Tuesday, August 6, 2019

Civil Rights and Responsibilities Essay Example for Free

Civil Rights and Responsibilities Essay The Bill of Rights was added to the Constitution shortly after its ratification. These amendments guarantee certain political, procedural, and property rights against infringement by the national government (Patterson, 2009). â€Å"A bill of rights is what the people are entitled to against every government on earth, general or particular, and what no just government should refuse, or rest on influence (Thomas Jefferson). The First Amendment provides the foundation for freedom of expression which is the right of individual Americans to hold and communicate views of their choosing (Patterson, 2009). The motivation of the Bill of Rights was to guarantee individual rights and freedoms. The First Amendment reflects this tradition, providing for freedom of religion along with freedom of speech, press, assembly, and petition. The three provisions of the First Amendment are the freedom of speech, assembly and religion. The freedom of speech states that you are free to say almost anything except that which is obscene, slanders another person, or has a high probability of inciting others to take imminent lawless action. The freedom of assembly states that you are free to assemble, although government may regulate the time and place for reasons of public convenience safety, provided such regulations are applied evenhandedly to all groups. The freedom of religion states that you are protected from having the religious beliefs of others imposed on you, and you are free to believe what you like. Freedom of religion simply means citizens have freedom to attend a church, synagogue, temple or mosque of their choice, or not to attend at all. The First Amendment allows us to practice our religion the way we want to. When talking about freedom of religion and the First Amendment I think about religion in the schools. Every since the Supreme Court held school-sponsored prayer unconstitutional in the early 1960s, there has ben a concerted and well-funded campaign to reintroduce religion in public schools. Public schools themselves should not be in the business of promoting particular religious beliefs or religious activities and they should protect children from being coerced by others to accept religious (or anti-religious beliefs. A Saskatchewan Human Rights Commission inquiry ruled in July that the Saskatoon Board of Education must end a practice of giving teachers the option of conducting prayers in public school classrooms and assemblies. In practice, the choice has been primarily the Lords Prayer. The ruling will not change practices in separate schools. The inquiry followed a complaint six years ago by nine parents, including Muslims, Jews, Unitarians and atheists. About 20% of the 550 public school classrooms in Saskatoon begin the day with prayer. The decision may be appealed in court (Globe and Mail, 1999). The relationship between religion and government in the United States when it comes to the United States Constitution is governed by the First Amendment to the Constitution, which both prevents the government from establishing religion and protects privately initiated religious expression and activities from government interference and discrimination. The First Amendment thus establishes certain limits on the conduct of public school officials as it relates to religious activity, including prayer. Prayer should not have been taken out of schools. Parents should be sent home a letter opting out of religious activities and employees should be given the same option, but taken it out of schools was ridiculous. The case of Engel v. Vitale (1962) went to the Supreme Court and the case was about a time in 1951 the New York State Board of Regents (the State board of education) approved a 22-word â€Å"nondenominational prayer â€Å"for recitation each morning in the public schools of New York. It read: â€Å"Almighty God, we acknowledge our dependence upon Thee, and we beg Thy blessings upon us, our parents, our teachers and our Country.† The Regents believed that the prayer could be a useful tool for the development of character and good citizenship among the students of the State of New York. The prayer was offered to the school boards in the State for their use, and participation in the â€Å"prayer-exercise† was voluntary. In New Hyde Park, New York, the Union Free School District No. 9 directed the local principal to have the prayer â€Å"said aloud by each class in the presence of a teacher at the beginning of the school day.† The parents of ten pupils in the New Hyde Park schools objected to the prayer. They filed suit in a New York State court seeking a ban on the prayer, insisting that the use of this official prayer in the public schools was contrary to their own and their childrens beliefs, religions, or religious practices. The State appeals court upheld the use of the prayer, â€Å"so long as the schools did not compel any pupil to join in the prayer over his or his parents objection† (infoplease.com). The Freedom to Assemble gives people the right to assemble peacefully without causing any harm to others. As much as I do not agree with the KKK views and opinions they should be able to assemble if they do it in a peaceful manner. The First Amendment prohibits government from abridging the right of the people peaceably to assemble. This basic freedom ensures that the spirit of the First Amendment survives and thrives even when the majority of citizens would rather suppress expression it finds offensive. Over the course of our history, freedom of assembly has protected individuals espousing myriad viewpoints. Striking workers, civil rights advocates, anti-war demonstrators and Ku Klux Klan marchers have all taken to the streets and sidewalks in protest or in support of their causes. Sometimes these efforts have galvanized public support or changed public perceptions. Imagine a civil rights movement without the March on Washington or the womens suffrage movement without ranks of long-skirted, placard-carrying suffragists filling city streets. The U.S. Supreme Court recognized the importance of this freedom in the 1937 case De Jonge v. State of Oregon, writing that the right to peaceable assembly is a right cognate to those of free speech and free press and is equally fundamental. â€Å"According to the Court, † the right to assemble is one that cannot be denied without violating those fundamental principles which lie at the base of all civil and political institutions† (archive.firstamendmentcenter.org). The KKKs right to assemble peaceably was secured by the famous 1977 case of National Socialist Party v. Skokie, in which the American Civil Liberties Union successfully argued that the First Amendment prohibited officials of Skokie, Ill., from banning a march by the National Socialist Party. Skokie is a Chicago suburb that is home to many Holocaust survivors. One federal judge reasoned that â€Å"it is better to allow those who preach racial hatred to expend their venom in rhetoric rather than to be panicked into embarking on the dangerous course of permitting the government to decide what its citizens may say and hear† (archive.firstamendmentcenter.org). In conclusion, the First Amendment of the United States protects the rights to freedom of religion and freedom of expression as well as freedom of assembly from government interference. Freedom of expression consists of the rights to freedom of speech, press, assembly and to petition the government for a redress of grievances, and the implied rights of association and belief. The Supreme Court interprets the extent of the protection afforded to these rights. The First Amendment has been interpreted by the Court as applying to the entire federal government even though it is only expressly applicable to Congress. Two clauses in the First Amendment guarantee freedom of religion. The Establishment Clause and the Free Exercise Clause are two clauses in the First Amendment that guarantee freedom of religion. The Establishment Clause prohibits the government from passing legislation to establish an official religion or preferring one religion over another. It enforces the separation of church and state. The Free Exercise Clause prohibits the government, in most instances, from interfering with a persons practice of their religion. The right to assemble allows people to gather for peaceful and lawful purposes. Implicit within this right is the right to association and belief. With that being said, all people should be having some kind of freedom. They should be able to boycott and assemble peacefully without causing any harm to anyone. People should be free to have their different views and opinions of religion, be it that they religious or anti-religious. To sum it all up I would love for everyone to feel that they are free. References http://www.oyez.org/cases/1960-1969/1961/1961_468 http://www.aclu.org/religion-belief/program-freedom-religion-and-belief-government-funded-religion Religion in schools (teachers in Saskatchewan will no longer have the option of conducting prayer services in class). Humanist in Canada 130 (1999): 4, 39. General OneFile. Web. 25 June 2012. http://www2.ed.gov/policy/gen/guid/religionandschools/prayer_guidance.html

Monday, August 5, 2019

Criminal Offences And Felony Crimes Criminology Essay

Criminal Offences And Felony Crimes Criminology Essay In the court system we have many different types of crime, some ranging from something as simple as a speeding ticket, to crimes that are unthinkable. Each crime that we have also has a variety of sentencing and things that will happen when said crime is committed. FELONIES: A criminal offense punishable by death or by incarceration in a prison facility for at least one year. A felony is a serious crime; they include murder, rape, aggravated assault, robbery, burglary and arson. The federal government and many states have moved to a scheme of classifying the seriousness of felonies, using a number or letter designation. For purpose of criminal sentencing, for example, the federal system assigns a score of 43 to first degree murder, while a crime of theft is only rated a base offense level of 4. The persons history of crime is taken into consideration as well. Because of the differences among the states, crimes can be perceived differently. A felony in one state can be just a misdemeanor, and other areas it may not be a crime at all. In the United States a felony can lose certain rights: Loss of voting rights (which the Supreme Court interpreted to be permitted by the Fourteenth Amendment) Exclusion from obtaining certain licenses Exclusion from purchase and possession of firearms, ammunition and body armor Ineligibility for public office Ineligibility for serving on a jury Deportation (if the criminal is not a citizen) The consequences of committing a crime are serious; a felony conviction is at the very least one year in prison. But the terms of incarceration can vary a lot. U.S federal courts have sentencing guidelines, which suggest the period of imprisonment and fine for each offense. Courts can use these as standards but they are not required to use those guidelines to impose a sentence upon a convicted person. Wisconsin Felony Penalties: Class (A) felony: imprisonment for life: however, for a repeat offender, the term of imprisonment may increase up to 2 years to 6 years. (first degree intentional homicide, felony murder) Class (B) felony: up to 60 years, imprisonment may increase up to 2 to 6 years with a prior conviction. (Second degree intentional homicide, (manslaughter), first degree reckless homicide, conspiracy, first degree sexual assault, kidnapping) Class  © felony: the penalty is a fine of up to $100,000 or up to 40 years, or both, repeat offender 2 -6 years with a prior conviction. (felony drunk driving, 5th or subsequent offense, 2nd degree sexual assault, kidnapping, arson, robbery, vehicular manslaughter while intoxicated) Class (D) felony: $100,000 fine or up to 25 years or both. Prior convictions may increase from 2-6 years depending on it being a misdemeanor or felony.( Felony drunk driving, 5th or subsequent offense, felony vehicular homicide, vehicular homicide while intoxicated, child enticement, solicitation of a child) Class (E) felony: $50,000 fine 15 years or both, increase from 2-6 years for prior convictions. (battery, great bodily harm, burglary, robbery) Class (F) felony: $25,000 fine and up to 12-1/2 years in prison or both, repeat offender 2-6 years longer. (failure to act to prevent sexual assault of a child, sexual exploitation, burglary, stalking, theft) Class (G) felony: $25,000 fine and up to 10 years imprisonment or both longer for prior convictions 2-6 years (negligent homicide, negligent vehicular homicide, embezzlement, theft) Class (H) felony: up to $10,000 fine, and imprisonment up to 6 years or both longer for prior convictions 2-6 years (embezzlement, battery (great bodily harm), false imprisonment, stalking and theft) Class (I) felony: up to $10,000 fine and imprisonment up to 3-1/2 years or both, 2-6 years longer for prior convictions. (child pornography, embezzlement, battery- (substantial bodily harm) stalking, and theft) Misdemeanor: An offense punishable by incarceration, usually in a local confinement facility, for a period whose upper limit is prescribed by stature in a given jurisdiction, typically less than one year or less. Minor crimes consisting of offenses such as petty theft, which is the theft of items with little worth, normally a person cant be arrested for a misdemeanor unless the crime was committed in front of the officer. Misdemeanors are classified according to their severity. Each misdemeanor classification; provides recommendation for jail sentences and forfeitures (fines). A person convicted of a misdemeanor can be sent to a county or local jail, ordered to pay a fine, or both. Class (A) Misdemeanor: up to a $10,000 fine or prison for up to 9 months or both, repeat offenders may be in prison for up to 2 years. Class (B) Misdemeanor: up to a $1000 fine, 90 days in prison or both, repeat offender can increase time to up to 2 years. Class  © Misdemeanor: up to a $500 fine, and 30 days in prison or both, longer for repeat offender up to 2 years. Both felonies and misdemeanors are criminal charges but with one big difference, Felony you are in a state or federal prison, with a misdemeanor you are in a local or county jail. Offenses: A violation of the criminal law. Also, in some jurisdictions a minor crime, such as jaywalking, that is sometimes described as getting a ticket, others would include spitting on the sidewalk, littering, and traffic violations, including but not limited to not wearing a seatbelt. Another good word for it would be called an infraction, people that commit infractions are usually ticketed and released. Court appearances are usually waived, through payment of a small fine that can be mailed. Treason: A U.S citizens actions to help a foreign government overthrow, make war against, or seriously injure the United States, also the attempt to overthrow the government of the society of which you are a member. Special categories of crime do exist and they should be recognized, they are treason espionage, two crimes that are considered as the most serious felonies. In addition to being a federal offense its also a law under most states. Treason against the state shall consist only in levying war against it, adhering to its enemies, or giving them aid and comfort, and no person shall be convicted of treason except on the testimony of two witnesses to the same overt act or on confession in open court. Espionage: The gathering, transmitting, or losing of information related to the nation defense in such a manner that the information becomes available to enemies of the United States and may be used to their advantage. Espionage can be committed by noncitizens. Over at least 3 decades, beginning in the 1960s, Chinese spies apparently stole enough weapons-related information to advance Chinas nuclear weapons program into the modern era. An example of espionage is the crime committed by former FBI agent Robert Hanssen. In July 2001,he pleaded guilty in the U.S District Court in Alexandria, Virginia, to 15 counts of espionage and conspiracy against the United States He admitted to passing U.S secrets to Moscow from about 1970 until 2001, when undercover investigators caught him leaving a package for his Russian handlers under a wooden footbridge in a Virginia park. He had accepted more than $1.4 million dollars in cash and diamonds. In exchange for his FULL cooperation he was spared the death penalty and was sentenced to life in prison without the possibility of parole. Historically, treason also covered the murder of specific social superiors, such as the murder of husband by his wife (treason against the king was known as high treason and treason against a lesser superior was perit treason). Inchoate Crimes: Also called incomplete crimes, are acts which involve the inclination to commit, or indirect participation in, a criminal offense. They include, attempt, conspiracy, and solicitation. Being an accessory or an accomplice to a crime are also inchoate criminal offenses. They used to be considered a minor crime, but today many are considered serious crimes. This is a general rule about inchoate crimes: A person cannot be charged with an inchoate offense and the actual crime. Example: you cant be charged with both murder and attempted murder. The exception is conspiracy, you can be charged with drug trafficking and conspiracy to smuggle drugs. Lesser penalties are usually assigned for inchoate offenses, though the sentence for an inchoate crime may be equal to the penalties for the actual crime. To be convicted of an inchoate crime, the prosecutor must prove that you had a specific intent (mens rea) to commit or contribute to the crime. Inchoate crimes must involve some outward action or a substantial step in the completion of the crime. The person that actually commits the crime is known as the principal and others involved are known as the accomplices. If you commit a bank robbery, and you drive the car, you are just as guilty as the person holding the gun to the bank tellers head. Witnessing a murder and not calling it in, makes you just as guilty as if you committed the murder yourself. Inchoate crimes are highly controversial and often challenging to litigate.

Sunday, August 4, 2019

Impact Of Security Risks On E Commerce Information Technology Essay

Impact Of Security Risks On E Commerce Information Technology Essay A security risk often can be represented as the event that compromises the assets, operations of an organization. The impact of the security risks is different on different kind of systems depending on the environment in which they are being utilized. That mean the impact on server systems is different to that of the impact on the client systems. Because of its openness and convenience Internet has become the biggest and most important market for people to do business and transactions. The security risks are mainly due to Intruders, viruses, worms, Trojans which have their own impact on the data systems. So here the scope of this research paper covers the security issues and their impact on the e-commerce. This focuses on a risk in case of e-commerce and it is defined as a function by security business professionals and the impact on the systems because of various security threats and vulnerabilities with real time examples and scenarios. These security issues are basically consists of various vicious attacks, these attacks, from a technical view can be sort into some categories; Loss of Confidentiality, Loss of Integrity, Loss of Availability, Loss of Accountability. And there are some threats that affect the computer systems such as; Web Server threats, Database threats, Programming threats, Threats to physical security of Web Servers which also affects the e-commerce. INDEX Introduction Risk in e-commerce Risk as a function Literature review Findings and discussions on typical Impact of risks on e-commerce systems Conclusion References 1.Introduction: With the development of Internet is still on the fast track even after the .COM bubble burst, more and more companies, enterprises especially small and medium size companies came to realize the opportunity that electronic commerce can brought to them. Therefore, they are trying to catch up with those forth goes in this area. In the meantime, quite a lot of companies that are in the leading position of e-commerce implementation are caring more on how to strategically avoid, reduce and manage the potential risks behind the   e-commerce  stage. Here this paper narrates; what is a risk in case of e-commerce? How it is defined as a function by security business professionals? What is the impact on the systems because of various security threats and vulnerabilities with real time examples and scenarios? In early days of using computer systems, most of the systems are standalone and the security was accomplished by the physical controls over the access to the computers. Burglar alarms, alarmed doors, security guards, security badges, cameras allowed the people to the most secured and sensitive areas. The interaction with the systems at that time is very less and its confined to very limited numbers i.e. to enter the data, manipulate it. The network of the systems is also confined to limited number of terminals and the security of it is in the hands of a limited persons. But now the condition has changed extra-ordinarily that millions of people around the globe are able to access to the network at a single moment of time effectively. So as the information from one place is being accessed by someone in another place over the computer networks, the security issue arises. Lots and lots of sensitive information are being accessed over the both private and public networks. So along with the fast growing technology the security threats are also increasing day to day. 2. Risk in e-commerce: What is risk in case of e-commerce? A risk may be defined as a security breach in which there might be a loss or theft of some information or assets containing the secret issues. The E-commerce systems are depending upon internet use, which provides open, flexible and provides a way for easy communications on a global basis. However, may be because of any reason the internet is unregulated, unmanaged and uncontrolled, so it posses many and wide range of risks and threats which in turn will affect with a great impact to the systems operating on it. Anecdotal evidence indicates that the main risks which are associated with e-commerce concern intruders, hackers, viruses, worms and interception of credit card numbers which are passing over the telecommunication lines or channels.  These risks can lead to the events resulting in the deliberate or inadvertent loss of many assets and this deliberate loss of assets can result from disclosing of the information, fraud, and deliberate disruption of service.   3. Risk is a function of three factors: Risk as a function Most of the security professionals will see that risk is a function of three primary factors: threats; vulnerabilities; and their business impact. Combining all these provides a standard formula for the risk that is often used in security and business continuity planning. So, E-commerce has had a big impact on all these three factors. Threats: Threats are naturally increased with the exposure. The more exposed a system is to people or other systems, the greater will be the odds that someone or something or some system will attack that system like Cyber squatting, Eavesdropping, Web Jacking, Denial of service attacks. E-commerce magnifies this exposure of systems by making various business services available via the Internet or other kind of networks and by integrating them with the back-office systems, such as some softwares, mainframes and by using enterprise resource planning software. Vulnerabilities: Vulnerabilities are those which increase with complexity. If the system is more complex, then there would be a greater likelihood of software defects, system defects or configuration defects/flaws that make that system susceptible to compromise. E-commerce increases complexity by promoting the more use of Web services, distributed databases, security zones, multi-tiered applications and other sophisticated technologies. Impact: Here comes the main subject of this research paper, the impact can be of any type-business or personal. Business impact is the one which increases with the business value of the system, as well as the amount or the length of time the system is compromised during an attack. There is some relationship that exists between these-business impact, its value and length of time of attack. The relationship between business impact and its value is almost linear, where as the relationship between business impact and the length of time is very rarely linear i.e. the maximum loss of the information or anything may be incurred instantaneously. For example, consider an attacker may steal the information of 100 credit card numbers and the associated customer profiles very quickly after compromising a banks or financial institutions database server. Here the E-commerce affects the business and its value directly on bottom line. 4. Literature Review: While the concept of e-commerce is no longer be considered as a new concept, an important part of E-commerce which is still relatively new is the issues of security risks that greatly affect the economy of the e-commerce business that directly connects with the customers to sell the products and services. The main trend in the E-commerce is to rely greatly and heavily on the network of computers connecting with all the databases. And they have the ability to provide a connection directly with the customers regardless of location and in the way that builds loyal and trust relationships between a customer and seller. However, it is important to examine a full range of issues related to the e-commerce strategy of the security risks as a way to attempt to connect with customers and increase their revenues. There are issues such as the issue of the impact of the security risks due to viruses, worms, bugs, attacks, frauds around the world, and even the way in which these attacks and frauds on the e-commerce systems affecting the revenue and making the trust of customers towards the business sites to decrease to a great extent. The information about the actual success of e-commerce methods and strategies that are based around business networking and an idea that the customers insight has been reduced because of the ease with which people can communicate will also is examined. In this review of the recent academic literature regarding E-commerce related to the use and impact of security risks and frauds, information about the reduction of customers insight into the commerce websites due to frauds and the impact on E-commerce strategies due to which the revenue is reduced is also reviewed. Even more, with the academic literature that is seen and reviewed, the strategies and variables that are very important for E-commerce companies i.e. how the security risks will affect the revenue and how the customers lost their information due to frauds will also be discussed. 5. Findings and discussions on typical Impact of risks on e-commerce systems: There are various threats to the e-commerce systems: threats posed to files, databases by viruses, Trojans, botnets etc, card payment frauds, malicious attacks from in and out of the business, hacker threats etc. So now we see the findings based on the function of the risks i.e. we see threats like web bugs, active content, integrity threats: Cyber vandalism, spoofing , Necessity threats: denial of service, web server threats, database threats and vulnerabilities and the impact of them on their business and systems. Impact by Trojans, viruses and botnets- Viruses and worms are the computer programs that spread across the computers and networks by making multiple copies of themselves i.e. usually without the knowledge of a computer or system user. A Trojan horse is a type of program which appears to be a legitimate but it actually contains another type of program or block of undesired malicious, infected code, disguised and hidden in a block of the desirable code. It can be used to infect a computer with a virus. A back-door Trojan is a program that allows a remote user or hacker to bypass the normal access controls of a computer and gain unauthorized control over it. Typically, the virus is used to place a back-door Trojan into a computer, and once it is online, the person who sent that Trojan can run programs on the infected computer, access personal files, and modify and upload files. So these merely affect the computer systems which are involved in the transactions, these by installing themse lves into the computers make some mess with the data in it or make it vulnerable for other type of attacks and in case of a Trojan the impact is very high that the attacker can bypass the access to the resources for the unauthorized use. Example: There has been a new wave of malware attack that has started affecting BlackBerry and it has originated from Poland. The aim is to extract banking passwords. So by this the attackers can affect the e-commerce transactions by using the credit card or bank details. A botnet is one of the infected vaults which are a group of infected, remotely-controlled computers. The hacker sends out a virus, Trojan or worm to ordinary computers. These computers can then be used to launch denial of service attacks, distribute spam e-mails and commit click fraud, identity theft and thefts of log-in details and credit card numbers. The impact due to the web bugs makes the user or customer to feel bad about some companies which involve e-commerce. This is because the attackers who attack with web bugs gains the information of the ISPs of the system, so the web bugs are introduced in the e-mails and makes that e-mail address a valid one. Active content is the content which is used by the e-commerce sites to display their items, perform check out tasks and calculate tax and shipping information etc. This active content may include java applets and java scripts. Many websites have the options to control the active content but despite the attacker use this active content to impose their code into the website. By this the attacker can do a mess with the content of the website and can gain some private information about the customers. So the impact is very risky that the users details such as the card details etc can be by passed to other attackers terminal. The impact of the Cyber vandalism is very bad that the customer may get disgusted by the web site presence which in turn makes the customer never come back to this web site thereby decreasing the business of this website. This is because the attacker will replace or defaces the content of the website with his own content such as with porn content. So this cyber vandalism made a serious dent in the customer confidence in internet based e-commerce. This is a type of integrity attack in which the impact is majorly on the information present in the website. Example: When the Internet was new for the home users, the young hackers would gleefully deface websites; they break into corporate, e-commerce computer networks and try to outdo each other at how much mischief they could cause for the corporate networks, looking for fame among their contemporaries.  (Husted, 2011) Spoofing is another type of attack by which many websites are victims and its impact is great on the economy of the e-commerce websites. In this type of attack the perpetrators make use of the loop holes in the DNS servers and make their fictitious website as a real and original website to spoof the website visitors, so when the visitors have submitted their credit card details or any private information the attackers use these details to order the items and make them to ship to other addresses. Even the big e-commerce companies such as Amazon.com, AOL, eBay are the victims of this attack. Example: Recently many of the individuals are getting the e-mails that found to be legitimate from the original e-commerce websites such as Dell, Amazon that these e-mails will encourage the victims to click and submit usernames, passwords and some of their private information like card details, so then boom, they are spoofed i.e. the attackers now use their credit card details and can do all the mess which may be expected. The impact of the Denial of Service on the e-commerce is great that the websites which are attacked with this delay in service cannot handle the requests given by the customers thereby decreasing the sales and commerce. The attackers will keep the central server that handles the request very busy by sending the inappropriate requests. This makes the customers of a particular e-commerce website disgusting and they automatically go for the other competitor website. This can also be seen in the credit card payment gateway in the websites making the customers waiting for longer times and leave the website. Example: On December 8, 2010, a group called anonymous launched a Denial of Service attack on organizations such as  Mastercard.com,  PayPal,  Visa.com  and  Post Finance and made the payment gateways as dead for many hours irritating the customers of many e-commerce websites.( Addley, Esther; Halliday, Josh, 2010) The web servers threats also had a great bad impact on the e-commerce business. Actually the web servers are responsible for delivering the web pages upon the request through http protocols. So here when there are vulnerabilities the attackers will do mess and in affect the e-commerce business degrades. Web servers can compromise the security by prompting the users to enter their usernames and passwords when the user visits multiple pages in the same web servers protected area. The passwords that the user selects can be a threat. They select the simple passwords. If the file containing the private details is compromised, an intruder can enter into the privileged areas, and obtain the usernames and passwords. The database threats also pose a great impact on the e-commerce business. Besides storing the information the database servers also connected to the web servers which contain valuable private information that could damage the whole company irreparably if disclosed or altered. And most of the database servers rely on the username and password security that if compromised can cause a great impact on the whole website. Generally the database that contains the usernames and passwords are encrypted but some of the databases of some companys may not be encrypted, so if the unauthorized users obtain the authorization information then they can masquerade as the original database users and can get the confidential and potential valuable information like bank details etc. Once if the database of a certain company is compromised then the attackers may play with these details that they can use the card details and can buy the things they want in the e-commerce websites and can ship to their addr esses. The impact by Server Root exploits refer to techniques that gain a super user access to the server. This has a very big impact on the e-business because it is the most coveted type of attack and the possibilities are limitless i.e. the attacker can play what he wants. When the attacker attacks a shopper or his personal computer, he can only affect that single individual. But with this kind of root exploit, the attacker can gain control of the merchants, sellers and all the shoppers information that has links with the site. The attacker uses are two main types of root exploits: buffer overflow attacks and executing scripts against a server. The consequences may be very high that the attacker can do a mess with the website. In a buffer overflow attack, the hacker here takes the advantage of a specific type of computer program may be a bug that involves the allocation of storage of information during the program execution. This technique involves tricking of the server into executing a code written by an attacker. The other technique uses the knowledge of scripts that are executed by the server. This step is easily and freely found in the programming guides for the server. The attacker then tries to write the scripts in URL of a browser to retrieve information from his server. This type of technique is frequently used when the attacker is trying to retrieve data from the servers database and after getting he or she may misuse the details of the users who shop through online. This will intern make the customers not to visit the particular site again as they got crapped by it. Example: AS MANY as 9000 New Zealanders may have had their credit card and personal details stolen after a Lush cosmetics website was hacked. This company has urged its online customers in New Zealand and Australia to contact their banks to discuss cancelling their credit cards (Rogers, 2011). In 2007, IC3 Internet Crime and Complaint Center received 219,553 complaints that totaled $239,090,000 in financial losses in the form of assets or in form of theft. The average loss per complaint is around a $1000. C:UsersBharathDesktop2007_ic3report.jpg Source: Internet Crime and Complaint Center 2007 Report 6.Conclusion: This article outlined the key security attacks and impacts in an E-commerce system. The Current technology allows for secure website design. The rise of users identity theft and the fraud that attackers do and it has long been seen as a threat to e-commerce revenue growth. With the complaints of identity theft, loss of private information and phishing attacks on the rise, many customers may shy away from buying goods and services online. It is up to the site developing team to be both proactive and reactive in handling the security threats to reduce the high impact on the e-commerce business, and up to the shopper to be more responsible and vigilant when shopping online.

Sympathy for the Tragic Hero of Shakespeares Macbeth :: GCSE English Literature Coursework

Sympathy for the Tragic Hero of Macbeth      Ã‚  Ã‚  Ã‚   A tragedy according to Aristotle within ‘Poetics’ is; ’†¦Imitation of an action that is serious and also, as having magnitude, complete in itself...in a dramatic, not narrative form; with incidents arising pity and fear, wherewith to accomplish its catharsis of such emotions’ In Shakespeare's play, Macbeth, the character of Macbeth murders his king, Duncan, for personal motives, there appears to be little subjective reasoning for the murder.   This perhaps encapsulates the notion of an incident which has the potential to arise pity from an audience. The reader pities Macbeth despite the obvious character flaws of greed and corruption.   Shakespeare manipulates the audience to react sympathetically towards Macbeth through the use of Macbeth's actions, dialogue, and passion.   Throughout the story, there is a feeling of animosity toward Macbeth in response to his deleterious actions.   However, scenes revealing Macbeth's more admirable side balance and even abet that negative feeling.   One particular instance where the reader has the potential to feel pity for Macbeth appears in the dialogue immediately before Macbeth decides whether or not to kill King Duncan.   Macbeth is unsure of the morality of the murder.   During much self-deliberation, he agonizes in the monologue, "I am his kinsman and his subject, strong both against the deed" (I.vii.14-15).   While Macbeth contemplates whether murdering Duncan is feasible, Lady Macbeth convinces Macbeth that he would murder Duncan if he were truly brave and masculine.   Lady Macbeth goes on to remark that if he murders Duncan, Macbeth "would be so much more the man" (I.vii.58). A weak Macbeth gives in to his wife's badgering and manipulation and reluctantly agrees to participate in the murder. The audience feels sympathy for an insecure Macbeth as he begins his spiral into ultimate destruction. It appears that without the push of Lady Macbeth the deed would have been unlikely to have taken place.   Another instance in which Macbeth seems weak and pitiable is at the banquet held in his honor.   Before the dinner party begins, Macbeth orders the assassination of his friend Banquo.   After Banquo is killed, his ghost attends Macbeth's banquet, visible only to Macbeth.   The chain of events that occurs at the party lends sympathy to Macbeth.   His deteriorating mental state becomes known to all when he first beholds the ghost.   He cries out to the guests, inquiring who has played the cruel trick.

Saturday, August 3, 2019

Essay example --

Topic: I am studying about heritage languages and bilingualism because I want to find out how one’s language shapes his or her identity in an increasingly globalized society in order to understand why there is still a fear among many immigrants and their descendants of teaching their children their heritage language. Based on the science and research done on bilingualism, learning a heritage or second language while growing up has minimal to no adverse affects on language development and social class. Rather, language presents an opportunity to elevate one’s culture, personality, and identity. For America, heritage and second language education is vital to sustaining its worldwide influence as the world becomes more globalized. Coca-Cola. â€Å"Coca-Cola – It’s Beautiful – Official :60.† YouTube. YouTube, 2 February 2014. Web. 2 February 2014. The main claim of this Coca-Cola commercial is that every American, regardless of ethnicity, religion, and sexuality, enjoys drinking Coca-Cola and so the audience should as well. The sub-claim here is that America is a nation consisting of diverse individuals with backgrounds stemming from around the world. The grounds for this sub-claim are the various scenes in which a variety of Americans are depicted enjoying the freedoms of America with â€Å"America the Beautiful† being sung in multiple languages in the background. This Coca-Cola commercial appeals to the pathos of the American audience with the incorporation of the iconic, patriotic song and the breadth of minorities represented in the video. The multilingual singing of the song had to be a deliberate choice since Coca-Cola could have very easily shown the same clips of the diverse Americans with the English version. This implies that Coca-Co... ... child’s life may simply lead to greater psychological difficulties because of the child’s overwhelming feeling of abandonment. I intend to juxtapose these two pieces in my paper. De Houwer’s article coincides the most with Landau’s in that both agree bilingualism does not create any significant child development issues and that the benefits outweigh the costs. The language used in this article is intended for a general audience, which can promote discussions and questions. As for the credibility of de Houwer, she is currently Professor of Language Acquisition and Language Teaching at the University of Erfurt in Germany, and she is heavily involved with multiple linguistics organizations. At the time of this article’s writing, she taught at the University of Antwerp and Science Foundation of Flanders, Belgium. Therefore, this is clearly a scholarly, credible source.

Friday, August 2, 2019

Festival: Meaning of Life and Festivals Essay

A festival is an event which is celebrated collectively for celebrating a cause. Festivals are mostly celebrated to propagate the cultural heritage of nations. Festivals highlight various aspects of a society. For example people in all around the world celebrate Christmas, New Year, Sports events such as Olymics, Easter, Eid and other religious and cultural events to exhibit their emotions and happiness. Festivals at national level help to promote solidarity and patriotic spirit in the society. Religious festivals all around the world bring convergence and propagate acceptance of all kinds of religions in different geographical segments. International festivals help to increase brotherhood and remove ethnic racism in the world. Owing to the fact that world has become a global village, celebrations of all kinds of festivals in a country improves the overall image of the country and shows the acceptance of cultural diversity in the country. They help keeping alive the older traditions and provide entertainment to the people celebrating events in different parts of the world.All the festivals that we celebrate have some profound meaning in it and they have some pragmatic purpose also. If we take the example of Christmas, we all know that why it is being celebrated but when it comes to the purposes that it serves along with the religious one; primarily it is a psychological one. We all need some days of break in our life from our regular job. Sometimes we take it voluntarily but mass don’t understand the purpose of taking break and it is for these people, the festivals serve better that anybody. They are forced to enjoy life and thus they can improve the quality of their life. There are some other purposes also that a festival serves and usually you will find that people meet each other along with their families and thus improve their social life. So now you can understand the meaning of celebrating a festival and we expect that you will also spread the message celebration the world over.

Thursday, August 1, 2019

Emancipation of the slaves Essay

uestion: Examine the methods employed by planters to induce â€Å"labourers† to work on sugar estates after emancipation. Full emancipation of the slaves was achieved in 1838 in the British West Indies and 1848 in the French colonies. The post-emancipation period was viewed with fear by planters who believed that mass of ex-slaves would exodus the plantations, robbing them of their labour supply. In many cases this was so. However, one can argue that the British West Indies experienced a greater labour problem than the French colonies of Martinique and Guadeloupe. Therefore, the coercive measures put in place in the French colonies were unjust, an example of over-exaggerated panic on the part of the planters, and a form of maintaining control over their declining power over labour. The term â€Å"freed people† refers to persons who were not enslaved to anyone, who had open to them various opportunities previously closed, who maintained complete control over their movements and in general their lives. According to the historian Rawle Farley, many ex-slaves saw the estates as an oppression of this particular meaning of freedom and hence left as a form of resisting it. To desert the plantations the ex-slave had to take into consideration land availability, population density and the flexibility to move from one profession to another or even to one with similar characteristics, such as small scale farming. Within low density colonies like British Guiana where land was plentiful, ex-slaves left to settle on small plots. Many ex-slaves also left to their original plantations to work on others where pay was high, some even ventured into other professions such as hucksters, butchers, skilled workers and managers. In some low density colonies like St. Lucia, conciliatory measures like the metayage system was employed so as to make plantation work more appealing. In these cases planters provided the tools, and the ex-slaves, the labour. Both parties shared in the produce at crop time making the ex-slave more eager to not only be present at crop time, but to do the premiere labour efficiently. However, in many other islands planters created a problematic situation for ex-slaves. In high density colonies like Antigua, coercive measures were put in place as a demonstration of power by planters. Even in the low density colony of Jamaica coercive measures dominated and undermined the entire concept of freedom. According to the historian, William A. Green, Jamaica suffered from not a labour shortage but a labour problem, that is, there was a labour force but they did not want to work on the plantations. Douglas Hall furthers this argument with the statement that, â€Å"[Planters] were likely to exaggerate the withdrawal of ex-slaves from the estates†. This leads one to blame the planters for being the creators of their own problems. In a panic, they attempted to force the ex-slaves to remain on the estates by applying the coercive measure of lowering wage rates while raising rents. This was intended to diminish net earnings from sales of provisions in local markets and so make the ex-slave dependent wages for his livelihood. It was this â€Å"rent question† that really was burning issue between employer and employee. In some cases rent was levied on each occupant of a cottage, while in other cases no rent was collected at all so that the labourers could be ejected at a moment’s notice. All requests by ex-slaves for annual tenacy was denied. Many labourers were faced with the situation whereby rents were paid form their wages. In addition this the tenant and his family household must still work for the landlord. According to Swithin Wilmot, â€Å"rent was manipulated in such a fashion that it was a penalty rather than a charge for the use of estate property†¦ [and]†¦refus[al] to pay [resulted in] increased rental†. This coercive measure applied to keep freed persons on the estates had the opposite effect. Ex-slaves abandoned plantations to squat on crown land or purchased land and engaged in various agricultural endeavours for subsistence and market. If these â€Å"escapees† required additional income, they engaged in providing casual labour for the nearby plantations. Many ex-slaves bought land and formed â€Å"freed villages†. These â€Å"freed villages† were a danger to the sugar economy since peasant farmers provided competition with their crops. Within the French colonies labour laws were passed with the intention of controlling the peasantry. In Martinique in particular, where land availability was scarce, ex-slaves were forced to comply with many of the insufferable regulations, for example paying the personal tax, tolerating the pass system and maintaining a domestic passport. The personal tax was created before 1848 with the aim of restricting the movement of Blacks to the towns and served to restrict movement from the countryside. The law imposed a sum payable annually by inhabitants, the boroughs receiving higher taxes than those living in the countryside. In 1848 the personal tax jumped from 10 francs 50 centimes per year in Pointe-a-Pitre, to 15 francs. Even in the country areas, the personal tax rose from 4 francs 50 centimes to 5 francs. The creation of this tax was intended to both restrict the Blacks movement to that of the plantations while forcing them to work to pay for it. The need for the Blacks to pay taxes is extremely interesting, especially since, according to historian Dale Tomich, most planters could not afford to pay freed men wages. On February 15, 1852 the pass system was introduced to attempt to force the ex-slaves to adopt contractual labour. Rosamunde Renard notes that under this system, â€Å"every individual working for a salary or a daily wage, or every holder of a work contract of less than one year should possess a pass†. If they did not own a pass then they were sentenced to working in the workhouses. The authorities tended to play a greater role in supporting planters in the French colonies than in the British West Indies. Ex-slaves however responded at first with violence, attacking anyone trying to remove them from their homes or take away their freedom, and later engaging in passive resistance. When they had to register, they gave a different name for everything, the governor de Gueydon declared they â€Å"†¦baptized under one name, married under another, taxed under a third and unknown under all these names†¦Ã¢â‚¬ . The Blacks also loitered and refused to accept contractual work when ever they could. Though the planters mainly used coercive measures, they also attempted to apply conciliatory measures. In Martinique a system of medals for model workers was devised so as to encourage work on the plantations. Gold and bronze medals were distributed among the pupils of religious institutions who had done fairly well in agriculture. Schools were created with the purpose of training plantation workshop leaders and good workers. The freedmen were not fooled. They responded with increasing hostility towards these new attempts to make them stay on the plantations. In conclusion, the term â€Å"induce† tends to mean, according the dictionary to persuade. However, planters were seen applying more often force, that is, coercive measures rather than conciliatory measures to attempt to keep ex-slaves on the plantations. Within the high density colonies the coercive measures were not really necessary but rather a demonstration of planter control and power. Within the French colonies, if one is believe Perrison, there was absolutely no reason to apply the coercive measures the historian Rosamunde Renard described. For Martinique, one can question the sensibility of a slave revolt resulting in emancipation just before it was officially declared. Not surprisingly, an increasing distrust of the slaves exploded directly after emancipation was declared together with fear of economic ruin for the society. Planters and the Authorities joined forces against the â€Å"savage, uncivilized† Blacks whose nature inclined them away from the â€Å"delights of working in the blistering sun on the plantations† and more towards their â€Å"crude and uninformed version of what freedom was about, like liberty of movement†. These hostile attitudes of planters and authorities alike are responsible for the exodus of ex-slaves in both the British West Indies and the French colonies.