Saturday, November 30, 2019

Jacob Have I Loved Essays - Jacob Have I Loved, Human Behavior

Jacob Have I Loved Jacob Have I Loved is a great book for any child that resents their siblings, because thats how this twin sister relationship is best described. Sara Louise recalls her difficult adolescence on Rass Island and her intense jealousy of her own twin sister Caroline. Caroline is a selfish, over protected person and Sara Louise feels like her life is based on competing with the most admired sister Caroline. Caroline always got what she wanted and was considered to be the attractive one, smarter one by her mother and grandmother. Foe example one day before attending church when Sara Louise unexpectedly became a woman she stained her Sunday dress and couldnt go to church, her grandmother had a cocky attitude because she couldnt attend church that day. But when Caroline had her period she was congratulated Thats just many of the trails that made Sara Louise stronger throughout the book. Caroline is assumed to be the better sister, but in reality Sara Louise is the independent and strong sister, she never let anything stand in her way. When Caroline needs other people for almost every thing and is surprised when she doesnt get her way. For example, Sara Louise and her best friend Call, Call thought Caroline was attractive but rarely played with her. He liked Sara Louises personality, she wasnt fake and didnt pretend to be someone shes not. But when Call came back married to Caroline from the war, all of Sara Louises dreams were lost, but still remained friends with Call and kept going on and on. Yet another example of Sara Louises strengths. This book emphasizes with Sara Louise and helped me see her point of view and better understand that all people have their own talents that they may not have discovered yet. This twin sister relationship was based off of jealousy and beauty that would have never have been if they were both treated equally and their mother and grandmother didnt play favorites.

Tuesday, November 26, 2019

Candace Pert essays

Candace Pert essays Candace B. Pert is a leading researcher in the field of chemical receptors. Chemical receptors are places in the body where molecules of a drug or natural chemical, fit together and stimulate different physiological or emotional effects. As a graduate student, Candace Pert co-discovered the brains opiate receptors, areas that link painkilling substances. She later discovered endorphins which are the naturally occurring substances produced in the brain that relieve pain and produce sensations of pleasure. Candace Pert was born in New York City on June 26, 1946. She went to General Douglas MacArthur High School in Levittown, New York. Later, she attended Hofstra University but dropped out in 1966. She married Agu Pert in 1966 and the couple moved to Philadelphia. In 1966, Candace Pert gave birth to the first of the couples three children. In 1970, She earned her BA in biology and entered the doctoral pharmacology program at Johns Hopkins University in Baltimore. Her first research assignment, working with Dr. Solomon Snyder, was to explore the mechanisms that regulate the bodys most important neurotransmitter, acetylcholine. Neurotransmitters are chemicals that react with other neurons in the body, which regulate the heart and other organs. In the summer of 1972, she found her next project, the search for opiate receptors. Opiate receptors were believed to exist, but trying to find them was another task. Using technology borrowed from identifying insulin receptors, Pert used radioactive drugs to identify receptor molecules that bonded with morphine and other opiate drugs in animal brain cells. She went on to investigate whether opiate receptors developed before birth. She used pregnant rats to evaluate the brains of the fetuses and found out that the opiate receptors were present during the fetal development. Pert and her coworkers wondered why opiate receptors existed. The scientist thought that there mig...

Friday, November 22, 2019

Symbiogenesis - An Evolution Definition

Symbiogenesis - An Evolution Definition Symbiogenesis  is an evolution term that relates to the cooperation between species in order to increase their survival. The crux of the theory of natural selection, as laid out by the â€Å"Father of Evolution† Charles Darwin, is competition. Mostly, he focused on competition between individuals of a population within the same species for survival. Those with the most favorable adaptations could compete better for things like food, shelter, and mates with which to reproduce and make the next generation of offspring that would carry those traits in their DNA. Darwinism relies on competition for these sorts of resources in order for natural selection to work. Without competition, all individuals would be able to survive and the favorable adaptations will never be selected for by pressures within the environment. This sort of competition can also be applied to the idea of coevolution of species. The usual example of coevolution typically deals with a predator and prey relationship. As the prey get faster and run away from the predator, natural selection will kick in and select an adaptation that is more favorable to the predator. These adaptations could be the predators becoming faster themselves to keep up with the prey, or maybe the traits that would be more favorable would have to do with the predators becoming stealthier so they can better stalk and ambush their prey. Competition with other individuals of that species for the food will drive the rate of this evolution. However, other evolutionary scientists assert that it is actually cooperation between individuals and not always competition that drives evolution. This hypothesis is known as symbiogenesis. Breaking down the word symbiogenesis into parts gives a clue as to the meaning. The prefix sym means to bring together. Bio of course means life and genesis is to create or to produce. Therefore, we can conclude that symbiogenesis means to bring individuals together in order to create life. This would rely on cooperation of individuals instead of competition to drive natural selection and ultimately the rate of evolution. Perhaps the best known example of symbiogenesis is the similarly named Endosymbiotic Theory popularized by evolutionary scientist Lynn Margulis. This explanation of how eukaryotic cells evolved from prokaryotic cells is the currently accepted theory in science. Instead of competition, various prokaryotic organisms worked together to create a more stable life for all involved. A larger prokaryote engulfed smaller prokaryotes that became what we now know as various important organelles within a eukaryotic cell. Prokaryotes similar to cyanobacteria became the chloroplast in photosynthetic organisms and other prokaryotes would go on to become mitochondria where ATP energy is produced in the eukaryotic cell. This cooperation drove the evolution of eukaryotes through cooperation and not competition. It is most likely a combination of both competition and cooperation that fully drive the rate of evolution through natural selection. While some species, such as humans, can cooperate to make life easier for the entire species so it can thrive and survive, others, such as different types of non-colonial bacteria, go it on their own and only compete with other individuals for survival. Social evolution plays a large part in deciding whether or not cooperation will work for a group which would in turn reduce the competition between individuals. However, species will continue to change over time via natural selection no matter if it is through cooperation or competition. Understanding why different individuals within species choose one or the other as their primary way of operating may help deepen the knowledge of evolution and how it occurs over long periods of time.

Thursday, November 21, 2019

Colonialism and African Culture in 19-20th Centuries Essay

Colonialism and African Culture in 19-20th Centuries - Essay Example Conrad outlines a European perspective on African colonialism in the story Heart of Darkness contained in the book Bedford Anthology of World Literature. The story of Heart of Darkness is based on Charles Marlowe, who spends his life as an ivory transporter in along the Congo River. He is a captain and is saddened when he passes the land areas and from afar, he could see black men working hard while under watch by armed men. He comes to hear of Kutz and thinks he is an icon. Later he realizes that Mr Kutz is a hoax; he is engaged in human treaties as opposed to Marlow’s ivory transporter job. Contrary to Marlow’s expectation, he obtains one of Kutz letters written: â€Å"exterminate the brutes.† Kutz was an agent who was gathering information for Europe. Every time Marlow would come near the shore, the pilgrim would open fire, but with the sound of his steamer and this would make them stop opening fire. (Davis et al, 18). Marlow finds Kutz letters when he dies. H e takes it upon himself to deliver them while still hiding some of the information back to his family and friends. To his fiancà ©e, there was a note written â€Å"to my intended† but he tells her that Kutz last words were her name. The company that employed both Kutz and Marlow had its interest focused on the whereabouts of ivory (Davis et al, 14). On the other hand, African culture and responses are evident in Africa through the story of Things Fall Apart by Chinua Achebe in the book Bedford Anthology of World Literature. The story stars a leader known as Okwonko. He was the well-bodied leader who was the local wrestling champion in the village. The book concentrates on the influence of British colonialism and comparison against the African culture. The text also covers Christianity and the effects it brought to the people of Igbo community.  Okwonko is a leader who tries to cover his weaknesses and at all cost tries to avoid succumbing to his father’s fate.     

Tuesday, November 19, 2019

SWOT Term Paper Example | Topics and Well Written Essays - 1500 words

SWOT - Term Paper Example These propel its service provisions to its customers. 2) It lacks of diversification and product differentiation. The company operates mostly in the United States where it is majorly based. Local retailers acquired its stores both in Europe and in the Middle East including Australia. 1) The company has greater prospects of growth since customers are highly willing to make online orders and purchases. The company is among the first to install online operation programs for its customers hence prospects of growth since they offer this opportunity to a wide client base. 3) The ever-increasing expenditure on general consumer products and services. BBB operates many retail outlets and the revenue from the outlets summed up contributes significantly to the firm’s total revenue. 1) The constantly increasing attention of the government toward the environmental practices and issues of companies and how they handle such issues. One should bear in mind that BBB Corporation already had trouble with watchdog because of its poor waste management procedures. 4) The constant and consistent technological improvement in the management of business operations where tasks are to a very small extent handled manually, most operations are mechanized hence efficiency and effectiveness. Internal analysis involves a keen analysis of the major functions of the organization, its abilities as compared to those of the competitors. In its efforts to achieve competitive edge and marketability of its operations, BBB has decided to modernize its operations (www.newyork.bbb.org/). These are conducted in its efforts to encourage and support best market practices while celebrating being a model given it is one among the few to initiate online transactions. BBB operates its internal operations based on trust and this has enabled it earn accreditations, awards which not any other company is eligible for in the United States. The internal cores and operations of BBB are

Saturday, November 16, 2019

Family Relationship in Movie the Descendant Essay Example for Free

Family Relationship in Movie the Descendant Essay The King’s family depicted in the movie â€Å"The Descendant† reflects the family live style and dynamic in many of the typical middle income families. The core values that the King’s family fostering, such as love the nature, honest to each other and the united of the family, are in rooted with their heritage as the Hawaiian. The tragic incident of the main character Matt King’s wife Elizabeth provides an opportunity for Matt to review his relationship with his seventeen-years-old daughter Alexandra and ten-year-old daughter Scottie. During the coma of Elizabeth, Matt learned how to be a real father. He is growing with his daughters and building a strong relationship within his family. The author believes the King’s family in this movie set an adequate role model for families to learn how to reestablish a dysfunctional family to a healthy family. Primary Relationships Matt King is a lawyer specialized in real estate transaction. He is also a sole trustee of 25,000 aces of Kauai virgin land passed from his ancestor. He lives with his wife Elizabeth, older daughter Alexandra, who is 17 years old and a younger daughter Scottie, who is 10 years old in Hawaii. Matt is too concentrated to his work. He has very little time to be with his family members. He neglected his wife, he has not seriously talk to his wife for years, in fact, he hasnt talk to his wife three days before she had the boating accident and dying in the hospital. He doesn’t involve much with his daughters; he thinks that taking care of the daughter is her wifes responsibility. Since Matt hardly has time to Elizabeth, she has spend many her time in playing motor boat racing; parting with her friends, and heavily drinking. Until 23 days ago, she had an accident on her boat which was driving by her friend. Alexandra is in a boarding school because her parents want to discipline her with alcoholic and dating with older man issues. She loves her family members, however, she refused to talk to her mother after last Christmas because she found out that Elizabeth was dating another man, and she was angry with her for betraying her marriage. Scottie was a lost young girl. She has difficulty to make friends at school; she often uses inappropriate body language and profanity language when talking with people during she was angry. She likes to put on Alexandras under dress to express her eagerness of being a big girl. All the behavior of Scottie is try to get peoples attention. She wants people to care of her feeling and interact with her more. She revealed that all the behaviors and languages were learned from Alexandra. Scott is Elizabeths father. He loves Elizabeth dearly. In his eye, Elizabeth is a strong and thoughtful girl; she devoted one hundred percent to her family; and takes good care of the daughters. No one can compare with her, even the granddaughters. Familys Developmental Stage Kings family was living in a nuclear family with adolescent girl and young girl before the wife, Elizabeth was comatose. The absent of mother in the family, turned Matt, the father from a backup parent to in charge. The daughters have to adapt their fathers new role and live with a single parent; while all of the family members have to accept the death of Elizabeth. Before Elizabeth was hospitalized, this family was a dysfunctional family already. With Elizabeth alcoholism and life risk motorboat racing hobby, workaholic Matt, alcoholic recovery Alexandra, and left alone Scottie; the family was in the movement of centrifugal. It seems that Matt and Elizabeth did not have a parents system in the family. They did not set the clear boundaries to their daughters. Their daughters do not respect them and they do not have authorities. When Matt started to take charge of the family, he self-examination the familys development, and decided to change from a distance father to be a caring father. He constantly reminding his daughters to use the appropriated language and talking with people with respect, event the mother was not able to listen, they still need to talk to her the was to pay their respect. He draws a very clear boundary for their daughter of being respect to parents and grandparents. The family crisis of losing the mother provided a chance for them to be more closed to each other. Alexandra reflected from Scotties behavior and started to be a better role model for her young sister; she is lso a main support for her father to recover from the hurtful feeling of wifes infidelity, and defending her grandpas incorrect accusation of her father treating her mother. Scotties behavior is getting less dramatic. Matt and Alexandra spend time with her and educate her about selecting the right friend and avoid the bad influence her friends. Without the mother in their life, the structure of the family changed. Alexandra alliance with the father and they make the family reac ted to the crisis more positive and reduced the negative impact to the minimum. The family slowly moves toward the centripetal. Familys style of communication The family had a poor communication system before the tragic incident of Elizabeth. Matt neglects her wife; he had not talked with her for three days before the comatose and had not talked with her for serious matter for ten years. Matt also not communicate with his daughters well neither. He did not talk with her younger daughter since she was three years old. When Matt and Elizabeth found out the problem of her older daughter, they put her in boarding school. There were frequent verbal fighting in the family; Matt with Elizabeth, Elizabeth with Alexandra, and Alexandra with Scottie; for the issues of what they want. When Matt took charge of the family during Elizabeth was hospitalized, he often gave order to the daughters and the daughters often ignored him and kept to do things their way. At the last stage of the movie, the family life cycle has changed and they must to learn how to communicate better in order to live in a functional and health family. The non-verbal communication style in the last scent indicated that they are moving toward that direction. Strengths, Weakness and Clinical Problems The strength of the family is they love each others; they treasure the family as a whole and against anyone who try to break their unity. The weakness of the family is they lack of communication skill, they don’t devote enough time to each other as a family. Matt and Elizabeth have challenge on parenting their daughters. Matt complaining Elizabeth for not being a good role model and Elizabeth complaining Matt for neglecting her and the daughters only bought the high tension in the family, but not solve the problem. The couple has marriage issue and Matt may better take Elizabeths advice to seek professional help together. For their daughters behavior issues, they could go to family counseling together. Matt was being accused by Elizabeth about his out of touch of his own feeling; he could talk to the therapist how to feel about this accusation. Therapist could help Elizabeth find a better way to handle the drinking issue and the feeling of being neglect by Matt. Therapist could discuss with Alexandra what is the underneath cause to her drinking problem and wanted to data the older person. Therapist could talk to Scottie and help her to see the cost and benefit of using profanity language and inappropriate body language. As a whole family, therapist could guide them using effective language to address their concerns and avoid any angry complains. Have each of the family members to agree on getting a regular family time to bond their relationship. Relevant Gender Concerns Matt and Elizabeth were growing up in the Hawaii, and Matt has the blood of the indigenous royalty of Hawaii. The met in the law school and established their family later. The only relevant cultural concern would be the male supremacy. This reflected from the Elizabeth who had to stay home to take care of the daughters with a law degree, but Matt is devoted hundred percent of his effort and time to his law firm. Conclusion In the family development, it is normal to have family structure change and experience some different degree of family crisis. Some families can survive from the change or crisis; they adapt the new situation and move on to form a healthy family relationship. Some families cannot sustain the impact of the change or crisis; they fell apart and each of them develop a different kind of symptoms and hard to stay as a family anymore. With Kings family illustration, the author believes, if every family members willing to take their responsibilities, setting a goal for helping each other to living a better life, remaining family unity and love each other as their core value, having effective strategies, such as making clean boundaries from parent to children and making new alliance to a subsystem, then, such family will be not only survive but evolve from the crisis and living in a much healthier and functional family.

Thursday, November 14, 2019

Everyman :: essays papers

Everyman The play â€Å"Everyman† is about a complacent Everyman who is informed by Death of his approaching end. The play shows the hero’s progression from despair and fear of death to a â€Å"Christian resignation that is the prelude to redemption.† Throughout the play Everyman is deserted by things that he thought were of great importance portrayed by characters that take the names of the things they represent. Throughout the play Everyman asks the characters to accompany him on his journey to death. He starts with Fellowship, his friends, who promises to go with him until they are informed of the destination. They desert Everyman at that point. He calls upon people who are closer to him, Kindred and Cousin, his kinsmen. They also promise to â€Å"live and die together,† but, when asked to accompany Everyman, they remind of the things he never did for them and desert him. Everyman then calls upon Goods, his material possessions. Goods explains to him that they cannot go on the journey with him, so he is once again deserted. Good Deeds then gets called upon. They say that even though they want to go on the journey, they are unable to at the moment. They advise Everyman to speak to Knowledge. Knowledge is the one that brings Everyman on the journey to cleanse himself. They first go to Confession, which gives him a penance. Once he does his penance, Good Deeds is able to rise from th e ground. They then call upon Discretion, Strength, Five Wits, and Beauty. At first they follow him on his journey, but when they approach his grave they race away as fast as they can. When he finally sinks into his grave, the only one that accompanies him is Good Deeds.

Monday, November 11, 2019

Changes in Business Environment

Anyone who is familiar with the major organizations in their area probably has observed firsthand how dramatically the business environment has changed in recent years. These changes have had a significant impact on organizational efforts to be successful. In practically every instance organizations have tried to more clearly identify and then focus on factors that impact their success. One factor that seems to be receiving more attention than any other are the people who work for organizations. What organizations are realizing is that their likelihood of sustained success is most dependent on learning to get the maximum out of their employees. Such a realization has had a significant impact on the practice of human resources management (HRM). What's more, business forecasters predict that the role of employees, managers, and HRM personnel are likely to see more changes in the decades ahead. Thus, individuals entering the business environment today (and tomorrow) require both an understanding of the importance of human resources and effective HRM to organizational success. As we move further into the twenty-first century, it's becoming absolutely clear that the effective management of an organization's human resources is a major source of competitive advantage and may even be the single most important determinant of an organization's performance over the long term. Organizations have started to realize that their success is dependent on their ability to attract, develop, and retain talented employees. Robert Reich emphasizes this point when he suggests that in the future, the organization's ability to attract, develop, and retain a talented workforce will be a critical factor in developing a high-performance organization. The long-term, sustained success of an organization in today's changing and challenging business environment involves top management's commitment to designing and implementing HRM programs geared to developing both high-performing employees and organizations. This means that top management anticipates the future need for employees and develops specific plans to obtain, develop, and retain the type of employees who meet the needs of a high-performing organization. Only by anticipating and working toward the development and retention of the right type of employees can any organization expect to be successful in a global, dynamic, and continuously changing competitive environment. An important element of organizational success is an HRM strategy where every manager is an HRM manager. For example, every manager must be expected to set goals for the development and satisfaction of employees. Second, every employee is viewed as a valuable resource, just like buildings and equipment. The organization's success is dependent upon high-performing employees, and without such employees there is no competitive advantage for the organization. Finally, through effective HRM programs the organization's goals are successfully integrated with individual employee needs. It is the thesis of this paper that HRM will continue to be an important element in achieving organizational success in the years to come. What makes one organization successful whereas another fails to make use of the same opportunities? For our purposes, the key to continued survival and organizational success lies not in the rational, quantitative approaches, but increasingly in a commitment to things like people, employee involvement, and commitment. Success for the organizations of today and tomorrow is being increasingly seen as dependent on effective HRM. Effective HRM positively affects performance in organizations, both large and small. Human resources management is the term increasingly used to refer to the philosophy, policies, procedures, and practices related to the management of an organization's employees. While a great deal of research has been devoted to identifying the sources of workplace stress and its links to adverse health and organizational outcomes, little has been done to focus on interventions to improve working environments. In reviewing the practice overall of stress prevention and intervention at the workplace, three conclusions may be drawn. First, although there is a considerable amount of activity in the field of stress management, â€Å"it is disproportionally concentrated on reducing the effects of stress, rather than reducing the presence of stressors at work. † (Kahn & Byosiere, 1992) To put it differently, stress management activities focus on secondary and tertiary prevention, rather than primary prevention. Whereas the latter involves interventions aimed at eliminating, reducing or altering stressors in the working situation, the former two are aimed at the effects of stress, with secondary prevention concerning the helping of employees (who are already showing signs of stress) from getting sick (for example, by increasing their coping capacity); and tertiary prevention concerning treatment activities for employees with serious stress-related health problems (for example, stress counseling/employee assistance programmers, the rehabilitation after long-term absenteeism). Second, most activities are primarily aimed at the individual rather than at the workplace or the organization, in other words, a worker-oriented approach, for instance, by improving employees' skills to manage, resist or reduce stress, as opposed to a job or organization-oriented approach, for instance, by job redesign or in some way changing the corporate culture or management style. Moreover, as Kahn and Byosiere (1992) conclude in their literature review: ‘Even the programs that aim at stress inhibition tend to address subjective rather than objective aspects of the stress sequence; almost none consider the organizational antecedents (policy and structure) that intensify or reduce the presence of objective stressors' (p. 633). A third peculiarity in the practice of stress prevention concerns the lack of a systematic risk assessment (‘stress audit', identifying risk factors and risk groups) as well as of serious research into the effects of all these activities (Kahn and Byosiere, 1992). In the words of Kahn and Byosiere (1992): ‘The programs in stress management that are sold to companies show a suspicious pattern of variance; they differ more by practitioner than by company. When practitioners in any field offer sovereign remedies regardless of the presenting symptoms, patients should be wary' (p. 23). Against the background of (1) clear evidence of the relationship between psychosocial work characteristics and health , (2) national and international legislation that put the emphasis on risk assessment and combating risks by changing the stressful situation, and (3) the basic idea of prevention, that is, eliminating the stress producing situation (prevention at the source), the current practice of stress prevention and intervention seems disappointing. Given the current status of stress prevention, a question that deserves attention is why it is that companies express a preference for ‘post hoc' individual-directed interventions, as opposed to primary or job/organizational interventions. At least four factors seem to contribute to this rather one-sided ‘individual'-oriented approach : 1 Senior managers are often inclined to blame personality and lifestyle factors of employees who are absent from work or report health complaints, rather than the job or organizational factors, for which they are responsible. Senior management also often point to the potential role of stressful life events (family problems such as a divorce or the loss of a beloved), or responsibilities and obligations in the family life (raising children for example). Of course, on the micro-level (i. e. on the level of the individual employee) stressors at work are often accompanied by stressors in one's family situation, but because of the mutual influence and spill-over between both domains, the causes and consequences can hardly be disentangled. Furthermore, holding individual characteristics responsible for differences in experienced stress, one cannot explain why some occupations show significantly more stress complaints and higher sickness absence rates than others. A risk attached to this view is that the employee is regarded as being ‘guilty' of his or her own health problems, that is ‘blaming the victim', with the potential threat in the workplace being overlooked. 2 The second reason may be found in the nature of psychology itself, with its emphasis on subjective and individual phenomena. Many psychology-oriented stress researchers are primarily interested in stress as a subjective and individual phenomenon. To some extent, this may be a legacy of the strong tradition in psychology to focus on individual differences (i. e. differential psychology), and on individual counseling and therapy (i. e. clinical psychology). In this context, a warning seems appropriate against ‘psychologism', that is, the explanation of (a sequence of) societal events from an individual-psychic point of view. Because of this orientation, the potential impact of more ‘objective' or ‘collective' risk factors in the work situation (e. . poor management, work-overload and bullying), may go unnoticed and untreated. In stress research, there is a gap between what ‘theory' preaches (that is, properly designed longitudinal studies, involving a randomized control group, collecting both subjective and objective measures that are analyzed properly with statistical techniques), and what is possible in practice. One of the main reasons for this gap is the difficulty of conducting methodological ‘sound' interventions and evaluation studies in an ever-changing organizational environment. In the 1990s, not only the context of work is rapidly changing, but also ‘work' itself. Work organizations are in a constant state of change, due, in part, to new production concepts (for example, team based work, lean production methods, telework), ‘the flexible workforce' concept, the 24-hour economy, the increased utilization of information technology, and the changing structure of the work force (for example, more women working). These changes clearly affect the work behavior of employees, work group processes, as well as the organizational structure and culture. As a consequence, it is practically impossible to find two companies with comparable stress problems at the beginning of any intervention programme, of which the control company agrees not to undertake any action for a period of three or four years (the period a researcher might like to choose for an intervention project). A related problem is that it is often not in a company's interest to facilitate ‘sound scientific research' in the context of an ongoing business, involving interlopers from outside (i. e. researchers) and detailed data collection on the scene of sometimes confidential information. Senior managers can regard research of this kind as a nuisance to the primary organizational processes and objectives. 4 A fourth factor may be found in the discipline segregation within stress research, with a tendency of researching to neglect the collection of more objective data on the impact of stress and its prevention. Work and organizational psychologists concentrate primarily on ‘soft' outcome variables (e. g. motivation, satisfaction, effect and health complaints), and are well-known for their questionnaire-oriented approach. Traditionally, it has been observed that stress researchers are reluctant to co-operate with economists. For instance in order to study the potential ‘hard' outcome measures (that would include productivity, sickness absence rates and accident rates), as well as the financial effects of interventions. To put it differently, a history of gaining empirical insight in costs and benefits is merely lacking in stress research. Research in the field should in the future include some of the following: first, stress researchers should not only address ‘soft' outcome variables (for example, motivation and satisfaction), but extend their focus to also include ‘hard' outcome variables (for example, productivity and sickness absenteeism). Whereas work and organizational psychologists have often stated that an adequate stress prevention programme may positively affect productivity and sickness absenteeism, until now they have not laid down a sufficiently strong empirical foundation for this position. For too long, stress prevention advocates have based their arguments on a moral or humanistic appeal to the good employer (that is, on ‘industrial charity'), or on legal regulations (for example, working conditions legislation). It is beyond doubt that these are important and strong arguments. Still, it may well be that they are not enough, since these arguments are not those that primarily affect senior management, who are more ‘bottom line' driven. Second, in order to increase the impact of stress prevention in the workplace, more emphasis should be placed on such factors as the quality of product and services, organizational flexibility, continuity, absenteeism, productivity, labor market facets and improved competitivity; and for there to be a multi-disciplinary approach rather than the traditional mono-disciplinary one (for example, co-operation with economists and ergonomists). And finally, the demonstration of examples of good preventive practice is considered as a sine qua non for developing effective stress prevention procedures and for the involvement of both social partners in this field (i. e. employers and employees). Stress has always been a topic of concern for business and industry. Health educators, in response to this concern, have offered a variety of stress management or stress reduction programs. However, McGehee points out that her discussion is not about what stress is or how stress can be managed or the latest research in stress management. The literature on these topics is profuse and easy to locate. Rather, she is concerned with the nature of stress management programs inside companies that have decided to make stress management a part of their employee development. Her discussion includes the reason behind a management program, the format of stress management programs, the selection of a stress management program, work issues and stress management, and the management of the stress response. Although stress has been a constant concern, a serious and growing problem in industry today is burnout. Klarreich relates his health education program on burnout, which was extremely well received in his organization. He describes the nature of burnout, the myths associated with this phenomenon, and the societal and familial influences that contribute to this problem. He delineates a number of steps to â€Å"put out the fire. † These include self-appraisal, alteration of expectations, communication to establish social support, and determination of a behavioral option. He indicates that the healthy employee of the future will be a â€Å"hardy employee. † Achieving excellence in the workplace has become the passion of most North American corporations. Pulvermacher presents a unique health education program, which he delivers as a workshop, to many corporate employees. He states that pursuing excellence requires the application of several fundamental skills. He reviews effective goal setting strategies, methods for avoiding the trap of perfectionism, techniques for managing self-defeating attitudes and beliefs, harnessing stress advantageously, increasing one's self-discipline, managing conflict constructively, and communicating effectively. A variety of reasons for implementing stress management programs are ascribed to by the companies currently doing so. The major reasons include reducing health costs, improving productivity, and boosting employee morale. In many cases, stress management is part of a wellness program. Stress-related disorders, including certain headaches, stomach disorders, chronic muscular pain, cardiac and respiratory conditions, and psychosomatic complaints have been linked to a large percentage of doctor's office visits and hospital tests and admissions. One goal of stress management programs is to provide alternate ways to respond to stress, to prevent potential disorders, and ultimately to reduce health costs. Stress level has been found to be linked to worker productivity. At moderate amounts of stress, performance is at its highest. Stress in moderate amounts, such as from reasonable deadlines, a focus on quality, rational performance rating systems, a system of accountability, often motivates performance. When stress rises to higher levels and a number of stressors are affecting the individual, performance deteriorates. At times of high stress, an individual is not as effective in solving problems, and on-the-job performance is negatively affected. The goal of stress management programs in this case is to provide ways in which employees can cope better with increasing stress and continue to perform well on the job. Stress management programs are usually popular with employees. Attendance at talks and workshops shows that the topic is a popular one. Many companies decide to implement these programs as morale boosters because they â€Å"can't hurt anything. † Stress management has become an integral part of most preventive medicine programs. These programs attempt to include education and training in a variety of ways so that the employees can safeguard their health.

Saturday, November 9, 2019

The Laws of Cyberspace – Lawrence Lessig

The Laws of Cyberspace Lawrence Lessig †  Draft 3  ©Lessig 1998: This essay was presented at the Taiwan Net ’98 conference, in Taipei, March, 1998. †  Jack N. and Lillian R. Berkman Professor for Entrepreneurial Legal Stud- ies, Harvard Law School. Thanks to Tim Wu for extremely helpful comments on an earlier draft. Lessig: The Laws of Cyberspace Draft: April 3, 1998 Before the revolution, the Tsar in Russia had a system of internal passports. The people hated this system. These passports marked the estate from which you came, and this marking determined the places you could go, with whom you could associate, what you could be.The passports were badges that granted access, or barred access. They controlled what in the Russian state Russians could come to know. The Bolsheviks promised to change all this. They promised to abolish the internal passports. And soon upon their rise to power, they did just that. Russians were again free to travel where they wished. Where they could go was not determined by some document that they were required to carry with them. The abolition of the internal passport symbolized freedom for the Russian people — a democratization of citizenship in Russia. This freedom, however, was not to last.A decade and a half later, faced with the prospect of starving peasants flooding the cities looking for food, Stalin brought back the system of internal passports. Peasants were again tied to their rural land (a restriction that remained throughout the 1970s). Russians were once again restricted by what their passport permitted. Once again, to gain access to Russia, Russians had to show something about who they were. *** Behavior in the real world — this world, the world in which I am now speaking — is regulated by four sorts of constraints. Law is just one of those four constraints.Law regulates by sanctions imposed ex post — fail to pay your taxes, and you are likely to go to jail; steal my car, an d you are also likely to go to jail. Law is the prominent of regulators. But it is just one of four. Social norms are a second. They also regulate. Social norms — understandings or expectations about how I ought to behave, enforced not through some centralized norm enforcer, but rather through the understandings and expectations of just about everyone within a particular community — direct and constrain my behavior in a far wider array of contexts than any law.Norms say what clothes I will wear — a suit, not a dress; they tell you to sit quietly, and politely, for at least 40 minutes while I speak; they or- 2 Lessig: The Laws of Cyberspace Draft: April 3, 1998 ganize how we will interact after this talk is over. Norms guide behavior; in this sense, they function as a second regulatory constraint. The market is a third constraint. It regulates by price. The market limits the amount that I can spend on clothes; or the amount I can make from public speeches; it say s I can command less for my writing than Madonna, or less from my singing than Pavarotti.Through the device of price, the market sets my opportunities, and through this range of opportunities, it regulates. And finally, there is the constraint of what some might call nature, but which I want to call â€Å"architecture. † This is the constraint of the world as I find it, even if this world as I find it is a world that others have made. That I cannot see through that wall is a constraint on my ability to know what is happening on the other side of the room. That there is no access-ramp to a library constrains the access of one bound to a wheelchair.These constraints, in the sense I mean here, regulate. To understand a regulation then we must understand the sum of these four constraints operating together. Any one alone cannot represent the effect of the four together. *** This is the age of the cyber-libertarian. It is a time when a certain hype about cyberspace has caught on. The hype goes like this: Cyberspace is unavoidable, and yet cyberspace is unregulable. No nation can live without it, yet no nation will be able to control behavior in it. Cyberspace is that place where individuals are, inherently, free from the control of real space sovereigns.It is, in the words of James Boyle, the great techno-â€Å"gotcha† — nations of the world, you can’t live with out it, but nations of the world, when you’ve got it, you won’t live long with it. My aim today is a different view about cyberspace. My aim is to attack this hype. For in my view, the world we are entering is not a world of perpetual freedom; or more precisely, the world we are entering is not a world where freedom is assured. Cyberspace has the potential to be the most fully, and extensively, regulated space that we have ever known — anywhere, at any time in our history.It has the potential to be the antithesis of a space of freedom. And unless we understan d this potential, unless we see how this might be, we are likely to sleep through this transition from freedom into 3 Lessig: The Laws of Cyberspace Draft: April 3, 1998 control. For that, in my view, is the transition we are seeing just now. Now I want to make this argument by using the two introductions that I began with today — the story about Bolshevik Russia, and the idea about regulation. For they together will suggest where cyberspace is going, and more importantly, just how we can expect cyberspace to get there.First the idea: Just as in real space, behavior in cyberspace is regulated by four sorts of constraints. Law is just one of those constraints. For the hype notwithstanding, there is law just now in cyberspace — copyright law, or defamation law, or sexual harassment law, all of which constrain behavior in cyberspace in the same way that they constrain behavior in real space. There are also, perhaps quite surprisingly, norms in cyberspace — rules th at govern behavior, and expose individuals to sanction from others.They too function in cyberspace as norms function in real space, threatening punishments ex post by a community. And so too with the market. The market constrains in cyberspace, just as in real space. Change the price of access, the constraints on access differ. Change the structure of pricing access, and the regulation of marginal access shifts dramatically as well. But for our purposes, the most significant of these four constraints on behavior in cyberspace is the analog to what I called architecture in real space: This I will call code.By code, I simply mean the software and hardware that constitutes cyberspace as it is—the set of protocols, the set of rules, implemented, or codified, in the software of cyberspace itself, that determine how people interact, or exist, in this space. This code, like architecture in real space, sets the terms upon which I enter, or exist in cyberspace. It, like architecture, is not optional. I don’t choose whether to obey the structures that it establishes — hackers might choose, but hackers are special. For the rest of us, life in cyberspace is subject to the code, just as life in real space is subject to the architectures of real space.The substance of the constraints of code in cyberspace vary. But how they are experienced does not vary. In some places, one must enter a password before one gains access; in other places, one can enter whether identified or not. In some places, the transactions that one engages produce traces that link the transactions 4 Lessig: The Laws of Cyberspace Draft: April 3, 1998 back to the individual; in other places, this link is achieved only if the individual chooses. In some places, one can select to speak a language that only the recipient can hear (through encryption); in other places, encryption is not an option.The differences are constituted by the code of these different places. The code or software o r architecture or protocols of these spaces set these features; they are features selected by code writers; they constrain some behavior by making other behavior possible. And in this sense, they, like architecture in real space, regulate behavior in cyberspace. Code and market and norms and law together regulate in cyberspace then as architecture and market and norms and law regulate in real space. And my claim is that as with real space regulation, we should consider how these four constraints operate together.An example — a contrast between a regulation in real space, and the same regulation in cyberspace — will make the point more clearly. Think about the concern in my country (some might call it obsession) with the regulation of indecency on the net. This concern took off in the United State early in 1995. Its source was an extraordinary rise in ordinary users of the net, and therefore a rise in use by kids, and an even more extraordinary rise in the availability of what many call â€Å"porn† on the net. An extremely controversial (and fundamentally flawed) study published in the Georgetown University Law Review reported the net awash in porn.Time and Newsweek both ran cover stories articles about its availability. And senators and congressmen were bombarded with demands to do something to regulate â€Å"cybersmut. † No doubt the fury at the time was great. But one might ask, why this fury was so great about porn in cyberspace. Certainly, more porn exists in real space than in cyberspace. So why the fury about access to porn in a place to which most kids don’t have access? To understand the why, think for a second about the same problem as it exists in real space. What regulates the distribution of porn in real space?First: In America, laws in real space regulate the distribution of porn to kids— laws requiring sellers of porn to check the age of 5 Lessig: The Laws of Cyberspace Draft: April 3, 1998 buyers, or law s requiring that sellers locate in a section of the city likely to be far from kids. But laws are not the most significant of the constraints on the distribution of porn to kids. More important than laws are norms. Norms constrain adults not to sell porn to kids. Even among porn distributors this restriction is relatively effective. And not just social norms.The market too, for porn costs money, and as kids have no money. But the most important real space constraint is what I’ve called architecture. For all of these other regulations in real space depend on this constraint of architecture. Laws and norms and market can discriminate against kinds in real space, since it is hard in real space to hide that you are a kid. Of course, a kid can don a mustache, and put on stilts, and try to enter a porn shop to buy porn. But for the most part, disguises will fail. For the most part, it will be too hard to hide that he is a kid.Thus, for the most part, constraints based on being a ki d are constraints that can be effective. Cyberspace is different. For even if we assume that the same laws apply to cyberspace as to real space, and even if we assume that the constraints of norms and the market carried over as well, even so, there remains a critical difference between the two spaces. For while in real space it is hard to hide that you are a kid, in cyberspace, hiding who you are, or more precisely, hiding features about who you are is the simplest thing in the world. The default in cyberspace is anonymity.And because it is so easy to hide who one is, it is practically impossible for the laws, and norms, to apply in cyberspace. For for these laws to apply, one has to know that it is a kid one is dealing with. But the architecture of the space simply doesn’t provide this information. Now the important point is to see the difference, and to identify its source. The difference is a difference in what I want to call the regulability of cyberspace — the abi lity of governments to regulate behavior there. As it is just now, cyberspace is a less regulable space than real space. There is less that government can do.The source of this difference in regulability is a difference in the architecture of the space — a difference in the code that constitutes cyberspace as it is. Its architecture, my claim is, renders it essentially unregulable. 6 Lessig: The Laws of Cyberspace Draft: April 3, 1998 Or so it did in 1995, and in 1996, when the U. S. Congress eventually got around to passing its attempt to deal with this problem—the Communications Decency Act. I’m going to talk a bit about what happened to that statute, but I first want to mark this period, and set it off from where we are today.It was the architecture of cyberspace in 1995, and 1996 that made it essentially unregulable. Let’s call that architecture Net 95 — as in 1995 — and here are its features: So long as one had access to Net95, one coul d roam without identifying who one was. Net95 was Bolshevik Russia. One’s identity, or features, were invisible to the net then, so one could enter, and explore, without credentials—without an internal passport. Access was open and universal, not conditioned upon credentials. It was, in a narrow sense of the term, an extraordinary democratic moment. Users were fundamentally equal.Essentially free. It was against this background — against the background of the net as it was — Net95 — that the Supreme Court then considered the Communications Decency Act. Two lower courts had struck the statute as a violation of the right to freedom of speech. And as millions watched as the court considered arguments on the case — watched in cyberspace, as the arguments were reported, and debated, and critiqued. And in June, last year, the Court affirmed the decision of the lower courts, holding the statute unconstitutional. Just why it was unconstitutional isn ’t so important for our purposes here.What is important is the rhetoric that lead the court to its conclusion. For the decision hung crucially on claims about the architecture of the net as it was — on the architecture, that is, of Net95. Given that architecture, the court concluded, any regulation that attempted to zone kids from porn would be a regulation that was too burdensome on speakers and listeners. As the net was, regulation would be too burdensome. But what was significant was that the court spoke as if this architecture of the net as it was — Net 95 — was the only architecture that the net could have.It spoke as if it had discovered the nature of the net, and was therefore deciding the nature of any possible regulation of the net. 7 Lessig: The Laws of Cyberspace Draft: April 3, 1998 But the problem with all this, of course, is that the net has no nature. There is no single architecture that is essential to the net’s design. Net95 is a s et of features, or protocols, that constituted the net at one period of time. But nothing requires that these features, or protocols, always constitute the net as it always will be.And indeed, nothing in what we’ve seen in the last 2 years should lead us to think that it will. An example may make the point more simply. Before I was a professor at Harvard, I taught at the University of Chicago. If one wanted to gain access to the net at the university of Chicago, one simply connected one’s machine to jacks located throughout the university. Any machine could be connected to those jacks, and once connected, any machine would then have full access to the internet. Access was anonymous, and complete, and free. The reason for this freedom was a decision by the administration.For the Provost of the University of Chicago is Geof Stone, a former dean of the University of Chicago Law School, and a prominent free speech scholar. When the University was designing its net, the tec hnicians asked the provost whether anonymous communication should be permitted. The provost, citing a principle that the rules regulating speech at the university would be as protective of free speech as the first amendment, said yes: One would have the right to communicate at the university anonymously, because the first amendment to the constitution would guarantee the same right vis-a-vis the government.From that policy decision flowed the architectural design of the University of Chicago’s net. At Harvard, the rules are different. One cannot connect one’s machine to the net at Harvard unless one’s machine is registered — licensed, approved, verified. Only members of the university community can register their machine. Once registered, all interactions with the network are potentially monitored, and identified to a particular machine. Indeed, anonymous speech on this net is not permitted — against the rule. Access can be controlled based on who someone is; and interaction can be traced, based on what someone did.The reason for this design is also due to the decision of an administrator — though this time an administrator less focused on the protections of the first amendment. Controlling access is the ideal at Harvard; facilitating access was the ideal at Chicago; tech- 8 Lessig: The Laws of Cyberspace Draft: April 3, 1998 nologies that make control possible were therefore chosen at Harvard; technologies that facilitate access chosen at Chicago. Now this difference between the two networks is quite common today. The network at the University of Chicago is the architecture of the internet in 1995.It is, again, Net95. But the architecture at Harvard is not an internet architecture. It is rather an intranet architecture. The difference is simply this — that within an intranet, identity is sufficiently established such that access can be controlled, and usage monitored. The underlying protocols are still TCP/IP à ¢â‚¬â€ meaning the fundamental or underlying protocols of the internet. But layered on top of this fundamental protocol is a set of protocols facilitating control. The Harvard network is the internet plus, where the plus mean the power to control.These two architectures reflect two philosophies about access. They reflect two sets of principles, or values, about how speech should be controlled. They parallel, I want to argue, the difference between political regimes of freedom, and political regimes of control. They track the difference in ideology between West and East Germany; between the United States and the former Soviet Republic; between the Republic of China, and Mainland China. They stand for a difference between control and freedom — and they manifest this difference through the architecture or design of code.These architectures enable political values. They are in this sense political. Now I don’t offer this example to criticize Harvard. Harvard is a private institution; it is free, in a free society, to allocate its resources however it wishes. My point instead is simply to get you to see how architectures are many, and therefore how the choice of one is political. And how, at the level of a nation, architecture is inherently political. In the world of cyberspace, the selection of an architecture is as important as the choice of a constitution.For in a fundamental sense, the code of cyberspace is its constitution. It sets the terms upon which people get access; it sets the rules; it controls their behavior. In this sense, it is its own sovereignty. An alternative sovereignty, competing with real space sovereigns, in the regulation of behavior by real space citizens. But the United States Supreme Court treated the question of architecture as if the architecture of this space were given. It spoke as if there were only one design for cyberspace — the design it had. 9 Lessig: The Laws of CyberspaceDraft: April 3, 1998 In this, the S upreme Court is not alone. For in my view, the single greatest error of theorists of cyberspace — of pundits, and especially lawyers thinking about regulation in this space — is this error of the Supreme Court. It is the error of naturalism as applied to cyberspace. It is the error of thinking that the architecture as we have it is an architecture that we will always have; that the space will guarantee us liberty, or freedom; that it will of necessity disable governments that want control. This view is profoundly mistaken.Profoundly mistaken because while we celebrate the â€Å"inherent† freedom of the net, the architecture of the net is changing from under us. The architecture is shifting from an architecture of freedom to an architecture of control. It is shifting already without government’s intervention, though government is quickly coming to see just how it might intervene to speed it. And where government is now intervening, it is intervening in a w ay designed to change this very same architecture — to change it into an architecture of control, to make it, as I’ve said, more regulable.While pundits promise perpetual freedom built into the very architecture of the net itself, technicians and politicians are working together to change that architecture, to move it away from this architecture of freedom. As theorists of this space, we must come to understand this change. We must recognize the political consequences of this change. And we must take responsibility for these consequences. For the trajectory of the change is unmistakable, and the fruit of this trajectory, poison. As constitutionalists, we must then confront a fundamentally constitutional uestion: if there is a choice between architectures of control and architectures of freedom, then how do we decide these constitutional questions? If architectures are many, then does the constitution itself guide us in the selection of such architectures? In my view, c onstitutional values do implicate the architecture of this space. In my view, constitutional values should guide us in our design of this space. And in my view, constitutional values should limit the types of regulability that this architecture permits. But my view is absent in thinking about government’s role in cyberspace.Indeed, my nation — for many years the symbol of freedom in world where such freedom was rare — has become a leader in pushing the architecture of the internet from an archi- 10 Lessig: The Laws of Cyberspace Draft: April 3, 1998 tecture of freedom to an architecture of control. From an architecture, that is, that embraced the traditions of freedom expressed in our constitutional past, to an architecture that is fundamentally anathema to those traditions. But how? How can the government make these changes? How could the government effect this control? Many can’t see how government could effect this control.So in the few minutes remaini ng in my talk today, I want show you how. I want to sketch for you a path from where we are to where I fear we are going. I want you to see how these changes are possible and how government can help make them permanent. Return then with me to the idea that began this essay — the point about the different modalities of constraint — and notice something important about that idea that we have not so far remarked. I said at the start that we should think of law as just one of four modalities of constraint; that we should think of it as just one part of the structure of constraint that might be said to regulate.One might take that to be an argument about law’s insignificance. If so many forces other than law regulate, this might suggest that law itself can do relatively little. But notice what should be obvious. In the model I have described law is regulating by direct regulation — regulating an individual through the threat of punishment. But law regulates in other ways as well. It regulates, that is, indirectly as well as directly. And it regulates indirectly when it regulates these other modalities of constraint, so that they regulate differently.It can, that is, regulate norms, so norms regulate differently; it can regulate the market, so that the market regulates differently; and it can regulate architecture, so that architecture regulates differently. In each case, the government can coopt the other structures, so that they constrain to the government’s end. The same indirection is possible in cyberspace. But here, I suggest, the indirection will be even more significant. For here the government can not only regulate indirectly to advance a particular substantive end of the government. More significantly, the government can regulate to change the very regulability of the space.The government, that is, can regulate the architectures of cyberspace, so that behavior in cyberspace becomes more regulable — 11 Lessig: The L aws of Cyberspace Draft: April 3, 1998 indeed, to an architecture potentially more regulable than anything we have known in the history of modern government. Two examples will make the point — one an example of the government regulating to a particular substantive end, and the second, following from the first, an example of the government regulating to increase regulability. The first is the regulation of encryption.The government’s concern with encryption has been with the technology’s use in protecting privacy — its ability to hide the content of communications from the eyes of an eavesdropping third party, whether that third party is the government, or a nosy neighbor. For much of the history of the technology, the American government has heavily regulated the technology; for a time it threatened to ban its use; it has consistently banned its export (as if only Americans understand higher order mathematics); and for a period it hoped to flood the marke t with a standard encryption technology that would leave a backdoor open for the government to enter.The most recent proposals are the most significant. Last November, the FBI proposed a law that would require manufacturers to assure that any encryption system have built within it either a key recovery ability, or an equivalent back door, so that government agents could, if they need, get access to the content of such communications. This is government’s regulation of code, indirectly to regulate behavior. It is indirect regulation in the sense that I described before, and from a constitutional perspective — it is brilliant.Not brilliant because its ends are good; brilliant because the American constitution, at least, offers very little control over government regulation like this. The American constitution offers little protections against the government’s regulation of business; and given the interests of business, such regulations are likely to be effective. My second example follows from the first. For a second use of encryption is identification — as well as hiding what someone says, encryption, through digital certificates, can be used to authenticate who some it.With the ability to authenticate who someone is, the government could tell where someone comes from, or how old they are. And with this ability — through certifying IDs — passports on the information superhighway — governments could far more easily regulate behavior on this highway. 12 Lessig: The Laws of Cyberspace Draft: April 3, 1998 It would recreate the power to control behavior — recreate the power to regulate. Note what both regulations would achieve. Since the US is the largest market for internet products, no product could hope to succeed unless it were successful in the United States.Thus standards successfully imposed in the US becomes standards for the world. And these standards in particular would first facilitate regulation, a nd second, assure that communications on the internet could be broken into by any government that followed the procedures outlined in the bill. But the standards that those government would have to meet are not the standards of the US constitution. They are whatever standard local government happen to have — whether that government be the government of Mainland China, or Switzerland.The effect is that the United States government would be exporting an architecture that facilitates control, and control not just by other democratic governments, but by any government, however repressive. And by this, the US would move itself from a symbol of freedom, to a peddler of control. Having won the cold war, we would be pushing the techniques of our cold war enemies. *** How should we respond? How should you — as sovereigns independent of the influence of any foreign government — and we, as liberal constitutionalists respond?How should we respond to moves by a dominant poli tical and economic power to influence the architecture of the dominant architecture of regulation by code — the internet? Sovereigns must come to see this: That the code of cyberspace is itself a kind of sovereign. It is a competing sovereign. The code is itself a force that imposes its own rules on people who are there, but the people who are there are also the people who are here — citizens of the Republic of China, citizens of France, citizens of every nation in the world. The code regulates them, yet they are by right subject to the regulation of local sovereigns.The code thus competes with the regulatory power of local sovereigns. It competes with the political choices made by local sovereigns. And in this competition, as the net becomes a dominant place for business and social life, it will displace the regulations of local sovereigns. You as sovereigns were afraid of the competing influence of na- 13 Lessig: The Laws of Cyberspace Draft: April 3, 1998 tions. Yet a new nation is now wired into your telephones, and its influence over your citizens is growing. You, as sovereigns, will come to recognize this competition. And you should come to recognize and question the special ole that the United States is playing in this competition. By virtue of the distribution of resources controlling the architecture of the net, the United States has a unique power over influencing the development of that architecture. It is as the law of nature were being written, with the United States at the authors side. This power creates an important responsibility for the United States — and you must assure that it exercises its power responsibly. The problem for constitutionalists — those concerned to preserve social and political liberties in this new space — is more difficult.For return to the story that began this talk — the world of internal passports. One way to understand the story I’ve told today about cyberspace is in li ne with this story about the Tsar’s Russia. The birth of the net was the revolution itself; life under Net95 was life in Bolshevik Russia (the good parts at least, where internal passports were eliminated); the Net as it is becoming is Stalin’s Russia, where internal passports will again be required. Now there’s a cheat to that story — a rhetorical cheat that tends to obscure an important fact about real space life.For we all live in the world of internal passports. In the United States, in many places, one cannot live without a car; one can’t drive a car without a license; a license is an internal passport: It says who you are, where you come from, how old you are, whether you’ve recently been convicted of a crime; it links your identity to a database that will reveal whether you’ve been arrested (whether convicted or not) or whether any warrants for your arrest in any jurisdiction in the nation are outstanding. The license is the in ternal passport of the modern American state.And no doubt its ability to control or identify is far better than the Tsar’s Russia. But in the United States — at least for those who don’t appear to be immigrants, or a disfavored minority — the burden of these passports is slight. The will to regulate, to monitor, to track, is not strong enough in the United States to support any systematic effort to use these passports to control behavior. And the will is not strong enough because the cost of such control is so great. There are not checkpoints at each corner; one isn’t required to register 14Lessig: The Laws of Cyberspace Draft: April 3, 1998 when moving through a city; one can walk relatively anonymously around most of the time. Technologies of control are possible, but in the main far too costly. And this costliness is, in large part, the source of great freedom. It is inefficiency in real space technologies of control that yield real space libert y. But what if the cost of control drops dramatically. What if an architecture emerges that permits constant monitoring; an architecture that facilitates the constant tracking of behavior and movement.What if an architecture emerged that would costlessly collect data about individuals, about their behavior, about who they wanted to become. And what if the architecture could do that invisibly, without interfering with an individuals daily life at all? This architecture is the world that the net is becoming. This is the picture of control it is growing into. As in real space, we will have passports in cyberspace. As in real space, these passports can be used to track our behavior. But in cyberspace, unlike realspace, this monitoring, this tracking, this control of behavior, will all be much less expensive.This control will occur in the background, effectively and invisibly. Now to describe this change is not to say whether it is for the good or bad. Indeed, I suggest that as constitut ionalists, we must acknowledge a fundamental ambiguity in our present political judgments about liberty and control. I our peoples are divided in their reaction to this picture of a system of control at once perfect, and yet invisible. Many would say of this system — wonderful. All the better to trap the guilty, with little burden on the innocent. But there are many as well who would say of this system — awful.That while professing our ideals of liberty and freedom from government, we would have established a system of control far more effective than any in history before. So the response to all this is not necessarily to give up the technologies of control. The response is not to insist that Net95 be the perpetual architecture of the net. The response instead is to find a way to translate what is salient and important about present day liberties and constitutional democracy into this architecture of the net. The point is to be critical of the power of this sovereignâ €”this emerging sovereign—as we are properly critical of the power of any sovereign.What are these limits: As government takes control or influences the architecture of the code of the net, at a minimum, we 15 Lessig: The Laws of Cyberspace Draft: April 3, 1998 must assure that government does not get a monopoly on these technologies of control. We must assure that the sorts of checks that we build into any constitutional democracy get built into regulation by this constitution — the code. We must assure that the constraints of any constitutional democracy — the limits on efficiency constituted by Bills of Rights, and systems of checks and balances — get built into regulation by code.These limits are the â€Å"bugs† in the code of a constitutional democracy — and as John Perry Barlow says, we must build these bugs into the code of cyberspace. We must build them in so that they, by their inefficiency, might recreate some of the protection s we have long known. *** Cyberspace is regulated ? by laws, but not just by law. The code of cyberspace is one of these laws. We must come to see how this code is an emerging sovereign — omnipresent, omnipotent, gentle, efficient, growing — and that we must develop against this sovereign the limits that we have developed against real space sovereigns.Sovereigns will always say — real space as well as cyberspace — that limits, and inefficiencies — bugs — are not necessary. But things move too quickly for such confidence. My fear is not just that against this sovereign, we have not yet developed a language of liberty. Nor that we haven’t the time to develop such language. But my fear is that we sustain the will — the will of free societies for the past two centuries, to architect constitutions to protect freedom, efficiencies notwithstanding. 16

Thursday, November 7, 2019

Social Marketing in New Zealand †SunSmart

Social Marketing in New Zealand – SunSmart 1.Introduction:New Zealand is a famous tourist attraction, not only the beautiful scenery but also the beautiful sunlight brings the good reputation. However, the potential threat behind the beautiful sunlight. It also brings excessively irradiation to New Zealander, causes the high proportion of skin cancer. Therefore, this report will focus on the social marketing issues in New Zealand, deal with Auckland Cancer Society. The report will perform detailed social marketing analyses on Cancer Society of New Zealand and Health Sponsorship Council project ‚ SunSmart, including the evaluation of marketing strategies and performance; also provide recommendations to improve their overall performance.2. Social Issues Background:The Water and Atmospheric Research Institute of New Zealand conducted has the conclusion based on the research which focused on New Zealand sunlight irradiation situation in the past 3 years: compared with North America inhabitant who are on identical latitude, Ne w Zealander accepted irradiation were 40% more.New ZealandThat result was equal to New Zealand moves 450 kilometers to equator in the geographical position. In addition, New Zealand‚s air condition is pure also causes the penetrability of sunlight to be very high. The expert generally believed that intense irradiation causes New Zealand to become one of highest rate of skin cancer disease countries. New Zealand probably has 50,000 people to suffer skin cancer every year, including more than 200 people to die because of the most serious skin disease - malignant melanoma (Segal, Cynthia G.,2006). Therefore, for people‚s health, enjoying sunbathe must be moderate, although the bronze skin is indubitable to make people looks sexy and healthy.3. Goals and Objectives of SunSmart:3.1 The goal of the SunSmart programme is to warn people of skin cancer and encourage the sun protection behaviour in daily life.3.2 The objective of SunSmart aims to:Protect New Zealand children especiall y...

Tuesday, November 5, 2019

Running Delphi Applications With Parameters

Running Delphi Applications With Parameters Though it was much more common in the days of DOS, modern operating systems also let you run command line parameters against an application so that you can specify what the application should do. The same is true for your Delphi application, whether it be for a console application or one with a GUI. You can pass a parameter from Command Prompt in Windows or from the development environment in Delphi, under the Run Parameters menu option. For this tutorial, well be using the parameters dialog box to pass command line arguments to an application so that itll be as if were running it from Windows Explorer. ParamCount and ParamStr() The ParamCount function returns the number of parameters passed to the program on the command line, and ParamStr returns a specified parameter from the command line. The OnActivate event handler of the main form is usually where the parameters are available. When the application is running, its there that they can be retrieved. Note that in a program, the CmdLine variable contains a string with command line arguments specified when the application was started. You can use CmdLine to access the entire parameter string passed to an application. Sample Application Start up a new project and place a Button component on Form. In the buttons OnClick event handler, write the following code: procedure TForm1.Button1Click(Sender: TObject) ;begin ShowMessage(ParamStr(0)) ; end; When you run the program and click the button, a message box appears with the path and file name of the executing program. You can see that ParamStr works even if you havent passed any parameters to the application; this is because the array value 0 stores the file name of the executable application, including path information. Choose Parameters from the Run menu, and then add Delphi Programming to the drop-down list. Note: Remember that when you pass parameters to your application, separate them with spaces or tabs. Use double quotes to wrap multiple words as one parameter, like when using long file names that contain spaces. The next step is to loop through the parameters using ParamCount() to get the value of the parameters using ParamStr(i). Change the buttons OnClick event handler to this: procedure TForm1.Button1Click(Sender: TObject) ;var j:integer; beginfor j : 1 to ParamCount do ShowMessage(ParamStr(j)) ; end; When you run the program and click the button, a message appears that reads Delphi (first parameter) and Programming (second parameter).

Saturday, November 2, 2019

Cours Essay Example | Topics and Well Written Essays - 2750 words

Cours - Essay Example Reduced weight increases fuel consumption efficiency and reduces the amount of carbon compounds produced (Das 2001, 1). Reducing the weight of a vehicle by about 100kgs would lead to a reduction of about 0.3 to 0.4 liters of fuel per 100km (Yu & Dean 2006, 580). For example, the Ford Explorer model by Ford has a scratch resistance and corrosion proof cargo area made from integrated liners and side panels, reducing the vehicle’s weight by up to 20% compared to its conventional metal model. In addition, using composites makes it possible to reduce the number of parts required in fabrication of vehicles, compared to use of steel or aluminum (Calister 2007, 582). This leads to achievement of high volume composite concept in vehicle manufacturing, which leads to increased cost effectiveness. The use of natural based fibre has further improved fibre applications in the vehicle industry. Natural fibres are environmentally sustainable to use compared to metals. These fibres are proces sed from natural plants, making them biodegradable and environmentally friendly. Currently, natural fibres are mostly used in making of seat liners, equipment panels, carpets, among other applications in vehicles (Riaz 2012, 9). Natural fibres such as jute, sisal, hemp, and kenaf offer good acoustic properties to vehicles, high stability, less splintering in case of accidents, and reduced forging behavior compared to metals (Sanadi et al 1994, 469). Through the use of fibre reinforced composites, many parts of different shapes can be produced with much ease, and at high speed compared to use of metallic materials. The ability to configure and produce complex shapes inexpensively makes the use of polymers to considerably reduce the cost of a vehicle, making them more affordable to customers. Composites offer increased stiffness, toughness, and strength over structural metal alloys. These superior properties come along with vehicle