Tuesday, January 28, 2020

Should The Government Censor The Internet Media Essay

Should The Government Censor The Internet Media Essay The growth of information and communication technology has significantly impacted on every facet of the world on most often noted is the internet. The advancement of Information and communication technology ICT, coupled with the rapid uptake of increasingly affordable, key technologies such as the Internet, has also helped foster an environment that promotes globalization of knowledge and information. The Internet has revolutionalized communication making information access across boundaries deemed seemingly impossible in the past a thing of general practice. People around the world are able to communicate with unprecedented ease. In the past, government has enjoyed great successes in censoring traditional communication media and this has affected information flow to the masses. The internet on the other hand with is multi-directional information flow communication nature where anyone can air their opinions on any desired issue at will has posed great challenges to governments. For countries with repressive regimes, the Internet has become a revolutionary force as it allows the free flow of information and which has been perceived as threat by the authorities in some countries. Government in some countries have responded imposing strict censorship on Internet usage by the public through monitoring, filtering and access to some site in the internet in a bid to control access to information. Internet censorship can be defined as the control or suppression of the publishing or accessing of information on the Internet. Internet censorship has been a greatly debated topic around the world with people having different opinions. In most countries governments at different level have been the in the fore front in the campaign for a regulated internet. Though there are a few arguments that support the need to have the internet censored, it has been largely rejected by organizations and individuals across the world as censorship of the internet is widely regarded by many as an attempt by government to suppress freedom of speech. This essay examines the arguments against internet censorship by government, its impact, successes and failures of government in some countries that embarked on such projects, and the challenges they have faced. It also assesses the key importance of censorship and concludes with an individual opinion evaluating the stated arguments. The case against the government Campaigners against the governments censorship of the internet have strongly opposed censorship and have stated that it prevents freedom of speech thus undermining confidence and trusts in the medium and this inhibits crucial flows of data. Also, Internet censorship and filtering leads to monitoring which is seen by many as another big brother ploy by government to invade the public privacy. It is more often argued that the government will use internet censorship as a tool to promote political agenda and the public has been quick to conclude that the true voice of the public will not be heard. In Australia, the National-Anarchists reject any parliamentary censorship of material and the reasons given has been summed up simply, any society that would give up a little liberty to gain a little security will deserve neither and lose both Benjamin Franklin.[1] Reports on internet censorship show the level of its pervasiveness recently being experienced in some countries. There are several tools and solutions instituted by the government of these countries for the purpose of internet censorship and also the content censored also vary with most blocked contents being political, pornographic, religious contents and others. [2] The common argument used by most countries in proposing censorship is that of child pornography. Most people however believe that the governments plans on internet censorship do not quite provide the solution to child pornography. It is often seen as, and in fact proven by experts that websites play only a minor role in circulation of child abuse materials and cannot be simply banned by Government [1]. It is often suggested that censoring for children by utilizing a user backed software and filtering systems instead of governmental censorship is a viable solution for keeping children away from indecent internet content. There are several software systems that allow parental control of internet materials. The OpenNet Initiative (ONI) has made a categorization of nations that is classes as internet enemy list. The ONI is joint project between some academic institutions across the world with the goal to monitor and report on internet filtering and surveillance activities by different nation. The project uses several means to determine the extent and nature of government-run internet filtering programs. It lists China, Iran Saudi Arabia etc in the forefront of internet censorship in the world. A new wave is now being generated by the Australian government as it moves to launch its own internet censorship project, [3] which has sparked up several arguments across the world. According to the ONI reports, censorship varies with countries and some countries have pervasive filtering policies, often routinely blocking access to not just pornographic and prohibited contents, but also human rights organizations, news, blogs, and Web services that challenge the status quo or are deemed threatening or undesirable. The Chinese governments The Great firewall currently uses four mechanisms DNS blocking, reset commands, URL keyword blocking and content scanning to prevent Internet users in the country from reaching blacklisted Web sites or content [16]. This technique though quite effective faces some technology challenges as private VPNs used by banks, manufacturing and other businesses often allow users within these organizations bypass this great firewall. These VPN services are now even open to the public for sign up at a fee that is quite affordable and attempts by the government to clamp down on this may impact on the economy since businesses will be affecte d. The general public thus rides on this loophole [4]. Methods of implementing censorship have also been criticized. Blocking unwanted and prohibited content using a dynamic process that would require analysis of website content in real-time would significantly slow down the internet. This is already being experience on the china network. [4]. Reports from Australia also suggests this will be the case when the Australian project kick off. The Australian Communications and Media Authority (ACMA) confirmed that under trial conditions internet filtering reduced speeds between 2% and in excess of 75%, but with half the tested products falling between 20-30%. It was concluded that proper implementation of the censorship project could result in a 20% drop in internet speeds [5]. Policies have been another hugely criticize factor. Often times government policies on censorship do not make a clear distinction on materials unfit for internet content, this resulting in legal and harmless contents being blocked. Organizations have challenged and even filed lawsuits to prevent passage of censorship bills in some states citing free speech violation and the decision to embark on censorship as unconstitutional. This is the case of a Utah Internet Censorship law, intended to restrict childrens access to material on the Internet but that may in fact also restrict adults access to a wide range of lawful material [6]. Examples cited COPA internet censorship law of 1998, included whether an education web page showing young women how to perform self examinations for breast cancer be banned and being classed as sexually explicit [7]. Australian government for example intends to use a public complaints mechanism for blacklisting URLs as well as URLs provided by international agencies. Analysts have questioned the accountability and transparency of this and have stated that the same government bureaucrats who put together their initialed flawed blacklist would remain responsible as arbitrators of the system. In support of the publics claim, a recently leaked list of blacklisted website showed that about half of the sites listed were in fact not related to child porn as claimed by the government but rather other contents that were to a certain degree could be classified as legal content for the adult community. This has sparked further debate on the issue [8]. A word for the government The biggest arguments presented so far by the government in support of internet censorship have been issues relating to preventing access to illegal contents and child pornography, racism, fraud terrorism, religion etc. With the attempts so far made by several nations to impose some form of censorship meeting with similar resistance, government should realize that the key challenges faced are three fold, the people, the law and the coping with technology. One could however wonder why the topic on censoring the internet would generate so much argument when the public indeed presently abides by certain degree of censorship. From schools preventing access to certain contents and websites, warnings are displayed on university networks on the impact of downloading of file sharing, companies prevent employees from accessing chat systems, networking website and other sites at work using firewalls to ISPs blocking potential dangerous contents either because of virus or to keep their network safe and uncompromised, Why then is the public so opposed to the government censoring the internet? It could be safe to state that the public is just not ready for the extreme spectrum of Internet control which would result in a globally regulated internet by the government for the fear that the public could lose its freedom of speech and the fear unknown. Conclusion Recommendation Though internet censorship could be considered a necessity in cases where there is need to set a standard for publishing and the kind of information to publish on highly sensitive topics, by and large the foreseeable disadvantages far surpasses the benefits that may be accrued. I do not see Government succeeding in the offing in the fight to regulate content on the internet. Technology favours the public internet users rather than government and as such the government will be playing catch-up and their efforts may yet be foiled. Technology is presently enabling data encryption, user generated videos and pod casts thus complicating the tasks by the monitoring bodies. Also the laws governing internet censorship if passed will meet several barriers as they are more likely to be passed by countries independently. The internet spans boundaries and how these laws would apply to other countries a crucial aspect of consideration. The law will need to keep up with changing technology as such there will be no rest for law makers. Passing laws takes considerable time, and lapse in law would result in loopholes that could be exploited by the public. In addition, the controversies generated by government censoring the internet far outweigh the benefit. The internet is a global communication platform and the government needs to study close before imposing laws. Close attention should however the paid to the fact that the global nature of the net does present problems to censorship. To conclude, though the proposed laws by government to regulate the internet is of good intention, it is unwise for the government to censor the internet because any law infringing on the publics right to free speech or breaching individuals right to privacy and freedom on such a vast communication medium as the internet will be difficult to enforce.

Sunday, January 19, 2020

The Definition of a Hero :: Definition Essay

The Definition of a Hero When I think of a hero I immediately think of someone who is strong, intelligent, handsome, and daring. Upon closer examination, many different qualities than these become apparent. Courage, honesty, bravery, selflessness, and the will to try are just a few of the overlooked qualities of a hero. The definition of heroism changes with the context and time. Heroes of the past are not necessarily heroes of present time and vise versa. A person can be a hero for saving the life of one or of millions. Heroes are not only real people, but they are also fantasy figures. Children are extremely interested with legendary and fantasy figures because they take on such tasks as: difficult journeys, challenges with dragons, discovering lost treasure, and changing the nature of the world through their singular acts of courage and selflessness. They also endure much resistance, hardship, and danger. Often the hero learns valuable lessons about survival and self-reliance. Not only do heroes teach valuable lessons they give a child a sense of belonging. To a child, a hero is an invincible person who will change the world. There is another type of hero that almost no one is aware of. In the poorest areas of the country, live mostly minorities and other ethic background. All their lives they’ve been expected to work harder and expected not succeed in life. Some individuals living in poverty with a determination to succeed work hard all of their lives to become what everybody doubted they could. Escaping the crime, drugs, and prostitution is enough to escape hell, even if they don’t go to college. Despite of their financial problems, drug and crime surroundings, or difficulties in the language skills, their desire to triumph fuels their persistence. Those who make it to success are the few living examples of the purest form of hero anyone can be. They are not only their own heroes but also the heroes of the poor children who dream of becoming like them someday. You also don’t have to kill anyone, conquer foreign land, or risk your life to be a hero. Anyone who influences anyone else by saving or helping save his or her lives is a hero. Dr. Martin Luther King Jr. changed the lives of millions of people by bringing justice to minorities. Mahatma Gandhi, one of the greatest heroes, led a nonviolent revolution to free his country.

Saturday, January 11, 2020

Syllabus Risk

BADM 574 – MSTM Simulation and Risk Analysis Spring 2013 Lectures: ADV: TR 9:30 am – 10:50 am in 2043 BIF GRD: TR 11:00 am – 12:20 pm in 2043 BIF Final Exam: 7-10 pm, Tuesday May 7, 2013 ADV: 2041 BIF GRD: 2043 BIF Instructor: H. Dharma Kwon, Assistant Professor of Business Administration, College of Business, University of Illinois Of? ce: Email: Phone: Of? ce Hours: 365 Wohlers Hall [email  protected] edu 217-333-3522 Tuesdays 2 – 4 pm or by appointment Note: When you send email to the instructor, your subject line must contain the course title. During the of? ce hours, you can call my of? ce.Course Objectives: This course is about using numbers to make better decisions. The focus will be on â€Å"handson† use of quantitative tools for solution of management problems often involving risk and uncertainty. Speci? c course objectives: (1) Introduce you to practical yet sophisticated tools suitable for modeling and solving complex managerial problem s with risky outcomes, and (2) improve 1 your skill and experience with the use of spreadsheet tools for analysis of management decision problems. We will learn to mathematically model business decision problems and apply their analytical skills to realistic business contexts.The material covered is useful for executives in all professional areas of business, including but not limited to accounting, ? nance, marketing, information systems, operations management or any other area where it is important to combine quantitative analysis with expert intuitive judgment. Prerequisite: This course builds upon some rudimentary knowledge of mathematics (probability and statistics) and basic pro? ciency with Microsoft Excel. Required Materials: 1. To purchase the required electronic course pack, go to https://create. mcgraw-hill. com/shop/ and search for the following ISBN number: 1121833926.The course pack contains all required cases and some readings. 2. TreePlan, RiskSim, and SensIt (provid ed by the MSTM program and downloadable from Compass 2g course website) 3. A laptop and Microsoft Excel 2010 (for Windows) or 2011 (for Mac) installed in your laptop Evaluation Methods: There are four components to the evaluation: Case Summary: Minicase Analysis: Group Project: Final Exam: Cases Summary: Roughly every week, individual case summary assignment(s) are due. We will discuss cases in class, so it is important to read and understand the problems posed by the cases before coming to the classroom.The summary of each case must not exceed one page, and it must be submitted on-line via Compass. (PDF format is strongly preferred). It will be graded on a pass/fail basis. In order to pass a case summary assignment, you must show suf? cient evidence that you have read the case and understood the gist of it. 2 10% 30% 15% 45% Minicase Analysis: Minicase analyses (problem sets) will be assigned roughly once a week and graded. The minicases are designed to help you learn the mechanics of the methods covered in class and to give you an opportunity to apply the concepts in simple and illustrative contexts.Please note that minicase assignments require careful interpretation and analysis of the given problems. Points will be deducted if you misinterpret the information given in the case assignments. Discuss your assumptions and clearly explain your quantitative reasoning. Answers (even correct answers) without logical and quantitative reasoning will not receive credit. Minicase analysis assignments will be posted on Compass. This is sometimes an individual assignment but sometimes a team assignment. Late assignments are generally not accepted. Group Project: In the last week of the course, each team will submit an original minicase.The minicase should be based on a real business situation (in the past, in the present, or in the future) and must be analyzed using one or more of the methods or concepts discussed in this course. If you’d like, you can also add o ther methodology that is not discussed in class. Each case must consist of two parts. In part 1, a business decision problem must be presented with essential information. It can be a ? ctional situation, but it must be based on a real business situation. Part 1 might look like one of the short cases that we analyze in this course and the text (excluding exhibits) must not exceed 5 pages typed ingle-spaced in 12 pt font. (See Darden’s cases for the document format). In part 2, the solution to the problem posed in part 1 must be given. When you construct the minicase, you should have pedagogical values in mind, i. e. , think of writing a teaching case or an open-book exam for future MSTM students at the University of Illinois. Your submitted work will be evaluated based on how well the decision analytical framework is utilized to solve a given (hopefully non-trivial) problem (50%) and its pedagogical value or the practicality of the problem (50%).Final Exam: There will be an in -class 3-hour-long open-book, open-notes, and open-laptops ? nal exam. You are NOT allowed to share your laptops with other students or send/receive emails during the ? nal exam. If you miss the ? nal exam without prior discussions with the instructor or without university-authorized emergencies, then you will receive zero credit. 3 Practice Problem Sets: Practice problem sets and their solution keys will be regularly posted on Compass. They are designed to help you understand the material and to provide practice using various concepts and techniques discussed in class.These assignments will not be collected or graded. However, these problem sets will be helpful for the quiz and the ? nal exam. Some practice problems will be discussed as examples in class. Grades: The ? nal letter grade will be based upon each individual’s level of understanding and learning evidenced by the weighted cumulative points from all four components shown in Evaluation Methods. Laptop and Electronic Communications Policy: You are required to bring your laptop to each class; you will have to use your laptop to download ? es and participate in problem-solving activities in class. You are not allowed to check e-mail or send text messages using your cell phone or laptop. Set your cell phone to silent mode. Academic Integrity and Honor Code: You are expected to behave ethically throughout the term and follow the norms and guidelines outlined by the University on academic integrity. 4 Course Modules: Module 1 Topic Reading Cases Module 2 Topic Reading Cases Module 3 Topic Reading Cases Module 4 Topic Reading Cases Module 5 TopicReading Cases Module 6 Topic Reading Cases Module 7 Topic Reading Cases Value of Information and Control Risk Management Harimann International Optional module (if time permitted) Downstream Decisions – Merck & Co. ; International Guidance Control Sensitivity Analysis Sensitivity Analysis Using SensIt CyberLab (A), Supp, (B); Liquid Gold Probability As sessment from Historical Data Probability Distributions Commerce Tavern Simulation Analysis Monte Carlo Simulation Using RiskSim George’s Revised Forecast and Addendum Sampling and Statistical Inference – Jade Shampoo (A) and (B) Decisions under Uncertainty DTP Ch. George’s T-Shirts DTP: Decision Tree Primer (http://www. public. asu. edu/~kirkwood/DAStuff/decisiontrees/index. html) Monte Carlo Simulation Using RiskSim (http://www. treeplan. com/chapters/RiskSim-Guide243. pdf) Sensitivity Analysis Using SensIt (http://www. treeplan. com/chapters/SensIt-Guide-145. pdf) 5

Friday, January 3, 2020

The Hunger Games Research Essay - 935 Words

In The Hunger Games, Suzanne Collins expresses two themes. The first one is that we can’t let the government use their power to treat, and use people like they want, they are oppressing them. â€Å"At one o’clock, we head of the square. Attendance is mandatory unless you are on deaths door. This evening, officials will come around and check to see if this is the case. If not you will be imprisoned.† (Collins, 16) we can see that the Capitol forces the people to participate in the reaping by threatening them. â€Å"When I was younger, I scared my mother to death, the things I would blurt out about District 12, about the people who rule our country, Panem, from the far-off city called the Capitol. Eventually I understood this would only lead us to†¦show more content†¦During the game Katniss have to pretend that she loves Peeta, but inside she knows that her real love was Gale and that he was waiting for her. It was hard for all of them because Gale was o utside seeing how Peeta kiss his girlfriend, and for Peeta because he knows that Katniss was in love with another boy and not of him, and to Katniss because maybe she was with Gale, but passing time with Peeta and look how he tries to saved her life make her get confused about her feelings so she focused in what is good for her, and not of what she real want. The author communicates the important message by using some literary devices, for example she used verbal irony when Peeta say, â€Å"Always worried about our safety.â€Å" (Collins, 81) It was sarcastic because he was talking with Katniss about what happens if they try to suicide from the top of the building, but they can’t because the Capitol want them to be alive for the game. The Hunger Games deal with oppression by many ways. â€Å"It’s time for the drawing. Effie Trinket says as she always does, â€Å"Ladies first!† and crosses to the glass ball with the girls’ names. She reaches in, digs her hand deep into the ball, and pulls out a slip of paper.â€Å" (Collins, 28) The government oppresses the people of the Seam because they were condemned to play the Hunger Games every year to get some food to live. People suffer becauseShow MoreRelatedThe Hunger Games By Suzanne Collin899 Words   |  4 Pages Suzanne Collin’s â€Å"Hunger Games† seems to be about a dystopian society struggle to become a utopia. However, when the readers read further in to the book or watches the movie one can see that is about all the characters that make use human. As human, we feel the need to build an ethical framework based on our needs for authority rather than tradition. The Capitol in the Hunger Games exploits human needs to keep authority in place. After rising seas and poverty consumed much of the land, the CapitolRead MoreThe Hunger Games By George Henry George1296 Words   |  6 Pagesmeaning of this quote is that things work better when there is equality, and this relates to The Hunger Games theme of inequality between the poor and the rich. As seen in The Hunger Games, anyone who didn t live in the capital was living in poverty. The only way to get out of poverty was to win The Hunger Games. The importance of this research paper is to show how the themes are presented in The Hunger Games. The themes that can be found in the story are the inequality between the poor and the richRead MoreThe Hunger Games And The Greek Myth Of Theseus1030 Words   |  5 PagesResearch Paper Final Draft: President V.S. Minotaur In both the Hunger Games and the Greek myth of Theseus and the Minotaur, children were used as sacrifices to make the Capitol and/or Minotaur seem unbeatable. Children were offered as sacrifices to make the Capitol/Minotaur seem unbeatable. In the Greek myth of Theseus and the Minotaur as punishment for displeasing Crete, seven youths and seven maidens were periodically sent into a labyrinth containing a Minotaur which was half man and halfRead MoreHow Is Gender Portrayed In The Hunger Games Trilogy By Suzanne Collins1096 Words   |  5 PagesThe proposed dissertation will explore the question â€Å"How is gender portrayed in the Hunger Games trilogy by Suzanne Collins?†. It will answer this by exploring how the genders of the main characters are portrayed in the Hunger Games trilogy compare to Susan Lehr’s definitions of what traditional gender roles are often defined as in children’s literature. Her definitions describe males â€Å"†¦ as active, loud, aggressive, unemotional, independent, less mature than girls, strong, handsome, bold, curiousRead MoreThe Hunger Games By Suzanne Collins1632 Words   |  7 PagesTaylorAnne Brown Professor Lawson English 102 31 May 2016 Research Paper: Final Draft Word Count: 1142 Behind the Power: Panem’s Ideology How and why does Panem’s government oppress its citizens while keeping complete control? The â€Å"Hunger Games† by Suzanne Collins is a dystopian novel with an extremely corrupt government that controls the citizens with the District system. The corrupt government in â€Å"The Hunger Games† finds various ways to suppress Panem’s occupants, including but not limited toRead MoreLiterary Criticism : The Hunger Games 1460 Words   |  6 PagesYvette Escobedo 26 May 2016 English 102 #0304 Literary Criticism Research Paper Word Count: Survival through Gender Is it wrong for women to be strong and independent or is that a job for men? Not every female character is vulnerable and needs saving by a strong male character. Females containing strong and brave traits are not very welcomed in many different stories and are usually seen as a rebel. In today’s modern day literature, there are more novels with strong female characters, but areRead MoreGeorge Gerbner Communication Theory1183 Words   |  5 Pagesâ€Å"George Gerbner is one of the great pioneers in the field of communication research. He was born in 1919 in Budapest, Hungary and emigrated to the United States during World War II to avoid the violence of the war. He enrolled in Berkeley University in California and received his Bachelors in Journalism. He later went to school in Southern California and received his PhD in Communication in 1955. The following year, he began to develop communication models that stressed the dynamic nature of communicationRead MoreThe Use Of Adaptive Pressure On Our Memory1485 Words   |  6 Pagespressures on our memory, have just began to be studied further by memory researchers. Scholars have attempted to study how our current memory processing capabilities could have been tailored to achieve specific outcomes from our instinctual past. This research could be a window into empirical findings that may challenge existing perspectives on retention. Possibly, even help foster creative memory mnemonics that could assist us in our daily lives, where memory is concerned. A level of processing is describedRead MoreThe Wisconsin Food Bank696 Words   |  3 Pages Its a reality. In September, designated as Hunger Action Month, were asking our supporters to experience that reality for one week. Called the Hunger Games Challenge, participants are asked to live as if they are on food stamps, now known as the federal Supplemental Nutrition Assistance Program. Nearly 11 percent of people living in Wisconsin depend on food stamps to put food on their tables, according to the latest report from the Food Research and Action Center. The program helps people andRead MoreAnalysis of Fahrenheit 451 and Hunger Games Essay1180 Words   |  5 PagesLiterature seems to run along the same guidelines in terms of how the novels are set, and follow a similar chain of events leading to a great bittersweet climactic event. I will detail the similarities between the two novels Fahrenheit 451 and The Hunger Games. There is a reason behind the similarities of these two novels, and other dystopian literature. â€Å"The merits of dystopian literature are many.† (Erlich) In the novel Fahrenheit 451, the society the main character, Montag lives in is very oppressive