Thursday, October 31, 2019

Feminism in Women Hollering Creek Essay Example | Topics and Well Written Essays - 1000 words

Feminism in Women Hollering Creek - Essay Example My area of concern is how majority of the characters have the stereotypical outlook towards genders especially the men embodying the machismo while the women are depicted as being weak and also naive. While not belonging to any land whether Mexico or America, the Chicana protagonists intently look out for their identity and this just ends up negatively as their dreams end up shattered with abuse and neglect this is brought out clearly in the text with the emphasis being on how the female generation struggles while at the same time the author brings out the other side of the readers with the tales of the lives of immigrants especially the Mexican immigrants and their personality as a society. My main goal in this paper is to analyze the themes associated with feminism in the story â€Å"Woman Hollering Creek† by Sandra Cisneros. The theme of feminism will be analyzed from the perspective of similarities and differences between the cultures that are displayed by the story. This will be split between into sections with each looking at different aspect of cultures that are presented. Also under this section will be the historical context and a brief preview of the story by the author which depicts how the society is brought out. As the last part, I will be concluding with my thoughts on the story and the themes discussed especially the aspect of feminism and how the Mexican culture has been presented in relation to the women. Woman Hollering Creek The story is the title of the book by the same name; â€Å"Woman Hollering Creek†. It revolves around a Mexican woman by the name Cleofilas Enriqueta DeLeon Hernandez who has a belief she will live ever happily ever after; she marries a man by the name Juan Pedro Martinez Sanchez after her father consents the marriage. Thereafter she leaves her father and her six brothers in Mexico, the couple drive across the border to â€Å"el otro lado†- the other side; a dusty little town called Seguin in Texas. I t is here in Texas that she wants to start a new life as a wife in a ramshackle house but her hopes and aspirations of having a happy marriage are dashed just like the characters she watches in the telenovelas. Across a stream by the name Woman Hollering Creek, Cleofilas finds out that she had left a boring yet peaceful life with the family that she shared (her father and six brothers). All through her marriage with Juan; the relationship is tumultuous as Pedro is unfaithful, abusive and also leaves her in isolation most of the time. Her new life that was supposed to be full of passion like the ones she had seen in the telenovelas becomes â€Å"sadder and sadder† with each episode even though she has a belief that â€Å"when one finds, finally, the great love of one's life, [one] does whatever one can, must do, at whatever the case to protect it†¦Ã¢â‚¬  This results to her being depressed and the same time develops a keen interest she has on her legendary icon on the t elenovelas, la llorona, and the creek that is named after her legendary icon that runs behind her house. However, unlike the â€Å"weeping woman† in the telenovela; who chooses death as a solution and means to escape her unloving husband, Cleofilas in a sense chooses life and this will help in dealing with her problem. With the aid of

Tuesday, October 29, 2019

Police Corruption Essay Essay Example for Free

Police Corruption Essay Essay Police Corruption can be defined as a form of police misconduct in which law enforcement officers break their social contract and abuse their power for personal or department gain. There are three forms of police corruption. These forms are Nonfeasance, which involves failure to perform legal duty, another form is Misfeasance, which is failure to perform legal duty in a proper manner, and the third form is Malfeasance, which is commission of an illegal act. The three explanations of corruption are the â€Å"rotten apples†, â€Å"departmental†, and the other focuses on factors external to the department. An example of these would be an officer might feel unappreciated for their good work and actions and it might make them corruptible. An example of departmental explanation would be if officers feel uncommitted and unsupported, their outlooks and values are reinforced by others in the group which may lead to lack of commitment in their job, thereby leading to corruption. Some police officers may abuse their power because they see themselves as not enforcers of the law, but them as the law itself. The â€Å"blue wall of silence† is a term used in the United States to denote the unwritten rule that exists among officers, where they should not report on a colleague’s misconduct, errors, or crimes. This may impact an officer’s loyalty to their profession because they are not doing their job if they are letting another officer get away with crimes, and if they did report it then they would be breaking their loyalty to fellow cops. It’s important for officers to have a good ethical foundation before they enter into this job because it would help prevent them from doing wrong and abusing their power. In the â€Å"Stopped for Being a Mutt† video, I realized how bad some officers can act sometimes. The teen was stopped and questioned multiple times for looking suspicious, when really they were just racist. They were trying to provoke the teenager to justify an arrest. I feel the form of police corruption they were doing was misfeasance. Stopping someone because of their race, when they weren’t committing any crimes is humiliating to that person and is wrong of any cop to abuse their power in this way. The â€Å"Blue wall of silence† comes up in this type of situation because some other cops  witness it and knows that this goes on when officers have low numbers of stops, and they don’t want to tell because they don’t want to seem disloyal to their fellow police officers. In the â€Å"Los Angeles Police Department† video, they talked about the Rampart and Crash scandal. When I watched this video I was in disbelief that, that many officers were implicated in some form of misconduct. I understand that they wanted to get gangs and crimes off the street but this was no way of going about it. They would shoot or beat people when they were unprovoked. They would steal narcotics and plant false evidence, and frame suspects and cover up all that these officers were doing because it was getting rid of the gangs and â€Å"hoodlums†. I can’t understand how these officers didn’t think what they were doing was wrong and immoral. This form of corruption in this particular situation was malfeasance. What they were doing was illegal, and they are here to protect and obey the law. In the â€Å"Behind the Blue Wall† video. I was extremely shocked to see the police brutality that occurred in these cases. I don’t understand how an officer could deliberately torment a victim because of their race and think they can get away with what they’re doing and that it isn’t wrong. Malfeasance is the form of corruption that comes up in these cases because what they are doing is illegal. The unlawful beatings and shootings of these victims, when they are not provoking the officers; is completely wrong and these cases need to stop. The Blue wall of silence also comes up in these cases because there were officers who knew about what happened and what the other officers were doing and instead of reporting it, they attempted to cover it up. Co-workers should treat those who inform authorities of illegal activity in the police agency the same as how they treated them before they reported corruption. In the virtue ethics perspective, the habit of right desire, he was making the right choice by reporting corruption because he knew that what was going on in the agency wasn’t right and needed to be stopped. Frank Serpico’s response to this case was â€Å"It’s always worth it to be at peace with yourself.† I think this does imply reasoning of ethical thought. I  think Serpico meant that, as long as you feel good with what you are doing, and you are doing what you think is right, then that is all the matters. I agree with this because no matter what happens in the end, it is all worth it if you are at peace and happy with what you did. There are conflicts presented in terms of loyalty and duty. Loyalty is a good to have, but it is not a virtue. If loyalty is treated as a virtue, it can be misguided. It will lead to protection of illegal conduct and can turn into corruption. Officers may want to be loyal to fellow officers and not report what is really going on, however they also want to do their duty, and want to report because it is their duty to not participate in the corruption. The blue wall of silence impacts conflicting loyalty because it is an unwritten rule amongst officers to not report a fellow officer’s mistakes, misconducts, or crimes. This affects them if they want to be loyal to those officers and be loyal to their civic duty as well. If I was an officer in this situation, I would definitely report these crimes. I don’t believe in the blue wall of silence. I think that if an officer is doing something illegal then it needs to be reported and dealt with. Just because they are officers doesn’t mean they should be able to get away with things that they are arresting other citizens for doing.

Sunday, October 27, 2019

Confidence Building Measures India And Pakistan

Confidence Building Measures India And Pakistan Confidence-Building Measures (CBMs) are those steps or agreements on which states agree with mutual benefits in mind, and have faith that all concerned shall obey such agreements. These steps or agreements ultimately develop trust between the signatory states and help in achieving peace and stability in the region.  [1]  Limiting or reducing the level of fear among parties in conflict is essential for building confidence. CBMs aim to lessen anxiety and suspicion by making the parties behaviour more predictable. While a single CBM is unlikely to prevent conflict or contribute to peace building, a series of such agreements can allow for an increased sense of security. In time, such measures may even lead to changed understanding of a countrys security needs.  [2]   Confidence-building has been in vogue and practice for several decades. Its origin can be traced back to the years prior to World War I, to the European practice of inviting observers from different states to witness military exercises and manoeuvres. This practice continued and later emerged as part of the Versailles Treaty for Demilitarisation of the Rhineland.  [3]   CBMs are a worldwide phenomena and their development is more advanced in some regions as compared to others. CBMs are extremely important in the context of the countries, which are suspicious of each other. The United Nations Comprehensive Study on CBMs states that the final objective of CBMs is to strengthen international peace and security and to contribute to the development of confidence, better understanding and more stable relations between nations, thereby creating and improving the conditions for fruitful international cooperation.  [4]   Confidence-building is not a new phenomenon between India and Pakistan. Since the hurried departure of the British from South Asia and the partition, both India and Pakistan have signed many agreements aiming to generate confidence and reduce tensions. Perhaps the most notable among them are, Liaquat-Nehru Pact (1951), Indus Water Treaty (1960), Tashkent Agreement (1966), Rann of Kutch Agreement (1969), Shimla Accord (1972), Salal Dam Agreement (1978), and the establishment of the Joint Commission. With the exception of the Joint Commission, all the others were the products of either a crisis or a war that necessitated a logical end to the preceding developments.  [5]   AIM The aim of this paper is to analyse the performance of CBMs between India and Pakistan and suggest some workable and plausible CBMs that could be experimented by the two countries. CONFIDENCE-BUILDING MEASURES: CONCEPT AND GENESIS Traditional Concept. The traditional concept of CBMs is reflected in the oft-cited definition by Holst and Melander, which states, confidence-building involves the communication of credible evidence of the absence of feared threats by reducing uncertainties and by constraining opportunities for exerting pressure through military activities.  [6]  In a subsequent refinement, Holst described CBMs as arrangements designed to enhance such assurance of mind and belief in the trust worthiness of states and the fact they create.  [7]  Whilst the first definition emphasised only on the need for clarifications of intentions and avoidance of misperceptions, the latter ventures into the realm of the larger appreciation of the constituent of CBMs and envisages them not merely as damage containment measures, but also as principles of healthy relations between states. Genesis. CBMs are essentially a western construct, which entered the realm of international relations in the Conference on Security and Cooperation in Europe (CSCE), at Helsinki. The Helsinki Final Act, 1975 ascribed three basics objectives to the CBMs  [8]  :- To eliminate the causes of tensions. To promote confidence and contribute to stability and security. To reduce the danger of armed conflict arising from misunderstanding or miscalculation. Dictionary of CBMs. Browsing through literature on the development of the concept of CBM, one comes across numerous other related concepts. It is important to understand the meaning of several terms that have come to be used in the diplomatic lexicon, all loosely referred to as CBMs. Their definition and comparative analysis are beyond the scope of this paper. Some of these  [9]  are enumerated below:- Confidence-Building Measures. Conflict-Avoidance Measures. Trust-Building Measures. Conflict-Resolution Measures Confidence and Security Building Measures and Confidence-Building and Security Measures. (f) Tension-Reduction Measures. Steps to Confidence-Building. Despite the upsurge in interest in these terms, there is a considerable confusion about the confidence-building regime, as also, the steps required to achieve it. Each region has its unique peculiarities and, therefore, distinct CBMs. The borrowed experience of other regions is of only a limited value. The steps to military confidence-building are based on two parameters; level of confidence and probability of conflict.  [10]  Diagrammatic representation of the same is placed at Appendix P. CBM Tools. These are modes and means, which help in better communication arrangements and transparency to the action of others or provide ways of giving satisfaction about the action of other states. Communication, constraint, transparency, and verification measures are the primary CBM tools. Few effective CBM tools  [11]  , used the world over, are listed in Appendix A. INDO-PAK CBMs Paradoxes in Pursuing the CBM Modality. Certain unresolved paradoxes, concerning the applicability and viability of CBMs, identified in South Asian region  [12]  are listed below:- CBMs provide the atmospherics for improving inter-state relations. They can establish trust between adversarial states; but the paradox remains that trust is required before CBMs can be negotiated. The need for some limited confidence between adversarial states is, therefore, essential before CBMs can be negotiated. CBMs are difficult to establish, but easy to disrupt and abandon. Continued adherence to them requires adversarial states to perceive the balance of advantage to lie in not abrogating them, particularly during periods of deep crises. CBMs can only be relevant in crises if trust is evident on both sides. They are known to work satisfactorily in times of peace. Hence, the paradox that states may abide by CBMs in normal times, but ignore them in emergency situations. Public declarations can serve as useful CBMs to alleviate tensions and promote stability. The historical record shows that national leaders in India and Pakistan routinely make conciliatory statements, but they are meant either for domestic consumption or to impress international audiences or to lower the others guard. The paradox then emerges, rather than promote security and confidence-building, such declarations have often exacerbated existing regional tensions. Origin of CBMs in Indo-Pak Relations. Meaningful military CBMs in Indo-Pak relations came three decades ago with the establishment of a hotline between the Director General of Military Operations (DGMOs) of both the countries. Subsequently, there have been many military CBMs between both the countries. However, the strategic community and the military were quite often skeptical of both the substance and the process of CBMs and did not support these initially. It was only when Operation Brasstacks in 1986-87 led to serious misunderstandings, and a likely possibility of possible conflict again in 1990, that matters changed somewhat.  [13]   Despite events precipitating increased tensions between the two countries, the effort on the part of both governments has been to ensure that the CBMs continue to remain in place. However, the impressive range of CBMs, both of a military and non-military nature, have been overtaken by events such as the Kargil conflict, the mobilisation of troops in 2002 and the repeated terrorist attacks in India, especially the 26/11 attacks. Major Achievements The CBMs enumerated in the succeeding paragraphs, may be considered as major achievements in the Indo-Pak relations over the last two decades.  [14]   Military CBMs. Agreement on the Prohibition of Attack against Nuclear Installations and Facilities, signed in 1998, and eventually ratified in 1992. This particular exchange has continued for 18 consecutive years. Agreement on Advance Notification on Military Exercises, Manoeuvres and Troop Movements, brought into effect in 1991 and has had an important role to play in the reduction of tensions on both sides of the Line of Control. Agreement on Prevention of Airspace Violations and for Permitting Overflights and Landings by Military Aircrafts, signed in 1991, has significantly reduced costs for both nations, and also brought into being, a structure of redress in case of violations and mutual trust in matters of requirement. Formal ceasefire along the International Border as also the Actual Ground Position Line, brought into effect at midnight of 25 Nov 03, has remained in effect since. Biannual meetings between Indian Border Security Forces and Pakistani Rangers, has been in effect since 2004. Agreement on Advance Notification of Ballistic Missile Tests, in effect since 2005. Establishment of a communication link between Pakistan Maritime Security Agency and Indian Coast Guard in 2005, primarily to facilitate early exchange of information regarding fishermen apprehended for straying into each others waters. The agreement also brought into discussion the possibility of holding joint search and rescue operations and collaborating in marine pollution control. A hotline between DGMOs of both countries had been in effect since 1965, and was most recently used in an unscheduled exchange to discuss troop movements and allay tensions, in the aftermath of the 26/11 attacks in Mumbai. Non-Military CBMs. The predominant CBMs in the non-military domain have been travel measures to increase people-to-people interaction. A few of the important ones, which have more or less withstood the test of times, are enumerated below:- Delhi-Lahore bus service, started in 1999, but ceased in light of the Kargil conflict, was resumed in 2003. Passenger and freight rail services between Attari and Lahore and air linkages were resumed in 2004. The Samjhauta Express was resumed in 2005, and despite the 2007 blasts, has continued to run. Bus service between Srinagar and Muzaffarbad was started in 2005. Bus services from Lahore to Amritsar, Amritsar to Nankana Sahib and train links between Munnabao and Khokhrapar were started in 2006. Night bus service between Ferozepur and Fazikla to Ludhiana-Chandigarh was also resumed the same year. The first overland truck route between the two countries was opened at the Wagah border crossing in 2007. In 2008, triple-entry permit for cross-LoC travel was introduced and the frequency of the Srinagar-Muzaffarabad bus service was increased from fortnightly to weekly. Humanitarian aid was extended by India, in the aftermath of the earthquake in Pakistan in 2005, and again during the floods in Aug 10. A Joint Anti-Terrorism Institutional Mechanism to identify and implement counter-terrorism initiatives and investigations in both countries was brought into effect in 2006. An agreement facilitating regular contact between state-run think tanks, Institute of Defence Studies and Analyses (New Delhi), and Institute of Strategic Studies (Islamabad) was brought into being in 2008, primarily to contribute towards building channels of communication at the level of scholars. The first meeting of a Joint Judicial Committee of judges belonging to both countries, meant to look into the welfare and release of prisoners, was conducted in 2008. More than 500 prisoners have been released by both sides since then. Joint Economic Commissions and Joint Business Councils were reactivated in 2004. Foreign Ministers of both countries agreed to a series of Kashmir-specific CBMs to facilitate crossing the LoC in 2008. Both countries agreed to host festivals displaying each others movies in 2006. The Pakistani Government allowed for the legal release of Indian films in Pakistan in 2008. Major Failures The CBM process has seen its fair share of failures as well. A few notable one are enumerated below  [15]  :- Although there are hotlines connecting both military and political leaders in both countries, they have been scarcely used when required most. The absence of communication has led to suspicions, followed by accusations of the spread of misinformation. While over 70 Kashmir related CBMs have been agreed to in principle, only an inconsiderable percentage of them have actually seen implementation. There is a disproportionate emphasis on military CBMs and an inadequate recognition of several momentous non-military CBMs. Many CBMs, which were originally crafted to address the stabilisation of relations, post the nuclear tests of 1998, have been agreed to in principle, yet have never seen implementation because of the belief that dominant issues need to be resolved before the CBM process can move ahead. In the current scenario, when political will in both states is waxing and waning intermittently, CBMs, which are difficult to establish, but easy to disrupt, have not been fully effective. There is a lack of verifiability in many CBMs, which leads both countries to fall victim to mistrust, suspicion and misinformation, on a variety of issues. Governments on both sides often use CBMs as political tools to win over specific constituencies, which can be very damaging in the long run. Public conciliatory statements, which are meant to be CBMs, can have the opposite effect, if they turn out to be insincere, and worse, if they have been inexpertly drafted, as one saw in the aftermath of the statement issued after the Sharm-el-Sheikh meeting. CBMs have been particularly ineffective, if not absent, during times of conflict, because despite declarations to the effect, neither country has moved beyond the point of conflict-avoidance, towards actual CBMs, and finally, towards strengthening peace. While many hundreds of thousands visit India and Pakistan from across the border, the visa formalities and reporting procedures for them are far from conducive to confidence-building. Prioritising the CBMs General. The existing record of CBMs, world over, is ambiguous. CBMs in some contexts have proved feasible and beneficial, whereas in South Asia, there is a certain disaffection with the very notion of CBMs. The expectation of quick results should be avoided (in Europe, it took over twenty years for the CBM process to become effective). A clear general rule is that once in place, CBMs must be abided by. CBMs, if disregarded and abused, can be worse than none at all. The building of trust requires reliability.  [16]  Certain concerns that need to be addressed by the Indian and Pakistani Governments, in order to maximise the effects of CBMs  [17]  , are listed below:- While CBMs, which focus on improved communication links and people-to-people interaction could create the necessary environment for deeper issues to be tackled, the impact of the CBMs still hinges on political will for their implementation. The hostilities distinguishing Indo-Pak relations are systemic, and further hampered by newer security threats, socio-politico-economic strife and Indias preponderance in the larger South Asian region. Therefore, there is no viable alternative to a gradual and incremental peace process through military and non-military CBMs. There is no need to prefer military over non-military CBMs. Both have their place in the peace process and are needed. Policymakers on both sides need to bear in mind that war, whether of a conventional or proxy nature, will not advance their national interests. Both sides stand to gain both, economically and politically from a stable peace. Future measures catering to conflict-prevention and confidence-building, must provide for more explicit means of arbitrating implementation problems. To this intent, it is imperative that all CBMs be made verifiable and the possible roles that could be played by non-state actors such as the private sector, professional and business organisations etc be examined. It is commonly understood that the term stakeholders would include Indians and Pakistanis in general, and the people of Jammu Kashmir in particular. However, there is a need for more emphasis on the importance of Kashmiris in the CBM process. It is their participation, which would make the process more meaningful. Suggested Workable and Plausible CBMs The escalating situation in Kashmir, the bone of contention between India and Pakistan since 1947, may yet provide a flash point and may induce both countries to come to a negotiating table and opt for quick implementation of enforceable and verifiable CBMs. Few possible, workable and enforceable CBMs, which the two governments could consider, are enumerated in the succeeding paragraphs. Short Term Measures. The composite dialogue process should be restarted and the CBM process must continue unabated. Both the sides should formally recognise that there is no military solution to the Kashmir dispute. Additional CBMs, in consultation with Kashmiri stakeholders, need to be identified to ensure their active participation. The Kashmir specific CBMs could include the following:- Encouraging and initiating intra-Kashmir dialogue on both sides of the LoC on the final status of Kashmir. The resolution of the Kashmir conflict and restoration and development of mutual trust should be treated as interdependent processes. The process of de-escalation of hostilities needs to be initiated and efforts should be made to de-link Kashmir from point-scoring domestic agendas. The hostile domestic propaganda around Kashmir in both electronic and print media needs to be stopped. Relocation of heavy weapons, which are considered a major cause of tension escalation across the LoC. Continuous scheduled and unscheduled visits to forward areas by journalists, representatives of various national and international human rights organisations, diplomats, defence and UN military observers. Visa formalities/registration should provide a more conducive environment in cross-border travel. Rules of engagement along the LOC should be clarified, made public, and adhered to. Measures in the border areas to facilitate the unification of families and access for NGOs. Medium Term Measures. The agreement proscribing attacks on each others nuclear facilities could be extended to identified populations and economic targets. The agreement requiring notification on military exercises et al could be extended to associating military observers with major field exercises. Pakistan should end support of any kind for militancy in the region and address Indias concerns regarding infiltration. Civil society and track II initiatives should be encouraged. This will assist the official level talks between the two countries and move towards a comprehensive resolution of the crisis in the region. Utilising the economic and technological CBMs such as:- Sharing of electrical power. Increasing the trade flows. Promoting railway freight traffic across the border. Improving telecommunication links. Making newspapers from both sides available across the border. Long Term Measures. The redeployment of troops from the Kashmir region has been debated by both governments and should be examined in full practicality. India should begin to engage Pakistani citizens towards sensitising them to the conflict situation and build domestic pressure on Pakistan to strengthen its relations with India. The dichotomy between the maintenance of Jammu Kashmirs independence via Article 370 of the Indian Constitution and the requirement to include the state in the mainstream of Indian politics and society needs to be addressed comprehensively. Utilise South Asian Association for Regional Cooperation (SAARC) for building confidence across the region on the lines of Association of South East Asian Nations (ASEAN). CONCLUSION CBMs are the most used and abused term in the 21st century international relations. They are an expression of respect, goodwill and a measure of transparency signifying at the least, no ill will and no immediate threat. It may lead to a pleasant parlay or, it may merely be an empty gesture meaning nothing at all of substance. They need to be nurtured and incremented from small steps to covering issues of various divergences. The effect of the CBMs between India and Pakistan has been inconsistent and spotty. They are useful instruments in preventing wars and facilitating conflict resolutions. They are a means to an end and that end cannot be achieved if the leaders do not wish to do so. The first step to a conflict resolution is removal of mistrust and suspicion. Only then, can the process of dialogue be unleashed. It is a hard task to popularise the concept of CBMs between the two countries and remove misunderstanding among people about its objectives and application. In order to institutionalise the process of CBMs, it is necessary to create basic awareness among people about the effectiveness and relevance of this concept. The role of institutions in promoting the concept of CBMs is very significant. In a situation when the state, has to a large extent played a role in conflict formations and is responsible for promoting confrontation, non-governmental institutions can play an important role and be of immense use in creating basic trust and confidence between the people of two countries and encourage track II and track III efforts in normalising the relations. We need to follow a proactive approach towards implementation of CBMs. A strong civil society with vibrant political and social institutions can help develop a proactive approach. SAARC can draw some inspiration from ASEANs constructively low-key approach to contentious issues. Balance between military and non-military CBMs is essential for creating conditions of peace. Non-military CBMs such as water, environment, trade, culture, media and technology can certainly make things easier for sustaining the dialogue process between the antagonistic parties. It would be foolish to expect miracles from CBMs overnight. It took a considerable amount of time for the CBMs to be effective in Europe. However, the need for India and Pakistan to negotiate CBMs is both immediate and vital. Structural factors are important and have undoubtedly retarded the establishment of CBMs in South Asia. Nevertheless, CBMs can become the harbingers of peace and stability in the region. History reveals they have usually been negotiated following serious bilateral crises and/or mounting of external pressures. However, not until the communal stronghold is attacked and reduced, and the two countries, therefore, start behaving as two established and responsible entities, would CBMs have much of a chance to succeed. Wellington (Hitesh Goel) Sep 10 Cdr Total number of words: 3723 Appendix A (Refers to Para 10) CONFIDENCE-BUILDING TOOLS Hotlines. Hotlines, such as those that exist between the United States and Russia, and between Indian and Pakistani sector commanders along the line-of-control in Kashmir, can provide reliable direct channels of communication at moments of crisis. Regional Communication Centres. These centres can assist area states in conflict and crisis management. The European model of a communications and security centre, established by the Conference on Security and Cooperation in Europe (CSCE), is being adapted to suit the Middle Eastern security environment. Consultations. Regularly scheduled consultations, like the annual meetings established between US and Soviet/Russian navies by the 1972 Incidents at Sea Agreement (INCSEA), or those between Chiefs of Staff of the armed forces of Argentina, Brazil, Chile, Paraguay, and Uruguay, can provide rare opportunity for direct military-to-military contact. Such forums allow parties to voice concerns and air any grievances they may have. Constraint Measures. These measures are designed to keep certain types and levels of states military forces at a distance from one another, especially along borders. Thin-Out Zones. Thin-out zones, or limited force deployment zones, restrict the type and number of military equipment or troops permitted in or near a certain territory or boundary. Detailed provisions of the 1975 Disengagement Agreement between Syria and Israel established a demilitarised zone (DMZ) as well as an area extending 20 kilometres on each side of the DMZ in which forces and weapons were limited. Pre-Notification. Pre-notification requirements included in the Stockholm Accord of 1986 placed constraints on military exercises by imposing longer lead times, 42 days for major military exercises and 1-2 years in the case of larger scale exercises, before activities subject to prior notification could occur. Pre-notification requirements of a certain time-period for planned military exercises or troop movements of an agreed upon level also help make a states military intent more transparent. Notification mechanisms can also be applied to missile tests. Near contentious borders, this type of transparency measure can help eliminate fears that an exercise may be part of preparations for war. Transparency Measures. They are measures that states engage in to foster greater openness of their military capabilities and activities. Transparency measures merit a special focus as important first steps in the confidence-building process. Exchange of Data. Data exchanges detailing existing military holdings, planned purchases, military personnel and budgets can clarify a states current and projected military capabilities and provide advance notice of destabilising arms build-ups. Data exchanges can take place bilaterally or multilaterally. Military Observers. Voluntary observations of another states military exercises provide first-hand access to that partys equipment and operating procedures. Verification. Verification measures are designed to collect data or provide first hand access in order to confirm or verify a states compliance with a particular treaty or agreement. Aerial Inspections. These enable parties to an agreement to monitor compliance with force deployment limitations in restricted zones, to confirm data exchanges on the disposition of military forces, and to provide early warning of potentially destabilising activities. Electronic Sensors. Ground-based electronic sensor systems, manned or unmanned, can also verify states compliance to agreed restrictions on equipment deployment or troop movements. On-site Inspections. On-site inspections, challenge and routine, can help verify that states are complying with agreements. Inspections may be carried out by third parties, opposing parties, or jointly. Appendix P (Refers to Para 9) STEPS TO CONFIDENCE BUILDING HIGH LEVEL OF CONFIDENCE CONFIDENCE SECURITY BUILDING MEASURES CONFIDENCE BUILDING MEASURES LOW LOW HIGH PROBABILITY OF CONFLICT TRUST BUILDING MEASURES CONFLICT AVOIDANCE MEASURES CONFLICT RESOLUTION MEASURES

Friday, October 25, 2019

Comparing Utilitarianism and the Judeo-Christian Ethic Essay -- John

Utilitarianism is the ethical doctrine which essentially states that which is good is that which brings about the most happiness to the most people. John Stuart Mill believed that the decisions we make should always benefit the most people as much as possible regardless of the consequences to the minority or even yourself. He would say all that matters in the decision of right versus wrong is the amount of happiness produced by the consequences. In the decisions we make Mill would say that we need to weigh the outcomes and make our decision based on that outcome that benefits the majority. For Mill, pleasure is the only desirable consequence of our decisions or actions. The Judeo-Christian ethic embraced by Augustine places questions of right and wrong under the authority of a divine creator - God. The Judeo-Christian ethic can be summed up in one word - Love. In Matthew 22:40 Jesus says: 'Love the Lord your God with all your heart and with all your soul and with all your mind. This is the first and greatest commandment. And the second is like it: Love you neighbor as yourself.'; When Augustine said, 'Love God and do what you will';, I believe he is asserting the fact that when a person loves God truly he or she is in God's will. John 14:15 says, 'If you love me, you will obey what I command.'; If a person obeys God which is loving God and loving his creation then a person is in his will. The decisions made by a person in God's will are thus ethical decision in view of ...

Thursday, October 24, 2019

Macbeth: The Bloodbath Essay

Macbeth is by far the bloodiest of William Shakespeare’s plays. It begins with a civil war battle between the Scottish and Norwegian army, where Macbeth embodies his heroic and courageous figure. However, Macbeth eventually transforms into a villain, who murders the innocent with a lust for power. For the most part, blood is symbolic of violence and destruction. The frequent repetition of this imagery represents the murder, and the emotion following the murder, which is guilt. Shakespeare uses imagery of blood throughout the play to exemplify and express the guilt of Macbeth and Lady Macbeth after their deeds. After each murder, the act of guilt and regret increases. However, Macbeth soon accepts the fact that he will never be the same after murdering Duncan, which hardens him. Since he will never be the good captain he was at the civil war, he goes on killing left and right. Shakespeare’s nuance use of blood imagery traces Macbeth’s moral transformation from goo d to evil. Though Macbeth is known as an evil figure throughout the play, him as the heroic captain towards the beginning exemplifies the good character he could have been. During the civil war, Macbeth is known as a wounded captain who performs an action that is unlike him through the rest of the book. After Macbeth completes his good deed, he says, â€Å"For brave Macbeth (well he deserves that name), / Disdaining Fortune, with his brandished steel, / Which smoked with bloody execution† (1.2.18-20). Macbeth has killed Macdonwald, a leader of the Norwegian forces fighting the Scottish. The blood that pours out of Macdonwald’s flesh represents good blood. The murder is for the sake of Scotland, which brings peace and victory. As a result of victory, Macbeth is given a new title: â€Å"Go, pronounce his present / death, / And with his former title greet Macbeth† (1.3.74-6). Duncan has given the title of Thane of Cawdor to Macbeth. However, this victory is very much the begin ning of Macbeth’s downfall because of his gradual lust for power. Although guilt and regret express Macbeth’s concern for the deeds he has done, he soon accepts the fact that he will never be the same after Duncan’s murder. The good blood that is shed after the murder of Macdonwald is the only good blood in the play. After Macbeth murders Duncan, he begins to realize that he will never be the same, â€Å"Will all great Neptune’s ocean wash this blood / Clean from my hand? No, this my hand will rather / The multitudinous seas incarnadine† (2.2.78-80). The blood imagery represents his life changing forever because the blood of Duncan (the murder) will never go away. Not even Neptune, the God of the sea can wash it away. This murder is used for only Macbeth’s benefit, which sheds bad blood. In addition, the blood imagery also epitomizes the guilt and regret that follows the murder. Macbeth has now dug himself in a hole that is nearly impossible to get out. After the death of Banquo, there are a series of times where Macbeth meets the ghost of Banquo. Once Macbeth sees him for the second time, he says, â€Å"I am in blood / Stepped in so far that, should I wade no more, / Returning were as tedious as go o’er† (3.4.168-170). Macbeth says that he might as well continue killing because he has nothing to lose. It is like he is an evil, immortal killing machine that will not stop. He has already killed Duncan, Banquo, and will soon kill the family of Macduff. Moreover, Macbeth is regretting his crimes because he thinks about returning to his old self. Though Macbeth seems to love Lady Macbeth unconditionally, blood and murder has brainwashed him so much, that her death does not even faze him. Lady Macbeth is the reason for the start of Macbeth’s downfall. Furthermore, she brainwashed, taunted, and persuaded him to kill Duncan, which led to his collapse. After Macbeth hears about the cry of his woman, he says, â€Å"I have supped full with horrors, / Direness, familiar to my slaughterhouse thoughts, / Cannot once s tart me† (5.5.15-17). Macbeth exemplifies his decline and is not bothered by this cry because he has experienced his own bloody terrors. Murder and blood has scarred his life forever, ruining his relationship with his wife. During the final face off between Macbeth and Macduff, Macbeth says, â€Å"But get thee back. My soul is too much charged / With blood of thine already† (5.8.6-7). The blood imagery represents each and every one of his murders in the past. Furthermore, Macbeth admits his burdens to Macduff and is reluctant to fight him. Macbeth  is conscious that he has already killed his family and is sure of killing him too if they fight. As a result, Macbeth is the one drowning in his own blood by the blade of Macduff. Shakespeare uses blood imagery to ultimately stress the overwhelming guilt and regret that Macbeth feels after each murder. It is like a reminder of the wicked crimes that have been committed. In addition, blood imagery guides the reader through Macbeth’s path and transformation from good to evil and his downfall. Blood and murder blind Macbeth from what is and was most important to him at the start; Lady Macbeth. It is almost as if his life tarnished and is meaningless as more blood piles on throughout the play. After Duncan’s death, his mind revolves solely around his lust for power, which leads to his downfall.

Wednesday, October 23, 2019

Oliver Twist- Development Phase Essay

In our drama class, our teacher Mrs. Oteng had asked us to develop on our performance of Oliver Twist. We had previously performed the response phase which was a role play with the main scenes of the novel by Charles Dickens. In the topic of crime in society, in which we were covering, the novel of ‘Oliver Twist’ had allowed the class to have an insight of crime in the olden periods compared to today. By seeing the angle in both perspectives, it allowed the class to realise the consequences today and before and how crime affected lives. The development phase was all based on developing the performance with the use of light, props, tone, levels and music. The change in the play would allow the audience to see how these strategies changed the emotion in a play and how it bought life to it. The people who I decided to work with were Vishna, Daanish and Moshgan. We worked well together and everyone in the group had imaginative ideas. With the idea of bringing out a different side to each character we enhanced the performance by taking on the role of just a few of the characters and showing a complete opposite to what they are really like. Bill Sikes was played by Daanish in the first scene. He played the usual murderer who killed without mercy and who never looked back. However, I played a homosexual and sensitive Bill Sikes who was the complete opposite to him. In this case I was his conscience and I was playing the same way he was but in my own version. This allowed the audience to see what a different personality of Bill would have done to the real play of Oliver Twist. Similarly, Vishna played Nancy as the gentle and kind-hearted woman we knew, while Moshgan played the cold-hearted, stuck-up complete opposite to the real character to Nancy. By doing this we could keep to the same storyline but we allowed the audience to see what it was like if the characters had a little change in their personality. We also focused on the relationship between Nancy and Bill Sikes. In the novel, they had a loveless and tactless relationship, while in our play we took it from the real angle and in a real, loving relationship. This created a contrast in the play which allowed the audience to see both perspectives. This was the aim of our play and I believe the audience easily understood that. I believe that our group did extremely well and the audience enjoyed it. It was one of the most complicated plays to put together because of the changes in the scenes and the change of characters as a group. However, the use of props allowed each of the characters to be distinguished easily and the audience understood who each one of us was; more efficiently. I wore a tight shirt, which showed my homosexual character and the way in which I was holding my body was convincing. Daanish wore a puffy jacket which showed his authority and toughness. Moshgan wore a tight pink top which showed of her body which showed that she was a prostitute while Vishna wore neutral clothes which did not need to reveal much. The use of props really helped to enhance our drama. Towards the end of our drama, Mrs. Oteng played a piece of sad and somber music which really enhanced our drama when Nancy was getting beaten by Bill Sikes which lead to her death. The music made the audience feel more connected to the drama and the music added emotion to the drama and bought sympathy for Vishna’s character. We did not use light in our performance as we found it was unnecessary. However, we used different tones in our voices’ and we used different levels on stage and even off stage. We used the explorative strategies well enough for top marks. On a whole, our class had many individual thought-tracks which showed how I characters felt which was equally as important. My thought-tracks were very comedic which made the audience laugh after all the violence and upsetting scenes which were to follow. By saying things like, ‘I shave the hairs on my chest’, made the audience laugh. I believe that a little humour would ease the audience a little bit and that is why I was the only comedic character as we had to keep to the topic of crime. Under the topic of ‘Crime in Society’, I believe that our play showed domestic violence the most and this was our main focus. Domestic violence occurs a lot in today’s society but also in the olden days. The points we were conveying were that it was as bad then, then as today. On a whole, I was pleased with my group’s performance and I enjoyed working with them. I was now told to observe another groups performance and comment on the way in which they developed their drama. The group that I decided to observe was with Louise, Mohammed, Aiman, Sumhar, Anthony and Maya. This group had six people and I believed that they worked very well together to come up with a performance which included everybody. They changed Sumhar’s role as ‘Oliver Twist’ to Olivia Twist. Each character kept in role and they used the drama equally as well. Each of the character’s thought-tracked and they used levels and tones in their voices to enhance their drama. Their play was based on the scene where Olivia gets kidnapped by Fagin and Bill Sikes for Nancy’s pleasure. Nancy played by Maya had also changed her role from being a nice, kind-hearted woman to a frail, evil woman. This was similar to our group’s idea and this was effective as only one of the characters had changed personality. I loved watching this performance, each c haracter was in role and I understood the storyline very well. The aspect of Crime in Society in this play was based on kidnappings, people owing money, poverty and how this all leads to deaths in society. On a whole, I believe that by developing the play of ‘Oliver Twist’, I learnt the consequences of crime in the olden days. I t also taught me how to enhance a play by taking a simple idea from a particular scene and by working on it to show the audience something they might not have realised or understood as much. I enjoyed working on the development phase and I believe that by developing the performance we encounter more. I would like to work on developing a performance in the future and I liked this part of the workshop the most.

Tuesday, October 22, 2019

Lewinsky Vs. Clinton Essays - Lewinsky Scandal, Monica Lewinsky

Lewinsky Vs. Clinton Essays - Lewinsky Scandal, Monica Lewinsky Lewinsky Vs. Clinton Perhaps the biggest presidential scandal since the Nixon administration came to light in January 1998. This is when the now infamous Monica Lewinsky first appeared on our television sets. The American population did not know Ms. Lewinsky until the scandal broke. After the media was informed of the activities between President Clinton and Monica Lewinsky the little known woman was instantaneously the topic of conversation all over the world. The intention of this paper is not to figure out who was right or wrong in the scandal, the reasoning behind it is to show how the mass media shapes and implements our own ideas and opinions about people. Every opinion we have is somehow related to who and what we see around us. The way that these things are portrayed on television or in magazines influences our overall attitude towards them. In many situations we have only the media to rely on when learning about certain events. Sometimes you can check more than one source to get a different opin ion, but more times than not the overall image generated by all media platforms of a person or event is very similar. In this sense it is very hard sometimes to get a fair perspective of the occurrences. The views that the American public has towards Bill Clinton and Monica Lewinsky have been directly affected by how the mass media portrayed each individual. Susan Douglas book Where The Girls Are is a reflection of just how controlling the mass media is over the opinions and ideas of the people that it reaches. Douglas talks about the ways in which the mass media forms an individuals character. She focuses on the effects that the media has on women as they grow-up in America. If this is true then perhaps Monica Lewinsky was shaped in such a way that she felt obligated to give in to the presidents wishes of having a relationship. After the scandal broke the media then proceeded to shape the publics opinion of Ms. Lewinsky. It is very easy for our opinions to be swayed if we know nothing about the subject or individual. One place that is near impossible to hide from the public and media is the White House. Bill Clinton has been plagued by scandal since entering the White House in 1992. As the Lewinsky scandal began President Clinton was just recovering from the Whitewater scandal. Before Lewinsky, Clinton was accused of having a sexual relationship with Gennifer Flowers while he was the governor of Arkansas. Clinton denied these reports during his 1992 campaign. However, in a deposition a few years later the president admitted to having an affair with Flowers. Paula Jones who worked for him while he was governor also sued Clinton. Jones disputed that Clinton treated her unfairly after she refused to have a sexual relationship with him. Despite these repeated scandals Mr. Clinton has maintained a fairly supportive reaction from the mainstream media. I strongly feel that Clintons lack of accountability is due to the fact that most of the scandals that he has been involved in pertain to sexual relation ships with women. The male dominated media portrays this in a lighthearted way. On the other hand, the females involved in all of these scandals have been made out to be unjust sluts looking for a big payday. Contradictory to Clintons past is that of Monica Lewinsky. Monica grew up in Beverly Hills California. Her father owned a chain of cancer treatment clinics. When researching the depictions that those close to Ms. Lewinsky have, a very different person is revealed. Monica is very, very energetic and very charismatic and has tremendous ideas and no matter what task you give her, she gets involved and goes to it, said her dad, Dr. Bernard Lewinsky. Richard Makoff, Lewinsky's former headmaster, said, I remember her being a nice kid and pretty normal young lady. The only extra-curricular activity she was involved in was chorus. Monica graduated from Lewis and Clark College in Portland, Oregon in May 1995. The following summer, Monica arrived at the White House as an intern (Aiken). The media has shown Monica Lewinsky in a totally different light than her father and

Monday, October 21, 2019

Ethnography Research Paper Conducted at Local Mall McDonalds

Ethnography Research Paper Conducted at Local Mall McDonalds Free Online Research Papers Ethnography Research Paper Conducted at Local Mall McDonalds The ethnography research that I studied took place at the food court. I visited the McDonalds stall in the food court of Pacific Fair Mall on a Saturday at around 1pm. Pacific Fair is the biggest shopping mall in Gold coast, Australia. The food court is located in the first level of the mall. The first level was roofed with some kind of translucent material so that sunlight can come in to the mall; also, it can thwart the customers from rain, especially during the winter. In a square shaped area, the stalls were to be found on the sides leaving a big space in the middle, where, large number of tables and chairs were placed. When alls said and done, it created a cozy feel for the customers. The food court comprises of more than 25 individual stalls, from coffee shops to proper cuisine. The shoppers had a wide range of food variety to choose. Some of the stalls are self service and the others were served by food runners (waiters). There was a lot of running around and quick moves between the counter and the kitchen. Most of them working in the stalls appeared to be younger than eighteen years of old. The reason for young staffs could be, less pay per hour. I was amazed by the fact, most of them wearing black trousers as their uniform, but, the shirt differ from stall to stall. Apart from this, there were people working in blue clothing, looked a little elderly, were cleaning the tables with left over food and the wrapping papers. It was a late Saturday afternoon and the food court was filled with people off all ages, there were families with kids, couples, individuals and teenage groups. I could see different races of people, Asian to African. It is easier to assume people with their cameras clicking some pictures are tourists. Apart from that I could see people of different race speaking Australian lingo, for instance, â€Å"no might (mate)†, â€Å"woudcha? (would you)†. These people could be the migrants to Australia and made Australia a multi-cultural destination. Out of the whole crowd I noticed this group of friends who were loud in laughing and cracking jokes. They got seated before they could order food; I guess this was to ensure a seat due to the increasing crowd. The group was between the age group of 15-16 years old. I was seated between them and the counter, which made it very easy for me to hear their conversation at both ends. The group consisted of three boys and two girls. Out of which, one of the guys was loud and cracking jokes and the other two were listening to him, out of the girls one was listening to the first guy’s comments and the other one was meddling with her hand bag and finally removed a Mobil phone, probably checking her message she must have received on it. This is one difference I have noticed between the two sexes everywhere. No matter how big or small a Mobile phone is, men always carry it in their pant pockets where as women always use their hand bags. The boys were dressed sporty. Two among the three were wearing cap and the other guy was blonde. The third guy had a good hair-style. Among the three, two were wearing t-shirts (Billabong) and the other one was wearing a white colored vest. All the three were wearing surf shorts. And to my greatest surprise two guys were not wearing any shoes. And the other one was wearing flip-flops. Among the two, one girl was wearing a tight top and a short denim skirt. And the other one was wearing sleeveless top and a surf shorts. Both the girls were wearing caps. I was surprised because according to the country where I come from, going places with out shoes is considered as indecent. Also in a big shopping mall it is impossible to find one person without shoes. From their dress code we can assume two points: typical summer clothing and they belong to the popular culture, the surf culture. As soon as after they got their seats, both the girls sat back and the guys got up to take their food orders. In most countries and even the one I come from India i.e. when there is a group of girls and boys the girls rarely get up to order their own food. Most of the boys make use of this opportunity to show their graciousness. The group spent a lot of time looking at the menu board which had the list of the different kind of burgers. After much discussion among each other the boys ordered their food. The girls got a small burger and a salad respectively, but, the guys grabbed the Big Macs. Well this reminded me of a Jack Nicholson movie, in which he positively passes a statement saying women never eat on dates. In agreement to that I can not remember ever noticing a girl eating more than the guy on the table. Every one in the group got a drink as well. I guess which an indication of the increasing heat is. The conversations began to flow again and this time they were talking about the food they had ordered. The boys exchanged bites of each others burgers and took comparatively larger bites. After each one of them started eating their meals the conversation grew less among the guy but the women continued to whisper and mutter words among each other. The boys just quickly ate through their food. Where as, the girl who was eating the smaller burger took really small bites and had longer intervals between them. The girl who ordered the salad plate kept on playing with the food by just mixing everything in the plate using a fork and took equal portions of each vegetable. Conclusively, female have more table manners than guys; no matter which age group they belong. Research Papers on Ethnography Research Paper Conducted at Local Mall McDonaldsHip-Hop is ArtPersonal Experience with Teen PregnancyAssess the importance of Nationalism 1815-1850 EuropeEffects of Television Violence on ChildrenMarketing of Lifeboy Soap A Unilever ProductThe Masque of the Red Death Room meaningsWhere Wild and West MeetResearch Process Part OneGenetic Engineering19 Century Society: A Deeply Divided Era

Saturday, October 19, 2019

Blowfish Algorithm Advantages and Disadvantages

Blowfish Algorithm Advantages and Disadvantages Blowfish is a keyed (piece of information that determines the functional output of a cryptographic algorithm or cipher), symmetric cryptographic block cipher. It was designed by Bruce Schneier in 1993. Since then it has been analyzed considerably, and it is slowly gaining acceptance as a strong encryption algorithm. Blowfish is license-free and is available free for all uses. It is also a symmetric block cipher that can be used as a drop-in replacement for DES or IDEA. It takes a variable-length key, from 32 bits to 448 bits, making it ideal for both domestic and exportable use. Blowfish is also one of the fastest block ciphers in public use, making it ideal for a product that functions on a wide variety of processors found in mobile phones as well as in notebook and desktop computers. The first implementation of the Blowfish Algorithm in LabVIEW. With this set of subvi’s one can encrypt data in LabVIEW without the need of external software. This can be used to send data secu rely over Data socket as well as TCP and UDP communications along with protect remote control systems from unauthorized access, by encrypting the control communications. .( B. Schneier, Applied Cryptography, John Wiley & Sons, New York, 1994.) 3.2 Strategies and Mechanisms Blowfish has a 64-bit block size and a key length of somewhere from 32 bits to 448 bits. The algorithm consists of two parts. One is a key-expansion part and one more is a data- encryption part. Key expansion converts a key of at most 448 bits into several subkey arrays totaling 4168 bytes. It is a 16-round Feistel cipher and uses large key-dependent S-boxes (basic component of symmetric key algorithms which performs substitution). Each round consists of a keydependent permutation, and a keydependent substitution. It is also similar in structure to CAST-128, which uses fixed S-boxes. Blowfish is suitable for application where the key does not change frequently, like a communication link or an automatic file encryp tor. It is significantly faster than most encryption algorithm when on 32-bit microprocessor with large data caches. (Fast Software Encryption, Cambridge Security Workshop Proceedings December 1993) 3.3 The Feistel structure of Blowfish A Fiestel network is a general method of transforming any function (generally called F- function) into a permutation. It was inented by Horst Fiestel and has been used in many block chiper designed. The diagram below shows the action of Blowfish. Each line represents 32 bits. The algorithm keeps two subkey arrays: the 18-entry P-array and four 256-entry S-boxes. The S-boxes accept 8-bit input and produce 32-bit output. One entry of the P-array is used every round, and after the final round, each half of the data block is XORed with one of the two remaining unused P-entries. The diagram to the right shows Blowfish’s F-function. The function splits the 32-bit input into four eight-bit quarters, and uses the quarters as input to the S-boxes. The outputs are added modulo 232 and XORed to produce the final 32-bit output. Since Blowfish is a Feistel network, it can be inverted simply by XO7Ring P17 and P18 to the cipher text block, then using the P-entries in reverse order. Blowfish’s algorithm initialize with the P-array and S-boxes. The secret key is then XORed with the P-entries in order and then use the same method to encrypt all the zero string. The consequential ciphertext replaces P1 and P2 then encrypt the new P1 and P2 with the modified subkeys. Now the output is P3 and P4. Altogether Blowfish algorithm will repeat 521 times in order to calculate new subkeys for the P-array and the four S-boxes. It is about 4KB data is processed.

Friday, October 18, 2019

An analysis of CSR in UK Dissertation Example | Topics and Well Written Essays - 15000 words

An analysis of CSR in UK - Dissertation Example ata 38 3.5.1Data Collection Methods and Instruments 38 3.5.2Data Analysis Aspects 39 3.5.3Data Presentation 39 CHAPTER FOUR: RESULTS AND FINDINGS 41 4.0Introduction 41 4.1Answers to the Research Questions 41 4.1.1Research Question One 42 4.1.2Research Question Two 44 4.1.3Research Question Three 45 4.2Results from the Firms under study 45 4.3CSR, Competitive Advantage, and Economic Value 48 4.3.1Results and Findings from Interviews 48 4.3.2Hypothesis Testing 49 4.4Conclusion 51 CHAPTER FIVE: DISCUSSION AND ANALYSIS 52 5.0Introduction 52 5.1Discussions and Analysing the Organization 52 5.2Discussions and Analysis from the Interviews/Questionnaires 54 5.3Overall Discussions 55 5.4Conclusion 60 CHAPTER SIX: CONCLUSION AND RECOMMENDATIONS 61 6.0Conclusion 61 6.1Practical Recommendations 62 6.2Limitations 63 6.3Reflections and Areas of Further Research 64 REFERENCES 65 APPENDICES 69 Appendix 1: Questionnaire for the Interview 69 Appendix 2: Timeline for the Study 72 Appendix 3: GRI Guidel ines 73 GRI Performance Indicators 73 Appendix 4: ASDA 5-Yr Financial Summary 74 Appendix 5: Centrica 5-Yr Financial Summary 76 Appendix 6: Barclays Bank 5-Yr Financial Summary 78 Appendix 7: Sainsbury 5-Yr Financial Summary 80 Appendix 8: Tesco 5-Yr Financial Summary 82 Appendix 9: Vodafone 5-Yr Financial Summary 84 LIST OF FIGURES Figure 1: Stakeholder Theory of CSR (Polonsky, 1995) 24 Figure 2: Social Contract Theory (Bamberg and Moser, 2007) 27 Figure 3: Aspects of CSR Policy in an Organization (The Economist, 2008) 32 Figure 4: Maslow's Hierarchy of Needs (Maslow & Herzberg, 1954) 43 Figure 5: CSR policies as per the GRI Guidelines 47 Figure 6: Comparing EPS and CSR 48 LIST OF TABLES Table 1: Summary of the Sample UK Firms under study 17 Table 2: Summary of the Factors Identified for CSR Success 44 Table 3: CSR Policies under the GRI Guidelines 46 Table 4: Comparing Financial Information and CSR, EPS and CSR 47 Table 5: Comparing Financial Information and CSR, Profitability and CSR 48 Table 6: Descriptive Statistics of the Responses 49 ABSTRACT Contemporary businesses continue to suffer from the dynamisms and turbulences within the environment as a result of increased competition. Consequently, several strategic options have been identified to assist in achieving competitive advantage, which assists in increasing the profitability and sustainable business success. One such strategic option has been the use of corporate social responsibility. The majority of contemporary corporations believes in the economic value of CSR unlike their classical counterparts that perceive CSR as an economic burden. In a bid to judge whether CSR is an economic

CASE STUDY; CAR COSTS ARE CUT THROUGH NEW TECHNOLOGY Essay

CASE STUDY; CAR COSTS ARE CUT THROUGH NEW TECHNOLOGY - Essay Example This is the reason for fall in the price of palladium in the following months. As per the theory of economics, the price of a commodity increases when its demand increases in the market. Similarly, the price falls in the event of fall in the demand for the same. The same has happened in the case of Palladium. Though Mazda has not announced by when the new technology would be used, the market expected a downfall in the demand for the commodity if automobile industry adopts the new catalyst. Thus, the demand of palladium is changed due to change in non price factor, that is, technology. Therefore the demand curve shifts downwards with no change in supply. Subsequently the price will reduce to reach at a new equilibrium. This phenomenon can be explained using figure 1 below. Let D1 be the existing demand curve of palladium. When the news of new technology came up, the demand curve shifted to D3. This means that the quantity of Palladium that is demanded by the industry is reduced and so the price also gets reduced to adjust to the change in quantity demanded. Same can also be seen in the case of supply curve figure 2. (Webshells, 2010) When demand for palladium is reduced, there is an oversupply created in the market. Due to the oversupply the supply curve s0 is shifted to s2. Therefore the price comes down to adjust to the market. Technological breakthroughs are very much important in automobile industry. Only technology adoption can help automobile companies to reduce the cost of production. Take the case of new innovation by Mazda. As per the technology, palladium usage can be reduced by 90%. Palladium being one of the most expensive metals in the world, the cost saved by the company by adopting this technology is huge. The savings in cost will help the companies to charge less for the cars and thus companies can introduce low cost cars in the market. Tata has done a

The use of free radicals in the treatment of disease Literature review

The use of free radicals in the treatment of disease - Literature review Example For example, they can react with other molecules (M1) and steal an electron from them. The reacting radical (R1.) transforms into a ground state molecule (M2) and the formation of a new radical takes place (R2.)(Scheme 1) ( Fieser and Fieser, 1966 ). Scheme 1: Typical reaction of radicals (Nesmeianov and Nesmeianov, 1970). The first type of free radicals is thermodynamically unstable particles. These are the molecular fragments similar in structure to CH3. ,C2H5. and their derivatives. Next, atoms with one unpaired atom also fall under the definition of radicals. For example, H. ,Na. ,Cl. . And the last group of radicals are the thermodynamically stable radicals. As an example of this group triarylmethyl (a) and semiquinones (b) can be put forward (Scheme 2). Stabilisation of the radical in these structures are realised through delocalisation of the unpaired electron. Nitrogen oxides (NO, NO2) can also be classified as radicals as they possess an unpaired electron. Odd electron of th e hydrogen atom is an s electron. In case of chlorine, or any carbon based radical it is a p radical. Scheme 2: Triarylmethyl and semiquinones based radicals (Nesmeianov and Nesmeianov, 1970). If the radical is stable then it usually does not participate in the reactions described on scheme 1. Such radicals cannot sustain chain reactions but can stop them. They have the ability to remove free radicals from the system and consequently serve as inhibitors of chain reactions. All the described particles are paramagnetic due to their uncompensated spin, what can be detected using magnetic balance (in case of stable particles) or electron paramagnetic resonance (if the concentration of the studied compound is too small or it is unstable) (Nesmeianov and Nesmeianov, 1970). Free radicals have the ability to damage cells. Respiration and the immune system reaction to the infection are the ways which lead to generation of free radicals in the body. Environment factors, such as food, pollutan ts and drugs that are used, also contribute to the formation of radicals. Once produced, radicals damage lipids, proteins, nucleic acids and other tissue macromolecules. They also have been proven to play a major role in aging and lead to a series of diseases, including cancer. The amount of free radicals in the body is regulated through the use of antioxidants which donate an electron, thereby transform a free radical into a stable molecule. A number of enzymes are able to act as antioxidants, including catalase, superoxide dismutase and glutathione peroxidase. The list of antioxidants can be continued by mentioning selenium, beta-carotene and both vitamins C and E (Brown, 1999; Huang, 2000). Because of the mentioned destructive properties of free radicals they can be used to treat cancer. A number of methods utilises free radicals. The method that has been used for decades is radiation therapy. The first case of using radiation therapy in the USA is dated 1896 when Emil Grubbe use d X-rays to treat cancer. The discovery of radium and polonium in the end of the nineteenth century gave radiotherapy a push for further advancement. In the mid-1900s radium was substituted by radioactive caesium and cobalt. Later, with the development of various forms of tomography it became possible for physicians to selectively target tumours. This led to fewer side effects and more effective treatment. Depending on the position of the radiation source there are three types of

Thursday, October 17, 2019

Take home question Financial Markets of Latin American Essay

Take home question Financial Markets of Latin American - Essay Example However, they -as well as other emerging markets as China or Eastern Europe- appear to be overcoming this crisis much better than more mature markets as USA or the European Union. Some analysts explain that this fact is due to these countries costume and tradition of facing continuous tensions and crisis, situation that have led them to develop "overcoming mechanisms"2. According to Manuel Romera, the Latin-American countries have few to fear from this situation, since they are "those countries that are the most used to difficult and tension moments, being so the most prepared to overcome the crisis". I coincide with this hypothesis because, to my mind, if during the coming decades these countries are able to achieve solid organisational models to simultaneously stimulate innovation and efficiency, it would be seen how theses economies experiment unknown levels of development. It should be beard in mind that Latin-American economies are rich in natural resources and primary materials (resources more and more precious in such a shortage world, characterised by a frantic economic growth). Nevertheless, and once the risk of contagion is being avoided, let's remark some other facts that condition the S

The Tourism Industry Essay Example | Topics and Well Written Essays - 5000 words

The Tourism Industry - Essay Example Urban tourism is a special kind of tourism which is linked to urban lifestyles in relation to a number of tourist activities existing in the cities. It is therefore defined as a set of established resources and activities found in a city and have been availed for the external visitors. The visitors may come with the aim of getting entertained or for business purposes or are on official duties. Other than urban tourism is a form of tourism, it is considered as a fundamental, traditional and characteristic feature of urban life. This is because most cities have changed from being places of population mobility offering tourists just a short break. They have therefore become cultural centers with relaxation and shopping places where people can meet their friends and effectively spend their free time. Tourism activities in cities differ in relation to differences in sizes, available resources and existing features for tourist attraction. The difference can also be in terms of disparity of lifestyles within the various cities. Hence urban tourism is a representation of the fascinating features of a city and resources aimed at attracting visitors and residents. The tourism activities contribute to the development of the cities and urban life. Moreover, it is a requirement for cities to have heritage values coupled with the modern state of the art infrastructure that fully meets the needs and desires of tourists. This means there is a need for aims to be directed at developing good infrastructural services and preserving the historic centers.

Wednesday, October 16, 2019

The use of free radicals in the treatment of disease Literature review

The use of free radicals in the treatment of disease - Literature review Example For example, they can react with other molecules (M1) and steal an electron from them. The reacting radical (R1.) transforms into a ground state molecule (M2) and the formation of a new radical takes place (R2.)(Scheme 1) ( Fieser and Fieser, 1966 ). Scheme 1: Typical reaction of radicals (Nesmeianov and Nesmeianov, 1970). The first type of free radicals is thermodynamically unstable particles. These are the molecular fragments similar in structure to CH3. ,C2H5. and their derivatives. Next, atoms with one unpaired atom also fall under the definition of radicals. For example, H. ,Na. ,Cl. . And the last group of radicals are the thermodynamically stable radicals. As an example of this group triarylmethyl (a) and semiquinones (b) can be put forward (Scheme 2). Stabilisation of the radical in these structures are realised through delocalisation of the unpaired electron. Nitrogen oxides (NO, NO2) can also be classified as radicals as they possess an unpaired electron. Odd electron of th e hydrogen atom is an s electron. In case of chlorine, or any carbon based radical it is a p radical. Scheme 2: Triarylmethyl and semiquinones based radicals (Nesmeianov and Nesmeianov, 1970). If the radical is stable then it usually does not participate in the reactions described on scheme 1. Such radicals cannot sustain chain reactions but can stop them. They have the ability to remove free radicals from the system and consequently serve as inhibitors of chain reactions. All the described particles are paramagnetic due to their uncompensated spin, what can be detected using magnetic balance (in case of stable particles) or electron paramagnetic resonance (if the concentration of the studied compound is too small or it is unstable) (Nesmeianov and Nesmeianov, 1970). Free radicals have the ability to damage cells. Respiration and the immune system reaction to the infection are the ways which lead to generation of free radicals in the body. Environment factors, such as food, pollutan ts and drugs that are used, also contribute to the formation of radicals. Once produced, radicals damage lipids, proteins, nucleic acids and other tissue macromolecules. They also have been proven to play a major role in aging and lead to a series of diseases, including cancer. The amount of free radicals in the body is regulated through the use of antioxidants which donate an electron, thereby transform a free radical into a stable molecule. A number of enzymes are able to act as antioxidants, including catalase, superoxide dismutase and glutathione peroxidase. The list of antioxidants can be continued by mentioning selenium, beta-carotene and both vitamins C and E (Brown, 1999; Huang, 2000). Because of the mentioned destructive properties of free radicals they can be used to treat cancer. A number of methods utilises free radicals. The method that has been used for decades is radiation therapy. The first case of using radiation therapy in the USA is dated 1896 when Emil Grubbe use d X-rays to treat cancer. The discovery of radium and polonium in the end of the nineteenth century gave radiotherapy a push for further advancement. In the mid-1900s radium was substituted by radioactive caesium and cobalt. Later, with the development of various forms of tomography it became possible for physicians to selectively target tumours. This led to fewer side effects and more effective treatment. Depending on the position of the radiation source there are three types of

The Tourism Industry Essay Example | Topics and Well Written Essays - 5000 words

The Tourism Industry - Essay Example Urban tourism is a special kind of tourism which is linked to urban lifestyles in relation to a number of tourist activities existing in the cities. It is therefore defined as a set of established resources and activities found in a city and have been availed for the external visitors. The visitors may come with the aim of getting entertained or for business purposes or are on official duties. Other than urban tourism is a form of tourism, it is considered as a fundamental, traditional and characteristic feature of urban life. This is because most cities have changed from being places of population mobility offering tourists just a short break. They have therefore become cultural centers with relaxation and shopping places where people can meet their friends and effectively spend their free time. Tourism activities in cities differ in relation to differences in sizes, available resources and existing features for tourist attraction. The difference can also be in terms of disparity of lifestyles within the various cities. Hence urban tourism is a representation of the fascinating features of a city and resources aimed at attracting visitors and residents. The tourism activities contribute to the development of the cities and urban life. Moreover, it is a requirement for cities to have heritage values coupled with the modern state of the art infrastructure that fully meets the needs and desires of tourists. This means there is a need for aims to be directed at developing good infrastructural services and preserving the historic centers.

Tuesday, October 15, 2019

Cebu Province Division Essay Example for Free

Cebu Province Division Essay Introduction DAMATH, a patent-pending mathematical board-game invented by five-time national awardee Jesus L. Huenda, is coined from the popular Filipino checkerboard game of dama, (or lady in Spanish) and mathematics. It started in a Sorsogon National High School class in Sorsogon, Philippines and its popularity spread quickly and resulted in the first national DAMATH competitions held at Legaspi City in 1980. He initiated this competition with the support of the Science Foundation of the Philippines. He hopes to introduce DAMATH to secondary math teachers as part of a requirement of his work as PASMEP Fellow at Curtin University / WACAE, Western Australia. Thus if this material, or part of it, is used commercially or otherwise (except for classroom instruction purposes), permission must be secured in writing from him. By the way, DAMATH is part of the inventor’s position paper, Non-formal mathematics education: the Sorsogon National High School experience, delivered at the 1978 First Southeast Asian Conference on Mathematical Education, PICC, Manila; 1979 and 1980 MTAP national conventions at Legaspi City and Quezon City, respectively. 1981, 1983 and 1988 Philippine Expositions, PHILTRADE, Manila; conference, Mandurah, WA; Australian Association of Mathematics Teachers 13th biennial national conference, Hobart. Rationale It is becoming a growing classroom practice in many school subjects, including mathematics, to use games to promote the understanding of concepts and skills. This practice is supported by child psychologist Piaget and Inhelder (1969) and Kohlberg (1969) who are convinced that affective, cognitive, and social development strongly influence one another and develop along parallel lines. There are data to support this statement. Thus, the use of socially interactive mathematical games in learning and teaching mathematics is credible. Objectives 1. To integrate the Filipino checkerboard game of dama into the teaching of mathematical concepts and skills. 2. To encourage the utilization of recycled materials in constructing damath board set (for classroom use only). 3. To analyze damath as a possible subject of mathematical investigations. 4. To enhance wholesome interpersonal relations among learners. 5. To promote mathematical consciousness among, family members in particular and the community in general through the mathematics club’s community outreach damath competitions. 6. To promote awareness of girls in mathematics [as king is to the game of chess, so dama (or lady) is to damath ] ES I–Math Biongcog; MT 1 =Lauron; MT 1 =Tubin; HT 3 =Torbeso; MT 1 = Berna MT 2=Gonzaga; T2=Perez 2 Cebu Province Division = Damath Seminar Workshop 1998 10-13-2008 ______________________________________________________________________________ Teacher’s Notes: Any game can be trivial or worthwhile. It all depends on the players of the game and when and why. Feedback from teachers who have tried damath is encouraging because they have found it appropriate, fun, and useful in their classes. All 12 games are to be played in pairs. Students learning mathematics in this way have been found to associate mathematics with wholesome and purposeful work. These games may introduce, supplement, reinforce or refresh concepts, skills and attitudes. To get the most out of damath, read the accompanying guide sheet and list of materials needed. Determine what extra work can be assigned to pairs of students who will carry out the activity. As a follow-up activity, some mathematical investigations concerning damath may be assigned to small groups of students, or mathematics club may conduct community-outreach damath competitions highlighting awareness of girls in mathematics. In doing so, observe student’s performance and reactions and record them in a cognitive skill checklist and attitude respectively. This, together with your assessment, will provide you with significant data for future reference. The inventor welcome suggestions from teachers in the field by sending it to: Jesus L. Huenda, Curriculum Development Division, Bureau of Secondary Education, Department of Education, Culture and Sports, Palacio del Governador, Intramuros, Manila. Suggestions and input can be mailed to him using the following form: (See next page). TO THE STUDENTS In DAMATH, there are 12 games to play. All of these games are original especially designed for you to make you do and play mathematics, have fun with it in thinking, making a game plan, and using your common sense, honesty and fair play. Do them and learn mathematics. Do them and enjoy yourself, too. ES I–Math Biongcog; MT 1 =Lauron; MT 1 =Tubin; HT 3 =Torbeso; MT 1 = Berna MT 2=Gonzaga; T2=Perez 3 Cebu Province Division = Damath Seminar Workshop 1998 10-13-2008 ______________________________________________________________________________ Name of the game: ___________________________ School:____________________________ Sender’s Name (Optional):_____________________ Address:___________________________ What I like in the game Areas for improvement Guide Sheet Title Damath the Teeny Integer Countess Damath Damath-in-a-Whole Damath Over U Busy Deci Damath Damath the Old Prime Madonna Damath the Fibo Nutty Lady Byte-a-Damath Damath a la Mod Trig-a-Damath Sci-No-Damath Log-a-Damath Concept Integers Counting numbers Whole numbers Fractions decimals Prime numbers Fibonacci sequence Binary numbers Modulo 12 Trigonometric Functions Scientific Notation Logarithmic function Place in the Curriculum Review activity for Units 3 – 8 List of Materials Damath board set (See attachment A) Enrichment activity for Units 3 – 8 Enrichment activity for Unit 2 Introductory activity for Unit 5 Enrichment activity for Unit 6 ES I–Math Biongcog; MT 1 =Lauron; MT 1 =Tubin; HT 3 =Torbeso; MT 1 = Berna MT 2=Gonzaga; T2=Perez 4 Cebu Province Division = Damath Seminar Workshop 1998 10-13-2008 ______________________________________________________________________________ DAMATH: 12 games for High School Mathematics Contents Of This Package †¢ Activity sheets for students for each of the following titles: Activity Activity Activity Activity Activity Activity Activity Activity Activity Activity Activity Activity †¢ Teacher’ Manual 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. Damath the Teeny Integer Countess Damath Damath-in-a-Whole Damath Over U Busy Deci Damath Damath the Odd Prime Madonna Damath the Fibo Nutty Lady Byte-a-Damath Damath a la Mod Trig-a-Damath Sci-no-Damath Log-a-Damath Rules: How to S T A R T 24 chips should be placed first on the following squares on the DAMATH board Biongcog; MT 1 =Lauron; MT 1 =Tubin; HT 3 =Torbeso; MT 1 = Berna MT 2=Gonzaga; T2=Perez 5 Cebu Province Division = Damath Seminar Workshop 1998 10-13-2008 ______________________________________________________________________________ How to make a move 1. Toss a coin to decide who moves first. 2. The first player moves a piece by sliding diagonally forward to an adjoining vacant square (no chip is to be placed on colored squares). Record your move in the scoresheet. Example: Red player moves â€Å"-1† to an adjoining vacant square ( 5 , 4 ), thus, to the scoresheet the player writes on the first column under the heading â€Å"Move† with [-1 (5,4) ] to mean â€Å"-1† goes to a square located 5 on its x-axis and 4 on its y-axis. 3. The two players alternately take turn in moving a piece. How to take a piece (Ka-on) 1. In the example above, Red player with piece â€Å"-1† is required (pass is not allowed) to take a piece â€Å"2† of Blue side by jumping over the piece to be taken and landing on the latter’s adjoining vacant square, which, also, determine the symbol of operation to be used. Example: â€Å"-1† takes â€Å"2† by jumping over it (player gets the piece â€Å"2†) and finally lands on a square (7,2) which has minus sign on it. Thus, on the scoresheet, the player writes on the first column with â€Å"-1 – 2†. Moreover, on the second column under the heading â€Å"Score†, the player writes the answer as â€Å"-3†. While on the third column under the heading â€Å"Total Score†, the player writes the total score by adding whatever points in it, thus, â€Å"-3†. Round off numbers, if necessary. 2. A player can take one chip or more than one chip with the required option to take the greater number of chips. 3. A Red chip is declared as â€Å"dama† if it reaches any of the following squares: ( 1, 0 ) (3,0) (5,0) (7,0) Similarly, for Blue Chip as follows: ( 0, 7 ) (2,7) (4,7) (6,7) 4. Once a piece is declared as â€Å"dama† it could slide diagonally forward or backward in any vacant square provided no opposing piece blocks it. It could take a piece or pieces and have the privilege of doubling its scores. 5. The game is ended it (a.) a player has no more piece to move; or, (b.) it is impossible for any or both players to go on because of repeated move. ES I–Math Biongcog; MT 1 =Lauron; MT 1 =Tubin; HT 3 =Torbeso; MT 1 = Berna MT 2=Gonzaga; T2=Perez 6 Cebu Province Division = Damath Seminar Workshop 1998 10-13-2008 ______________________________________________________________________________ In (a) or (b), the remaining piece or pieces are added to the total score. Finally, the player with the greater accumulated total, wins the game. How to score Shown below is a Damath Scoresheet. Initial entries on it were taken from the above examples of player’s move and in taking piece or pieces. DAMATH SCORESHEET Red Player Move -1 (5,4) -1 2 Score -3 Total 2 -3 Player Move (9,3) Score Total Blue Player’s Signature: Player’s Signature: Signature of Teacher / Parent: Signature of Teacher / Parent: Win Loss Win Loss ES I–Math Biongcog; MT 1 =Lauron; MT 1 =Tubin; HT 3 =Torbeso; MT 1 = Berna MT 2=Gonzaga; T2=Perez 7 Cebu Province Division = Damath Seminar Workshop 1998 10-13-2008 ______________________________________________________________________________ Activity 1: DAMATH the Teeny Integer A game for two players. What you need * †¢ DAMATH board ( 8 squares by 8 squares ) 24 chips in two colors: ( 12 of each color, thus, 0, -1, 2, -3, 4, -5, 6, -7, 8, -9, 10, -11 ) For illustration, see attachment A of this Package. What it is about It is a game of addition, subtraction, multiplication and division of integers, rounding off numbers, and point plotting. Aim of the Game The player with the most points wins. ES I–Math Biongcog; MT 1 =Lauron; MT 1 =Tubin; HT 3 =Torbeso; MT 1 = Berna MT 2=Gonzaga; T2=Perez 8 Cebu Province Division = Damath Seminar Workshop 1998 10-13-2008 ______________________________________________________________________________ Activity 2: Countess DAMATH A game for two players. What you need Same materials as in Activity 1, but on the reverse side of chip no. â€Å"0† write chip no. â€Å"12†. What it is about It is a game of adding, subtracting, multiplying, and dividing counting numbers; rounding off numbers, and point plotting. Aim of the Game The player with the most points wins. ES I–Math Biongcog; MT 1 =Lauron; MT 1 =Tubin; HT 3 =Torbeso; MT 1 = Berna MT 2=Gonzaga; T2=Perez 9 Cebu Province Division = Damath Seminar Workshop 1998 10-13-2008 ______________________________________________________________________________ Rules Same rules as in Activity 1,but the â€Å"0† chip is replaced by â€Å"12† [ â€Å"12† is on the reverse side of â€Å"0† chip]; and, negative signs have to be disregarded. Thus, initial positions of the chips are as follows: Chip Number 1 2 3 4 5 6 7 8 9 10 11 12 Position of Blue Chip (1,2) (3,2) (5,2) (7,2) (0,1) (2,1) (4,1) (6,1) (1,0) (3,0) (5,0) (7,0) Position of Red Chip (6,5) (4,5) (2,5) (0,5) (7,6) (5,6) (3,6) (1,6) (6,7) (4,7) (2,7) (0,7) In taking a chip or chips, addition, subtraction multiplication, and division of counting numbers are used. Round off numbers, if necessary, in making entries on the scoresheet. ES I–Math Biongcog; MT 1 =Lauron; MT 1 =Tubin; HT 3 =Torbeso; MT 1 = Berna MT 2=Gonzaga; T2=Perez 10 Cebu Province Division = Damath Seminar Workshop 1998 10-13-2008 ______________________________________________________________________________ Activity 3: DAMATH – in – a Whole A game for two players. What you need Same materials as in Activity 1 What it is about It is a game of adding, subtracting, multiplying and dividing Whole numbers ; rounding off numbers, and point plotting. Aim of the Game The player with the most points wins. ES I–Math Biongcog; MT 1 =Lauron; MT 1 =Tubin; HT 3 =Torbeso; MT 1 = Berna MT 2=Gonzaga; T2=Perez 11 Cebu Province Division = Damath Seminar Workshop 1998 10-13-2008 _____________________________________________________________________________ _ Rules Same rules as in Activity 2, but the â€Å"12† chip is replaced by â€Å"0† [ â€Å"0† is on the reverse side of â€Å"12† chip]; and, negative signs have to be disregarded. Thus, initial positions of the chips are as follows: Chip Number 0 1 2 3 4 5 6 7 8 9 10 11 Position of Blue Chip (1,2) (3,2) (5,2) (7,2) (0,1) (2,1) (4,1) (6,1) (1,0) (3,0) (5,0) (7,0) Position of Red Chip (6,5) (4,5) (2,5) (0,5) (7,6) (5,6) (3,6) (1,6) (6,7) (4,7) (2,7) (0,7) In taking a chip or chips, addition, subtraction multiplication, and division of whole numbers are used. Round off numbers, if necessary, in making entries on the Scoresheet. ES I–Math Biongcog; MT 1 =Lauron; MT 1 =Tubin; HT 3 =Torbeso; MT 1 = Berna MT 2=Gonzaga; T2=Perez 12 Cebu Province Division = Damath Seminar Workshop 1998 10-13-2008 ______________________________________________________________________________ Activity 4: DAMATH Over U A game for two players. What you need Same materials as in Activity 1, but the positive and negative numbers should have â€Å"10† as denominator (use reverse side of chips). What it is about It is a game of adding, subtracting, multiplying and dividing fractions; and point plotting. Aim of the Game The player with the most points wins. Rules Same rule as in Activity1, but adding, Subtracting, multiplying and dividing fractions are used, thus, all entries on the Scoresheet are fractions. ES I–Math Biongcog; MT 1 =Lauron; MT 1 =Tubin; HT 3 =Torbeso; MT 1 = Berna MT 2=Gonzaga; T2=Perez 13 Cebu Province Division = Damath Seminar Workshop 1998 10-13-2008 ______________________________________________________________________________ Activity 5: Busy Deci DAMATH A game for two players. What you need Same materials as in Activity 4, but decimal equivalent should take the place of fractions. What it is about It is a game of adding, subtracting, multiplying and dividing decimals; and point plotting. Aim of the Game The player with the most points wins. Rules Same rule as in Activity 4, but instead of fractions, the decimal equivalents are added, subtracted, multiplied, and divided. In taking a chip or chips, results of mathematical operations are rounded off to the nearest hundredths. ES I–Math Biongcog; MT 1 =Lauron; MT 1 =Tubin; HT 3 =Torbeso; MT 1 = Berna MT 2=Gonzaga; T2=Perez 14 Cebu Province Division = Damath Seminar Workshop 1998 10-13-2008 ______________________________________________________________________________ Activity 6: DAMATH the Odd Prime Madonna A game for two players. What you need Same materials as in Activity 1 What it is about It is a game of prime numbers; integers; squaring numbers; rounding off numbers; and point plotting. Aim of the Game The player with the most points wins. Rules Same rule as in Activity 1, but in taking a chip or chips the results of algebraic operations are squared if it is an odd prime number. ES I–Math Biongcog; MT 1 =Lauron; MT 1 =Tubin; HT 3 =Torbeso; MT 1 = Berna MT 2=Gonzaga; T2=Perez 15 Cebu Province Division = Damath Seminar Workshop 1998 10-13-2008 ______________________________________________________________________________ Activity 7: DAMATH the Fibo Nutty Lady A game for two players. What you need Same materials as in Activity 2 What it is about It is a game using the Fibonacci sequence; counting numbers; Cubing numbers; rounding off numbers; and point plotting. Aim of the Game The player with the most points wins. Rules Same rule as in Activity 2, but in taking a chip or chips the results of mathematical operations are cubed if it is a Fibonacci number. ES I–Math Biongcog; MT 1 =Lauron; MT 1 =Tubin; HT 3 =Torbeso; MT 1 = Berna MT 2=Gonzaga; T2=Perez 16 Cebu Province Division = Damath Seminar Workshop 1998 10-13-2008 ______________________________________________________________________________ Activity A game for two players. 8: Byte – a DAMATH What you need Same materials as in Activity 3, but even numbers are to be considered as â€Å"0†, while odd numbers as â€Å"1†. What it is about It is a game of adding, subtracting, multiplying and dividing binary numbers; and point plotting Aim of the Game The player with the most points wins. Rules Same rule as in Activity 3, but in taking a piece or pieces binary arithmetic is used. Thus, initial positions of blue and red chips are as follow: Chips 0 1 0 1 0 1 0 1 0 1 0 1 Position of Blue Chip Position of Red Chip (1,2) (6,5) (3,2) (4,5) (5,2) (2,5) (7,2) (0,5) (0,1) (7,6) (2,1) (5,6) (4,1) ( 3 , 6) (6,1) (1,6) (1,0) (6,7) (3,0) (4,7) (5,0) (2,7) (7,0) (0,7) ES I–Math Biongcog; MT 1 =Lauron; MT 1 =Tubin; HT 3 =Torbeso; MT 1 = Berna MT 2=Gonzaga; T2=Perez 17 Cebu Province Division = Damath Seminar Workshop 1998 10-13-2008 ______________________________________________________________________________ Activity A game for two players. 9: DAMATH a la Mod What you need Same materials as in Activity 3 What it is about It is a game of addition, subtraction, multiplication and Division in module 12; and point plotting. Aim of the Game The player with the most points wins. Rules Same rule as in Activity 3, but in taking a piece or pieces binary arithmetic is used. Thus, initial positions of blue and red chips are as follow: Chips 1 2 3 4 5 6 7 8 9 10 11 12 Position of Blue Chip Position of Red Chip (1,2) (6,5) (3,2) (4,5) (5,2) (2,5) (7,2) (0,5) (0,1) (7,6) (2,1) (5,6) (4,1) ( 3 , 6) (6,1) (1,6) (1,0) (6,7) (3,0) (4,7) (5,0) (2,7) (7,0) (0,7) ES I–Math Biongcog; MT 1 =Lauron; MT 1 =Tubin; HT 3 =Torbeso; MT 1 = Berna MT 2=Gonzaga; T2=Perez 18 Cebu Province Division = Damath Seminar Workshop 1998 10-13-2008 ______________________________________________________________________________ Activity A game for two players. 10 : Trig – a DAMATH What you need Same materials as in Activity 1, but the following integers should have the Corresponding trigonometric functions by changing them to degrees: Chips in degrees -1 and 10 -3 and 8 -5 and 6 -7 and 4 -9 and 2 11 and 0 Trigonometric Functions Sin Cos Tan Cot Sec Csc What it is about It is a game using trigonometric functions; trigonometric identities; changing degrees to radians and vice – versa; and point plotting. Aim of the Game The player with the most points wins. Rules Same rule as in Activity 1, but in taking a piece or pieces (this time, integers are expressed in degrees) trigonometric functions and identities are used. Thus, initial positions of blue and red chips are as follow: Chips in degrees Position of Blue Chip Position of Red Chip Csc 0 (5,2) (2,5) Sin –1 (3,2) (4,5) Sec 2 (7,2) (0,5) Cos -3 (1,2) (6,5) Cot 4 (4,1) (3,6) Tan –5 (2,1) (5,6) Tan 6 (6,1) ( 1 , 6) Cot –7 (0,1) (7,6) Cos 8 (5,0) (2,7) Sec –9 (3,0) (4,7) Sin 10 (7,0) (0,7) Csc -11 (1,0) (6,7) ES I–Math Biongcog; MT 1 =Lauron; MT 1 =Tubin; HT 3 =Torbeso; MT 1 = Berna MT 2=Gonzaga; T2=Perez 19 Cebu Province Division = Damath Seminar Workshop 1998 10-13-2008 ______________________________________________________________________________ Activity A game for two players. 11 : Sci – no DAMATH What you need Same materials as in Activity 2, but the integers are raised to their corresponding Powers as follows. Chips 1 2 3 4 5 6 7 8 9 10 11 12 Expressed in Scientific Notation 1.1 x 10-1 2.2 x 10 2 3.3 x 10-3 4.4 x 10 4 5.5 x 10-5 6.6 x 10 6 7.7 x 10-7 8.8 x 10 8 9.9 x 10-9 1.01 x 10 10 1.11 x 10-11 1.212 x 10 12 What it is a bout It is a game of adding, subtracting, multiplying and dividing numbers in scientific notation; and point plotting. Aim of the Game The player with the most points wins. Rules Same rule as in Activity 2, but addition, subtraction, multiplication, and division of numbers in scientific notation are used; thus, entries on the Scoresheet should be numbers expressed in scientific notation. ES I–Math Biongcog; MT 1 =Lauron; MT 1 =Tubin; HT 3 =Torbeso; MT 1 = Berna MT 2=Gonzaga; T2=Perez 20 Cebu Province Division = Damath Seminar Workshop 1998 10-13-2008 ______________________________________________________________________________ Activity 12 : Log – a DAMATH A game for two players. What you need Same materials as in Activity 11 (common logarithm) or as in Activity 10 ( for logarithms and trigonometric function), as the case maybe, depending player’s agreement. What it is about It is a game of common logarithms; logarithms of trigonometric functions; and point plotting. Aim of the Game Same as in Activity 11 or Activity 10, as the case maybe. Rules Same rules as in Activity 11 or Activity 10, as the case maybe, depending on the player’s agreement, but common logarithms and logarithms of trigonometric functions are used, respectively. Thus, entries on the Scoresheet should have common logarithms or logarithms of trigonometric functions, as the case maybe/ ES I–Math Biongcog; MT 1 =Lauron; MT 1 =Tubin; HT 3 =Torbeso; MT 1 = Berna MT 2=Gonzaga; T2=Perez 21 Cebu Province Division = Damath Seminar Workshop 1998 10-13-2008 ______________________________________________________________________________ A. GAMES FOR DAMATHS COMPETITIONS: Levels Level 1 Level 2 Level 3 Level 4 Level 5 Level 6 Level 7 Grades Grades I – II Grades III – IV Grades V – VI First Year Second Year Third Year Fourth Year Contents Counting Numbers Whole Numbers Positive Fractions Integers Signed Fractions Radical Damath Polynomial Damath B. POSITIONS OF CHIPS: ( Elementary Level ) Level 1 2 3 4 5 6 7 8 9 10 11 12 CHIP NUMBERS I Level II Level III 0 1/10 1 2/10 2 3/10 3 4/10 4 5/10 5 6/10 6 7/10 7 8/10 8 9/10 9 10/10 10 11/10 11 12/10 BLUE CHIPS (1,2) (3,2) (5,2) (7,2) (0,1) (2,1) (4,1) (6,1) (1,0) (3,0) (5,0) (7,0) RED CHIPS (6,5) (4,5) (2,5) (0,5) (7,6) (5,6) (3,6) (1,6) (6,7) (4,7) (2,7) (0,7) POSITIONS OF CHIPS: ( Secondary Level ) CHIP 1st Year 0 -1 2 -3 4 -5 6 -7 8 -9 10 -11 2nd Year 0/10 -1/10 2/10 -3/10 4/10 -5/10 6/10 -7/10 8/10 -9/10 10/10 -11/10 NUMBERS 3rd Year 4√18 -√8 16√32 -9√2 36√32 -25√18 64√2 -49√8 100√2 -81√32 144√8 -121√18 4th Year 6x -xy2 10y -3x2y 28y -15x 36x2y -21xy2 66x2y -45y 78xy2 -55x For 4th Year Only, Blue Red Chips BLUE CHIPS (5,2) (3,2) (7,2) (1,2) (4,1) (2,1) (6,1) (0,1) (5,0) (3,0) (7,0) (1,0) RED CHIPS (2,5) (4,5) (0,5) (6,5) (3,6) (5,6) (1,6) (7,6) (2,7) (4,7) (0,7) (6,7) ES I–Math Biongcog; MT 1 =Lauron; MT 1 =Tubin; HT 3 =Torbeso; MT 1 = Berna MT 2=Gonzaga; T2=Perez 22 Cebu Province Division = Damath Seminar Workshop 1998 10-13-2008 ______________________________________________________________________________ POSITIONS OF CHIPS: ( Secondary Level ) Level 4 CHIP Level 5 NUMBERS Level VI Level VII -1 1.1 X 10 0 2 2.2 X 10 1 3.3 X 10-3 2 4 4.4 X 10 3 5.5 X 10-5 4 6 6.6 X 10 5 7.7 X 10-7 6 8 8.8 X 10 7 -9 9.9 X 10 8 1.01 X 10 10 9 -11 1.111 X 10 10 1.212 X 10 12 11 BLUE CHIPS (1,2) (3,2) (5,2) (7,2) (0,1) (2,1) (4,1) (6,1) (1,0) (3,0) (5,0) (7,0) RED CHIPS (6,5) (4,5) (2,5) (0,5) (7,6) (5,6) (3,6) (1,6) (6,7) (4,7) (2,7) (0,7) General Guidelines on DAMATHS Century Match 1. First player is determined by drawing lots. 2. Basically the rule in playing dama shall be used as follows: a. A â€Å"chip with numeral† moves diagonally forward to an adjoining vacant square. b. A chip takes an opponent’s chip or chips diagonally forward or backward. Mathematical operation such as addition subtraction, multiplication, or division of numerals shall be used depending on the vacant square’s operation symbol where the â€Å"taker† chip lands by jumping over the â€Å"taken† chip, â€Å"pass† is not allowed. c. On taking a chip or chips the following policy shall prevail: * â€Å"mayor dalawa† * â€Å"mayor tatlo† * â€Å"mayor dama† * â€Å"mayor dama dalawa† (x) takes 0 VS (x) takes 0 VS (x) takes 0 VS (dama) takes 0 (y) takes 1, takes 2 (y) takes 1, takes 2, and takes 3 (dama) takes 1 VS (x) takes 1, takes 2 over mayor dama. d. A player’s chip is declared as â€Å"dama† if it reaches the other player’s designated â€Å"dama† locations or squares. A dama chip can move or take a piece to any unoccupied square along the diagonal path. Moreover, when a â€Å"dama† takes a chip the score is doubled; when the â€Å"dama† is taken the score is also doubled; when a â€Å"dama† takes another â€Å"dama† the score is quadrupled. e. In taking more than one chip, the â€Å"taker† chip shall remain as the initial addend, minuend, multiplicand, or dividend as the case maybe. (This means that MDAS for multiple operations shall not apply in this case). f. A â€Å"move† is good only for one (1) minute, while the game’s duration shall not exceed 20 minutes. g. The remaining chips shall be added to the respective players. h. The game ends when any one of the following situations occur: ES I–Math Biongcog; MT 1 =Lauron; MT 1 =Tubin; HT 3 =Torbeso; MT 1 = Berna MT 2=Gonzaga; T2=Perez 23 Cebu Province Division = Damath Seminar Workshop 1998 10-13-2008 ______________________________________________________________________________ 1.) a player has no more chip to move 2.) 20-minute game duration had elapsed 3.) repetitive â€Å"moves† of any or both players. i. The player having the greater â€Å"total score† wins the game. In case of a â€Å"tie†, a 10-minute rematch follows thereafter untill a winner is declared. j. No player is allowed to compete in a level lower than the one specified for his grade level. k. In playing, the â€Å"TOUCH-MOVE SYSTEM† is used. Once a player â€Å"touches† a chip, it is imperative that he uses that chip for that particular move. l. A move is considered final once a player releases the chip, and he cannot change his move after he has released the chip. m. The use of calculator is recommended. n. All players in each level are ranked according to their respective number of games won to determine the winners. In case of a â€Å"triple tie†, the â€Å"the point-system† is used. Guidelines for Electrodamaths 1. ElectroDamaths is similar to Damath the whole numbers with certain variations as follows: a.) Odd numbers expressed in KWH b.) Even numbers expressed in Pesos, except ( 0 ) zero. 2. Sample in scoring: Chips + like Units + like Units + unlike Units like Units like Units unlike Units à · like Units à · like Units à · unlike Units Ãâ€" like Units Ãâ€" like Units Ãâ€" unlike Units Plus the remaining chips Move KWH 8 NS NS NS NS NS NS NS NS NS NS NS 18 NS 3 kwh + 5kwh P 2 + P 10 7 kwh + P 4 5 kwh – 9 kwh P6-P0 7 kwh P 4 3 kwh à · 5kwh P6à ·P2 7 kwh à · P 4 3 kwh Ãâ€" 5kwh P 2 Ãâ€" P 10 7 kwh Ãâ€" P 4 7 kwh + 11kwh P4+P8 Score fca in Pesos NS 12 NS NS 6 NS NS NS NS NS NS NS NS 12 26 kwh Ãâ€" P4/kwh = Total Score KWH fca in Pesos 8 12 8 12 8 12 8 18 8 18 8 18 8 18 8 18 8 18 8 18 8 18 26 26 18 30 Total kwh Ãâ€" prevailing rate at the venue TOTAL ELECTRIC CONSUMPTION