moral questions, while on other questions there will be sharp divisions. Over time, an issue may go from being a matter of consensus to being a matter of controversy, and given enough time, an issue which there was a consensus one way may eventually be a matter of consensus the other way. How can we know that our laws are enforcing society’s moral consensus rather than just protecting the last generation’s prejudices against a consensus forming around another position. (Jurisprudence, theory and contextBrian Bix p. 169) ? The Harm Principle Hart’s2 point of inception was Mill’s ‘Harm Principle’: If there are any ‘Critically Moral Rights’ or ‘Natural Rights’ there must be a natural right of every person to be equally free. Therefore â€Å"The only purpose for which power can rightfully be exercised over any member of a civilised community against his will is to prevent harm to others. †3 ? Starting with the liberty-protecting Harm Principle enabled Hart to cast onto Devlin the burden of proof on the issue of the relationship between immorality and social harm. Certainly, Devlin provided no hard evidence to support his assertion that society would be worse off without legal moralism but neither did Hart provide any factual evidence that society would be a better (or, at least, no worse a) place without legal moralism (Peter Cane 31). ? DEVLIN: the fact that consent is not a defence for various harm-based offences showed that the harm principle was not the laws normative foundation. HART: distinction needed to be drawn between moralism and paternalism. Paternalism is justification of interfering with another person against their will, where that person will then be better off or protected from harm. ? DEVLIN: the existence of the crime of bigamy also undermined the harm principle. HART: distinction needed to be drawn between Harm and Offense. What is wrong with Bigamy is its offensiveness to peoples religious sensibilities. ? DEVLIN: We see (moral) wrongfulness taken into account went sentencing, and we do not premise this on harmfulness because otherwise all crimes will be treated alike whether it was done maliciously or otherwise. HART: distinction needed to be drawn between principles of Sentencing and criminal liability. The fact that the moral gravity of an offenders conduct- its wrongfulness as opposed to its harmfulness can be taken into account in sentencing tells us nothing about the relationship between law and morality. [Hart offers no reason why this should be so (Peter Cane 32)] ? To sum up Hart’s position: Everyone has a priori liberty. Cannot exercise that liberty when it infringes (Harm’s) another’s liberty. A change in social institutions is not the sort of harm from which a society has a right to protect itself. A society’s right to act should be restricted to demonstrable and imminent rather than speculated and distant harm. 2 3 Hart, Law, Liberty and Morality, p. 14. John Stuart Mill â€Å"On Liberty† ch. 1 ? Problem: The law seems to have little or nothing to do with the immediate consequences of the criminalized conduct. These include the criminalisation of attempts, offences of risk-creation, and the acceptability of strict and negligence-based criminal liability. (Peter Cane 33) ? In order to protect the ‘Harm Principle’ there are 2 reactions to criminal liability that seem to contradict the requirement of â€Å"Harm† : 1. Any law that is not premised on harm is wrong, should be decriminalized 2. Attempt to rationalize in terms of the harm principle any and every aspect of the criminal law that appears at first sight to be inconsistent with it. This is the strategy adopted by Gardner and Shute in relation to rape, and their approach could be applied more generally to cover risk-creation and attempts, for instance. We might say (as Gardner and Shute say in relation to rape) that a society in which the creation of certain risks was not a crime, or in which attempting and contemplating crimes were not themselves crimes, would be (in some sense) a worse society to live in than one in which they were. A worry about this sort of argument, however, is that it depends on the aggregate effect of many such acts, and does not seem to justify coercion of any individual. ? Classifying such diffuse effects as harm seem[s] to reduce the significance of Mills principle to vanishing point. 4 Reinterpreting the harm principle to encompass such non-individualized harm =(what Hart called) the moderate thesis in different garb! PETER CANE: ‘Taking Law Seriously: Starting Points of the Hart/Devlin Debate’(2006) 10 (1/2) The Journal of Ethics, Vol. 10, No. 1/2 (Jan. , 2006) ? The debate about the limits of the criminal law has become a debate about the meaning of the harm principle and the definition of harm. Devlins approach was better. He asked a nonleading question: what factors ought to be taken into account in deciding whether conduct ought to be criminalised? Harm (however defined) is one such factor. But should it be given lexical priority over other relevant factors? ? It is easy enough to accept Harts idea that freedom is a basic human value. Human beings are individuals, and being able to express that individuality in ones choices and actions is an essential component of human well-being. Alongside the individuality of human beings, however, their other most noticeable characteristic is sociability. It is not just that most people choose to live in (larger or smaller) communities or that most people belong to various overlapping and interacting groups. People are also heavily reliant on those communities and groups, and on their relationships with other human beings. If individual freedom is a precondition of human flourishing so, too, is membership of communities and groups, and a rich network of social interactions. ? The law has many social benefits: We must view the law positively as a set of social resources rather than negatively as a restraint on individual freedom. ? This misconception arises from an unsophisticated picture of criminal penalties that fails to recognize their variety and the varying degrees to which they invade individual autonomy, and impose harsh treatment on and stigmatize the offender. This is, no doubt, partly the result of Harts argument that rules and principles of sentencing are irrelevant to questions about the limits of the criminal law. This is incorrect: Some conduct should not be criminalised at all, no matter what the penalty. But in relation to some conduct, the answer to the question of 4 N. E. Simmonds, Law and Morality, in E. Craig (ed. ), Routledge Encyclopedia of Philosophy (London: Routledge, 2004), retrieved 19 May 2004 from http:/ www. rep. routledge. com. whether it should be criminalised will depend on whether a suitable penalty is available. Penalties relate to stigma, and stigma relates to informing a societies interactions. ? The conception of the criminal law and of law in general that underpins the Hart-Devlin debate is what we might call a conception of law as coercion. According to this understanding of law, its prime significance and function is to secure compliance with its norms by threats of coercion and imposition of punishments and other sanctions. Laws coerciveness is seen as the characteristic most relevant to determining its proper limits. This is a deficient understanding of law and its social functions. For the typical, law-abiding citizen the significance of law resides not in its coerciveness but in its normativity. Such a person obeys the law not in order to avoid its coercive sanctions but because they consider obedience to be the preferable or correct course of action. A legal system could not operate effectively if this were not so. In this light, we must question whether a theory of the limits of law based on the assumption that law is seen by those to whom it is addressed as an invasion of their autonomy is likely to be sound. Why should we determine the limits of law by reference to the perspective of the minority of people who obey it only because of its coercive capacity, rather than the perspective of those who view law as a legitimate source of standards of behaviour? If law were viewed from this latter perspective, the idea that it might appropriately prescribe standards of behaviour that express shared social values and aspirations would seem much less objectionable. DWORKIN: Distinguishes between Goal-Based Strategy and Rights-Based Strategy: Goal-Based Strategy: Even if the behavior is bad for the community as a whole, just considered in itself, the consequences of trying to censor or otherwise suppress it would be, in the long run, even worse. Rights-Based Strategy: Even if the behaviour makes the community worse off, even in the very long run, it is nevertheless wrong to censor or restrict it because this violates the individual moral or political rights of citizens who resent the censorship. Favouring the Rights-Based Strategy (p. 194) People have the right not to suffer disadvantage in the distribution of social goods and opportunities, including disadvantage in the liberties permitted to them by the criminal law, just on the ground that their officials or fellow-citizens think that their opinions about the right way for them to lead their own lives are ignoble or wrong. I shall call this the right to moral independence, Justification of the Right to Moral Independence Rights are individual’s trumps5 over a background justification for political decisions that states a goal for the community as a whole. If someone has a right to moral independence, this means that it is for some reason wrong for officials to act in violation of that right, even if they (correctly) believe that the community as a whole would be better off if they did. To some extent, the argument in favour of a particular right must depend on which general background justification for political decisions the right in question proposes to trump. 5 Dworking, Taking Rights Seriously Dworkin assumes that the background justification with which we are concerned is some form of utilitarianism, which takes, as the goal of politics, the fulfilment of as many of peoples goals for their own lives as possible. This is the most prevalent background in Western Democracies. Suppose we accept then that, at least in general, a political decision is justified if it promises to make citizens happier or to fulfil more of their preferences, on average, than any other decision could. Suppose we assume that the decision to prohibit pornography altogether does, in fact, meet that test, because the desires and preferences of publishers and consumers are outweighed by the desires and preferences of the majority, including their preferences about how others should lead their lives. How could any contrary decision, permitting even the private use of pornography, then be justified? A proper understanding of the underlying justification for utilitarianism will itself justify the Right. Utilitarianism owes whatever appeal it has to what we might call its egalitarian nature. Utilitarianism claims that people are treated as equals when the preferences of each, weighted only for intensity, are balanced in the same scales, with no distinctions for persons or merit. Even if the majority’s preference (i. e. that which will make the majority happier) is to disadvantage or to advantage a minority, this is inconsistent with the very essence of utilitarianism , so even if it does result in fulfilment of as many of peoples goals for their own lives as possible, utilitarianism cannot allow that without undermining the philosophy that bore utilitarianism itself. Dworkin’s argument, therefore, comes to this: If utilitarianism is to figure as part of an attractive working political theory, then it must be qualified so as to restrict the preferences that undermine egalitarianism. One very practical way to achieve this restriction is provided by the idea of rights as trumps over unrestricted utilitarianism. The right of moral independence can be defended in a parallel way. Neutral utilitarianism rejects the idea that some ambitions that people might have for their own lives should have less command over social resources and opportunities than others, except as this is the consequence of weighing all preferences on an equal basis in the same scales. It rejects the argument, for example, that some peoples conception of what sexual experience should be like are inherently degrading or unwholesome. But then it cannot (for the reasons just canvassed) count the moral preferences of those who do hold such opinions in the calculation whether individuals who form some sexual minority, including homosexuals and pornographers, should be prohibited from the sexual experiences they want to have. The right of moral independence is part of the same collection of rights as the right of political independence, and it is to be justified as a trump over an unrestricted utilitarian defence of prohibitory laws against pornography. Limitations on the Right: (p. 195) Suppose it is discovered that the private consumption of pornography does in fact significantly increase the danger of crimes of violence, either generally or specifically crimes of sexual violence. Or suppose that private consumption has some special and deleterious effect on the general economy, by causing great absenteeism from work. Then government would have, in these facts, a justification for the restraint and perhaps even for the prohibition of pornography that does not include the offending hypothesis either directly, by the assumption that the hypothesis is true, or indirectly, in the proposition that many people think it true. Can we find a plausible justification for restricting the display of pornography that does not violate the right of moral independence? We can, obviously, construct a certain argument in that direction, as follows. Many people do not like to encounter genital displays on the way to the grocer. This taste is not, nor does it necessarily reflect, any adverse view of the character of those who do not mind such encounters. Another may argue, for example, that his own delight in other peoples bodies is lessened or made less sharp and special if nakedness becomes either too familiar to him or less peculiar to those occasions in which it provides him special pleasure, which may be in museums or his own bedroom or both. Or that sex will come to be different and less valuable for him if he is too often or too forcefully reminded that it has different, more commercial or more sadistic, meaning for others. Or that his goal that his children develop certain similar tastes and opinions will be thwarted by the display or advertising that he opposes. None of these different opinions and complaints must be the product of some conviction that those with other opinions and tastes are people of bad character. The Williams Report: If one accepted, as a basis for coercing one persons actions, the fact that others would be upset even by the thought of his performing those actions, one would be denying any substantive individual liberty at all. 5 5 Report, p. 100. Laws against public sex would generally be thought to be consistent with the harm condition, in the sense that if members of the public are upset, distressed, disgusted, outraged or put out by witnessing some class of acts, then that constitutes a respect in which the public performance of those · acts harms their interests and gives them a reason to object . The offensiveness of publicly displayed pornography seems to us to be in line with traditionally accepted rules protecting the interest in public decency. Restrictions on the open sale of these publications, and analogous arrangements for films, thus seem to us to be justified . If one goes all the way down this line, however, one arrives at the situation in which people objected to even knowing that pornography was being read in private; and if one accepted as a basis for coercing one persons actions, the fact that others would be upset even by the thought of his performing these actions, one would be denying any substantive liberty at all.

Saturday, October 26, 2019

Socializing in the internet

Socializing in the internet Socializing in the Internet The Internet, even though it revolutionizes the way people communicate with each other, it could actually be the very cause of many people having an acute case of social defect. Socializing is being rewritten in these last few years, with information going around so easily people are not trying so hard to make human contact, which could be the cause of many people suffering from social defect. Even though it may not be the only cause, it is proven by many research papers that the discovery of â€Å"The Internet† is the main tipping point of the modern social trend. Internet is actually not made to serve the multiple purpose it serve today, it was actually only made to be a place to store information, and even the idea itself is born for military purpose. The original plan is to spread large numbers of information all over the United States, so even if one center of information is destroyed, the information is not completely gone, or at least just the copy of it is missing. Although the U.S. military is the first instance to come up with the idea, the European or to be more specific the people at France is actually the first instance who successfully executed the idea. From there to the development as of today is another story to tell, but what makes it more than an information highway is something not to be missed. Information sharing in its simplest form is through the Internet, and its called an information highway cause the rate of it is mind numbing. Although the rate is relative to its importance and relevance to what most people are searching for, compared to other media the Internet is the fastest. For example, the news of Michael Jacksons death is spread across the world in mere second after the news is announced, and of course, its supported by the quantity of people spreading it. How fast the Internet share information is not just being upheld by the fact of how easily it is to share it, but also by the fact that the quantity of people sharing it is way far from small and the place to share it, is a plenty is an understatement. Once upon a time a boy asks a wise man â€Å"Which is the most; the fishes, or the stars?† then the wise man answered â€Å"The fishes, of course.† â€Å"Why?† the boy asks, the wise man answered, â€Å"Because no matter how much fish you take itll never run out†. As much as there are fish in the sea, there are a lot more places in the Interwebs where people socialize, and that number is increasing day by day just like the fish in the sea. In addition those places are divided into four main categories; forums, chat rooms, blogs, and social websites. One of the oldest place to socialize, and still as strong as it was if not more stronger is the forums, which is the root of everything thats about socializing in the Internet. In essence, Internet still serves its original purpose, and that is a place to gather information. Therefore, the Internet is basically a large forum that involves a humungous number of people from all parts of the world gathered in a single place. Almost everything in the Internet is a forum, only the form is different, and the people participating in it is even more so. Most people wouldnt probably think so, because the Internet have changed so much that its simply hard to be called a forum, though essentially it is. An article is also a forum, because of the comments or critiques that it sparked. Even a simple statement could also grow into a forum depending on the respond it received. In short, everything thats in the internet and receive a response from other people it can already be called a forum, because people are talking about something and discussing it. Forums are not a place for written words anymore, it have evolved to something more. Forums have evolved since its olden times, from town halls, to written things that are on monitors. Though the form is simple, it have proven to be an effective place where people can; discuss things, give opinions, and coming up with a solution. Moreover, there is no discrimination between the members of the forum, in fact anonymity is encouraged to make people focus on the problem at hand rather than the person whos providing the voice. Therefore, the biggest change for forums is its clarity, everybody is taking notice, and everybody is listening. Even so, there are times that a statement needs something to make it clearer. The forums itself is not limited to written words anymore, images are often used to convey the message more clearly or a little more blunt than whats needed. Because sometimes images convey the message more clearly than words, certain forums caters to its needs and they call it imageboards or forums on steroids. In short, imageboards is a forum that puts a full emphasis on the image posted rather than whats written, someone can write the greatest story in the world there, but people would probably not give an ass if it doesnt have the image to support its monstrosity, it is actually better to put a great picture and not write anything about it. 4chan is the greatest example of an imageboards, and at the same time the worst example of a sensible forum. Despite the lack of common ethics (or because of it), many Internet history is made there, even the rules of the internet is born there. Although it sounds crazy, 4chan itself is not a place of common sense, it probably is the place where all the wrong things the Internet have to offer are, and it could actually are where â€Å"curiosity [really] killed the cat†. Even though there are many bad things to say about 4chan, there is also a good side to 4chan. 4chan have been actively organizing protest against The Church of Scientology, a cult that cons people for their money. Surprisingly the protest are well organized, theres not even a single conflict with the official. Whats amazing is they promote healthy protest, where they told all the members to protest on the sidewalk only, even the littlest form of disturbance is not tolerable by members of the protest, and they all actually doing it wearing Guy Fawkes mask. There is another reason to the Guy Fawkes mask other than the impact it brings, and its anonymity. Anonymity is a key ingredient to the whole process, without it, maybe they wouldnt be what they are today or people would look differently to what they are trying to convey. Anonymity is something that couldnt be separated from the modern age forums. Although its not an essential part of a forum, its embedded in the culture. Moreover, people dont care who they are talking to, they only care about what the person say. For that reason, the character is not build by how people look anymore, but it is born by how that person contribute his/her opinions to the forum itself. However, when anonymity is not emphasized, where faster, more personal and contact that is more direct is wanted people usually go to chat rooms. Chatting is like a miniature forum, except it is faster, more personal and more direct than forums, people usually chat with their closest persons, rather than strangers. If forum is a place where people gather to think, then chat rooms is just a place where people just talk or catching-up with the person close to them. The communications in chat rooms are faster because people can get an instant reply, more personal because people choose the person whose participating in it, and its more direct because no one can interfere unless they are allowed to. In its own way, chatting is better, but only at a personal level, and to make a large number of people to voice their opinion needs a lot more effort than what people usually need in a forum. For the reason that each person that they want to talk to have to be available at the same time as they make the chat room. Therefore, even though chatting has its own strong points, it became its own weaknesses at the same time. Then again, what is a problem without a solution, chatting itself has its own kind of forum and they usually call it IRC. IRC or Internet Relay Chat is probably what people call chatting turned upside down, because the order of interaction is reversed. When in normal chats people usually find the one they want to interact with then make a room, in IRC the room is already prepared then people who wants to voice an opinion enters it. To put it in another way the room is not there just for certain people, but also for the people who wants to participate in it. So IRC is putting less emphasize on the personal aspect and focusing it more on the gathering aspect. Even so, IRC is very traditional and old, and not much people develop it mostly because â€Å"why reinvent the wheel?† the system have proven that it works for decades in fact the root of chatting is in the IRC itself. IRC have existed for decades maybe even before the term Internet is widely introduced. The days when messenger software is not even planned computer geeks spend their time chatting in IRC over the internet. Then suddenly a couple of guy thought that why not make it more user friendly, so that more people can use it, and to make it more simple we should put an address to each people rather than just putting a simple username so people can contact each other directly and not interfered by other people. Then e-mail services, messenger software, etc. that supports the chatting protocol comes to life. After that, the history of chatting writes itself as one of the milestones of the modern social trend. After that many things happens in chat rooms, but its not always flowers and rainbows. Chatting is a perfect place for evil-doers to lurk about, many crimes have happened there, mostly that involves kids under age. Nowadays people cant put trust so easily on the people they chat with, the number of people who can do harm is not small, especially people who eagerly offer to meet in person. Therefore kids are usually a soft target to those predators who god knows what reason kidnap them. Many cases of kidnapping or worse child molestation starts with the children making contact with the criminal and as time goes the child starts to put trust in the criminal thats when the criminal starts to take its chance to meet and kidnap the child. Surprisingly this happens a lot, more than anyone couldve imagine, whats worse is the difficulty of catching the criminal is increased because the lack of identity, witness, and location clarity. Luckily, technologies today have advanced far enough for us to detect the location of the criminal, and theres even a department dedicated to tr apping and catching these kinds of criminals. Even so, its still hard to say that its completely safe, because the crime happens in numerous numbers, and their technique in disguising themselves is getting better and better. Rests assure it only needs a little common sense to avoid the crimes happening in chats. The development in chatting is not only on the crime side, but also in its interactivity. As internet connection getting faster and faster, the possibilities expand beyond what people could think of. Now we could not only send text and pictures, we could also send continuous stream of moving pictures, or video is what they call today. With this breakthrough we can see live the person at the other end of the world, and we could actually simulate the whole socializing experience on the internet. Many important meetings are actually done this way, because it is cost effective and less hassle than meeting in person. Even though, its available, people mostly still prefer chatting, simply because it needs way less resource than video chatting. Even if video chatting is grand and all, it has its own disadvantage. If someone wants to have a video chat, the other person must have a webcam or some sort of contraption that can record a video, if not then its impossible to establish it. Besides that it needs a fast internet connection for the experience to go smoothly, so if you have a slow connection might as well not do it. Although, it needs plenty of resource, people still go through miles for it, simply for the experience. For those reason people still prefer chatting than video chatting because its simple and straightforward. But if someone wants to express themselves better, chat room is not the place, they usually use what they call a blog. Blog is what people call the modern diary minus the privacy, more or less a journal. People usually makes blog to express their inner feelings, whether its sadness, happiness, or just a little something in between. Blogs ranges from talking about casual daily lives, to topics that baffle the minds. People even use it to store their precious moments by writing it in their blog, or maybe they want the world to know about their wonderful experience. Therefore, blog are places where people can express everything you want, but dont be surprised if theres a response from other people. Many people actually hope for their blog to get a response, in a way they want attention. By putting their views on the internet, they are shouting in a big open field filled with many people crossing from many places around the world, hoping that they would get a response. Heaps of people would probably ignore it, but peoples that share the same interest in their views would probably willingly listen to what they say, and with pleasure provide support, question or constructive criticism as to what they write about. However not all response are positive, there are usually people who simply like to spam, or vent their frustration to what other people say. Negative response, is usually initiated by a different view as to what the writer says, and what actually makes it negative and not constructive is the fact that they cant give enough reason to oppose the idea. In addition, most of it is because they simply want attention and want to disturb other people. Another form of negative response is when they promote their own blog senselessly without even contributing any plausible response whatsoever. But whats dangerous is when negative response gives birth to flame wars. Flame wars is when two or more people are trying argue as to what they think is right, or people usually call it an unhealthy debate. Even though a flame war usually happens in forums, it could actually happen in blogs as well, often at that. This war is usually born when someone propose one thing is better than another, and people starts to support it and other simply not agree with it. As a result, people are trying to prove their argument, and mostly with little vocab held back. Despite that flame wars could actually have positive result, because we can get more information from the facts that they provide while they are arguing. Although blogs are usually a place to lament, its functionality has actually gone beyond that what people might think of. Blogs have many functions in this modern age such as, money maker, news source, reviews, just to name a few. These functions show that blogs have limitless possibilities, and its function depends on what the owner desire. In fact, not many people use blogs for diary anymore, people usually use it for something else. There are many reasons as to why people start doing this, and one of it is about the thing that makes the world go round. Because people can get money out of blogs, not small numbers of people thought to stereotype their blog for the masses, so it can get more popularity that equals to more income. In addition, its also one of the reasons why many people are making one. Even though, its hard to make any amount of money thats worthwhile to spend on, people are still trying to venture in this business, since it doesnt need too much effort and resources to start with. There are many blogs that is successful and making an amazing amount of money with their blog, not only that their large income is huge, their fame rose as their income skyrocketed. Fame is not exclusive to the real world only, but its also available in the internet. Many stars are born from the internet, and some of them enter the TV business, like Perez Hilton, and Danny Choo. These peoples, who are famous, usually offer exclusive content that are not available at any other blog. Therefore, many people always come back to their blog, and the people who dont know their blog will know because their names echo through the internet. Surprisingly, the source of their income is the same as those TV companies, and it is advertisement. Advertisements on the Internet are spawning like a colony of ants that found a whole heap of sugar. There is almost not a single page on the internet that doesnt have any advertisements whatsoever, not only blogs, many websites are supported by advertisements that are shown there. Sometimes there is website that has too many advertisements that it got to the point where its not worth it anymore to go there. Various ways are made to force the user to see the advertisements, and sometimes the user fights back with an ad-blocker they install on their browser. However some websites didnt allow the usage of such stuff, by blocking the user to their content if they install an ad-blocker. But no matter how much advertisements people put it is useless if there is no one that visit their blog, thats why there are many services that offer popularity. These services that offer popularity, is usually a website that ranks blog and list them, there is also a website that aggregate links that are usually focused on a specific genre or field, and blogs could also provide these kind of services. Blogs provide the service by sharing their link with one another, by doing that they are making a vast network that connects to one another. People usually use this method because it needs little effort than other method, though its not highly effective, at least it brings some more traffic. While the other method takes a little more effort, it brings more traffic than sharing links with other blogs, like ranks blog and list them. Websites that rank blog and list them are usually a good place to start popularizing a blog, because they provide an easier way for other user to find your blog. But it needs more effort on the blog owner side, they need to register to the website that provide the service, and its usually followed with a certain catch or qualification that needs to be fulfilled before the blog is accepted to be listed at their website. Although, the qualification are not that intricate to fulfill as websites that aggregate links. Aggregate means a collection or a cumulative of something, so links are being collected and shown, and these websites are usually split between genre or field. The qualifications to these websites are usually more intricate than the ones that ranks and list blog. However they usually share one common qualifications and that is the maturity of a blog, how much post have that blog post, or how long have it been standing. These qualifications are strongly upheld to sustain the quality of the links there. Without those qualifications some random links would just enter, even the ones thats not related to the website, and people will start to rarely go there because the quality of the links available there. Whats amazing is these websites automatically post the link of the new post with the same time as when the owner posts its recent post. As a result, what people get at those websites are near live update of the blogs that are registered at that site, with that people can rest assure th at they get the latest from their favorite blogs, and the blog owners can relax that their blog are shown with each new post. Links are not the only thing that aggregate on the internet, but people also. People that dont know; facebook, friendster, and websites that are alike to those, are probably living under a rock. These websites are the craze of the modern age, and probably one of the biggest tipping points in the modern social trend. Social websites is what they usually call it, websites like these offer the best in social interactivity over the internet. In addition, people can stay in touch with their dearest friends, even though they are miles away or on the other side of the world. However, their interaction is not limited to the people they know in the real world, but they also interact with the people they just know over the internet. Social websites expand the world of many or opening the door to a whole new universe to countless people. Gone are the days where peoples social connections are limited to the place where they live or where they have gone to, its only limited to how far people are willing to go to find the person they are looking for. As a result, people are interacting at an amazing speed, and socializing on steroid is an understatement. Social interactivity is highly different in social websites, people interact like they do in real life minus the face-to-face, but plus the media interactivity. Media interactivity is enhanced greatly in social websites, in fact it maybe one of the advantage that it have contrast to other form of socializing in the internet. People can share things more easily in these websites, though they mostly share it with the people they know. They can even share a live update about their daily lives if they want to, and everything that you change or input to, can have a comment, even the most absurd thing. Socializing is all about interactivity or response, and that is what social websites is, its a place where people can positively expect a response from someone you know. People usually comment on photos that capture a special moment, a video that makes them laugh their ass off, or the sudden change in marital status. To comment on everything is not a taboo anymore, in fact its a culture that just appear naturally on the scene. But all this interactivity sometimes makes people forget that real life actually exists. Shut-in are people that somehow dont care about the real world that much, they completely replace reality with everything virtual, its like they completely move their mind somewhere else. Since socializing itself is changing, peoples habits are too. Things like going outside are a taboo for them, and socializing in real life is somewhat something impossible to do. People like these usually shut themselves in their room, and utilize their internet connection to their fullest potential. However, people like this can be considered a hero in the internet with their contribution to the community its in. Heroes in the internet world can actually be a loser in the world, because their focus lays too much on the things available in the internet. This reason, cause delusion to many people who have set their heart on the internet, they abandon their life completely for their own selfish reason. In addition, they cant differentiate between something that is real and something that is not. Their image of reality is distorted in such a way that they are afraid of whats to come in reality. In the end, everything thats good always has a dark side to it. In conclusion, though the modern social trend is a breakthrough out of the old socializing method, and brings many benefit and conveniences to a lot of people, it also brings numerous negative effects. Therefore, any technologies no matter how ideal it is, will always show the bad in people if they are used recklessly or for terrible purpose. However only at these kinds of times that people are starting to show whats been hiding in them, either its the good or the bad, people could only hope for the best.

Friday, October 25, 2019

why kids kill parents Essay example -- essays research papers

Introduction to Psychology Why kids kill parents BY Kathleen M. Heide Psychology Today Magazine HOW A LEGACY OF CHILD ABUSE LEADS TO HOMICIDE I chose this article because I have always been astonished at how children can do this to their parents and what drove them to the choices they made. Did they have any other choices or did they use all of their chooses up that they had? This article supplied a lot of answers to me. According to this Article: Between 1977 and 1986, more than 300 parents were killed each year by their own children. &nb... ...ot his father once, he was then afraid his father would be okay and come after him again when he was well, so he shot him again to make sure his father would not be able to do that. To end with a quote from the article; " The true killer in these cases is child mistreatment." "Damage comes not only in human carnage but in the death of the human spirit that persistent abuse often carries out."

Wednesday, October 23, 2019

Be My Brother

Belonging and alienation is the process of being either excluded or accepted by the society in which you live. Belong is a human conception,mostly considered a fundamental human need and a source of survival, safety, protection and happiness. To belong is usually considered positive and essential for a successful existence:however a negative sense of belonging:found among the displaced, marginalised and uncared for can lead to many social, filial and personal problems that can be almost insurmountable for the individual.The short trop fest film â€Å"Be My Brother† by Genevieve Clay 2009, represents these ideas through the films central characters. The film deals with society and people with disabilities feeling displaced within society due to prejudices. It also displays the notions of disconnection and isolation within the family home of the main character and his brother. The viewer here develops a strong connection to the idea of alienation and not belonging. The short fil m â€Å"Be My Brother† explores the concept of isolation through disabilities.Richard the protagonist is born with a disability and is isolated from society. Richard feels as though he doesn’t exist around his brother Damien. As the film progresses, Richard the protagonist meets a girl names Amanda and she neglects him at first, though she discovers another side to him, and so form a relationship with him. Social acceptance is the process of affiliation with society, but within the film â€Å"Be My Brother† it begins with the exclusion of the main character that has a disability. This is evident when Richard meets Amanda for the first time.As she see’s Richard approaching, she immediately moves towards the edge of the seat. The wide shot used in this scene indicates Amanda’s discomfort, where it demonstrates her fear towards people who are physically different. Furthermore, as Richard offers his hand to Amanda for a handshake, she quickly touches h is hand, and faces the other way. The close up shot within this scene reveals Amanda’s disgust towards Richard through hand gestures, where it emphasies her cruelty and superiority towards him.Clothing in this segment plays a crucial role. Amanda is wearing black clothing, which portrays her social standing, which represents class, elegance, and wealth, whereas Richard is wearing brown clothing, expressing dull, inferior and being less important. The full shot used demonstrates the relationships between characters, and where they stand in society. In addition, social acceptance can be displayed within the family. Richard feels displaced around his brother Damien.This is exemplified in the scene where Damien wearing a black hoodie with his hood up, incorporated with the wide shot depicts resentment and exclusion, where Damien feels embarrassed about his brother because he has a disability. The black hoodie symbolises something evil and depressed which contributes to the isolat ion Richard is experiencing. As Richard passes his hand with the audio recorder to Damien, Damien promptly tries to avoid Richard by moving his head. The close up shot allows the audience to see Damien’s facial expression conveying Damiens arrogance towards Richard.Social acceptance is the key concept within the film â€Å"Be My Brother†, where cameral angles and clothing play a crucial role in revealing the idea of feeling accepted and to belong within society. Disconnection and isolation is portrayed throughout the film between Richard and his brother. The negative sense of belonging, where someone feels isolated; found among the marginalised and uncared for can lead to anger and disappointment. The ideas of isolation can be seen at the beginning of the film. The extreme long shot at the beginning of the film reflects the setting, as Richard is disconnected from society.The blur of the background enhances Richards loneliness and societies prejudice against people wit h disabilities. Furthermore, the aspect of displacement can be manifested in the segment where Damien is sitting by himself at the bus stop and Richard is standing up, expressing his point. The major quote Richard plays in his audio recording â€Å"I am what I am, I can’t change that, my brother doesn’t seem to understand, he seems like he doesn’t want to be near me, I seem to always embarrass him and I don’t like to be ignored! shows evidence of self-expression where Richard seeks to be accepted by his brother and society. Anger and disappointment emerges within the audio recording which shows Richards frustration towards his brother, creating tension and indicating family breakdown.However, Damien experiences a change of heart when he is unable to pay his bus fare. Richard steps in and pays the driver. The long shot used in this scene culminates Damien’s feelings towards his brother, creating a journey as he walks down the narrow bus path toward s his brother and he is thinking and taking into account what his brother did for im and how he has treated his brother. The notions of anger, resentment and embarrassment slowly fade away as he takes off his hoodie and Richard hugs him. This important factor leads to acceptance with his brother and the formation of a positive family relationship. Disconnection and isolation is portrayed throughout the film between Richard and his brother, although it diminishes when Damien comes to the realisation that he is taking his brother for granted and thus the film shapes our understanding of belong and alienation.Ultimately the short film â€Å"Be My Brother† has further developed the understanding of belonging and alienation. Details of the social acceptance, disconnection and isolation portrayed throughout the film between Richard and his Brother, all expose â€Å"belonging and alienation† as a human conception whereby to belong is usually considered positive and to not bel ong leads to marginalisation. The feeling of belonging means acceptance however if someone is under the threat of not belonging the feelings of isolation, anger and disappointment emerge.

Tuesday, October 22, 2019

The Changing World of Women essays

The Changing World of Women essays As a daughter living in a strict environment and living in a traditional ways, things get a little rough. My father is center of the household, so basically everything he says goes. In the western world its usually the other way around, its usually both the parents that have a say in things. In my society(Muslim society) my mother has a say in nothing unless my father asks. My mother is an excellent mother but she mustnt say anything or it would be considered not being a good wife. As I get older I am always dreading the day I am asked to be married. I know times have changed but I have a major dilemma. Am I going to marry or continue my education? The problem is I like working with medicine and I want to further my education by going to college. But that requires a minimum of six years university attendance and if I want more degrees that another five years. Most of my medical friends that are females married and had children while they were studying in college. I dont want that to be me. I want to actually finish something I start. My father isnt exactly helping me with the situation. He hates the fact that I want to work. In his case, women are not supposed to work unnecessarily if their husbands can provide for them(or their fathers can provide for them if their not married), but in a place like Saudi Arabia where men and women dont mix at work, working just enhances the mind and makes one wiser to the ways of the world. In my mothers opinion, women become better companions to their husbands who should be more understanding and supportive. I feel that instead of being selfish, we can work out ways that help us be good mothers, wives and also continue with our needs of life. If education is one such need, then there are ways to acquire it without causing disturbance. I think my father needs to catch up with the rest of the ...

Monday, October 21, 2019

How to spell in lieu of

How to spell in lieu of How to spell in lieu of How to spell in lieu of By Maeve Maddox Whenever I come across an unusual misspelling, I do a search to see how common it is. This misspelling of in lieu of caught my attention: †¦so i can run keynote in leu of having to use powerpoint. A Google search for in leu of brought up about 23,600,000 hits. The bank is asking if we would like to do a deed in leu of foreclosure. I was told I could take jail time in leu of the fine. Hair flower in leu of a veil Anyone ever use duct tape in leu of rim tape? How long can I leave potatoes in the ground? (in leu of storage) To be fair, most of these examples are from forums and comments. Google does ask Did you mean in lieu of? The expression came into English from French en lieu de, in place of, from the Latin phrase in loco, in place of. Our English word instead is a calque of these foreign expressions. It was written as two words, in stead, until the 17th century. Stead means place, as in homestead. Bottom line: If youre not sure how to spell in lieu of, you can use instead of instead. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Spelling category, check our popular posts, or choose a related post below:15 Terms for Those Who Tell the FutureThe Parts of a Word20 Movies Based on Shakespeare Plays

Sunday, October 20, 2019

The Link Between Artists and Bipolar Disease essays

The Link Between Artists and Bipolar Disease essays About 1% of the world's population is thought to have some form of bipolar disorder, from mild to severe. Statistically, men and women are equally represented. Approximately 1 in 5 people with bipolar disorder eventually commit suicide. This is 30 times higher than the general population! Bipolar disorder is also known as manic-depressive illness. It is a brain disorder that causes shifts in a person's mood, energy, and ability to function. What happens when a person has bipolar disorder is they go through current episodes of mania and major depression. Unlike the normal ups and downs that everyone goes through, the symptoms of bipolar disorder are very serious. A person that has this illness can have mood swings that go from a very high point (mania) to a very low point (depression) and can usually have periods of normal mood in between. Some people may have symptoms of both mania and depression at the same time, while others may have only slight symptoms of mania. These symptoms worsen and usually result in damaged relationships, poor job or school performance, and even suicide. The only positive aspect of bipolar disorder is that it can be treated and the people who have this illness can recover and lead a happy life. Most of the time, bipolar disorder develops in late adolescence or early adulthood. Some people do have their first symptoms during childhood, and some develop them late in life. Bipolar disorder is very hard to be recognized as an illness, so people may suffer for years before it is properly diagnosed and treated. The symptoms for mania are; increased energy, increased activity, restlessness, racing thoughts, rapid speech, euphoria, irritability, distractibility, decreased sleep requirement, poor judgement, increased sexual drive, denial, overspending and risky behavior. The symptoms for depression are; persistent sad or empty mood, fee...

Saturday, October 19, 2019

Aspects of E-Commerce Business Solutions Coursework

Aspects of E-Commerce Business Solutions - Coursework Example The four basic technological trends that have led to a change in the technological environment within and outside an organization are as follows: - The doubling of computer power every 18 months, which we also refer to as the Moores Law; - Advancement in data storage and research techniques; - Advancement in the field of telecommunication; - The Internet. The Need for these premises in the modern day organization is as follows: - Business Transformation: this includes a class of services aimed at carrying out relevant research and applying the interpretation of the data emanating from the same in order to transform the company and render exponential growth to its operational effectiveness. - Systems and technology consultancy: this includes working with private as well as public companies and corporations to source and provide information regarding financial services, energy, government and public services, manufacturing and telecommunications, among many others, so as to promote the scope for strategic partnerships between the public and private corporations for a better information base that will help all aspects of a business. - The world has shrunk to a small speck called E-commerce, where it is now possible to exchange goods and money in the form of normal transactions. Shopping on the Internet or online shopping as it is more popularly known is that form of shopping that has almost emptied shopping malls in various parts of the world. For success in this kind of trading and information, it is important to stimulate the customer or end user in ways that will be different from normal marketing. (Nemetz, 2002) For example, it is not possible for a customer to feel the fabric of the shirt he is about to buy from an online trader. So what is it that is supposed to draw him? Similarly, the housewife cannot smell the coffee beans that she is being offered on an online grocery store – so how does she know it will be something that she will relish every morning? These are the questions that are often asked in the arena of the Internet and E-Commerce. In this regard, all the answers point towards specific simulation application that may be used and categorized as aids in online shopping.

Friday, October 18, 2019

Core nursing competencies Essay Example | Topics and Well Written Essays - 250 words

Core nursing competencies - Essay Example In fact research done in the California State, revealed that BSN nurses had a mean income of $75,000 while ADN nurses scored a mean of $70,000.In addition, the interview showed that ADN programs were favored because, they are less expensive and the student took less time to complete the course. On the other hand those who advocated for the BSN program did so stating that one had higher chance of progressing in the nursing career and also that their chances of entering into a more advanced nursing program were higher ( Masters, 2009). Majority of those interviewed in the class of Graduate (MSN, DNP, PH.D) were comfortable with their working category and conditions. They stated that they were valued just like many doctors are and that they are in most cases incorporated in many major decision making situations. They generally felt that they were on top of their career hence the satisfaction ( Masters, 2009). In conclusion, there are many challenges that a nurse faces in their career and many emerge from discrimination due to their education level. This has made the nursing profession to be undermined yet it carries the most important weight in the health care sector. Therefore these debates need to be addressed so that there can be a clear guideline that all nurses will follow so that they can attain

Should women be allowed in combat Essay Example | Topics and Well Written Essays - 1500 words

Should women be allowed in combat - Essay Example Others suggest that women are not fit for combat service and are a detriment to the effectiveness of any fighting force. The truth is that women should not be permitted to serve in the armed forces in combat roles even should they wish to do so. Another argument, which is not currently relevant but which may occur at any time, is whether or not women should be drafted into the armed forced should a draft be reinstated. This raises interesting issues. In the course of this paper I will examine some of the objections to the idea of women serving in the armed forces and I will conclude by discussing the potential issues around a draft. The preponderance of evidence suggests that women are ill-suited for combat missions. Gender roles have changed a great deal in the decades since the 1960s when women began to enter the workforce in droves. The rise of human rights law required companies and the government to find ways to accommodate women, who were often unable to display the same streng th as men. Firefighting units altered their training regimes, for example, in order to accommodate women. All of these things are impressive achievements. We should celebrate the continued integration of our wives, sister, daughters, and mothers into society at large and into the workplace. Women need to play a more substantial and significant role in the world. But where can that line be drawn? Critics of deploying women in combat roles point to the various accommodations made to women in different sectors of society. They suggest that there is no room for accommodations in wartime. It would be nice to have more physically disabled people on the battlefield in order to encourage diversity, but they would compromise the mission. Only the most physically and mentally fit individuals should form the tip of the spear, the combat units that make up the military. This is the crux of the opposition to women in the military. In the American military today, women are not involved in combat roles. They make up only around 14 percent of the active Army (Army.mil). Catherine Ross served in Iraq as a civil affairs sergeant attached to a combat brigade and argued recently that women should be allowed to serve in combat roles. While in Iraq, I was directly attached to an infantry battalion. I went everywhere they did, lived as they did and faced the same dangers they did every time I went â€Å"outside the wire† to conduct infrastructure assessments, which was nearly every day. There is nothing special or unique about what I experienced. Many female soldiers have been or currently are in the same situation — going outside the wire and facing the possibility of I.E.D.’s, small arms fire and more. The fact is that as â€Å"support† we end up attached to infantry, artillery and other combat arms units, and make enemy contact. Despite this, I was blind to the big picture. I suppose I had just guzzled down the Kool-Aid and drove on. It took getting ou t of the Army for me to see how women in the military are truly viewed and treated (Ross). With due respect to Ms. Ross, her observations do not make an especially strong case for allowing to fight in the military. She may have returned in one piece from Iraq, but despite the fact that she was in a combat zone she did not have to survive the stress and difficulty of engaging the enemy in a combat sense. There are a number of powerful arguments which she overlooks when

Case study Essay Example | Topics and Well Written Essays - 250 words - 45

Case study - Essay Example Cost reduction capabilities help the company to minimize operational cost and other overheads. Bella enjoys technological capabilities by producing less sophisticated products that would sell easily for customers’ consumption. The first set back that fails Baton is the sudden departure of a project manager at St Louis. The human resource finds it complicated to recruit new individuals to occupy the vacant positions. Baton faces serious technical problems and sourcing issues such as pairing of Audio-to-Digital Converter (ADC) with a higher performing low noise amplifier. Asia does not manufacture a microcontroller making the company purchase it from America causing much delay and in effect raising the cost of acquisition. Conflict of interest between design and manufacturing sections contributed to Baton failure (Leonard &Young 2012). Bella India should take on project TKO and develop EKG because of the fast growing market despite the competition faced. The low costs of their products attract the customers. Services such as warranty would outdo the competitors. The management team has the knowledge of the market places ensuring penetration and conquering new markets. Organization’s strategies such as designing a simple and affordable portable equipment (2kg) that would connect a larger community gearing its

Thursday, October 17, 2019

7 Coursework Example | Topics and Well Written Essays - 250 words

7 - Coursework Example Why third factor is the one that coke is targeting is because it has already served the first two factors. It fulfils the physiological factor because it is a drink which people can have to quench their thirst. It also fulfils the safety aspect indicating that the customers have trust in the product, believe that it is of best quality and safe for their health. Open happiness. This is one of the latest additions of the coke bubbles campaign which urges customer cognition to relate coke to happiness. Happiness is when you share, be with friends and family and intimacy. (Below) Thanks for the pause that refreshes. This ad gives people a sense of belonging. They love Santa, kids adore him and people like him. He is a symbol of a festive season where families come together and enjoy. This indicates love and be loved which reinforces the third need in Maslow’s theory.(right) This caters to the Esteem need of its consumers. Everyone has the need for respect and self esteem. Its people and portfolio vision connects with the stakeholders as one that gives a sense of contribution, belonging and self

In Which Ways and to What Extent Can GMO Products Harm Health Research Paper

In Which Ways and to What Extent Can GMO Products Harm Health - Research Paper Example On the other hand, researchers have reached a concession that there is more to genetically modified crops other than just the high productivity. In essence, these products have negative health impacts on human beings and this is something to worry about. In Japan, the consumption of wheat has increased right from the period after the Second World War and the country has failed to satisfy this demand. Therefore, the country relies on import of wheat from other nations. The concern for human health in Japan has seen the import of wheat from other countries being stopped as the controversy of genetically modified wheat becomes a reality. Evaluation of a wide range of materials reveals that genetically modified food products have both the good and bad sides of it. The website resource provides the true definition of genetically modified organism and their social economic impacts. Genetically modified organisms (GMO) refers to a wide range of plants and animals that are genetically manipu lated to provide desirable impact in productivity of Agricultural products. The motive of this scientific action is to provide the world with a better sustainable economic environment where every country can sustain its population. In many countries, this culture has helped the agricultural sector to experience a drastic shift in productivity. However, this resource also states in black and white about the negative impacts of this science that has intruded the natural agricultural style. Among the listed effects of this science is that the consumers of these food products will experience a lower nutrient level, antibiotic resistance, more cases of food allergy and poisoning. This is the impact that Japan anticipates as they continues to import wheat from other nations. In reality the resource provides an explanation for the possible reason why Japan declined import of wheat from other countries. The superiority of this resource lies in its deep coverage of the matters surrounding th e controversy of genetically modified products. Karimi (2013), a website updater, presents a rather biased GMO timeline and the historical development of this agricultural technology. The GMO matter started way back in 1935 and a slow and progressive development of the technology has made the topic a sensitive matter today. It provides a broad coverage of the legal aspect of the GMO since its first development and its acceptability in many countries today. Although the website appears to be subjective and over-scores on the negative impacts of the GMO in the society, it provides a ground to understand the proliferation of GMO culture in the world today (Greider, 26 Oct. 2003). This timeline coincides with the import culture of GMO in Japan since the time when the country’s demand for wheat increased. In Japan, the country import culture developed shortly after the Second World War (1945) and has continued to grow. This historical coverage points out to the possible period tha t Japan has suffered from the unlabeled GMO wheat until 2012 when the country became more conscious of the GMO products. The Public press channels have played a great role in asserting the public on the nature of this new technology and garnering public opinions on the matter. Strom (2013) wrote an investigative article to garner public opinions on their take on the proliferation the GMO technology and its impact on

Wednesday, October 16, 2019

Case study Essay Example | Topics and Well Written Essays - 250 words - 45

Case study - Essay Example Cost reduction capabilities help the company to minimize operational cost and other overheads. Bella enjoys technological capabilities by producing less sophisticated products that would sell easily for customers’ consumption. The first set back that fails Baton is the sudden departure of a project manager at St Louis. The human resource finds it complicated to recruit new individuals to occupy the vacant positions. Baton faces serious technical problems and sourcing issues such as pairing of Audio-to-Digital Converter (ADC) with a higher performing low noise amplifier. Asia does not manufacture a microcontroller making the company purchase it from America causing much delay and in effect raising the cost of acquisition. Conflict of interest between design and manufacturing sections contributed to Baton failure (Leonard &Young 2012). Bella India should take on project TKO and develop EKG because of the fast growing market despite the competition faced. The low costs of their products attract the customers. Services such as warranty would outdo the competitors. The management team has the knowledge of the market places ensuring penetration and conquering new markets. Organization’s strategies such as designing a simple and affordable portable equipment (2kg) that would connect a larger community gearing its

Tuesday, October 15, 2019

In Which Ways and to What Extent Can GMO Products Harm Health Research Paper

In Which Ways and to What Extent Can GMO Products Harm Health - Research Paper Example On the other hand, researchers have reached a concession that there is more to genetically modified crops other than just the high productivity. In essence, these products have negative health impacts on human beings and this is something to worry about. In Japan, the consumption of wheat has increased right from the period after the Second World War and the country has failed to satisfy this demand. Therefore, the country relies on import of wheat from other nations. The concern for human health in Japan has seen the import of wheat from other countries being stopped as the controversy of genetically modified wheat becomes a reality. Evaluation of a wide range of materials reveals that genetically modified food products have both the good and bad sides of it. The website resource provides the true definition of genetically modified organism and their social economic impacts. Genetically modified organisms (GMO) refers to a wide range of plants and animals that are genetically manipu lated to provide desirable impact in productivity of Agricultural products. The motive of this scientific action is to provide the world with a better sustainable economic environment where every country can sustain its population. In many countries, this culture has helped the agricultural sector to experience a drastic shift in productivity. However, this resource also states in black and white about the negative impacts of this science that has intruded the natural agricultural style. Among the listed effects of this science is that the consumers of these food products will experience a lower nutrient level, antibiotic resistance, more cases of food allergy and poisoning. This is the impact that Japan anticipates as they continues to import wheat from other nations. In reality the resource provides an explanation for the possible reason why Japan declined import of wheat from other countries. The superiority of this resource lies in its deep coverage of the matters surrounding th e controversy of genetically modified products. Karimi (2013), a website updater, presents a rather biased GMO timeline and the historical development of this agricultural technology. The GMO matter started way back in 1935 and a slow and progressive development of the technology has made the topic a sensitive matter today. It provides a broad coverage of the legal aspect of the GMO since its first development and its acceptability in many countries today. Although the website appears to be subjective and over-scores on the negative impacts of the GMO in the society, it provides a ground to understand the proliferation of GMO culture in the world today (Greider, 26 Oct. 2003). This timeline coincides with the import culture of GMO in Japan since the time when the country’s demand for wheat increased. In Japan, the country import culture developed shortly after the Second World War (1945) and has continued to grow. This historical coverage points out to the possible period tha t Japan has suffered from the unlabeled GMO wheat until 2012 when the country became more conscious of the GMO products. The Public press channels have played a great role in asserting the public on the nature of this new technology and garnering public opinions on the matter. Strom (2013) wrote an investigative article to garner public opinions on their take on the proliferation the GMO technology and its impact on

Racism in the Tuskegee Experiment Essay Example for Free

Racism in the Tuskegee Experiment Essay The Tuskegee experiment, begun in 1932 by the United States Public Health Service in Macon County, Alabama, used 400 black men who suffered from advanced stages of syphilis.   This study was not a means of finding a cure; the patients offered no preventative measures to prolong or better life.   Although the history and nature of syphilis was well understood, certain scientists believed that more research could certainly be done. In terms of whom to study, the doctors developing the format discovered a â€Å"ready-made situation† (Jones 94). Macon County Alabama was impoverished, like much of the country in 1932.   The selection process began during the depression, a time of separation and intolerance.   In the rural South, where we find Tuskegee, the men chosen were not seen, at the time, as equal in any sense of the word. Jones refers to prominent doctors of the region who, in the late 1800s, scientifically defined diseases that were peculiar to the race.   One such disease, Cachexia Africana, caused the subject to eat dirt.   The public did not question such obviously ridiculous claims at the time.   In fact, the public heralded these doctors and requested a manual for treating blacks in order to save slave-owners and the like money in paying for doctors (17).   Given the distaste for the ethnicity of the subjects, could their ethnicity have been a factor in the selection process? At the time, the medical profession had already made some false assumptions about the African American race in general.   Jones reiterated the white-held theory that black men had larger penises and little constraints when it came to sexual intercourse (23).   It was also believed that they were harder to treat for syphilis because African Americans were stupid. In examining this mindset, it becomes clear why the government erringly felt it should go to the poorer black communities in rural Alabama conduct a syphilis study.   Believed to be an immoral sex-centered culture placed at the level of animals, the government would put them in league with mice and rats.   As disgusting as the premise is, the doctors needed lab animals and set out to find them. If this were true – how could the government get away with it?   Blatant disregard for humanity and life could not go unnoticed.   However, the geographical area in question had just been the last state of the union to discontinue chain gang use in its penitentiaries in 1928.   The South had not yet begun to consider African-Americans as people not in the slightest meaning of the word. Jones reiterates the sentiment of the doctors at the time and place with, â€Å"short of a ‘quick-fix’ by science requiring no behavior changes by blacks, there was no hope for the race† (26). The Health service claimed they informed the subjects of their disease, although an internship at the time the experiments began, Dr. J.W. Williams, stated the men received no such information.   He also claims the internships registered the data collected without understanding the nature of the experiment either (Jones 5). The term ‘racist’ as defined in the Random House Webster’s College Dictionary reads, †a belief or doctrine that inherent differences among various human races determine cultural or individual achievement, usually involving the idea that one’s own race is superior† (1072).   Given this definition, it is clear that the Tuskegee experiments were racist.   To withhold the nature of the experiments from the subjects, the name of the disease, the treatment of its symptoms and to feel no remorse in inflicting this sort of medical indictment on fellow human beings is not just racist, but also immoral and unjust. Jones points out the Health Services did investigate the treatment of these patients in an Ad Hoc committee.   The resulting medical treatments for the wives and children of the male subjects was offered with no cash restitution allowed (214).   In the end, the government did agree to $10 million dollars in payments to the â€Å"living syphiltics†, the next of kin for those already dead, â€Å"living controls† and the next of kin for the dead controls.   If you had been living with the disease and never treated, you would get a grand total of $37, 500; a paltry amount for the pain and suffering from neglect and racist bigotry (217). Works Cited Jones, James H. Bad Blood: The scandalous story of the Tuskegee experiment – when government doctors played God and science went mad. New York, NY: The Free Press, 1981. Random House Webster’s College Dictionary, 2nd Ed.   New York, NY: Random House, 1997.

Monday, October 14, 2019

Raspberry Pi Foundation DDoS Attack

Raspberry Pi Foundation DDoS Attack E Crime The perfect ‘E Crime’ – The Raspberry Pi Foundation Assessment: The perfect ‘E Crime’ – The Raspberry Pi Foundation Table of Contents 1 Introduction 1.1 Aim 1.2 Methodology 1.3 Justification 2 What is E-Crime? 2.1 Types of E-Crime? 3 The Raspberry Pi Foundation 4 The Attack 5 DoS attacks 5.1 DDoS attacks 5.2 Botnets 5.3 Protocol Attack 5.4 SYN Flood 6 Tools 6.1 High orbit ion cannon 6.1.1 High Orbit Ion Cannon Capabilities 6.2 Apache Killer 7 Defending DDoS 7.1 DDoS Defence System 7.2 DDoS Defence System Benefits 8 Example of a DoS attack 8.1 DoSing a website 8.1.1 The Result 9 Possible Perpetrators 9.1 Threat Agents 9.2 Who are the perpetrators? 10 Conclusion 11 References Figure 1 DDoS Attack Figure 2 High Orbit Ion Cannon Figure 3 Apache Killer Figure 4 DDoS Defence System Figure 5 Command Prompt Figure 6 Low Orbit Ion Cannon ready Figure 7 Low Orbit Ion Cannon attacking Figure 8 Low Orbit Ion Cannon URL Figure 9 Result of a successful DoS on a website 1 Introduction In this report the information will be based around a case study of an e crime against a SME (small-medium enterprise) that has taken place during the past 10 years. The story that has been chosen is the Raspberry Pi Foundation that was hit by DDoS attack on the 7th march 2013. The report will then explain how a cyber-criminal might have conducted this particular crime and try to assess the method and processes they might have used, including the tools, both hardware and software. While discussing tools, the report will show an example of how the tools are used to commit the crimes used from the story. The report will also show how you can defend systems from the attack that was chosen. 1.1 Aim The aim of this report is to demonstrate an understanding of cyber-attacks that are used against small, medium enterprises, and the tools (software and hardware) they use to be able to carry out these attacks. 1.2 Methodology This report was compiled utilising secondary resources, including a variety of books obtained from the library, as well as internet sources such as websites and PDFs. 1.3 Justification E-Crime Wales have documented that a Denial of service attack is one of the most common types of E-crime. (E-Crime Wales, 2012) Denial of service attack was chosen because it’s one of the most common e-Crimes out there, it is also probably one of the easiest attacks to perform, the tools used for this type of are attack are freely available to find and download, easy to use and very powerful. The company chosen was a SME and the attack was done in the last ten years. 2 What is E-Crime? E-Crime is a criminal activity where a computer or computer network is the source, tool, target, or place of a crime. E-Crime is not necessarily just for computing purposes; E-Crime’s can also be crimes such as fraud, theft, blackmail, forgery and embezzlement. E-Crime is quite difficult to become aware of and also punish because of how difficult it is, and also because attackers are able to hack victims thousands of miles away. Due to E-Crime getting a lot bigger and technology is becoming more advanced, new threats are rising very quickly and are also quite difficult for companies and people to react to them. (E-Crime Wales, 2011) 2.1 Types of E-Crime? According to the UK Government, around 87% of small businesses were victims of a security incident in 2013 up 10% and the average cost of a companys worst incident was  £35,000  £65,000 (Gov, 2013) In Wales alone it is estimated that attacks from e-criminals cost the economy around one billion. This includes financial loss, interruption of business, theft of valuable data, identity theft and a lot more caused by unauthorized access to systems. (Prior, N, 2013) Types of E-Crime are as follows: Hardware Theft Identity Theft Phishing Pharming Malware Virus’s Cyber Terrorism 3 The Raspberry Pi Foundation The Raspberry Pi Foundation is charity that was founded in 2006 which is supported by the University of Cambridge Computer Laboratory and Broadcom. The charity is there to promote computer science in schools, and is the developer of the single board computer the Raspberry Pi. In 2011, the Raspberry Pi Foundation developed a single-board computer named the Raspberry Pi. The Foundations goal was to offer two versions, priced at around  £30. The Foundation started accepting orders for the higher priced model on 29 February 2012. (Raspberry,FAQ, 2009) 4 The Attack The main attack was the third attack of out of seven days. The foundation was attacked on the afternoon of the 3rd march, where the site was disrupted for about an hour. The foundation was then again attacked two days later on the 5th march, but nothing happened and the attackers gave up after a few hours, finally on the evening of 7th March 2013, the Raspberry Pi Foundation website was attacked by a nasty Distributed Denial of Service (DDoS) attack. The servers where hit by a SYN flood, a botnet that contained around 1 million nodes. This caused the website to become very slow, especially the forum pages. The website was also down for a few hours. This attack proved to be the worst out of the three attempts. 5 DoS attacks DoS refers to â€Å"Denial of service† attack. A DoS attack is an attack that can make a web resource unavailable to its users by flooding the target URL with more requests than the server can handle. That means that regular traffic on the website will be either slowed down or completely interrupted. (Bull Guard, 2012) 5.1 DDoS attacks DDos refers to â€Å"distributed denial of service† attack. A Distributed Denial of Service (DDoS) attack is a DoS attack that comes from more than one source at the same time. A DDoS attack is generated using thousands can be up to hundreds of thousands of zombie machines. The machines used in such attacks are known as â€Å"botnets† in this attack there were around one million nodes in the botnet. The botnets are normally infected with malicious software, so they can be remotely controlled by the attacker. Attackers usually create the denial-of-service by either consuming server bandwidth or impairing the server itself. Targets are normally web servers, DNS servers, application servers, routers, firewalls and Internet bandwidth. (Verisign, 2012) Figure 1 DDoS Attack 5.2 Botnets Criminals use bots to infect large numbers of computers. These computers form a network, or a botnet. Criminals use botnets to send out spam email messages, spread viruses, attack computers and servers, and commit other kinds of crime and fraud. If a computer becomes part of a botnet, then the computer might slow down and maybe unintentionally be helping criminals. (E-CrimeWales, 2011) 5.3 Protocol Attack The attack used against the raspberry pi foundation was a SYN flood from a botnet. This is called a protocol attack. Protocol attacks include attacks such as SYN floods, fragmented packet attacks ETC. These types of attacks target server resources, firewalls and load balancers, and is measured in Packets per second. 5.4 SYN Flood A SYN flood DDoS attack exploits a weakness in the TCP connection sequence which is known as the three way handshake, SYN requests to start a TCP connection with a host must be answered by a SYN-ACK response from that host, and then confirmed by an ACK (ACKnowledge) response from the requester. In a SYN flood attack, the requester sends multiple SYN requests, but sometimes it doesn’t respond to the host’s SYN-ACK response, or sends the SYN requests from a spoofed IP address. Either way, the host system continues to wait for acknowledgement, binding resources until no new connections can be made, and then resulting in a denial of service attack. (Incapsula, 2012) 6 Tools 6.1 High orbit ion cannon Figure 2 High Orbit Ion Cannon (Breeden, J, 2012) The High Orbit Ion Cannon is a tool used mainly by anonymous but also used by other hacktivists. The High Orbit Ion Cannon is an upgrade of the Low Orbit Ion Cannon, but it seems that the High Orbit Ion Cannon is mainly used to just DoS websites instead of servers, which you can do on the Low Orbit Ion Cannon. The High Orbit Ion Cannon is able to use custom scripts to target more than just a website’s home page. Instead of visiting the site from a fake user, the High Orbit Ion Cannon targets sub-pages. So the attackers try to visit the welcome page, help pages, article pages and anything else a victim site has to offer. This method prevents some firewalls from recognising that the website is being attacked. Even if they do detect what’s happening, they will have trouble shutting down because the software is sending multiple fake users to multiple pages within a domain. (Breeden, J, 2012) The High Orbit Ion Cannon is really not that powerful for single users if they want to attack a big organisation, Anonymous say at least 50 people need to attack a big organisation in order to take the website down. In this instance a single user could of used this type of tool to bring down the Raspberry Pi Foundation website for a few hours, mainly because the Foundation wouldn’t have (or very little) Anti DDoS software to have been able to stop the attack. (Breeden, J, 2012) 6.1.1 High Orbit Ion Cannon Capabilities High-speed multi-threaded HTTP Flooding Simultaneously flood up to multiple websites at once Scripted Boosters to handle DDoS counter measures and increase DoS output. Generating Multiple HTTP Header to create the genuine traffic flow scenario. (Avkash, K, 2012) 6.2 Apache Killer Figure 3 Apache Killer (Expert Hacker Home, 2012) Apache killer is a DDOS/DOS tool written in Perl which sends HTTP get requests with multiple byte ranges, these byte rangesoccupya wide variety of portions in the memory space. Byte Range helps browsers or downloading applications to download required parts of files. This helps reduce bandwidth usage. While the script sends dozens of unsorted components in the request header to cause the apacheserver to malfunction. (Rafayhackingarticles, 2012) If the attack is successful the results can be devastating and can end up in rendering the original operating system unusable only if the requests are sent parallel. (Hoffman, S, 2011). 7 Defending DDoS There are a number of ways to defend against DDoS attacks: Black-holing or sinkholing: This approach blocks all traffic and diverts it to a black hole, where it is discarded. The downside is that all traffic is discarded good and bad, packet-filtering and rate-limiting measures simply shut everything down, denying access to legitimate users. (ComputerWorld Inc, 2004) Routers and firewalls: Routers can be configured to stop simple ping attacks by filtering nonessential protocols and can also stop invalid IP addresses. However, routers are pretty much useless against a more sophisticated spoof attack and application-level attacks using valid IP addresses. Firewalls can shut down a specific flow associated with an attack, but like routers, they cant perform anti-spoofing. (ComputerWorld Inc, 2004) 7.1 DDoS Defence System Figure 4 DDoS Defence System (Coreo Network Security, 2012) The DDoS Defence System (DDS) prevents DDoS attacks from crippling firewalls, intrusion prevention systems (IPS), switches and targeted web and DNS servers. It stops all types of DDoS attacks and maintains full availability without effecting performance. DDS provides maximum protection for critical IT assets while allowing full access to legitimate users and applications. (Coreo Network Security, 2012) DDS detects and blocks all forms of DDoS attacks, including: Application layer Network layer flooding Specially crafted exploits Reflective Outbound attacks 7.2 DDoS Defence System Benefits Detects and mitigates both traditional network-layer DDoS attacks and more advanced application-layer attacks Protects your network, allowing legitimate communications to pass without delay provides automated real-time defence against identified DDoS attack sources 8 Example of a DoS attack The following attack was performed in a virtual environment using DoS and DDoS software. In the example the DoS tool that was used was the Low Orbit Ion Cannon and Windows server 2008. Figure 5 Command Prompt As you can see in figure 5, it shows a simple IPconfig command to show the IP address for the attack. Figure 6 Low Orbit Ion Cannon ready In Figure 6 you can see that the Low Orbit Ion Cannon is ready to set off. As you can see the Server 2008 IP address has been locked on ready for it to be DoS’ed. Just underneath the address you can see the speed of the attack, the faster it is the more requests that are sent to the server, underneath that it then shows the method, port, thread and timeout for the attack. Figure 7 Low Orbit Ion Cannon attacking As from figure 6 you can see all the things are the same and ready to go. After clicking â€Å"IMMA CHARGIN MAH LAZER† you can see the attack is working by looking at the bottom of Figure 7 where it is showing the number of requests being sent. That number was just after around one minute of the server being attacked, so the amount requested would be a lot higher after around five minutes time which would probably be enough time. The purpose of Dos’ing a server is so that it stops any requests to that server, it sends multiple fake requests to the server stopping anything else being connected to it. 8.1 DoSing a website Figure 8 Low Orbit Ion Cannon URL The Low Orbit Ion Cannon can also be used to DoS a website, by simply typing in the website you want to DoS in the URL tab, click lock on and then fire the cannon. The purpose of DoSing a website is by flooding the target URL with more requests than the server can handle causing the website to crash and to be temporarily unavailable. 8.1.1 The Result Figure 9 Result of a successful DoS on a website If a DoS/DDoS attack is successful on a website then this is normally what you’ll see when you try to access the website, the DoS attack has clearly crashed the website and caused it to offline. 9 Possible Perpetrators The Possible perpetrators could be a number of people or organised crime. Even though there is no evidence from the foundation on who was behind the attack or the location it came. 9.1 Threat Agents The possible threat agents that could have been behind this attack are as follows Employees Government agencies Hacktivists groups e.g. Anonymous Organised criminals 9.2 Who are the perpetrators? From conducting the research there is no evidence of who was behind the attack and where that attack had come from. Looking at the possible threat agents it’s very unlikely that the attack could of come from a government agency or a type of hacktivist group such as anonymous, Lulzsec etc, if the attack came from one of them two types of threat agents the attack could have been a lot more sophisticated and could have caused a lot more damage. The Raspberry Pi Foundation quote that the attacker was probably â€Å" an angry confused kid† which is easy to believe considering the attack was attempted multiple times throughout that week, but its possible that the attack may not be linked to the same person, it could also be the same attacker with help from others to make sure the attack was successful or it could have been another attacker. The foundation says that the attack was probably for financial gain but there is no comment of any data being stolen. 10 Conclusion Throughout the report it shows how frightening it is that any sorts of hacker or hacktivist group are willing to attack anyone. It’s scary to think that even charity websites are vulnerable to attacks. Looking at this attack the foundation is lucky that it wasn’t attacked by a bigger threat agent from a hacktivist group which could have caused a lot more damage. The report also shows how easy it is to get your hands on the tools that are commonly used, how easy they are to use and how powerful they actually are. The examples of the attacks show how powerful the tools can be, the Low Orbit Ion Cannon sends a high amount of requests to servers and websites in a short space of time. 11 References Raspberry, FAQ. (2009). About Us. Available: http://www.raspberrypi.org/about. Last accessed 19/03/2014. E-Crime Wales. (2011). What is e-Crime?. Available: http://www.ecrimewales.com/server.php?show=nav.8856. Last accessed 17/03/2014. Breeden, J. (2012). Hackers new firepower adds firepower to DDOS. Available: http://gcn.com/Articles/2012/10/24/Hackers-new-super-weapon-adds-firepower-to-DDOS.aspx?Page=2. Last accessed 18/03/2014. Expert, Hacker Home. (2012). Latest Methods of DDoS attacks. Available: http://experthackershome.blogspot.co.uk/2012/07/ddos-attacks-in-2012-latest-method-of.html. Last accessed 18/03/2013. E-Crime, Wales. (2011). Botnets Explained. Available: http://www.ecrimewales.com/server.php?show=nav.9390. Last accessed 26/03/2014. Coreo Network Security. (2012). How to stop DDoS Attacks. Available: http://www.corero.com/en/products_and_services/dds. Last accessed 27/03/2014. ComputerWorld Inc. (2004). How to defend against DDoS attacks. Available: http://www.computerworld.com/s/article/94014/How_to_defend_against_DDoS_attacks. Last accessed 27/03/2014. Bull Guard. (2012). What are DoS and DDoS attacks?. Available: http://www.bullguard.com/bullguard-security-center/internet-security/internet-threats/what-are-dos-and-ddos-attacks.aspx. Last accessed 20/03/2014. Verisign. (2012). What is a DDoS attacks?. Available: http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/ddos/ddos-attack/index.xhtml. Last accessed 20/03/2014. Incapsula. (2012). DDoS Attack Types. Available: http://www.incapsula.com/ddos/ddos-attacks. Last accessed 20/03/2014. rafayhackingarticles. (2012). Apache Killer. Available: http://www.rafayhackingarticles.net/2011/08/zero-day-dos-vulnerability-in-apache.html. Last accessed 23/03/2014. Hoffman, S. (2011). Apache Killer Tool Exploits DoS Flaw. Available: http://www.crn.com/news/security/231600200/apache-killer-tool-exploits-dos-flaw.htm. Last accessed 23/03/2014. 1