Thursday, October 31, 2019

The subject of war Essay Example | Topics and Well Written Essays - 750 words

The subject of war - Essay Example By working around the central theme, the narratives powerfully show the nature of humans, their response to challenges of the environment and the endeavors they are willing to undertake as means towards an end. With that said, it is interesting to note what caused the war in Homer's epic and how it compares with Sheri Tepper's feminist science fiction. The Iliad, narrating the events of a short period in a very long battle, continues from the Trojan war which was caused by Paris' capture of the Spartan queen Helen. In the text itself, it is said that two lovely women, Chryseis and Briseis, are the root of all rampage. When their town is defeated by the Achaean forces, the camp's ruler Agamemnon demands to have Chryseis as prize while Achilles gets Briseis. Succeeding circumstances force Agamemnon to give up his reward Chryseis but then asks Achilles to hand Briseis over to him as replacement. Insulted by Agamemnon's order, Achilles refuses to join the Acheans in their fight against the Trojans and even prays to Zeus through his mother Thetis to punish the Acheans. Zeus addresses this by coming to the Trojans' rescue, signaling that the battle between the Trojan and Achean forces have resum ed despite their peace treaty. While it is shown that it is the women who caused the war in The Iliad, it is the men who caused the war in The Gate to Women's Country. The author, Tepper, elaborates on men's desire for power, the things they do in order to obtain it and the things they sacrifice in exchange for the accomplishment of their pursuits. Sheri Tepper book considers these as manifestations of men's innate character. Homer's epic makes use of women as instruments of war. On a deeper analysis, though, it is the competitive nature of men that has driven them to war. Every strong male character is tested for bravery, valor and loyalty. On the other end, women are depicted as slaves. The poem emphasizes the existence of a struggle in the world and the ability to win over this battle dignifies and glorifies humanity. This is an idea contemplated by a male. Ages later, Tepper would intervene with a story written from a perspective of a modern-world woman, dissatisfied with patriarchal rule, motivated towards change, with a proposal of her own. Figuratively, Tepper's women respond to Homer's men. In Tepper's country, Tepper's women downplay conflicts and emphasize cooperation among members of the society. The ultimate goal is peace, as if the main motivation for this writing is the lack of it in an earlier society. To Tepper's women, war in unnecessary and all their efforts will be poured towards preve nting it. As we look into the causes or war in each story, an underlying factor that heightens the conflict is discovered. More than gender issues, a more realistic cause of strife is social disorder. The story of The Iliad progresses in a patriarchal setting while the plot of The Gate to Women's Country proposes a revolution by a matriarchal structure. Both are stories dealing with gender issues which are about power and dominance. Agamemnon exhibits dominance over Achilles by demanding for Briseis and Achilles' reaction exposes the need to soothe the male ego. Were it not for Agamemnon's aggression and Achilles' yearning for revenge, the Acheans and the Trojans would not resume their battle since a peace treaty

Monday, October 28, 2019

Time and Chart Essay Example for Free

Time and Chart Essay Note: Thanks to Alan Profitt, a member of MHT, for providing the text for this paper. FSC offers PVT and MFI indicators along with a beautiful chart to help you in MHT. SAY AGAIN? Freestockcharts. com (FSC) by Worden offers, not only a beautiful chart with very good indicators (almost more than you can comprehend), but it really is free. In the Morning Hours Trading (MHT) chat room you will hear many refer to an indicator only on FSC. It is Price Volume Trend (PVT). Money Flow Index (MFI) is a more common indicator available on many other sites. This discussion is to help you set up FSC and become familiar with how to use PVT and MFI. After logging in to Freestockcharts. com, you will see a very nice chart. Something like this. Please note the arrow pointing to â€Å"settings† (#1). By clicking on it, you can change plot styles, color, etc. I have set candlesticks red and green. Many other options are available for whatever your desires. The arrow pointing to â€Å"Price History† (#2) allows you to adjust the price presentation on the chart. Just above the stock symbol and â€Å"Add Indicator† (#3) buttons is a button called â€Å"Draw† (#4). By clicking on it you can add many favorite trader activities such as Fibonacci lines, pivot points etc. to the main chart. You will notice the yellow horizontal line (#5) on the chart which is yesterday’s closing price. Just to the left of â€Å"settings†, on the same line you will see a small down arrow which you can click to change time frame of the chart, i. e. , 1 min 5 min etc. (#6). On the same line again left of the time frame selector is the â€Å"Add Indicator† button (#7). Here is where you add what I feel is the best part of FSC. You will find Price Volume Trend listed alphabetically on the drop down list. Clicking on it adds the new chart as shown below with MFI added. On this chart you will see that it is the yellow line. (To change colors click on the words â€Å"Price Volume Trend† within the chart, â€Å"Edit†, and change the plot color. ) Also, as you see above, you can add the â€Å"Money Flow Index† by again clicking on PVT and instead of editing go to â€Å"Add Indicator†, scroll down to MFI. The purpose of adding the MFI to the PVT chart is to get the top green and bottom red lines. The numbers to the far right don’t mean anything for our purposes here. You can change them to generally go from 0 -100 by repeatedly clicking on the carrot symbol on the bottom outside of the numbers (#9). In the background on this chart, notice faint white lines. These are important because they indicate when the time has come to execute the trade. We are not talking about the brighter white line just above times. The very bottom time line is adjusted by the slider (#10). Most of the time I have seven hours set. The best part of the PVT, MFI chart is, what I feel is the quicker indication than RSI and MA crossing for signals when to buy or sell a stock. You absolutely need to verify with your other favorite indications for picking the time to execute a trade as discussed by Bob’s must read. Many in our chat room only use this though and you will hear a â€Å"PVT setup† referenced. At 2:45 on the above chart, youll see a PVT indication to buy as it touched the bottom faint white line (#11). Folks, that’s it! PVT hits the bottom buy, set your stops, target gain, etc. If you are trending when it hits the top, then sell or go short if you’re not in already. Ive provided a second example below. This is from 11-16-09 at about 12:15. Ive added RSI with a tight setting of 7 and then added a moving average onto the RSI indicator. This creates a moving average of RSI and allows you to see cross over patterns. You can see the crossover pattern that occured with RSI at the same time that PVT touched the bottom white line, giving a confirmation signal. While this is not necessary, it is sometimes good to have several indicators confirming your decision to enter a trade. The next example is of a short trade. In the chart below (also taken from 11-16-09), you can see how PVT hits the top line and, at the same time, RSI makes a quick downward crossover of its moving average. Another great feature of FSC is the Watch lists. While it is a great feature, it is a little difficult to understand the setup. So, here it goes. The #12 indicates where you click to bring up various Watch Lists. You will see â€Å"All, Main, Scan, Component, etc. † Click on Component, and most of us use either S P 500 Component Stocks or Russell 2 or3000 component stocks. THESE ARE THE ONES YOU USE ON YOUR OWN TO PICK GAP UPS OR DOWNS AFTER BOB’S PICKS. Needless to say you will get MANY stocks and to eliminate penny stocks you might want to use a smaller population. Try them all out to find your own grazing area. In order to sort your list, click on â€Å"add column†. Shown here in orange (#13). All you want to use is â€Å"Symbol and Todays %†. You can delete anything else that’s default. Edit the symbol icon by clicking on it and change the column width to 60 if it’s not already there (#14). Todays % shows as â€Å"% Change†. Click on it and change column width to 50 colors your choice and decimal places 2. Once the above is done you have, just to the right of sort, in orange, and % Change, a blue up or down arrow with accompanying green stairs just before â€Å"Asc or Desc†. By clicking on this you change the order of the lists in your Portfolio to see the gap up or down. The right arrow above shows a small grey border which has two small hash marks in the middle. By grabbing the hash marks you can slide your portfolio column vertically (#15). Why is this important? Because this is the place you want to enter Bob’s Gap stocks. Click on â€Å"Create Portfolio† and enter the name you want to call Bob’s list. I have named mine MHT; others call it Bob’s list. (I also have my own individual portfolio. ) Here is where you add Bob’s gap up and down picks he announces at 8:15. You can put both on one list and use the Asc/Desc, or by clicking on the % Change next to â€Å"Symbol†, to get the gap ups or down. Throughout the morning, I constantly review this list for PVT setups, as well as listen for Bob’s picks. The third and bottom section of this left hand column is for current news for the stock you have picked on the main chart. Another great feature so that you don’t have to leave to find out any breaking news on other programs. The height can also be adjusted by using the hash marks in the little grey border, to minimize or expand. The use of PVT is a great addition to anyone’s trading repertory, but it does have two limitations. First, it could lag behind on thinly traded stocks because it gets data from only the BATS Exchange. It does not use all the exchanges. This normally presents little or no problems on stocks with over 500,000 shares traded daily. Secondly, when you change the time frame from 1 min to 5 or 15 min etc, you need to be aware that the time frame goes from hourly to daily or monthly. Great for investors and those wishing to view history, but of limited value to day traders I think. Due to FSC only using the BATTS exchange, if only offers indications during normal trading hours. No pre or post market. Once youve created your portfolio of stocks (your watch list), you can click on the stock and it will populate your chart. You can also press the space bar to access each symbols chart. After youve created your ideal layout, youll want to go the File menu in order to save and name your chart (# 16). You can also learn to create your own scans and set up audible alerts by using the Help menu. This presentation is strictly to demonstrate how to set up Free Stock Charts so that you can trade in Morning Hour Trading and be on the same page as most others. Please read Bob’s other must read sections to become successful in our group. His advice on how and when to make trades is invaluable.

Saturday, October 26, 2019

The Ethics Of Predator Drones Criminology Essay

The Ethics Of Predator Drones Criminology Essay Since its inception in 1995, the General Atomics MQ-1 Predator was initially intended for reconnaissance and forward observation roles, but the September 11 attacks changed that altogether. During February 4, 2002, the CIA deployed the first unmanned, armed Predator drone in an assassination attempt. The strike was to happen in the city of Khost, a province in Afghanistan. The target was Osama bin Laden, or at least someone who the CIA thought was him. Armed with a payload of Hellfire missiles, the drone attacked a group of would-be insurgents. Days later, local journalists and Afghan civilians reported that the dead men were civilians collecting scrap metal. What ensued thereafter was backlash from the public condemning its use. Using (UAVs) unmanned aerial vehicles to kill suspected terrorists marks a radical departure from the ways we have dealt with enemies before. Drones have unofficially become the weapon of choice for counter-terrorism. And over the coming decades, are expecte d to replace piloted aircraft. With the future of warfare pointing to the use of drones, legal and ethical issues surrounding their use must be explored. Since their deployment, armed combat drones have killed terror suspects as well as innocent civilians. The Ethics of Predator Drones Introduction From Davids slingshot, to the invention of bows and arrows, then guns, and missiles, major advances in military technology have revolved around the ability to kill from a distance. Just like a sniper able to shoot down an NVA commanding general from a mile away, the ability to shoot at your enemy from a greater distance than he can shoot back at you is one of the reasons why warfare continues to evolve. The MQ-1 predator drone is just a new tool in a new kind of war. A war waged in the 21st century, the height of technological advancement in weaponry. The wars in Afghanistan and Iraq were used by the US military as a test bed for their development of future weapons. The US military might is one of the greatest of the world. The US spends more money in defense than all of the other countries combined. The money spent is used in the hopes of lessening military casualties, and to help in accomplishing missions and tasks in a more effective way by using new technology. Their latest inventions include an assortment of robots that are capable of performing EOD (Explosive Ordinance Disposal) and IED (Improvised Explosive Device) destruction missions. Some robots have even cross-trained to a more combat role. For example, the US military have deployed a robot called the Foster-Miller TALON. This robots mission ranges from reconnaissance to combat by employing a rifle mounted apparatus to its tracked chassis. Calibers from the M16, M249, M240 machine gun, .50 Barrett, and sometimes a six barreled 40mm grenade launcher have all been outfitt ed into its tracked chassis. These are just examples of the robots that are deployed on the ground. The most noticeable robot from this new generation of combat robots is the MQ-1 Predator drone. To this day, the Predator drone has flown more than 1 million flight hours. Combat Capabilites The CIA began experimenting with reconnaissance drones since the early 1980s. It was only in the early 1990s when they finally found a suitable prototype that could meet their intended mission needs. Before the production of the current MQ-1 Predator, most of the prototypes were so loud that their detection was inevitable. A chief designer from the Israeli Air Force immigrated to the US in the 1970s and started his own defense contractor business and called it General Atomics. The CIA secretly bought 5 drones from General Atomics and equipped with a more improved and quieter Rotax engine that is driven by a propeller. The Predator drone can fly a range of 770 miles and stay in the air for up to 40 hours, cruising at altitudes over 25,000 feet. Its top speed is 135 mph which is powered by a 115 horse powered Rotax engine. With a payload of 450 pounds, most of the equipment include: infrared tv cameras, and a ground-scanning Synthetic Aperature Radar. A variant was also produced to pro vide a more combat-centered role. This variant is armed with a pair of AGM-114 Hellfire laser-guided, anti-armor missiles. Another variant called the MQ-9 Reaper is their latest incarnation of combat drones. The MQ-9 Reaper is much larger and also capable of autonomous flight operations. It is the first hunter-killer UAV designed for long-edurance missions. The Predator can be disassembled into 6 main components and loaded into a container which makes it rapidly deployable. Included in the Predator package is a 20ft satellite dish and other supported equipment. The satellite dish provides a link to communicate with the operators at a distant remote location. The ground station houses the multiple support staff from pilots to sensor operators. The remote link could be as far as 5000 miles away, which makes the predator a system rather than an aircraft. The advantage of using such a system is that it has all the advantages of a traditional reconnaissance sortie without ever exposing the pilot to a hostile environment. Combat Record Currently the US Air Force has over 190 MQ-1 Predators and over 25 MQ-9 Reapers in operation. Over 250 missiles have been fired in Iraq and Afghanistan alone since 2008. An estimated 70 Predators have been lost due to weather, equipment failure, operator error and an additional 4 have been shot down. With over 1 million flight hours, the Predator has maintained a 90 percent mission capable rate. With no US casualties related to operating a drone, this proves advantageous in combat operations. The Predator drone first took flight over the Balkans. It provided reconnaissance during the NATO bombing of Yugoslavia. Then in 2000, the CIA and the Pentagon joined forces to locate Osama bin Laden in Afghanistan. The first flights over Afghanistan were more of an observatory role which provided intelligence for the locations of suspected terrorists. It wasnt until the September 11 attacks that the US started to seriously consider arming the Predator with weapons for combat purposes. After successful testing of the newly armed Predators, the US found more missions for the Predator to perform and more are used today in multiple combat zones. With its newfound role as a combat drone, the US began to deploy the Predator on missions to Pakistan, Iraq, Yemen, and other middle-eastern countries in which suspected terrorists are expected to be in hiding. During missions in Iraq, several Predator drones encountered Iraqi MiG-25s and participated in the first air to air combat between a drone and a piloted fighter aircraft. In fact, the US stripped multiple Predator drones of its sophisticated weapons and sensory systems and used them as decoys in the sky to entice Iraqi air defenses to expose themselves by firing. The most recent account of a Predator being used to kill high-profile terrorists was during an operation to apprehend deposed Libyan leader Muammar Gaddafi. Since then, several Predators have returned to Libya in support of the Benghazi attacks. Civilian Casualties Despite its combat effectiveness against suspected terrorists, reports suggest that far more civilians have been killed by US drone attacks than US officials have acknowledged. A new study by Stanford University and New York University contends that CIA targeted killings arent making America any safer and instead has turned the Countries that these drones have ravaged against the US. The study calls for the Obama administration to be more transparent and accountable for its actions, and to prove compliance with international law. One instance in dispute involving civilian casualties occurred during a drone attack on March 17, 2011. An estimated 42 people were killed during a Jirga, a meeting of elders. According to reports, most of those killed were civilians with only 4 known members of the Taliban in attendance. The disparity of civilian deaths to militant deaths calls to question the legal basis for targeted killings by drones and the criteria in which an authorized strike is recommended against armed men who fit the profile of militants. The study says that the drone attacks violate international law because the government has no proof that the targets are direct threats to the United States. The following graph displays the reported fatalities resulting from US drone strikes conducted in Pakistan. As you can see from the graph, fatalities have risen significantly since 2004. The dramatic rise in fatalities correlates to the frequency of use. Not only has President Obamas administration embraced the CIAs campaign of Predator drone strikes in Pakistan that began under President Bush in 2004. It has also continued an acceleration of the campaign that began in July 2008 during the last year of President Bushs tenure (Woodward 2010: 25). There is also evidence that the range of persons being targeted has expanded. In particular, it has been widely reported that late in the Bush administration, the CIA received permission to broaden the scope of targeting from an exclusive focus on high-value al-Qaeda and Afghan Taliban targets to include low level fighters whose identities may not be known and that this broadened scope has gradually come to include the Tehrik-e-Taliban (TTP) or Pakistani Taliban (Kilcullen, Exum, Fick and Humayun 2009: 18; Mayer 2009; Entous 2010). More and more pressure has been added by the international community to stop these drone attacks, but top US officials have defended its use. A top US counter-terrorism official cited the benefits of its uses. Such benefits include reduced danger to US pilots and limited US military involvement overseas. Legality There were reports from the Wall Street Journal that revealed the Bush Administrations and CIAs plan to set up hit squads to capture and kill Taliban and Al Qaeda militants around the world. The anger from the public grew even more when the Times reported that the CIA planned to carry out these hits by employing the controversial private contractor formerly known as Blackwater. Members from both the House and Senate intelligence committees claim that these plans were hidden from them and demanded a thorough investigation of the programs created to carry out those hits. Although the program was never fully operational, many legal experts contend that if they were, it would have violated President Gerald R. Fords 1976 executive order in which it bans American intelligence forces from engaging in assassinations. Although the targeted-killing program was never fully implemented, many consider the Predator program to be an extension of its intended creation. It so happens, that the Predator program also uses private contractors for maintaining the drones, equipping it with Hellfire missiles, and also flying it. There are currently 2 drone programs in which the US government runs. There is the military version, for which it is publicly acknowledged and operates in recognized war zones such as Iraq and Afghanistan. The military version is considered to be an extension of conventional warfare. Then there is the CIAs version, which aims at killing suspected terrorists around the world, including in countries where US troops are not present. The latter is covert and not much information is provided to the public about how it chooses its targets, where the operations are conducted, or how many people have been thought to have been killed. The international community condemns these targeted killings and suggested that these attacks would encourage other countries to disregard long-established human rights standards. Some even suggested that these drone strikes may even constitute war crimes. Powerful countries such as China, Russia and other countries have publicly criticized the US drone attacks. The concern is mostly about the use of drones outside of recognized war zones and the secretive nature of such operations. Aside from the lawful use of drone attacks in which it is involved in armed conflict, some consider the secondary attacks on rescuers who are helping the injured after the initial drone attacks, those further attacks are suggested to be war crimes. Ethical Concerns One of the main concerns about using the Predator drone, despite its exemplary combat record, is that drones could lead us down the road to building fully autonomous weapons systems; machines that can make their own lethal decisions on the battlefield. Its hard to distinguish which weapon system is considered autonomous, so for the purpose of making a quick distinction, I will refer to any weapon that makes a decision to launch a lethal attack as fully autonomous. So, a heat-seeking Hellfire missile that follows a target would not be autonomous because a human entity made the decision to push the button to launch it, but a Predator drone programmed so as to make the decision for itself to fire on a specific target of its own accord would be. So as long as the human element is present for each particular lethal decision, it would not be considered autonomous. Many consider autonomous drones to be morally impermissible and are afraid that the move to make current drones autonomous is j ust around the corner. Another concern pertains to the drones decreased ability to discriminate combatants from noncombatants. The concern stems from the trust-worthiness of intelligence and also from the ability to discern different people from a video feed in which the operator is literally thousands of miles away from the battlefield. The examples given before in which the toll of civilian deaths were reported to be significantly larger than the combatant deaths attest to this concern. Some are worried that the use of drones leads to psychological conflicts for their operators. A drone operator would go home or to a PTA meeting after a hard days work of killing suspected terrorists from the comforts of his work desk. Some argue that this places unjust psychological burden on them and causes cognitive dissonance in the mindset of the warrior. An even greater concern is that drone operators would treat warfare as if it were a video game; as a result from the cognitive dissonance which will weaken a warriors will to fight. This could ultimately lead to mental problems or even PTSD (post-traumatic stress disorder) which would likely affect the operators decision-making on the battlefield. Another criticism is that drones create unjust asymmetry in combat. The objection follows: The use of technologically superior weapons such as drones by one force against another force that does not have the means to attain similar technology crosses an asymmetry threshold that makes the combat inherently ignoble. Its considered to be morally impermissible to pit two opposing sides against each other whose combat abilities differ greatly. Imagine pitting a lion against a dog. The same principle applies when you consider jus in bello (Laws of war). This position is usually held because in such circumstances one side literally does not take any life-or death risks whatsoever (or nearly so, since its warfighters are not even present in the primary theater of combat) whereas the opposing side carries all the risk of combat. (Stawser, 2010) A Moral Case for Drones There are many advocates for the continued use of drones. Some argue that the US is not only entitled but morally obliged to use drones. Considering all the advantages, there is really no downside to using them. Drones are merely an extension of a long historical trajectory of removing a warrior ever farther from his foe for the warriors better protection. (Strawser, 2010) Predator drones have been credited with the removal of top Al Qaeda and Taliban members, the most recent being Al Qaedas No. 3, Mustafa Abu al-Yazid. Stopping these influential terrorist leaders proved to be valuable in stopping large scale terrorists plots aimed at destroying or even devastating US cities and their allies. Conclusion Its only a matter of time when drones will rule the sky. Not only are drones being used in the combat zone, assassination plots, or just surveillance, there are plans in the future for them to roam in the sky of our own US cities. Plans to make drones an extension of law enforcement are inevitable. Before that happens, we have to be responsible citizens and look deep into the ethical problems that they provide and not be blinded by its technological superiority. As the drone attacks in Afghanistan, Pakistan, Yemen, and elsewhere have demonstrated, we now have the ultimate in push button warfare. There is always an advantage to having military superiority over your enemies. However, I think its important that we not fall into the trap of thinking that just because our slingshot has a greater range than the other guys, we are morally justified in using it in every case. Military superiority brings with it a moral responsibility not to use the superior weapons we possess merely because we possess them.  (Vincent, 2009)

Thursday, October 24, 2019

Jane Eyre :: Free Jane Eyre Essays

ane Eyre is a story filled with many forms of abuse and bad customs. In this essay I will bring you close to these. I will point out tyrants and abusers that Jane faces throughout her life. Jane Eyre Is also filled with hypocrisy and I will expose that. The suffering that Jane endures will be discussed. The book Jane Eyre starts out very powerful. Our first meeting of Jane is at Gateshead. Jane is an orphan who is being taken care of by Mrs. Reed her aunt by marriage. There is no love for Jane here; not only that the only thing here for Jane is abuse. â€Å"Why was I always suffering, always browbeaten, always accused, forever condemned?†(Pg.11) Keep in mind that this girl is only 10 years old. She is all alone. She is on her own. â€Å"I was a discord in Gateshead Hall; I was like nobody there†(Pg.12) Within the First ten pages we learn of the harshest abuse Jane has to face in the book. The infamous â€Å"Red Room.† Jane is sent to the â€Å"Red Room† af ter a dispute with John. John is Mrs. Reeds favorite, but he is a little tyrant. The foul part is that Jane was injured by him and she got punished. The reason the â€Å"Red Room† seems scary is that it is the room Mr. Reed passed away in. â€Å" And I thought Mr. Reed’s spirt, harassed by the wrongs of his sister’s child, might quit its abode.† So Jane feels that his spirit is present and her harassment of him might keep him from showing himself.† As Jane sits in the â€Å"Red Room† a shadow of some kind begins to move about the wall like a dancer. Jane starts to worry to the point that her mind becomes overwhelmed and she passes out. When she wakes up, she begs Bessie and Miss Abbot the help to let her out. They run to Mrs. Reed to tell her of Jane’s high fever. As the sunsets a new found factor of worry is thrown at Jane. It becomes evident that she may not make it through the night. Mr. Lloyd the doctor arrives to tend to Jane, and he recommends that Jane attend a school called Lowwood. Jane makes it through the night but her abuse and torments have just begun. She will soon face a monster and a tyrant far worse than that of young John known as Mr.

Wednesday, October 23, 2019

Octopus System Essay

In our group’s case study report, we will examine the use of Octopus system in the education sector. Octopus system is a widely used e-Commerce technology in Hong Kong, covering a variety of industries including transportation, retail, restaurants, and more. Tsung Tsin Primary School is the main focus of this case study. The school uses the Octopus system extensively, integrating into student and staff information, attendance, educational activities, payment, and communications. We will look at how using the system can help achieve the school’s missions. In order to describe the business case, we will analyze the benefits of adopting the Octopus system in an educational environment, comparing with the traditional methods of performing similar processes. The feedback from Tsung Tsin Primary School has been very positive; however there are associated costs, risks, and challenges. In our case study, we will also discover the potential or existing issues with the implementation and maintenance of the systems. With personal identification store in the Octopus cards and the server, we also have concerns regarding to the security and privacy of the system. We will analyze the current security measures and suggest changes to enhance the protection. Finally, we will provide recommendations for extending and further improving the use of Octopus and other e-Commerce technologies in Tsung Tsin Primary School. We will also look at the feasibility of adopting the Octopus system in other types of educational institutes.

Tuesday, October 22, 2019

Jenkins, David. From Unwritten to Written Transformation in the British Common

Jenkins, David. From Unwritten to Written Transformation in the British Common The written constitution has government principles found in legal documents which have been enacted as laws. The clauses in the written constitution are well planned; clearly stated and standard. Unwritten constitution is the opposite of written one; the government principles are not found in legal documents and the enactment of laws does not exist. The clauses do not follow a certain pattern, plan or standard. Written constitution is more compatible with the liberal democratic tradition.Advertising We will write a custom essay sample on Jenkins, David. From Unwritten to Written: Transformation in the British Common-Law specifically for you for only $16.05 $11/page Learn More Written constitution has principles that limit or restrain parliament through a judicial review. This means that, the parliament has the authority to enact laws of the land but they must be reviewed by the judiciary of a nation. Such control of parliament’s limitless power ensure s that there is no misuse of power. In addition, a balance between legislature and judiciary is created therefore reducing excess political influence on a nation. Written constitution ensures duly enacted laws serve the public welfare. As a result, the parliament is responsible towards the citizens. Moreover, the principles of the natural law are bound by morality and ethics of humanity. Hence, all laws governing the land are determined by the public good. Written constitution ensures the parliament delivers ultimate obedience to its subjects. Despite its supremacy in the land, parliament remains morally answerable to the welfare of its citizens. Written law is not easily manipulated to suit an individual’s interests. For example, if a medical practitioner runs a business without permit from the government or license, he or she can easily manipulate the unwritten law to fit his circumstance. Written constitution is precise and statements written are not controversial. In addi tion, all laws regarding practice and professional ethics governing different professions are enacted. Incase such scenarios arise it is efficient to quote the written law. Written constitution ensures an effective implementation of the rule of law in parliament and other government bodies. Rule of law includes judicial aspects, where the courts are charged with responsibility of protecting the interests of the public from unlawful acts. Such acts may originate from parliament and court has the responsibility of interpreting the law appropriately to ensure public good. The balance between legislature and judiciary helps in implementation of respect of law. A written constitution has important sections especially ‘Bills of Rights’. In developed nations, unwritten constitution protects its citizens. Incase of minority harassment, no justice can be found. Written constitution provides clauses on human rights, which cover all citizens regardless of race or tribe. Written co nstitution acts as a reference point for all citizens in a given nation, hence the protection of public good is enhanced. Written constitution offers a document for reference where the main bodies of government are listed together with their responsibilities. Without a written constitution, there exists a vacuum for a legal doctrine. Cabinet, judiciary and parliament are the major government bodies and their roles need to be clearly listed. A written constitution would provide that legal document for future references. A written constitution provides a clear distinction between constitutional and ordinary laws.Advertising Looking for essay on political sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More The article is relevant to this thesis because it provides the reasons which led to the adoption of a written constitution in Britain. The journal supports the thesis; written constitution supports liberal democracy and growth. This journal provides the gaps which existed in unwritten constitution of Britain. In addition, it addresses the need to include clauses on human rights in the constitution. Moreover, it addresses the need for public welfare in governance as well as the need to implement rule of law.