Thursday, October 31, 2019

The Survival Lottery Research Paper Example | Topics and Well Written Essays - 1500 words - 1

The Survival Lottery - Research Paper Example It also offers another analogy that serves to counter the survival lottery. First, the assumption is that the lottery speaks about the traditional utilitarianism as there are other flavors of the same that have been considered less influential and yield different results. It is easy to put ones thumb on a scale whenever arguing concerning ethical status of acts under utilitarianism as utilitarianism takes no account of other things but the sort of things suggested. They seek to maximize pleasure, not simple hedonistic pleasure, but something that stands in for what people find desirable (Tittle 34). This includes moral sentiments, feelings and emotions. If the society finds the lottery unacceptable inherently, then there is bound to be displeasure and pain associated with its execution that could outweigh any good done in saving lives. ` This type of argument sidesteps the thrust of the thought experiment, but it aims at illustrating how acceptable it is to kill an innocent person under utilitarianism to save others. In isolating this point, the imagination could be that the survival lottery minimizes pain, maybe spearheaded by few people who are not known by the public as argued by Kuhse and Singer (67). Perhaps those selected are told they are selected for a heroic government mission so that if they do not return their families are left proud to be associated with the loss. Maybe the deaths of the selected are quick and without pain and the people are not pre-informed so as not to traumatize them. Maybe the recipients of the organs are never to be informed that someone was killed so that they do not feel guilt. This would make the public oblivious so that the only people that would be suffering from guilt would be the few who had to do the task. And maybe even this would be accomplished by sociopaths so that no one would feel the guilt at all. What then would the argument be? A utilitarian would seem to be forced to accept the

Tuesday, October 29, 2019

International Law and Terrorism Essay Example | Topics and Well Written Essays - 2000 words

International Law and Terrorism - Essay Example Terrorism in all its aspects is a criminal act under International Law. Art.51 says that "Nothing in the present charter shall impair the inherent right of individual or collective self defense if an armed attack occurs against a Member of United Nations, until the Security Council has taken measures necessary to maintain international peace and security." Let us examine some cases which define the international Law standard for whether a particular use of force is self defense. American ship, The Caroline in a US port; because the Caroline had been used in American raids into Canadian territory. The British claimed the attack was a self defense. But the dispute was resolved in favor of Americans. This particular case had given a clear meaning to the term self defense under International Law as "there must be a necessity of self defense- instant, overwhelming, leaving no choice of means and no choice of means and no moment for deliberation." The means of self defense must involve nothing unreasonable or excessive: Since the act, justified by the necessity of self defense, must be limited by that necessity, and kept clearly within it. This has been accepted rule in International Law. This is some what called as "anticipatory Self defense". This c The representive of Nicaragua Vs The United states of America

Sunday, October 27, 2019

Data Security Policy Analysis

Data Security Policy Analysis Dylan Mc Grath   The reason for having a policy: The reason for having the policy is so that the workers at ACME LEARNING Ltd know what to do when they are assessing the personal data of the customers and how they will use the data. A Brief explanation of the companys obligations under the law: There is one main legislation which the company has to obligate by it is called the Data Protection Act 1998 which was also amended in 2003. It was created for when personal details are given to a company they have to keep the details and they cannot be given to anyone outside of the company. Every person who has given their details to the company can request a copy of their information that the company has. The company must send the person their details within 40 days. They can also have their name removed from any marketing list. They could also make a complaint to the data commissioner if the company is not adhering to the Protection Acts rules. A person can claim compensation if they suffer when the company uses their data in a wrong way. Who is effected by how the company uses and stores data? The people that are effected by this are: Teachers and Staff who work for ACME LEARNING Ltd Management Students The Data that is stored about them is: Credit Card/ Bank Details Birth Dates Contact details Name Address Email Gender PPS Numbers Suppliers information Why the data is used by ACME LEARNING Ltd: For advertising and marketing purposes. To have a database of a persons information. For payroll and pension administration To make the names and addresses of people are correct. To stop fraud and money laundering For record keeping What Specific Threats does AMCEs data have? Malware: Malware is software that can harm a computer and can slow down performance. Hacking: Getting into a computer authorized or unauthorized without wanting to cause any damage. Weather Conditons and Fires: data can lost by storms, earthquakes and floods.   Fires can also be started by accident when the server room is too hot. When these weather conditions and fires happen the server rooms can be completely destroyed. Adware: Software that can monitor the users online activities so that the person can be targeted by advertisements. Disgruntled employees Spyware Accidents Theft Human Error Copying data onto storage devices. Trojans Roles and Responsibilities: Data Controller ACME LEARNING Ltd must appoint a Data Controller who is there to deal with the data which is about their customers on a computer and also in a filing cabinet. The Data Controller must: 1: Obtain and process the information fairly. 2: Keep it only for what is it was needed for. 3: Use it for and it should only be given out for a specified purpose. 4: It must be kept safe and secured. 5: The information must be kept up to date and correct. 6: Make sure the data is adequate, relevant and not excessive. 7: It must not be kept for any longer than it is needed for. 8: Give a copy of his/her personal data on their request. Every Employee that works for ACME LEARNING LTD has to be given training on how to use and handle the data. Rules for:1. Data storage: Data on hard drives cannot be deleted. The data has to be stored on the network drive where the I.T department can back it up when they need to. Data that is on paper has to be kept in a safe place. Data has to be protected by strong passwords. All data has to be stored on the server and data has to in a safe location. The Data Controller and only the people who need to access the data are allowed to look at it. Servers and computers that have data have to be protected by a firewall and security software. Data on CDs or DVDs has to be locked away. The servers have to have different sites in case one site goes offline. Data should not be saved on laptops or other mobile devices. There will be two different databases for both staff and students information. The data cannot be stored locally have it in a place where it can be backed up every night. Data has to be backed up every night. The usb ports on all the machines have to be disabled. Every computer in the building has to be rebooted every night at a certain time. There are two databases one for staff and the other for students information. Users have to logout of their computer to make the data stays safe. The person that looks at the data should be able to see the quantity of the data and the duplication. 2. Data use When looking at data on a computer all employees must have their computer locked when they are away from their desk. Employees cannot make a duplicate of any data on a file. When data is being transferred electronically it has to be encrypted. 3. Data accuracy: ACME Learning LTD must keep the data up to date and accurate. Data that is inaccurate should be updated to the correct data by someone that is allowed to edit the data. There are staff that are allowed to edit the data and other staff who are only allowed to read the data. 4. Data access requests: The Data Protection Act lets a person find out if ACME LEARNING Ltd has any information that relates to them. The person has to either fill out a form or write a letter to the company asking for their information. The person has to include identification so that the company knows that they are giving the data to the right person. The person is entitled to: A copy of the data. A description of the use for which it is held. A description of those to whom the data may be shown to. The source of the data. The person may have to pay a fee to access their information which cannot exceed â‚ ¬6.35. The person has to be contacted within 40 days with their data or be told that the company does not have any data about them. 5. Data Disposal: ACME LEARENING LTD will keep the data it has for employees for seven years only if it is financial. ACME LEARENING will keep the students data for three years. If a student has ticked a box to say that they want ACME LEARENING LTD to keep their exam results then ACME LEARENING LTD has to keep the students exam results for a certain number of years. If data is on paper it has to be thrown into a waste bin. It must also be recycled. The paper can also be shredded so that the data on the paper will be destroyed. An incinerator can be used to burn the paper to destroy it so no one can recover any of the data on the sheets. Hard Drive Disposal: At the time the hard drives need replacing an employee must carry out the procedures that need to be done. The procedures are to overwrite a hard drive, get the hard drive destroyed by paying a company that deals with destroying hard drives the right way so that the data is safe from being seen by a person that wants to use it for gaining money. The hard drive can also be degaussed. This removes all the data from the hard drive. Degaussing destroys the magnetic fields on the hard drive. It completely makes the hard drive in tiny pieces so that it cannot ever be used again. Overwriting the data using a program puts binary numbers onto the hard drive. It should be done at least three times to be successful. Tape Media Disposal: The data on the tapes can be overwritten. They can also be incinerated this method will completely destroy the tape. This method will pollute the air.   The data on the tapes can be degaussed. The company can get someone to come in and do it to witness that the tape has been degaussed properly.

Friday, October 25, 2019

Texas :: essays research papers

Texas, one of the West South Central states of the United States. It borders Mexico on the southwest and the Gulf of Mexico on the southeast. To the west is New Mexico, to the north and northeast lie Oklahoma and Arkansas, and Louisiana bounds Texas on the east. Austin is the capital of Texas. Houston is the largest city. Texas is the size of Ohio, Indiana, and all the New England and Middle Atlantic states combined, and its vast area encompasses forests, mountains, deserts and dry plains, and a long, humid, subtropical coastal lowland. Texas's wealth of mineral resources is almost unequaled among the other states. Its rapid economic development stimulated by these resources and its vast size have made Texas an American legend. Oil wells, chemicals, ranches, and cattle have played a major part in that legend. For more than 100 years, Texas was part of the Spanish Empire in America. When Mexico gained its independence from Spain in 1821, Texas was for a while joined to Mexico. The section from San Antonio southward retains the flavor of the Hispano-Mexican period in its architecture, foods, and festivals. The name Texas is derived from tejas or teyas, the rendering by the Spanish in the mid-16th century of the Caddo people's word for friends or allies. It gradually became used to denote the region north of the RÃ ­o Grande and east of New Mexico, and was officially applied as Texas when the area was organized as a republic in 1836. Texas was an independent republic until it joined the Union on December 29, 1845, as the 28th state. Its single-star flag dates from its independent period and has given Texas the nickname the Lone Star State. IIPHYSICAL GEOGRAPHY Texas is the second largest state in the nation, after Alaska, and has an area of 692,244 sq km (267,277 sq mi), including 12,844 sq km (4959 sq mi) of inland water and 1046 sq km (404 sq mi) of coastal water over which it has jurisdiction. Extending for about 1240 km (about 770 mi) from east to west and for about 1290 km (about 800 mi) from north to south, the state comprises about 7 percent of the land area of the United States. The mean elevation is about 500 m (1700 ft). ANatural Regions Texas can be divided into four natural regions, or physiographic provinces: the Gulf Coastal Plain, the Central Lowland, the Great Plains, and the Basin and Range province.

Thursday, October 24, 2019

Analysis of the Movie “Jose Rizal” Essay

A three-hour epic on the life and struggles of poet and patriot Jose Rizal, the national hero and martyr of the Philippines, this film was commissioned to mark the 1998 centennial of the country’s independence from Spanish colonial rule. Rizal was a remarkably educated man; not only was he a writer, but he was also a painter, sculptor, doctor and surgeon, teacher, natural scientist, economist, engineer and theologian. He was an excellent fencer and marksman; he studied at colleges in Europe, America and Asia, traveled to many different nations and could speak twenty-two languages. He was a champion of his country’s independence, a Filipino Gandhi who faced the firing squad at the age of thirty-five for inciting rebellion. He was the instigator of the Philippine revolution of 1896-98, the first national uprising against a colonial power in Asia. He also wrote two books, Noli me tangere and El Filibusterismo, which sought to increase his people’s political awarenes s. Director Marilou Diaz-Abaya deliberately avoids a historical lesson. The Rizal of her story Cesar Montano is thinking back on his life and writings from his prison cell in the fortress of Santiago; the characters that appear are a blend of the real people, friends and enemies as well as those he created in his books. The script is solid, with a contribution by Diaz-Abaya’s long time collaborator, Ricky Lee; the soft tones of the cinematography helps to create an atmosphere of magic appropriate to the story of a legendary hero, and the acting by Cesar Montano is quite remarkable. The movie begins in 1891 with Jose Rizal, played by Cesar Montano, as an established author and linguist who speaks more than 20 languages. He vows to write about the sufferings of the Filipino people under the tyranny of Spanish rule, and about their abuse by corrupt priests. Rizal’s writings galvanize the Filipino people but earn the scorn of the Spanish government, which vows to crush the reb ellion of the Filipinos. The Spanish military capture and torture Jose’s brother Paciano, played by Pen Medina, to determine Jose’s role in the rebellion. During a flashback, Jose says Paciano greatly influenced him by exposing him to the injustice going on in the Philippines. Paciano is released after his interrogation and returns to Manila, where the family plans to go on the run. An order is given to arrest Jose Rizal on sight. The movie cuts back to Jose’s childhood, when he was called Pepe. When he is a child, his mother is falsely arrested for attempted murder and jailed for two years. He gets attention from educators early on for his intelligence and writing prowess. As a young man, he criticizes a college professor for stating that Spaniards are superior to Filipinos. Filipino students start fighting Spanish students after Jose starts raising the issue of Filipino independence. Cutting back to 1896, Jose is captured and put on trial, and his books are banned. The film then cuts back and forth between Jose’s rise as a revolutionary and his fall from grace during his trial. As a student, Rizal spent significant time in Madrid but then became disgusted with Spain’s occupation of Filipino land and Spanish treatment of Filipino citizens. The mayor of Madrid is arrested and discredited for having a Rizal book. A violent revolt breaks out in 1896, which Jose does not support because he sees it as mass suicide. Going back to the trial, enormous pressure is put upon Jose’s defense attorneys, with critics branding them as traitors for defending the rebel. It is revealed in a flashback that Jose had fathered a child that had died soon after birth, adding to his inner turmoil as he buried his only son. In the trial, his books are examined and criticized for their pro-Filipino stance against Spanish imperialists. He is found guilty of staging a rebellion through his speaking and writing, and he’s condemned to death by firing squad. He sneaks a poem to his family before his execution, and he yells â€Å"It is done!† A full-blown rebellion is soon under way. Two years later, in 1898, the Filipino flag is lifted triumphantly as the citizens celebrate their independence.

Wednesday, October 23, 2019

Price War Essay

How should a company try to deal with the threat of a price war? Fontinelle (2010) believed that price war has a big impact which leads to a string of price reduction that vaporizes the profit margins. There are some solutions which can cope with the menace of a price war. To start with, Rao et al. (2000) showed that the manager of a company should take into account of other options before answering the price cuts call. The manager should consider matching price cut is a good choice or not before deciding. Moreover, additional information about the price war is needed to be figured out immediately. Does the discounted price apply for a short period of time or long term? In addition, the terms and conditions for the promotion are also involved. For example, Starbucks drove their customers crazy because of the 50% discount Frappuccino in happy hour campaign. In addition, it also attracts more new customers. Meanwhile, their competitors should consider about applying the same strategy or do nothing. The competitor’s managers must be particularly careful as the threat of price war is high. In addition, they may get more disadvantages instead of advantages as if their brand is not as strong as Starbucks. Misreading the competitor’s purposes which is one of the main factor causes price war can lead to unavoidable price war (Little, 2003). Therefore, correct information about competitor’s intentions must be obtained carefully. The reason behind the price cuts must be figured out to have the right respond. With the same example above, the competitors’ managers should research in detail about Starbucks promotion campaign to have their suitable marketing strategy. According to Rao et al. (2000), marketing communication strategy plays an important role in ensuring the competitors understand the reason behind the company pricing tactics which assists in avoiding a price war. Advertisement should not only focus on the price but also the quality and benefits of the product. Therefore, the companies should selectively reveal their strategy intentions in the purpose of staying away from price reductions. To avoid igniting a price war, Swartz (2012) claimed that products are required to be differentiated. It means that the products must be customized to become outstanding in the market share. Although other traders may offer products which are similar to those competitors are selling, it doesn’t necessarily mean the company must serve identical products or services. Therefore, there are many ways of differentiation in order to make the customers realize which product is more valuable to purchase. Rao et al. (2000) pointed out that awareness of customer’s level of price sensitivities is also important. To carry out a successful pricing strategy, a company must first comprehend the basic understanding of customer perception of price sensitivity. This changes when new competitors enter the current market as company have to be aware of other competitors pricing strategy as well. As a conclusion, companies should keep clear of price wars as it can be difficult to manage as soon as price wars begin to gain a head start. Arguments between companies regarding price wars should be handled calmly to avoid unnecessary conflicts. As a side benefit, it would also reduce the chances of initiating price wars.