Monday, September 30, 2019

Michael Henchard’s life is a series Essay

Michael Henchard’s life is a series of terrible disasters, which leads to self destruction. However, deciding whether Michael Henchard is responsible for his own downfall and to what extent is something which needs a lot of deliberation before getting an answer. There are different factors which need to be looked at before deciding this, such as whether it was Henchard’s fault, or whether he could have stopped the disaster from happening. The only way to determine whether or not Henchard is totally responsible for his own downfall is to look at each disaster which occurs in the novel and then see whether he could have prevented it or not. Starting directly from the beginning, the novel begins with Michael Henchard travelling with his wife and daughter and then stopping at a furmity tent for some food. Michael straight away decided that he wanted some rum in his furmity. â€Å"He winked to her, and passed up his basin in reply to her nod; when she took a bottle from under the table, slily measured out a quantity of its contents, and tipped the same into the man’s furmity. The liquor poured in was rum. † He soon got drunk after several helpings of it and when his wife tried to quieten him a little. He then began to ramble about how better off he would be without her. â€Å"I married at eighteen, like the fool that I was; and this is the consequence o’t. † It is clear to the audience that Henchard is a rude and careless character. Henchard’s attitude and behaviour is influenced by alcohol, and it appears to the audience that his wife, Susan is aware of this. â€Å"†¦ his wife, who seemed accustomed to such remarks, acted as if she did not hear them†¦ † The scene is set for a foreboding novel when Hardy expresses his feelings about nature and mankind in the first part of the novel. He compares nature and mankind. â€Å"In contrast with the harshness of the act just ended within the tent was the sight of several horses crossing necks and rubbing each other lovingly, as they waited in patience to be harnessed†¦ † After Michael spending his evening drinking rum, he began auctioning his wife to anybody who would buy her. A sailor offered Michael Henchard 5 guineas for both hi wife and daughter. Michael would not sell them for any less. Susan gave Henchard one last chance to say he didn’t mean it before she left with the sailor as it wasn’t a joke no more. â€Å"A joke? Of course it is not a joke! † Shouted her husband. With this his wife and daughter left with the successful bidder. Michael Henchard losing his wife and child was the first disaster. This disaster was without a doubt Michael’s fault. He had decided to have rum with his furmity, even though he had had it before, knowing that he makes him drunk, and he knew he had tried to sell his wife before. He should have known not to have too much, if any liquor, and because he chose to do so in the knowledge that he has a bit of a drinking problem, this makes the whole disaster hid fault. I do not think that any blame can be passed onto his wife. Susan felt the contempt that Michael had for her. Henchard shows he has integrity once sober, when he later regrets selling his wife and daughter and goes to search for her. â€Å"Well I must walk about till I find her†¦ † This shows a positive side to Henchard, for taking the time to recover the mistake he made. He also made an oath not to drink for 21 years, due to his hideous behaviour the previous night. In contrast to this, he later blames Susan for his atrocious attitude and behaviour and appears very angry at her. â€Å"†¦ seize her, why didn’t she know better than being me into this disgrace! † He roared out. † In the next part of the novel, Susan finds Henchard as a successful businessman as mayor of a small town called Castorbridge. â€Å"Mr. Henchard- now habited no longer as a great personage, but as a thriving business man. † Henchard has worked hard and had a lot of determination to get to where he is now. He needs to continue being successful and hard working in order to prevent his own downfall, as Henchard has much more to lose now. Henchard meets a Scottish man called Donald Farfrae by accident but takes a liking to him and employs him in order to increase his wealth. Farfrae has inventive machines which are useful to trade. â€Å"†¦ it is true that I am in the corn trade†¦ I have some inventions useful to the trade†¦ † Farfrae appears to be a helpful, kind, gentleman, who is willing to help and is a good citizen. Hardy describes how the town of Castorbridge have already taken a liking to Farfrae. The audience can view Henchard’s jealousy of Farfrae. â€Å"By this time he had completely taken possession of the hearts of the Three Mariner’s inmates. † After 19 years ‘Henchard’s daughter’, Elizabeth-Jane returns with a message from his wife Susan. Henchard is over-whelmed to see EJ again. He shows her around his beautiful home and makes her feel very welcome. He is highly surprised to hear that his wife whom he had sold many years ago remains alive. â€Å"Oh— Susan is— still alive? † He asked with difficulty. By Hardy expressing how Henchard speaks about Susan reflects his true feelings for her. Henchard doesn’t necessarily love Susan still, but he does show contempt for her towards EJ. Henchard informs Farfrae of his disastrous past when he sold his wife and child EJ. â€Å"Well, I lost my wife nineteen years ago or so -by my own fault†¦ † By Henchard admitting to doing something wrong shows he has integrity again. By Henchard being completely honest with his business partner, the audience see the positive side to him come out again. Henchard’s downfall continues from his relationship with Farfrae. Hardy describes the liking Henchard has for Farfrae. This is used to make Henchard’s downfall look bigger than if Henchard wasn’t so involved and close to Farfrae. Henchard and Susan are not lovers anymore and Susan meets him at the ‘ring’, an amphitheatre near Castorbridge which Hardy describes as,†Ã¢â‚¬ ¦ seldom had place in the amphitheatre, that of happy lovers. † Even though Susan and Henchard are not close anymore, Henchard shows sensitivity towards Susan and begins their conversation in a peculiar way. â€Å"I don’t drink anymore. † This is Henchard wanting to prove a point to Susan that he regrets what he did, by telling her that he now feels responsible for his actions shows a positive side to Henchard. Susan and EJ see a lot more of Henchard and after a while EJ becomes closer to Michael and spends more time with him than she does her mother. As the bond grows between the two, Henchard requests for EJ’s name to be changed to Miss. Henchard in its place of Miss. Newson. â€Å"Now, Susan, I want to have her called Miss. Henchard- not Miss. Newson†¦ it is her legal name-so it may as well be made her usual name- I don’t like t’other name at all for my own flesh and blood†¦. She won’t object. † â€Å"No. O no. But-† â€Å"Well, then, I shall do it,† said he, peremptorily. The audience see a stubborn and self-centred side to Michael here. In contrast to this the audience can also see how much Henchard wants EJ to become part of his family again by name. This again shows that he is sorry for what he done. Michael seems rather pushy towards Susan. Susan is slightly hesitant about the whole situation. Taking a situation like this upon himself, without his wife actually agreeing is very selfish of Henchard. The audience notices Susan’s hesitance and begin to sense an explanation for this. Hardy includes another character Abel Whittle in order to illustrate the variation in character between Henchard and Farfrae. Abel is employed by Henchard and when Abel is late Henchard uses an insensitive approach on Whittle. Quite the reverse to this Farfrae shows a more kind and gentle approach towards him. This sparks jealousy of Henchard on Farfrae. A sense of disruption in their relationship occurs and the audience can see the beginning of Henchard’s downfall. Henchard also becomes jealous of Farfrae when he begins to bond with EJ. Henchard doesn’t want to run the risk of losing EJ therefore dispenses with Farfrae. â€Å"Mr. Farfrae’s time as my manager is drawing to a close- isn’t it Farfrae? † He did this because he loves EJ, but he also wants to keep his good name and does not wish for Farfrae to take over everything. Hardy is clever, in the way he creates the characters Henchard and Farfrae. He makes Henchard’s character the complete opposite to that of Farfrae. This gives the audience a great understanding and knowledge of each character; therefore they’re able to predict what will occur after each turning point to each character. Henchard realises he is in yet another disaster. Michael had not too long before his wife and daughter had found him, spent the night with a woman called Lucetta. He had then promised to marry her so she can keep her virtue. He did this thinking that Susan and EJ had died. This of course means he cannot marry Lucetta. Susan becomes to unwell to leave her bed, therefore Henchard and EJ are expected to look after her. In the mean time Lucetta tells Henchard she wants her letters back, and that she wishes to meet him at the antelope hotel. â€Å"†¦ I shall be in the coach, which changes horses at the antelope hotel at half past five on Wednesday evening; I shall be wearing a Paisley shawl with a red centre, and this may be easily found. I should prefer this plan of receiving them to having them send. – I remain still, yours ever. ‘LUCETTA’ â€Å". Hardy includes a lot of specific description in Lucetta’s letter, which shows a strong character to Lucetta. Thomas Hardy has a strong point of putting across the personalities of characters to the audience. Michael is in a bit of a tricky situation here, with Susan too ill to get out of bed, and Lucetta requesting to see him. Henchard has put himself in this mess in the first place, by assuming that Susan and EJ were dead. On the other hand Henchard shows positive again by being honest with Lucetta, informing her of the unexpected arrival of his ‘who he thought was dead’ wife and child. When the traumatic death of Mrs. Henchard occurs, the lonely sad life of Michael Henchard appears. The only person he now cares about and has got left is Elizabeth Jane. EJ has lost her mother and Henchard wants EJ to know who her father is. EJ is originally shocked at what she has just heard but then settles nicely and begins called him dad. The next catastrophe which happens, Henchard walks straight into himself. Susan left a letter in an envelope for Henchard stating â€Å"Not to be opened until the wedding of EJ†. The audience immediately know that Henchard will open the letter by the anxious character which Hardy has created. EJ isn’t really Henchard’s daughter. Henchard feels that fate is against him and he begins to feel separated from EJ. Without Henchard’s eagerness and self-concerned attitude towards everything, Henchard would be able to continue his happy life with his daughter, oblivious to the fact that she isn’t his own. Hardy’s efforts to put across the personality of Michael Henchard at the beginning of the novel are very successful. Throughout the novel Henchard’s downfall has just increased by the day. The language used at the beginning of the novel is exceptionally descriptive. First impressions of Henchard are positive from reading the first page. The negative side begins to show when he reaches the furmity tent. By chapter 31 Hardy shows that Henchard has sunk socially and financially. He has to go and live with Joshua Jopp and refuses to see anyone. â€Å"Socially he had received a startling fillip downwards; and, having already lost commercial buoyancy from rash transactions, the velocity of his descent in both aspects became accelerated every hour. † Farfrae and EJ decide to get married. Henchard shows integrity by attending but EJ just can’t forgive Henchard for what he did and walks away form him. He bought a goldfinch as a wedding present, which Hardy uses as a symbol of Henchard’s life. Some people may have different opinions on why Henchard went downhill. Some people may put it down to fate. Others may think that Henchard is entirely responsible for all that happened. Hardy leaves this decision quite widely open. Henchard’s character has an extreme effect on other people and how their lives are lived, especially EJ’s.

Sunday, September 29, 2019

Mulai Periyar Dam

Mullaperiyar Dam or Mullai Periyar Damis a masonry gravity dam on the Periyar River in the Kerala state of India. It is located 881 m (2,890 ft) above mean sea level on the Cardamom Hills of the Western Ghats in Thekkady, Idukki District of Kerala, South India. It was constructed between 1887 and 1895 by the British Government to divert water eastwards to Madras Presidency area (the present-day Tamil Nadu). It has a height of 53.6 m (176 ft) from the foundation and length of 365.7 m (1,200 ft).The Periyar National Park in Thekkady is located around the dam's reservoir. The dam is located in Kerala on the river Periyar, but the dam is controlled and operated under a period lease by neighboring Tamil Nadu stateSupreme court judgment came in February 27 2006, allowing tamilnadu to raise the level of the dam to 152 feet after strengthening it. Responding to it, Mullaperiyar dam was declared an ‘endangered' scheduled dam by the Kerala GovernmentMullai Periyar Damafter a few minor ea rthquakes in 1979 in regions surrounding the dam, security issues were raised over its security. Since then, both the Kerala and TN governments have been at loggerheads over the security issue. Later, experts from Indian Institute of Technology also examined the dam, and mentioned that the dam will not withstand an earthquake. What does the TN government have to say about it?The TN government refutes allegations that age has withered the dam. There are arguments that if the world's oldest Kallanai dam (built in the second century AD) in Srirangam in Tiruchirapali district is still functional and continues to irrigate about 4,000 sqkm, why can't the Mullaperiyar be as well. So, where do the two governments stand?The Kerala government's contention is that in case the dam breaks, the three dams downstream — Idukki, Cheruthoni and Kolamavu – will not be able to withhold the pressure, which will put the lives of 3.5 million people in the state. On the other hand, the TN gov ernment maintains that if the Mullaperiyar is demolished, it will create water scarcity in five districts  of the state, leading to a draught in the region.

Saturday, September 28, 2019

Biculturism and Marginalization Essay

* Ross-Sheriff (2011) commented that international migration patterns have * changed as a consequence of broad social, political, economic, and environmental * trends and explained the causes of the driving forces were including war, * globalization, urbanization, and changing cultural norms regarding social roles and * responsibilities (Ross-Sheriff, 2011). With these complex trends of migration * patterns, Van Hear (2010) viewed migration as a process which was an integral part * of broader social transformations, but which also had its own internal dynamics with * other factors related to the migrating process, shaping social transformation in their * own way. Migration was also linked in complex ways to class, gender, generation, * ethnicity and other social factors, which were embodied in positions in home and host * communities, and in work and domestic relationships, all of which might be * transformed in the course of the migratory process (Van Hear, 2010). To understand this complex process of migration, especially under changing circumstances of one culture to another, it might be useful to build conceptual tools for understanding these transitory processes in migration studies and in social science more widely (Van hear, 2010). They also include mediating agents and transitions that need also to be accounted for, as well as intersections among class, gender, generation, ethnicity and other social ruptures as well as the main driving forces of migration (Van Hear, 2010). Of course there were other important concepts such as relations between time and space, between dynamics or processes and outcomes, and between structure and agency that needed to get attention (Van Hear, 2010). However, it is impossible to discuss all different theoretical concepts involved in different types of migration process in the current limited study. Rather, this study tried to focus on psychological impacts such as ethnic identity and self-esteem on migration through acculturation processes particularly on family- related migration because different patterns of migration produced different communities and resulted in producing different migrant identities including varying levels of psychological distress (Jones, 2008). Further, few empirical studies have focused on migrant adults populations. Most migrants identification related literatures tended to relate more for adolescents or young children because identity formation might be particularly challenging in this cohort, especially when the values and beliefs of their natal culture differed significantly from those of the host society (Sodowsky, Kwan, & Pannu, 1995; as cited in Farver, Narang, & Bhadha, 2002). Therefore, this study focused on ethnic identity and self-identification issues of adult migrants’ themselves within a family structure according to different theoretical models relevant to adaptation of new cultures, because family was the basic instrument in the society (Nesdale, Rooney, & Smith, 1997). In fact, most cultural acquisition theories developed and evolved in 1990s. when international migration became a key issue in international politics at the beginning of 1990s. As Castle (2002) argued that migration, development and international relations were closely connected as migration was a major factor of transformation for both sending and receiving countries for different types of migrants (Castle, 2002). With this perspective, this study generally focused on those migration culture acquisition theories developed in 1990 rather then looking at current perspectives in the most recent literatures, which actually have evolved from these original theories in 1990s (Castle, 2002). As the findings from these research studies has had been mixed or sometimes contradictory, it was important to understand the exact nature of the relationship between migrant ethnic identification and the acculturation process both need to be specified and assessed properly with coherent measurements and theoretical assumptions (Nesdale et al. , 1997). Important theoretical concepts: ethnic identity, acculturation, biculturism, and marginalisation. According to Phinney (1990; as cited in Farver, Narang & Bhadha., 2002), ethnic identity and acculturation were related but separate constructs. Ethnic identity involves an individual’s self-identification as a group member, a sense of belonging to an ethnic group, attitudes toward ethnic group of membership, and degree of ethnic group involvement (Farver et al. , 2002). The term acculturation was defined in anthropology as those phenomena, which resulted when groups of individuals having different cultures came into continuous first-hand contact with subsequent changes in the original pattern of either or both groups (Redfield, Linton, & Herskovits, 1936; as cited in Birman, 1994). Although acculturation was a neutral term in this context (that is, change might take place in either or both groups), in practice, acculturation tended to induce more changes in one of the groups than in the other (Berry, 1990a; as cited in Berry, 1997) Berry (1997) argued that in all plural societies, cultural groups and their individual members, in both dominant and non-dominant situations, must deal with the issue of how to acculturate. According to Berry (1997), four acculturation strategies were introduced: assimilation, separation, marginalization, and integration. When individuals do not wish to maintain their cultural identity and seek daily interaction with other new cultures, the assimilation strategy is defined. In contrast, when individuals place a value on holding on to their original culture, and at the same time wish to avoid interaction with others, then the separation is defined (Berry, 1997). When there is an interest in both maintaining one’s original culture, while in daily interactions with other groups, integration is the option; here, there is some degree of cultural integrity maintained, while at the same time seeking to participate as an integral part of the larger social network (Berry, 1997). Last, when there is little possibility or interest in cultural maintenance (often for reasons of enforced cultural loss), and little interest in having relations with others (often for reasons of exclusion or discrimination) then marginalization is defined (Berry, 1997). However, this acculturation categories model has been criticized methodologically (Rudmin, 2003, 2009; as cited in Schwartz et al. , 2010) because all four of Berry’s categories were represented in the same way by creating the two by two matrix of acculturation categories between high and low. However, the cut off point between high and low was arbitrary and would differ across samples, making comparisons across studies difficult, resulting in the fact that all four categories existed and were equally valid (Rudmin, 2003; as cited in Schwartz et al., 2010) and suggesting that not all of Berry’s categories might exist in a given sample or population, and that some categories might have multiple subtypes (Schwartz et al. , 2010). In particular, Berry (1997) viewed the term â€Å"biculturism† as referring to acculturation that involved the individual simultaneously in the two cultures that were in contact in integrative ways, which appeared to be a consistent predictor of more positive outcomes than the three alternatives of assimilation, separation, or marginalization. Berry and his colleagues (Sam & Berry, 1995) assessed the acculturation strategies of various immigrant groups in North America and the results showed that bicultural individuals experienced less acculturative stress, anxiety and fewer psychological problems significantly, while marginalized individuals suffered the most psychological distress, including problems with self-identification and cultural alienation, which adversely affected their self-esteem (Farver et al. , 2002). However, Shiraev and Levy (2007) explained acculturative stress as a negative feeling that a marginalized person might experience as a distressing psychological reaction to any unfamiliar cultural environment based on the assumption that person and groups undergoing any social and cultural change should experience a certain amount of psychological distress. Generally, many early definitions of acculturation focused on exposure to two cultures simultaneously as a culture shock, which was a reactive state of specific pathology or deficit, rather than taking advantage of being bicultural (Berry & Annis, 1974; Shiraev et al., 2007). The validity of marginalization as an approach to acculturation by Berry (1997) was also questioned (Del Pilar & Udasco, 2004; as cited in Schwartz et al. , 2010). Schawartz et al. argued that the likelihood that a person would develop a cultural sense of self without drawing on either the heritage or receiving cultural contexts would be less likely to. The marginalization approach might be true only for the small segment of migrants who rejected both their heritage and receiving cultures (Berry, 2006b). Indeed, studies using empirically based clustering methods have found small or nonexistent marginalization groups and scales that attempted to measure marginalization typically had poor reliability and validity compared with scales for the other categories (Cuellar, Arnold, & Maldonado, 1995; Unger et al. , 2002; as cited in Schwartz et al. , 2010). As described earlier, the impact of migrant ethnic identity on psychological distress had comparatively diverse points of views if they were either negative or positive reactions, depending on different theoretical frames. For example, Social Identity Theory (Tajfel & Turner, 2001) and Self-Categorization Theory (Turner, 1987) emphasized more on the importance to individuals of their identification with particular social groups. Social Identity Theory (Tajfel & Turner, 2001; as cited in Yip, Gee, & Takeuchi, 2008) viewed a possible explanation for why ethnic identity might buffer the effects of discrimination. According to this theory,individuals chose from an array of possible social identity groups and, once those groups were chosen, individuals focused on the positive aspects of their in-group, which helped to boost their own esteem, suggesting that ethnic identity was more important to their overall identity (Yip et al. , 2009). In contrast, if ethnicity was a central component of one’s identity, it might actually exacerbate the effects of discrimination, resulting in a greater negative impact on mental health, according to self-categorization theory (Turner, Hogg, Oakes, Reicher, & Wetherell, 1987; as cited in Yip et al., 2008), suggesting that people should be more in tune with environmental cues that were relevant to an important aspect of their identity. That is, experiences of racial discrimination might be such a cue relevant to their ethnic identity. Indeed, research suggested that African American adults and adolescents who reported strong racial centrality were also more likely to report experiences of racial discrimination (Neblett, Shelton, & Sellers, 2004; Sellers, Caldwell, Schmeelk-Cone, & Zimmerman, 2003; Sellers & Shelton, 2003; as cited in Yip et al., 2008). However, despite this emphasis by social theorists, they tended to forget the larger literature that involved with both ethnicity and the acculturation process (Liebkind, 1993; 1996; as cited in Nesdale, Rooney & Smith, 1997). First of all, these different findings resulted from lack of inclusion of acculturation itself as a variable methodologically when acculturation was considered as a phenomenon in research designs (Sam and Berry, 2006). Without including acculturation as a variable, the explanations for human behavior similarities and differences across populations would remain incomplete (Sam et al. , 2006). Second, a further criticism of the acculturation literatures was that the same two acculturation processes, and the same four-acculturation categories, characterized all migrants equally—regardless of the type of migrant, the countries of origin and settlement, and the ethnic group in question, according to Berry’s (1980) model and other similar approaches (Sam et al., 2006). Finally, the vast majority of studies in the acculturation literature have focused on behavioral acculturation (Schwartz et al. , 2010). That is, most widely used acculturation measures included primarily (or only) items assessing language use and other cultural practices (e. g. , Cuellar, Arnold, & Maldonado, 1995; Stephenson, 2000; Szapocznik, Kurtines, & Fernandez, 1980; as cited in Schwartz et al. , 2010) due to accepting the fact that cultural practices might provide only a fair proxy for cultural adaptation (Schwartz et al., 2010). Theoretical frameworks for acculturation research Shiraev & Levy (2007) claimed that cross-cultural psychologists usually used three approaches to examine human activities in various cultural settings. They were the sociobiological approach, the sociological approach and eco-cultural approach (Shiraev et al. , 2007). In particular, the eco-cultural approach emphasized both the environment and the individual were seen as open and interchanging systems (Shiraev et al., 2007), introducing John Berry whom originally developed this theory further in contemporary cross-cultural psychology. Shiraev et al. (2007) also pointed out that specialists should to be able to explain how, why, and to what extent people differed from one another, when ecological, biological, cultural, and acculturation factors were identified and taken into consideration (Berry, J. W. , Poortinga, Y. H. , Segall, M. H. , & Dasen. P. R. ,1992; as cited in Shiraev et al. , 2007). In related to the concerns pointed by Shiraev et al. (2007), Berry (1997) argued earlier there were important links between cultural context and individual behavioural development, demonstrating what happened to individuals who developed in one cultural context when attempting to re-establish their lives in another one through his acculturation research framework, by confirming the fact that acculturation was one of the most complex areas of research in cross-cultural psychology because the process involved more than one culture and in two distinct senses (Berry, 1997). According to Berry (1997), the concept of acculturation was employed to refer to the cultural changes resulting from different ethnic groups encountered, while the concepts of psychological acculturation and adaptation were employed to refer to the psychological changes and eventual outcomes that occur as a result of individuals experiencing acculturation. In another words, acculturation phenomena resulted from contact between two or more cultures and research on acculturation had to be comparative in order to understand variations in psychological outcomes that were the result of cultural variations in the two groups in contact (Berry, 1997). In particular, this framework viewed the integration model of acculturation strategies the most desirable among other strategies, considering it the same as the biculturalism model (Berry, 1997). For example, Berry and his colleagues (Berry, 1980; Berry, J. W. , Kim, U. , Power, S. , Young, M, & Bujaki, M. , 1989; Berry, Kim, Minde, & Mok, 1987; Sam & Berry, 1995 as cited in Farver et al., 2002) Assessed the acculturation strategies of various immigrant groups in North America and the result showed that integration was the most psychologically adaptive attitude, arguing that integrated or bicultural individuals experienced less acculturative stress and anxiety and manifested fewer psychological problems than those who were marginalized, separated, or assimilated, whereas marginalized individuals suffered the most psychological distress, including problems with self-identification and cultural alienation, which also affected their self-esteem (Farver et al., 2002). However, Phinney, Cantu, and Kurtz (1997) found that American identity was associated with self-esteem only for non-Hispanic Whites, but not for other ethnic groups. These mixed results as explained above raised two issues in the acculturation literatures. First of all, cultural practices might offer only a substitute for cultural adpatations, as Portes and Rumbaut (2001 as cited in Schwartz et al., 2010) mentioned that many Asian American young adults in their sample were not proficient in their native languages, even though they still perceived their identification with their parents’ countries of origin and maintained many of their values (Schwarz et al. , 2010). Secondly, most researchers on biculturism did not sufficiently define an accurate operational definition of biculturism so that interpretation of those research results were problematic (Birman, 1994). Indeed, one finding in the United States, was that self-identification as American was markedly higher in non-Hispanic Whites than in ethnic minority groups (e. g. , Devos & Banaji, 2005; as cited in Schwartz et al. , 2010) and many White Americans did not perceived themselves as members of an ethnic group (Schildkraut, 2007; as cited in Schwartz et al. , 2010). In brief, different operational definition problems of acculturation arose from different theoretical models of acculturation regarding to their assumptions (LaFromboise, Coleman, & Gerton, 1993). LaFromboise et al. (1993) assumed acculturation as one of substitutes among the biculturism models. Biculturism as defined in this theory was viewed as the alternation model, which implied an individual in two culture contacts could be competent in both cultures without losing one of the cultures’ competencies in distinct cultural contexts as alternation model, whereas, fusion model meant a blended cultural identity, consisting of a synthesis of aspects of both cultures (LaFromboise et al., 1993). However, Berry’s (1997) integrating approach of biculturism differed from the bicultural model (LaFromboise et al. , 1993; as cited in Birman, 1994) and it emphasized more on the relationship between the two cultural groups based on its implicit assumption that one of two cultures were higher than the other within a single social structure (LaFromboise et al. , 1993). Benet-Martinez and colleagues found that â€Å"blended† bicultural individuals tended to report higher self-esteem and lower psychological distress than a marginal population (Chen et al. , 2008 as cited in Schwartz et al. , 2010) because the consistent availability of both cultural flows within the person’s everyday life increased the ease of activating the correct cultural schema in accordance with their environmental situations (Schwartz et al. , 2010). In contrast, Tadmor, Tetlock, and Peng (2009) argued that the bicultural model considered those marginal individuals in positive ways, when there was little interest in cultural maintenance and little interest in having relations with others, suggesting positive aspects of being a marginal person might be (1) sharing his or her condition with others of the same original culture; (2) engaging in institutional practices that were shared by other marginal people; (3) experiencing no major frustration from social expectations; and (4) still perceiving himself or herself to be a member of a group (LaFromboise et al., 1993). According to Sam and Berry (2006), many studies of how migrants coped with intercultural contacts had discrepancies in the ways in which they were operationalized and measured. As no standardized or widely accepted acculturation measures existed, it was necessary to design a clear and explicit formulation of acculturation instrument in order to assess acculturation adequately (Sam et al. , 2006). Further Sam and Berry (2006) pointed out that most empirical studies widely used a self-report type of questionnaires that had been recognized limitations such as social desirability, emphasizing obtaining divergent validation by source of information other than the respondents’ reports. Therefore, it is vital to understand each theory within its specific assumptions and not to generalize across all situations regardless of their similar findings (LaFromboise et al. , 1993). As this study discovered migrants’ acculturation processes so far within specific theoretical frameworks, literature findings in different research were mixed as to whether individuals could be highly acculturated and at the same time be strongly identified with their ethnic group (Farver, Narang, & Bhadha. , 2002). These confusing problems initially evolved because of the context in which migration arrangements and their acculturation processes were fundamentally transformed and increasingly uncertain due to globalization (Landolt & Da, 2005). Shiraev & Levy (2007) suggested a new approach to cross-cultural psychology in the twenty-first century, which was linked to the concept of globalization. Globalization was defined as a proliferation of cross-border flow and transnational networks due to new technologies of communication and transport that allowed frequent and multi-directional streams of people, ideas and cultural symbols (Castle, 2010). Castle also argued that globalization leads to major changes in the character of international migration. In other words, the context for migrant incorporation has already changed radically and will continue to do so. The rise of multiculturalism itself rather than assimilation or biculturism is one sign of this, but is not the end of the story: new forms of identity and belonging go beyond multiculturalism (Castle, 2010). Even though there is limited empirical evidence for clear statements for globalization, there probably are highly cosmopolitan groups who feel at home everywhere such as global business and professional elites might correspond with this image. But most members of transnational communities fall between these extremes, and probably have contradictory and fluctuating identities (Castle, 2002). Conclusions This study explored that a special case of cultural psychology was the study of how individuals respond to situations where they were in transition between their original culture and another that differed from it in some respects in terms of acculturation, especially within a specific theoretical frame that could apply to the specific situation (Adler & Gielen, 1994). There was no single theory widely accepted by all social scientists to agree with the emergence and perpetuation of international migration patterns in the world under globalization (Van Hear, 2010),suggesting that the contemporary migrating context in which such migrating arrangements were realized fundamentally kept transforming so that it became increasingly uncertain (Landolt and Da, 2005). Although the topic of cultural contact and individual’ change has attracted considerable attention in contemporary cross-cultural psychology, the field has been characterized by a lack of theoretical coherence, definitional problems with key constructs, and single sample studies that limit the external validity of empirical cross-cultural research (Ward and Kenney, 1994). As acculturation is a process which takes place over time, and which results in changes both in the culture and in the individual culture changes, it would be ideal o compare two sets of data are compared over time using the same people. However, in practice, it is impossible in most acculturation research settings (Sam et al. , 2006). Instead, a common alternative to longitudinal research is cross-sectional research in which a time-related variable, such as length of residence or generational status can be used for the generalizability of acculturation theories (Sam et al., 2006). In general, researchers of migrating studies need to be aware that it is the selective nature of the sample that happens across all migrating research. That is, individuals who chose to migrate would be different from those who do not (Sodowsky, G. , Kwan, K. , & Pannu, R. , 1995; as cited in Farver et al. , 1997). Finally, acculturation research generally focused on immigrants assumed to be permanently settled in their new host countries. As a result, the terms â€Å"migrants† or â€Å"international migrants† referred to the same type of migrants collectively. Moreover, many countries were both sending and receiving countries for different types of migrants, or in the process of transition from one type to the other (Castel, 2002). Therefore, where applicable, it is viable to design acculturation research studies classifying different types of migrants. References Adler, L. L. , & Gielen, U. P. (Eds. ). (1994). Cross-cultural topics in psychology. Westport: Praeger Publishers. Berry, J. W. (1980). Social and cultural change. In Triandis, H. C. , & Brislin, R. (Eds. ). Handbook of cross-cultural psychology (pp. 211-279). Boston: Allyn & Bacon. Berry, J.W. , Kim, U. , Power, S. , Young, M, & Bujaki, M. (1989). Acculturation attitudes in plural societies. Applied Psychology: An International Review, 38, 185-206 Berry, (1990a). Psychology of acculturation. In Berman, J. (Eds. ). Cross-cultural perspectives: Nebraska Symposium on Motivation (pp. 201-234). Lincoln: University of Nebraska Press. Berry, J. W. (1997). Immigration, acculturation, and adaption. Applied Psychology: An international review, 46(1), 5-68. Berry, J. W. , & Annis, R. (1974). A cculturation stress. Journal of Cross-Cultural Psychology, 5(4), 382-397. Berry, J. W. , Kim, U., Minde, T. , & Mok, D. (1987). Comparative studies of acculturative stress. International Migration Review, 21, 591-511. Berry, J. W. , Poortinga, Y. H. , Segall, M. H. , & Dasen. P. R. (1992). Cross-cultural Psychology: Research and application. New York: Cambridge university Press. Birman, D. (1994). Acculturation and human diversity in a multicultural society. In Trickett, E. J. , Watts, R. J. , & Birman D, (Eds. ). Perspectives on people in context (pp. 261-284). San Franscisco: Jossey-Bass Inc. Castele, S. (2002). Migration and community formation under conditions of globalization. The Center for Migration Studies of New York, 36(4), 1143- 1168. Cuellar, I. , Arnold, B. , & Maldonado, R. (1995). Acculturation Rating Scale for Mexican Americans-II: a revision of the original ARSMA scale. Hispanic Journal of Behavioral Science, 17, 275-304. doi: 10. 1177/07399863950173001 DelPilar, J. A. , & Udasco, J. O. (2004). Deculturation: Its lack of validity. Cultural Diversity and Ethnic Minority Psychology, 10, 169-176. doi: 10. 1037/1099- 9809. 10. 2. 169 Devos, T. , & Banaji, M. R. (2005). American = White? Journal of Personality and Social Psychology, 88, 447-466. doi: 10. 1037/0022-3514. 88. 3. 447 Farver, J. A. , Narang, S. K. , & Bhadha, B. R. (2002). East meets west: Ethnic identity, acculturation, and conflict in Asian Indian families. Journal of Family Psychology, 16(3), 338-350. doi: 10. 1037//0893-3200. 16. 3. 338 Jones, A. (2008). A silent but mighty river: the costs of women’s economic migration. Journal of Women in Culture and Society, 33(4), 761-807. Landolt, D. , & Da, W. W. (2005). The Spatially Ruptured Practices of Migrant Families: A Comparison of Immigrants from El Salvador and the People’s Republic of China. Current Sociology, 53, 625-652. doi: 10. 1177/0011392105052719. LaFromboise. , T. , Coleman. , H. , & Gerton (1993). Psychological impact of biculturism: Evidence and theory. Psychological Bulletin, 114(3), 394-412. Liebkind, K. (1993). Self-reported ethnic identity, depression and anxiety among youth Vietnamese refugees and their parents. Journal of Refugee Studies, 6, 25-39. Neblett, E, Shelton, J. N. , & Sellers, R. M. (2004). The role of racial identity in managing daily racial hassles. In Philogene, G. (Eds. ). Race and identity: The legacy of Kenneth Clark. Washington DC: American Psychological Association Press. Nesdale. , D. , Rooney. , R. , & Smith. , L. (1997). Migrant ethnic identity and psychological distress. Journal of Cross-Cultural Psychology, 28(5), 569-588. doi: 10. 1177/0022022197285004 Phinney, J. S. (1990). When we talk about American ethic groups, what do we mean? American Psychologist, 51, 918-917. Phinney, J. S. , & Ong, A. D. (2007). Conceptualization and measurement of ethnic identity: Current status and future directions. Journal of Counseling Psychology, 54, 271-281. doi: 10. 1037/0022-0167. 54. 3. 271 Portes, A. , & Rumbaut, R. G. (2001). Legacies: The story of the immigrant second generation. Berkerly: University of California Press. Redfield, R. , Linton, R. , & Herskovits, M. J. (1936) memorandum on the study of acculturation. American Anthropologist, 38, 149-152. Ross-Sheriff, F. (2011). Global migration and gender. Journal of Women and Social Works, 26(3), 233-238a. doi: 10. 1177/0886109911417692 Rudmin, F. W. (2003). Critical history of the acculturation psychology of assimilation, separation, integration, and marginalization. Review of General Psychology, 7, 3-37. doi: 10. 1177/01461670731197 Sam, D. , & Berry, J. W. (1995). Acculturative stress among young immigrants in Norway. Scandinavian Journal of Psychology, 36, 10-24. Sam, D. , & Berry, J. W. (2006). The Cambridge handbook of acculturation psychology [Electronic version]. Retrieved from http://www. qut. eblib. com. au. ezp01. library. qut. edu. au/patron. Schildkraut, D. J. (2007). Defining American identity in the 21st century: How much â€Å"there† is there? Journal of Politics, 69, 597-615. doi: 10. 1111/j. 1468-2508. 2007. 00562. x Schwartz, S. J. , Unger, J. B. , Zamboanga, B. L. , & Szapocznik, J. (2010). Rethinking the concept of acculturation: Implications for the theory and research. American Psychologist, 65(4), 237-251. doi: 10. 1037/a0019330 Sellers, R.M. , Caldwell, C. H. , Schmeelk-Cone, K. H. & Zimmerman, M. A. (2003). Racial identity, racial discrimination, perceived stress, and psychological distress among African American young adults. Journal of Health and Social Behavior, 44(3), 302-317. Seller, R. M. , & Shelton, R. M. (2000). The role of racial identity in perceived racial discrimination. Journal of Personality and Social Psychology, 84(5), 1079-1092. Shiraev, E. , & Levy, D. (2007). Cross-Cultural Psychology: Critical thinking and contemporary applications. Boston: Pearson Education Inc. Sodowsky, G. , Kwan, K. , & Pannu, R., (1995). Ethnic identity of Asians in the United States. In J. Ponterotto (Ed. ), Handbook of multicultural counseling (pp. 110- 130). Newbury Park: Sage. Stephenson, M. (2000). Development and validation of the Stephenson Multigroup Acculturation Scale (SMAS). Psychological Assessment, 12, 77-88. doi: 10. 1037/1040-3590. 12. 1. 77 Szapocznik, J. , Kurtines, W. , & Fernandez, T. (1980). Bicultural involvement and adjustment in Hispanic-American youths. International Journal of Interculture Relations, 4, 353-365. Tadmor, C. T. , Tedlock, P. E. , & Peng, K. (2009). Acculturation strategies and integrative complexity: The congnitive implications of biculturism. Journal of Cross-Cultural Psychology, 40, 105-139. doi: 10. 1177/0022022108326279 Tajfel, H. , & Turner, J. C. (2001). An Integrative theory of intergroup conflict. In Hogg, M. , & Abrams, D. (Eds. ). The social psychology of intergroup relations (pp. 94-109). New York: Psychology Press. Turner, J. C. , Hogg, M. A. , Oakes, P. J. , Reicher, S. D. & Wetherell, M. S. (1987). Rediscovering the social group: A self-categorization theory. Oxford: Balckwell. Unger, J. B. , Gallagher, P. , Shakib, S. , Ritt-Olson, A. , Palmer, P. H. , & Johnson, C. A. (2002). The AHIMSA acculturation scale: A new measure of acculturation for adolescents in a multicultural society. Journal of Early Adolescence, 22, 225-251. doi: 10. 1177/02731602022003001 Van Hear, N. (2010). Theories of migration and social change. Journal of Ethic and Migration Studies, 36(10), 1531-1536. doi: 10. 1080/1369183X. 2010. 489359 Yip, T. , G, C. G. , & Takeuchi, D. T. (2008). Racial discrimination and psychological distress: The impact of ethnic identity and age among immigrant and United States-born Asian adult. Dev Psychol, 44(3), 787-800. doi: 10. 1037/0012-1649. 44. 3. 787.

Friday, September 27, 2019

Corporate Strategy for Dyson Limited Assignment

Corporate Strategy for Dyson Limited - Assignment Example James Dyson founded it after he encountered several problems with the conventional wheelbarrow he was using in renovating his property, as it the wheel sank into the mud, was unstable and prone to punctures. In the technological sector, Dyson limited has finally entered the robot vacuum cleaner space, as the Dyson 360 Eye is finally unveiled ahead of its release this year. This invention came due to the consideration that most robotic vacuum cleaners do not see their environment, have little suction and do not clean properly. In other words, they are gimmicks. The company continues to produce vacuum cleaners in the United Kingdom holding a 20% retail volume share as at 2012. The discovery of the robotic vacuum cleaner will give it a competitive advantage over its competitors leading to an increase in sales. Its main competitors Vax Ltd and Hoover Candy Group posted sales of 10% and 8% respectively in 2012. From an economic viewpoint, the current market scenario does not provide favorable conditions to most industries to expand their businesses, especially, consumer related. Due to unfavorable demand, the vacuum cleaner production factory in Wiltshire is planning to shut down its manufacturing plant leading to a loss of 590 jobs. The firm is moving upright vacuum cleaner manufacturer to the Far East where labor costs less compared to the west. James Dyson, the owner of the company pointed out that there are still 1,150 people working at the factory. The market share of the company by volume has decreased from third to quarter over the last five years, which has led to a decline in sales volume and profitability. Lifestyle has changed in the emerging markets because of the increase in the number of people with quantifiable disposable income. Most single women and men prefer the robotic vacuum cleaners recently launched by Dyson due to its flexibility in cleaning and storage.  

Thursday, September 26, 2019

Greg is a property developer who specialises in building new houses Coursework

Greg is a property developer who specialises in building new houses and flats. His current project is the renovation of a statel - Coursework Example This report seeks to illuminate the weaknesses and strengths of Mr. Greg’s case of suing Sprewfits’ and his quest to receive compensation for damages upon the breaching of the contract terms. Mr. Greg ripped one of the pipes from the plastic and made an observation based on sight. Section 15 clearly states that if items are bought in a large amount or bulk and tests a sample of the item the supplier has to make sure that all the remaining should correspond with the sample1. The act clearly states that the buyer checks a small number and verifies the delivery goods. Mr. Greg rips one off and verifies it out. Apparently it happens to be one of the best pipes. If Mr. Greg would have checked for a couple more others, there is the probability that he would have seen at least one default pipe and reject the goods, but because of the trust in his supplier, one was all it took. In this case, an assumption was correctly made by Mr. Greg. The product looked okay prompting him to sign the delivery report, from which he made an assumption that all the pipes were all correct; in this case, an assumption of reasonableness. 25% of the pipes proved defective; they were either large or bent beyond use and most of them did not go in line with the sample. This does not make the cut under the contract of sale of goods act, by law these pipes have to be compensated even though there is no legal and direct warranty. Mr. Greg can however, have the terms of the contract withdrawn in case one of the parties takes advantage of the terms of the contract. According to the unfair contract terms of 1979, a contract of terms may be rendered useless or the contract withdrawn if one of the parties seems to make a deliberate breach knowing that the contract covers to protect his breach. The law has the power to render the contract powerless with the fact that Sprewfit intentionally delivered wrong goods as per the contract terms. In this case, Mr. Greg may have the contract nullif ied and have the faulty goods replaced with quality ones. Sprewfit is liable for replacement and compensation of the faulty good to Mr. Greg. According to the Unfair contract terms act 1979, subject to section 2 of the negligence of liability2. The act makes it clear that the a person can not be referred to a contract term when he or she intentionally breaches the agreement; and then claim to have the contract restrict him from liability for negligence, in this case it has resulted in a loss and a damage. This act makes Sprewfits responsible for the results of his act of negligence and is entitled to compensate Mr. Greg on the related sections. Mr. Greg describes the kind of pipes he needed to Ajay as 10mill in diameter, 1000 meters in total length and of high temperature resistance. Section 13 (1) provides that where the buyer is sold commodities by description, the goods must be in line with this description, for instance the Harlington v Christopher Hull case. He did not get that , if in any case the supplier had brought the right pipes and they were damaged then it would be considered as negligence on Mr. Greg’

Proposal Letter and Article Summary Essay Example | Topics and Well Written Essays - 1000 words

Proposal Letter and Article Summary - Essay Example Upon a critical review, of the request for Proposal, our skilled team of Information Technology experts developed a comprehensive structure that will aid in the equipment of the latest computer system. New desktop computers from IBM will be purchased and installed. Our supplier chain will be able to provide sealed pricing proposals of the latest branded and generic (IBM clone) desktop systems, as well as laptops. These computers will have to be networked in order to allow for information sharing and tighten security. Our team has developed a plan that integrates networking of the computers, configuration, installation of software and antivirus software, and training will provided to the staff in order to give them a hands-on experience on this new technology. We have already sent a catalogue of desktop computers and laptops from our supply chain to Kathy Hennig, the senior Purchaser at C.P.M., which has been approved. Smartechs Corporation specializes in software development and supplies computers and computer accessories to our esteemed customers. We also provide training solutions to our customers on Internet security, networking, and basic computer use, and software. As implied in our name, which means â€Å"smart technicians,† we are a dynamic company who believe in embracing technology for future change and success.

Wednesday, September 25, 2019

Falling oil prices are bad for the economy Essay

Falling oil prices are bad for the economy - Essay Example This includes that of United States, which is one of the major consumers of oil and oil related products (Pahl & Anne, 33). This paper argues that the low prices of oil, as they are witnessed currently, are very harmful to the economies of the world. One of the major impacts of the falling oil prices is the destruction of economies that are heavily relying on oil. Examples include the Russia, Venezuela, Iran, and even Saudi-Arabia. In a recent rating of the Venezuelan debt capability, the country was downgraded, and this is because of a drop in the oil prices, by more than 40% (Johnson, 5). This is because the country had a very low level of international reserves and foreign exchange. Furthermore, Venezuela is also experiencing economic declines, and this is because it is unable to pay off its government workers, and offer essential services such as health care services. In fact, President Maduro was able to tour most oil producing countries, in a bid to influence them to reduce the production of oil, but he was unsuccessful. Russia is also another country that is negatively affected by a low price of oil (Johnson, 5). Just as Venezuela, the Russian economy is dependent on oil; as a result, the value of the Russian currency has depreciated. Just as Venezuela, the Russian bonds are trading at a very low price, and this means that the two countries are experiencing a recession. In a recent credit rating of Russia, the rates of defaults were very high, and this means that trading in Russian bonds or debts was very risky. This is an indication that the Russian economy is experiencing a recession, mostly because of oil, and partly because of the economic sanctions that the European Union has placed on Russia. Pahl & Anne (44) explains that cheap oil are not only hurting the economies of states that are relying on the production and exportation of

Tuesday, September 24, 2019

Economic Policy of Obama and McCain Essay Example | Topics and Well Written Essays - 1000 words

Economic Policy of Obama and McCain - Essay Example McCain claims that the country was successful in the development of the 'concept of the internationalization of national economies which required multiple measures to capture it adequately', and for this purpose the country was able to achieve prominent mark in economic indices relevant to 'economic internationalization, the volume of international commercial transactions', the candidate therefore strongly intends to continue with such plan. Democrat presidential candidate has promised that soon after his election he would impose tax cuts on wealthy, and will protect the interests of the middle class. The presidential candidate also promised appropriate usage of funds extracted through taxes; the funds shall be invested to offer health care, education and housing incentives to the middle class. The presidential candidate for Republican shared the similar belief, but he wanted people from middle class to be placed in higher tax bracket so broaden the scope of tax revenue generation. The presidential candidates Barack Obama and McCain shared difference of opinion towards tax imposition on oil exploration companies. McCain denied adoption of field specific policy towards imposition of taxes; the bracket for taxes shall be based upon profit earned by the company, and shall not be trade or industry specific. According to Robert (2008) Obama emerged as staunch supported for cut in emission gases, and for that he devised a spe cial taxation policy applicable on oil companies, "this shall cause drop in the momentum of explorations activities undertaken by the oil companies", and shall restrict their revenue generation outlook. McCain resisted such move, and wanted to adopt non-industry-specific tax policy, which shall be applicable on all and shall be function of revenue generation. Obama protested by claiming that such measure will curtail the investment plans of the companies adopted green technology. Title: Obama, McCain economic policies in spotlight as election approaches Author: Motoshige Itoh Obama has warned that the economic concerns related with the implementation of the globalization has been significant, although in some of the cases the impact has been as per the aspirations of the local traders, but in majority of the American economy has experienced jolts. Obama has evolved strategy such per which the declination on American exports shall be protected during counter measures and agreement which shall curtail the emergence of China and India as the economic hub for the Asian countries. Itoh (2008) explicitly mentioned that Democrats have expressed their intention to focus much upon the exploring the potential of US manpower and workforce, to improve the employment figure. Democrats have blamed Republicans for their failure on this particular front, and have failed to bring the shares back to its homeland. However, the corporate sector of the country in consultation with the government of United States have established their industrial units in China and India, ther efore the qualitative standards will be certified by the American company but the production will be fabricated

Monday, September 23, 2019

Crime Case Study Example | Topics and Well Written Essays - 1500 words

Crime - Case Study Example In 1991, 35.7% of students in high school in the US were involved in physical fights and violations (Mass General Hospital for Children, â€Å"Violence Committed by Adolescents†). Thus, the incident which took place in the Gigantic State University can be stated as a crime. Negligence There was a negligence involved in the case from both the parties. The rise of tuition fees had resulted in violation among the students. The university could have negotiated with the Members of Students for Fair Tuition (SFT) regarding the tuition fees and the students should not have entered the President’s building by breaking the law. Laws and Rights The students broke the laws and rights of the university by taking such a violent step. They violently entered the President’s building and caused damage. Thus, the general civil laws were violated that prevents any person from causing any physical or mental damage to human beings as well as property. They also uttered bad words to the President. They were attempting to attack the President but were not successful to attack him and instead they threatened Prudence Pimply, the secretary. People Liable for Damages Students and University both were liable for the damage caused. If the university would not have raised the tuition fees suddenly, then such situation would not have cropped up. The mental damage was caused to the secretary of the president. She was not involved in this case but became a victim. Moreover, the rising tuition fees also caused physical and mental damage to the students of the university. Tort Liability and Exploration of Assault, Battery, Infliction of Emotional Distress and False Imprisonment A tort is considered as a complex legal concept that transcends to a wrong which may be restored that may not be criminal (governmental) or contractual (private) in its existence (University of South Florida, â€Å"Tort Liability†). The touching of one person without the consent of him or her with an intention to harm others is referred as assault. An assault might be committed without the assistance of battery and battery can be occurred without the help of assault. Battery means striking a person from behind without the consent of a person (Duhaime org, â€Å"Assault Definition†). Infliction of emotional distress is the cruel and disgraceful causation of extreme emotional distress. There are four planned infliction related to emotional distress. The conduct may be intentional, it can be severe and outrageous, causal association may be there between illegal conduct along with emotional distress. In addition, the emotional distress can be severe (Duhaime org, â€Å"Intentional Infliction of Emotional Distress Definition†). False imprisonment relates to ‘intentional as well as complete imprisonment of a person against his or her will and without lawful justification’. The activities of false imprisonment will lie where a person is inappropriate ly detained. Moreover, little force is associated with detention (Duhaime org, False Imprisonment Definition†). In this incident, primarily infliction of emotional distress was caused to Prudence Pimply by the protesting members. 2.0 Case 2 Negligence Negligence takes place when the activities of both parties fail to perform effectively. When each party has certain state of negligence, accident takes place. In this case, Steve Simple was sent to climb the tower for painting, but tremendous thunderstorm had exposed him to a great danger of being hit by

Sunday, September 22, 2019

Looking for Alaska Essay Example for Free

Looking for Alaska Essay John Green’s 2006 novel Looking for Alaska personally affected me as I could relate to one of the main characters Miles (Pudge). The theme of belonging was also very relevant as this novel touches on the concern of Miles fitting into his new school and finding out how everything works at Culver Creek Preparatory. I directly can relate to Miles in this sense as I am still new and am trying to figure out how my new school works and also finding a friendship group that I am comfortable in. This novel is great because it raises questions about individuals understanding of true friendship, love, loyalty and having a sense of belonging. It shows the importance of truly living life to the fullest rather that just watching it fly by. The conflicts within the characters themselves lead readers inward to examine how much everyone needs a sense knowing where we belong. Pudge buys the cigarettes to show that he can be a part of his new friendship group’s crowd. A certain amount of peer pressure was probably involved, with Pudge worried about ‘fitting in’ and making friends. â€Å"The Colonel talked me into paying five dollars for a pack of Marlboro Lights I had no intention of ever smoking. † I think that by Miles giving into this peer pressure he would hope that it would make him feel more normal and apart of that what his friends were partaking in. The use of first person narrative point of view allowed me to experience things as Miles does. It gave me a deeper understanding of how he is affected by people, events and his own reactions and feelings as the novel progresses. This is no more clearly seen than in the event of Alaska dying, I was limited to Miles’ own feelings and emotions surrounding her death. The idea of guilt and loss becomes apparent as we see him struggle to deal with her death and the role he played in it, with him trying to figure out where he belongs. He experiences a loss of innocence as he is forced to re-evaluate his philosophy on life and find his own place in the world. Alaska’s death aids in Miles’ coming-of-age journey. â€Å"I felt the total loss of her, still reeling from the idea that she was not only gone from this world, but from them all† This can be very relatable for other audiences who might have suffered a great loss like Miles’. Looking for Alaska depicts many messages about one’s vital need to belong, some of which I can personally relate to. As well as other aspects of the novel that other audiences can personally relate to.

Saturday, September 21, 2019

Cyber Warfare: the Future of War

Cyber Warfare: the Future of War CHAPTER I INTRODUCTION Karl von Clausewitz defined war as an act of violence intended to compel our opponent to fulfill our will In order to attain this object fully, the enemy must be disarmed, and disarmament becomes therefore the immediate object of hostilities. At the end of the second millennium, this classification no longer describes the full spectrum of modern warfare. In the future, we will have the prospective to make war without the use of violence and fulfill the second half of von Clausewitzs definition-with software alone. Todays software intensive systems make this probable. Cyber describes systems that use mechanical or electronic systems to swap human control. Cyber warfare can be executed without violence and therefore the reliance on software intensive systems-cyber systems-can make nations exposed to warfare without violence. What is Cyber? Terms with cyber used as prefix are currently in vogue not only among some visionaries and technologists seeking new concepts, but even by the man in the street, and each has its own connotation. The term cyber is from Greek root kybernan, meaning to steer or govern and a related word Kybernetes, meaning pilot, governor, and/ or helmsman. Norbert Weiner first introduced the prefix in the 1940s in his classic works creating the field of cybernetics (which is related to cybrenetique, an older French word meaning the art of government). Cyber, in fact has been the most acceptable term due to the reason that it bridges the gap between information and governance, the two inseparable facets of control. The prefix therefore, is freely used in the following: Cyberspace. Originally coined by William Gibson in his science fiction novel Neuromancer, published in 1984, and defines it as that position within the computer where electronic activity / communication takes place. He further describes it as a place of unthinkable complexity. The term has given rise to a vocabulary of cyberterms such as cybercafes (cafes that sell coffee and computer time), cybermalls (online shopping services) and cyberjunkies (people addicted to being online). Cybernetics. It is the science of communication and control, which interfaces a monitor (human brain or an electronic machine) to other parts of a system. The function being, to compare what is happening in the system, to what should have happened and then draw the difference, which is passed on to the control system for rectification (feedback). It applies equally to organisations, machines and organisms. Cybernetics is also used to describe a general analytical approach to control, communication and other system technologies and attempts to link engineering disciplines with the related work of social scientists through the unifying threads of feedback in its most general aspects and through its interest in transfer of information. Cyberwar. A RAND Corporation synonym for information warfare, it is also sometime called netwar. Another school considers it as knowledge related conflict at the military level. However, Denis Quigley comes close by designating it as control warfare or leitenkreig in German. Cyberwar will be discussed more in detail later in the Study. Cybernation. Loosely used, it implies digitisation of various systems of an arrangement/organisation or super systems, where electronics links humans to machines, thereby immensly amplifying the human capabilities. It, in its most basic form, would indicate electronic automated management of information and knowledge. Cyber warfare (CW). It is a relatively new addition to the glossary of warfare. With the escalating use of computers in military and government, there has been a growing awareness of both a new susceptibility in national infrastructure and a new method of attacking ones enemies. There is the potential of using information systems to protect, control or attack information networks. CW could mean winning wars without firing shots, the shutting down of entire national infrastructures at the push of a button, and the complete exploitation or destruction of an enemys communication networks. It could mean threats from across the world by states with no ability to launch a conventional attack, or attacks by non-state actors using cheap laptops. There has also been talk of super-viruses shutting down nations, and how a disgruntled individual or small group could wage a war on a nation. CW is the new wonder weapon, and the new unknown threat. However, the concept of CW, and the technology on which it relies, is beset by vague depictions of the dangers it presents, or the benefits it offers. CW is conceptualised by security expert Amit Yoran, cyber-security chief at the US Department of Homeland Security and vice president of computer corporation Symantec, as the future primary theatre of operations. There is a consensus that CW is something noteworthy, but it is not clear if this consensus extends to a common understanding of what CW actually is. It is so new that there is no standard definition to describe it. This leads to one of the most frequent confusions regarding cyber warfare: its relation to Information Warfare (IW). IW is not unproblematic in definition, but can be understood as the offensive and defensive use of information and information systems to deny, exploit, corrupt, or destroy, an adversarys information, information-based processes, information systems, and computer-based networks while protecting ones own. While IW covers the territory of cyber warfare, it also covers a much broader mandate. Electronic (cyber) communication is only one aspect of IW, which includes all information operations in a conflict. Chinese strategist Sun Tzu and Napoleonic strategist Carl von Clausewitz referred to information operations, and the importance of such operations in war. IW predates electronic communication, and is not interchangeable with cyber warfare for this reason. CW involves units organized along nation-state boundaries, in offensive and defensive operations, using computers to attack other computers or networks through electronic means. Hackers and other individuals trained in software programming and exploiting the intricacies of computer networks are the primary executors of these attacks. These individuals often operate under the auspices and possibly the support of nation-state actors. In the future, if not already common practice, individual cyber warfare units will execute attacks against targets in a cooperative and simultaneous manner. Analyzing the Threat. In 2007, a denial-of-service attack was launched every 53 minutes. The 2007 FBI/Computer Security Institute study indicated that loss of revenue attributed to DDoS (dedicated denial of service) was approximately US$90,000 an hour for a retail catalog sales company. Malware is a common cyber-weapon. Malware (short for malicious software) is a computer program designed with malicious intent. This intent may be to cause annoying pop-up ads with the hope you will click on one and generate revenue, or forms of spyware, Trojans and viruses that can be used to take over your computer, steal your identity, swipe sensitive financial information or track your activities. At least five new pieces of malware emerge every two minutes, according to Kasperskys Internet Security Lab. One critical measure I monitor regularly is the number of significant events reported to Hackerwatch.Org. At the time Im writing this, in the past 24 hours, there have been more than 8 million sign ificant incidents reported. The warning signs are there, but the question remains: Are we smart enough to prepare? A key premise of this paper is that information processing-whether by equipment (computers) or by humans-is becoming a center of gravity in future warfare. Although there is much debate on the reality of the CW threat, the growing number of computer intrusions on government and non-government systems substantiate the fact that the threat is very real. The growing dependency on information and information based technologies have made us very vulnerable to hostile attacks Hence, our immediate goal must be to both imagine and define how foreign cyber attack capabilities might threaten information networks in India and what potential effects they might have. METHODOLOGY Statement of Problem This paper seeks to study and analyse the use of cyber warfare in future conflicts its implications on national security. To suggest Indias response to these cyber threats by outlining a clear, well defined cyber security strategy and suggest measures to safeguard own national security. Hypothesis As information systems permeate in military and civil lives, a new frontier is being crossed The Information Age- which will define the future wars. Cyber Warfare has become central to the way nations fight wars and is the emerging theatre in which future conflicts are most likely to occur. Cyber warfare will take the form of a devastating weapon of the future battlefield which will be integrated in the War fighting Doctrines of nations across the world. Justification of Study The premise of cyber warfare is that nations and critical infrastructure are becoming increasingly dependent on computer networks for their operation. Also as armies around the world are transforming from a platform centric to a network centric force there is increasing reliance on networking technology. With all the advantages of such connectivity come unprecedented challenges to network security. Threats to information infrastructure could be in the form of destruction, disclosure, modification of data and/or denial of service. A hostile nation or group could exploit the vulnerabilities in poorly secured network to disrupt or shut down critical functions. The protection of our information resources information assurance, will thus be one of the defining challenges of national and military security in the years to come. To take advantage of Information Technology revolution and its application as a force multiplier, the Nation and army in particular needs to focus on Cyber Security to ensure protection / defence of its information and information system assets. Many will argue that defence and intelligence computer systems of most countries including Idia are air gapped and thus, isolated from the Internet. It may appear convincing that by air gapping the networks and using superior technology, the risk may be reduced. However, this will not provide fool proof security. With the proliferation of technology at an astronomical rate, the threat of cyber terrorism will only increase. The air gapped networks are vulnerable from insiders, disgruntled employees and moles planted or recruited by cyber terrorists or their sympathisers to cause the intended damage. A cyber terrorist may impersonate a computer technician and call individuals within the targeted organisation to obtain information to penetrate a system. Once in possession of legitimate log on information, cyber terrorists will have Iegal access to a system and can insert viruses, trojan horses, or worms to expand their control of the system or shut it down. In Russia, hackers used a gas company employee to plant a trojan horse which gave them control of the nations gas pipelines. It is against this backdrop that it becomes imperative as a soldier to understand cyberspace, the threat that it poses and to suggest some steps in order to minimise, if not eliminate the menace that it would cause. Scope This study concentrates on the evolution of cyber warfare and the giant leaps that it has taken in the past decade. The entire spectrum of cyber conflict, including threat reality of cyber warfare being used as a potent and devastating weapon of the future battlefield has been covered. Further the study outlines the cyber warfare capabilities of select nations and how vulnerable India is to these threats. Finally the report outlines a cyber security strategy and recommendations for combating the cyber warfare threat in the 21st century. Methods of Data Collection The data has been collected through various journals, seminar papers and certain books on the subject. Some material has also been downloaded from the Internet. A bibliography of sources is appended at the end of the text. Organisation of the Dissertation It is proposed to study the subject under following chapters: Chapter I Introduction and Methodology. Chapter II The Future of Warfare. Information Revolution and Warfare. Defining Cyberwar. Evolution of Cyber Warfare. Chapter III Global Threat in Cyberspace. Threats in Cyberspae. How Real Is the Threat? Spectrum of Cyber Conflict. Recognition of the Cyber Warfare Threat. Chapter IV Combating the Threat. How Vulnerable are We? Cyber Security: A Few Initiatives. Def Cyber Warfare. Cyber security Strategy. Chapter V Conclusion. The Digital Battlefield. Recommendations. CHAPTER II THE FUTURE OF WARFARE So it is said, if you know others and know yourself, you will not be imperiled in a hundred battles; if you dont know others, but know yourself, you will win one and lose one; if you dont know others and dont know yourself, you will be imperiled in every single battle. -Sun Tzu Will conventional warfare remain the custom for the future or will a new wave of warfare emerge? Down through the corridors of time, wars have been fought for various reasons. Conflict arose from regional instabilities, economic and social perils, and religious animosities. In their book, War and Anti-War: Survival At The Dawn of The 21st Century, Alvin and Heidi Toffler categorize the progression of warfare into three stages or waves: agrarian, industrial, and informational. While some areas of the world still remain in the agrarian realm and some others have advanced to the industrial state, a few have broken out into a completely new era-the information age. Information Revolution and Warfare If you know the enemy and know yourself, you need not fear the result of a hundred battles .If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle. This extract comes from the 6th century BC Sun Tzus The Art of War and is still as compelling today as it was two and a half millennia ago. As a matter of fact, it is in all probability safe to say that knowledge and information about ones adversary have a greater impact now than they have had at any other point in the history of warfare. At the same time, critical information is now often stored electronically in spaces reachable from the Internet, which means there is a prospective for it to leak out to ones adversary, or for the opponent corrupting it in order to affect ones decision making capabilities. There is no standardised definition of Information Warfare. However it has been defined as Actions taken to achieve information superiority by affecting adversely information, information based processes, information systems and computer based networks of the adversary, while protecting ones own information. An aim of warfare always has been to affect the enemys information systems. In the broadest sense, information systems encompass every means by which an adversary arrives at knowledge or beliefs. A narrower view maintains that information systems are the means by which an adversary exercises control over, and direction of fielded forces. Taken together, information systems are a comprehensive set of the knowledge, beliefs, and the decision making processes and systems of the adversary. The outcome sought by information attacks at every level is for the enemy to receive sufficient messages that convince him to stop fighting. Information Warfare is a form of conflict that attacks information system directly as a means to attack adversarys knowledge or beliefs. Information Warfare can be prosecuted as a component of a larger and more comprehensive set of hostile activities a net war or cyber war or it can be undertaken as the sole form of hostile activities. Most weapons, a word used to describe the lethal and nonlethal tools of warfare only have high utility against external adversaries. While most often employed against external adversaries, many of the weapons of information warfare are equally well suited for employment against internal constituencies. For example, a state or group cannot use guns or bombs against its own members; however, the weapons of Information Warfare can be used, have been used, and very likely will be used against both external and internal adversaries. Information warfare as defined by Martin Libicki has seven components: Command and Control Warfare. Intelligence based warfare. Electronic Warfare. Psychological Operations. Hacker Warfare. Economic Information Warfare. Cyber Warfare. This concept of seven components is universally recognised today, as it encompasses the entire spectrum that Information Warfare offers. Besides, it strongly argues that Information Warfare is not exclusively a military function and various actors viz. the media, private industry and civil society including civilian hackers play a key role in building a nations capability to wage Information Warfare. The role of private industry has gradually been acknowledged as cutting edge information technologies become increasingly pervasive in sensors and weapon systems. The information systems while making the military more efficient also render it vulnerable to attacks on the systems itself. Winn Schwartau, also known as the Civil Architect of Information Warfare has defined Information Warfare in this very context: Information Warfare is a conflict in which information and information systems act as both the weapons and the targets. As far as the Indian viewpoint on Information Warfare is co ncerned, history amply reveals that information was essentially viewed as a strategic resource. Kautilya, the great strategist of the Maurya period, strongly advocated the need of obtaining accurate information about the enemy forces and plans of action. In fact, he is considered to be instrumental in the victory of the Mauryans and placing Chandragupta Maurya on the Magadha throne. His astute thinking on warfare and statecraft is portrayed in the famous treatise Arthshastra. While postulating that war may not always be the right option, Kautilya espoused the importance of information and knowledge in winning wars. Information Superiority and Cyber Warfare. Information Technology is a double edged weapon. It provides vast opportunities but simultaneously introduces new vulnerabilities and threats, which may arise through computers, content and connectivity or, to put it differently, hardware, software, information and networks. Information superiority over our adversaries including militant and terrorist outfits is very essential. Non Lethal information weapons can black out communication systems, destroy valuable data and cripple the nation. Therefore, we have to act faster than any adversary. This requires defensive as well as offensive cyber warfare capabilities. Cyber warfare can be a full fledged war and vital infrastructure shall get targeted. To handle cyber wars, highest national level decision making is required, in real time and with full fall back options. For this purpose, basic building blocks include excellent monitoring tools for network traffic, web sites and databases, intrusio n detection, firewalls, encryption and decryption algorithms, public key infrastructure and remote access facilities. Offensive cyber warfare spans computer crimes and information terrorism. Everyone is under threat telephone, power supply, banks, transport, and the day to day needs. lt is important to create tools, awareness, and structures to assess threats to information resources, including military and economic espionage computer break-ins, denial-of-service, destruction and modification of data, distortion of information, forgery, control and disruption of information flow, electronic bombs, etc. ln essence, the thrust of the initiatives must lead to information assurance like life assurance. Defining Cyberwar Cyber Warfare. It is the sub-set of information warfare that involves actions taken within the cyber world. There are many cyber worlds, but the one most appropriate to cyber warfare is the Internet and related networks that share media with the Internet. Cyber Warfare as related to defence forces refers to conducting of military operations according to information related doctrine. It means disrupting or destroying information databases and communication systems. It means trying to know everything about the enemy while keeping the adversary from knowing much about oneself. It means turning the equilibrium of information and knowledge in ones favour especially if the balance of forces is not. It means using information so that less capital and labour may have to be expended. Cyberwar refers to conducting, and preparing to conduct, military operations according to information-related ideology. It means disrupting if not destroying the information and communications systems, broadly defined to include even military culture, on which an adversary relies in order to know itself: who it is, where it is, what it can do when, why it is combating, which threats to counter first, etc. It means trying to know all about an opponent while keeping it from knowing much about oneself. It means turning the balance of information and knowledge in ones favour. This form of warfare may involve diverse technologies-notably for C3I; for intelligence collection, processing, and distribution; for tactical communications, positioning, and identification-friend-or-foe (IFF); and for smart weapons systems-to give but a few examples. It may also involve electronically blinding, jamming, deceiving, overloading, and intruding into an adversarys information and communications circuit s. Yet cyberwar is not simply a set of measures based on technology. And it should not be confused with past meanings of computerized, automated, robotic, or electronic warfare. Cyber warfare requires different principles of warfare which have been derived from thousands of years of experience as documented by Sun Tzu, Clausewitz, Jomini, Liddell-Hart, and others. Some of the kinetic warfare principles apply to cyber warfare while some principles of kinetic warfare have no meaning in cyber warfare. Some principles of kinetic warfare may actually be antagonistic to cyber warfare. The various characteristics and principles of cyber warfare are as under: Waging cyber war is relatively cheap. Unlike traditional weapon technologies, acquiring information weapons does not require vast financial resources or state sponsorship. Boundaries are blurred in cyberspace. Traditional distinctions public versus private interests, warlike versus criminal behavior, geographic boundaries, such as those between nations tend to get lost in the chaotic and rapidly expanding world of cyberspace. Opportunities abound to manipulate perception in cyberspace. Political action groups and other nongovernment organisations can utilize the Internet to galvanize political support. Cyber war has no front line. Current trends suggest that the economy will increasingly rely on complex, interconnected network control systems for such necessities as oil and gas pipelines, electric grids, etc. and these will become vulnerable to cyber attacks. Cyber-warfare must have kinetic world effects. Cyber warfare is meaningless unless it affects someone or something in the non cyber world. Anonymity. Cyber warfare can be waged anonymously. Anonymity is the nature of new technologies, especially telecommunications. An anonymous attack creates two problems. Not only has a states national security been breached, but there is no one to hold accountable for the attack. Offensive Nature. Information technology and computer systems are vulnerable by nature. Therefore, taking defensive measures against the information warfare threat will always be difficult and costly. Improving the defense of information systems also contributes to the security dilemma since decreasing ones susceptibility to information warfare increases the attraction of using information warfare offensively. Cyberwar may have broad ramifications for military organization and doctrine. As noted, the literature on the information revolution calls for organizational innovations so that different parts of an institution function like interconnected networks rather than separate hierarchies. Thus cyberwar may imply some institutional redesign for a military in both intra- and inter-service areas. Moving to networked structures may require some decentralization of command and control, which may well be resisted in light of earlier views that the new technology would provide greater central control of military operations. But decentralization is only part of the picture; the new technology may also provide greater topsight-a central understanding of the big picture that enhances the management of complexity. Many treatments of organizational redesign laud decentralization; yet decentralization alone is not the key issue. The pairing of decentralization with topsight brings the real gains. Cyberwar may also imply developing new doctrines about what kinds of forces are needed, where and how to deploy them, and what and how to strike on the enemys side. How and where to position what kinds of computers and related sensors, networks, databases, etc. may become as important as the question used to be for the deployment of bombers and their support functions. Cyberwar may also have implications for the integration of the political and psychological with the military aspects of warfare. In sum, cyberwar may raise broad issues of military organization and doctrine, as well as strategy, tactics, and weapons design. It may be applicable in low- and high-intensity conflicts, in conventional and non-conventional environments, and for defensive or offensive purposes. As an innovation in warfare, I anticipate that cyberwar may be to the 21st century what blitzkrieg was to the 20th century. At a minimum, it represents an extension of the traditional importance of obtaining information in war-of having superior C3I, and of trying to locate, read, surprise, and deceive the enemy before he does the same to you. That remains important no matter what overall strategy is pursued. In this sense, the concept means that information-related factors are more important than ever due to new technologies Evolution of Cyber Warfare Since the early days of the Internet, there were individuals trying to compromise computer systems security via the network. Initially their activities were limited to defacement of web pages and motivated mostly by mere thrill seeking. In the 1990s political activists realized the potential for publicity coming with the attacks, and defacements carrying a political message became more frequent (Hacktivism). The palette of attack types also widened greatly, most notably some of them became aimed at bringing services or whole systems down, by generating excessive network traffic (denial of service, email bombardments). The first reported politically motivated cyber terrorist attack using a flood of emails was carried out by the Tamil Tigers against Sri Lankan embassies in 1998. It was successful, even as it did not bring targeted servers down, because more importantly it attracted worldwide media attention to the attackers cause. Activist groups involved in other struggles around the world soon followed with similar attempts. The diplomatic conflict between Pakistan and India over Kashmir has, since the late 1990s, been paralleled by a series of mutual cyber attacks. In the Middle East, every time political or military fight escalated between Israel and Palestinians, so did fights on the virtual battlefield. Both sides have used sophisticated techniques and well planned strategies for their cyber attacks. Pro-Palestinian attacks have been carried out by a number of terrorist groups (some of which even came up with the term cyber jihad), and pro-Jewish ones might have been coordinated by the state of Israel, though there is no clear evidence to support that. Studies have shown that Israel leads the list of countries in terms of numbers of conducted computer attacks per 10,000 Internet users. This brings us to the newest trend in cyber warfare: cyber attacks carried out by hacker groups inspired, coordinated, funded and supplied with resources by nation states. They are usually large scale and prolonged operations targeting specific systems within enemy structures. Probably the first of this type of attacks took place during the NATO air strikes against targets in Former Republic of Yugoslavia during the Kosovo violence in 2000. Targeted were all 100 of NATO servers, each subject to excessive network traffic originating mostly from Serbia, as well as Russia and China its supporters in the conflict. The cyber attacks caused serious disruptions in NATOs communication and services, lasting several days, but did not directly affect the bombing campaign. These days cyber warfare still mostly consists of uncoordinated cyber terrorism acts performed by groups whose main aim is publicity and media coverage. Gradually though the nature of cyber warfare is going to change into activities coordinated and paid for by nation states and large international terrorist networks. We can expect attacks trying to exploit vulnerabilities in critical infrastructure like telecommunication systems, airports, power plants, oil and gas infrastructure, supply of water, and military systems. In the coming years we are likely to see a quick rise in the number of cyber battles and one can imagine that in the future wars are going to be fought without dropping bombs and firing missiles. CHAPTER III GLOBAL THREAT IN CYBERSPACE Threats in cyberspace There are four fundamental categories of threats to our information and information infrastructure, characterised by the degree of structure in their attack capability and the measure of trust or access that the threat enjoys. These categories are: Unstructured External Threats. These are individual or small group of attackers who rely heavily on others tools and published vulnerabilities. They attack targets of opportunity and lack persistence against difficult targets. Structured External Threats. These are coordinated attackers i.e. hostile intelligence agencies or organised crime syndicates, which possess a deep technical knowledge of the target, strong motivation, and the capability to mount combination attacks using multiple complex tactics and techniques. Non Malicious Internal Threats. These are accidental breaches of security caused due to ignorance or malfunctioning of system. Malicious Internal Threats. Here the attackers are trusted members of the org or a less trusted support worker with some degree of access. The threats can also be classified under the following heads: