Wednesday, October 30, 2019

Disciplinary Literacy Writing Project Essay Example | Topics and Well Written Essays - 1250 words

Disciplinary Literacy Writing Project - Essay Example The data results obtained need to be of no biases; thus statistical research must be officially produced under no influence of political background. For instance, many social, military decisions, economic and political decisions cannot be made without applying the statistical techniques like structuring an experiment to gain federal approval of a new medice. In any organization or at any government the initial step to any project is plan analysis. (Szabo, 118) Actuarial are always involved in many activities within the organization since they form the major part of the running of most of the organization. The major duties of the actuarial involves collecting, receiving and obtaining data then analyze the information. This is done by identifying the underlying reasons or facts of data by simplifying the information. It includes analyzing social data, economical data; evaluate the level of probability of financial risk and conducting statistical modeling. (Crews, 87) Actuarial works in many different settings thus job duties may vary from company to company. Although the government is the largest employee of the actuarial, they can work in a number of places, mostly in insurance companies, Micro finance organizations, accountancy firms, pension funds, actuarial consultants, investment funds, life assurance companies but also can work in finance, marketing, government, manufacturing companies, and health care (Crews,35 ) As an actuarial, he is involved in compiling, coding, tabulating, categorizing, auditing calculating information. Once the information is tabled, the actuarial interprets the meaning of the information to which t is concerned this is by explaining the complex mathematical data and interpreting the tables or charts or graphs for economic or social research With the present level of technology the actuarial is core role also involve in using computer

Monday, October 28, 2019

Can Facebook Privacy be Trusted?

Can Facebook Privacy be Trusted? DISSERTATION PROPOSAL Dissertation Question: Facebook privacy: IS IT TO BE TRUSTED? View the full dissertation here 1. Introduction The world has changed; it has become more public than private (Kirkpatrick et al., 2010). The likes of Social Media has become an outlet that nobody can ignore, its features, characteristics and convenience encapsulates all that is needed for any walk of life chosen by an individual. Of course with the undying support for social media, especially Facebook, one has to ask his or herself, is it to trusted? Is my information being kept privately like they said it is? Some believe it is however some feel that is far safe. However, this study is going to give a clear-cut decision as to what the majority think and why. Of course, there is no right or wrong answer, and there is the likelihood that this study may not affect the broader picture, but it will give clarity and I think that is necessary.As supposed to concentrating on Social Media as a general platform this study will revolve around Facebook only so as to have a more tailored and focussed reading. I have chosen Facebook, because this is the Social Media outlet that revolutionised all those that were to follow. The physiological as well as sociological impacts will be ostracised, this will look at how Facebook affects the attitudes and body/verbal language of individuals. Last but not leady corporate governance will be looked at; this will test how Facebook is in line it at all with corporate governance codes Both sides of the arguments will be welcomed with reasons for balance and recommendation will be ushered as to how Facebook could become the safe zone that everyone urges for. 2. Brief Literature Review DOES PRIVACY EXIST IN FACEBOOK? Human beings are defined as social beings meaning they thrive through interpersonal interaction. This interaction comes with sharing of information to build relations. However, the information should never come from a third party. In the ancient years, this was something very easy to ensure due to the existent media of communication at the time (Eric, 2007). However, the technological realm has improved immensely by coming up with communication channels that traverse geographical distance and enhance communication convenience. Today, using social media one can easily communicate with any person in any corner of the planet and with this convenience comes the risk of third party infringement in the communication process (Fogel & Nehmad, 2009). Facebook is probably the most used social media platform in the world meaning it is a powerhouse for information and the highest in risk when it comes to privacy hence raising concerns as to whether this online platform is to be trusted. Privacy concerns Facebooks policy       Facebook gives users the chance to make sure that what they share does not end up in the wrong hands. This is made sure using the above meters. Additionally, a users information is made safe from misuse by using the companys data policy as a blue print (Liu, Gummadi, Krishnamurthy, & Mislove, 2011). Although, they collect all information shared on the media such as messages, financial information and images the company maintains that this information all goes towards enhancing the user experience by making the entire communication process more convenient (Boyd & Hargittai, 2010). At the end of the day Facebook is business venture. Although users do not pay anything in order to enjoy the application, the management have to pay the brains behind the creation. This is made possible through advertising which has evolved greatly because of the information collected about users (Raynes-Goldie, 2012). Just like sites like google use cookies to learn your online pattern, Facebook accesses information about the users in order to enhance personalized advertising. Who is at fault However, although they collect information the company does not really infringe on the rights of the individual. It is the users ignorance or lack of knowledge of the privacy feature that induces the privacy concerns (Bedi, 2013). It has been said that there is no secret between two people, so the moment one shares something on Facebook, they should know that the information is visible to all their friends. To protect the privacy of the shared information, Facebook advices one to only accept friend requests of those people they know (Statt, 2013). Additionally, today most employers do not seek out members of staff the traditional way, today they seek them out socially, this includes using their social media sites to look for information about them (Ostrow, 2009). Social media is a platform where people think they can share most of the things they cannot in their day to day conversations. Furthermore, it is an avenue where people can take on any character they want (Liu, Gummadi, Krishnamurthy, & Mislove, 2011). However, what one shares speaks volumes to those people on your friends list or anyone who is interested to see your activities online more so to a prospective employer. An employer may stumble on a post that may not really augur well with him or her and hence cost one a job opportunity. Therefore, for one an individual can control what they share to ensure they do not share anything another person may deem inappropriate (Warren, 2013). On the plus side is that its policy outline that the information they collect does not find its way to a third party, something they have proved time and again by incorporating more and more measures that spearhead their data policy (Zilles, 2017). On the other hand, an individual should quit being oblivious of the privacy policies they can enforce on the contents they share. This way even if an employer was to stumble upon their account, they cannot get to see their posts (Hoffman, 2012). This gives the individual a level ground where they can compete with those eying the same position on several fronts where social media posts is not one of them. On this note, I take a stance that Facebook privacy can be trusted at all costs and that it is the users who need to learn how to use them to their advantage (Warfel, 2008). 3. Methodology My chosen approach will be a combination of primary research and secondary research. These will be a mix of qualitative and quantitative data and also secondary research from journals, books, articles ect. My topic may sound clichà © and too common, but there are many unanswered questions surrounding this topic that still make it an entertaining and intriguing to read about and because of this there are many objectives that need to be requited. These objectives will be direct, and informative but most importantly will leave room scrutiny and constructive criticism, after all there is no right or wrong answer. Research questions are as follows: To what extent has Facebook bewitched individuals to believe that is safe. What evidence is there to show that Facebook is safe What evidence is there to show that Facebook isnt safe How does Facebooks productivity and performance affect the attitude of individuals If Facebook isnt safe how at tall how does that breach the code of corporate governance How can Facebook make it better Primary research aim: To prove if at all Facebook is an outlet to be trusted and why. In order to do justice to the objectives data collection will be done via questionnaire that will be sent out over a specific period of time to a specific target audience of about 50 or more people. This will be the bases of my primary data, but the formation will mostly derive from credible sources of secondary data, namely: the guardian, telegraph and electric forums (Survey Monkey). This all will be emulated to create a constructive argument. The biggest advantage is that I am surrounded by people of the same age group from different cultures, backgrounds, ages, points of views that use outlets such as Facebook, many may not use it at all which again gives room for a smorgasbord of ideas that are at my disposal. This will make my primary data concrete, accurate and give it a sense of validity. Since Facebook is a global company, information will gathered globally and not only from London or the UK, this allows leverage and gives more to talk about. In terms of target audience, since people of all ages use Facebook my data will not only be focussed on the younger generation but older and this is where secondary data comes in use. If done appropriately the objective and overall dissertation should be answered. 4. Time Scale For the dissertation when it comes to time scale it should take me no more than 2 weeks to gather all the data that I will need for my dissertation. One week will be in order to research my topic question and gather all the secondary data that I will need and the other week will be in order to carry out the questionnaires and focus groups or one to one interviews. Overall, I have a time scale which I would like to meet which is as follows: Gather Secondary Data One week Hand out Questionnaires and Data Analysis One Week Have a dissertation draft done 02-Apr Finalise Dissertation 20-Apr Proof Read Dissertation 20-30 April Submit Dissertation Final 30-Apr 5. References Bedi, M. (2013). Facebook and interpersonal privacy: why the third party doctrine should not apply. DePaul University College of Law, 1-73. Boyd, D., & Hargittai, E. (2010). Facebook Privacy Settings: Who Cares? First Monday. Available at: journals.uic.edu/ojs/index.php/fm/article/view/3086/2589 (Accessed: 23 February 2017). Eric, B. (2007). Privacy in social networking: A usability study of privacy interfaces for Facebook. Thesis: Harvard College, 1-125. Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 153-160. Hoffman, B. C. (2012). An exploratory study of a users Facebook security and privacy settings. Theses: Minnesota State University, 1-59. Kirkpatrick, marshall, kendall, len, young, mat, macmanus, richard, lardinois, frederic, jeffries, adrianne, Curry, D., Sponsors, R., Wolf, D., Jacobs, C.C. and Power, D. (2010) Why Facebook is wrong: Privacy is still important. Available at: http://readwrite.com/2010/01/11/why_facebook_is_wrong_about_privacy/ (Accessed: 23 February 2017). Liu, Y., Gummadi, K. P., Krishnamurthy, B., & Mislove, A. (2011). Analyzing facebook privacy settings: User expectations vs reality. ACM Digital Library, 61-70. Ostrow, A. (2009, September 16). Privacy: Facebook is one of Americas most trusted companies. Available at:mashable.com/2009/09/16/facebook-privacy-truste/#1l1mcuoc7o (Accessed: 23 February 2017). Raynes-Goldie, K. S. (2012). Privacy in the age of Facebook: Discourse, Architecture, Consequences. Theses: Curtin University , 1-266. Statt, N. (2013, May 3). Facebooks new trusted contacts: can you really trust your friends. Available at: readwrite.com/2013/05/03/facebooks-new-trusted-contacts-can-you-really-trust-your-friends/ (Accessed: 23 February 2017). Warfel, E. A. (2008). Perceptions of privacy on Facebook. Thesis: Rochester Institute of Technology, 1-32. Warren, K. (2013, May 13). Recruiting in todays social media age: How to manage your online presence. Available at: www.devex.com/news/recruiting-in-today-s-social-media-age-how-to-manage-your-online-presence-80932 (Accessed: 23 February 2017). Zilles, C. (2017, January 17). Can Facebook be trusted with all your personal information. Available at: socialmediahq.com/can-facebook-be-trusted-with-all-your-personal-information/ (Accessed: 23 February 2017).

Friday, October 25, 2019

European History - Unification of Italy :: European Europe History

Unification of Italy Q: Describe & Explain the Unification of Italy. The Unification of Italy divides in to 3 main stages: 1815-1830: Revolts all over Italy. Revolts are suppressed. 1848-1849: Revolts all over Italy. Revolts are suppressed. 1858-1870: The unification of Italy Introduction To understand the unification of Italy, matters before the revolution need to be examined. Up until 1716, Italy was just a big piece of land divided among small kingdoms of monarchs. (ref. H.O. #1 p.29) When napoleon Bonaparte conquered Italy, he left them 3 things, which were probably the key characteristics in the revolution: - Efficient Government. - A practical demonstrations of the benefits from a unified Italy - Hatred towards foreign influence. After the fall of Napoleon, the major European powers (Austria, Russia, Spain, United Kingdom, & Prussia) what was to be done with Italy, which was conquered at the time by Napoleon. It was thus decided that Italy would be divided among different monarchs, all associated with the Habsburgs (except for Piedmont Sardinia, which was to be ruled by Victor Emmanuel, an independent monarch, and Papal States, ruled by the pope.). (ref. H.O. #1 p. 29-30) Austria had very strong domination over Italy. It had agreements with Ferdinand, king of Kingdom of the 2 Sicilies, and helped the pope maintain his kingdom. Only Piedmont Sardinia wasn't influenced by Austria (ref. H.O. #1 p. 30). 1815 - 1830 Revolution Almost all "'Italians" hated the foreign influence of Austria on Italy. Metternich, an Austrian prince wanted to make sure no nationalist activities were in process in Austria's territories in Italy (which was Lombardy Venetia). He imposed repressive rule in Lombardy Venetia. German was the official language, a strong Austrian army was always present to suppress any hostile activities, an efficient system of spies reported on any nationalist activities, a strict censorship of news was present, and Italian history was banned in schools to avoid the younger generation from learning about the glorious Roman past. Metternich caused even further resentment when he obligated Lombards to serve in Austrian army, obey Austrian rules, and pay high taxes to Austrian empire. Lombardy Venetia's situation was very bad, and nothing seemed able to be done. (ref. H.O. #1 p. 30). The situation in Lombardy (and in other parts of Italy) led to the establishment of many secret societies dedicated to the cause of Liberalism and Nationalism the biggest and most famous of those societies was named Carbonari.

Thursday, October 24, 2019

Ad Strategy Report Essay

Vermont’s famous ice cream markers, Ben & Jerry’s, started the City Churned campaign summer of 2013; where five major cities voted in traditional and non-traditional ways to create a unique flavor that capture elements of the city. The five major cities were Seattle, Portland, San Francisco, Washington DC and New York City. Ben & Jerry’s also teamed up with local favorites to make the flavor even more represent the city it is for. At the end of the summer, Ben and Jerry’s served the final product the city chose at community events. Ben & Jerry’s objective from start this campaign was of course to increase sales, but also to create a deeper connection was their consumers, Mike Hayes, Ben & Jerry’s assistant digital marketing manager, told Adweek. Another main objective of the City Churned campaign was to remind people of the social mission the company stands for and the importance of local roots. Their social mission is about keeping ingredients real (no GMO’s) and doing what is best for the planet at large. The company wanted to also focus on the importance of local roots by using products from companies local to that city. There were main three strategies that Ben & Jerry’s used in order to meet their objectives. The first strategy was having an interactive campaign. They made it so people were voting by doing everyday life activities, such as what turn gate you use when heading to train. The second strategy was taking a modern twist on crowdsourcing. They used the traditional method of having a website where people would directly vote right there, but also used new different ways to gather even more input. Ben & Jerry’s teamed up with transportation services popular to the city to count votes as well. In New York City, the cabs headed uptown counted as a vote towards peppermint, whereas a cab headed downtown was a vote Fairtrade vanilla. In Portland, they watched the men entering Cartopia and whether he had a mustache or a  beard was vote for different flavors. The last strategy they used was making local elements the main part of the campaign. This made locals to the city or people who knew the place interested in what was being picked. That created a lot of free press for Ben & Jerry’s. Local newspaper throughout the summer kept track of the voting and what was happening. Some of the techniques that Ben & Jerry’s used to accomplish the goal was repetition. Their name was all around the cities, especially at local hot spots. They also promoted the product being special to each city by capturing the local elements and flavors, and letting the people decide what flavors and elements really show the city. Another technique used was creating excitement, which created participation. The whole campaign was based around the people getting what they wanted. People took pictures are local monuments and used the hashtag for their city to vote and get into the campaign.

Wednesday, October 23, 2019

The Constitution fails to meet the needs of a rapidly changing society

When the Constitution was written by the ‘Founding Fathers back in 1787, they intentionally made it so that it could survive over time. They made it flexable so because they envisaged that there were problems that they could not forsee in the future, these are things such as the Depression of the late twenties and early thirties. ‘The Framers' intended for the amendment process to be the main way of updating the constitution and through time this has been evident. An important part of a democratic government is the accountability of those in power, in recent times we have seen the system in America fail, in part this may be due to the fact that the constitution may be outdated. During Bill Clintons' second term of office there were a number of scandals that rocked the White House, the first being the Paula Jones affair. During a hearing about the Paula Jones affair Clinton stated that he had not had â€Å"sexual relations† with Monica Lewinsky, this turned out to be a lie and Congress attempted to impeach him. The impeachment failed due to the wording of the constitution as it was based on the fact that they believed he had committed ‘a high crime or misdemeanour' but Clintons' lawyers asked for a definition of this and Congress could not give one. This shows that the wording of the constitution was outdated or the constitution was badly worded. There was also a lack of accountability during the Watergate scandal as President Nixon was able to escape with no punishment even though he was part of a conspiracy to commit a felony, all charges against Nixon were dropped by his successor Gerald Ford due to the fact that Presidents have the power to withdraw charges against anybody in America. This shows that there is an essential part of the democratic process missing due to flaws in the constitution. When the constitution was first written in 1787 there was a strong possibility of war, so when the founding fathers drew up the constitution they added in an article which said that all people have the right to bear arms. This article has been problematic ever since. Within the last decade there have been many high profile shootings in schools such as Columbine, this has led to a stronger fight against the gun laws. There are those such as the National Rifle Association who say that that right can not be taken away from them as it is one of their constitution rights but there is a problem with that as within the preamble there is the mention of insuring domestic tranquillity, can this be done when there are children who can gain easy access to guns, there are also the problems with the number of deaths due to gun crimes, the right to life is also mentioned in the constitution. The flexibility of the constitution is crucial to its longevity as if it was too rigid it would not have lasted, there may be the problem though that it is too flexible. Over the years there hav been many changes in the federal system, most notably the introduction of Roosevelts ‘New Deal' which saw the power shift more towards the central government, then there was the move back through presidents such as Nixon and Reagan. During this time the efficacy of the government could be questioned as we saw with the ‘Appropreations Crisis' in 1995, during this time government was shut down for two weeks this was ineffect shutting down the country as federal run services such as the postal service were also closed. A solution was found to stop that happening again, that arrived in the form of the ‘Line Item Veto', this gave the President the power to remove unsuitable sentences or paragraphs from a bill. Eighteen months after its introduction it was scrapped as the Supreme Court ruled it unconstitutional as it gave too much power to one person. Many considered this as a mistake as it made the legislative process faster as it saved the bill being sent back to Congress. This shows that there is room for improvement within the constitution. Through time the main way to update the constitution has been through the Amendment process. As society and its ideals has changed so has the Constitution, when society started to object to slavery and racism the constitution began to follow, the same with womens rights. There are other problems as I have already mentioned the constitution still protects the pro-gun lobby as it is stated in the constitution that all citizens shall bear arms, after a number of atrocities and the significant rise in gun crime, society is begininng to object but still there is no movement on any new amendments in regards to gun laws. The lack of movement may be due to the constitution being outdated but it may also be due to the power that the NRA and other pro gun groups have but we have seen great trides taken through time such as the moves against racism. The constitution was based on what was happening in the eighteenth century and what the ‘Framers' envisaged would happen in the future, but there would seem to be the ability within it, due to its flexibility, to change with modern society. Through time we have seen how society has changed and not far behind is the constitution due to the amendment process.

Tuesday, October 22, 2019

Tarpan - Facts and Figures

Tarpan - Facts and Figures Name: Tarpan; also known as Equus ferus ferus Habitat: Plains of Eurasia Historical Period: Pleistocene-Modern (2 million-100 years ago) Size and Weight: About five feet tall and 1,000 pounds Diet: Grass Distinguishing Characteristics: Moderate size; long, shaggy coat About the Tarpan The genus Equuswhich comprises modern horses, zebras and donkeysevolved from its prehistoric horse forebears a few million years ago, and flourished in both North and South America and (after some populations crossed the Bering land bridge) Eurasia. During the last Ice Age, about 10,000 years ago, the North and South American Equus species went extinct, leaving their Eurasian cousins to propagate the breed. Thats where the Tarpan, also known as Equus ferus ferus, comes in: it was this shaggy, ill-tempered horse that was domesticated by the early human settlers of Eurasia, leading directly to the modern horse. (See a slideshow of 10 Recently Extinct Horses.) Somewhat surprisingly, the Tarpan managed to survive well into historical times; even after millennia of interbreeding with modern horses, a few pure-bred individuals roamed the plains of Eurasia as late as the early 20th century, the last one dying in captivity (in Russia) in 1909. In the early 1930sperhaps inspired by other, less ethical eugenics experimentsGerman scientists attempted to re-breed the Tarpan, producing what is now known as the Heck Horse. A few years earlier, authorities in Poland also tried to resurrect the Tarpan by breeding horses with noticeably Tarpan-like traits; that early effort in de-extinction ended in failure.

Monday, October 21, 2019

Three Victories for Dr. King Essays - Community Organizing

Three Victories for Dr. King Essays - Community Organizing Professor Frazier Eng 1101-125 30 September 2015 Three Victories for Dr. King Martin Luther King, Jr. helped to bring out great changes in American society. As the leader of the civil rights movement, his strategy of nonviolent protest helped to end degregation in the South and enabled millions of blacks to register to vote for the first time. During the course of his inspiring career, Dr. King won key victories for the civil rights movement in the cities of Montgomery, Birmingham, and Selma, Alabama. The first major victory Dr. King won was in Montgomery, Alabama. There was a 42 year old seamstress by the name of Rosa Parks. She was riding the bus one day and just so happened that 4 white men boarded it. Three of the blacks stood up, all except for her (AuthorLastName Pages) [To use this template when creating the outline for your paper, on the Home tab, in the Styles gallery, click No Indent. Then, on the same tab, in the Paragraph group, click the Multilevel List icon and then click the MLA Outline style that appears under List Styles. The first six levels of this list style correspond to the outline levels defined in MLA 7th Edition.] For additional guidance on formatting your research paper, consult MLA 7th Edition as well as your instructor. AuthorLastName, FirstName. Title of the Book Being Referenced. City Name: Name of Publisher, Year. Type of Medium (e.g. Print). LastName, First, Middle. "Article Title." Journal Title (Year): Pages From - To. Print.