Thursday, October 31, 2019
Email Hacking Essay Example | Topics and Well Written Essays - 2250 words
Email Hacking - Essay Example Accordingly, the more technically trained and informed people are in the position to not only subjugate the rights of others but also offend their rights. The technology-savvy people can easy use the Internet to hack into the computer systems so that they can steal money, infect othersââ¬â¢ computers with viruses, and change information in their private profiles. Emails are frequently used for business transactions these days. People use email to share vital information with one another. Hacking of an email account can yield disastrous results for the account owner and not many people are quite technically skilled enough to recover their email accounts after they have been hacked. This paper discusses several ways in which email accounts can be hacked and the ethical and legal implications of hacking. If an individual is aware of the potential ways in which he/she can be fooled, he/she can take the preventive measures in time to overcome such threats and has fair chances of escapi ng the attack by the offender. Issues in Email Hacking Ethical issues According to the Hacker Manifesto, a hacker commits only one crime which is the crime of curiosity (Trodick, 2011). Levy (2010) identified sex tenets to exemplify the ethics of hacker; according to the first tenet, ââ¬Å"access to computers - and anything which might teach you about the way the world works- should be unlimited and totalâ⬠(Levy, 2010, p. 23) whereas according to the second tenet, ââ¬Å"all information should be freeâ⬠(Levy, 2010, p. 24). The hacker ethic is a belief that the sharing of information is a very positive and powerful good. It implies that hackers assume the ethical responsibility to share the expertise they have by enhancing the access to information, writing open-source, and computing all possible resources. There exists a belief that if system is cracked for the purposes of exploration or fun, it is ethically justified till the time the attacker does not commit any vanda lism, theft, or a breach of confidentiality. Every time an individual accesses a system in an unauthorized manner, he/she acts unethically. Ethics varies from one individual to another. Ethics cannot be completely defined by one individual so that a certain action can be deemed right or wrong. Nevertheless, in the democratic system that prevails in the society, every individualââ¬â¢s right to security of privacy and property is acknowledged. This privacy covers the information stored by people on their personal computers or the computers that they are authorized to use. ââ¬Å"The Fourth Amendment explicitly affirms the 'right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizuresââ¬â¢Ã¢â¬ (Head, 2012). The Fourth Amendment is interpreted generally as an individualââ¬â¢s right to privacy, though such right cannot be stated explicitly. Nevertheless, every individual in the US says that he/she has a fundamental privacy right of their possessions, though hackers disagree with this. Legal Issues The Computer Fraud and Abuse Act of 1986 illegalized the unauthorized access to computer or stealing of the information that is related to credit card or private government (teamidesign.com, n.d.). According to Section 3, gaining unauthorized access to the government computers is illegal. On the other hand, the hackers argue that as long as they do not take
Tuesday, October 29, 2019
Final Op-Ed Essay Example | Topics and Well Written Essays - 500 words
Final Op-Ed - Essay Example However, states can force all public schoolchildren to be vaccinated for disease. Though most think mandatory vaccinations is a matter of public safety therefore a good idea, others, at least in some circumstances, think it an example of government overreach. The latest controversy involving forced vaccinations was during the Republican primary election earlier this year when the subject of HPV became part of the political discussion. The virus is spread by sexual contact and can cause cancer. While some parents were in favor of mandating the vaccine, other objected on moral grounds reasoning that making sex a little safer would encourage students to engage in sex. The larger question is should the government mandate vaccinations at all? Yes say the vast majority and for sound reasoning as opposed to the ââ¬Å"reasoningâ⬠offered by those opposed to the HPV vaccine. While some oppose forced immunizations due to religious and personal reasons it is the responsibility of society to protect its children by mandating students receives vaccinations. The government is the vehicle that society uses to enforce necessary protections. Society draws a legal distinction between adult and minors. Children are shielded from harms as much as possible. Mandatory vaccinations have been required for public school attendance since anyone can remember because parents do not want their children to be ill, whether stricken with a common cold or polio. It is a socially responsible act. Immunizing all children does not sacrifice their civil liberties. Some parents object but simply because some people do not bother to research the consequences of not allowing their child to have vaccinations should not condemn all other kids at school to being exposed to crippling illnesses. The issue of government intrusion into peopleââ¬â¢s private affairs is a valid one but is a different discussion when
Sunday, October 27, 2019
Length of Pelvetia Canaliculata on Upper Shore Zone
Length of Pelvetia Canaliculata on Upper Shore Zone ABSTRACT: The aim of this study was to compare the length of Pelvetia canaliculata on the upper shore zone of both wave-sheltered and wave-exposed shores. The hypothesis was that the Pelvetia fronds growing on the upper shore zone of a wave-sheltered rocky shore will be significantly longer compared with fronds growing on the upper shore zone of a wave-exposed rocky shore. The lengths of 450 fronds in total were sampled using systematic continuous horizontal belt transect sampling method at a wave- exposed and wave-sheltered shores on the Pembrokeshire coast. The results showed that there was a significant difference in the lengths of the seaweed with longer fronds being found in the wave-sheltered rocky shore. This is happening because there is less wave exposure and so fronds are less likely to be broken off at the tips and hence they will be longer. INTRODUCTION Rocky shores are areas of bedrock exposed between the extreme high and extreme low tide levels on the seashore. The ecosystem is complex, as it is an interaction between terrestrial and aquatic systems. Plants and animals are distributed on the shore in horizontal zones that relate to the tolerance of the species to either exposure to air or submergence in water during the tidal cycle. This zonation can be very clear and abrupt. Using this fact, I have clearly identified the area Pelvetia canaliculata is found; the upper shore. [1] Ãâà I have researched this zone in more depth to be able to understand the conditions, the problems and the different variables that can affect Pelvetia canaliculata and the adaptations it developed to survive and thrive. As the tide level drops on the upper shore, the seaweed will be exposed to air and desiccation (drying out) occurs as a result. Because the tide rises up and down twice a day organisms at the top of the shore get much less water than ones at the bottom. Across a year, the top of the upper zone gets covered by the sea for less than 1% of the year while The bottom of it for about 20% of the year. This is very short time to obtain nutrients from the water for photosynthesis, and can therefore slow growth rate. However, this is not the only problem as the water filters off some of the wavelengths of light and reduce its intensity and so lowering photosynthesis rate. In addition, the water is the main medium where dispersal of spores happens; spending less time in the water means low productivity. [2] Species on the Upper shore get subjected to a wide variation in temperature. Immersion in water buffers against temperature change due to the high specific heat capacity of water. Upper shore species will have to tolerate the greatest variation in temperature whilst it has least effect in the lower shore. High temperatures will increase the risk of desiccation and increases salinity in pools. [3] The other major physical factor that controls what can live on a shore is wave action. Exposed shores have a lot of wave action and sheltered shores have little. Seaweeds find the drier, brighter, wave exposed environment very difficult to cope with. Sheltered shores [4] Exposed shores [4] Usually face away from the open sea and the prevailing wind. This means they generally have smaller waves than exposed shores which face out into the open sea and the prevailing wind. Sheltered shores are usually on north to north easterly facing shores. North facing sheltered shores get less sunlight than exposed ones, and are less susceptible to desiccation and in general are more hospitable places for inter-tidal organisms. Usually face into the open sea and the prevailing wind. This means they generally have bigger waves than sheltered shores. Exposed shores are usually on south to south westerly facing shores. South to south westerly facing exposed shores get more sunlight than sheltered ones, are more susceptible to desiccation and in general are not hospitable places for most inter-tidal organisms. Now that I explained the features of the upper shore zone and the exposed and sheltered shores I will describe the features and the different adaptations that enabled Pelvetia canaliculata to live in such a habitat and constantly changing environment. Taxon English equivalent or translation [3] Phylum Chromophycota /Brown seaweeds e.g. kelps wracks Class Phaeophyceae /Brown seaweeds e.g. kelps wracks Order Fucales/ Fucoids e.g. wracks Family Fucaceae Genus Pelvetia Species canaliculata Pelvetia canaliculata is dark olive green in colour, becoming black and brittle as the fronds dry out. P.canaliculata lives for about 4 years and grows up to 150 mm long [3]. The fronds are curled longitudinally forming channels that are dichotomously branched ending in swollen and granular reproductive bodies. They dont have air bladders or mid-ribs. Pelvetia canaliculata [3]Pelvetia canaliculata grows attached to hard substrata using their holdfast; this has the mechanical features of a root system that would be beneficial for the seaweed, holding them steady no matter how turbulent the water movement. It tolerates ultra sheltered to moderately exposed conditions. The algae P.canaliculata is limited from living higher on the shore by desiccation, but is prevented from colonizing lower levels by competition from other species of algae. Seaweeds also have to cope with grazing pressure from mobile gastropods. [5] Over the period of neap tides, the plants may lose up to 65 per cent of their contained water and become dry and blackened. But when the spring tides extend over them, water is absorbed and the normal olive-green colour and softer texture are regained. It has been estimated that the upper shore plants are exposed for 90% of the year. [6] In water, seaweed obtain the carbon they need for photosynthesis from dissolved co2 or bicarbonate (HCO3-). When exposed to air, photosynthesis can only take place with uptake of CO2 from air. As long as the seaweeds do not dry out, many species photosynthesize in air at rates similar to those measured when they are fully submerged. However, as they begin to dry out, their ability to photosynthesize diminishes. Pelvetia canaliculata is found high on the shores and is prone to drying out for long periods of time. The species can photosynthesise when exposed to air but may suffer nutrient stress as it can only obtain nutrients when submerged. Researche rs found that within less than a day of being back in seawater, as specimen that had been desiccated for 6 days was able to resume full rates of photosynthesis. In fact P.Canaliculata requires periods of exposure to the air. If it is submerged for more than 6 hours out of 12 it actually starts to decay. This is a rare example of a seaweed species in which periods out of water are absolutely essential. [7] An increase in wave exposure and water flow rate may cause Pelvetia canaliculata to be torn off the substratum or the substratum with plants attached may be mobilised. It is unlikely that any Pelvetia canaliculata will live in areas of very high wave exposure. In faster moving water the risk of the fronds tearing will increase because of the increased drag. Hence Pelvetia canaliculata adapts its shape to reduce drag depending on their location. Pelvetia fronds growing on wave-exposed shores are shorter and thinner because the fronds are frequently broken off at the tip. Pelvetia canaliculata has many adaptations that allow it to survive better in the upper shore compared to algae living down. They have; rolled fronds to reduce water loss in evaporation, channels to trap water in the frond, a fatty (oily) layer over the cell that stops water evaporating to slow desiccation, a thick cell wall which shrinks with drying, the ability to survive low nutrient level, a rapid recovery of metabolism when the tide returns during respiration and photosynthesis. It is therefore, a very stress-tolerant alga, well adapted to the niche at the top of the shore. [2] Based on the information I researched in the introduction I will investigate and compare the adaptations of Pelvetia canaliculata on two different sites where the conditions are different. I will compare the lengths of the fronds of Pelvetia canaliculata on a wave-sheltered rocky shore and a wave-exposed rocky shore. EXPERIMENTAL HYPOTHESIS: There will be a statistically significant difference between the length of the Pelvetia canaliculata growing on the upper shore zone of both a wave-exposed and a wave-sheltered rocky shore; and that its fronds are going to be on average longer in the wave-sheltered shore compared with the wave-exposed rocky shore as there is less wave exposure and so fronds are less likely to be broken off at the tips and hence they will be longer. NULL HYPOTHESIS: There will be no statistically significant difference between the length of the Pelvetia canaliculata growing on the upper shore zone of both a wave-sheltered and wave-exposed rocky shores .Any difference however, will be due to chance factors. VARIABLES: The table below lists and briefly explains the variables that could affect the reliability of the investigation and how they will be controlled. Exposure (independent) An exposed shore means larger fetch hence greater wave action which leads to the damage of the Pelvetia canaliculata fronds I will be carrying out the investigation in areas classified by the Ballantines biologically defined exposure scale to be wave-sheltered and wave-exposed. For the wave-sheltered shore I will collect my data at Angle Point site, SM 875 033 which is a wave sheltered rocky shore inside the Milford Haven estuary, Angle Point is 12km north-west of Pembroke. Facing north-east, the shore is sheltered from the prevailing south-westerly winds and has a small fetch. The Ballantines biologically defined exposure scale classifies this site as Grade7- very sheltered. For the wave-exposed shore I will collect my data at West Angle Bay, SM 852 032 which is a wave exposed rocky shore on the Atlantic coast of Pembrokeshire and lies 14km north-west of Pembroke. Facing south the shore has a large fetch (to south America). The Ballantines biologically defined exposure scale classifies this site as Grade3- exposed. Length of Pelvetia canaliculata (dependent) There are some variables that would affect the growth rate of the fronds and therefore its length. Some of these variables include The height on shore, wave action, and the abiotic and biotic factors. All the effects of these variables are explained below. I will be measuring all my samples on both shores in mm using the same 30 cm ruler. The height on shore From my research I know that Pelvetia canaliculata only colonises the upper shore zone. However, the abiotic factors will affect the different zones on the upper shore differently for example the effect of wave action on the lower part of the upper shore zone is different than that on the higher part of the upper shore zone. Also the water coverage in the lower part of the upper shore is 19% more than the higher part. Hence, there will be more nutrition uptake, resulting in different growth rates. I will be measuring both samples on both shores horizontally across the upper shore zone using horizontal continuous belt transect technique. To ensure that Im working on the same height I will be using a cross staff. Wave action The strong force produced by the powerful wave action will decrease the fronds growth rate. The fronds will adapt by becoming shorter so that the drag force is lessened. I cannot control any of the abiotic factors but I will measure them to see if they have any affect on the samples I will be measuring on the two different sites. However, I will take both my samples on the same periods of the day, on the same season and on the same shore area Humidity Wind spray increases the humidity, this will be higher on the wave-exposed because of the greater and higher wave action Light intensity Needed for photosynthesis. Although the Pelvetia canaliculata requires to be immersed in seawater for this to occur, the process still takes place slowly in air. Wind speed Wind increases the rate of transpiration as it moves the layer of water out side the stomata, which contributes towards the desiccation of the fronds. Rock gradient The steeper the rock the harder the wave will hit it causing greater damage for the fronds. Also a flatter shore will expose a greater area of substrate for colonizing and will not drain as fast as a steeper slope. Aspect It is the direction the rock faces. South facing shores will have more illumination and warmth, but dries faster; north facing shores are cooler, darker and less likely to dry out. Thus, on a north facing slope community bands of Pelvetia canaliculata will be wider and higher up the shore. Substrate or rock type The hardness and size of rocks will influence an organisms ability to attach itself. Soft rocks will not be suitable for hold fast to attach on. If stones are too small they will be mobile, moving around in the surf and so prevent any organism from attaching itself to the rock. The type of rocks on both sites should be the same. Apparatus andà Justification 30 cm ruler To measure the length of the frond on the Pelvetia canaliculata. From my research I found that the fronds average height is 15 cm, hence I chose 30 cm ruler. 1/4m quadrat I think that this is a suitable size to measure a sample of small organism, as it will include an appropriate number of Pelvetia bunches. The quadrat will be used to carry out the continuous horizontal belt transect. 0.6m Cross staff To make sure that all the data collected on both sites are gathered at the same height, so ensuring a fair test. Pencil To record the data with. Its useful incase it rains, my data will be safe and the values will not get lost Calculator To keep calculating the running mean Water proofs For safety reasons and for protection from wind chill and spray. The Wellingtons boots to avoid slipping and falling. Gloves To protect hands from the mucus layer on the Pelvetia canaliculata To calculate the height of the data collecting area the time of the low tide and its height is needed: On Monday 25/09/06 the low tide is 1.1m at 14:42; and on Tuesday 26/09/06 the low tide is 1.28m at 15:10. ETHICAL CONSIDERSTION: Consideration has to be given to the organisms living on the shore; so the seaweed will be measured where it lies without cutting or destroying the living specimens. Care will also be taken to move around the shore without stepping on delicate sea life such as snails and crabs. Also if any animals living on the seaweed like snails are removed so that the seaweed could be measured ensure that they are released close to their point of capture and in a manner that will give them a good chance of survival. Finally ensure that you know the local regulations concerning the protection of habitats and endangered species and always obtain the consent of licensing authorities, landowners, etc. PRELIMINARY INVESTIGATION: Preliminary work was done as a group to learn about the different shore zones as well as the different species that are found in each zone and the adaptation they developed to survive at extreme conditions like desiccation for instance. Also before carrying out the full investigation a pilot study was conducted on any random 10 Pelvetia bunches to find out the best way to measure their length and to determine which branch of the frond to use when measuring. From the preliminary investigation I found out that I would be measuring the longest branch of the longest frond of each pelvetia bunch. I will also be placing the end of the ruler on the ground where the Pelvetias hold fast is found. Finally, Ill also make sure to keep it vertical all time to ensure a fair test. [Figure 3] First of all, check the time of the day when the low tide occurs and its height above chart datum. The help of a friend who has the same height as you is needed for this part in the method. At the time of the low tide, stand at the lowest part of the lower shore where the tide is at its lowest and place the cross staff on the ground in a way that you are facing one of its sides and the other side is facing the upper shore direction where the Pelvetia canaliculata grow (data collecting area) [figure 1]. Lower your body so that your eyes are level with the opening in the cross staff. On the mirror observe the reflection of the small tube that is filled with coloured liquid which contains a small bubble and two marked lines in the middle of the tube. [Figure 2] Supporting the body of the cross staff with one hand and moving the flexible plastic part up and down, adjust the position of the bubble so it stays still between the two marked lines on the tube. Instruct and direct y our friend to move around until you can see her/his boot through the opening in the cross staff. Ensure that she/he does not walk backwards as the shore is very slippery because of the mucus on the algae and the small pebbles and rocks makes it very easy to fall down. When you are able to see the boot, ask your friend to stop and not move from that point. Now stand up and walk up to your friend with your cross staff. Place the cross staff on their boot position, after she/he move their boot. This is the new spot. Repeat the above procedure until you reach the upper part of the upper shore where Pelvetia canaliculata grows (data collecting area). [Figure 3] Every time you move up with the cross staff to a new spot, you are gaining 0.6 m in height. Keep recording and adding the height gain every time you changed to a new spot. At the end add the total height gain in meters to the height of the low tide; the result will be the height of the data collecting area. When you reach the upper shore where the Pelvetia canaliculata is, place the 1/4m quadrat on the first area where they are seen. To avoid bias start measuring to the nearest mm the length of the longest frond of each bunch found within the whole quadrat starting from the right hand side and then moving across to avoid measuring the same bunch more than once. [Figure 4] The Pelvetia canaliculata fronds grow in bunches where each bunch is attached by one holdfast to a rock. The fronds lay on top of each other in the sea direction. So when you start measuring, position yourself on the opposite direction to the Pelvetias. [Figure 5] After putting your gloves on, start by gently gathering a bunch of Pelvetia canaliculata up right; make sure that all the fronds in this bunch spring from the same hold fast. Also as a control make sure that the bunch is attached to a substrate and not in a rock pool. Keep your face at distance as there will be small flying organisms and always try to minimis e the disturbance to other organisms that live there as much as possible. Now slide the hand that is holding the Pelvetia bunch up, so that all the fronds are laid up against each other. [Figure 6] Now it is easy to determine the longest frond; with the free hand, hold the tip of the longest frond and leave the rest of the fronds to fall down towards you or in the opposite direction of the sea, so that you do not measure this bunch again. Still holding up the longest frond, line up the 30 cm ruler against the frond with the free hand. Make sure that the ruler is parallel to the frond with the 0 mm edge resting flat on the rock to ensure correct and accurate measurement. [Figure 7] The ruler used should be plastic with a smooth base and not metal so it does not cut through the fragile fronds or get rusty, it is also easier to read off measurements as it is see through. Now read the length of the frond and record it to the nearest mm in the prepared recording table. Place the results and the calculator inside a plastic bag incase of a bad weather. Place the frond with the rest of the bunch in your direction Do not include pieces of debris, or any seaweed merely unattached to a rock in the investigation as this will lead to misleading results. Also do not measure dead fronds as they will cause anomalies in your data. These fronds are usually desiccated and very brittle; their colour is black instead of the olive green. Ask a teacher or an expert to confirm. Measure all the Pelvetia canaliculata on the sides of the rocks and all the ones that have their hold fast within the quadrat even if all or some of the fronds are outside, as the quadrat frame is relatively thick so it might cover some of the Pelvetia canaliculata fronds. Rock pools provide artificial environments, and so do not included these areas in the investigation. After you finish measuring all the Pelvetia bunches within the first quadrat, flip it to start on a new one. This is systematic continuous horizontal belt transect sampling. When flipping the quadrat use your hand to secure the right/left hand side of the frame-depending on where more of the Pelvetia is found- and then flip the left hand side of it so it becomes the right hand side now. [Figure 8] Every time you record 5 new measurements, calculate the running mean to see if the sample size is large enough. When you get at least three consecutive running mean values which are the same to 2 decimal places, calculate Ãâà ± 2.5% value of the repeated value and then double the sample number. If the running mean continues within the range until the last required sample then stop. However, if it goes outside the confidence limits calculate a new range. Abiotic factors method: Wind speed measured using an anemometer: Hold it facing the wind. Wait for 20 seconds until the reading stabilises. Record the average measurement in m/sec. Humidity measured using a whirling hygrometer: whirl the hygrometer for 20 seconds. Record the temperature of both the wet and dry thermometer. Use the chart to work out the humidity percentage. Temperature measured using a thermometer: record the temperature of the dry thermometer when using the whirling hygrometer. The statistical test I will be using the z-test to test for statistically significant difference between the sample mean and the population mean for both the wave-sheltered and wave-exposed sets of data. The reason this test is used and not the t-test is because my sample exceeded 30 data points. Z= (S1)2 + (S2)2 a) Square both standard deviation Wave-Sheltered Wave-exposed 24.48Ãâà ² =599.2704 14.99Ãâà ² =224.7001 b) Divide each answer by n=225 599.2704 à · 225 = 2.66342 224.7001 à · 225 =0.998667111 c) add both values obtained from step (b) 2.66342 + 0.998667111 =3.662091111 d) square root result obtained from step (c) à ¢Ãâ Ã
¡ 3.662091111 =1.91365909 e) |à à ¥1 à à ¥2| Mean of site 1 mean of site 2 104.06 35.71 = 68.35 f) divide result obtained from step (e) by result obtained from step (d) 68.35 à · 1.91365909 z= 35.72 z= 35.72 When Degrees of freedom = à ¢Ãâ Ã
¾: Level of significance P= 0.05, the Critical value =1.960 Z > critical value 35.72>1.960 The reason p=0.05 was used is because it is the standard level of significance used to justify a claim of a statistically significant effect. In the curve of normal distribution of a normal population Alpha level is 95% and this is normal, outside of that is 1-alpha or 5%. This 5% (0.05) means, that normal falls within this range, beyond that, would be too rare to be by chance alone and must be by the effect of something wave action for example. A p value As my results were significant at p Level of significance P= 0.01, the Critical value =2.576 Z > critical value 35.72>2.576 The z value obtained is significantly greater than the critical value at the p Graphs are presented in the next couple of pages. ANALYSIS AND CONCLUSION: The results tables and the graph comparing the mean length of Pelvetia canaliculata between the wave-sheltered and the wave-exposed shores clearly display evidence supporting the hypothesis. Looking at the mean graph I could evidently see that the sheltered shore has a higher mean than the exposed shore; more than 2.9 times higher to be exact. This is because in faster moving, turbulent water and strong wave action like in the wave-exposed shore, the risk of tearing fronds is increased due to the increase in dragging force. Pelvetia canaliculata adapt its shape to reduce drag depending on its location. Fronds found at wave exposed shores are shorter and narrower as they are frequently broken off at the tips. The error bars for both shores are fairly large which indicates that there is quite a lot of variation in the results and so reduces the reliability of the data. Similarly the difference between the standard deviation of both sets of data is rather large, with 24.48mm for the sheltered shore and 14.99mm for the exposed shore. Even though this shows a great range in my data hence more variability and less reliability, still as it applies to both data sets, making comparisons should be safe. The frequency histograms for both shores shows that the data collected at the wave-sheltered site is more varied than the exposed site as it is spread over 13 categories as opposed to only 9 for the exposed shore. The frequency histogram for the sheltered shore shows a bell curve pattern, displaying a normal distribution with the peak at the 80.00-89.99mm category. On the other hand the wave-exposed histogram displays a positive skew as most of the data is lying to the right hand side with the most common length of Pelvetia is within the classes 20.00-29.99mm. The skew could have occurred because I found great difficulty measuring the very small frond of Pelvetia growing on the wave-exposed shore, and so not including them in the results. Also an increase in water flow rate cause plants to be torn off the substratum or the substratum with the plants attached may be mobilised and so washing away the young Pelvetia plants. Pelvetia canaliculata is permanently attached to the substratum so once removed it cannot re-form an attachment. I think that these factors together helped create this gap in the histogram. The peaks of both histograms are very far apart. This shows that there is a significant difference between the lengths of Pelvetia canaliculata on both sites. This has even been proven further by the ÃŽtest, which showed 99% significance. However, there is quite an overlap between the two curves. This overlap is between 40.00-99.99 mm categories. This overlap could be explained by the similarity in the abiotic factors between the two sites. Also the exposed shore received more sunlight than the sheltered one, which was shaded by a cliff; this means that the Pelvetia canaliculata on the exposed shore were able to photosynthesis more. These factors could have enabled some fronds to have a faster growth rate than others and so became longer. Or it could be that on the exposed shore the wave action is greater and so spray will splash higher up the beach than on a sheltered shore with fewer waves and so this will provide more nutrients for the fronds to grow longer during some exposed p eriods. Although a bell curve pattern is recognised on the wave-sheltered site there are three identified anomalies. Firstly, the frequency of the histogram at category 90.00-99.99 mm would be expected to be lower than that of category 100.00-109.99 mm but at the same time higher than the frequency of 80.00-89.99 mm. One explanation for this anomaly could be due to smothering. If smothering took place when the plant was emersed the whole of the plant would be buried under the sediment preventing photosynthesis that is taking place very slowly in the first place. If smothering however happened while the plant was immersed, some of the fronds may escape smothering and be able to continue photosynthesis. This will still lower the growth rate and so fronds length. Another explanation is that within the same quadrat I measured the Pelvetia canaliculata that grew on both sides of the rock. It is expected that the length of the Pelvetia fronds growing on the side of the rock facing the direct waves action to be shorter than the other landward facing side. This is because the initial force exerted by the wave will be absorbed by the Pelvetia fronds growing on the sea-facing side of the rock; this will cause the fronds to be frequently broken off at the tips and so will make them shorter. On the other hand, the sheltered side of the rock is only getting wave force that has been weakened by the seaward facing side of the rock and so the fronds length will not be affected as much. To control this in future I will restrict myself to measuring the length of the Pelvetia fronds on only one side of the rock(sea/landward facing) to get fairer results. Another reason to explain the anomalies displayed on the histogram could be that the swollen reproductive fruiting bodies on some of the Pelvetia canaliculata added a few mm to the length. On the other hand it could be explained by intraspecific competition. The fronds in the 110.00-119.99 mm category could be shading and preventing the sunlight from reaching the fronds in the categories below it as they are longer; this means that less photosynthesis is taking place and hence slow growth rate and shorter fronds, in other words they will be out competed for light. The two measurements recorded at 160.00-169.99 mm could be an exception of over growth or mutation as from research Pelvetia is expected to grow no more than 150mm in length. On the other hand, this anomaly could also indicate that there might have been some errors happening while taking measurements. Even though I couldnt measure the sunlight intensity received by the Pelvetia canaliculata on both shores as the equipment required werent working, I observed that the wave-exposed shore received more sunlight then the sheltered one. This is because the wave-exposed shore has a southern aspect. However this slight difference in the light intensity received by the chlorophyll on the different shores can affect the growth rate; light is also an important factor in allowing good settlement of spores by stimulating the growth of rhizoids which anchor the young plant to the rock. This is reflected on the data collected from the wave-exposed showing the overlap with the wave-sheltered shores data. The humidity measured on both sites is quite similar with the wave-sheltered shore being very slightly more humid. This difference in humidity was only expected on the wave-exposed shore due to the wave action being greater and so spray will splash higher up adding to the air humidity than on the sheltered shore with much fewer, weaker waves. The explanation that I find convincing and convenient for the increased humidity on the wave-shelt
Friday, October 25, 2019
Pornography â⬠Government Censorship Will Never Promote Equality :: Argumentative Persuasive Argument Essays
Pornography ââ¬â Government Censorship Will Never Promote Equality Catharine Mackinnon seeks to be the Galileo of sexual inequality: the philosopher free of preconceptions who reveals a new structure, incorporating all known facts, radically different from anything previously understood. The structure Galileo overthrew was the Earth-centered universe. The structure Mackinnon must overthrow, in order to make the law do what she thinks it must, is the First Amendment- centered universe (though Mackinnon would probably say it was the pimp-centered universe; pimp is a favorite term of hers). If you have a hammer, everything looks like a nail; Mackinnon is a lawyer, so the law looks like the best way, or the only way, to solve the problem of pornography. If you divorce Mackinnon's conclusions from her prescriptions, you would have a valuable feminist scholar, calling attention to contexts and subtexts in our society previously ignored. But, as an attorney and law professor, Mackinnon must, to accomplish her goals, place herself squarely in confrontation with free speech. This is doubly sad, because the idea she presents us with is so valuable. Mackinnon's central idea is that pornography is the oppression of women; it is not simply talk about or advocacy of oppression. Thus, she argues, contrary to most Constitutional scholars, that pornography is not speech, but action. In Mackinnon's opinion, pornography acts against women twice, when it is made, and when it is viewed. First, women are degraded, raped and (in her belief) even killed in the making of pornographic pictures and films. Then, the pictures and films further participate in the degradation, rape and murder of women by the users of pornography. To cite just one example from Mackinnon's Only Words, Linda Marchiano, then known as Linda Lovelace, was beaten and threatened at gunpoint by her husband during the filming of Deep Throat. The movie then caused men to force women to try acts which Marchiano had only been able to perform under hypnosis. According to Mackinnon, numerous women were hospitalized directly as a result of the film; some were raped by strangers, others were coerced or raped by boyfriends. (Mackinnon and her colleague, Andrea Dworkin, do not really distinguish between rape and psychological coercion; in fact, to Dworkin, all heterosexual sex seems tantamount to rape.) While Mackinnon's world view, thus summarized, may sound extreme, a thought experiment is all that is really necessary to see the validity of her ideas.
Thursday, October 24, 2019
Example of a Reflective Writing
Examples of reflective writing An example of good reflective writing ââ¬â integration of theory with personal experience; justification and explanation of person experience using relevant theory as support; provides insight into the authorââ¬â¢s observations of the theory; appropriate use of language; analysis of theory within the context of own experience. Organisational change and development theory suggests that models are a good way of providing change practitioners with strategies to plan, implement and move through various stages of change (Waddell, Cummings & Worley, 2007).While it is arguable that models are useful in providing guidelines for change practitioners, I feel that they are not necessarily an accurate representation of how change is actually experienced in organisations. I have worked in an organisation that has been through repeated change throughout the duration of my employment. My experience of change has been somewhat different from how it is reflected in change models.For example, as an employee I have not been involved in the initial planning stages of change, nor have I been involved in diagnosis at an individual level, therefore I am unclear as to what happens during these stages. From an individual perspective, it feels as though change is planned and implemented in my organisation at the senior levels of management without adequate input or information to and from staff. Further, from my perspective, change is not experienced in a smooth manner as suggested by change models.I have experienced change that has not appeared to move beyond the unfreezing stages (Lewin, 1947), and I have also experienced change that has regressed at different stages rather than move forward. If I were to work with employees as a change practitioner, I would highlight the realities of change so that employees are aware that there are multiple experiences in addition to ââ¬Ëthe prominent way of viewing this processââ¬â¢ (McShane & Travaglione , 2007, p. 02) within academic references. An example of poor reflective writing ââ¬â colloquial/non-academic writing style; opinion-based without justification or explanation; lack of engagement with theory; links to references not made; generalisation of opinion. In my job I have been though a lot of change and there is no way that what the change models say is right. My experiences of change have all been bad and there is no way that anybody could have had a good experience of change.I donââ¬â¢t think change models are useful as they pretend that change is an easy process which is different from my opinion that no change is easy. I think I can speak for everyone when I say that managers donââ¬â¢t manage change properly as I have never seen the stages of any models within my organisation. This might be because my manager is a poor communicator which is what all the staff think. In my opinion, change models shouldnââ¬â¢t be taught to students as they can only teach stu dents to think about change in the wrong way which doesnââ¬â¢t help employees who have to go through it.
Wednesday, October 23, 2019
A Rose for Emily vs the Lottery
Robert Brockel Brockel1 Dr. Robert Janusko English 2 19 February 201 Foreshadowing There are many ways that a reader can be prepared for the ending of a story, ââ¬Å"The Lotteryâ⬠and ââ¬Å"A Rose for Emilyâ⬠are two very grueling short stories with a long suspense and a similar plot. The narratorââ¬â¢s stance in ââ¬Å"A Rose for Emilyâ⬠was first-person observer, which is defined as a single character point of view in which the narrator was is not involved with the story and the narratorââ¬â¢s stance in ââ¬Å"The Lotteryâ⬠was third-person anonymous which is involves a narrator that does not enter any minds.Both stances conceal the endings and both the stories use imagery and foreshadowing to prepare the reader for the ending. ââ¬Å"A Rose for Emilyâ⬠contains more direct clues but leaves you second guessing whether what is anticipated really happens. ââ¬Å"The Lotteryâ⬠is better known for concealing the entire story till the ending. Shirle y Jacksonââ¬â¢s ââ¬Å"The Lotteryâ⬠is a very surprising story to say the least and gives an overview in the beginning of a small American town of three hundred people that have an annual ritual called ââ¬Å"the lottery. There are significant parts of the story that adumbrate the end of the story and leave the reader in a muddle until the end. First off, in the beginning of the story, the children of the town have just finished school Brockel 2 for the summer on a beautiful June day and they are running around gathering stones to form into a pile. The anticipated ritual is performed to ensure a good harvest even though they do not remember this. One character named Warner quotes an old proverb, ââ¬Å"Lottery in June, corn be heavy soon. Knowing how the story ends its hard to understand that people in an old American town would sacrifice one for the belief that is would give them decent fruitage for the months to come. This story would have a better affiliation with anothe r part of the world where people live in cannibalistic tribes; then it would be easier to predict the ending. Shirley Jackson leaves her audience in the dark until the ending. Tessieââ¬â¢s late arrival at the lottery ritual instantly sets her apart from the crowd of town people, and the Mr.Summers makes a statement to her ââ¬Å"Thought we were going to have to get on without youâ⬠(Pg4p9). The town people have prescience about Tessieââ¬â¢s fate. When Mr. Summers asks whether the Watson boy will draw for him and his mother, no reason is given why Mr. Watson wouldnââ¬â¢t draw as all the other husbands and fathers do, which suggests that Mr. Watson may have been last yearââ¬â¢s victim. William Faulknerââ¬â¢s ââ¬Å"A Rose for Emilyâ⬠is a very chilling story that opens with a brief first-person account of the funeral of Emily Grierson who is an old widow.Her father died when Emily was about thirty and she refused to accept that he was dead for three days. Mr. Grierson choked Emilyââ¬â¢s social ability. After a life of having potential husbands rejected by her father, she spends time after his death with a newcomer, Homer Barron who is a northern laborer. Emily buys arsenic from a shop in town for no Brockel 3 possible reason, which gives her neighbors the idea that she is going to kill herself.Whether or not she is going to kill herself, the reader does not know but the fact that the narrator mentions the poison implies that someone is going to die. She then takes the life of the man whom she refuses to allow to abandon her while the house is a symbol of a shield as she is the outsider of the town and no one knows of the death until she passes away. Faulkner describes her later in the story as someone bloated and pallid with steel hair. This signifies death is close by.Her death ignited a great deal of curiosity about her reclusive individuality. After she was buried, a group of local citizens entered her house to see what remained of her life there. The door to her bedroom was locked kicking in the door they see what had been hidden for so long. Inside, among the possessions that were in Emilyââ¬â¢s room were wedding material and the horribly decomposed corpse of Homer Barron on the bed. On the pillow beside him was the indentation of her head, and a single thread of Emily's grey hair.This could be foreshadowed by the disappearance of Homer Barron and the horrible odor that was in the air. We learn a lot about the lottery, including the elements of the tradition that have survived or have been lost. We learn about the significance of the lottery and how important it is to the villagers, particularly Old Man Warner. We also read through the entire ritual, hearing characters names and watching the men approach the box to take their slips. But Shirley Jackson never tells us what the lottery prize is until the moment the first rock is thrown at Tessie. A Rose for Emilyâ⬠Is a very similar situation in the B rockel 4 sense that we learn about almost everything, how queer the life of Emily Grierson is, the struggle she went through with losing her father, and the curiosity of the citizens from the town. The things we are not aware of are concealed within her house until they kick open her upstairs bedroom door. Both narrators, with different points of view, prepare the audience for the story without giving away the ending.
Tuesday, October 22, 2019
$2500 Essay Contest Scholarship! I Can Save The Earth!
$2500 Essay Contest Scholarship! I Can Save The Earth! $2500 Essay Contest Scholarship! I Can Save The Earth! We are thrilled to announce another essay contest scholarship with an amazing prize of $2500 in scholarship funds. This time around the topic is environmentalism and what students can do to save the earth! Have you done something to protect the natural environment in your community? Do you have a brilliant idea to counteract the human effects on the environment? If so, fire up your word processor and get to work! Keep reading to Learn more! Eligibility If you are a student in a college or university, attend a tech school or certificate program, or are a high school student in the US or a related territory, you are welcome to participate! Requirements We want you to have a fair shake at winning this money, so make sure your essay meets the following requirements: 1000 to 1500 Words Long Written in English Donââ¬â¢t Use Real Names! Send us Your Full Name And a Valid Email Address on a Separate Page Keep it Clean! No Offensive or Harassing Content. Be sure to send it in my 12/31/17. Weââ¬â¢ll let everyone know who won on 01/31/18. Email your essay to @gmail.com What Does it Take to Win? Donââ¬â¢t start typing just yet. First, take a look at our judging criteria. Your essay must be impeccable! Use your spell checker, and be sure you get rid of any grammar or punctuation error. Next, stick to the topic at hand. Relevance is important. Weââ¬â¢re looking for ideas that are original, and that can be put to work! Practical solutions are best! Finally, educate us! Provide examples and tips on ways that each of us can protect the environment. Disclaimer: Once you submit your essay, it becomes our property and will be protected by copyright laws. You may not publish your essay, copy it, or provide it to others without our express written permission.
Monday, October 21, 2019
They As a Nonbinary Pronoun
They As a Nonbinary Pronoun They As a Nonbinary Pronoun They As a Nonbinary Pronoun By Mark Nichol A few weeks ago, an acquaintance visited me, and as my visitor exited the parked car, I saw that it was still occupied. My visitor, standing before me, made a reference to ââ¬Å"they,â⬠but only one person sat in the vehicle, and I was momentarily puzzled. I have written here before about my support for acceptance of they as a gender-inclusive singular pronoun; I agree with many people that he is no longer acceptable to refer to all people, and that alternatives, while often reasonable and effective, do not preclude the need to fill a curious gap in English vocabulary. However, this incident points out a new wrinkle in the issue. When the person sitting in the passenger seat got out of the car, it was obvious to me that this was someone who most observers would identify as a woman. However, two factors explained my acquaintanceââ¬â¢s use of they to refer to the passenger: First, the person had an androgynous appearance. More significantly, my acquaintance is transgender, and a gender activist. I have been comfortable in the company of a number of people who do not conform to binary gender roles. However, this was the first time, to my knowledge, that I had been introduced to someone who rejects binary gender assignment and prefers to be identified by the fluid alternative they. This is not a sociopolitical forum, so discussion about the merit of this philosophy is irrelevant. The purpose of this post is to point out that many people do not consider themselves male or female, whether they align with physical and social characteristics associated with one gender or the other or not- and that regardless of your opinion about this issue, it exists, and it is one that writers likely will have to address at some point, if they have not already done so. Unfortunately, shifting attitudes about gender in our culture complicate expression- and, most pertinently here, composition. People are increasingly asserting a right to self-identify with a neutral use of the pronoun they. To them, gender is not relevant or significant- and that is often true. But when I met the person who prompted this post, I wondered whether my acquaintance, who was born ââ¬Å"maleâ⬠but identifies as female, also prefers the ambiguous pronoun. I didnââ¬â¢t ask, however, and when I used she to refer to my acquaintance, I was not corrected. Ultimately, when someone chooses to assert an identity, it is that personââ¬â¢s responsibility to call attention to that identification if it is relevant. For example, if I am going to speak or write of someone whose presentation is ambiguous in terms of gender, it is not my obligation to guess how that person self-identifies. But I am obliged to honor the personââ¬â¢s stated choice of self-identification, and that is a consideration that professional and lay writers alike will need to make as our society slowly but inexorably evolves to embrace a more fluid approach to gender identity. If it is relevant to mention a personââ¬â¢s gender in writing, a reporter can make one of three choices when the subject asserts gender self-identity that may not conform to the reporterââ¬â¢s perception: Accept, reject, or circumvent. I strongly recommend the first option, oppose the second one with equally vehemence, and acknowledge that the third choice is valid but indefensible if the subject insists on acknowledgment of his, her, or their self-identification and/or if the context requires it. In summary, they as a nonbinary gender indicator is going mainstream, and therefore is entering the lexicon as such. Iââ¬â¢ll let the Associated Press Style Book have the last word: ââ¬Å"In stories about people who identify as neither male nor female or ask not to be referred to as he/she/him/her:à Use the personââ¬â¢s name in place of a pronoun, or otherwise reword the sentence, whenever possible. If they/them/their use is essential, explain in the text that the person prefers a gender-neutral pronoun. Be sure that the phrasing does not imply more than one person.â⬠Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Spelling category, check our popular posts, or choose a related post below:Writing Prompts 101Comma Before But50 Synonyms for "Song"
Saturday, October 19, 2019
Analysis Of Super Juniors Strengths And Weaknesses
Analysis Of Super Junior's Strengths And Weaknesses Super Junior is a 13-year-old idol group with a lot of guaranteed strengths, which made them to be one of the most successful artists of South Korean. Firstly, Super Junior is a group of 13 members with diversified talents who can update and adopt to the changing demands and tastes of the local and global environment. They are individual artist who are continuously working to enhance their multiple skills in entertainment industry by taking acting, singing, dance and foreign language class to communicate with international fans. With diverse abilities in different types of entertainment, Super Junior members can readily absorb local entertainment and identify their strength to fit into the gap of local artists; the large number of members (13 at their peak, 11 now) is also both strength and weakness. Secondly, their flexibility of member number (sub-unit groups) allow different experiments in new markets (such as Super Junior M, Super Junior KRY, etc.) and new genre of music performance (ballad songs, dance RB music or fascinating fierce performances, etc.). Besides, instead of operated and managed with other artists under SM Entertainment (SMEnt), Super Junior has been promoted under SJ Label a sub company of SMEnt with separated investment, staff teams and activities since 2015, which brought them more chance to shine not only domestically but internationally. With the management of SJ Label, they do not have to compete with other artists within SMEnt to get investment and resources. More than 10 years in the industry, they have elaborated themselves with relationship, reputation, experiences and power as well as experiences to attract new group of audiences and countries; good relationship within the entertainment market. Moreover, the fact that all members are above teenagers could be their chance to be easier recognized among young and early debut boy bands especially for international taste of appearance. Now, their initial contracts, so-called ââ¬Å"slave contractsâ⬠, were expired so that they are now pursuing their own desire rather than being forced to fill the tight schedule made by the firm. Last but by no mean least, loyal fans and followers who have been supported them for a long time could be the intermediators to their friends, families or colleagues and not mentioning that they are growing up and have improved income so that these audiences shall be taken into account with special conditions; they have engaged fandom who are dedicated and devoted (like buying SMEnt stock to support their rights, buying billboard and advertising to help promote their album and concert, doing volunteers under Super Junior name) Beside their strengths, they also have weakness, some of which are the common of South Korean artists, but the rest might be from their own problems. Language and culture barrier to enter new markets out of their traditional zones (China, Japan or South East Asia).
Friday, October 18, 2019
Research Methods Essay Example | Topics and Well Written Essays - 1750 words
Research Methods - Essay Example And the trend has accelerated in the past year.â⬠Deputy Chief Patrol Agent of the Border Patrolââ¬â¢s Rio Grande Valley Sector Reynold Garza (2005) said that criminals continue to cross the U.S. borders with Mexico and Canada. Several sources indicated the need for greater border security through a wide range of technological, legislative, and military interventions (Antal, 2010; Meyers, 2003), as well as global agreements (Taylor, 2005). Aside from the need of securing the borders, there are also calls for the consideration of ethical and human rights dimensions of border security (Arreolo, 2010). The U.S. government is called by the international community to consider the rights of poor workers and people searching for an asylum to migrate to the U.S. In addition, some sources argued for the weight of understanding cultural geography, when finding and evaluating solutions to border issues (Arreolo, 2010; Hemphill, 2009). This essay discusses the issue and arguments surroun ding border security. Furthermore, it explores the two most common research designs in criminal justices studies, which are considered in conducting the research for this issue. Finally, it explains the chosen research design and its possible problems and ethical solutions. Statement of the Issue The main issue is that border security measures that are currently employed by the U.S. government are insufficient in responding to the complex issues of legal and illegal migration. The U.S. already employs a wide range of technological, legislative, and military interventions (Antal, 2010; Meyers, 2003), as well as bilateral agreements (Taylor, 2005), but border security issues continue to persist (Antal, 2010; Barlett et al., 2004; Meyers, 2003; Wein, Liu, & Motskin, 2009, p.699). Discussion of the Issue It is important to understand how different parties perceive border securityââ¬â¢s issues and the solutions to them. In general, two of the opposing arguments revolve around what the real problem is and how it should be properly resolved. On the one hand, some parties support greater military and physical/technological interventions to secure the borders. On the other hand, others argue that these interventions are not enough, because they do not reflect a deeper understanding of its causes and so they do not respond to the underlying issues of border migration. Supporters of enhanced military and physical/technological interventions argued that the real problem with border security is that it lacks visible and immediate impediments to illegal immigrants (Antal, 2010; Marek, 2007). Antal (2010) described physical barriers to immigrants to deter them from illegal immigration or to catch them, if ever they do successfully go through existing barriers. Marek (2007) reminded people of the criminal elements in Mexico, who can easily spillover to Americaââ¬â¢s border states and imperil the safety and security of the people in these states. These arguments undersco re that when there are more physical barriers established at the borders, illegal immigrants and people who help them will be less motivated to unlawfully enter the U.S. This thinking is similar to the situational ways of solving crimes, by putting up barriers that will increase the difficulty of conducting the crimes and also boost the chances of being caught. In addition, supporters of these means of border security asserted
Business External Environmental Assessment Assignment
Business External Environmental Assessment - Assignment Example According to the report findings the political environment is constituted by elected leaders and the policies they introduce. These policies could be aimed at regulating business through a range of business and corporate policies, amending the taxation system, protecting the environment, and customer protection. These factors are mainly controlled by the political class through legislations. Economic environment makes the most sense of all the factors. Comcast Corporation must always scan the economic environment to check how stable the economy is at any given time. Another aspect of the economic environment that must be investigated is whether disposable incomes of existing and potential customers is rising or declining. The extent of globalization and competition in the telecommunication and mass media industries too must be checked. The level of competition may be checked by determining if the market share is growing or shrinking.From this paper it is clear thatà socio-cultural aspects of the environment in which Comcast operates entails issues like the population growth trend and the accompanying growth in the number of customers. Generational social attitudes and the societyââ¬â¢s levels of education, health and social mobility also influence Comcastââ¬â¢s business decisions and industry standing.à These socio-cultural issues must be looked into after every predetermined lengths of time.
OS Research Paper Example | Topics and Well Written Essays - 1000 words
OS - Research Paper Example Microsoft Windows or simply Windows is an operating system family of personal computer operating systems that is developed by Microsoft to make use of the computer through graphical user interface (GUI). Additionally, the Windows operating systems have been developed from the MS-DOS (Microsoft Disk operating system), which is a non-graphical command line operating system developed for IBM compatible computers and was initially released by Microsoft in August 1981 and its final version MS-DOS 6.22 was released in 1994. However, currently the MS-DOS operating system is not widely utilized, but its command shell can be used through Microsoft Windows (Computer Hope; Microsoft Corporation). Additionally, this operating system was based on the text mode and used command-line to perform calculations. Thus, it was not a user-friendly operating system. The initial version of Windows operating system, which is also acknowledged as the initial Windows Graphic Environment 1.0 was introduced on 1 0 November 1983, however simply out of the marketplace in November 1985 designed to help and manage the computer requirements to display a picture. The initial Windows 1.0 is a software addition to 16-bit (that was not an OS) that executed on MS-DOS (as well as a number of alternatives of MS-DOS), thus, the DOS operating system was necessary to run this operating system. In addition, after this version the Windows Version 2.x and 3.x were released, which were of the similar type. A number of the newest versions of Windows (however these new versions start from the version 4.0 and Windows NT 3.1) were autonomous OS that no longer reliant upon the operating system MS-DOS (Microsoft Corporation). Beginning from DOS Shell for Microsoftââ¬â¢s DOS 6 Microsoft required struggling beside the best-selling Apple Macintosh that utilized a GUI, Microsoft produced Windows 1.0. However, the name ââ¬Å"Windowsâ⬠was suggested by the Microsoft
Thursday, October 17, 2019
Psychology- oral presentation-change in family structure Essay - 1
Psychology- oral presentation-change in family structure - Essay Example Sociologists believe that the neutral family developed with the growth of industrialization. A smaller family unit was more practical in urban areas that flourished during the industrialization era. The extended family is a type of family structure that is believed to have been prevalent among agricultural societies. There are two main reasons why this is a characteristic of rural societies. Firstly, in an agricultural society wealth is measured by the amount of land. This kind of wealth may have been in the possession of successive generations so one finds that parents, grandparents, in-laws usually live or stay close to the source of the wealth. Secondly, the labor force needed for the land came mainly from the family members so it was necessary to be in close proximity to the farm. These families are usually self-sufficient. One would find that this is also a patriarchal type of family as the oldest male member is usually the figure of authority. In industrialized societies, in some instances, the extended family may exist to facilitate maintaining cultural traditions as well as being financially viable. A good example is the number of Mexican Americans as well as Asian Amer icans who live as together and share living quarters. Other types of family structures include single-parent, reconstituted or step-family, communal families, and foster families. There have been political as well as socio-cultural changes in the world over the last century and a half that have led to the creation of these family structures. One of the greatest agents of change was the legal reforms in the 1960s that transformed divorces and marriages. Prior to these reforms, the granting of divorce was based on fault where either partner had to blame the other or prove the fault of the other in court. The first state in the United States of America to change this law was California through the enactment
Brief memorandum Case Study Example | Topics and Well Written Essays - 1250 words
Brief memorandum - Case Study Example TheCrimesagainst humanity require the parties involvedbeing state actors with high authority in thearea andthe usemilitary means. This is evidenced by the the military force and federal police being deployed by the President Hardlein, who has authority over Minoropolis in the federal state of Minora. Under international law, a war crime takes place during an armed conflict. Internal disturbances are provided for under Rome Statute (Article 8(2) (c)-(f)), andbyjurisprudence.A war crime requires that the sides involved in the conflict are organized and engaged in intense combat. The term organization must satisfy certain criteria put down by an ICC Pre-Trial Chamber, the organization must have a hierarchy of command, possess the means to carry out a widespread or systematic attack, exercises control over a part of the territory of a State, and has criminal activities against a civilian population as a purpose. In Minora, the drug cartels are said to be well organized and have authority throughout the Minora country with the help of local police.Their criminal activities have brought violence to the country with victims being both rivals of member gangs and ordinary citizens. The drug cartels also use military weapons such as automatic weapons and grenade launchers that are used to attack the government forces. Common Article 3 to the Geneva Conventions of 1949 and modified by Art. 1 of Additional Protocol II to state that the conflict must have an extended period of violence, and the parties must be organized and armed. The conflict in Minora between the government forces and drug cartels has taken place since January 2014 and went on until September. This can be said to be a long period of violence. In the case of Prosecutor v Tadic` the court held that an armed conflict occurs when the armed forces is used by governmental authority against armed groups within a state as is the case between the government forces and the criminal cartels. The
Wednesday, October 16, 2019
OS Research Paper Example | Topics and Well Written Essays - 1000 words
OS - Research Paper Example Microsoft Windows or simply Windows is an operating system family of personal computer operating systems that is developed by Microsoft to make use of the computer through graphical user interface (GUI). Additionally, the Windows operating systems have been developed from the MS-DOS (Microsoft Disk operating system), which is a non-graphical command line operating system developed for IBM compatible computers and was initially released by Microsoft in August 1981 and its final version MS-DOS 6.22 was released in 1994. However, currently the MS-DOS operating system is not widely utilized, but its command shell can be used through Microsoft Windows (Computer Hope; Microsoft Corporation). Additionally, this operating system was based on the text mode and used command-line to perform calculations. Thus, it was not a user-friendly operating system. The initial version of Windows operating system, which is also acknowledged as the initial Windows Graphic Environment 1.0 was introduced on 1 0 November 1983, however simply out of the marketplace in November 1985 designed to help and manage the computer requirements to display a picture. The initial Windows 1.0 is a software addition to 16-bit (that was not an OS) that executed on MS-DOS (as well as a number of alternatives of MS-DOS), thus, the DOS operating system was necessary to run this operating system. In addition, after this version the Windows Version 2.x and 3.x were released, which were of the similar type. A number of the newest versions of Windows (however these new versions start from the version 4.0 and Windows NT 3.1) were autonomous OS that no longer reliant upon the operating system MS-DOS (Microsoft Corporation). Beginning from DOS Shell for Microsoftââ¬â¢s DOS 6 Microsoft required struggling beside the best-selling Apple Macintosh that utilized a GUI, Microsoft produced Windows 1.0. However, the name ââ¬Å"Windowsâ⬠was suggested by the Microsoft
Brief memorandum Case Study Example | Topics and Well Written Essays - 1250 words
Brief memorandum - Case Study Example TheCrimesagainst humanity require the parties involvedbeing state actors with high authority in thearea andthe usemilitary means. This is evidenced by the the military force and federal police being deployed by the President Hardlein, who has authority over Minoropolis in the federal state of Minora. Under international law, a war crime takes place during an armed conflict. Internal disturbances are provided for under Rome Statute (Article 8(2) (c)-(f)), andbyjurisprudence.A war crime requires that the sides involved in the conflict are organized and engaged in intense combat. The term organization must satisfy certain criteria put down by an ICC Pre-Trial Chamber, the organization must have a hierarchy of command, possess the means to carry out a widespread or systematic attack, exercises control over a part of the territory of a State, and has criminal activities against a civilian population as a purpose. In Minora, the drug cartels are said to be well organized and have authority throughout the Minora country with the help of local police.Their criminal activities have brought violence to the country with victims being both rivals of member gangs and ordinary citizens. The drug cartels also use military weapons such as automatic weapons and grenade launchers that are used to attack the government forces. Common Article 3 to the Geneva Conventions of 1949 and modified by Art. 1 of Additional Protocol II to state that the conflict must have an extended period of violence, and the parties must be organized and armed. The conflict in Minora between the government forces and drug cartels has taken place since January 2014 and went on until September. This can be said to be a long period of violence. In the case of Prosecutor v Tadic` the court held that an armed conflict occurs when the armed forces is used by governmental authority against armed groups within a state as is the case between the government forces and the criminal cartels. The
Tuesday, October 15, 2019
Public Infrastructure Key Essay Example for Free
Public Infrastructure Key Essay The PKI is a set of hardware, software, procedures and people for the creation, distribution, storing and management of digital certificates. It also maintains the networking environment of an organization by providing management service which could enable digital signature capabilities. It also enabled the users of unsecure public network for exchanging and private cryptographic key pair in order to obtain and share a trusted authority between the management of an organization. For improving an organization, PKI includes use of digital signatures, certificate validation, and permission management service in order to implement a wide variety of enterprise solution within an organization. The implementation of certification authority is primary way of PKI in which it could benefit an organization and Information security department by providing public key and authority. In this way, both organization and Information security department is benefited from the implementation of user keys. The web of trust is the second way in which PKI provides an alternative approach of public key information for enabling the issue digital certificates for user, applications and devices of an organization and Information security department. Establishment of leverage certification authentication is the third way which benefits an organization and Information security department by maintaining an auditable database of users in order to secure privacy histories of Information security department. The development of Certification Authority is the way in which PKI could assist in the process of signing the companyââ¬â¢s software by providing root of trust and services for the authentication of computers, individuals and other entities in a network. This is because, it saves certificate requests and issues certificates for signing the companyââ¬â¢s software by means of saving the encryption keys in the certificate database for recovering the data loss ofà computerââ¬â¢s softwar e. Consumer could believe that the software is to be authentic and because Certification Authority is valuable in authenticating software effectively. Consumer can get authentic software by the establishment of keys which are valid and trustworthy and in order to provide the assurance of software, it represents the people, system and process for the creation of digital certificates of software. For benefiting consumers, Certification Authority is having three kinds of information which are userââ¬â¢s name in the format of distinguished name, verification of userââ¬â¢s digital signature for software and encryption and verification of digital signatures of software. The public CA is considered as an accountable CA for any failure of PKI and on the other hand, in-house CA is integrated in Active Directory. The public CA would trust a digital certificate and in-house CA is performed upon its own tasks for simplifying the management of CA structure. The certificate management of public CA is lower than in-house CA. These are the positive characteristics of both public and in-house CA. The negative characteristics of public and in-house CA are that infrastructure of public CA is limited and it has less flexibility, in-public CA is more complicated and business partners would not trust in-house CA. When comparing both public and in-house CA, the Public Certification will be better in implementing within an organization and because Public CA provides effective self-registration, digital identities, enrollment services and PIN authentication than in-house CA. Public CA is a highly functional and trustworthy when comparing with in-house CA. Hence, PKI contributes the management of life cycle of digital certificates, profiles of administration for an organization and Information security department. References Vacca, Jhn R. (2004). Public key infrastructure: building trusted applications and Web services. CRC Press. p. 8. ISBN 978-0-8493-0822-2. Adams, Carlisle Lloyd, Steve (2003). Understanding PKI: concepts, standards, and deployment considerations. Addison-Wesley Professional. pp. 11ââ¬â15. ISBN 978-0-672-32391-1. Trà ek, Denis (2006). Managing information systems security and privacy. Birkhauser. p. 69. ISBN 978-3-540-28103-0.
Monday, October 14, 2019
What Are The Motivations Of Dark Tourists?
What Are The Motivations Of Dark Tourists? On the 27th of April 2008, Josef Fritzl was arrested in Amstetten, a small town in Austria. It has shown that Fritzl sexually abused his daughter, Elisabeth, since she was eleven years old. When she was eighteen years old he locked her up in the basement underneath his house. Fritzl forced his daughter Elisabeth to write a letter to her mother where she stated that she had run away from home and joined a sect. The sexual abuse led to the birth of seven children. Three of these children were raised by Elisabeth in the basement and the other three were raised by Fritzl and his wife. One of the children died a few days after it was born. Furthermore, Fritzl convinced his wife that the three children they raised were exposed by Elisabeth. When one of the children that lived in the basement, the at that time nineteen-year-old Kersten, got ill Elisabeth convinced her father that she needed to be hospitalized. Because Kersten was not registered anywhere, one of the doctors informed the auth orities. After this, Elisabeth saw a program on the television in her basement that made a call up for the mother of Kersten. Then she convinced her father to bring her to the hospital, which led to the hearings of Fritzl and Elisabeth and the confessions of the cruelties that took place. After twenty-four years Elisabeth was freed from the basement and reunited with all her children (Wikipedia, 2010). This affair has received tremendous attention in the media and therefore the case is known all over the world. The affaire encompasses a painful and shameful episode on a national and local basis. Furthermore, the house of Fritzl has become a touristic attraction. Amstetten is dealing with an increasing amount of tourists that come to visit the house. When tourists visit the house, they often take photos of the house and of themselves in front of it. The articles on the internet show that the local authorities find this shocking (HLN, 2010). The phenomenon that people visit places that are associated with death, suffering and violence can be described as dark tourism. Thanatourism is a similar concept and also involves the visiting of locations associated with death and suffering, but an emphasis is placed upon symbolically experiencing a painful death. Another related concept is black spots, which can be described as commercial cemeteries of famous people or locations where death an d suffering took place. The house of Fritzl belongs to such places and visiting this location fits the description of dark tourism and thanatourism. The house of Fritzl, where the abuse and cruelties took place, can be seen as a symbolic reflection of this affaire and its tragic events. Furthermore, the house serves as a tangible object that invokes the memory of the Fritzl-affaire (Yull, 2003: 10-13; Logan en Reeves, 2009: 1-3; Rojek, 1993: 136). The phenomenon that people visit the house of Fritzl inspired me to formulate the following research question: What are the motivations of dark tourists? The case of the house of J. Fritzl in Amstetten. It is interesting to find out why tourists visit the house, if the media attention has played a role in the decision of people to visit the house and if certain characteristics, such as age and gender, affect the motivation of these visitors. The case of Fritzl offers a fascinating and recent case to go more in-depth into the motivations of dark tourists. Scientific and Social Relevance The scientific relevance of this research question lies in the fact that the subject of dark tourism is relatively new within the academic field. Several articles have been published on this topic, but as Stone (2006) argues: despite this increasing attention the dark tourism literature remains both eclectic and theoretical fragile (Stone, 2006: 145). Some researchers have already focused on visitor motivations of dark tourist sites. For example, Yull (2003) investigated why people visit the Holocaust Museum in Houston. However, according to Stone (2006) and Sharpley (2009) research first and foremost has focused on describing the different dark tourist sites, rather than on the consumption and experiences of visitors. This research will contribute to the understanding of visitor participation in dark tourism by taking the visitors of the house of Fritzl as the focal point of this research. Furthermore, the existing research has not focused on the motivations of visitors to dark tour ist sites, comparable to the house of Fritzl and therefore this research will add to and fill the gap in the existing literature. The social relevance of this research is harder to determine. However, finding out what the motivations of visitors are, might provide useful and relevant information for directly involved parties, other than the scientific community. For example, this information could offer the local community of Amstetten and (in)direct victims of this case a better understanding of what is going on and with what reasons people visit this site of horror. For example visitors might be motivated to visit this place to pay respect to the victims or remember the cruelties that took place, instead of entertainment purposes. Furthermore, the results of this research could even be relevant to society as a whole, since dark sites similar to the house of Fritzl seem to increasingly pop up and attract visitors world-wide. This research seeks to provide insights into why people a re motivated to visit these morbid locations. Theoretical Concepts and Hypothesized Relations As mentioned previously, several theoretical concepts are related to the phenomenon where people visit places associated with pain, death and suffering. Academic attention to this phenomenon increased in the twentieth century and several theoretical concepts were introduced. These concepts are black spots (Rojek, 1993), dark tourism (Lennon and Foley, 1996: in Yull, 2003) and thanatourism (Seaton, 1996: in Sharpley, 2009). These dark concepts will be briefly discussed in a more or less chronicle order, based on introduction in the literature. Another concept of importance for this research is visitor motivations (Sharpley, 2009: 12-15). Dark Concepts Black Spots Rojek (1993) coined the term black spots and argues that these locations involve commercial cemeteries of famous people or sites where death and suffering took place. In his research, Rojek (1993) also mentions that people increasingly visit these dark sites and that entrepreneurs initiate tours around these black spots. Examples of black spots are the concentration camp Auschwitz-Birkenau in Oswiecim-Brzezinka, Ground Zero in New York and the location where Princess Diana got killed in a car crash (Rojek, 1993: 136-145). Dark Tourism and Thanatourism Visiting places associated with death, pain and suffering is becoming increasingly popular. However, Sharpley (2009) argues that this is not a new phenomenon. In the Roman Empire, it was a common form of entertainment to attend a gladiators match. Another example are the public executions in the Middle Ages. Traveling to places where death and suffering are central elements can be defined as dark tourism. Furthermore, it involves consuming real or simulated places of death and horror. Visiting these places where actual cruelties took place by relatives or friends of the victims cannot be seen as a form of dark tourism. Thanatourism is a concept which strongly relates to dark tourism and was introduced in the literature in the same year as dark tourism. Thanatourism entails the visiting of locations associated with death and suffering, where visitors want to symbolically experience a painful death. This description points more to the motivations of visitors of dark sites. However, the term dark tourism is usually used in the academic field and no distinction is made between the concepts dark tourism and thanatourism. Therefore, I will use the term dark tourism in this research and make no difference between dark tourism and thanatourism (Lennon en Foley, 2000: 3-5; Yull, 2003: 10, 11; Sharpley, 2009: 3-19). Dark tourism involves the actual visiting of black spots. There are different black spots which are visited daily by tourists and therefore belong to sites of dark tourism. Furthermore, several tours are initiated around dark sites. Commercial motives, in terms of entrance fees, are often involved. Examples are the Jack the Ripper tour in London or the tour in Charleroi which shows you, among other dark sites, the house of the famous kidnapper and child molester Marc Dutroux. Visiting morbid museums, old prisons or battle field fall also under the category dark tourism. As discussed previously, the house of Fritzl fits the description of a black spots and inc reasingly attracts visitors. This research seeks to understand the motivations of these visitors (Stone, 2006: 145, 146, 152; HLN, 2010). Visitor Motivations For this research it is necessary to include visitor motivations as a theoretical concept. Motivations of individuals to visit regular tourist places include getting acquainted with other cultures and increase ones knowledge about these locations. Furthermore, motivations often involve entertainment purposes, such as having fun or seeking adventure. Relaxation, revitalization, being active and get close to nature are also common incentives to visit a certain location (Kozak, 2002: 225). However, these motivations of regular touristic locations might differ from motivations of tourists that visit black spots. Unfortunately, few literature is available that focus on visitor motivations of dark tourists. The literature that is accessible, uses similar research questions to the one is used in this research. Yull (2003) studied the motivations of dark tourists and focused more specifically on the motivations of visitors of the Holocaust Museum in Houston. Niemelà ¤ (2010) focused on visi tor motivations of the House of Terror museum in Budapest. This museum is built to remember the tortured and killed people during World War II. In addition, Poria, Reichel and Biran (2006) chose to investigate the motivations of the visitors of the Anne Frank House in Amsterdam. Although the dark tourist locations used in these researches are museums associated with death and suffering and therefore differ from the dark site that is used in this research, similar motivations may be found. If different motivations are found, it could be argued that this difference is dependent on the specific dark tourist site. According to Yull (2003), motivations of dark tourist could involve entertainment purposes, such as providing a thrill, a novel experience or adventure. Furthermore, remembering the victims and the cruelties that took place or curiosity can also be motivations of tourist that visit the house of Fritzl. Although education might be more suitable as a motivation to visit a museum associated with death and suffering, individuals can also visit the house of Fritzl to learn something. For example, visitors might want to enrich their knowledge about the Fritzl-affaire. In addition, Niemelà ¤ (2010) argues that emotional involvement might also play a role in the motivations of dark tourists. Visitors might identify or have a personal connection with the cruelties that took place. Moreover, Poria, Reichel and Biran (2006) include two more motivations; tourists might visit a dark site, because it is famous or because they feel that the site is historically important (Yull, 2003: 146-159, 191-199; Niemelà ¤, 2010: 37; Poria, Reichel and Biran, 2006: 322). The media play an important role within the field of dark tourism. The media can report tragic events that take place all over the world. The attention that the media pay to tragic and horrible events serve as a stimulation for flows of tourism. Furthermore, media has the capacity to bring dark tourism sites to public consciousness (Yull, 2003: 125). Additionally, Lennon and Foley (2000) argue that the attention of the media to specific dark sites, might motivate individuals to visit the location in order to experience the reality behind the media representations. Since, the Fritzl-affaire received tremendous attention in the media, it will be likely that this attention has an influence on the motivation of visitors (Stone, 2009: 57; Seaton, 2009: 90; 95, 106; Lennon and Foley, 2000: 152). Operationalization of Theoretical Concepts In this section, the operationalization of the theoretical concepts will be discussed. To answer the question What are the motivations of dark tourists? The case of the house of J. Fritzl in Amstetten, I will conduct qualitative semi-structured interviewsà [1]à with visitors of the house of Fritzl in Amstetten. This implies that a topic list will be made, consisting of topics that will be addressed in the interview. However, the order in which the topics will be discussed is not fixed and if necessary, the interviewer will probe for more information and adapt to new themes that are brought up by the interviewees. Furthermore, the interviewer can adapt to the level of comprehension of the respondents. The questions will be open, which means that no answer categories will be made (t Hart, Boeije and Hox, 2007: 274, 275; Gilbert, 2001: 123, 124). Several topics that will be addressed in the interview are outlined. First of all, it is important to include demographic factors of the v isitors, such as age, the country the interviewee lives in and the highest obtained level of education (primary school or less, secondary school, intermediate vocational training, higher vocational training, college or post graduate). Furthermore, the gender of the respondent will be noted during the interview. These demographic factors are included, because they are important background variables and might affect the motivations people have to visit the house of Fritzl. Other topics that will be included will focus upon the motivations of visitors of the house of Fritzl in Amstetten. It will be asked what attracted the visitors to visit Amstetten and what their primary reason is for visiting this town. I will seek to explore whether visitors come specifically for the house or if they have other motives or more than one reason to visit this town. Then, I will focus on the topic of why people visit the house of Fritzl. Although, similar answers to the research on dark tourist motivations described above maybe found, such as entertainment, curiosity, remembrance of the victims and cruelties that took place, emotional involvement, historical importance of the site or its fame, unexpected answers also need to be taken into account. Furthermore, it is essential to go in-depth into the answers and ask for further elaboration if necessary. Additionally, it needs to be explored whether visitors have multiple motivations to visit the house of Fritzl. Seeking to understand motivations of visitors of the house of Fritzl, demands for adapting to possible unexpected answers and the skills to react to this situation adequately. Furthermore, the role of the media will be addressed. Central themes will be, whether visitors are familiar with and interested in the Fritzl-affaire, if they have followed the case in the news, documentaries or on the internet. This will seek to explore whether media attention to the Fritzl-affaire affects the tourists in their motivation to visit the house. Next, I will focus upon if the visitors have previously visited other dark locations, where cruelties have taken place. It will be interesting to find out if there is a relationship between visiting the house of Fritzl and other dark locations and if we are dealing with tourists that have an interest in visiting dark sites in general. Plan for Data Collection For this research, the visitors of the house of Fritzl in Amstetten are the objects of study. Hence, it is necessary to come into contact with these visitors. For this research I choose to use qualitative semi-standardized interviews to answer the research question. Qualitative methods are used when a certain research topic is relatively new and unexplored. Furthermore, qualitative methods offer the possibility to go more in-depth into specific aspects of a certain phenomenon. Baarda, de Goede and van der Meer-Middelburg (1996) argue that qualitative interviews are a suitable method when ideas, motivations, opinions and experiences need to be investigated. Since this research seeks to explore the motivations of visitors of the house of Fritzl in Amstetten, it fits this description (t Hart et al. 2007: 253; Baarda et al. 1996: 18-20). I choose to use semi-structured, one-to-one interviews. This implies that topics will be formulated and addressed in the interview. Besides demographic questions, specific questions, answer categories or the order of the questions will not be fixed in advance. This gives the interviewer the opportunity to probe for more information if necessary or reflexively respond to new themes that might be brought up. This reflexive approach is essential, since motivations of dark tourists is relatively unexplored, especially in regard to locations comparable to the house of Fritzl. This may result in unexpected answers to be brought up. When standardized methods are used, this will not be possible. One-to-one interviews are used, because the interviewees will not be influenced by the opinions of others and may give them the feeling to speak more openly about their motivation(s). Furthermore, confidentiality and anonymity of the data will be guaranteed (Baarda et al., 1996: 18-24, 26-28; t Hart et al. 2007: 254, 261, 262, 267; Gilbert, 2001: 123-129). To interview the research participants of this research it is necessary to go to Amstetten, w hich is roughly a nine hour drive from Rotterdam. I will spend three days around the house of Fritzl and I will approach the visitors that come by. I will ask them if they are willing to participate in this research. This research requires purposive sampling, because I assume that only a small group of visitors of the house of Fritzl is accessible in these three days and this group will be likely to represent the visitors as a whole. Furthermore, using a probability sample is often unrealistic for small-scale or qualitative research (Gilbert, 2001: 62). The duration of the interview will be approximately twenty minutes and the amount of interviewees will depend on the willingness to participate. The aim will be to conduct ten to twenty interviews. Furthermore, the interviews will be recorded. Gilbert (2001) argues that recording is recommendable, especially when conducting non-standardized or semi-structured interviews. This, because this type of carrying out interviews requires an active participation of the interviewer within the conversation. By recording the interview, the data wont be lost and in contrast to making notes it wont obstruct or slow down the dialogue. It also signals that the responses of the respondents are taking seriously. Of course, the use of recording will be explained to the interviewees and their approval will be asked. Directly after the interview, notes will be made about the setting, the interview and the interviewee which can be used to recall the context of the particular interview (t Hart et al. 2007: 268-270; Gilbert, 2001: 61-63, 135-137). Plan for Data Analysis When the data is collected, the analysis of the data will begin. First of all, the recorded interviews will be verbatim transcribed. I choose to write down everything that is said, because then data wont get lost that might be of significance when the research progresses. Although, transcribing everything is time-consuming and labor-intensive, the low quantity of interviews makes it possible to do so. Furthermore, transcribing the data allows you to get familiar with the data and it helps facilitating thoughts and ideas about possible connections and underlying themes. Before analyzing, the transcripts will be checked by listening to the recordings once more and by carefully reading the written text. The demographic characteristics of the respondents will be shown on the first page of the transcripts. After this, I will offer the transcript to the respondents, so that accuracy can be checked and comments can be made. This improves reliability and validity of the answers (Gilbert, 200 1: 134-137). The transcripts will be read repeatedly with the aim to identify underlying themes and connections. By comparing and contrasting fragments within interviews and between interviews, fragments with an underlying connection will be categorized and labeled. Furthermore, it will show whether the earlier described motivations are found in the transcripts, or if new themes will be discovered. Similarities and dissimilarities between different respondents may emerge and might relate to their demographic characteristics. Eventually, the codified themes will be linked and compared to draw a full picture of the motivations of visitors of the house of Fritzl in Amstetten and answer the research question (Gilbert, 2001: 137, 138; t Hart et al. 2007: 176, 277). Discussion Gilbert (2008) describes six properties that a research question should have. The research question should be interesting, relevant, concise, answerable, feasible and ethical. For this research it is necessary to address two of these properties more in-depth, which are the feasibility of this research and its ethical dimensions. The research question, What are the motivations of dark tourists? The case of the house of J. Fritzl in Amstetten, is feasible to the extent that it can be answered within a relatively short period of time and with relatively low costs. Furthermore, the research participants are accessible. However, the search for visitors of the house of Fritzl might show difficulties. For this research I will spend three days around the house of Fritzl and approach the tourists that will visit the house. However, it is possible that on these particular days there will be no visitors at all. Consequently, finding research participants might be time-consuming and unpleasant ( Gilbert, 2008: 48). According to Gilbert (2008), it is of importance to take into account the ethical dimensions of a research question. While no specific approval is needed from institutions to conduct this research, this research involves a certain sensitivity. The reason for this, is that this study focuses upon an affair where people suffered and were mistreated. Therefore, this affair is sensitive to victims or relatives of these victims. Furthermore, this case might be sensitive to the neighboring residents or the whole community of Amstetten. Spending three days in front of the house of Fritzl to gather the research participants might be offensive to the residents. For example, they might be upset or feel that their privacy is violated. Consequently, it is necessary to work with discretion. Eventual publication of this research also involves ethical implications. Publication might cause harm to the different parties involved (Gilbert, 2008: 48, 49; Gilbert, 2001: 49-53). A la st brief comment I would like to make is about the weaknesses of Literature Baarda, D.B., de Goede, M.P.M. van der Meer-Middelburg, A.G.E. 1996. Basisboek Open Interviewen. Groningen: Stenfert Kroese. Gilbert, N. 2001. Researching Social Life (2nd edition). London: Sage Publications. Gilbert, N. 2008. Researching Social Life (3d edition). London: Sage Publications. t Hart, H., Boeije, H. Hox, J. 2007. Onderzoeksmethoden. Amsterdam: Boom onderwijs. Kozak, M. 2003. Comparative analysis of tourist motivations by nationality and destinations. Tourism Management 23, 221-232. Lennon, J.J. Foley, M. 2000. Dark Tourism: The Attraction of Death and Disaster. Australia: South-Western Cengage Learning. Logan, W. Reeves, K. 2009. Places of Pain and Shame: Dealing with Difficult Heritage. USA/Canada: Routledge. Niemelà ¤, T. 2010. Motivation Factors in Dark Tourism: Case: House of Terror. https://publications.theseus.fi/bitstream/handle/10024/14984/Niemela_Titta.pdf?sequence=3 6 October 2010 Poria, Y., Reichel, A. Biran, A. 2006. Heritage Site Perceptions and Motivations to Visit. Journal of Travel Research 44, 318-326. Rojek, C. 1993. Ways of Escape: Modern Transformations in Leisure and Travel. London: The MacMillian Press. Sharpley, R. 2009. Shedding Light on Dark Tourism: An Introduction. In: R. Sharpley P.R. Stone. The Darker Side of Travel: The Theory and Practice of Dark Tourism. Bristol: Channel View Publications, 3-22. Stone, P.R. 2006. A dark tourism spectrum: Towards a typology of death and macabre related tourist sites, attractions and exhibitions. Tourism 54 (2), 145-160. Stone, P.R. 2009. Dark Tourism: Morality and New Moral Spaces. In: R. Sharpley P.R. Stone. The Darker Side of Travel: The Theory and Practice of Dark Tourism. Bristol: Channel View Publications, 56-74. Yull, S.M. 2003. Dark Tourism: Understanding Visitor Motivation at Sites of Death and Disaster. http://etd.tamu.edu/bitstream/handle/1969.1/89/YUILL-THESIS.pdf?sequence=1. 7 October 2010 Websites HLN, 2010 http://www.hln.be/hln/nl/960/Buitenland/article/detail/314386/2008/06/16/Toeristen-op-de-foto-voor-horrorkelder.dhtml 6 October 2010 HLN, 2010 http://www.hln.be/hln/nl/1901/reisnieuws/article/detail/269697/2008/05/08/Ramptoerisme-bij-Oostenrijks-gruwelhuis.dhtml 6 October 2010 Wikipedia, 2010 http://nl.wikipedia.org/wiki/Fritzl-incestzaak 6 October 2010
Subscribe to:
Comments (Atom)