Wednesday, October 30, 2019

Preformance Managemant Essay Example | Topics and Well Written Essays - 500 words

Preformance Managemant - Essay Example For instance, there are assumptions that managers might undertake when taking evaluation of an employee. Sometimes, the responses from an employee may not be reflective of the potential and skills that he possesses. Thus, at this point, it is expected that the manager would assume faulty quotes for the employee’s service within the organization. At some point, the main essence of performance appraisal or management may not be fulfilled because the manager may be biased or have an opinion which is built before the appraisal process (Cardy and Leonard). As per research, another reason which has been noted to affect managers is the psychological underpinning of performance management. At some point, managers may feel that they are insecure about their own positions because performance management requires a lot of evaluation and understanding. It should be noted that managers feel burdened with the strategic planning of needed for performance management within an organization (Cardy and Leonard). Finally, the most important reason behind resistance of managers towards performance management is the fact that they would have to set targets for their subordinates. As a result, it is expected that some of the subordinates would show resentment towards the managers. Therefore, an air of miscommunication arises that does not make the team and manager feel confident or communicative about each other (Cardy and Leonard). Other than this, it is noted that managers would focus on day to day achievements of the individuals. But it is ineffective because managers should look at employees as team members. It is due to this reason that they stay motivated and communicative within an organization. Secondly, managers believe that all employees are similar which only false assumptions are. Managers need to understand that all employees have different responsibilities and skills. Thirdly, managers often

Monday, October 28, 2019

Marijuana research paper Essay Example for Free

Marijuana research paper Essay In today’s society there are a list of many banned drugs which in coincidence are the five most used drugs by most individuals. These drugs are methamphetmine, cocaine heroine, ecstasy and marijuana, out of all five of these drugs one that I believe to be the most scrutinized is marijuana, known also as cannabis. I believe this drug is the most harmless illegal substance in the world, especially when compared to its counterparts. Marijuana not only has the least negative side effects to your body but it is also the only drug that is used in a social, musical, medical and cultural manner. The most popular of all recreational drugs, Cannabis, or Marijuana, Grass, Hemp, Weed, Pot, Hash, Dope or a variety of regional names has been cultivated for thousands of years. Derived in various forms from the Cannabis plants, Cannabis Indica or Cannabis Sativa, is native to central Asia but its cultivation and use is global. It is a Psychoactive and a Psychedelic. It can be smoked as leaves or flower buds, it can be ground down to isolate the crystallized sap and then pressed into a solid, or the resin extracted by collection via contact with the sticky plant parts.(http://listverse.com) This excerpt from listverse.com explains why marijuana use is so commonly used not only in America but across the globe. What makes this drug adorn by many of it users are also the proclaimed â€Å"negative† side effects, constant smoking or overdosing on marijuana results in â€Å"being forgetful, over sleeping, not getting things done, concentration difficulties, neglecting work or duties, loss of balance or dizziness, problems with performing tasks, and nausea (Hammersley, R. and V. Leon, 2006).† These side effects may not be looked too as negative by on the user, especially when compared to its counterparts. An overdose of methamphetamine, cocaine and heroine will almost always lead to â€Å"seizures, coma, and loss of a life† (http://mental-health.emedtv.com) Marijuana is acclaimed by many of its users as the â€Å"ultimate stress reliever† and what better place relieve stress than at college, a place where for four to five days out of the week students are overwhelmed with the stresses that come from the many classes they take. This explains why college is a perfect example of marijuana being used in a social setting where one can obtain the drug in a calm environment with little authority from parents or the police. Through my college experience I have met students who enter college deciding they will never smoke a day in their life, I have also met students who admit they were peer pressured into at least trying the substance and I have met students who have said they tried marijuana out of straight curiosity. In an interview held with a female Old Westbury student, who’s name is preferred not to be mentioned, I asked the student â€Å"how long have you been smoking marijuana?† student replied â€Å"I would consider myself a newcomer to smoking pot, I started this semester.† I then asked â€Å"why did you choose marijuana out of all illegal drugs to use?† she replied â€Å" I honestly choose marijuana because all of my friends were doing it, I saw after smoking many of them would go from uptight to calm and funny, not having a care in the world, I wanted to feel for myself what the â€Å"hype† was and depending on how I reacted to pot would determine if I would continue smoking or not†. My last question before ending the interview was the big one, â€Å"Do you still continue to smoke marijuana†, with a smirk on her face she said â€Å"yes I do, not often like my friends but on Thursday after a long week of homework and classes I smoke one to ease my mind and forget about my tough week, plus it puts me to bed (laughing)†. Marijuana use has and still continues to be a cultivating driving force in the music industry, specifically hip hop. During the 80’s and 90’s many of the great hip hop legends; Dr. Dre, Tupac Shakur and Notorious Biggie Smalls all have been known for there outstanding musical abilities but also for their public habit of smoking or as the street term calls it â€Å"getting high.† Many individuals look at these artist and automatically assume ignorance when in fact when under the influence of marijuana these artist have said some of the most prolific lines in hip hop. Tupac Shakur is quoted saying I believe that everything that you do bad comes back to you. So everything that I do that’s bad, I’m going to suffer from it. But in my mind, I believe what I’m doing is right. So I feel like I’m going to heaven. This quote spoke meant allot to me and Im sure to many young adults that are just like me who live a life of violence and chaos. Often as teenagers we feel that since we are not living the supposedly â€Å"Godly† way that includes attending church regularly, helping other and praying at night that we ourselves don’t hold a place in heaven, that we are the scums of the earth. Lines such as these mentally help us make it through our days and allow us to understand that they are other people out there who are going or have went through our daily struggles. Hearing words like that from your icon, you can only imagine the relief that boy’s and girl’s feel knowing someone who made it out a bad situation was going through exactly what you were, simple words can really make an outstanding difference to an individual. Marijuana in the music industry is not only used through the rappers who say the lyrics but it is used also by the producer’s who come up with the beat and flow, the core of the song that sometimes allows you to feel the music in a way that no rapper may be able to get across. Famous producers such Pharell and rap mogul Dr. Dre are both Grammy winners who make their music while under the influence, the drug puts them in a calming place were their mind can roam and listen to each instruments and bring them together in harmony, yes this task can be done sober but these two producers have made some of the beast beats in the world, it only goes to show once again marijuana is not as self destruction drug as it rivals cocaine or heroine . Medical Cannabis refers to the use of the drug cannabis as a physician-recommended herbal therapy, most notably as an antiemetic. Cannabis has been used for medicinal purposes for approximately 4,000 years. Writings from ancient India confirm that its psychoactive properties were recognized, and doctors used it for a variety of illnesses and ailments. These included a whole host of gastrointestinal disorders, insomnia,  headaches and as a pain reliever frequently used in childbirth.In the 1970s, a synthetic version of THC, the primary active ingredient in cannabis, was synthesized to make the drug Marinol. (Why Is Smoking Cigarettes Bad For You? | LIVESTRONG.COM) Marijuana is yet again used as a beneficial part of our society but instead of the individual users who use it for leisure or to have fun, marijuana is used for the sick and impaired. Known by its correct term as medical marijuana, the drug is used to relieve muscle spams, chronic pain,glaucoma, weight loss(in smoking marijuana one of the few side effect is called â€Å"the munches† during this time the user will crave to want food. People who dont often eat will more than likely have a good portion plate of food or a snack) Aids and Cancer. Having a grandmother who was prescribed marijuana for her excessive swollen feet conditon I personally saw the positive effects the drug had her. Marijuana allowed my grandmother to relax and focus less attention on her feet, being under the influence put my grandmother in a happy place where her pain no longer bothered her as much as it would if she was sober. What she always enjoyed about marijuana was that she could smoke it, coming from the Caribbean’s smoking marijuana was a normal thing, something she had grown accustomed too. She much rather smoke instead of swallowing pills, being old fashioned she thought the side effects of pills would be detrimental to her health. Smoking marijuana has had an impact on the lives of those who suffer from depression and low self esteem. Joan Bello, author of The Benefits of Marijuana: Physical, Psychological Spiritual, is quoted saying; Marijuana will not tolerate repression. Tranquilizers and depressants relax the body and release tension, but the state of mind associated with these drugs is unconsciousness whereby we escape rather than resolve our dilemmas. Alcoholism is an extreme need of both the body and personality sometimes to release the nervousness that has accumulated and continues to build up to an unbearable degree. It serves the same function for the collective personality for the society, as well A culture in which alcohol and tranquilizers are the prevalent form of release prefers not to witness  internal confusion and actually choose to act without conscious participation, maintaining a semi-numb condition. Mr. Bello not only speaks about the positive of marijuana use but he also speaks on how smoking puts you at a better state than one of its many counterparts alcohol, who when under the influence liquor individuals tend to act angry or in rage, marijuana users are always put in a calm statement, which is reason to why after smoking one side effect the user may feel is tiredness. Marijuana usage has not been secluded too only America, it has made a huge cultural impact on the tropical island community, specifically Jamaica. Jamaicans have a subset group of people on the island that participate in a religion known as Rastafri, as Catholics partake in the Eucharist and Muslims participate in Ramadan, the Rastafarian lifestyle usually includes ritual use of marijuana, avoidance of alcohol, the wearing of ones hair in dreadlocks, and vegetarianism. Rastafrains look at marijuana as the hold plant and have scriptures in the bible to prove that they aren’t making it up, Psalm 104:14: He causeth the grass for the cattle and herb for the service of man.† The marijuana or as they call it gangja is also used for social and medical purposes. Marijuana is used primarily during the two main Rastafari rituals: reasonings and nyabingi. The reasoning is an informal gathering at which a small group of Rastas smoke ganja and engage in discussion. The ritual begins when one person lights the pipe, or chalice, and recites a short prayer while all other participants bow their heads. The pipe is then passed around the circle until all of the people have smoked. The reasoning ends when the participants depart one by one. Rasta’s do not condone any other drug beside marijuana because it is the only God given plant, it is not tainted with any human contact unlike alcohol methamphetamine cocaine or heroine. These rastas normally live long healthy lives, which only proves that the drug does not do serious damage to your body. So far they are eighteen legalized marijuana states in the United states. Regardless what the majority may say I believe marijuana has made a positive impact on the world. \. The amount of deaths that occur from smoking cigarets or drinking alcohol is in the millions and yet it is still being used, marijuana has had zero deaths in its history. The next time you see someone high or in the act of smoking think about the pros and cons and then make your decision.

Saturday, October 26, 2019

Book VII of the Nichomachean Ethics by Aristotle Essay -- Aristotle Ni

Book VII of the Nichomachean Ethics by Aristotle Introduction In book seven of the Nicomachean Ethics, Aristotle sets out his theory of akrasia, or weakness of will. Aristotle attempts to explain both how such actions are possible (contra Socrates), and how we can dissolve the puzzles (aporiai) generated by our most important (kurios) commonly held beliefs, which arise in response to the actions of the incontinent person. This paper will review book VII of the Nichomachean Ethics (EN), and attempt to resolve some of the remaining questions left open by Aristotle’s critique. According to Aristotle, ethika is not an exact (akribes) science, for it only provides â€Å"usual† truths (hos epi to polu), or those that are true for most, but not all, cases. Ethics is a practical discipline, which depends on the prudent person to make competent decisions with respect to various particular cases; unsurprisingly, it would be difficult (if not impossible) to determine any invariant rules of application for every ethical situation. Accordingly, Aristotle consults the opinions of the common majority as an initial starting point from which to proceed in ethical study. The beliefs of the hoi polloi are revisable, however, and in the case of incontinence, we shall see that Aristotle cannot resolve all of the puzzles resulting from them. The format of this paper will proceed as follows. First, we will attempt a rough description of Aristotle’s conception of incontinence. Next, we will survey the most salient puzzles with which he is concerned. Subsequently, we will attempt to resolve any remaining questions concerning the plausibility of Aristotle’s theory. Section One Aristotle’s conception of inc... ...ned earlier, we remain convinced that the incontinent knows the entire time that what she does is the wrong thing to do. If we think she doesn’t know, or forgets momentarily, then why is she morally responsible for her wrong-doing? Likewise, Aristotle’s own explanation lacks enough specificity as to why and how the appetite makes one â€Å"unaware† of the good conclusion. Simply put, the ambiguity interpretation is the most plausible way to account for both our pre-theoretical intuitions and our everyday practical experiences. In this respect, it remains true to the spirit of the Nichomachean Ethics. Works Cited Aristotle. Nicomachean Ethics, Translated by Terence Irwin. Second Edition. Indianapolis: Hackett Publishing Company, Inc. 1999. Davidson, Donald. â€Å"How is weakness of the will possible?† in Essays on Actions and Events. Oxford: Clarendon Press. 1980.

Thursday, October 24, 2019

Phillips

Denise Phillips, revised 25 July 2012 Denise Phillips, revised 25 July 2012 Why Hazaras flee: An historical perspective of their persecution1 Submission for the Government’s Expert Panel on Asylum Seekers ______________________________________________________________________________________________________________ Denise Phillips BA (Hons), PhD Candidate, University of New England, 19 July 2012 Quetta are also discussed. The past ethnic and religious animosity against minority Shiite Hazaras continues to drive the bloodshed today. When we shift our esponsibilities offshore, vilify refugees and pursue a punitive style of deterrence as a solution, we ignore these past and present atrocities. Executive summary This paper provides historical information about the source country, Afghanistan. As minority Shiites, Hazaras’ current persecution is borne out of an unresolved, century-old religious and ethnic hatred of them. This has resulted in massacres, dispossession of their lands and decades of institutionalised discrimination. Their persecution was fiercely reignited during the civil war and by the Taliban in the 1990s.Understanding that history is critical to policy-making. Not only are Hazaras dying on boats, but also in Afghanistan and Pakistan. Australia must respond to this over-all crisis with humanity rather than punitive measures. I support the recommendations made in the Asylum Seeker Resource Centre’s submission and the Open Letter. As Afghanistan moves towards a possible Taliban alliance or faces growing lawlessness, and as Hazaras continue to be slain or attacked in Hazara-populated regions and in neighbouring Quetta, Hazaras are likely to continue to flee and have grounds under the 1951 Refugee Convention to fear persecution.Introduction In addressing the problem of asylum seekers risking their lives on boat journeys to Australia, the reasons for their flight should remain at the forefront of policy-making and political debate. I o ffer an historical overview of a key source country, Afghanistan, and of the origins of Hazaras’ persecution. Current crises in both Afghanistan and Abdur Rahman’s subjugation of Hazaras in the nineteenth century After the traditionally dominant Pashtuns and the Tajiks, Hazaras are the third largest ethnic group in Afghanistan, although a minority. The Hazaras traditionally live in theHazarajat, a loosely defined region within the central highlands. While about 85 percent of Afghanistan’s population follow Sunni Islam, most Hazaras are Shiite Muslims, causing them to be condemned as ‘infidels’ at different points throughout history. 2 Their suffering began in earnest in the late 1800s. The Hazaras were a semi- autonomous society living in Afghanistan’s central highlands, the Hazarajat. The entire Hazara population possibly numbered over half a million, with about 340,000 families in the Hazarajat. Although not a cohesive group, most were Shii tes and spoke theHazaragi language, a derivative of Dari. In contrast, their surrounding ethnic groups were mostly Sunni Muslims and spoke Pashto or Dari. 3 Against a backdrop of imperial tensions between Britain and Czarist Russia, Britain helped install an anti-Russian Pashtun, Amir Abdur Rahman (1880-1901), on the throne in Kabul in 1880. In between British India and Russia. 4 exchange for a British annual subsidy, Afghanistan was to provide a buffer zone In the previous century, the Pashtun tribal ruler, Ahmad Shah Durrani (1747-1773), had already established a pattern of subjugating sub-groups and other ethnic groups within he region. To bring Afghanistan’s many different tribes under a centralised authority, Abdur Rahman proclaimed the Durrani Pashtuns as supreme and mobilised Sunni Islam with a patriotic xenophobia. Condemning Shiite Hazaras as ‘infidels’, Rahid Rahman 1 Over-all notes drawn from Denise Phillips, From Afghanistan to Australia: An oral hist ory of loss and hope among Hazara refugees, PhD thesis, University of New England, Armidale (forthcoming); Denise Phillips, ‘Wounded memory of Hazara refugees from Afghanistan: Remembering and forgetting persecution’, History Australia, vol. , no. 2, August 2011, pp. 177-198; and Denise Phillips, ‘Hazaras’ persecution worsens: Will the new government show leadership by lifting the suspension on Afghani asylum claims? ’, Australian Policy and History, August 2010, http://www. aph. org. au/files/articles/hazarasPersecution. htm. 2 William Maley, Security, People Smuggling and Australia's New Afghan Refugees, Working Paper no. 63, p. 8; M. Hassan Kakar, ‘The pacification of the Hazaras’, in M. Hassan Kakar, A Political and Diplomatic History of Afghanistan, 1863-1901, Leiden, 2006, p. 26. 3 Sayed Askar Mousavi, The Hazaras of Afghanistan: An Historical, Cultural, Economic and Political Study, Richmond, 1998, p. 114; Kakar, ‘The pacifi cation of the Hazaras’, pp. 120-122, 126. Amin Saikal, with assistance from Ravan Farhadi & Kirill Nourzhanov, Modern Afghanistan: A History of Struggle and Survival, London, 2004, pp. 6, 7, 12. 4 1 2 Denise Phillips, revised 25 July 2012 Denise Phillips, revised 25 July 2012 rallied soldiers and tribal levies to quash Hazara rebellions in the Afghan-Hazara wars of 1891-1893.Hazaras were slain, raped and sold into slavery. Soldiers piled Hazaras’ heads into towers to warn others against dissent, and some were skinned to death or had their tongues cut out. Although slavery was banned in 1895, many remained enslaved until King Amanullah’s emancipation laws were passed in the 1920s. Much of the Hazarajat was decimated, and their agricultural economy destroyed. Starving, some ate grass and sold their children for wheat to survive. The Hazaras were fined for rebelling and taxed indiscriminately. All facets of Afghani government, society and law conspired against Haza ras, seeking to destroy their property, tribal systems, religion and culture. Rahid Rahman attempted to impose Sunni Islam and demanded that qazis (judges) and muftis (Islamic leaders) in various districts use only Hanafi, a Sunni Islamic legal system, for dealing with Hazaras. To depopulate the Hazarajat, the government issued ‘firmans’, royal decrees, authorising Pashtun nomads, Kuchis, to access Hazaras’ lands for grazing their livestock. Possibly several tens of thousands fled to Central Asia, and Balochistan in what is now Pakistan. Victorious, Rahid Rahman demeaned the Hazaras and claimed that Afghanis saw them as ‘enemies of their country and religion’,7 laying the foundation for a century of persecution to the present. Marginalisation in the twentieth century Successive governments have since marginalised Hazaras. Under the banner of nationalism in the early 1900s, ruling Pashtuns tried to assert their identity, culture and history over all o ther ethnic groups. The Hazarajat was removed from official maps and lands were divided into five provinces to weaken the Hazaras’ political authority.King Nadir Shah (1929-1933) outlawed the promotion of Hazara history and culture, 5 Peter Marsden, Afghanistan: Minorities, Conflict and the Search for Peace, London, 2001, p. 6; Saikal, Modern Afghanistan, pp. 5, 12, 17, 35-39; Kakar, ‘The pacification of the Hazaras’, pp. 120122, 132-137; Burchard Brentjes & Helga Brentjes, Taliban: A Shadow over Afghanistan, Varanasi, 2000, p. 75; Mousavi, The Hazaras of Afghanistan, pp. 101, 120-129, 131-136. 6 Kakar, ‘The pacification of the Hazaras’, pp. 137, 138; Lenard Milich, ‘The Behsud conflicts in Afghanistan: A blueprint to avoid further clashes in 2009 and beyond’, Eurasia Critic, June 2009, pp. , 3, http://www. eurasiacritic. com/articles, accessed 10 June 2010; Alessandro Monsutti, trans. Patrick Camiller, War and Migration: Social Networks and Economic Strategies of the Hazaras of Afghanistan, New York, 2005, p. 105. 7 Mir Munshi Sultan Mahomed Khan (ed. ), The Life of Abdur Rahman, Amir of Afghanistan, with a new introduction by M. E. Yapp, vol. 1, Karachi, 1980 (1900), pp. 276-279, 282-284. imprisoning or executing intellectuals who wrote on the subject. Official policies tried to strip names associated with the Hazaras from historical archives. Between the 1930s nd 1970s, the Anjom-e Tarikh (Historical Society), aided by the Pashto Tolana (Pashto Academy), rewrote much of Afghanistan's official histories. Significant texts were also reportedly burnt. Until 1978, the Hazaras were marginalised, taxed indiscriminately, and denied equal rights and vital infrastructure in their villages. 8 Former president of Afghanistan Dr Najibullah (1986-1992) acknowledged their suffering, saying that ‘the most difficult and lowliest paid jobs, poverty, illiteracy, social and nationalist committed, and bloodshed continues to t his day. discrimination were the lot of the Hazara people’. No justice was gained for atrocities Massacres during the civil war and Taliban regime Hazaras became politically mobilised in the 1980s and have since gained greater political representation. However, their persecution was brutally re-ignited during the civil war by rival ethnic groups and by the Taliban. In 1993, soldiers under command of the Rabbani government (1992-1996) targeted the stronghold of the Hazaras’ political party, the Hizb-e Wahdat, in Afshar, a district in West Kabul with a large Hazara population. Soldiers, however, turned against civilians. After a frenzy of looting, rape killed or remain missing. 10 nd summary executions driven by ethnic hatred, approximately 700-750 Hazaras were Persecution intensified under the Taliban regime (1996-2001) as its soldiers advanced into Afghanistan’s north and the Hazarajat. Not only do Hazaras shun the Islamist beliefs of the Taliban, the Taliban ar e recruited mostly from the Pashtun group, the Hazaras’ traditional enemy. (In reverse, being Pashtun does not automatically equal Taliban support and millions of Pashtuns have also suffered within Afghanistan’s 8 Hafizullah Emadi, ‘The Hazaras and their role in the process of political transformation in Afghanistan’, Central Asian Survey, vol. 6, no. 3, 1997, pp. 363-371; Mousavi, The Hazaras of Afghanistan, pp. 5-8, 155-174, 218; Saikal, Modern Afghanistan, pp. 111-113, 283. Hazaras cite Puta Khazana (The Hidden Treasure), published in 1960, as an example of a controversial or fictitious history funded by the government which promoted Pashtun superiority. 9 Quoted in Mousavi, The Hazaras of Afghanistan, p. 162 10 Mousavi, The Hazaras of Afghanistan, pp. 198, 199; Human Rights Watch, Blood-Stained Hands: Past Atrocities in Kabul and Afghanistan’s Legacy of Impunity, New York, 2005, pp. 70-100. Numbers have never been accurately ascertained.One Haza ra website estimates that approximately 1,000 were killed or remain missing. See ‘Afshar and Kateh Sahe massacre’, Hazara. net, 2009 http://www. hazara. net/taliban/genocide/afshar/afshar. html, accessed 19 June 2010. 3 4 Denise Phillips, revised 25 July 2012 Denise Phillips, revised 25 July 2012 conflicts. ) In 1998, in retaliation for war crimes committed by the United Front (of which Hazaras were a part) against Taliban soldiers, the Taliban slaughtered approximately 2,000 or more Hazaras in Mazar-e Sharif. Civilians were killed in residential areas and market places, some dying with their throats slit.Highlighting the accompanying religious hatred, Taliban governor Mullah Manon Niazi had publicly incited the attack, preaching that, ‘Hazaras are not Muslim. You can kill them. It is not a sin’. Hazaras were reportedly warned to take lessons from their own history, and to either convert, flee or be killed. Hundreds fled the terror of Mazar-e Sharif. Massac res continued, with Taliban soldiers rounding up civilians in the Yakaolang district in 2001, publicly executing at least 170, many of whom were Hazaras. Near Robatak Pass, the Taliban also executed at least 31 civilians, with 26 confirmed to be Hazaras. 1 A resurgent Taliban After more than a decade, American and NATO forces have failed to bring peace and a withdrawal is imminent. Regrouping since 2001, the Taliban is now made up of an alliance of three Islamist groups; the Quetta Shura Taliban, the Haqqani Network, and Hezb-i Islami Gulbuddin, an insurgency described by the US Department of Defence as ‘resilient and evolving’. 12 With safe havens for terrorism in western Pakistan, the insurgency maintains strongholds in southern and eastern regions of Afghanistan, and has been expanding to the west and north. 3 The Taliban’s clear presence in Shinwari district of Parwan province, less than a few hours from Kabul, was demonstrated with news last week of the Tali ban’s execution of a young woman on ‘adultery’ charges. 14 Terror in the Hazarajat Analysts recently deemed Ghazni to be ‘among the most volatile provinces in southern Afghanistan’. 15 In 2006, a former governor was assassinated, and in 2007, the Taliban held 23 South Koreans hostage. Located in Ghazni province is Jaghori, an Hazara- populated district and former home of many Hazara refugees now in Australia. Jaghori nd Hazara-populated Malistan are surrounded by Pashtun areas under Taliban control. In June 2010, the Taliban reportedly distributed ‘nightletters’, a method of intimidation, to districts within Ghazni province, warning that the main road out of Jaghori to Kabul is now closed. Residents need to travel beyond Jaghori for medical, commercial, study and work reasons, but travel is now perilous. Taliban routinely search travellers on the Qarabagh-Jaghori road. Travellers have been tortured, detained and some have gone missing. T heir vehicles have been stolen and the road is periodically closed.Many fear a repeat of the Taliban’s 1997 road blockade of essential supplies. Additionally, Jaghori strongly supports education, with numerous high schools and primary and middle schools. The Taliban, however, have targeted schools. For example, in July 2010, the Taliban attacked and burnt schools in Tamki, Jaghori district, and in Qarabagh district. The Taliban also killed Syed Sekander Muhammadi, the head teacher of a school in Shaki Nuka, in Qarabagh district, as he travelled to Ghazni. 16 In nearby Oruzgan province, the decapitated corpses of 11 Hazara males were iscovered in the Khas Oruzgan district on 25 June 2010. Police official Mohammed Gulab Wardak reported that the Taliban killed them ‘because they were ethnic Hazaras and Shiite Muslims’. 17 This occurred in the very province where Australia’s Defence Personnel have been deployed in a security and reconstruction role, showing th e dire 11 Human Rights Watch, Afghanistan: The Massacre in Mazar-I Sharif, vol, 10, no. 7(C), November 1998, http://www. unhcr. org/refworld/docid/45c9a4b52. html, accessed 18 June 2010; Human Rights Watch, Massacres of Hazaras in Afghanistan, vol. 13, no. (C), February 2001, http://www. hrw. org/legacy/reports/2001/afghanistan/, accessed 18 June 2010; Peter Marsden, Afghanistan: Minorities, Conflict and the Search for Peace, London, 2001, p. 22; Mullah Manon Niazi quoted in ‘On genocide of Hazaras’, Hazara. net, January 2011, http://www. hazara. net/taliban/taliban. html, accessed 18 July 2012. 12 Department of Defense, Progress Toward Security and Stability in Afghanistan: Report to Congress in Accordance with 2008 National Defense Authorisation Act (Section 1230, Public Law 110-181), USA, January 2009, p. 7, http://www. efense/gov/pubs/OCTOBER_1230_FINAL_pdf, accessed 12 August 2010. 13 Maria Golovnina, ‘Factbox: Insurgency in Afghanistan: Who are they? â€℠¢, 25 September 2009, Reuters, http://www. reuters. com/article/idUSTRE58O2F620090925, accessed 12 August 2010. Dylan Welch & Ben Doherty, ‘‘God tells us to finish her’: Taliban remind world they are no spent force’, The Sydney Morning Herald, 10 July 2012, p. 1. 14 threat to Hazaras, even alongside a broader military presence. 15 William Maley, ‘On the position of the Hazara minority in Afghanistan’, 28 June 2010, posted on Welcome to Ataullah’s Page, http://ataullahnaseri. ordpress. com/2010/06/28/on-the-position-of-the-hazara-minority, accessed 5 August 2010. 16 Thomas Ruttig, ‘A new, new Taliban front’, Foreign Policy, 21 June 2010, http://afpak. foreignpolicy. com/posts/2010/06/21/a_new_new_taliban_front_0, accessed 5 August 2012; Ahmed Rashid, Taliban: Militant Islam, Oil and Fundamentalism in Central Asia, New Haven, 2000, p. 67; Abdul Karim Hekmat, ‘Unsafe haven: Hazaras in Afghanistan and Pakistan’, Spe cial report, University of Technology Sydney, October 2011, pp. 18, 19. 17 Tahereh Ghanaati, ‘The Hazara carnage in Afghanistan’, Press TV, 27 June 2010, http://www. resstv. ir/pop/Print/? id=132225, accessed 28 June 2010; Ismail Sameem & Jonathon Burch, ‘Police find 11 beheaded bodies in Afghan South’, 25 June 2010, Reuters, http://www. reuters. com/article/idUSTRE65O2ML20100625, accessed 28 June 2010. 5 6 Denise Phillips, revised 25 July 2012 Denise Phillips, revised 25 July 2012 Hazaras. Although the Taliban denied involvement, Afghani analyst Ahmad Shuja fears In Maidan Wardak province, land disputes between Hazaras and Kuchis often erupt each summer but have worsened in recent years.Kuchis have been arriving in the Behsud and Daimirdad districts heavily armed for conflict. Kuchis believe the aforementioned decrees issued under Abdur Rahman entitle them to access, while many Hazaras have never accepted the loss of full rights over their land. Consequent ly, Hazaras have been killed and their homes burnt. In 2008, approximately 60,000 people were displaced, and in May 2010, a report estimated that 1,800 families had been displaced, 68 homes burnt, and 28 schools closed, leaving10,000 students without school facilities.As nomads, the Kuchi are also a minority group, but belong to the traditionally dominant Pashtun group. It is feared that the Taliban may be exploiting the past to incite attacks by their fellow Pashtuns, the Kuchi, against Hazaras. The Karzai government has either largely ignored repeated Hazara pleas for assistance or has been impotent in stopping the violence, sparking worldwide protests by Hazaras. 18 These crises cannot be dismissed as internal land disputes; rather, they stem from the nineteenth century acts of conquest, dispossession and persecution – and another government’s marginalisation of Hazaras.Terror in Kabul Brutal assaults also have occurred recently in Kabul. On 6 December 2011, a suici de bomber killed at least 56 Shiites pilgrims worshipping at the Abdul Fazal Abbas Shrine in the Murad Khani district in Kabul during commemorations for Ashura, the holiest day of Muharram. On the same day, a bomb attached to a bicycle exploded, killing Shiite pilgrims in Mazar-e Sharif and bringing the death toll to 60. A spokesperson for Lashkar-e Jhangvi (LeJ) claimed responsibility via Radio Free Europe.LeJ, formed in 1996, is a militant Sunni Deobandi Islamist group based in the Punjab region of Pakistan. Among links with numerous terror groups, it has a close relationship with Afghani Taliban and Tehrik-e-Taliban Pakistan (TTP). Most killed and injured were 18 Lenard Milich, ‘The Behsud conflicts in Afghanistan: A blueprint to avoid further clashes in 2009 and beyond’, Eurasia Critic, June 2009, pp. 1-3, http://www. eurasiacritic. com/articles, accessed 10 June 2010; Afghanistan Independent Human Rights Commission, ‘AIHRC grave concern about armed onflict be tween Kochies and native inhabitants of Behsood district of Maidan Wardak’, Kabul Press, 22 May 2010, http://kabulpress. org/my/spip. php? article11725, accessed 9 August 2010; ‘UNAMA silent on Kuchi attack in Behsud’, Hazaristan Times, 21 May 2010, http://hazaristantimes. wordpress. com/2010/05/21/unama-silent-on-Kuchi-attack-in-behsud, accessed 6 August 2010. the attacks will inflame religious tensions, echoing a recent past in which the Taliban massacred thousands of Hazaras. 19 Increasing bloodshed in Quetta, PakistanSince the nineteenth century, Hazaras have traditionally fled or migrated to Quetta, the capital of Balochistan province, in what is now Pakistan. Quetta has long been a ‘second home’ for Hazaras; some live there as permanent Pakistani citizens, others as refugees. Possibly 30,000-50,000 Hazara refugees now live in Pakistan after fleeing the Taliban in 1996. Over the last decade, however, Shiite Hazaras in Balochistan have been dying in an escalating spate of sectarian attacks, often occurring daily. LeJ have distributed leaflets condemning Shiites as ‘infidels’.Proclaiming their right under Islam to kill them, LeJ publicly state that they will continue acting against Shiites. One of its leaders, Milak Ishaque, had 40 murder charges pending against him: after serving 15 years imprisonment he was released on 14 July 2011. Hazaras and the Asian Human Rights Commission report that the Pakistani government, army and law enforcement impunity. 20 authorities are failing to act, openly allowing the banned terror organisation to kill with These are but a few examples in a litany of bloody attacks. Eight Hazaras were slain inPoodgali Chowk in 2001, and 12 Hazara policeman killed in Sariab, in 2003. On 20 September 2011, armed men intercepted a bus in the Ganjidori area of Mastung, southeast of Quetta. It carried 45, mostly Shiite, pilgrims travelling to Taftan, Iran. Ordering them off the bus, gunmen shot t hose identifying themselves as Shiites in the ‘head, chest and abdomen’. Twenty-nine Shiites were killed and five escaped. An hour 19 Ernesto Londono, ‘Dozens dead in rare attack on Shiite mosque in Kabul’, The Washington Post, 6 December 2011, http://www. washingtonpost. om/world/rare-attack-in-kabul-targets-shiitemosque/2011/12/06/gIQAVnEkYO_print, accessed 7 December 2011; ‘Lashkar-e Jhangvi (LeJ)’, Australian National Security, Australian Government, updated 15 March 2012, http://www. ema. gov. au/agd/WWW/nationalsecurity. nsf/Page/What_Governments_are_doing_Listing _of_Terrorism_Organisations_Lashkar_I_Jhangvi, accessed 18 July 2012. 20 Lashkar-e Jhangvi (LeJ)’, Australian National Security; Syed Shoaib Hasan, ‘A year of suffering for Pakistan’s Shias’, BBC News, Balochistan, 6 December 2011, http://www. bbc. co. k/news/worldasia-15928538, accessed 21 January 2012; Hekmat, ‘Unsafe haven’, pp. 20-23; ‘The state of human rights in Pakistan in 2011’, Asian Human Rights Commission, 2011, p. 42, http://www. AHRC-SPR008-2011-HRRptPakistan. pdf, accessed 18 July 2012. 7 8 Denise Phillips, revised 25 July 2012 Denise Phillips, revised 25 July 2012 later, gunmen killed 3 Shiites, believed to be victims’ relatives on their way to retrieve the bodies of their loved ones. LeJ claimed responsibility. 21 On 28 June 2012, a bomb blast killed Shiite pilgrims travelling by bus near a fruit market in the Hazarganji area of Quetta.Thirteen were killed and 30 injured, with most of the victims Hazaras. LeJ again claimed responsibility. Prominent leaders, professionals, intellectuals and policemen have been assassinated, along with a sportsman and artist. For example, Chairman of the Hazara Democratic Party, Hussain Ali Yousofi, was slain on 26 January 2011. The general Hazara population, including women and children, are now also being indiscriminately targeted. Australian Hazar as visiting relatives in Quetta speak of witnessing attacks on Hazara civilians in the streets and of a climate of terror.Abdul Karim Hekmat reports that ‘over 500 Hazaras have been killed and over 1,500 injured as a result of targeted’ attacks in Pakistan since 2003. 22 Other sources cite even higher numbers. Failures of protection and continuing fear Afghanistan’s 2004 Constitution includes exemplary protection for human rights and Hazaras have gained prominent government positions. However, with critical failures to implement the rule of law beyond Kabul – or even maintain it in Kabul – reform has not translated to improved safety for Hazaras in remote villages. Insurgents do not recognise government law.Moreover, Afghani culture is bound up with traditions of governing and maintaining security through tribal and religious consensus, gained at district and community levels rather than through a centralised authority. In December 2009, the Karzai government also gazetted a law giving amnesty to all who committed war crimes in the past two decades of conflict, allowing alleged war criminals from various ethnicities to hold parliamentary positions with impunity. Professor William Maley cautions against ‘tokenism’, arguing that the inclusion of Hazaras within overnment has not brought about real changes. 23 History shows that the 1980s’ reforms which delivered greater equity for Hazaras did not stop the bloodshed which followed in the 1990s and beyond. That this is the sixth constitution since 1923 also exemplifies the fragility of Afghani reforms. Safety for minority groups requires broad social changes to address deeply-rooted tribal, religious and ethnic prejudices – this is something that will take years. The possibility of a Taliban alliance with international support, set against the draw-down of troops, causes terror among many Hazaras. 24In summarising why Hazaras risk their lives on boats, an Hazara refugee says: When the government and law enforcement agencies can’t provide protection, when your house [in Quetta or Afghanistan] is on fire, when your home country becomes hell for you, when you can’t go anywhere without the fear of being killed, when your religion and your facial features make you the easy target. When death is hovering over your head every day, then you don’t have options but to flee, seek refuge, knock at other people’s door for help, sit on a leaky boat, choose a dangerous journey that possibly leads to death.Today the Hazara Shias (boat people, the asylum seekers) are in a state of desperation and struggling for their survival as it is a basic human instinct. 25 Recommendations flee. I therefore make the following comments: Based on the continuing and unresolved history of bloodshed, Hazaras will continue to 1) Given the need for negotiation within a democratic process, I have reflected deeply on the current options being debated. However, we cannot participate in the ‘trade’ of 21 Shehzad Baloch, ‘Sectarian atrocity: 29 killed in Mastung, Quetta ambushes’, The Express Tribune, 21 September 2011, http://tribune. om. pk/story/256419/gunmen-attack-bus-in-balochistan-20killed/? print=true, accessed 22 September 2011. 22 ‘Shia pilgrims bus attacked by a rocket near Quetta, 13 martyred over 30 injured’, Jafria News, 29 June 2012, http://jafrianews. com/2012/06/29/shia-pilgrims-bus-attacked-by-a-rocket-near-quetta-13martyred-over-30-injured/, accessed 16 July 2012; ‘Hazara Shia community on strike over Quetta attacks’, BBC News, Asia, 29 June 2012, http://www. bbc. co. uk/news/world-asia-18640945, accessed 16 July 2012; ‘Blast kills 13, including Shia pilgrims, in Quetta’, Dawn. om, 28 June 2012, http://dawn. com/2012/06/28/eight-including-policeman-killed-in-quetta-blast/, accessed 16 July 2012; Hekmat, ‘Unsafe haven’, p. 22; In formal discussions with Australian Hazaras. 23 William Maley, Radio interview conducted by Geraldine Doogue, ‘Afghan Hazara’, Breakfast, ABC Radio National, 13 April 2010, http://www. abc. net. au/radionational/programs/breakfast/afghanhazara/3039616, accessed 16 June 2010; Una Moore, ‘UN human rights rep in Kabul calls for repeal of war crimes amnesty’, UN Dispatch, 30 March 2010, http://www. undispatch. om/un-human-rightsrep-in-kabul-calls-for-repeal-of-war-crimes-amnesty, accessed 11 June 2010; Department of Defense, Progress Toward Security and Stability in Afghanistan, p. 11; Shahmahmood Miakhel, ‘Understanding Afghanistan: The importance of tribal culture and structure in security and governance’, US Institute of Peace, November 2009, p. 1. 24 Sonya Hepinstall, ‘Holbrooke: Reformed Taliban in Afghan government not wrong’, Thomson Reuters, 6 June 2010, http://in. reuters. com/article/2010/06/07/idINIndia-49088220100607, access ed 18 June 2010. 25 Anonymous Hazara refugee, 29 June 2012. 9 0 Denise Phillips, revised 25 July 2012 human lives with the Malaysian option. I support the principle suggestions made in the Asylum Seeker Resource Centre’s submission and the Open Letter, so will not reiterate their points here. 2) Help educate parliamentarians and the public as to why refugees flee their homelands. Exercise clear leadership in depoliticising the debate. 3) Hazaras tell me they want peace and human rights in their homeland – only then will they stop fleeing. Hazaras have witnessed the brutal deaths of their family members, including fathers, mothers, siblings and children.Flight is accompanied by intense grief, trauma and longing. Waiting years for family reunions will drive loved ones to get on boats. Those left behind in Afghanistan not only face destitution, but are also often brutally targeted by warlords who learn that their husband, son or brother has fled to a Western country. In a recent case, the intimidation of a young Hazara refugee’s family members left in Jaghori resulted in an attack on the family home, killing an eight-monthold baby. I have witnessed refugees’ debilitating distress as they wait years

Wednesday, October 23, 2019

Massively multiplayer online game Essay

Before computer games flourished through the past eras, patintero, sungka, tumbang-preso, tumba-lata, tagu-taguan and sipa were one of the most anticipated outdoor games inside our country. Experiencing these kinds of games imprints almost our half life and we can’t have a complete childhood experience without getting tapped hard on the back, been hit by a flying slipper for it missed the target, playing with shells, screaming and cheering over your teammates, jumping over a person and avoiding getting hit its body part, and hiding and camouflage in a place to prevent from being the ‘it’ of the game. Try asking a child what was his favourite childhood experience, and would tell either scratched his knee from running away from his opponent or been scolded by mother because of going home late due to exceeding allotted time of playing outdoor games. And try asking a child from the present century what he has been doing lately, and might get an answer playing tekken with PSP, or Super Mario or Pacman with Nintendo or Xbox. Difference spotted? When a child is in the climax of playing and been taking the game seriously, he doesn’t want to be disturbed for in some instance might loose on his opponent and can’t advance to the next upgrades. A common reaction received by parents when they call their children to gather around while their kids were busy pressing on joysticks and keyboards and faces were just centimetres away from the screen would be â€Å"Mom! Can’t you wait because I’m already on my way to take down Bowser! † And two probabilities might happen after: either the parents would start screaming and repeat on telling to set aside their loving gadgets or the children would get irritated on the booming loud voices and start stomping away and lock themselves in a room where they could continue praising themselves for they have defeated the ‘boss’ in the game. With the help of advanced technological innovation that has spread around the globe, the beginning of 3D and multi-player online gaming (MMORPG) have surfaced and hooked children the most. Children fell into the gaming world, spending more time in virtual rather than in real, which sooner turns to be their life. Like, children must have a deviant childhood like these; playing computers during their free time and having fun with his co-gamers. They feel like they can play anytime any of the newest released games go on without ending, they continue forever, and they can pick up any character they wanted on the virtual world. If a child started to feel in contact more with gaming, he will spend more time in solitary seclusion. It is difficult for some adolescents (particularly male adolescents) who are vulnerable to the area of prone to video game addiction since it might be transparent to say how popular gaming is in children of all ages, which results to mostly negative results. A report like found in Elyria, Ohio, where a seventeen year-old boy named Daniel Petric shot his parents in the head after they confiscated his copy of ‘Halo 3. ‘ His mother was killed and his father wounded due to the gunshots, and the troubled teen fled the murder scene with solely one item in his possession: the ‘Halo 3’ game (Ridgefield, 2009). A similar report flashed on television says that a child has accidentally killed his playmate, stabbed with a knife after playmate got a higher score on the game Flabby Bird and now been sent under the care of DSWD. Several reports similar to this have rang the ears of the mass since the effect of gaming has become more serious. It all started from playing innocently, never knew slowly by slowly they are being eaten with intoxication of gaming and now swallowed of gaming addiction. Results like killing have been a serious warning to those who are sensationally indulged in playing, but often just ignored. The video games are common to be blamed, which we neglect the fact that some might have done crimes since they are often being neglected by parents. Coming from a single-parent family isn’t a factor, but how a parent sees after his child while growing. Far from my knowledge, it is the duty of the parents to look after their kids when engaged into different aspects of real and virtual life. But most children dare to say that they’ve been controlled over their life, treated like human robots; like told to eat properly, sleep on time, do school assignments and how to spend their time practically. But nobody commands them when they got the chance to get hold of gaming materials, because in there, they call themselves the â€Å"Thug Lords of Gaming†. Fond to their name, with raging adrenaline rush cannot escape the virtual life. Restricting kids from playing won’t help to drive the addiction either, for playing is part of our childhood. The more we drag them away, the more they rebel and really determined into getting along with playing. Personally speaking, life with no play is never fun. Who wouldn’t like to experience playing sipa, tumbang preso, luksong-baka and patintero? Who wouldn’t like to meet a childhood friend? None right? Those might not be similar to the games inside the computer world, but those are the basic foundation of gaming not until the late centuries where video games were invented. With increasing percentage of latter sides of gaming, some parents are over-protective over their kids to the extent that they lock their offsprings into a jail afar from their supposed fun childhood. They never had the chance to have ‘real’ playmates. In some instance, a child who has this experience growing up gathering medals for their parents is the only thing instilled in their minds. On contrary, a child who spent more time in playing grows up quitting almost 70% of his social life. This might lead into several serious effects like having a psychological disorder due to excessive malfunction of the brain. And here’s the tricky and dangerous part: they are the ‘unhappy teenagers’ which later have a growing percentage in the globe. They have lost their confidence in communicating and lowered their self-esteem. They’ve spent all of their time interacting in a virtual world and are extremely uncomfortable when dealing with real people in real time. In order to retrieve the part of them which just got lost, they seek attention from others. Or a probability that they would drive all away from himself and just have a life with the unreal, which might lead to serious killing crimes like what we’ve been fearing to happen. Being a gamer isn’t dangerous. It is having a hard time kicking the habit who’s the real enemy. It is not a dissatisfaction to play computer games, but be careful of getting addicted. Think twice before engaging wholly, for everything that is excessive can cause vicious effects, double the harm we think it would cause to us. We, as being the most users of techno-gaming, are the ones in charge of what might happen when we are drowned in the pool of virtual scenes. And as a gamer, too, playing has just been part of my life. It is just how we balance our time between real and virtual space. Even up to this extent, I would be happy if given a rest time and spending it playing with my favourite computer games and would even dare to challenge my siblings into a multi-player game once again. But my playtime has limits too, and I’m the one who limits myself from the red line before stepping into it. References: Ridgefield, A. (2009). Video Game Addiction. Teen Ink. Retrieved April 23, 2014, from http://www. teenink. com/opinion/movies_music_tv/article/82305/Video-Game-Addiction/.

Tuesday, October 22, 2019

How to Find the Birthplace of Your Immigrant Ancestor

How to Find the Birthplace of Your Immigrant Ancestor Once youve traced your family tree back to the immigrant ancestor, determining his/her birthplace is the key to the next branch in your family tree. Knowing just the country isnt just enough - youll usually have to get down to the town or village level to successfully locate your ancestors records. While it seems a simple enough task, a town name isnt always easy to find. In many records, only the country or possibly county, state, or department of origin were recorded, but not the name of the actual  ancestral town or parish. Even when a place is listed, it may only be the nearby big city, because that was a more recognizable point of reference for people not familiar with the region. The only clue Ive ever found to my 3rd great-grandfathers city/town of origin in Germany, for example, is his tombstone that says he was born in Bremerhaven. But did he really come from the big port city of Bremerhaven? Or is that the port he emigrated from? Was he from a nearby small town, perhaps elsewhere in the city-state of Bremen, or the surrounding state of Niedersachsen (Lower Saxony)? To locate an immigrants town or village of origin you may have to gather clues from numerous sources. Step One: Take Off His Name Tag! Learn everything you can about your immigrant ancestor so that you will be able to identify him in relevant records, and distinguish him from others of the same name. This includes: The immigrants full name including her middle name or maiden name, if applicableA date of birth or the date of another event (marriage, immigration, etc.) with which you may be able to identify your ancestorA place of birth, even if it is just a country of origin for nowThe names of all identifiable relatives parents, spouse, siblings, aunts, uncles, grandparents, cousins, etc. Immigrants often traveled with relatives or went to join one who had previously emigrated. These names will also help you to identify your immigrants family in their country of origin.Any other information that may help identify your ancestor, including religion, occupation, friends, neighbors, etc. Dont forget to ask family members and even distant relatives about your ancestors birthplace. You never know who may have personal knowledge or relevant records in their possession. Step Two: Search National Level Indexes Once youve determined the country of origin, look for a national index to vital or civil registration records (births, deaths, marriages) or a national census or other enumeration for that country in the time period in which your ancestor was born (e.g. civil registration index for England Wales). If such an index exists, this might provide a shortcut to learning your ancestors place of birth. You must, however, have enough identifying information to recognize the immigrant, and many countries do not maintain vital records at the national level. Even if you do locate a particular candidate this way, you will still want to follow the other steps as well to verify that your same name individual in the old country is actually your ancestor. Step Three: Identify Records Which May Include the Place of Birth The next goal in your birthplace quest is to find a record or other source that tells you specifically where to start looking in your ancestors country of origin. While searching, it is important to remember that your ancestors last residence prior to emigration may not necessarily be their place of birth. Look at research already done by others. In many cases, other researchers have already found where the emigrant came from. This includes searching through published indexes and genealogies, local biographies and town histories, and databases of compiled records.Locate original records related to the immigrants death, such as death records, church records, obituaries, cemetery records, and probate records. Obituaries published in ethnic newspapers are the most likely to contain specific information such as a town of origin.Check both civil and church sources for a marriage record and records of the childrens births.Search other types of genealogical records which may reveal an ancestors town of origin, including census records, court records, newspapers, and land and property records.Immigration records such as passenger lists and naturalization records are another important source in the search for an immigrants town of birth. While it may seem a better place to start, you usually ne ed the information found in previous steps to enable you to locate immigration and naturalization records. In the United States, for example, census records may reveal whether an ancestor was naturalized. Search for these records in each place where the immigrant lived, for the complete time period when he or she lived there and for some time after his death. Be sure to investigate available records in all jurisdictions that may have kept records about him or her, including town, parish, county, state, and national authorities. Be thorough in your examination of each record, making note of all identifying details such as the immigrants occupation or the names of neighbors, godparents, and witnesses. Step Four: Cast a Wider Net Sometimes after researching all possible records, you will still be unable to find a record of the home town of your immigrant ancestor. In this case, continue the search in the records of identified family members brother, sister, father, mother, cousin, children, etc. to see if you can find a place name associated with them. For example, my great-grandfather emigrated to the United States from Poland but was never naturalized and left no records of his specific town of origin. The town in which they lived was identified, however, on the naturalization record of his eldest daughter (who was born in Poland). Tip!  Church baptismal records for children of immigrant parents are another resource that can be invaluable in a search for immigrant origins. Many immigrants settled in areas and attended churches with others of their same ethnic and geographic background, with a priest or minister who likely knew the family. Sometimes this means records likely to be more specific than just Germany in recording a place of origin. Step Five: Find it on a Map Identify and verify the place name on a map, something that is not always as easy as it sounds. Often you will find multiple places with the same name, or you may find that the town has changed jurisdictions or even disappeared. It is very important here to correlate with historical maps and other sources of information to be sure that you have identified the correct town.

Monday, October 21, 2019

Fairness And Equality In Ecuador Essays - Free Essays, Term Papers

Fairness And Equality In Ecuador Essays - Free Essays, Term Papers Fairness And Equality In Ecuador Fairness and Equality in Ecuador Ecuador is small country in south America. is situated over Per and beneath Venezuela and Colombia. Its population is 12.500.000. there are different ethnic groups in Ecuador, there is mestizo (mixed Amerindian and Spanish) 55%, Amerindian 25%, Spanish 10%, black 10% (-1-). The predominant religion is Roman Catholicism. 90% of the population knows how to read and write. Ecuador is also very rich in tradition and it has been blessed with tons of natural

Sunday, October 20, 2019

Noble Gas Core - Definition in Chemistry

Noble Gas Core - Definition in Chemistry Noble Gas Core Definition A noble gas core is an abbreviation in an atoms electron configuration where the previous noble gass electron configuration is replaced with the noble gass element symbol in brackets. Writing an electron configuration using the noble gas core can save you a lot of time! Examples Sodium has an electron configuration of: 1s22s2p63s1The previous noble gas on the periodic table is neon with an electron configuration of: 1s22s2p6 If this configuration is replaced by [Ne] in sodiums electron configuration it becomes: [Ne]3s1 This is the noble gas core notation of sodium. With a more complex configuration, the noble gas core becomes even more helpful. Iodine (I) has a standard electron configuration of: 1s22s22p63s23p64s23d104p65s24d105p5 The noble gas prior to iodine on the periodic table is krypton (Kr), which has the electron configuration: 1s22s22p63s23p64s23d104p6 This is the noble gas core for iodine, so the shorthand notation for its electron configuration becomes: [Kr]5s24d105p5

Saturday, October 19, 2019

A reflection on the summer religious course Essay

A reflection on the summer religious course - Essay Example In spite of the fact that the Bible, as well as the works of the saints, was used, this course tries to be objective in order to make sure the students are able to make their decision according to their own views and not some framework that is being forced upon them. That is why this material may be interesting for those who are religious and not religious at all. Why is the course important? There are several reasons why this course is important. First of all, it provides students with a rather in-depth analysis of various texts that they would hardly be able to do. In other words, it shows the level of precision that is rarely achieved by a student while examining various materials that are connected to religion. Furthermore, it allows the students to see who the famous verses from the Old or the New Testament may be interpreted in order to get the correct meaning of them. This, in turn, teaches them to understand the texts of the religious right and develop the require objectivity of their opinion. The next reason why the course in question is important lies in the fact that it offers the different perspective on the same subject. Though Christian sacred texts are used, the course does not take a particular side in the discussion. In other words, it objectively provides the students with the information that can be later used to form their own judgments. Given the precision of the course in question as well as the abundance of the details, it surely should be recommended to the students.

Training & Development of Fire & Rescue Staff Dissertation

Training & Development of Fire & Rescue Staff - Dissertation Example This proves that training evaluation can be influenced by training content and design, observable changes in learners, as well as transfer climate, job performance and end results. As organizations must make sure that their programmes and activities for training are consistent to their requirements, it is of great importance that they carry out a comprehensive assessment of training needs that will identify the job tasks for which training and development is needed. Consequently, they will be able to develop training plans for carrying out the necessary training. Table of Contents Chapter 1 Introduction 4 Research Aims 6 Chapter 2 Review of Related Literature 7 Skills for Justice: An Overview 7 Training Needs Assessment 8 Application of Training 10 Training Evaluation and Effectiveness 12 Training and Motivation 16 Conclusion 18 Chapter 3 Methodology 13 Research Approach 19 Research Design 21 Data Gathering Procedures 21 Ethical Considerations 22 Conclusion 22 Chapter 4 Results and D iscussion 24 Learner Readiness 24 Motivation to Transfer 25 Positive and Negative Personal Outcomes 25 Personal Capacity for Transfer 26 Peer Support 26 Supervisory Support and Sanctions 27 Perceived Content Validity 27 Transfer Design 28 Opportunity to Use 28 Transfer Effort-Performance Expectations 29 Resistance/Openness to Change 29 Performance Self-Efficacy 30 Performance Coaching 30 Analysis 31 Chapter 5 Conclusions and Recommendations 33 Conclusion 33 Recommendations 34 References 35 Chapter 1 Introduction Introduction The significance of providing opportunities for training and development for public sector workers is evident through the implementation of different policies as well as the substantial amount of money that the government invests. For an effective and valuable training system to be provided, its effectiveness should be measured as well (Moats, Chermak, and Dooley 2008). Due to financial constraints, agencies and organisations cannot afford the provision of train ing which are not assessed for its importance or contribution to the accomplishment of organisational goals. Training and development should always be congruent with the organisational mission to achieve long-term objectives (Brinkerhoff 2005). Effectiveness is the main component for training and development in any organisation as it allows workers to acquire and develop the skills and knowledge necessary to successfully perform their tasks. For organisations to initiate efficient training for their workers, it is necessary that such systems are evaluated to determine whether these are consistent with the organisation’s overall strategy; moreover, examining the processes and decisions made to ensure the effectiveness of training is also of great importance (Mitroff 2005). Organisations in the public sector have also spent a considerable amount of money to generate a knowledge-based workforce that can be capable of providing efficient services that the community expects. At pr esent, however, numerous complaints and issues have been aimed toward the public sector’s inefficiency in delivering such services. Hence, the current study focuses on the training programmes of the fire and rescue services and how such activities can create

Friday, October 18, 2019

Critical review of ITS (Intelligent Transport Systems) Essay

Critical review of ITS (Intelligent Transport Systems) - Essay Example Knowing this, world leaders continue to put so much premium on the need to improve the transport systems that exists in their countries. Commonly, world leaders are only channels and instruments for change, such as changes in the transport system without really having the technique knowhow to effect such changes. To make their change dreams realistic, they fall on professionals and experts to make to translate dreams into realities. It is out of such need for there to be a change in the transport system of West Midlands that the current report has been necessitated to propose a workable transport system for the city. As modernity and technological advancement takes the best part of everyday engagement, the transport system that is to be proposed is fused in the model of intelligent transport system, which generally refers to the application of information and communication technologies in the area of road transport and its interface with other modes of transport (Dusan and Gordana, 2 000). A holistic approach shall be taken to the proposal by first identifying needs of travellers and then going ahead to review existing systems before laying bare the proposed system as is reflected in the needs and existing systems. 2.0 Review of Travellers’ Needs Travellers of West Midlands have travelling needs that is manifested in their day to day travelling experience and the common forms of challenges that come out of them. There are a number of specific behavioural studies that have been conducted to identify most of these needs, based on which any workable intelligent transport system must revolve. Some of the core needs of travellers as reflected in behavioural studies are analysed below. Generally, the needs are based on an integrated model, which means that the needs are integrated in such a way that to solve them in a holistic way, an integrated system that attempts to deal with all the problems at a time must be used. 2.1 Easy Access to Services Different citi es have their peculiar transport needs and for West Midlands, one of the worse forms of transport challenge that the city has been found to be faced with the problem of access to transport services (Jean-Francois and Laporte, 2007). Studies have showed that there are a number of reasons that makes this problem, and thus the need for service users to have easy access to transport services emergent. In the first place, the city has been found to be highly dependent on public transport as compared to private transport (Handwerk, 2008). This means that a lot of the people would want to join public bus, train, or use public cargo as against the use of private means of transport. As part of the behavioural or ethnographic characteristics of the people, it has been found that the preference for public transport is generally due to the need on being conservative and economical on the cost of transport (Colorni and Righini, 2001). There have also been a number of public advocacy programs tha t have been aimed at convincing people to choose public transport over private transport as public transport helps in reducing traffic congestion and the rate of carbon emission (Luca, Raffaele and Ukovich, 2006). However as dependence on public transport increased, there seem to have been an imbalance in demand and supply ratio for transport services, as many people and companies find it

CIS 599 Assignment Example | Topics and Well Written Essays - 500 words

CIS 599 - Assignment Example The CIO days as the principal manager are long gone. Currently, both the IT manager and CIO need to be productive business leaders who are conversant with technology. Grasping the strategically aligned organization framework and applying its ideas will assist in releasing the management’s full potential as leaders (Lane, 2011). On covering people, the author’s contributors stress on the relevance of recruiting and collaboration supported by some great notions on talent management and employee development. The chapter on people also contains a vast amount of detail on the CIO role in each section as well as the career needs of the CIO (Lane, 2011). The book brilliantly handles the technology part by focusing on how better to handle the technology folder. Strategies such as assessing an organization IT portfolio effectiveness using on-budget and on-time percentages of projects to correspond with the needs to the actual functionality could be effective performance strategies. Other more efficient implementations of IT portfolio management is to assist the organization to prioritize IT projects so that fewer assets could be managed guaranteeing IT’s placement with maximizing IT investment and business priorities. In terms of compliance, the IT professionals need to be conscious of the compliance need with many different kinds of laws. Definite rules have to be used, and they may need supervisory reporting to agencies that control such compliance. There are different company policies necessary so as to heighten the effectiveness of the company profit making efforts. The book states that in the CIO world there is nothing more important than project quality. If one identifies himself or herself as a quality fanatic, they should put CIO weight behind project quality and adopt some simple strategies that project leaders, quality leaders, PMO, and business partners will gain

Thursday, October 17, 2019

A Person Who Was Nearly Killed After a Heart Attack Research Paper

A Person Who Was Nearly Killed After a Heart Attack - Research Paper Example This essay discusses that many years ago, the patient was already warned by the doctors to watch his diet and maintain a regular exercise. He was advised to be â€Å"careful about his health† and watch his weight because he was already hypertensive and his family (both on the father and mother side) had a long history of having cardiovascular disease and hypertension. The patient was already overweight which indicated that he really had to watch his health. Even his wife which is also a family friend already advised him to at least scale down on his drinking habit and have a change of diet. Still, it was to no avail. The patient was encouraged to do sport or go to the gym or do a leisure swim as a substitute for drinking but it still did not work. Even if he already reached his 40s and had a history of cardiovascular diseases on both sides of his family, he still carried the lifestyle that he had when he was still college. He likes to indulge in fatty foods like pork and high cholesterol beef in addition to junk foods and soda. Even his wife already reminded him to â€Å"slow down† with his eating and drinking habits to no avail. He does not get enough sleep due to his beer binges rendering his immune system weak. Until one day while eating, he suffered a heart attack and it was obviously bad. He just fell from his seat. It was accompanied by a stroke due to his hypertension. It nearly killed him only that he was rushed to the hospital in time. But he was not able to recover from that single heart attack and stroke.... ho attended him explained that the stroke which paralyzed his brain was caused by high blood pressure and heart attack which deprived the brain of oxygen during the attack. Due to the spontaneous heart attacks and stroke that deprived the brain oxygen (caused by heart attack), several blood vessels or nerves in his brain burst. The bursting of the blood vessels left a blood clot lodged within the nerves of his brain that blocked the oxygen from reaching his brain tissues. As a result, his brain tissues deteriorated that instead of recovering, his situation is just getting bad. To date, his physical movement is seriously limited that he has to be on a wheel chair and his speech is now impaired because he can no longer speak clearly. His hearing also deteriorated because we have to yell before he can hear us. But what hurts more than his physical condition is the effect of his sudden paralysis on his family. It was also as if his family was paralyzed. The very first thing that was affe cted was their finances. He was the sole breadwinner in their family and his paralysis rendered him unfit to work and removed the source of income for their family. The only consolation they have is that they were done amortizing their house that they were not thrown out to the streets even if the husband is no longer working. Their savings were literally wiped out with his hospitalization that rendered them bankrupt. They also had to spend for his expensive maintenance medicines. What hurt more is that the wife was forced to work doing some menial jobs that she was not used to. Two of his children has to stopped going to college (the eldest was sophomore in college while the second is a freshman and the youngest was in junior high). They went through turbulent times after that becasue

Homeland Security Essay Example | Topics and Well Written Essays - 750 words

Homeland Security - Essay Example This essay, this reaction paper, will argue that these terms need to be defined very specifically and very deliberately; otherwise, it persists as a vague concept capable of being used as justification for nearly any action. More specifically, this paper will argue that homeland ought to be defined to include a variety of harmonious interests and that security ought to be defined as actions and policies designed to accomplish their objectives with the least amount of intrusion into the affairs of individual states and into the lives of individuals or businesses. As an initial matter, homeland should include a variety of interests; more particularly, it should refer to the nation, the states, and to individuals. There should be no ranking of these homeland types in terms of significance; that means that national interests should not be placed above state interests through this extra-constitutional concept, and that individuals should not be granted a higher status than they are already accorded under traditional notions of constitutional jurisprudence. A framework for allocating powers and rights already exists in the constitution; the mere notion of a recently defined homeland being promulgated in haphazard fashion and zealously guarded sounds forebodingly like an attempt to subvert constitutional principles through non-constitutional means. A great deal has been made about protecting critical homeland sites, such as those related to infrastructure, finance, and military readiness. The homeland also includes lesser constituent parts of the country, such as in Louisiana, which were devastated by the hurricanes recently. There ought to be a uniform approach to defining the homeland, whether is the Pentagon, the Federal Reserve Bank, Louisiana, or Mr. and Mrs. Smith's family farm. My sense, my reaction, is that the homeland portion of the concept prioritizes national aspects while minimizing or ignoring state and individual aspects. This would be a dangerous deviation from the constitutional principles upon which this country was founded; as a result, that would make Homeland Security a direct threat to the system of governance established by the American constitution. In addition, the security aspect of the concept is also vague and seemingly unlimited. Is security meant to be proactive or reactive Is it meant to stifle otherwise protected types of speech and protests in order to prevent some potential negative outcome The Central Intelligence Agency and the American military have traditionally been vested with duties dealing with international affairs. The CIA is no more allowed to spy on American soil than are American soldiers allowed to engage in domestic law enforcement activities. And, yet, as security implies both the gathering of intelligence and the mobilization of physical forces to deter any potential attack, whom else would be involved in maintaining American security if not these organizations This raises troubling issues. Does this notion of security mean

Wednesday, October 16, 2019

A Person Who Was Nearly Killed After a Heart Attack Research Paper

A Person Who Was Nearly Killed After a Heart Attack - Research Paper Example This essay discusses that many years ago, the patient was already warned by the doctors to watch his diet and maintain a regular exercise. He was advised to be â€Å"careful about his health† and watch his weight because he was already hypertensive and his family (both on the father and mother side) had a long history of having cardiovascular disease and hypertension. The patient was already overweight which indicated that he really had to watch his health. Even his wife which is also a family friend already advised him to at least scale down on his drinking habit and have a change of diet. Still, it was to no avail. The patient was encouraged to do sport or go to the gym or do a leisure swim as a substitute for drinking but it still did not work. Even if he already reached his 40s and had a history of cardiovascular diseases on both sides of his family, he still carried the lifestyle that he had when he was still college. He likes to indulge in fatty foods like pork and high cholesterol beef in addition to junk foods and soda. Even his wife already reminded him to â€Å"slow down† with his eating and drinking habits to no avail. He does not get enough sleep due to his beer binges rendering his immune system weak. Until one day while eating, he suffered a heart attack and it was obviously bad. He just fell from his seat. It was accompanied by a stroke due to his hypertension. It nearly killed him only that he was rushed to the hospital in time. But he was not able to recover from that single heart attack and stroke.... ho attended him explained that the stroke which paralyzed his brain was caused by high blood pressure and heart attack which deprived the brain of oxygen during the attack. Due to the spontaneous heart attacks and stroke that deprived the brain oxygen (caused by heart attack), several blood vessels or nerves in his brain burst. The bursting of the blood vessels left a blood clot lodged within the nerves of his brain that blocked the oxygen from reaching his brain tissues. As a result, his brain tissues deteriorated that instead of recovering, his situation is just getting bad. To date, his physical movement is seriously limited that he has to be on a wheel chair and his speech is now impaired because he can no longer speak clearly. His hearing also deteriorated because we have to yell before he can hear us. But what hurts more than his physical condition is the effect of his sudden paralysis on his family. It was also as if his family was paralyzed. The very first thing that was affe cted was their finances. He was the sole breadwinner in their family and his paralysis rendered him unfit to work and removed the source of income for their family. The only consolation they have is that they were done amortizing their house that they were not thrown out to the streets even if the husband is no longer working. Their savings were literally wiped out with his hospitalization that rendered them bankrupt. They also had to spend for his expensive maintenance medicines. What hurt more is that the wife was forced to work doing some menial jobs that she was not used to. Two of his children has to stopped going to college (the eldest was sophomore in college while the second is a freshman and the youngest was in junior high). They went through turbulent times after that becasue

Tuesday, October 15, 2019

Changing role of women in society Assignment Example | Topics and Well Written Essays - 1250 words

Changing role of women in society - Assignment Example Therefore, it is well noted that the role of women has changed a lot since the 1860s based on the efforts of the women with respect to economic, cultural and societal factors. To give an insight of the changing role of women in the society, the author of Little Women, Louisa May Alcott clearly represents the life of women during the 19th Century. It is from her assumptions that the gains, which women have achieved since 1860s can be well depicted. Based on the story composed by Alcott, the novel revolves around the conflicts that emerged between the domestic duties of the women and the need for them to have their own personal growth attributed to the various abilities they possessed. In the cases presented of the four sisters, the character Amy was faced with the challenge of being a dutiful woman and also a professional artist (Alcott 22). This certainly shows that the boundary that was set for the women in the society during the early 19th Century was surpassed. The role and the status of women have gradually changed since the efforts that were set up to change the attitudes that were labelled against them in the society. The most dramatic consequences that were brought about by the industrial revolution in the late 1800s have propelled many economic changes that address the role of women currently in the society (Begun 33). The industrial revolution sparked a lot of changes ever since its inception especially towards the aspects of work and salaries that the women were entitled to in their workplaces. The separation of the domestic duties of the women and their workplace paved ways for women to compete with men for job opportunities. Of course, this did not suit the liking of the men, but there was nothing they could do since times were changing. It is quite obvious that the role of women with regards to employment has faced a number of changes. Women are now entitled to employment

Monday, October 14, 2019

Savannah State Parking Essay Example for Free

Savannah State Parking Essay It’s common for a commuter or resident student to be on campus at Savannah State and not find a parking space. Parking has been a huge issue on campus lately. Nobody appears happy with the rules and regulations for student drivers. â€Å"It’s just not enough parking spaces,† freshman Morgan Walden said. â€Å"They tell us to buy decals, but when we buy them it’s still nowhere to park on this campus. I don’t see the point to spend my money when I don’t get the benefit that it’s supposed to be used for. † There are four different types of parking categories on SSU’s campus; orange for resident, blue for commuter, brown for faculty, and black for reserved. Decals are sold to determine where he or she may park around campus. In between classes I don’t have a place to park my car, and I can’t wait for the bus transportation to pick me up on time,† SSU commuter student Kim Wilson said. She feels like it forces her to park in areas where she may receive a ticket. Many drivers fear the idea of getting their vehicle either ticketed or booted while on campus. More tickets are given in the start of the fall semester, Robert Lemons said. Lemons oversee the writing of tickets and issuing of tire boots on campus. He also stated most tickets are given when students park in a reserved space or on the yellow curb and he alone issues about 10-20 tickets a day himself. Lemons has 3 student officers that work under him. Other schools have different ways of dealing with parking problems, although they also give tickets and boots. â€Å"Early in the morning most of the parking spaces are taken,† Georgia Southern student Kirvin Roberts said. GSU has about five different areas they are allowed to park at on campus. Their parking passes cost $120. They face a limited number of parking spaces like Savannah States which causes students to park in places where they aren’t supposed to. That is how their tickets accumulate. All fines are $30 and if you receive over $100 in tickets their vehicle will be booted. Savannah State is not the only campus that could use more parking spaces. The most recent addition to the campus was adding a new parking lot located where the old tennis courts was positioned. If there were more parking spaces that students were able to park their car, it would reduce the number of tickets giving out on campus on a daily basis.

Sunday, October 13, 2019

Impact Of Security Risks On E Commerce Information Technology Essay

Impact Of Security Risks On E Commerce Information Technology Essay A security risk often can be represented as the event that compromises the assets, operations of an organization. The impact of the security risks is different on different kind of systems depending on the environment in which they are being utilized. That mean the impact on server systems is different to that of the impact on the client systems. Because of its openness and convenience Internet has become the biggest and most important market for people to do business and transactions. The security risks are mainly due to Intruders, viruses, worms, Trojans which have their own impact on the data systems. So here the scope of this research paper covers the security issues and their impact on the e-commerce. This focuses on a risk in case of e-commerce and it is defined as a function by security business professionals and the impact on the systems because of various security threats and vulnerabilities with real time examples and scenarios. These security issues are basically consists of various vicious attacks, these attacks, from a technical view can be sort into some categories; Loss of Confidentiality, Loss of Integrity, Loss of Availability, Loss of Accountability. And there are some threats that affect the computer systems such as; Web Server threats, Database threats, Programming threats, Threats to physical security of Web Servers which also affects the e-commerce. INDEX Introduction Risk in e-commerce Risk as a function Literature review Findings and discussions on typical Impact of risks on e-commerce systems Conclusion References 1.Introduction: With the development of Internet is still on the fast track even after the .COM bubble burst, more and more companies, enterprises especially small and medium size companies came to realize the opportunity that electronic commerce can brought to them. Therefore, they are trying to catch up with those forth goes in this area. In the meantime, quite a lot of companies that are in the leading position of e-commerce implementation are caring more on how to strategically avoid, reduce and manage the potential risks behind the   e-commerce  stage. Here this paper narrates; what is a risk in case of e-commerce? How it is defined as a function by security business professionals? What is the impact on the systems because of various security threats and vulnerabilities with real time examples and scenarios? In early days of using computer systems, most of the systems are standalone and the security was accomplished by the physical controls over the access to the computers. Burglar alarms, alarmed doors, security guards, security badges, cameras allowed the people to the most secured and sensitive areas. The interaction with the systems at that time is very less and its confined to very limited numbers i.e. to enter the data, manipulate it. The network of the systems is also confined to limited number of terminals and the security of it is in the hands of a limited persons. But now the condition has changed extra-ordinarily that millions of people around the globe are able to access to the network at a single moment of time effectively. So as the information from one place is being accessed by someone in another place over the computer networks, the security issue arises. Lots and lots of sensitive information are being accessed over the both private and public networks. So along with the fast growing technology the security threats are also increasing day to day. 2. Risk in e-commerce: What is risk in case of e-commerce? A risk may be defined as a security breach in which there might be a loss or theft of some information or assets containing the secret issues. The E-commerce systems are depending upon internet use, which provides open, flexible and provides a way for easy communications on a global basis. However, may be because of any reason the internet is unregulated, unmanaged and uncontrolled, so it posses many and wide range of risks and threats which in turn will affect with a great impact to the systems operating on it. Anecdotal evidence indicates that the main risks which are associated with e-commerce concern intruders, hackers, viruses, worms and interception of credit card numbers which are passing over the telecommunication lines or channels.  These risks can lead to the events resulting in the deliberate or inadvertent loss of many assets and this deliberate loss of assets can result from disclosing of the information, fraud, and deliberate disruption of service.   3. Risk is a function of three factors: Risk as a function Most of the security professionals will see that risk is a function of three primary factors: threats; vulnerabilities; and their business impact. Combining all these provides a standard formula for the risk that is often used in security and business continuity planning. So, E-commerce has had a big impact on all these three factors. Threats: Threats are naturally increased with the exposure. The more exposed a system is to people or other systems, the greater will be the odds that someone or something or some system will attack that system like Cyber squatting, Eavesdropping, Web Jacking, Denial of service attacks. E-commerce magnifies this exposure of systems by making various business services available via the Internet or other kind of networks and by integrating them with the back-office systems, such as some softwares, mainframes and by using enterprise resource planning software. Vulnerabilities: Vulnerabilities are those which increase with complexity. If the system is more complex, then there would be a greater likelihood of software defects, system defects or configuration defects/flaws that make that system susceptible to compromise. E-commerce increases complexity by promoting the more use of Web services, distributed databases, security zones, multi-tiered applications and other sophisticated technologies. Impact: Here comes the main subject of this research paper, the impact can be of any type-business or personal. Business impact is the one which increases with the business value of the system, as well as the amount or the length of time the system is compromised during an attack. There is some relationship that exists between these-business impact, its value and length of time of attack. The relationship between business impact and its value is almost linear, where as the relationship between business impact and the length of time is very rarely linear i.e. the maximum loss of the information or anything may be incurred instantaneously. For example, consider an attacker may steal the information of 100 credit card numbers and the associated customer profiles very quickly after compromising a banks or financial institutions database server. Here the E-commerce affects the business and its value directly on bottom line. 4. Literature Review: While the concept of e-commerce is no longer be considered as a new concept, an important part of E-commerce which is still relatively new is the issues of security risks that greatly affect the economy of the e-commerce business that directly connects with the customers to sell the products and services. The main trend in the E-commerce is to rely greatly and heavily on the network of computers connecting with all the databases. And they have the ability to provide a connection directly with the customers regardless of location and in the way that builds loyal and trust relationships between a customer and seller. However, it is important to examine a full range of issues related to the e-commerce strategy of the security risks as a way to attempt to connect with customers and increase their revenues. There are issues such as the issue of the impact of the security risks due to viruses, worms, bugs, attacks, frauds around the world, and even the way in which these attacks and frauds on the e-commerce systems affecting the revenue and making the trust of customers towards the business sites to decrease to a great extent. The information about the actual success of e-commerce methods and strategies that are based around business networking and an idea that the customers insight has been reduced because of the ease with which people can communicate will also is examined. In this review of the recent academic literature regarding E-commerce related to the use and impact of security risks and frauds, information about the reduction of customers insight into the commerce websites due to frauds and the impact on E-commerce strategies due to which the revenue is reduced is also reviewed. Even more, with the academic literature that is seen and reviewed, the strategies and variables that are very important for E-commerce companies i.e. how the security risks will affect the revenue and how the customers lost their information due to frauds will also be discussed. 5. Findings and discussions on typical Impact of risks on e-commerce systems: There are various threats to the e-commerce systems: threats posed to files, databases by viruses, Trojans, botnets etc, card payment frauds, malicious attacks from in and out of the business, hacker threats etc. So now we see the findings based on the function of the risks i.e. we see threats like web bugs, active content, integrity threats: Cyber vandalism, spoofing , Necessity threats: denial of service, web server threats, database threats and vulnerabilities and the impact of them on their business and systems. Impact by Trojans, viruses and botnets- Viruses and worms are the computer programs that spread across the computers and networks by making multiple copies of themselves i.e. usually without the knowledge of a computer or system user. A Trojan horse is a type of program which appears to be a legitimate but it actually contains another type of program or block of undesired malicious, infected code, disguised and hidden in a block of the desirable code. It can be used to infect a computer with a virus. A back-door Trojan is a program that allows a remote user or hacker to bypass the normal access controls of a computer and gain unauthorized control over it. Typically, the virus is used to place a back-door Trojan into a computer, and once it is online, the person who sent that Trojan can run programs on the infected computer, access personal files, and modify and upload files. So these merely affect the computer systems which are involved in the transactions, these by installing themse lves into the computers make some mess with the data in it or make it vulnerable for other type of attacks and in case of a Trojan the impact is very high that the attacker can bypass the access to the resources for the unauthorized use. Example: There has been a new wave of malware attack that has started affecting BlackBerry and it has originated from Poland. The aim is to extract banking passwords. So by this the attackers can affect the e-commerce transactions by using the credit card or bank details. A botnet is one of the infected vaults which are a group of infected, remotely-controlled computers. The hacker sends out a virus, Trojan or worm to ordinary computers. These computers can then be used to launch denial of service attacks, distribute spam e-mails and commit click fraud, identity theft and thefts of log-in details and credit card numbers. The impact due to the web bugs makes the user or customer to feel bad about some companies which involve e-commerce. This is because the attackers who attack with web bugs gains the information of the ISPs of the system, so the web bugs are introduced in the e-mails and makes that e-mail address a valid one. Active content is the content which is used by the e-commerce sites to display their items, perform check out tasks and calculate tax and shipping information etc. This active content may include java applets and java scripts. Many websites have the options to control the active content but despite the attacker use this active content to impose their code into the website. By this the attacker can do a mess with the content of the website and can gain some private information about the customers. So the impact is very risky that the users details such as the card details etc can be by passed to other attackers terminal. The impact of the Cyber vandalism is very bad that the customer may get disgusted by the web site presence which in turn makes the customer never come back to this web site thereby decreasing the business of this website. This is because the attacker will replace or defaces the content of the website with his own content such as with porn content. So this cyber vandalism made a serious dent in the customer confidence in internet based e-commerce. This is a type of integrity attack in which the impact is majorly on the information present in the website. Example: When the Internet was new for the home users, the young hackers would gleefully deface websites; they break into corporate, e-commerce computer networks and try to outdo each other at how much mischief they could cause for the corporate networks, looking for fame among their contemporaries.  (Husted, 2011) Spoofing is another type of attack by which many websites are victims and its impact is great on the economy of the e-commerce websites. In this type of attack the perpetrators make use of the loop holes in the DNS servers and make their fictitious website as a real and original website to spoof the website visitors, so when the visitors have submitted their credit card details or any private information the attackers use these details to order the items and make them to ship to other addresses. Even the big e-commerce companies such as Amazon.com, AOL, eBay are the victims of this attack. Example: Recently many of the individuals are getting the e-mails that found to be legitimate from the original e-commerce websites such as Dell, Amazon that these e-mails will encourage the victims to click and submit usernames, passwords and some of their private information like card details, so then boom, they are spoofed i.e. the attackers now use their credit card details and can do all the mess which may be expected. The impact of the Denial of Service on the e-commerce is great that the websites which are attacked with this delay in service cannot handle the requests given by the customers thereby decreasing the sales and commerce. The attackers will keep the central server that handles the request very busy by sending the inappropriate requests. This makes the customers of a particular e-commerce website disgusting and they automatically go for the other competitor website. This can also be seen in the credit card payment gateway in the websites making the customers waiting for longer times and leave the website. Example: On December 8, 2010, a group called anonymous launched a Denial of Service attack on organizations such as  Mastercard.com,  PayPal,  Visa.com  and  Post Finance and made the payment gateways as dead for many hours irritating the customers of many e-commerce websites.( Addley, Esther; Halliday, Josh, 2010) The web servers threats also had a great bad impact on the e-commerce business. Actually the web servers are responsible for delivering the web pages upon the request through http protocols. So here when there are vulnerabilities the attackers will do mess and in affect the e-commerce business degrades. Web servers can compromise the security by prompting the users to enter their usernames and passwords when the user visits multiple pages in the same web servers protected area. The passwords that the user selects can be a threat. They select the simple passwords. If the file containing the private details is compromised, an intruder can enter into the privileged areas, and obtain the usernames and passwords. The database threats also pose a great impact on the e-commerce business. Besides storing the information the database servers also connected to the web servers which contain valuable private information that could damage the whole company irreparably if disclosed or altered. And most of the database servers rely on the username and password security that if compromised can cause a great impact on the whole website. Generally the database that contains the usernames and passwords are encrypted but some of the databases of some companys may not be encrypted, so if the unauthorized users obtain the authorization information then they can masquerade as the original database users and can get the confidential and potential valuable information like bank details etc. Once if the database of a certain company is compromised then the attackers may play with these details that they can use the card details and can buy the things they want in the e-commerce websites and can ship to their addr esses. The impact by Server Root exploits refer to techniques that gain a super user access to the server. This has a very big impact on the e-business because it is the most coveted type of attack and the possibilities are limitless i.e. the attacker can play what he wants. When the attacker attacks a shopper or his personal computer, he can only affect that single individual. But with this kind of root exploit, the attacker can gain control of the merchants, sellers and all the shoppers information that has links with the site. The attacker uses are two main types of root exploits: buffer overflow attacks and executing scripts against a server. The consequences may be very high that the attacker can do a mess with the website. In a buffer overflow attack, the hacker here takes the advantage of a specific type of computer program may be a bug that involves the allocation of storage of information during the program execution. This technique involves tricking of the server into executing a code written by an attacker. The other technique uses the knowledge of scripts that are executed by the server. This step is easily and freely found in the programming guides for the server. The attacker then tries to write the scripts in URL of a browser to retrieve information from his server. This type of technique is frequently used when the attacker is trying to retrieve data from the servers database and after getting he or she may misuse the details of the users who shop through online. This will intern make the customers not to visit the particular site again as they got crapped by it. Example: AS MANY as 9000 New Zealanders may have had their credit card and personal details stolen after a Lush cosmetics website was hacked. This company has urged its online customers in New Zealand and Australia to contact their banks to discuss cancelling their credit cards (Rogers, 2011). In 2007, IC3 Internet Crime and Complaint Center received 219,553 complaints that totaled $239,090,000 in financial losses in the form of assets or in form of theft. The average loss per complaint is around a $1000. C:UsersBharathDesktop2007_ic3report.jpg Source: Internet Crime and Complaint Center 2007 Report 6.Conclusion: This article outlined the key security attacks and impacts in an E-commerce system. The Current technology allows for secure website design. The rise of users identity theft and the fraud that attackers do and it has long been seen as a threat to e-commerce revenue growth. With the complaints of identity theft, loss of private information and phishing attacks on the rise, many customers may shy away from buying goods and services online. It is up to the site developing team to be both proactive and reactive in handling the security threats to reduce the high impact on the e-commerce business, and up to the shopper to be more responsible and vigilant when shopping online.