Sunday, March 29, 2020

Homelessness Essays - Homelessness, , Term Papers

Homelessness The Stewart McKinney Act of 1987 defines a homeless person as Aone who lacks a fixed permanent nighttime residence, or whose nighttime residence is a temporary shelter, welfare hotel or any public or private place not designated as sleeping accommodations for human [emailprotected] (583). Included in the homeless population are people who stay with friends or family for a short period of time and then decide to find shelter on the streets because of conflict with the people whom they are staying with, or because of personal pride. In the early 1980=s homelessness was determined to be a major problem in the United States. These years saw a steep rise in the number of homeless, due to poor economy and diminishing financial help for housing and income. The homeless consist of all types, races, and ages of people. A large portion of the homeless population consists of men but the number of women and children living on the streets is on the rise. Current statistics show that women and children now make up around forty percent of the homeless population. According to John J. Macionis one-third of homeless people abuse drugs and one-fourth are mentally ill. The current homeless population is mostly non-white and has an average age of the middle thirties. Veterans make up about one-third of the total number of homeless men. The homeless all suffer from absolute poverty. As stated in 1995 by the United States government, 36 million people or 13.8% of the population was poor. The government defines a family of four as being poor if they generate a yearly income of $15,569 or less, although the average improvised family=s income was only around $10,000 in 1995. The Encyclopedia of Applied Ethics states, the average annual income of the homeless in Chicago was $1198 in 1996 (584). APerhaps we should not be surprised that one percent of our population, for one reason or another is unable to cope with our complex and highly competitive [emailprotected] (Macionis 183) According to the Encyclopedia of Applied Ethics homelessness in America has several causes. One such cause is the competitiveness of the business market. Companies are no longer as loyal to their employees as they used to be. Many corporations now use overseas laborers. Also, a diminishing amount of low-skill jobs, due to industrialization has increased the chances of low-skilled workers finding employment. The Chicago coalition for the homeless states that a person must be employed full time and earn more than $8.29 per hour in order to exceed the federal poverty level for a family of four. According to the 1997 census report 2.3 million people worked full time but were still below the poverty line (5). Another reason for the increased number of homeless is the lack of affordable housing, especially in urban areas. The Chicago Coalition for the Homeless reports that, nationally, 10.5 million low income renters compete for 6.1 million rental units that are within their price range, leaving 4.4 million without affordable housing (3). Many low-income areas are being bought out by wealthy entrepreneurs who remodel and restore them and restore them and sell them for a large profit. The mainstreaming of institutionalized mental patients is another reason for homelessness. According to Microsoft Encarta nationally 20-25% of the homeless population suffers from some sort of major mental illness (2). These people are less likely to be able to obtain support such as treatment, case management and the help that is necessary to find and maintain permanent housing. The most recent cause of homelessness in the United States is the Afeminization of [emailprotected] Because of the high expense of child care and the increasing numbers of single mothers, the number of homeless women and children is on the rise. According to Stacey Chambers the rise in the number of homeless women is partially due to domestic violence. In an interview of homeless mothers ninety-two percent had been assaulted at one time in their lives. More than half had suffered from bouts of major depression inther lives whereas only twenty percent of the United States female population had suffered from similar depression (2). Despite these facts and statistics, little else is known about these people. Most sociological surveys are conducted by phone or

Saturday, March 7, 2020

The Dubai City Essays

The Dubai City Essays The Dubai City Essay The Dubai City Essay Dubai is the most populous city in the United Arab Emirates (UAE) and is one among the seven emirates. It is situated on the Arabian Peninsula along the southern coast of the Persian Gulf. To distinguish it from the emirate, Dubai city is sometimes referred to as the Dubai Municipality. This city has been estimated to have existed for more than one hundred and fifty years prior to the formation of UAE. Within the federal framework, Dubai shares economic, political, military and legal functions with its fellow emirates. However, each country has its own jurisdiction over special functions such as upkeep of local facilities, provision of local facilities and civic law enforcement (Brown, 2006, p. 15). In this union, Dubai has the largest population and is the second largest after Abu Dhabi. In the country’s legislature, veto power is exercised on matters that are considered of national importance. In the early 19th century, Dubai was established and operated independently until 1833. With the British government, the country signed the general maritime peace treaty. In 1892, the country came under the protection of the United Kingdom after an exclusive agreement. The country has a history of being an important port for foreign based traders, most of them coming in from India. Ultimately, many of the traders ended up settling in the nation because of the conducive investment and trading environment the nation had. The fame of the country started as early as 1820s and is still very much pronounced today. Today, the nation is mostly referred to as the City of Dubai (Omar, 2006, p. 11). During these times, Dubai was very well known for exporting pearl. Unanticipatedly, the trade was dismissed by the events of the World War 1 in 1930s. The effects of the great depression in the late 1920s also devastated the growth and development of the city. In the realm of the economic challenges the city faced, it experienced massive migration of people to seek better living in parts of the Persian Gulf. The 1950s marks the time when the British moved its local administration offices to Dubai and thus airport, telephone and electricity services were established in the city. The town joined Qatar in 1966 to form a new monetary unit, Dubai/Qatar Riyal. This move led to the devaluation of the Gulf Rupee that had previously lasted as the medium of exchange. Still in 1966, oil was discovered in Dubai and the town granted concessions towards international oil companies. When it was discovered, a large influx of foreign workers mainly Pakistanis and Indians was experienced by the city (Ciecko, 2006, p. 19). Through some estimates, the population of the town grew by more than 300% from 1968 to 1975. The Britain protectors left the Persian Gulf in 1971, leading the emirates to join and form the United Arab Emirates (UAE). Dubai joined fellow emirates in adopting a uniform currency, the UAE dirham. Despite the influx of the Lebanese immigrants fleeing civil war in Lebanon in 1970, the city continued to grow rapidly because of the revenues collected from trade and oil. In 1979, Jebel Ali port was established, becoming the largest manmade port around the world. This port enabled the foreign companies to have an unrestricted importation of labor as well as export capital (Rugh, 1997, p. 23). In 1990, the effects of the Persian Gulf War had a large impact on the city. This war created uncertainty in the political fields within the whole region. As a result, the economy experienced a shock as Dubai banks withdrew their funds massively. During the Persian Gulf War, Kuwait trading community moved their businesses to Dubai. During the Shia unrest, communities from Bahrain also moved their businesses to the city since it was felt as the best investment site in the region by then. During the Persian Gulf War, the city provided refueling services at Jebel Ali free zone to allied forces. The town provided the same services during the 2003 invasion of Iraq. After the Persian Gulf War ended, oil prices increased largely, encouraging the nation to highly focus on tourism and free trade. The model to develop clusters of new free zones was fueled by the success of the port. The clusters included Dubai Maritime City, Dubai Media City and the Dubai Internet City. Dubai marketed its tourism sector through the construction of Burj Al Arab which up to now serves as the tallest freestanding hotel in the world, and also as the most developed residential holdings. In creating Dubai’s skyline, the country since 2002 has experienced increases in private real estate investments. This development was aided through engaging in projects such as Burj Dubai, The World Islands and The Palm Islands (Khalaf, 2000, p. 27). In the recent years, the city had robust economic growth, which has been accompanied by high inflation rates. In 2007, the rate of inflation stood as 11. 2%, measured against consumer price index. The inflation rise is attributed to doubling trend of residential and commercial rental costs, which have caused substantial increase of living costs for the citizens. The city lies directly within the Arabian Desert. Its topography is however different from the ones within the emirates zone, making the city appear unique. A larger portion of Dubai’s landscape is highlighted by gravel deserts and sandy desert patterns. Gravel deserts dominate the southern part of the city. The sand is composed of coral and crushed shell and it is also white, clean and fine. The eastern part of the city is made up of a north south running line of dunes formed with salt crushed coastal plains. Far to the east, the dunes are tinged red with iron oxide (Sultan, et al, 1999, p. 31). There is a flat sandy desert forming a paving path towards the Western Hajar Mountains that found to stretch along the Dubai’s border with Oman at Hatta. These mountains have a landscape that in shattered, jagged and arid, rising to a height of 1300 meters. The city does not have any natural water body or oases, but only a natural inlet called Dubai creek, dredged to make it deeper for use by large vessels. The city has multiple waterholes and gorges, at the base of Western Al Hajar Mountains. The vast sea of sand dunes in the southern part forms a desert known as the Empty Quarter. The city is located in a very stable zone, bearing in mind that Zargos Fault which is the nearest seismic fault line is one hundred and twenty kilometers from the UAE territory, limiting the possibilities of seismic impacts on Dubai. Through expertise consultation, the region has minimum possibilities of experiencing tsunami because the waters of the Persian Gulf are not deep enough to trigger the disaster (Marios, 2007, p. 16). The sandy desert that surrounds the city nurtures occasional date palm trees and also supports wild grasses. In the east of the city, desert hyacinths grow as ghaf and acacia trees grow in the flat plains. Dubai’s natural parks are composed of both indigenous and imported trees. The indigenous trees include neem and date palm whereas the imported trees mainly include eucalyptus. The parks still have a variety of animals such as Arabian Oryx, falcon, desert fox, caracal, striped hyena and the houbara bustard. This city lies in a migration path of birds towards and from Africa, Asia and Europe, through which about 320 migratory birds pass during autumn and winter. The waters of Dubai also harbor more than 300 species of fish, with hammour being the most popular. The city has a hot and humid climate with monthly recordings of over 40 degrees Celsius. The highest recorded temperature is usually 47. 3 degrees whereas the lowest recorded is seven degrees. The city receives light rains of about 150 millimeters annually, precipitations coming in March, February and January. Heavy rains usually come in winter months, recording 120mm. High humidity levels are experienced in cooler winter periods and the mean humidity in the country is 60% (Daniela, 2002, p. 24). Dubai has a multicultural and diverse community. This was after the arrival of nationals and ethnic groups, first Iranians, Indians and Pakistanis. Only infrequent and minor episodes of ethnic tensions have ever been reported despite the diversity of the whole population. The common conflicts occur between expatriates who are recently and frequently visiting the city. In 1994, Muslim laborers and the Hindu clashed leading to deportation and detainment of Pakistani and Indian workers. The cosmopolitan nature of the society is indicated by the diversity of cuisine. Arab food is readily available and very popular. The consumption and sale of pork is regulated though not illegal, being sold in designated areas and to non Muslims. To purchase alcohol within the city, a liquor permit is required, or else obtained from restaurants and bars within five and four star hotels. Bollyhood and holly wood movies have made the city fame through their popularity. The city attracts celebrities from international cinema and the Arab community because it is where annual Dubai international film festival is held. The nation has an active musical scene, with musicians Phil Collins, Celine Dion, Shakira, pink, Elton John, Santana, Aerosmith, Tarkan, Diana Haddad and Amrdiab having frequent visits to the city and making musical performances (Martin, 1993, p. 67).

Wednesday, February 19, 2020

The Difference Between An Egalitarian And A Non-Egalitarian Principle Essay

The Difference Between An Egalitarian And A Non-Egalitarian Principle Of Distribution. Which One Is Preferable - Essay Example In this philosophy, people ought to get the same, be treated equally, treat our friend as equal, and all people should enjoy equal social status. The egalitarianism principles rest on the background that all mankind are equal in fundamental worth and moral status. Although these principles are widely accepted, there exist variant views especially in Western European and Anglo American philosophical traditions. Egalitarians believe that equality and justice are closely well connected. Firstly, they think unfair life prospects should be equalized. Secondly, equality is the most important constitutive and intrinsic worth of justice. Thirdly, welfare has to be increased. Fourthly and fifthly that justice is comparative, and inequalities are just when advantages are destroyed in the name of justice respectively. One of the most important views of the existence of egalitarianism is the Christian doctrine that God loves all mankind equally despite their social economic status (Raz 254-257). The existence of egalitarianism is prudent for there are different types of equality. For example, treatment of people equally in the society. Great example is the modern democratic societies where everyone has equal chances to hold any position and be treated equally like any other person. An egalitarian denies Cross-Temporal Additivity because inequality is not additive over time. Inequality partly determines value and hence value is not additive over time. In economics, egalitarianism would mean equality to opportunity such that the government ought not to discriminate against citizens or even hinder prosperity opportunities to them. The government has to advocate for equal prosperity for all citizens. Milton Friedman a free-market economist supports equality-of-opportunity economic egalitarianism. The principles of non egalitarianism hold that equality is not bad or good at the same time, and there are several forms of egalitarianism depending on one’s interpretation of equality and values. The non egalitarian principle suggests that, value of two events is equal given that they occupy no overlapping times interval. This claim portrays people’s view of justice. The treatment of people justly depends on how other people are treated. Therefore, it is unfair to distribute resources if people are denied their share despite the amount to be given. What is important is the allocation ratio to each person and the kind of feeling that arise thereafter. Non-Egalitarianism uses three general moral principles namely: Intrapersonal Non-Egalitarianism, Strong Supervenience of Utility-Value and Cross Temporal Additivity of Utility Value. The Intrapersonal Non-Egalitarianism principle supports that the equality in the distribution of utility is evaluative neutral in an individual’s life. The Strong Supervenience of Utility-Value principle states that the two events have the same utility value if they are intrinsically identical in terms of non-evalu ative properties. Lastly the Cross-Temporal Additivity of Utility Value principle states that utility-value of fusion of for instance event A and B is equal to utility value of A plus utility value of B. This holds as long as the two events occupy non-overlapping time intervals. Scope and Role of Distributive Principles This principle varies greatly in various dimensions relevance to distributive justice (wealth, income, jobs utility among others). The variation between the egalitarian and non-egalitarian principle occurs in the nature of the recipient and the basis of distribution. It covers the distribution and economic burden among individuals in society. This principle forms the principles of Anglo

Tuesday, February 4, 2020

Japanese views on Gender Essay Example | Topics and Well Written Essays - 1000 words

Japanese views on Gender - Essay Example The post-war educational reforms in 1949 had opened all forms of higher education to women but the ‘gender-track’ in Japan continues. Higher education in Japan serves only two functions – general education and professional education and there is significant difference in the higher education of men and women. Women were given education enough for them to fulfill their assigned roles as women, which is why their education was limited to home sciences and humanities. Women are still confined to Junior colleges or women’s colleges or to some particular fields of specialization. Women however became conscious and entered the field of high education and started fighting for their rights as equals. With changes in education, legislation and work force, women’s attitudes and values changed. This affected women’s self-concepts and perception of abilities. According to Hofstede’s cultural dimensions, Japan is a collectivist society, an extremely masculine country. Inequality and gender discrimination in Japanese society remains pervasive due to persisting assumptions about the sexual division of labour. Women have made progress in the education the business world but obstacles towards equality persist. While women’s consciousness has been stirred and they have also entered the field of politics, it is argued that gender issues should not be seen as a simple issue of improving the status of women. Women are becoming engaged in politics and standing for election. They have also been forming associations to act together on issues such as day-care, maternity leave, and sexual harassment policies but they encounter political constraints when it comes to decision making.

Monday, January 27, 2020

Security Issues of Social Networking Sites

Security Issues of Social Networking Sites C. Divya Gowri, K. Rajalakshmi, PG Scholar, S.Suresh AbstractSocial Networking Sites (SNS) are a platform to build social relationship or social networks among people. It is web-based service which allows people to create public profiles; it is similar to online community. The only difference is social network service is individual centred whereas online community is group centred. It groups the individuals into specific groups for communication purpose. Millions of people like to meet other people, share and gather information, share information about their work like cooking, finding employment, e-business, e-commerce, etc., SNS involves getting access to the website you wish to socialize. Once you are granted, you can read the profile pages of others and even contact them. These SNS has greatest impact on the people who use them. Today billions of people across the world have their profiles in social networking sites. SNS becomes reason for addiction and anxiety. It starts affecting the personal relationship. This paper focuses on th e impacts of these social networking sites. Key Tems: Social Networking Sites, Personal privacy, Security issues. I. Introduction Social Networks [13] involves use of Internet to connect the users with their family, friends and acquaintances. Web-based social networking services connect people to share interests and activities across political, economic, and geographic borders. Online Social Networking sites like Twitter, Facebook, and MySpace have become popular in recent years. Social Networks have become a personal fabric of the world. In such SNS, each of your Followers (Twitter) or Friends (Facebook) will be friend with your other friends just like in real world. The connection between people is not one-on-one but a network of connection. These social networks keep track of all interactions used by their users on their sites and save them for later use. It allows users to meet new people, stay in touch with friends, and discuss about everything including jokes, politics, news, etc., Using Social networking sites marketers can directly reach customers, this is not only benefit for the marketers but it also benefits the users as they get more information about the organization and the product. There is absolutely no doubt that online social networks have become part of every individual. Though the use of these SNS is increasing day by day, the users are not aware of risks associated with updating sensitive information. Facts prove that majority of people post information like photos, share location unaware of security and privacy concerns. SNS definitely needs many security policies to keep user’s information secured. II. Literature Survey 2.1 Privacy Issues Security Risks With the use of SNSs, the security risks [4] [12] associated is also increasing rapidly. Some of the risks include cyber stalking, phishing, location disclosure, identity theft, Phreaking, Spoofing, Doxing, spam issue, profile cloning, fake product sale and cyber bullying. People provide their personal data while creating account on SNSs like Facebook, Twitter, etc. The secured data is stored in SNS and because of poor security; the data stored are not secure. Cyber Stalking It is the use of SNS to harass/stalk an individual, group or organization. It includes monitoring, vandalism [15], and gathering of information that may be used to threaten the SNS users. Phishing Phishing [7] is attempting to acquire sensitive information like username, password, and credit card information by masquerading through SNS. Location Disclosure SNS can disclose user’s information [10]. An application named ‘creepy’ can track location of the user on a map by photos uploaded in Flicker or Twitter. Identity Theft Some hackers attack through application in which they ask permission for accessing their profile of SNS (Facebook, Twitter, etc.). When SNS users allow doing so, hackers get all information so that they can misuse users’ information without their knowledge or permission. Phreaking It is gaining unauthorized access to a user’s profile. It is advisable not to give phone numbers, passwords that provide direct access to a user’s profile. Spoofing Some attackers deceive computers by faking one’s identity. IP spoofing masks or hides computer’s IP address. Doxing It is publicly posting a person’s identity including full name, address, pictures, date of birth typically retrieved from any social sites. Spam Issues SNS is widely spread with spam. It includes message spam and content spam [5] [6]. Spammers attack legitimate users account and post unwanted messages/comment on their wall or send those content to their friends so that the reputation of the legitimate users is spoiled. Profile Cloning Profile Cloning [3][8] is that the hackers retrieve the profile information of the SNSs users and make a clone of the profile. They make this clone to spoil the reputation of the users. This is one of the most popular risks associated with the SNSs and it is also done without the permission or knowledge of the SNS user. Another form of profile cloning is â€Å"Cross-site profile cloning†. In this method, hackers steal information from one social site and make this information to create a profile in another SNS. Fake Product Sale The hackers advertise on the SNSs for selling products by offering huge discount and free products. When users try to purchase these products, they are asked to provide account information which is retrieved by attackers and they misuse the information. Cyber bullying Cyber bullies [10] often post information that spoils the reputation of a SNS user; also they spread lies about them, write hateful comments, and upload disgusting photos or abusive images. 2.2 Attacking scenarios Click Jacking In this type of attack, attackers post videos and when the users click on the page, some malicious actions takes place. This type of attack is common in Facebook where users like a page or a picture or a video and the users are trapped. Content Based Image Retrieval In this attack [9], the attackers match the patterns of images associated with the profile of the SNS users so that attackers know the current location of a user. De-Anonymization Attack In this De-Anonymization attack [1] the user’s anonymity can be revealed by history stealing and group membership information. Neighbourhood attack In this attacker [2] finds the neighbors of the victim node. Based on user’s profile and personal information, attackers are attracted by user’s personal information like their name, date of birth, contact information, relationship status, current work and education background. There can be leakage of information because of poor privacy settings. Many profiles are made public to others i.e. anyone can view their profile. Next is leakage of information through third party application. Social networking sites provide an Application Programming Interface (API) for third party developers to create applications. Once users access these applications the third party can access their information automatically. Malicious Software updates An attacker may deliver malicious software to update the system. This may be used to disrupt computer system, obtain sensitive information or gain access to any private information. Evil Twin Attack In this attack [11], it allows attackers to impersonate people or companies in SNS. This is used for the purpose of financial gain, physical crimes, defamation and information gathering. The attackers create a twin profile in the name of other person (legitimate user) and send friend request or messages to get money or just gather information. 2.3 Prevention strategies Internet is always â€Å"Public† SNS users post anything on the internet and it is always available in public. Thus it is user’s responsibility to post information that users are comfortable with. This may include their personal information and photos in which users are tagged in. Also once when users post information online, it cannot be deleted. Even if the information is deleted from a site, cached copy remains on the World Wide Web. Limit the amount Always limit the amount of personal information you post. Do not disclose private information such as your residential address, contact number, etc. Assess your settings Users must be aware of their privacy settings. The default settings of the site will allow anyone to see your profile. But you can customize your settings to restrict certain people from seeing your profile. Be cautious of Third party applications Some third party applications will ask for your private information while you run those applications. Avoid running those applications that are suspicious and limit the amount of information that the applications can access. Create secure passwords provide your account with passwords which are hard to be guessed. If user’s password is compromised, somebody may access your account and pretend to be like you without your knowledge. Always provide different passwords for different accounts which may confuse the cyber criminals. Combine upper and lower case letters with symbols and numbers to create secure passwords. Change your passwords frequently. Activate your firewall Firewalls are considered as the first line of cyber defence. They block connections to unknown sites and will protect the system from viruses and hackers. Avoid being scammed Prevent viruses/malware infecting your system by installing and frequently updating antivirus software. Beware of things you post Whatever you post online, it remains in cache even if you are not able to see. It is advisable to think before posting pictures that you don’t want your employers or parents to see. Know your friends Online friends should not be taken as real friends unless you know them personally. Beware of what you share with those strange friends. Install from Trusted source- Install applications or software’s that comes from well- known or trusted sites. Remember that free software may come with malware. Once you install an application, keep it up-to-date. If you no longer use an application, delete it. Avoid Wi-Fi spots Avoid accessing your personal accounts from public computers like Internet centres or through public Wi-Fi spots. It is always preferred to use high security settings on any SNS. IV. CONCLUSION SNS have become a likely target for attackers due to sensitive information available. The growth of social networking sites shows tremendous changes in personal and social behavior of internet users. It has become an essential medium of communication and an entertainment among adults. Though it affects the daily activities of the users, many cyber crime activities evolved, the popularity of such sites are not going to reduce. SNS can be used for sales and marketing, but the security risks can put a company or individual in a compromising position. Many cyber laws have to be fortified so that cyber criminals cannot escape from committing a crime. Many SNS are implementing different security mechanisms to SNS users. Also users must be careful and prevent themselves from being attacked. V. REFERENCES [1] Gilbert Wondracek, Thorsten Holz, Engin Kirda, and Christopher Kruegel, â€Å" Practical Attack to De-anonymize Social Network Users,† IEEE Symposium on Security and Privacy, 2010, pp.223-238. [2] Bin Zhou and Jian Pei, â€Å"Preserving Privacy in Social Networks Against Neighborhood Attacks,† Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on, Apr. 2008, pp.506-515. [3] M. Balduzzi, C. Platzer, T. Holz, E. Kirda, D. Balzarotti, and C. Kruegel, â€Å"Abusing Social Networks for Automated User Profiling,† Symposium on Recent Advances in Intrusion Detection (RAID), vol. 6307, Sep. 2010, pp. 422-441. [4] Dolvara Gunatilaka, â€Å"A Survey of Privacy and Security Issues in Social Networks†, http://www.cse.wustl.edu/~jain/cse57111/ftp/social/index.html [5] Garrett Brown, Travis Howe, Micheal Ihbe, Atul Prakash, and Kevin Borders, â€Å"Social networks and context-aware spam,† CSCW 08 Proceedings of the 2008 ACM conference on Computer supported cooperative work, 2008, pp.403-412. http://www.eecs.umich.edu/~aprakash/papers/cscw08_socialnetworkspam.pdf. [6] B. Markines, C. Cattuto and F. Menczer, Social Spam Detection,Proc. 5th Intl Workshop Adversarial Information Retrieval on the Web(AIRWeb 09), ACM Press, 2009, pp. 41–48. [7]T.N. Jagatic et al., Social Phishing,Comm. ACM,vol. 50, no. 10, 2007, pp. 94–100. [8] Khayyambashi, M.R.; Rizi, F.S. An approach for detecting profile cloning in online social networks,e-Commerce in Developing Countries: With Focus on e-Security (ECDC), 2013 7th Intenational Conference on,On page(s): 1 – 12. [9] A. Acquisti and R. Gross† Imagined Communities Awareness, Information Sharing, and Privacy on the Facebook†. In 6th Workshop on Privacy Enhancing Technologies, June 2006. [10] D. Rosenblum., â€Å"What Anyone Can Know. In The Privacy Risks of Social Networking Sites†, IEEE Security and Privacy, 2007. [11] Carl Timm,Richard Perez, â€Å"Seven Deadliest Social Network Attacks†, Syngress/Elsevier, 2010 [12] Dwyer, C., Hiltz, S. R., Passerini, K. â€Å"Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace†. Proceedings of AMCIS 2007, Keystone, CO. Retrieved September 21, 2007 [13] D. D. Boyd and N. B. Ellison, ;Social Network Sites: Definition, History and Scholarship,; Journal of Computer-Mediated Communication, vol. 13, pp. 210-230, 2007. [14] P. Heymann, G. Koutrika and H. Garcia-Molina, Fighting Spam on Social Web Sites: A Survey of Approaches and Future Challenges,IEEE Internet Computing,vol. 11, no. 6, 2007, pp. 36–45. [15]W. Xu, F. Zhang and S. Zhu, Toward Worm Detection in Online Social Networks,Proc. 26th Ann. Computer Security Applications Conf.(ACSAC 10), ACM Press, 2010, pp. 11–20.

Sunday, January 19, 2020

Relationship Between Money and Happiness

Preface First, people could not be without money. That is, if people out of money, people have no happiness lives with. Money is the foundation of live, for if there is no money, people cannot survive. If people cannot survive, how can there be happiness at all. Second, money is not everything. Most of the happiness could not be brought by money. For example, Bill Gates cannot enjoy the happiness of escape from a disaster, cannot enjoy the happiness of be a world champion, cannot enjoy the happiness of win the gold medal, cannot enjoy the happiness of families reunion, cannot enjoy the happiness of be a president. Money only slightly associated with happiness In fact, when people have enough of money, the happiness people gain become less and less. It is majority people unexpected, but this is the fact that Western countries live for decades. Experts in the West confirmed a fact: â€Å"If you made a graph of American life since the end of World War II, every line concerning money and the things that money can buy would soar upward, a statistical monument to materialism. Inflation-adjusted income per American has almost tripled, such as per capita income, real income, lifetime, housing area, the per capita car number, the number of telephone calls each year, the number of trips per year, the highest degree IQ scores. No matter how you chart the trends in earning and spending, everything is up, up, up. But if you made a chart of American happiness since the end of World War II, the lines would be as flat as a marble tabletop. Almost everything is getting better, but people did not feel happier. Yale University political science professor Robert †¢ Portland found that if you charted the incidence of depression since 1950, the lines suggest a growing epidemic. Money jangles in our wallets and purses as never before, but we are basically no happier for it, and for many, more money leads to depression. Correlation between money and happiness- 0. 25 Many scholars have been extensive, large-scale sample survey concluded. Concluded that: money and happiness is not the way people think proportional, neither the happier the more wealthy people, the more money the less happy people. The relationship between them is minimal, with scholars jargon, the relationship between them is only â€Å"slightly positive. † The psychology of money, this book made a quantifiable figure on the relationship between money and happiness – † there have been a number of studies of this relationship, and they all come up with a correlation of about 0. 25 † This book use x-axis and y-axis, the mathematics way, visually describe the relationship between money and happiness: assuming that use y-axis draw the satisfaction of happiness, and use x-axis describe the amount of money. The intersection of two axes is the starting point of zero. And then make a mark on y-axis at 0. 25, which is limit value of the correlation between money and happiness. When people's incomes are low, the satisfaction of happiness is very low indeed. When people are without money, the satisfaction of happiness is almost close to zero. Once people just out of the poverty line, the curve which describe the relationship between money and happiness will rush up almost touch the 0. 25 line. And then quickly become a horizontal line at 0. 5 irrelevant with the x-axis. Even if the amount of money on the x-axis increasing in thousands, millions, or billions rate doubled, the relationship between money and happiness curve ignore it. The line will never exceed 0. 25. And the curve maybe fall to 0. 2, 0. 1 or lower level. In mathematics, this phenomenon is called â€Å"diminishing marginal effect. † Reasons for money and happiness curve diminished Through observation and study of happine ss, we can find that any happiness in the world has a premise which is desire. If people have no desire, people would not have happiness. So eager is only source of happiness. Desire is something people look forward, but do not get yet. So happiness is the pleasure when people are satisfied or say gets the thing which they look forwards. Furthermore, we can draw a conclusion, happiness (that is the source) is unrenewable. After we got a happiness, we can repeat to enjoy it, the desire will diminished, until disappear. This means people only have N times to enjoy the same type of happiness. For example, when people have learned how to ride bicycle, he will use it as much as possible, the happiness he get will increase. But when the time he ride bicycle reach to N, the happiness he get before will fall to zero. Because of happiness is non-renewable resources, so in the world of money and material, everyone has the limited resources of desire, and everyone has limited happiness to enjoy. For example, after we learned how to ride bicycle, and enjoy the happiness of ride bicycle, we will never enjoy it again. Along with our possession increase, our happiness will increase too. But the resources of happiness will diminish. It means the happiness we can enjoy will decrease. That is reasons for money and happiness curve diminished Conclusion They say money can't buy happiness, but it can facilitate it. —Malcolm Forbes Happiness is the desire for repetition. –Milan Kundera At the lower end of the income scale the better-off are happier; there is no effect from the middle of the scale onwards. And there has been no historical effect of increased national prosperity on happiness. There is evidence that people are happier of they think they are doing better than other people, or than they did themselves previously. Other sources of happiness are much more important, such as leisure, job satisfaction, social relations and personality. Money has very little effect on these, money people want to be rich or richer, and many take part in lotteries, no doubt in the belief that winning will make them happier. References

Saturday, January 11, 2020

Human Factor In The Aircraft Cabin Essay

The term â€Å"Human factor† has grown increasingly popular as the commercial aviation industry has realized that human error, rather than mechanical failure, underlies most accidents and incidents. Human factor involves gathering information and putting it into practice to produce safety, comfort and effective human use. This is then translated into design, training policies and procedures to help humans perform better. The issues on safety should be addressed by ensuring proper and effective communication strategies. Also the ability of the flight crew to maintain situation awareness which involves being aware of what is happening around and understand how information is to be put into action. Pilots should be well trained to handle and monitor flight automation and instruments to prevent confusion and errors during take-off and landing. Disciplinary measures should also be emphasized to avoid situations like drinking or neglecting duties. It is important to go over safety and emergency checklists to ensure emergency equipments and other features specific to the aircraft type are in order and report to the pilot after the preflight check. Before takeoff, unserviceable or missing items must be reported and rectified. The cabin must be monitored for unusual smell or situations and maintain precaution like keeping door locked while fueling. The crew should assist with the loading of baggage, check for size and dangerous goods. They then must do a safety demonstration and monitor passengers as they walk them through the safety procedures, and also secure the cabin by ensuring tray tables are stowed, seats are in upright position and seatbelts are fastened before takeoff. The key role of the flight attendant should be safety provision and provide a care giving and customer service to passengers. Presentation and personal appearance is important to inspire passenger confidence. The crew flight attendants are expected to be dressed well and be friendly. Human factor specialists should ensure the sidewalls are analyzed and improved for increased passenger comfort as well as modification of the in-flight entertainment system. The In-flight Service Manager (ISM) and Customer Service Manager (CSM) should report when the cabin is secure for takeoff and landing. This ensures proper management and safe effective operation during both normal and emergency conditions.