Thursday, October 31, 2019

Accounting Final Common Assessment Paper Essay Example | Topics and Well Written Essays - 1000 words

Accounting Final Common Assessment Paper - Essay Example This is also carried out to ensure that the information provided by the accounting function is meaningful and relevant to its users. Every organization does have an accounting function to assist in recording and reporting of financial information generated from different activities of the business. The data processed by the accounting function can be useful to users of this information in many ways. This paper looks at the role of accounting in organizations and its importance in terms of managing a business. Furthermore, it will delve the usefulness of the accounting information generated the accounting function. The importance of accounting function in any organization cannot be ignored. It is considered as an independent function which is responsible for gathering information from different business activities and then compiling and publishing them in accordance to the reporting standards. The role of accounting has changed over the years. It is not just limited to reporting of financial information to external users, but also is responsible for performing various other tasks in any organization. Accountants are involved in planning and implementation of the company’s strategies through different processes.... For example, inventory of a company can be recognized and recorded using four different methods such as First In First Out (FIFO), Last In Last Out (LIFO), Average Cost, and Output Method. It should be noted that different methods of recording inventory will yield different results in the same year, and companies have the choice of selecting a method and reporting their inventory according to the requirements of reporting standards. However, it should also be highlighted that the choice of different accounting methods should be in accordance to the requirements of accounting standards. In the recent years, several frauds surfaced the US corporate sector, which were blamed on the inherent loopholes and too much flexibility in the US GAAP. Since then, efforts between FASB and IASB are being carried to improve the accounting standards and reconcile methods of recording and reporting different elements of a business. One of the core functions of accounting is to collect data from differe nt business segments and process it into a form of information, which is understandable, relevant, and complete. Each business segment performs different activities and produce data which has to be consolidated by the accounting function of organizations. This information is referred to accounting information that may exist in different forms. Traditionally, this information was only available based on paper based working methods. However, as information technologies have been developed the accounting function has been shifted to computerized systems. These systems allow systematic entry of data and then making this information accessible to accountants who then process this data using various tools to generate financial information. In

Tuesday, October 29, 2019

Terrorism, Its Cause and Its Solution Essay Example for Free

Terrorism, Its Cause and Its Solution Essay Political Parties and Their Roles A political party is defined as an organised group of people with at least roughly similar political aims and opinions, that seeks to influence public policy by getting its candidates elected to public office. Parties tend to be deeply and durably entrenched in specific substructures of the specific society in a sustainable and well functioning democracy. They can link the governmental institutions to the elements of the civil society in a free and fair society and are regarded as necessary for any modern democratic system. Political parties perform key tasks in a democratic society, such as 1. socialising and educating voters and citizens in the functioning of the political and electoral system and the generation of general political values 2. balancing opposing demands and converting them into general policies 3. Activating and mobilising citizens into participating in political decisions and transforming their opinions into viable policy options 4. Channelling public opinion from citizens to government 5. Recruiting and training candidates for public office. Political parties are often described as institutionalized mediators between civil society and those who decide and implement decisions. By this, they enable their members’ and supporters’ demands to be represented in parliament and in government. Even though parties fulfil many vital roles and perform several functions in a democratic society, the nomination and presentation of candidates in the electoral campaign is the most visible function to the electorate. To perform the above mentioned tasks and functions, political parties and citizens need some rights and obligations guaranteed or ruled by constitution or law. These include * Freedom of organisation * Freedom to stand for election * Freedom of speech and assembly * Provision of a fair and peaceful competition * Mechanisms of plurality * Inclusion in the electoral process and contacts with the EMB * A  level playing field and freedom from discrimination * Media access and fair reporting * Transparent and accountable political finance The internal functioning of individual political parties is to some extent determined by forces that are external to political parties, such as the electoral system, political culture, legal regulations, etc. However, internal processes of political parties, such as the personality of leaders and staff, the ideological foundations, party history, and internal political culture are considered to be even more influential on the internal functioning. If a political party would like the democratic principles of electoral politics to be applied within the party, they may consider practices like internal information and consultation processes, internal (formal or informal) rules and structures for the organisation and decision-making within the party, and transparency in the party’s functioning at all levels. Party members may also take on more formal roles in decision-making like participating in internal elections for leadership positions or in selecting the party’s candida te(s) in the upcoming elections. Many parties also work actively to enhance the role oftraditionally under-represented groups in their parties. Role Of Political Parties In spite of the Founders’ intentions, the United States in 1800 became the first nation to develop nascent political parties organized on a national basis to accomplish the transfer of executive power from one faction to another via an election. The development and expansion of political parties that followed was closely linked to the broadening of voting rights. In the early days of the republic, only male property owners could vote, but that restriction began to erode in the early 19th century as the result of immigration, the growth of cities and other democratizing forces, such as the westward expansion of the country. Over the decades, the right to vote was extended to ever larger numbers of the adult population as restrictions based on property ownership, race and sex were eliminated. As the electorate expanded, the political parties evolved to mobilize the growing mass of voters as the means of political control. Political parties became institutionalized to accomplish this essential task. Thus, parties in  America emerged as a part of democratic expansion, and, beginning in the 1830s, they became firmly established and powerful. In recent decades, increasing numbers of individual voters classify themselves as â€Å"independent,† and they are permitted to register to vote as such in many states. Yet, according to opinion polls, even those who say that they are independents normally have partisan leanings toward one party or another. Political Parties play various role such as; role in elections, role in local government,role in Policy macking,Role in government and role in a democracy.these role are explain given below. 1.Election Process: Election is the fundamental part of the government which was founded on the principle that the power to govern resides in the people.Elections provides the mean by which the people delegates this power to elected representative.By voting for government officials,the public makes choices about policies,programs and future direction of government actions.At the same time election make government officials accountable to their constituents.Elected officials must conduct themselves in responsible manner and take into account popular interest and the wishesof those they represent.Otherwise they risk being voted out of office.This system depends primerily on the voters.The electoral process only work if people participate. 2.Functions of political Parties: Political parties perform an important task in government. They bring people together to achieve control of the government, develop policies favorable to their interests or the groups that support them, and organize and persuade voters to elect their candidates to office. Although very much involved in the operation of government at all levels, political parties are not the government itself, and the Constitution makes no mention of them. The basic purpose of political parties is to nominate candidates for public office and to get as many of them elected as possible. Once elected, these officials try to achieve the goals of their party through legislation and program initiatives. Although many people do not think of it this way, registering as a Democrat or Republican makes them members of a political party.  Political parties want as many people involved as possible. Most members take a fairly passive role, simply voting for their partys candidates at election time. Some become more active and work as officials in the party or volunteer to persuade people to vote. The most ambitious members may decide to run for office themselves. 3.Role in policy making: Political parties are not policymaking organizations in themselves. They certainly take positions on important policy questions, especially to provide alternatives to the position of whichever party is in power. When in power, a party attempts to put its philosophy into practice through legislation. If a candidate wins office by a large majority, it may mean that the voters have given him or her a mandate to carry out the program outlined in the campaign. Because President Bill Clinton failed to win a majority of the popular vote in both 1992 and 1996, few considered his victories a mandate for any specific policy or ideology. President George W. Bush also entered office without a clear mandate, because his opponent, Al Gore, won more votes (and might have won the Electoral College if not for irregularities, such as confusing ballots, in Florida). 4.Role in Democracy: Democracy can be defined as rule for the, of the, by the peole.Actually it would be a means by which a government can run.infact democracy is based on free and fair Election machenism,adult francise,participation of all people in decision making etc. freedom of all parties to take part in election is one of the most importent thing so as to assure democracy or again democracy is maintain when there is morethen one political party it reflect public opinion and mass participation in decision making for their own.so the existence of political party implice the range of democracy. 5.Role in Local Government: Local candidates standing on a party card should have the advantage of a protective and developmental party machine behind them, schooling them beforehand on the issues, means and procedures of local government. In, practice however, this rarely, if ever, happens. Strategic advance thinking  and preparation – and the organisational focus and capability to deliver it – is, somehow, not the British thing. In theory, Independent candidates cannot be expected to have such support, while in practice, they are no more enabled or disabled by this than are their party political rivals. Where party backing comes into play is, to a degree, in the matter of campaigning. Behind party candidates is some sort of a ‘machine’ – not, actually a realistic concept in the ad hockery of local government at all levels. But there will at least be a knowledge of what to do and how to do it. This can be as much a disadvantage as an advantage as it will tend to perpetuate the status quoand to lack innovation; although it has great practical value in access to existing lists (the word ‘database’ would, in most cases, be stretching the point) and contacts. Party-based candidates will generally be given – or have imposed upon them – overarching, party-driven manifesto commitments to flesh out the paragraphs in their election literature and save them the trouble of thinking too much. Independents fly absolutely solo on the means and content of their campaigns. They have neither guidance nor instruction nor any or much campaigning infrastructure. 6.Regional Division and Politics of Alliances: Although the political contest in Pakistan is often depicted as a battle between the two major parties, this is something of a fallacy. Notably in the smaller provinces, strong regional-based parties have existed since the creation of Pakistani, and this tendency has continued till the present date, providing perhaps some indication of the ethnic, and ideological, diversity in the country. One of the parties which most effectively demonstrates the ethnic nature politics has frequently pursued in Pakistan is the Muttahida Qaumi Movement (MQM), a party which holds almost total sway as far as electoral success is concerned in the Sindh capital of Karachi – Pakistan’s largest city, gaining over 5 per cent of the national vote in both 1988 and 1990, an astonishing figure given its narrow base. On both occasions this translated into 13 National Assembly, and 28 Sindh seats. The MQM boycotted the 1993 polls. In the 1997 polls, it again claimed a share of just under 5 per cent of the  vote, which gave it 12 seats in the NA. 7.Political trends: While in terms of numbers, the political parties engaged in the electoral contest in Pakistan is great, this does not represent, in ideological terms, a political diversity. The class base for most of the parties has failed to move beyond the traditional elite which wields influence in Pakistans politics, and even when representatives from the middle-classes have emerged, as in the case of those making up the leadership of the MQM, they heave tended to articulate interests based on factors of ethnicity, other narrow categories, rather than on the basis of broader class interests. Moreover, in terms of ideology, the major political parties have been moving closer towards each other, and generally steering away from agendas advocating radical social change. The divide in terms of policy is narrower than ever before, and despite their vociferous attacks on each other, and the deep-rooted polarisation which often prevents them from coming together even on matters of common interest, the leading parties in the country represent a single force, rather than a range of groups articulating different, conflicting interests.The virtual disappearance of the left from electoral politics in Pakistan has aggravated this tendency, with conflict between parties based largely on rhetoric or highly personalised attacks on party leaders. The fact that, on the basis of political opportunism, members of one party are frequently willing to switch alliances and move to another group perhaps reflects the extent to which politics in the country have been stripped of ideological beliefs or commitment. And, even for the parties themselves, it is electoral pragmatism aimed at increasing vote banks and seat shares which for the most part dictates strategy, rather than the pursuit of the lofty ideals detailed in party manifestoes.

Sunday, October 27, 2019

The differences of Ethnic cleansing and Genocide

The differences of Ethnic cleansing and Genocide research methodology: The research conducted herein is primarily doctrinal in nature, with the help of various international instruments and judgments decided by the judicial authorities in the international sphere. research questions: Basic Questions: Through the medium of this project the basic questions that have been asked are: What is meant by ethnic cleansing and genocide? Secondly whether there exists any difference between the two? What are these differences? HYPOTHESIS: There exist distinguishing factors between both the crimes of genocide and ethnic cleansing, the only distorting factor is when the latter is achieved by committing genocide. Both, ought to be treated as equally grave crimes committed against humanity. Moreover, a need is felt for stricter laws on ethnic cleansing in order to serve as deterrence to the same. objects and aims: The project has been made on the basic premise of the crime of Ethnic Cleansing with the background of the break up of the Former Yugoslavia, replete with crimes of a grave nature. In order to understand this concept of Ethnonationalism, it is also important to understand another international crime, genocide. Ergo, this project aims at achieving the following in lieu of the research available: To attain clarity as to the concepts of Ethnic Cleansing and Genocide. To surmise the incidents of the two types of international crimes and look at various judicial interpretations and legal instruments for the same. To try and arrive at a clear cut distinction between these two concepts which can be perceived to be intertwined. This project aims at serving as a panacea to innumerable ambiguities found on the laws of ethnic cleansing and to acquaint various interested parties on the aforementioned topic which is, as of now, a morass of laws involved. INTRODUCTION: As long as I have any choice, I will stay only in a country where political liberty, toleration, and equality of all citizens before the law are the rule. -Albert Einstein. For centuries, man has been fighting with his brother, over man-made issues of differences in their status, nationality, race, colour, religion to name a few. In India itself, this differentiation has taken shape in the form of differences in class, differences between Muslims and Hindus, Sikhs and Christians, recent incidents taking place in Orissa and Kerala are gory examples of the same. In fact, this in essence has also taken place in Maharashtra in 2008 wherein almost 20,000 North Indians fled Pune and other such cities, the same revealed by an article in the Indian Express. Statistics in fact have shown that man is being a threat himself to another man causing his mass exodus. Despite the advancement in technology man doesnt seem to want to co-exist with another, a deficiency which will lead to its self-destruction sooner or later. This is essentially the concept of ethnic cleansing, an international crime progressively taking more antagonistic forms as time passes. In principle, an ethnic group  [1]  would be defined as a community whose heritage offers important characteristics in common between its members and which makes them distinct from other communities. There is a boundary, which separates us from them, and the distinction would probably be recognized on both sides of that boundary. Ethnicity is a multi-faceted phenomenon based on physical appearance, subjective identification, cultural and religious affiliation, stereotyping, and social exclusion.  [2]   The phrase ethnic cleansing was originally introduced by reporters covering the Yugoslav wars of disintegration between 1991 and 1995, but as a course of action it is much older than that.  [3]  By definition, it has been defined as a phenomenon wherein one ethnic group expels members of other ethnic groups from a geographic area in order to create ethnically pure enclaves for members of their ethnic group.  [4]   However, the complexities involved when it comes to ethnic cleansing, is that till date despite the number of occurrences there exists a blur when it comes to differences between genocide and ethnic cleansing.  [5]  Also, the number of incidents wherein ethnic cleansing has taken place makes one question the effectiveness and the authority of the UN and the several other peace keeping bodies.  [6]   It is also pertinent to note that while in theory, the purpose of ethnic cleansing is to drive all members of the victimized group out of a territory. In practice, ethnic cleansing is nearly synonymous with genocide because mass murder is a common characteristic of both. Though, therefore, there is a thin line between the two crimes, it is the need of the hour to differentiate between the two crimes and do away with the pervasive ambiguities. analysis: genocide and its incidents: In order, to be able to differentiate between the concepts of genocide and ethnic cleansing it is first important to understand each of these concepts individually. Ergo, this part will basically focus on the definition of genocide as arrived at in several landmark judgments and also its main essentials, with the natural corollary of looking at the definition of ethnic cleansing. The term genocide was coined by Raphael Lemkin using the combination of the Greek word genos (race or tribe) and the Latin word cide (killing).  [7]  Article II of the Convention on the Prevention and Punishment of the Crime of Genocide, 1948 defines the term genocide to include killing, causing serious bodily or mental harm, amongst several other things  [8]  , which was accepted as being part and parcel of the customary international law or jus cogens in the case of Prosecutor v. Goran Jelisic.  [9]   The case of Advisory Opinon of the International Court of Justice (ICJ) in Reservations to the Convention on the Prevention and Punishment of the Crime of Genocide, defines genocide as follows: a crime under international law involving a denial of the right of existence of entire human groups, a denial which shocks the conscience of mankind and results in great losses to humanity, which is contrary to moral law and to the spirit and aims of the United Nations.  [10]   Genocide without exceptions made is considered to the most despicable crime when it comes to crimes against humanity, which is why Courts are reluctant in arriving at a conclusion which affirms the existence of genocide. It essentially requires two components for the said crime to take the form of genocide, viz. Actus Reus and Mens Rea. These go hand in hand wherein if any of the acts mentioned above have been committed with the necessary specific intent (dolus specialis).  [11]   In the Jelisic  [12]  case it was held that the special nature of this intent supposes the discriminatory nature of the act wherein a group is targeted discriminatorily as such and in this context genocide is closely related to the crime against humanity.  [13]  The Court again found the existence of this specific intent in the case of Akeysu  [14]  wherein the Trial Chamber I held that the rape of Tutsi women in Rwanda in 1994 constituted the crime of genocide.  [15]  In the case of Bosnia-Herzegovina v. Yugoslavia it was held that genocide could be committed both at time of peace as well as of armed conflict.  [16]   Therefore, a perusal of the aforementioned cases clearly shows there is a need of specific intent in case of indictments for the crime of genocide.  [17]   Ethnic Cleansing and its incidents: The 1990s has had the most number of instances wherein the crime of ethnic cleansing has been recorded. This has been attributed by the UN to various political parties which indulge in the same by ruling various States. This power was clearly wielded by the Shiv Sena party in Maharashtra with their jingoistic tactics in expelling Non-Maharashtrians. Blacks Law Dictionary defines ethnic cleansing as: The officially sanctioned forcible and systematic diminution or elimination of targeted ethnic minorities from a geographic area by confiscating real and personal property, ordering or condoning mass murders and mass rapes and expelling the survivors. Few authors are of the opinion that the crime of ethnic cleansing is a 20th Century phenomenon while most others disagree.  [18]  A prototype of ethnic cleansing can be taken from the experience of the Jews during the Nazi Regime, where in order to create Lebensraum, or living space, Hitler, the dictator started an expansionist drive to create a pure Germany. The term ethnic cleansing, a literal translation of the Serbo-Croatian phrase etnicko ciscenje, has resulted in a lot of atrocities like mass killings as well as rape as a means of creating supremacy over the minorities.  [19]   In many of these campaigns, women were targeted for particularly brutal treatment-including systematic rape and enslavement-in part because they were viewed by perpetrators as the carriers, biologically and culturally, of the next generation of their nations. Because many men in victimized populations left their families and communities to join resistance groups once violence began, women and children were often defenseless.  [20]  Statistics shows that the Bosnia-Herzegovina war envisaged a shocking estimate of 20,000 women who endured sexual assaults in the form of either torture or rape. Serbian political and military leaders systematically planned and strategically executed this policy of ethnic cleansing or genocide with the support of the Serbian and Bosnian Serb armies and paramilitary groups to create a Greater Serbia: a religiously, culturally, and linguistically homogenous Serbian nation.5  [21]  The promulgation of the concept of ethnic cleansing and the practices it represents are a grim, contemporary reminder of the global nature of interethnic and interracial inequality and strife.  [22]   The following passage taken from an article is proof of the mass destruction and depraved justice that took place during the Bosnia-Herzegovina War: More than two million people-almost half the population- are still dispossessed of their homes. Some 600,000 of these are refugees abroad who have not yet found durable solutions, many of whom face the prospect of compulsory return into displacement within Bosnia and Herzegovina in the near future. Another 800,000 have been internally displaced to areas in the control of their own ethnic group, living in multiple occupancy situations, in collective centres or in property vacated by the displacement of others, often in situations of acute humanitarian concern. The fundamental issue for the future of the post-war society of Bosnia and Herzegovina is whether these people can or will return to their homes.  [23]   A case study shows that the challenges of post 1980 former Yugoslavia were exacerbated by the countrys demographic and socio-cultural make-up, comprising several ethnonationalities with different religions, mentalities, histories and levels of development. In the Federal Republic of Yugoslavia, Croatia, and Bosnia and Herzegovina the authoritarian regimes and their leaders were the main sources of human rights violations. Nationalism and hatred of other peoples and religions were probably the reasons for the brutal break up of the former Yugoslavia. Ethnonationalism was, and has largely remained, widely and deeply entrenched among the constituent groups.  [24]   Various authorities indicate that the notion of ethnic cleansing takes place when there is a deportation of mass population on the basis of their ethnic differences in order to create a homogenous ethnic State. While a crime like genocide inevitably results in imposing criminal liability, it has been stated by several authors that since the term ethnic cleansing does not appear in any of the laws the same is not punishable as long as genocide, rape or other crimes against humanity have not been used, which have been banned by several legal instrument.  [25]   This argument however is to be rendered untenable  [26]  as though, ethnic cleansing per se doesnt feature under the Rome Statute of the International Criminal Court, it can be included under crimes against humanity under Article 7 which speaks of Deportation or forcible transfer of population  [27]  equivalent to ethnic cleansing. Moreover, a perusal of the Statute of the International Tribunal for the Former Yugoslavia under Article 4  [28]  also makes the crime of ethnic cleansing punishable. The Trial Chamber  [29]  in a particular case was satisfied beyond reasonable doubt that the crimes that were committed in the Bosnian Krajina from April 1992 until the end of December 1992, the period relevant to the Indictment, occurred as a direct result of the over-arching Strategic Plan. The ethnic cleansing was not a by-product of the criminal activity; it was its very aim and thus an integral part of the Strategic Plan.  [30]   Therefore, a perusal of the aforementioned authorities helps one understand essentially the concept of ethnic cleansing and the essentials thereof. differences between the two: Andrew Bell-Fialkoff in his book, has remarked thatà ¢Ã¢â€š ¬Ã‚ ¦ the crime of ethnic cleansing defies easy definition. At one end it is virtually indistinguishable from forced emigration and population exchange while at the other it merges with deportation and genocide. At the most general level, however, ethnic cleansing can be understood as the expulsion of a population from a given territory.  [31]   Different authors have different opinions regarding the differences between these two, while some state such a difference exists only in theory while other claim it to exist practically as well. From a perusal of the above, genocide and ethnic cleansing can be differentiated in three ways: (1) Need of intent: Genocide could be a means to commit ethnic cleansing, but the purpose of such a crime then would not be murder but would be otherwise. Furthermore, in contrast to genocide, there is no need for special intent under the crime of ethnic cleansing, making it easier for parties to establish a crime of ethnic cleansing in comparison to a charge of genocide leveled against a particular party to the dispute.  [32]  It has been found under various texts that the requirement of specific intent is not found under ethnic cleansing, making it easier to prove before the International Courts in comparison to the crime of genocide.  [33]   (2) The purpose: The purpose under genocide is the physical destruction of an ethnical, racial or a religious group, while that of ethnic cleansing is the founding of ethnically homogeneous lands. The means used for the latter could also be genocide.  [34]   (3) Ends achieved: While genocide results in physical destruction of a particular minority groups, ethnic cleansing results in the flight of a community not necessarily mass killing.  [35]   As found in the previously, it may not always be feasible to point out differences between the two. In fact, this clear cut distinction has been reduced by various subsequent measures taken by the authoritative bodies. In 1992 concerning the hostilities in Yugoslavia, the UN General Assembly  [36]  clearly stated that ethnic cleansing is a form of genocide.  [37]   To worsen the situation, in the case of Prosecutor v. Krstic,  [38]  , the Trial Chamber of the International Criminal Tribunal for the Former Yugoslavia (ICTY), expressly diverging from the wider interpretation of the notion of intent to destroy by the United Nations made a difference between ethnic cleansing and genocide. an enterprise attacking only the cultural or sociological characteristics of a human group in order to annihilate these elements which give to that group its own identity distinct from the rest of the community would not fall under the definition of genocide. Similarly, in the case of Bosnia and Herzegovina v. Serbia and Montenegro (Case concerning the application of the Convention on the Prevention and Punishment of the Crime of Genocide) the International Court of Justice  [39]  have also upheld the above judgment based on the same reasoning.  [40]  Various scholars also have given views similar to that found in the above cases wherein a distinction has been made between the two offences.  [41]   Therefore, there remains doubt in this unchattered territory, but courts generally refrain from holding a state or an official responsible for the offence of genocide in comparison to that of ethnic cleansing. Conclusion: From an analysis of the above judgments, we find that there exists a very thin line between the concepts of genocide and that of ethnic cleansing. There is a need to attain consistency with regard to the various opinions on the same, consistency being an essential or cannon of any law. The basic bone of contention is in fact this lack of uniformity in interpreting the law by the courts. That apart, a need is felt that stricter international norms be laid down in order to ensure that a crime like ethnic cleansing taking the form of international crimes like rape, genocide does not take place at the ferocity that it has been since the 1990s.  [42]   It should be realized by the UN and various other monitoring bodies that it is imperative that a clear cut distinction be made between the two, agreed, a strait-jacket formula cannot be applied, but it should lay down certain parameters for determining when ethnic cleansing takes place. As of now, the definition of the said terms remains uncertain in international law. States should realize that even the magna carta Universal Declaration of Human Rights  [43]  ordains equality on each and every human being, which would immediately render the offence of ethnic cleansing purposeless.  [44]   It is to be necessarily understood that, As long as the criminals are divided into ours and theirs; as long as ethnic discrimination is not replaced with moral and professional criteria; as long as already initiated democratic processes do not take roots; there will be little chance of reconciliation, economic development and respect for the human rights and freedoms.  [45]   Therefore, an attempt has been made by virtue of this project to understand the basic differences between these two types of crimes which are basically instigated against other human beings and the same conclusion has been arrived at with the help of leadings judgments and opinions of various authors on the same. Ethnic cleansing results in the division of a particular country into several fragments, there more the disputes the more these fragments will break and finally there shall be nothing for one to offer. This has been aptly illustrated in the following paragraph: In Germany they first came for the communists; and I didnt speak up because I wasnt a communist. Then they came for the Jews; and I didnt speak up because I wasnt a Jew. Then they came for the trade unionists; and I didnt speak up because I wasnt a trade unionist. Then they came for the Catholics; and I didnt speak up because I wasnt a Catholic. Then they came for me and by that time there was nobody left to speak up. Martin Niemoller

Friday, October 25, 2019

What is truth? :: essays research papers

â€Å"What is truth?† That is the question Pontius Pilate asked rhetorically as he turned away from the battered and bloody man standing before him, The Man who was, and still is, the Answer to that question. In today’s world—especially Europe, but also the USA to a lesser but still very significant extent—the very concept of truth itself is being dismissed by many who are caught up in â€Å"postmodern† thinking. This mindset holds that â€Å"truth† is only a construction by the culture or the individual, so that what may be true for one is not true for another. Thus, truth is relative. Necessarily, the meaning of words is not fixed, but a function of interpretation, so that each person can construct his own meanings for them. Adhering to that fallacy leads only to external chaos and internal emptiness. What is truth? An English dictionary says: â€Å"That which is in accordance with fact or reality; that which actually is.† In Scripture, the Greek word translated â€Å"truth† is aletheia, which means â€Å"the revealed reality, or the essence, of something.† That is, what you see is what you get. In Matthew 15:1-9 and Mark 7:1-13, Jesus contrasted truth with â€Å"tradition.† Replying to the hypocritical Jewish religious leaders who criticized his disciples for failing to adhere to one of the many extraneous requirements they had added to God’s Word, he said: â€Å"Thus you nullify the word of God for the sake of your tradition.† What is â€Å"tradition?† That word is translated from paradosis, which appears 13 times in the Greek text. It simply means â€Å"delivering over from one to another.† The context determines whether what was delivered was truth or whether it was the ideas of men that oppose the truth. Ten times it is used in the latter sense, and three times it is used in a positive sense, referring to true â€Å"teachings,† in the NIV, passed on by Paul to others.

Thursday, October 24, 2019

A Symbol of Our Culture

America's history has a lot of repetition In It. Price expressed her Irritation for how America started a new trend, using flamingos, and used this trend over and over again until It lost meaning. The symbol of the flamingo was used repetitively until It lost Its Importance, and essentially got boring. This tact In Itself clearly bothered Price. From the start, Price's attitude expressed how she felt about the use of the flamingo.The title, â€Å"The Plastic Pink Flamingo,† could be taken in a couple different ways. Plastic is describing the pink flamingo, yet plastic has two meanings. It could mean plastic as in the material the flamingo is made out of, but I think Price was intending to use plastic as a play on words and have plastic mean fake or superficial. This definition would represent Price's attitude of how she thinks America is so superficial and devalues objects, such as the flamingo. Price also used a simile to create a great visual of what she thought American cul ture was like.She compared our culture to, â€Å"[being] like a line of semiotic sprouts. † She draws attention to this simile by using alliterations of â€Å"like a line,† and â€Å"semiotic sprouts. † It is not exactly a compliment to be compared to a plant, not to mention how boring and uninteresting it is. This phrase paints a picture in our heads of sprouts lust sitting there droning on and on. When comparing this boring repetitive image to America and our culture, helps us realize Price's point exactly.Jennifer Price successfully portrayed her opinions of the American culture throughout this article by using diction such as repetition and playing close attention word choice. The use of techniques like similes and alliterations also helped reflect her tone of the article, â€Å"The Plastic Pink Flamingo. † A Symbol of Our Culture By Shelley Jennifer Price wrote the essay, â€Å"The Plastic Pink Flamingo' with intentions to get gain, one tends to get bored with the idea.Price intended for the reader to get bored and sick of reading the word â€Å"pink† because it reflects how America's history has a lot of repetition in it. Price expressed her irritation for how America started a new trend, using flamingos, and used this trend over and over again until it lost meaning. The symbol of the flamingo was used repetitively until it lost its importance, and essentially got boring. This fact in itself clearly bothered Price. Just sitting there droning on and on. When comparing this boring repetitive image to

Tuesday, October 22, 2019

Cybersecurity Vulnerabilities Facing IT Managers Essay

Cyber-security demands are ever increasing in the field of Information Technology with the globalization of the internet. Disruptions due to cyber-attacks are affecting the economy, costing companies billions of dollars each year in lost revenue. To counter this problem corporations are spending more and more on infrastructure and investing to secure the cyber security vulnerabilities which range anywhere from software to hardware to networks and people that use them. Due to the complexity of information systems that interact with each other and their counter parts, the requirement to meet specific cyber security compliances have become a challenging issues for security professionals worldwide. To help with these issues, security professionals have created different standards and frameworks over the years for addressing this growing concern of vulnerabilities within enterprise systems and the critical information they hold (â€Å"Critical Security Controls,† n.d.). Before we get into the details let first examine what exactly is a security vulnerability. By definition a security vulnerability can be flaws in hardware, software, networks or the employees that use them which in turn can allow hackers to compromise the confidentiality, integrity and availability of the information system (â€Å"Common Cybersecurity,† 2011). To thoroughly discuss this topic in more detail I will first discuss Confidentiality as it is one of the three main goals of IT Security. Confidentiality is as simple as it sounds, limiting access to resources for only those that need it. Confidentiality vulnerabilities occur when hackers try to exploits some weakness or flaw  within information system and view information that they are not normally allowed to. In this case the confidentiality of the documents have been compromised. The second goal of IT security which can also be affected if security vulnerabilities are present is Integrity. Integrity by definition can mean many different things for different topics but for the IT world it solely relates to the trustworthiness of a document or resource. This means that the document or file has been unhindered or changed and is still in its original form. This is very important because if data has been hindered or changed it can cause substantial damage to corporations due to the possible wrong decisions being made like investments or unintended publications or even trouble with the law if tax audits are not adding up properly which would all result in a net loss. The last goal of IT security which can be compromised if security vulnerabilities exist is Availability of the information system. Availability refers to the idea that a resource is accessible by those that need it, whenever they need it. In my personal opinion I believe availability is probably the most important out of the three security goals. I say this simply because there are many mission critical applications out there that need to be online 24/7 and any downturn can result in catastrophic results. One prime example of this is the air traffic control towers at LAX; they were having problems with the system a few months back due to the U-2 spy plane flying over their airspace. This caused major panic which grounded taxied planes that were ready to take off and forced the manual tracking of planes already in air (Ahlers, 2014). Throughout this the paper I intend to report on the many different types of cyber-security vulnerabilities available and their effects. I will also describe in detail the vulnerability I feel is the most important facing IT managers today, its impact on organizations and the solution. As I stated before there are many different types of security vulnerabilities out there which can affect the integrity, availability and confidentiality of a resource. So the question still remains what exactly are t hese types of vulnerabilities? Especially since they range from software, hardware, networks and the people that use them. Firstly I will discuss the software vulnerabilities, more specifically in terms of web applications. This is because more than half of the current  computer security threats and vulnerabilities today affect web applications and that number is ever increasing. (Fonseca, Seixas, Vieira, Madeira, 2014). When considering the programming language used to develop web applications you have PHP which is considered a weak language, on the other hand you have Java, C# and Visual Basic which are considered strong languages. It is important to note that the language used to develop the web applications is very important because although the different programming languages are similar overall, each one has different rules of how data is stored, retrieved, the execution methods, tables and so on. For example when I say how data is stored and retrieve, I am basically regarding to data types and data structures and how the programming language that is being used maps their values into type fields like strings for names, Int for numbers, or even Boolean for true and false statements. Overall though even if you are using a strong typed language like Java, it does not always guarantee itself free from defects because the language itself may not be the root cause of the vulnerability but possibly the implementation methods used or even insufficient testing (Fonseca, Seixas, Vieira, Madeira, 2014). Vulnerabilities in web applications invite XSS exploits and SQL injection which are the most common types. Below you can see in the image the evolution of reports caused by SQL injection and XSS exploits over the years. This next section we will discuss some more types of security vulnerabilities, more specifically vulnerabilities with regards to hardware. Many people assume that hardware vulnerabilities have the lowest security concern compared to other types of vulnerabilities like software, networks and people that use them simply because they can be stored up in secure environments. The truth is even hardware vulnerabilities can be easily susceptible to attacks. Hardware in general have a longer lifespan than software because simply with software you can upgrade it and install new patches/builds even after deployment. With hardware you once you purchase it, you are most likely going to keep it for a while. When it does become obsolete and ready to be disposed a lot of organizations make the simple mistake of not securely disposing the old hardware properly which in turn opens up the door for intruders. Old hardware have software programs installed on them and other things like IC transistors whi ch can help  hackers learn a lot more about the organization and help lead to future attacks (Bloom, Leontie, Narahari, Simha, 2012). The most recent example of hardware vulnerability which caused one of the biggest Cybersecurity breaches in history was most recently with Target. 40 million credit and debit cards with customer information was stolen simply because a malware was introduced to the point of sale system through a hardware encryption vulnerability (Russon, 2014). Although hardware vulnerabilities are not normally the root cause for majority of the exploits and breaches out there, it is always still good to follow best practices. Network vulnerabilities will be the next topic of discussion and my personal favorite. Vulnerabilities through network systems are very common especially with the all the resources available to hackers today. There are many open source software programs on the market which can help intruders learn critical information about an organization. Just to name a few of the most popular and commonly used ones include Nmap security scanner and Wireshark. Nmap security scanner was originally developed to be used for security and system administration purposes only, like mapping the network for vulnerabilities. Today it most commonly used for black hat hacking (Weston, 2013). Hackers use it to scan open unused ports and other vulnerabilities which in turn helps them gain unauthorized access to the network. Wireshark on the other hand is also similar to Nmap as it was originally developed for network analysis and troubleshooting. It allows administrators to view and capture all packet resources that passes through a particular interface. Over the years hackers have started using Wireshark to exploit unsecured networks and gain unauthorized access (Shaffer, 2009). Although scanning unused open ports and capturing packets are a great way for intruders to gain access to a network, the most popular method by far to breach a network is USB thumb devices. Most enterprise networks are very secure in the sense that they use a DMZ (De-militarized zone) and outside penetration becomes very difficult. In a de-militarized zone outside network traffic must go pass through two different firewalls to get to the intranet of the organization. The first firewall includes all the commonly used servers like FTP, SMTP and all other resources that can be accessible by the public. The second firewall has the actual intranet of the organization which includes all private resources (Rouse, 2007). Below is the diagram of a DMZ. So the question still remains, since most enterprise organizations use DMZ which in turn helps prevent port scanning or packet analyzing, why is USB thumb devices the most popular network vulnerability? (Markel, 2013) The answer is very simple â€Å"Social engineering†. We as human beings, through social conditioning do not stop and ask questions when were not familiar with someone, which in turn has become one of the major causes for the cybersecurity breaches that occur today. Just to give one example from my own personal experiences at work, each floor has an authentication swipe policy to gain entry. Every time I enter the office area, there are a few people with me and only one person in the group usually swipes his/her badge to open the door. This is a huge security vulnerability because anyone can just follow the group and gain access to the entire intranet of the organization. In my case in particular I work for United Airlines headquarters in Chicago at the Willis tower which is more than 100 stories high and the fact that the entire building is not ours alone, this becomes a huge security concern. While I have briefly explained the vulnerabilities in software, hardware, networks and the people that use them, the question still remains, what is the most important security vulnerability facing IT managers today?. This answer to this questions differs person to person, and one must take into consideration the actual vulnerability, its threat source and the outcomes. A person with a small home business might only be concerned with denial of service attacks, since they may not have enough cash flow to properly secure their network. On the other hand an enterprise organization with large cash flow might have a different prospective and probably does not concern itself with denial of service attacks but instead is focuses on making sure all the systems are upda te using windows server update services. In my personal opinion though, you might have guessed it but it’s definitely us human beings because we have the tendency to fall victims and contribute to the successful security breaches that occur in today’s society. Mateti in his essay â€Å"TCP/IP Suite† stated that vulnerabilities occur because of human error. A study by Symantec and the Ponemon institute showed that 64 percent of data breaches in 2012 were resulted due to human mistakes (Olavsrud, 2013). Larry Ponemon the founder of security research at Ponemon Institute and chairman stated that â€Å"Eight  years of research on data breach costs has shown employees behavior to be one of the most pressing issues facing organizations today†, up by twenty two percent since the first survey† (Olvasrud, 2013). A prime example of this is when I stated earlier about how anyone can just enter my office area without swiping their card, just by simply following the group. This is a form of human erro r when employees are too intimidated to ask questions and request authorization from someone they believe does not work for the organization. The intruder can just walk in the front door pretending to be a salesperson, repairman or even a white collar businessman and may look like someone legitimate but in fact they are not. This intruder now has direct access to the intranet and can install malicious malware on to the computers to disrupt daily operations or even steal sensitive data like confidential project information, release dates, trade secrets and many more. A very good example of this is the Stuxnet worm which infect the Iranian nuclear facilities and caused a lot of damage internally which in turn delayed Iran’s nuclear development. All of the security measures that were put in place by Iran’s cyber defense team were circumvented simply by just one employee because the worm was introduced through an infected USB drive. This simply shows how the direct access from unauthorized users due to employee negligence can cause such tremendous damage and that all the perimeter defense become completely useles s. Another prime example of human errors was the RSA breach in 2011 where cybercriminals thought instead of just sending millions of phishing emails to different random mailboxes, let’s send personalized emails to specific employees. The employees at RSA thinking since it’s a personalized message its â€Å"safe† and clicked on the links unknowingly which in turn caused the malware to be downloaded on to the network. To counter this problem firstly IT managers need to properly train employees and give them specific guidelines to follow. Symantec has issued a press releases with the guidelines on how to properly secure sensitive data which includes information on how to train employees for these types of intrusions. Human error is not just limited to intimation or foolishness, it also expands too many different areas because after all it is us humans who manage the cyberspace, grant physical access to the terminals and systems that are connected to the internetwork. We setup the protocols used for communication, set the security policies and procedures,  code backend server software, create passwords used to access sensitive information, maintain updates on computers and so on (â€Å"Security 2011, † 2011 ). The human element matters very much possibly more than the software, hardware or the network systems especially when it comes to properly securing an internetwork from data breaches. The impact on the organization always depends on what type of business it is and what it is engaged in. For example if an organization is very popular and has bigger presence in the online commerce (Amazon and New Egg) compared to one that does not use the internet quiet often will be more concerned with web based attacks and vulnerabilities. The impact though regardless of the type of organization will always be tremendous. Once a breach occurs not only are you spending on recovering from its effects but you are also spending on beefing up your current security measures by installing new devices, hiring new employees so the same occurrence does not occur again (Hobson, 2008) Sometimes at the end of the day some of the cost are not even recoverable like sensitive data, trade secrets, personnel information or even customer information. Another major cost and headache that occurs once an organization becomes a victim of cybercrime is lawsuits. Many customers who feel that the organization could not protect their confidentiality will sue the corporation for millions of dollars which in turn can cause major loss. IT managers can do many things to help prevent breaches due to human errors. The first thing they can do is properly train the employees as stated above on a periodical basis and use current guidelines like Symantec to properly secure their intranet from any type of intrusion. IT managers can also establish a safe harbor in the sense that they can force employees to periodically change their passwords and establish rules so the password must be certain characters long and must include other types of characters besides just the typical alphanumerical ones. Employee negligence also due to bad habits like sending sensitive data over an unsecured email and IT managers must ensure that they continually educate their employees. There are many different types of security vulnerabilities out there in today’s world that are affecting organizations. In my personal opinion I believe human error is the one vulnerability that affects IT managers the most simply because we as humans make mistakes. It is in our nature and no matter how hard we try we will always be susceptible to deception either through social engineering tactics or clicking dangerous  links because it â€Å"looks safe† or even being negligent by not reporting something unusual. Employees need to realize that their actions can bring terrible consequences for both them and the organization as a whole. References Fonseca, J., Seixas, N., Viera, M., & Madeira, H. (2014). Analysis of Field Data on Web Security Vulnerabilities. IEEE Transaction on Dependable & Secure Computing, 11(2), 89-100 doi:10.1109/TDSC.2013.37 Russon, M. (2014, June 10). Forget Software Vulnerabilities, Hardware Security Must Improve Before It’s Too Late. International Business Times RSS. Retrieved July 12, 2014, from http://www.ibtimes.co.uk/forget-software-vulnerabilities-hardware-security-must-improve-before-its-too-late-1451912 Bloom, G., Leontie, E., Narahari, B., & Simha, R. (2012, January 1). Hardware and Security: Vulnerabilities and Solutions. . Retrieved July 12, 2014, from http://www.seas.gwu.edu/~simha/research/HWSecBookChapter12.pdf Common Cyber Security Vulnerabilities in Industrial Control Systems. (2011, January 1). . Retrieved July 12, 2014, from https://ics-cert.us-cert.gov/sites/default/files/documents/DHS_Common_Cybersecurity_Vulnerabilities_ICS_2010.pdf Critical Security Controls. (n.d.). SANS I nstitute -. Retrieved July 12, 2014, from http://www.sans.org/critical-security-controls Ahlers, M. (2014, May 6). FAA computer vexed by U-2 spy plane over LA. CNN. Retrieved July 13, 2014, from http://www.cnn.com/2014/05/05/us/california-ground-stop-spy-plane-computer/ Most Important Cybersecurity Vulnerability Facing It Managers. (n.d.). . Retrieved July 13, 2014, from http://www.ukessays.com/essays/computer-science/most-important-cybersecurity-vulnerability-facing-it-managers-computer-science-essay.php Security 2011: Attack Of The Human Errors – Network Computing. (2011, December 22).Network Computing. Retrieved July 13, 2014, from http://www.networkcomputing.com/networking/security-2011-attack-of-the-human-errors/d/d-id/1233294? Hobson, D. (2008, August 8). The real cost of a security breach. SC Magazine. Retrieved July 13, 2014, from http://www.scmagazine.com/the-real-cost-of-a-security-breach/article/113717/ Direct, M. (2013, December 20). Human error is the root cause of most data