Tuesday, November 26, 2019

Dont Name Your Character Mary Sue

Dont Name Your Character Mary Sue Don’t Name Your Character Mary Sue Don’t Name Your Character Mary Sue By Mark Nichol Are your lead characters a menagerie of Mary Sues? A Mary Sue is a walking clichà ©, unrealistically flawless and therefore flat and boring a hero in your story, but a villain in your efforts to create well-rounded characters. The label for this trope is from a character in a fan-fiction Star Trek parody featuring a winsome but tiresome teenage hero by that name. The story poked fun at the adolescent (or adolescent-minded) authors of fan fiction who create characters often idealized self-representations notably lacking in personality flaws and seemingly incapable of making mistakes. The result, invariably, is a dull Dudley (or Dolly) Do-Right. But wait, you protest some of the most memorable characters in storytelling traditions have been Mary Sues! What about all the heroes of folk tales and fairytales? What about the central figures in Horatio Alger Hiss rags-to-riches stories and the Hardy Boys and Nancy Drew mysteries? What about icons of the small and big screens like Captain Kirk and Luke Skywalker? There’s no law against coaxing a Mary Sue to life in any creative medium. But recognize that the presence of a gosh-and-golly go-getter is an element that marks the framing narrative as pulp fiction. If you want to produce pulp, have at it; the demand for it is insatiable. But if you wish to be taken seriously as a writer, understand that realistic characters those with hopes and dreams and desires, yes, but also with doubts and faults and weaknesses are full of depth and dimension. Characters who always know what to do and what to say, who always do the right thing, are less appealing, because we are less likely to see our own imperfect selves reflected in them. A faultless character is, like a story free of conflict, a flimsy basis for a good story. Tales appeal to us because we empathize with people who fail but then get up, dust themselves off, and try again, because that’s what we do every day, and that’s what builds our character. If your name is Mary Sue, you never fall and you (and the story that surrounds you) can therefore never truly be admired. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Fiction Writing category, check our popular posts, or choose a related post below:Comparative Forms of AdjectivesBody Parts as Tools of Measurement10 Tips About How to Write a Caption

Friday, November 22, 2019

Avoid These 10 Words in Formal Writing

Avoid These 10 Words in Formal Writing Purists may tell you that many of the words in the list below arent really words at all, but thats misleading at best. A few of the words are simply misspellings, and the rest are informal expressions or slang phrases that frequently appear in everyday speech (or vernacular). Nevertheless, according to the conventions of Standard English, all 10 of the following words should be avoided in reports, essays, research papers, and all other types of formal writing. alotAlot (one word) is a common misspelling of a lot (two words). [W]e all may write alot one day, says The American Heritage Guide to Contemporary Usage (2005), but for now keep in mind that alot is still considered an error in print.  and etc.Because the abbreviation etc. (from the Latin et cetera) means and so on, and etc. is redundant. In any case, avoid using etc. in your essays: often it gives the impression that you simply cant think of anything else to add to a list.  anywheresHuck Finn can get away with saying, There warnt a sound anywheres, but on formal occasions drop the terminal s. If anywheres appears anywhere in your dictionary, its probably labeled nonstandard or dialectal.could ofDont confuse this nonstandard form with the contraction couldve. Could of (along with should of and would of) can and should be replaced by could have (and should have and would have). As for coulda, shoulda, woulda, avoid dwelling on them- both in writing and in life.hisselfThis alterna tive form of the reflexive pronoun himself is commonly heard in certain dialects, but in formal writing steer clear of hisself (and theirself as well- though both were regarded as good usage in Middle and Early-Modern English). furtherestThe comparative form of far is farther or further. The superlative form is farthest or furthest. Nothings gained by combining the two forms.  irregardlessThis double negative (ir- at the beginning and -less at the end) may not deserve Bryan Garners label of semiliterate . . . barbarism, but hes probably right that in print it should have been stamped out long ago (Garners Modern American Usage, 2009). Use regardless instead.itsIts is a possessive pronoun (like his or her). Its is a contraction of it is or it has. That leaves nothing for its to do- so toss it.  lets usLets us means let us us. To avoid the repetition, write lets (She lets us play in her yard) or lets (Lets play in her yard) or let us (Let us pray).  nohowIf you have the know-how to write, you dont need to be told to avoid nohow. Instead use in no way or not at all.

Thursday, November 21, 2019

Perform a financial analysis of Amcor and Alumina Essay

Perform a financial analysis of Amcor and Alumina - Essay Example Reductions in current assets are not good for businesses because they lower the liquidity of a company. One of the possible reasons for the reduction in current assets is sales of old equipment or short term investments such as treasury bills. The current ratio of the company in 2010 was 0.56. The current ratio shows the ability of the company to pay off its short term debt. The current ratio of the company is not good due to the fact that the firm’s current ratio is below the norm of 1.0. The total assets of Alumina were $3,542 million in 2010. The company achieved an increased in total assets of $38 million. The return on assets (ROA) of the company in 2010 was 7.49%. Return on assets measures how well the assets of the firm have been employed by management (Garrison & Noreen, 2003). The company achieved a tremendous improvement in comparison with the previous year since its ROA in 2009 was -4.84%. Improving ROA is a positive sign that infers greater profitability for the company. The reason for the higher profitability numbers was a foreign exchange translation difference of $230 million. The return on equity of Alumina in 2010 was 8.64%. Return on equity measures the extent to which financial leverage is working for or against common stockholders (Garrison, et. al, 2003). In 2009 the return on equity of Alumina was -5.81%. The debt to equity ratio of Alumina in 2010 was 1.15. The firm’s debt to equity ratio is 0.05 lower than the previous year. Amcor is one of the world’s leading suppliers of rigid plastic packaging companies which operates in 43 countries worldwide (Amcor, 2012). The company obtained revenues of $9,850 billion in 2010. The revenues of the firm decrease by $315 million or 3.3% in comparison with 2009. The net income of the organization in 2010 was $201.6 million. The firm’s net income the previous year was $218.4. The company had a decrease in net income of $16.8

Tuesday, November 19, 2019

A Look at Japanese Scroll Paintings Essay Example | Topics and Well Written Essays - 750 words

A Look at Japanese Scroll Paintings - Essay Example The essay "A Look at Japanese Scroll Paintings" analyzes Japanese Scroll Paintings. There are a number of great scroll paintings to note. One of them is Tosa Mitsuoki, who lived between 1617 and 1691. He was the sun of Tosa Mitsunori, also a painter as this family was a long line of Japanese artists, dating back to 1434. In earlier works, there was large use of traditional Japanse style, the yamato-e. It was Tosa Mitsuoki who used a bit of realism in his art, used little gold. He also tended to paint scenes that were not typically painted, scenes not portrayed before he painted them. Comparing past art in the Tosa family to the later ones, you can tell that the styles are different. The older paintings were more crowded, with more fantasy elements. The later ones showed realistic scenes, less gold. They all have the typical Japanese style, with paint covering every inch of scroll in some areas. In a particular painting, there are rich colors, details and in the style, says the source , of a Tosa school. Gold painted as clouds and mist frame most of the scenes. Most of the colors are flat, kind of a contrast to the gold that surrounds it. The many people in the scenes have long flowing robes folding over very heavy set looking people, people of money I presume. And their faces dramatically portrayed in each scene to reveal their emotions up front. Most of the images let you see inside the buildings so you can see what is going on inside and what is going on outside at the same time. For example, one has the Prince Genji in a boat coming up a river, while a daughter in a palace is looking outside. You can see her looking down into the boat. The scroll paintings have a mix of different styles thought the centuries. Each one has some painting, some have Japanese calligraphy, noted that it states which scene the artists were focused on at that time. Some did not have calligraphy, as did the 17th century artists often did not. Not so many had a named artist either. The original tale was painted in a set of about fifty-four chapters. For each chapter, the artists took on about two paintings per chapter. It is said from various sources that there were over a hundred paintings in the original scroll of art for The Tale of Genji. Each painting within the original scrolls was a little over seventeen inches long. The remainder of the collection that has survived until today is displayed at the Gotoh Museum in Tokyo and with other foundations. Looking at several of these earlier scrolls and comparing them to the later scrolls painted by artists, the simplicity of the artists use is sort of a reminder of anime art today. This style is represented in the "simple dashes for eyes and hooks for noses", as described in the style that is hikime-kagihana. While simple in style, it was clear that the artists had a very high knowledge of the style of tsukurie, what they mentioned as manufactured painting. One thing that did remain thorough out the centuries was the ability of looking into the life of those within the buildings. You will see people laying out tatami mats for sleeping or taking care of daily activities or holding court. The Tale of Genji does reveal a story, though it also reveals information about what goes on in the homes and life of the Japanese court. The stories about Prince Genji and the life of the courts and the prince's antics are very richly

Saturday, November 16, 2019

College Case Essay Example for Free

College Case Essay As I near the end of my senior year, I reflect on the events of my life that have molded me into the person I am today. In 2005 my parent’s divorced several weeks after their 13 year anniversary. Only 10 years old at the time, I understood that I had the responsibility to set the example as the eldest child of two younger brothers. Although this was a challenging time for my brothers, being so young and confused, the three of us overcame it together. For a year it was tough to grasp the thought of our parent’s divorce, but we managed to make the best of it from then on. I lived primarily with my mother because of the location and convenience of my school. My brothers lived with my father about 45 minutes away. In the beginning of my 8th grade year in 2008, my mother remarried to a man named Chance, who she had only known for two months. Living with her for 3 years prior, I continued to through her new marriage. My bed was now the living room couch, and privacy was no longer an option. My freshman year was great. I had amazing friends and my grades were exceptional. It was during my sophomore year that things slowly seemed to fall apart. My grades declined, school attendance was unsteady, and socially I drifted from friends and teachers. At times my classmates would wonder why I’d miss so much school or why I couldn’t seem to focus during class. â€Å"I’m just tired,† I always said. â€Å"Don’t worry about me.† On the night of February 12, 2011 I received a call from my mother while staying the weekend at my father’s home in south Kona. Her voice shaky, she stuttered to ask the question I dreaded for 3 years. â€Å"Did Chance ever hurt you?† I said no as she repeated the question once again. â€Å"No† I said. She asked again, except this time she asked, â€Å"Do you promise on your sister?† My sister died of turner syndrom e in 1999. â€Å"I can’t do that mom,† I said, anticipating the consequences of my confession. What happened after that phone call was heart breaking. My very own mother refused to believe what I had told her. She even had the audacity to tell my family there was no way her husband could have done such things and refused to divorce him. From that night forward I lived with my father permanently. Three months after the disclosure I met with a detective in Kona, whom would investigate my case closely. My junior year was beginning and school became an obvious challenge. I continued to stay out of contact with my mother and her husband Chance. I received the support of my family, as well as my school counselor, who became well aware of my situation. It was the end of my junior year now and my mother still did not believe me. August 13, 2012 was my trial date at the Kealakekua courthouse. To my surprise, my mother was in the waiting room. I was very nervous, but knew that sticking to the truth of my story was the right thing to do. My family waited as I entered the courthouse. My prosecuting attorney did her best to prepare me for this day, knowing the difficulty of the process. I did what I had to do, and my parents and nana watched wide eyed as I exited the room. They rushed to my attorney and I awaiting an answer, as she said â€Å"we did it, it’s a true bill.† I was overwhelmed with relief, as I looked to my crying mother. She hugged me, and said â€Å"I’m sorry† as we departed. I knew that wouldn’t be the end of it. There would be more upcoming court dates to settle the sentence during my senior year. For about 3 years a household member was silently abusing me, but I finally found the courage to say something. I found strength in sticking to the truth of my story and never letting disbelievers tell me there will be no justice. From that day forward I promised myself that I would continue to pick myself up, never soaking in self-pity, and achieving my goals. I look back on these events with gratitude, knowing that because of what has happened to me, I will be able to help young, victimized girls by reaching out with open arms and guiding them through their hardships. I am humbled by these experiences and know that I have a purpose in this world to provide support throughout the community. I strive to live life through these values, as my perspective on life has brought me to realize the utmost importance of doing what is right. Sexual, physical, verbal, and all other forms of abuse are unacceptable and inhumane; however there can be justice if one is willing to fight for it. I am Leila-Marie Wong, proof that through strength and perseverance all can be endured.

Thursday, November 14, 2019

Mantras Essay -- Mantra Spiritual Ancient Asia Essays

Mantras The Mantras are very spiritual things used by the ancient in Asia, now a days this form of meditation has expanded and everyone has access to it. A Mantra can improve your life style by teaching you the art of meditation, by bringing peace to your soul and by helping you control difficult situations. A Mantra is a form of meditation that has existed for a long time; it is used in the whole world and you don’t need to be religious to use it. A Mantra is a word of wisdom that brings you strength when going through a hard time; this word could be related to your religion but this isn’t obligatory. The most common Mantra is the â€Å"OM† which means God in an impersonal way but now days almost any holy word no matter what religion can be used as a Mantra. For example; the Catholic can...

Monday, November 11, 2019

An analysis of british rock culture and its impact on popular culture Essay

Since its genesis in the early 1960s, British Rock n’ Roll has been one of the most influential movements of contemporary music worldwide. Britain has successfully introduced some of the most significant rock musicians to ever grace the stage worldwide. Included in this group are bands like The Who, Led Zeppelin, The Beatles, The Rolling Stones, Oasis, and countless others. I chose to analyze British rock culture, not solely because of its importance in terms of musicality, but because of its profound impact on popular culture. Contemporary British rock began developing in the 1960s and early 1970s with the inception of bands like The Beatles, The Rolling Stones, and Led Zeppelin. It derived from the skiffle and blues music of the 1950s, yet the forthcoming British artists sought to recreate the upbeat music according to their own interpretations (Perone 19). British rock culture has yielded many sub-genres of rock n’ roll including Progressive Rock, Glam Rock, Alternative, and Heavy Metal. As the movement has expanded throughout the decades, lyrics have become more complex and have become increasingly rooted in the conveyance of sociopolitical and sexual themes (Miles 1). The geographic origins of contemporary British rock culture are mainly large urban areas in the southern half of England including Liverpool, Manchester, and London (Kallen 20). These urban locations teemed with showcase opportunities at clubs and concert halls for many of the local bands. Over three hundred bands in the 1960s made their debut in these smaller venues that the large cities had to offer. After increasing in popularity, bands like The Rolling Stones and The Beatles made a transition to America in what was coined as the British Invasion. The British Invasion came in different waves, continually promoting the new styles and sounds coming out of Britain during the second half of the twentieth century. This movement influenced the form of artistic migration that has continued today within the realm of pop music with bands like One Direction. The British Invasion of the 1960s flourished due to the British domination of American radio stations and record industry. The vibrant fashion trends and mop-top hairstyles took the young American public by storm. In terms of demographics, the attractive members of the new Britain rock culture were extremely appealing to their American counterparts. Their enticing English accents were familiar enough to understand, yet foreign enough to be alluring and admired.   They were young enough to be relatable and helped to create the link between music and teenage identity that continues to proliferate today. It is important to analyze the psychographics of band members associated with the British rock scene as it allows for us to better determine and understand the attitudes and opinions reflected by their lifestyle choices. While many British musicians during this time were brought up in the Christian church, in many cases they eventually began to reject religious teachings and organizations. George Harrison, for example, abandoned Western thought entirely and began to embrace Eastern ideologies during his spiritual walk with Hinduism while in India (Stark 117). John Lennon and Ringo Starr began to identify as being an agnostic or atheist, while Oasis frontman Liam Gallagher has stated that his beliefs continually oscillate and that he is too concerned with the present day to be worried about the afterlife (â€Å"Liam and Noel Gallagher† 2).   Rumors concerning satanic behavior and devilish subliminal messaging have continued to be associated with British rock stars; opponents to the messages that British musicians advocate are adamant in stating that playing songs like The Beatles’ â€Å"Revolution 9† backward wield satanic sayings and chants. This is enough for some people to firmly believe that the musicians producing these songs do worship Satan as their god. In terms of family life and relationships, short-lived marriages and divorce have been popular amongst those in the rock scene. The pressures of being a celebrity living a high profile and publically wildlife strained marital relationships and led to many of the musicians having multiple spouses throughout their lifetime.   Adultery is common; Mick Jagger’s first wife has stated in an interview that her marriage ended on their wedding day because of this. Sexual liberation was a prominent theme that was grounded in the British rock scene and encouraged the normalization of premarital sex and, eventually, homosexuality. Bands during the creation of the British rock movement were often considered accurate representations of the counterculture movement of the 1960s due to their youthful, rebellious behaviors and creativity. This trend continued with members of The Beatles, The Kinks, and The Rolling Stones.   Drug use began to run rampant in the artists’ lives as LSD, heroin, and cocaine became popular choices for artists with an experimental mindset. The common interest in recreational drugs was an attempt to explore consciousness and find inspiration for new sounds and styles to share with the eager public. The prolonged drug use inspired a branch of British rock called psychedelic rock, introducing the Grateful Dead and The Doors to the world stage (Kallen 253).   The Beatles famously became known for their bouts with LSD. Overall, the explicit use of drugs in songwriting encouraged the young public to experiment themselves as they embraced the alternative lifestyle that their stars exem plified. The fame and exposure of British musicians have often led to very risquà © behavior, commonly leading to alcoholism, drug addiction, and young deaths. The stars are most often characterized as living freely, and doing whatever it is they please, no matter how frowned upon their actions are. Many urban legends have surfaced regarding the wild antics of British musicians, including stories about bizarre sexual encounters and the destruction of both public and private properties.   It is plausible to say that many musicians associated with this culture focus on primarily living in the moment. The profitable success of record sales in conjunction with their celebrity titles provides the musicians with the funds to do virtually whatever they please with their time and their money. Drugs, therefore, become easily accessible and affordable. Drug addiction is very common in the lives of these artists and has sadly claimed many of their lives at young ages. Jim Morrison of The Doors, Jimi Hendrix, and Keith Moon of The Who is among those whose reliance on recreational drugs like heroin, unfortunately, claimed their lives. They were all under thirty-two years of age (â€Å"The Dead Rockstars Club† 27). The impact that the British rock scene has had on popular culture throughout the world is undeniable. The British rock culture has become so important in England that some of its stars have been awarded, and in some special cases, knighted by the Queen of England for their contributions to music. The list of those who have been knighted includes Mick Jagger of The Rolling Stones and Paul McCartney of The Beatles (Kallen 246). The worldwide influence of British rock culture is even more impressive as it has become a reflection of societal changes and themes as time and the development of sub-genres have progressed.   In terms of musicality, it increased the distinction between what was considered noise and what was considered carefully constructed music; instruments are now seen as crucial to a song or band’s success. In even more important terms, it has been a form of democratic mass media that has broadcasted messages of free speech, sexuality, and even anti-war disillusion ment. British rock n’ roll has influenced people beyond Britain’s sphere of political and economic influence through its ties to the world’s youth. Overall, British rock culture will continue to expand its horizons and be influential in the lives of the masses due to the band members who are willing to share their opinions and creativity through their artistic medium. Works Cited â€Å"The 1960s British Music Invasion.†Ã‚  The Official 60’s Site-British Music Invasion. N.p., n.d. Web. 23 Apr. 2014. â€Å"The Beatles and the British Invasion.†Ã‚  The Beatles and the British Invasion. Jerry Fielden, n.d. Web. 23 Apr. 2014. â€Å"The Dead Rock Stars Club – The 1970s.†Ã‚  The Dead Rock Stars Club – The 1970s. N.p., n.d. Web. 23 Apr. 2014. Kallen, Stuart A., and Bob Italia.  Renaissance of Rock: The British Invasion. Bloomington, MN: Abdo & Daughters, 1989. Print. â€Å"Liam and Noel Gallagher.†Ã‚  Www.atheistalliance.org. Atheist Musicians, n.d. Web. 10 Apr. 2014. Miles, Barry. â€Å"Spirit of the Underground: The 60s Rebel.†Ã‚  The Guardian. Guardian News and Media, 31 Jan. 2011. Web. 23 Apr. 2014. Perone, James E.  Mods, Rockers, and the Music of the British Invasion. Westport, CT: Praeger, 2009. Print. Stark, Steven D.  Meet the Beatles: A Cultural History of the Band That Shook Youth, Gender, and the World. New York: HarperEntertainment, 2005. Print.   

Saturday, November 9, 2019

Electronic Auditing Procedures to Monitor the Computer Use of Employees Essay

Imagining weight on a scale, when one goes up, the other one goes down. The natural order of life is the balance signaling there is always a price to pay for an achievement. In line with the explosion of the information and technology development, the quality of life has been literally perceived as jumping onto a higher level of realm. But on the other side of the scale is the humanity, the price to pay for such an advance achievement. Consequently there is the need to look into the matter on whether the technology should advance the humanity or it should be the otherwise. Therefore, this report will focus on the causes and the effects of the problems arisen, thus outlined few suggestions to overcome the issue before the spark triggered the fire. This report has been designed structurally from identifying the problem, the effect and subsequently discuss on the measurements to balance the order. There are lots of companies have run the electronic auditing procedures to monitor the computer use of the employees. They perceived this matter seriously because the future achievement is their priority. But is the implementation of the employee monitoring system is necessary is still under a heat debate because it deals with their privacy and individual right. We should make a clear statement that company computing systems are provided as tools for business and all information created, accessed, or stored using these systems are the property of the company and are subject to monitoring, auditing, or review. Even though the management has the authority to do so as the management is their source of income, but it is appropriate for the management to also look into their welfare as equal priority. Therefore, this report will focus on both side of the scale and dwell into both the benefits and the harms on implementing such a major monitoring system. Below (Diagram 1. 0) is the finding of a research conducted by The American Management Association as published in the Business Week, December 2012 edition. Before we dealt with the issue, it is best for us to understand on how does the system works. Then only we will proceed on the why should we or should not we implement such system. First off, the system enable the administrator to overlook or monitor the employees screen using his/her own computer, to be exact, we can know what the employees are viewing or doing with their computer. This gives the advantage for the administrator to save a screen shot of the employee’s computer to be kept as evidence in the time to come. Next, the administrator can also access in to the employees computer at any time, any will, as if we are using the employees’ mouse and keyboard. With that, the administrator can turn off or terminate the non-work related program accessed by the employees. On the other hand, the administrator can as well have access into all of the documents, folders and the program installed or downloaded into the computer, even without the employees’ consent. Diagram 2. 0 can best summarize the whole idea of the employees monitoring system. A drop of water can spoil the whole pot of milk. Sometimes precautions are essential to make sure things are in order. In nowadays life, the world is but at the fingertips. Most of the information is accessible anywhere anytime with the internet network so well established. It is no doubt the digital world evolves and still evolving in a drastic manner that brings the world into the greater level of live. But ironically, the money value for the technology drops steadily compare to the drastic development of the cyber world. We are getting a first class infrastructure development with an increasing transferring speed into the cyber world yet the subscription fee does not increase as much in parallel. The end result is the technology is now affordable even to the lowest hierarchy of the society. This easy-accessed phenomenon created another easy-influenced phenomenon where the cyber space has been widely used in reverse quality achievement so known as the cyber abuse. Cyber abuse has also become an infectious viral hit other than the gangnam style and the Harlem shake. The first and foremost situation to draw a frown on the face is the frequent visit to indecent websites, or pornography to be frank. Psychologically, such an act can retard the brain development yet catalyst sexual sensation. Though it is sensual to the eyes and the lust, but it will draw the vision into the dust. This situation also encourages sexual harassment among the colleague which will later on put a flame onto the company’s fame. Not to be pessimist, but this is what really happen in the world of reality. Though it goes mutual but a lot of families are in serious crisis because the authority put the hand on the elbow and let the spark burns the oil. The affairs among the colleague will definitely fuel up the existing official internal affairs, not to mention in depth in the report. Next is the overused of the social hub. When a thousand miles of distance only separated by an inch of screen, the company’s achievement will be a thousand light years behind the mission. Such scenario shifted the working focus to series of pointless communication resulting in miscommunication and lack of communication situation among the subordinates thus creating a plosive conversation here and there with huge blows, reaching no common goals, drowning further away against the stream. Good communications skills will no longer go verbally but upon a long sour facial expression, or even in written form. Verbal communication has always been the best medium in delivering day to day conversation, sharing thoughts and ideologies, thus nurturing a good social responsibility among the society. With verbal communication at stake, the social responsibility has also being driven onto the cliff, just a step towards rolling down the hill. We can no longer practice good discussions skills, daily conversations are no longer moderate. There is a call to climb back the cliff to rectify the problems. It is belief the implementation of the employee monitoring system can enhance the information transferring system thus improving the communication system. With the widespread of such working environment, next comes the misused of the communication and information technology. Blackmail and poison pen letter have since become threats. Dissatisfaction now leads to direct complaint to the superior without direct confrontation or discussion; even a compliment can turn into a complaint with such scenario growing firm affectively in the habit formation. Lot of reports has been lodged without thorough investigation, even worse when it is a blind accusation where the innocents have to take on the blame. A bunch of ants can also be a disaster; the growing numbers of complaints also bring chaos to the management. Worse still, most of the complaints have to be left unattended without resolution. This will also tainted our reputation and credibility as the top management because of our failure in resolving all the complaints. Another less concern issue is the online games addiction. Though such matter seems to leave no major effect but it still leaves a black dot on the blank slate. Employees with such addiction set aside practically all other activities in favor of playing computer games almost endlessly. Gamers who engage with extremely excessive daily gaming routines can find it difficult to make room for much else in the office. Some addicts allow jobs and careers to collapse in order to spend more time playing their favorite games. Furthermore, online games are not merely games, to a larger extend, they deal with gambling. With financial issue at stake, the focus is now on winning the jack pot like an ant in the hot pot. The company’s economy status is no longer the major concern as long as it does not effecting the payrolls. All of the above mentioned situations subsequently lead to the climate changes of the working environment. Workers are building and living in the virtual world of their own, reflecting the world of reality at the other side of the mirror, turning everything upside down. Another minor issue not to be missed out is the waste of time and energy. In the name of time, verily, man is in loss. The company’s performance is greatly affected when most of the task are not submitted in due time. Even when it is, the quality and the outcome do not get the end meet. Worse still when we have to bare all of the cost of the energy wasted for each and every workers’ entertainment. Based on the research conducted by The American Management Association, every company loses quit an amount of budget due to non-work related browsing. Somehow, it is understandable that the entire act can created a stress free working environment where they can channel the tense into the cyber space. Looking at the positive side, the use of the cyber space is actually one of the most powerful and effective information transferring and sharing method. The continuous development of the cyber technology has proved that the digital networking chain is indeed the key towards ultimate success if being use in proper management. Another major issue to look into is the misused of the confidential information of the company. Again, based on the finding, most of the employees confessed of leaking the confidential information to third parties, non-related to the company, or even to the archrivals of the company. It implies the information security breach where the employees can easily access and leak the information to the outsider. Nonetheless, this has also caused quite a few billions loss to the company income. Such scenario reflected on the management failure in preserving it confidentiality and information security system. Here comes the call to put all of the employees’ communication system inclusive of e-mail to be put under strict surveillance. However, it should be noted that enraged employees can cause an organization legal problems and liability in other methods such as by writing a letter, having a conversation, sending a fax or making a phone call just as easily as by sending an e-mail or misusing the Internet. So much so, we must recognize that some activities have a limited investment return. For example, with the exception of support center telephone operators, few telephone conversations are monitored because some casual or personal usage is expected and tolerated. Though the implementation of the electronic auditing procedure can benefit the company in almost every aspect but the invasion of the individual right and the employees’ privacy are the aspects not to be neglected. Ensuring proper use of organizational technology begins with outlining what is proper and what is not. Looking from the angle of an outsider, the welfare of the workers is not taken care of and it can cause a serious morale problem. Still, monitoring can be controversial because employees often view it as invasive, distracting, and stressful However, precaution steps need to be outlined to curb the problems mentioned. It can be considered as a system upgrading process to improve the company’s achievement. Our view is that we are showing a great concern towards the workers progression from time to time. There’s no doubt that the employee monitoring has become more common nowadays. However, overly intrusive practices can create the negative perception that the boss is watching. The solution, therefore, is to balance your need for protection with your employees’ desire for as much privacy as possible. So the idea is to implement the system with a little modification where the management can still monitor the employees’ computer yet the employees are still comfortable with such implementation. As the years roll by, workers can develop self awareness thus nurturing a great self discipline in carrying out the tasks assigned. In the case of e-mail, we should only use the company’s local area network emails outlook system to oversee the whole information transferring system. In a way, there is no other email service provider to be use in the office. The implementation of the system can be carried out in a specified timeframe so the employees still have the key to hold onto their privacy life. Yet the management should also take into consideration to block the access into certain website and IE download as a mean to overcome the individual morale issue while in the office. Workplaces subjected to high security surveillance basically are culturally troubled where trust is missing. Data collected during monitoring is subject to misuse in ways that could result the organization to liability. Our concern is that without proper handling and adequate corporate governance, employers may abuse the monitoring system. Human resource department should take the initiative to development a better programmer team under the management surveillance to take care of the system or it might become an individual right violation if the teams themselves misused the authority to oversee the system. It is utmost important now to develop a highly skilled, knowledgeable and professionally high etiquette team to encourage employee loyalty and lead to more satisfied employees. Managers and technology professionals must take steps to ensure the negative impact is minimized. With consideration from every point of view, it is utmost important to highlight there is a need for a change of wind. Given the risk of legal liability, productivity loss, and drain on bandwidth, it is clear why we must implement a blended and acceptable use policies and monitor resource usage. To qualify, the consent can be expressed in the written form with the business related reasons stated clearly on why it is being implemented. A great start is a good jump towards success, the best starting point for any organization should be the consultation with their legal counsel and other relevant parties to determine what type and scope of policy would be best suited for the organization. There should also be a defensive wall from accessing into improper website. Other than that, employees should also know that the monitoring system will only being carried out during the working hours. They still have their right into their own privacy life during the lunch hour and after the office hour. Therefore they can still maintain the stress free environment at the office. Again, the implementation of such system must be within the employees consent so they are aware of the situation that they are being watch at certain timeframe. The company policy should also embrace that the computer system and communications services are the property of the employer as well as include the penalties for policy violations, up to service termination. To show our concern towards both the company’s prospect and the employees privacy right, the approach to create the balance is neither the management is doing nothing nor monitor everything, but overseeing something yet the employees can still do their things at their own pace and comfort. With the implementation of this blended and modified monitoring system, let us put forth the hope of bringing the company into a greater level in the economy world.

Thursday, November 7, 2019

About the Foreign Intelligence Surveillance Court

About the Foreign Intelligence Surveillance Court The FISA court is a highly secretive panel of 11 federal judges whose primary responsibility is to decide whether the U.S. government has enough evidence against foreign powers or individuals believed to be foreign agents to allow for their surveillance by the intelligence community. FISA is an acronym for the  Foreign Intelligence Surveillance Act. The court is also referred to as the  Foreign Intelligence Surveillance Court, or FISC. The federal government cannot use the FISA court to  intentionally target any U.S. citizen, or any other U.S. person, or to intentionally target any person known to be in the United States, though the  National Security Agency has acknowledged  it inadvertently collects information on some Americans without a warrant in the name of national security. FISA, in other words, is not a tool for combating domestic terrorism but it has been used in the post-September 11th era to gather data on Americans. The FISA court adjourns in a bunker-like complex operated by the U.S. District Court on Constitution Avenue, near the  White House and Capitol. The courtroom is said to be  soundproof to prevent eavesdropping and the judges do not speak publicly about the cases because of the sensitive nature of national security. In addition to the FISA court, there is a second secret judicial panel called the Foreign Intelligence Surveillance Court of Review  whose responsibility to oversee and review the decisions made by the FISA court. The Court of Review, like the FISA court, is seated in Washington, D.C. But it is made up of only three judges from the federal district court or appeals court. Functions of the FISA Court   The FISA court’s role is to rule on applications and evidence submitted by the federal government and to grant or deny warrants for  Ã¢â‚¬Å"electronic surveillance, physical search, and other investigative actions for foreign intelligence purposes.† The court is the only one in the land that has the authority to allow federal agents to conduct â€Å"electronic surveillance of a foreign power or an agent of a foreign power for the purpose of obtaining foreign intelligence information,† according to the Federal Judicial Center. The FISA court requires the federal government to provide substantial evidence before it grants surveillance warrants, but the judges rarely ever turn down applications. If the FISA court grants an application for government surveillance, it also limits the scope of the intelligence gathering to a specific location, telephone line or email account, according to published reports.   FISA has since its enactment been a bold and productive tool in this country’s fight against the efforts of foreign governments and their agents to engage in intelligence-gathering aimed at the U.S. government, either to ascertain its future policy or to effect its current policy, to acquire proprietary information not publicly available, or to engage in disinformation efforts, wrote James G. McAdams III, a former Justice Department official and senior legal instructor with the Department of Homeland Securitys  Federal Law Enforcement Training Centers. Origins of the FISA Court The FISA court was established in 1978 when Congress enacted the Foreign Intelligence Surveillance Act. President Jimmy Carter signed the act on Oct. 25, 1978. It was originally intended to allow for electronic surveillance but has seen been expanded to include physical searches and other data-collection techniques. FISA was signed into law amid  the Cold War and a period of deep skepticism of the president after the Watergate scandal and disclosures that the federal government used electronic surveillance and physical searches of citizens, a member of Congress, congressional staffers, anti-war protesters and civil rights leader Martin Luther King Jr. without warrants. The act helps to solidify the relationship of trust between the American people and their government, Carter said in signing the bill into law. It provides a basis for the trust of the American people in the fact that the activities of their intelligence agencies are both effective and lawful. It provides enough secrecy to ensure that intelligence relating to national security can be securely acquired, while permitting review by the courts and Congress to  safeguard the rights of Americans and others. Expansion of FISA Powers The  Foreign Intelligence Surveillance Act has been expanded beyond its original scope several times since Carter placed his signature on the law in 1978. In 1994, for example, the act was amended to allow the court to grant warrants for the use of  pen registers, trap and trace devices and business records. Many of the most substantive expansions were put in place after the terrorist attacks of Sept. 11, 2001. At the time, Americans indicated a willingness to trade some measures of freedom in the name of national security. Those expansions include: The passage of the USA Patriot Act in October 2001. The acronym stands for  Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism. The Patriot Act broadened the scope of the governments use of surveillance and allowed the intelligence community to act more quickly in wiretapping. Critics including the American Civil Liberties Union, however, pointed out the allowed the government to obtain the personal records of ordinary Americans from libraries and Internet Service Providers even without probable cause.The passage of the  Protect America Act on August 5, 2007. The law allowed the National Security Agency to conduct surveillance without a warrant or approval from the FISA court on American soil if the target was believed to be a foreign agent. In effect, wrote the ACLU, the government may now scoop up all communications coming into or out of the United States, as long as it is targeting no one American in particular and the program is â€Å"directed at† the foreign end of the communication.  Whether the target or not, American phone calls, emails and internet use will be recorded by our government, and without any suspicion of wrongdoing.   The passage of the FISA Amendments Act in 2008, which granted the government the authority to access communication data from Facebook, Google, Microsoft and Yahoo. Like to Protect America Act of 2007, the FISA Amendments Act targeted non-citizens outside of the United States but concerned privacy advocates because of the likelihood average citizens were being watched without their knowledge or a warrant from the FISA court. Members of the FISA Court Eleven federal judges are assigned to the FISA court. They are appointed by the chief justice of the U.S. Supreme Court and serve seven-year terms, which are nonrenewable and staggered to ensure continuity. FISA Court judges are not subject to confirmation hearings such as those required for Supreme Court nominees. The statute that authorized the creation of the FISA court mandates the judges represent at least seven of the U.S. judicial circuits and that three of judges live within 20 miles of Washington, D.C., where the court sits. The judges adjourn for one week at a time on a rotating basis The current FISA Court judges are: Rosemary M. Collyer: She is the presiding judge on the FISA court and has been a U.S. District Court judge for the District of Columbia since being nominated to the federal bench by President George W. Bush in 2002. Her term on the FISA court began May 19, 2009, and expires March 7, 2020.James E. Boasberg: He has been a U.S. District Court judge for the District of Columbia since being nominated to the federal bench by President Barack Obama in 2011. His term on the FISA court began May 19, 2014, and expires March 18, 2021.Rudolph Contreras: He has been a U.S. District Court judge for the District of Columbia since being nominated to the federal bench by Obama in 2011. His term on the FISA court began May 19, 2016, and expires May 18, 2023.Anne C. Conway: She has been a U.S. District Court judge for the Middle District of Florida since being nominated to the federal bench by President George H.W. Bush in 1991. Her term on the FISA court began May 19, 2016, and expires May 18, 2023.Ra ymond J. Dearie: He has been a U.S. District Court judge for the Eastern District of New York since being nominated to the federal bench by President Ronald Reagan in 1986. His term on the FISA court began July 2, 2012, and ends July 1, 2019. Claire V. Eagan: She has been a U.S. District Court judge for the Northern District of Oklahoma since being nominated to the federal bench by President George W. Bush in 2001. Her term on the FISA court began Feb. 13, 2013, and ends May 18, 2019.James P. Jones: He has served as a U.S. District Court judge for the Western District of Virginia since being nominated for the federal bench by President William J. Clinton in 1995. His term on the FISA court began on May 19, 2015, and ends May 18, 2022.Robert B. Kugler: He has served as a U.S. District Court judge for the District of New Jersey since being nominated for the federal bench by George W. Bush in 2002. His term on the FISA court began May 19, 2017, and ends May 18, 2024.Michael W. Mosman: He has served as a U.S. District Court judge for the District of Oregon since being nominated for the federal bench by President George W. Bush in 2003. His term on the FISA court began May 04, 2013, and ends May 03, 2020.Thomas B. Russell: He has served as a U.S. District Court judge for the Western District of Kentucky since being nominated for the federal bench by Clinton in 1994. His term on the FISA court began May 19, 2015, and ends May 18, 2022. John Joseph Tharp Jr.: He has served as a U.S. District Court judge for the Northern District of Illinois since being appointed by Obama in 2011. His term on the FISA court began May 19, 2018, and ends May 18, 2025. Key Takeaways: The FISA Court FISA stands for the  Foreign Intelligence Surveillance Act. The act was established during the Cold War.The 11 members of the FISA court decide whether the U.S. government can spy on foreign powers or individuals believed to be foreign agents.The FISA court is not supposed to allow the U.S. to spy on Americans or others living in the county, even though the governments powers have expanded under the act.

Tuesday, November 5, 2019

Most Popular World Religions

Most Popular World Religions While there are and have been hundreds of religions and spiritual beliefs across the globe the major faiths practiced by the majority of people on Earth can be broken down into a few major groups. Even within these groups different sects and types of religious  practices exist. Southern Baptists  and Roman Catholics are both considered Christian even though their  religious practices differ greatly.   Abrahamic  Religions Three of the worlds most dominant religions are considered to be the Abrahamic religions. They are named such because of each claiming descent from the ancient Israelites  and follow the God of Abraham. In order of founding the Abrahamic religions are Judaism, Christianity, and Islam.   Most Popular Religious   Christianity:  with 2,116,909,552  members (which includes 1,117,759,185 Roman Catholics, 372,586,395 Protestants, 221,746,920 Orthodox, and 81,865,869 Anglicans). Christians make up almost thirty percent of the global population. The religion arose from Judaism in the first century. Its followers believe Jesus Christ was the son of God and the Messhia for told of in the Old Testament. There are three major sects of Christianity: Roman Catholicism, Eastern Orthodoxy, and Protestantism.  Islam:  with 1,282,780,149 members worldwide believers of Islam are referred to as Muslims. While Islam is very popular in the Middle East one does not need to be Arabic to be Muslim. The largest Muslim nation is actually Indonesia. Followers of Islam believe that there is only one God (Allah) and Mohamed is his last messenger. Contrary to media portrayals Islam is not a violent religion. There are two primary sects of Islam, Sunni, and Shia.  Ã‚  Hinduism: There are 856,690,863 Hindus in th e world. It is one of the oldest religions and is practiced mostly in India and South East Asia. Some consider Hinduism to be a religion while others view it as a spiritual practice or way of life. A prominent belief in Hinduism is the belief in Purusartha  or the object of human pursuit. The four  Purusarthas  are dharma (righteousness), Artha (prosperity), kama (love) and moksa (liberation).   Buddism: Has 381,610,979 followers worldwide. Like Hinduism, Buddhism is another religion that can also be a spiritual practice. It also originates from India. Buddism shares the Hindu believe in dharma. There are three branches of Buddism: Theravada, Mahayana, and Vajrayana. Many Buddist seeks enlightenment or liberation from suffering.  Sikh: this Indian religion has 25,139,912 which is impressive because it doesnt generally seek converts. A seek is defined as one who any human being who faithfully believes in One Immortal Being; ten Gurus, from Guru Nanak to Guru Gobind Singh; Guru Granth Sahib; the teachings of the ten Gurus and the baptism bequeathed by the tenth Guru. Because this religion has strong ethnic ties, some see it as more of an ethnicity than simply a religion.  Judaism:  is the smallest of the Abrahamic religions with  14,826,102 members. Like Sikhs, they are also an ethnoreligious group. Followers of Judaism are known as Jews. There are many different branc hes of Judaism, but the most popular ones are currently: Orthodox, Reform, and Conservative.   Other Beliefs:  While most of the world follows one of the several religions 814,146,396 people believe in smaller religions. 801,898,746 consider themselves to be non-religious and 152,128,701 are an atheist who does not believe in any form of Higher being.

Saturday, November 2, 2019

Taxation of life-cycle savings Essay Example | Topics and Well Written Essays - 2000 words

Taxation of life-cycle savings - Essay Example Further, 25% lump sum can be withdrawn from pension funds tax free (Lymer & Oats, 2013). Due to these treatments, most of the savings in the UK are made in pensions, housings and ISAs. They discourage savings in all other forms and put limitations on economic activity. Further, the current tax laws are complex. According to the current system, neutrality can neither be achieved over time nor across assets. It discourages people from saving because the present value of their income increases. They become better off spending their income now than later. Also, this system does not take inflation into account. The returns on savings are taxed on nominal returns. Therefore, tax on returns on savings actually increases with a rise in inflation rate. Further, the phenomenon of compound interest reduces the effective rate of return and its reducing effect is directly proportional to the passage of time (Mirrlees et al., 2011). Adam Smith (1776) proposed four canons of taxation for an optimal tax system. These canons are: ‘Equity, Certainty, Convenience and efficiency’ (Lymer & Oats, 2013, p.43). Economic efficiency relates to fiscal neutrality which refers to an ideal tax condition which does not ‘distort the economic and commercial decisions made by individuals’ (Lymer & Oats, 2013, p61). The concept of neutrality demands that people’s choices should not be distorted. However, in standard income tax, neutrality is foregone both over time and across assets. The current system makes people prefer investing in pension funds and ISAs but discourages saving through other opportunities as it taxes them at a higher rate. Further, it actually subsidises investing in a pension fund as it allows a tax free withdrawal of a lump sum. This discourages people from taking risks and limits economic activity. It also defeats the prospects of achieving neutrality over time. This system treats capital gains differently