.

Wednesday, November 27, 2019

International Relations During the Cold War

This essay explains the developments in the relations between the United States and the Soviet Union during the cold war. The cold war was fueled by the actions of given leaders and the policies that were instituted or formulated by the leadership. This essay discusses how these leaders and policies shaped the relationship between the United States and the Soviet Union.Advertising We will write a custom essay sample on The Cold War’s Developments in the Relations Between the US and the Soviet Union specifically for you for only $16.05 $11/page Learn More By the end of the World War II, The US enjoyed hegemonic powers. It had the strongest economy estimated to have been roughly half the world’s GNP (Maier 228). The cold war was fueled by mistrust between the USSR and the U.S. At the end of the World War II, USSR was the only power centre that nearly equaled the U.S. A power imbalance or vacuum had been left by the fall of Germany and Europe was too bruised as to only care about its wounds (Urwin 44). USSR and the U.S were keen on filling the power vacuum (Maier 335). Anchored on antagonistic ideologies, they did all they could to spread their influence all over the world. At the heart of the cold war were two ideologies i.e. capitalism was under the onslaught of communism. Both capitalists and communists wanted to sway in world affairs in their favor. From the USSR, some of the influential leaders include Stalin, Nikita, Brezhnev and Constantine. Stalin was at the heart of USSR’s expansionist policies. The US had leaders such as Truman. Truman made a wise decision of affirming that geographical position was an important element of struggle rather than challenging the axis in the fight against communism. Truman helped towards economic aid for European nations to save them from communist onslaught. One great post World War economic policy contributions of the U.S. was the Marshal plan. Others include initiating t he Breton woods system and it’s joining the NATO alliance. On the political plane, Lundestand (148) argues that anticommunism dominated U.S.’s post WWII political policies and campaigns across the world. Due to the cold war, the U.S supported and kept despotic regimes in place. This is clearer when one considers some regimes in Africa or say Spain. Despotic leaders were supported basically because they opposed communism. In countries like Germany, need to deal with communism was given precedence to the interest to root out Nazism. Compromised elites were allowed to hold powerful offices in post war Germany so as to revive Germany against the onslaught of communism.Advertising Looking for essay on international relations? Let's see if we can help you! Get your first paper with 15% OFF Learn More Economically, U.S.’s economic policies were anchored on understanding that economic freedom anchored on economic growth necessitates other freedoms especia lly political liberties (Lundestand 152). Therefore, it was expected that when nations prospered economically, they would also stabilize politically. Economic freedom of individuals or liberal market approaches drove the capitalist while social concern and equality drove the communists. Security policies in both the U.S.A and the USSR advocated for indirect aggression e.g. economic sabotage, forming of alliances and arms race. The U.S joined the NATO alliance, which provided military security against the destabilizing interests of the socialist USSR. Without the U.S. there is a high likelihood; Stalin with his expansionist interests could have caused turmoil in Europe. NATO also helped curb intra-rivalries in Europe that traditionally resulted in warfare. The U.S through the marshal plan gave crucial economic aid to Europe. The aid was important in enabling internal processes in Europe and initiatives that enabled trade especially with the U.S. itself. Through other tax stabilizing and opening up to trade initiatives build in and around the Breton woods system, Europe was helped to recover and act as a rebuff to Stalin’s expansionist interests. Works Cited Lundestad, Geir, â€Å"Empire by Invitation? The United States and Western Europe, 1945- 1952,† in Charles Maier (ed.), The Cold War in Europe: Era of a Divided Continent. New York: Markus Wiener. 1991: pp. 143-65. Maier, Charles. â€Å"The Two Postwar Eras and the Conditions for Stability in Twentieth- Century Western Europe,† American Historical Review, 1981: Vol. 86, No. 2. pp 327-352. Urwin, Derek. â€Å"Western Europe since 1945: A Short Political History†. London: Longmans, Green and Co. Ltd. 1968: pp. 27-50. This essay on The Cold War’s Developments in the Relations Between the US and the Soviet Union was written and submitted by user Callie T. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here. International Relations During the Cold War Introduction The Cold War refers to the enduring situation of opinionated divergence, proxy hostilities, and economic rivalry in the period following the Second World War. These hostilities were between the Communist nations, mainly the Soviet Union and its protectorate states and associate, and the authorities of the West-leaning nations, principally the United States and its associates (White, 2000, p. 5).Advertising We will write a custom essay sample on International Relations During the Cold War specifically for you for only $16.05 $11/page Learn More Even if the main protagonists’ armed forces never formally collided directly, they articulated the dispute by way of armed forces alliances, tactical conformist force operations, far-reaching aid to regions and nations reckoned to be susceptible, proxy conflicts, spying, misinformation, conservative and atomic arms races, petitions to nonaligned countries, enmity at games events, and scientific contests like the Space Race. In the face of being associates opposed to the Axis powers, the United States and the Union of Soviet Socialist Republics differed in relation to opinionated philosophy and the arrangement of the post-conflict world at the same time as taking up majority of Europe. The Soviet Union formed the Eastern Bloc. This was jointly with the nations in the east of Europe. It also took control of some while upholding others as protectorate states. Some of these were afterwards merged as the Warsaw Agreement (1955 – 1991). The United States and its associates on the other hand brought into play suppression of communism as a key tactic, crafting associations such as NATO (Walker, 1981, p. 207). United States financed the Marshall Plan to set up a more swift post-conflict resurgence of Europe, at the same time as the Soviet Union would not allow a majority of Eastern Bloc members take part. To a different place, in Latin America and Southeast Asia, the Union o f Soviet Socialist Republics lent a hand and aided promote communist insurgencies, resisted by a number of Western nations and their regional associates. They tried to push back some of these western foes and came out with mixed effects. In the midst of the nations that the USSR propped up in support of communist uprising was Cuba, which had Fidel Castro as its leader. The nearness of communist Cuba to the United States bore out to be a major battle front of the Cold War. The USSR set several atomic projectiles in Cuba, igniting fiery tension with the Americans and ending up in the Cuban Missile Crisis of 1962, a point in which full-blown atomic war threatened. A number of nations joined NATO and the Warsaw Agreement, while others crafted the Non-Aligned Movement.Advertising Looking for essay on history? Let's see if we can help you! Get your first paper with 15% OFF Learn More During the 80s decade, following the Reagan Doctrine, the United States augmented ambassador ial, armed forces, and economic demands on the Soviet Union, at a period when the nation was by then going through economic doldrums. Towards the end of the same decade, Soviet President Mikhail Gorbachev brought in the easing up changes. The Cold War stopped following the disintegration of the Soviet Union in 1991. This meant that the United States was left as the overriding armed authority, and Russia having power over the largest part of the Soviet Union’s atomic arsenal. The Cold War and its proceedings have had a momentous effect on the world up to the present times. Historiography of the Cold War As soon as the reference Cold War was vulgarized, understanding the path and genesis of the divergence has been a starting place of frenzied debate amongst historiographers, opinionated scientists, and members of the press (Garthoff, 2004, p.21). Particularly, historiographers have harshly differed as to who was accountable for the go kaput of Soviet-US associations following W orld War II. There is also a disagreement on whether the war involving the two world powers was to be anticipated, or could have been steered clear of. Historiographers have as well differed on what precisely the Cold War was, what the foundations of the war were, and the way in which to unravel outlines of action and retort involving the two sides. Even as the details of the genesis of the war in scholastic forums are intricate and varied, quite a lot of general philosophical systems on the subject matter can be made out. Historiographers normally talk of three parallel approaches to the subject area of the Cold War. These are; the orthodox, revisionism and post-revisionism. Orthodox perspective The initial perspective of analysis to come out as regards this war was the orthodox perspective. For more than ten years following the end of World War II, a small number of historiographers faced up to the formal United States explanation of the origins of the Cold War. The orthodox schoo l of thought lays the blame for the Cold War on the Soviet Union and its spreading out into Eastern Europe. For instance, Thomas A. Bailey indicated in his 1950 America Faces Russia that the collapse of post-conflict harmony was the consequence of Soviet expansionism in the straightaway post-conflict years (Davis, 1999, p. 10).Advertising We will write a custom essay sample on International Relations During the Cold War specifically for you for only $16.05 $11/page Learn More Bailey felt that Stalin went against guarantees he had made at Yalta, enforced Soviet governed establishments on reluctant Eastern European populaces, and schemed to extend communism right through the world. From this perspective, United States administrators were compelled to act in response to Soviet antagonism with the Truman Doctrine, strategies to control communist insurrection around the world, and the Marshall Plan. A policy maker, George Kennan wrote his interpretation of t he origin of this conflict also at around the same time when the orthodox perspective held much meaning. Kennan wrote an article in 1947 in which he argued that the Soviet had a longing to spread out their domain as a consequence of a fearful uncertainty as a result of the Civil War. The article was titled Sources of Soviet Conduct and it indicated that the communist philosophy required that capitalism be seen as a peril. Kennan was of the idea that the Soviet Union could not be relied upon as a result of its ideological dedication to wiping out capitalism, which Kennan was convinced that the Soviets would do all that they possibly could to make certain this would take place so as to uphold their place of sway in the world. He referred to the 1917 uprising of the Bolsheviks as an illustration of the extents the Soviets would go to protect their authority (Berezhkov, 1994, p. 268). As a result, Kennan insisted that the Soviet Union must not be consented to spread out and put on any f orce that could intimidate the United States. Kennan’s sway can be made out in the initial times past of the foundations of the Cold War. William Hardy McNeill, University of Chicago Professor, held Joseph Stalin responsible for the whole war. The Professor argued that Stalin was to blame for the conflict by not sticking to his pledge of holding free and fair polls in Eastern Europe following World War II. As a result of this, America could not rely on anything that Stalin assured, and began to view him with immense suspicion. In addition, McNeill intimates that, Stalin slipped back to Bolshevik catchphrases and ideas, which led to the thought of a global communist interest group. These deeds yet again put the United States on the protective in its labors to safeguard its interests in west of Europe. Tallying with McNeill’s analysis of the Cold War was Martin F. Hertz. Hertz argues that when Stalin declined to consent to Poland to hold a free and fair poll, the western democratic states, at the time feeling remorse for consenting to the Poles to be surrendered in 1939 by the Nazis, disapproved to consenting Staling to enforce a gracious administration on his territory.Advertising Looking for essay on history? Let's see if we can help you! Get your first paper with 15% OFF Learn More Hertz is convinced that if Stalin would have let Poland and the other eastern nations to uphold an aspect of sovereignty or self-sufficiency, no conflict would have occurred (Tucker, 1997, p. 273). The initial explanations of the Cold War are vital to comprehending the progress of the conflict itself. On the other hand, these versions do not take into contemplation even a single one of the United States’ overseas policies and their impact on the Soviet Union. Kennan, McNeill and Hertz are all of the idea that the only means to have steered clear of the Cold War was to have someone else heading the Soviet Union. Every reader of these accounts has as well to bear in mind the opinionated atmosphere of the 50s decade. McNeill’s paperback was put out in 1957, only four years following the Joseph McCarthy trials and at a period when Americans were all the time more conformist in their take on the Soviet Union. Hertz’s paperback was not put out until the mid-60s. This was a period when the United States had eased up in response to the overly conformist 50s. Nonetheless, Hertz was completing his education during the 50s, which without a doubt had a role to play in his point of view on the world. To add to that, for at least the initial three-fourths of the 50s, the hostilities involving the United States and the Soviet Union were declining to the position where a lot of analysts of political occurrences were saying the Cold War was approaching a close. The decrease of anxieties led to a lot of American citizens feeling as if their post-conflict paragons of autonomy for all countries were turning out to be spot on. This facilitated the vulgarization of a number of feel-good times past. McNeill’s paperback, and to a certain level Hertz’s paperback despite the fact that it was written later, is a pleasant, feel-good on the subject of America history publication. The orthodox understanding has been depicted as the formal United States ac count of Cold War history. Even if it dropped its authority as a means of chronological contemplation in scholastic forums in the 60s, it keeps on being important. Revisionism The United States taking part in Vietnam in the 60s disenchanted a lot of historiographers with the grounds of suppression, and consequently with the suppositions of the orthodox perspective to understanding the Cold War. Revisionist perspectives came out in the wake of the Vietnam War, in the background of a better reconsidering of the United States responsibility in global matters, which was perceived more in relation to American domain or power. Even as the emerging school of thought resulted in a lot of disparities among individual academics, the accounts that were part of it were by and large rejoinders of one form or another to publications carried out in the 50s (Suri, 2002, p. 60). As Americans commenced on freeing up their country another time in the 60s, Cold War chronicles altered also when William Appleman Williams held the United States responsible for the conflict. This was in his turning point 1962 hardback, The Tragedy of American Diplomacy. Williams referred to himself as a self-declared extremist and articulated that the United States had in times gone by thought about the open-door guiding principle as vital to the constant successfulness of the United States. Williams points at quite a lot of past illustrations of this guiding principle and wraps up that the United States could not arrive at any post-conflict pact with the Soviet Union till the Soviets consented to the United States open business in Eastern Europe, which is contradictory of the socialist states the Soviet Union desired to have in the area. As a result of this, Williams further indicates that America piled up too much pressure on the Soviets by way of schemes like NATO and the Marshall Plan, which left the Soviet Union on the justificatory. Immediately the Soviet Union ingrained itself so as to keep it s sakes, no allowance was left for finding the middle ground on the structure of post-conflict Europe. Being of the same opinion as Williams was Norman Graebner. Graebner’s 1962 paperback indicates that American leading lights put into use speechifying too antagonistic to the Soviet Union in desires of talking into the citizenry of America and Western Europe that any Soviet menace could with no trouble done away with. This showed the way to the leaders of the US to be in a position to give up nothing to the Soviets minus appearing sapless to the populace. A number of other revisionist historiographers have placed other American deeds and guiding principles at the focal point of the cause of the Cold War (Combs, 1983, p. 67). According to Gar Alperovitz, the US ought to have the acclaim for starting the Cold War due to its use of the nuclear bomb against Japan. Alperovitz indicates that Truman dropped the bomb not to preserve lives and bring the war with Japan to an end, but h e did it so as to fright the Soviets into agreeing to the US to come up with the procedure for the post-conflict world. Nevertheless, going by Alperovitz, Stalin perceived Eastern Europe as even more significant for the safety of the Soviet Union. Following Hiroshima and Nagasaki, Stalin required a safeguard district so as to become aware of any effort by the US to drop a nuclear bomb on Moscow. Post-revisionism The revisionist explanation created a climacteric response of its own. In an assortment of ways, post-revisionist intelligence, prior to the collapse of Socialism, faced up to past works on the genesis and path of the Cold War, and a number of American Scholars carry on with refuting the existence of an American domain. Post-revisionism faced up to the revisionists by agreeing to a number of their conclusions but refuting a majority of their main assertions. Author George Herring centered his work on the United States’ incapacity to foresee Stalin’s conduct as a key root of the Cold War. What’s more, Herring considered that Stalin saw the US’s economic agenda as an undeviating competition to the Soviet Union (Tucker, 1997, p. 281). The author admits that he holds no proof to back up his Stalin assertion but uses psychosomatic outlining of Stalin’s responses to American resolutions to draw his windings up. Robert Messer sustained the exertions of the post-revisionists by laying emphasis on the misapprehension of each other by the leading lights of the two world powers. Messer indicates that the US and the Soviet Union could not reach a pact on the definite description of what a free and fair poll would involve and who would be in charge of ensuring the voting would be devoid of deceit. In the continuing investigation among western historiographers for the genesis of the Cold War, the post-revisionists appear to have attained more impartiality as compared to the preceding orthodox and revisionist schools of thought. In their views, there was no super-patriotism, nor were there any condemnations of the US administration. Nonetheless, the revisionists do away with all culpability for the Cold War and arrive at the wrapping up that the Cold War was an inescapable destiny. On the other hand, history is filled with persons who stood up against impossible odds to alter destiny and, consequently, history (Suri, 2002, p. 92). A scrutiny of leading lights of both the US and the Soviet Union will turn out loads of individuals that were more than competent of altering this destiny, but these people did not have confidence in one another to accomplish what they had pledged to do. Reference List Berezhkov, M. (1994). At Stalin’s Side: His Interpreter’s Memoirs from the October Revolution to the Fall of the Dictator’s Empire, trans. Sergei I. Mikheyev (New York: Birch Lane Press, 1994), pages 268-270. Combs, Jerald. (1983). American Diplomatic History: Two Centuries of Changing Interpretat ion. (Berkeley: University of California Press, 1983). Davis, N. (1999). Rethinking the role of Ideology in International Politics During the Cold War, Journal of Cold War Studies 1 (1), (Winter 1999), pages 10-109. Gaddis, J. (1972). The United States and the Origins of the Cold War, 1941-1947. (New York: Columbia University Press, 1972). Garthoff, R. (2004). Foreign Intelligence and the Historiography of the Cold War. Journal of Cold War Studies 2004 6(2): 21-56. Issn: 1520-3972 Fulltext: Project Muse. Suri, J. (2002). Explaining the End of the Cold War: A New Historical Consensus? Journal of Cold War Studies – Volume 4, Number 4, Fall 2002, pp. 60-92 in Project Muse. Tucker, R. (1997). The Cold War in Stalin’s Time: What the New Sources Reveal, Diplomatic History 21, (Spring 1997), pages 273-281. Walker, J. (1981). Historians and Cold War Origins: The New Consensus, in Gerald K. Haines and J. Samuel Walker, eds., American Foreign Relations: A Historiographical Revie w (1981), 207–236. White, T. (2000). Cold War Historiography: New Evidence Behind Traditional Typographies. International Social Science Review, (2000). This essay on International Relations During the Cold War was written and submitted by user K1m0ra to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, November 24, 2019

American Dream essays

American Dream essays What exactly is the American dream? Most people have never really thought about this before even though deep down inside they have an idea of what their personal dream is. Ever since the first settlers arrived in Jamestown to set up a new colony in this vast new world, it stood as a place of freedom that was not available anywhere else in the world. People flocked here in search of a new, better life. Over the course of history, however, this dream has changed in many ways. Through interviewing people from different generations, this change in the American dream becomes evident. Helen was born in 1922 into a poor family that lived on a farm. She was put to work on the farm during her early childhood. When I was growing up, children were expected to do their share of the work. I worked some days from sunrise to sunset with my father on the farm along with my brothers and sisters (Bell). Though she had wanted to graduate, Helen only went to school through the eighth grade before she had to drop out in order to help her sick sister. She had dreams of growing up and becoming a music teacher, however she ended up working in a pants plant for 45 years of her adult life. According to her, the perfect life consisted of being ...a good, godly woman with a loving husband and a roof over our heads (Bell). To her, money was not as important as it is to many people in todays society. She found contentment in other things besides wealth, as she lived a happy life with her caring husband and, eventually, became the mother of a family of eight kids. Eddie was born in 1948. With the exception of not having a father, he had a fairly normal childhood until the age of 14 when he moved out to live on his own. Growing up, I always thought of the perfect life as having a loving family, lots of money, a nice house, and a nice car (Edwards, E). He stayed in school and eventually ...

Thursday, November 21, 2019

The Yellow Christ by Paul Gauguin Assignment Example | Topics and Well Written Essays - 500 words

The Yellow Christ by Paul Gauguin - Assignment Example The essay "The Yellow Christ by Paul Gauguin" explores the artwork by Paul Gauguin called "The Yellow Christ". This painting conveys starkness of the Breton scenery despite gay colors. Women in this painting portray a peasant potency. The outline of image the Christ in the painting and bold shading of women represents Gaugin’s emblematic style. Paul Gauguin uses oil with color pigments forming emulsions for application onto a canvas surface by cloisonnism. The applicator is a paintbrush that spreads the emulsion evenly on a canvas surface. Color pigments are miscible in oil and take a comparatively long period to dry. Shades of colors produced are clear and last for long periods with no risks of fading. Oil and canvas form basic materials for painting since time immemorial. Lines in the â€Å"The Yellow Christ† spread all over its frame. Vertical, horizontal, straight, curvilinear, and contour lines mingle in this painting bringing about diversity. Contour lines represe nt the landscape while straight lines outline the crucifix. The painting is a rectangular frame with dimensions of 92 Ãâ€" 73cm. Shapes of women and Jesus are elliptical and merge with smooth outlines of landscape. â€Å"The Yellow Christ† painting portrays a mixture of primary and secondary colors signifying various features. Yellow color in the painting merges Jesus with the scenery. Shades of blue and black on women in the painting depict contrast between bright and deep colors. Contrast of colors form a balancing relationship in the painting.

Wednesday, November 20, 2019

'Classical pluralism comes nowhere near capturing the reality of local Essay

'Classical pluralism comes nowhere near capturing the reality of local politics' (Stone 2008). Discuss - Essay Example This paper aims to study the classical pluralist theory and analyze how much it is found in our local politics today. Classical pluralism is the view that politics and decision making are mostly located in the government, but there are also non-governmental groups who use many resources to exert their influence on politics and decision making (Barzilai 2003). Discussion What we observe these days in our local politics is actually neopluralism. It is the reconstruction of political science and advancement in the fundamental and traditional structure of classical pluralism of political sociology. Our societies have come a long way from the traditional classic era of classic pluralism of the post second world war era. Pluralist legacy emphasized on the primacy on the pluralist social agents and factors. Neopluralism still falls in the pluralist legacy of the classic, but it has undergone a series of complicated revisions. There are many theoretical perspectives on one of the most fundam ental question of politics. Who should rule? The answer varies from the many, the few, to one? Classical pluralist answer to this question is the rule of many. Although there are not many theories that support the rule of one but classical theories do support the existence of one ruling class or powerful elite. In short we can term it as the rule of the few (Connolly 2010). What is classical pluralism? The central theme of classical pluralism is the concept of unity in diversity proposed by Aristotle. It is also followed by early liberal’s competitive and representative democracy. This theory of liberal democracy in socially diverse countries flourished and evolved into what is called Polyarchy. Polyarchy form of pluralism is about effective rule of elected representatives through a process of free and competitive elections conducted in the supervision of the civil associations of civil liberties. Polyarchy is rooted in the heterogeneous pluralist social structure. The era of 1960’s and 70’s was the era of political and ideological tumultuous and the pluralist theory also responded by evolving into neo pluralist theory. In this theory attention was given to state initiatives. The pluralism of agency was extended to the state-based interest groups (Janosky 2005. The theory of classical pluralism is founded on two building blocks namely interest groups and power politics. It revolves around the idea that interest groups compete with each other to acquire power to further their own interests. The classical pluralist democracy also has equilibrium in place through self correcting balance of political powers. It believes that all the interest groups will have equal opportunities to influence public decision making process. Classical pluralist theory was more an idealistic vision rather than the actual situation although proponents of this theory claimed it to be realistic and based on empirical evidence. This was the first generation of plurali st. Second generation pluralist also called neopluralist were led by Robert Dahl and Charles Linblom. These second generation pluralist were more realistic and realized the inequalities in the theory which were not in favor of the less disadvantaged. Third generation pluralist restricted the identification and categorization of fixed groups with fixed interests (Behrouzi 2006). What are interest groups? There are two views about

Sunday, November 17, 2019

Comparative Politics Midterm Essay Example | Topics and Well Written Essays - 1250 words

Comparative Politics Midterm - Essay Example The answer to this question is simple and straightforward. This is the most popular pattern of democracy, practical from the functional point of view of the government in power. In a democracy, the political party that wins the election, turns to be the powerful chair and the party/parties those are defeated turn to be chair-less powers! Elucidating this issue further Arend Lijphart writes, â€Å"The majoritarianism-consensus contrast arises from the most basic and literal definition of democracy-government by the people or, in representative democracy, government by the representative of the people—and President Abraham Lincolns famous further stipulation that democracy means government not only by but also for the people—that is government in accordance with the peoples preferences.†(1) From the technical point of view, and going the by the rule book of democracy, the issue is clear. The party in majority, rules the country and its decisions are final and legal ly binding on the people. The Consensus Model is to accommodate for the viewpoints of the other party /parties, even though they have lost the election are obliged to sit in the opposition benches. In this model, there is always room for the others. They believe, two heads are better than one. Lijphart throws more light of the functioning of such democracies and he comments, â€Å"The alternative answer to the dilemma is: as many as possible. This is the crux of the consensus model. It does not differ from the majoritartian model on accepting that majority rule is better than minority rule, but it accepts majority only as a minimum requirement: instead of being satisfied with narrow decision-making majorities, it seeks to maximize the size of these majorities.†(2) Working as per the guidelines of this model, the majority party does not believe that whatever it decides is correct; rather it is willing to believe and implement, whatever correct is there, belongs to all. The French system of

Friday, November 15, 2019

Wireless networks: Security

Wireless networks: Security WIRELESS networks ,due to ease of installation ,cost benefits and the capability of connectivity , hence communication anywhere ,has made it the most popular way of network setup in this 21st century. With increase in the need of mobile systems, the current electronic market has also been flooding with laptops, pdas, RFID devices, healthcare devices and wireless VOIP (Voice over IP) which are WIFI (Wireless Fidelity) enabled. With the 3G (Third Generation) and 4G (Fourth Generation) cellular wireless standards, mobiles phones are also WIFI enabled with very high speed being provided for data upload and download .Nowadays a malls and public areas not mention even cities are WIFI capable, enabling a person to access the internet or even contact a remote server in his office from anywhere in that city or even from his mobile phone while just strolling down the road. But as every good technology has its own drawbacks so does the wireless networks .Just as in the case of wired networks they are also prone to intruder attacks or more commonly known as Wireless hacking thus compromising the networks , security, integrity and privacy. The basic reason for this is when the wireless network was first introduced, it was considered to have security and privacy built into the system while transmitting data. This misconception had basically arisen because wireless system transmitters and receivers used spread spectrum systems which have signals in the wide transmission band. Since the RF(Radio Frequency ) receivers which at that time could only intercept signal in the narrow transmission band these wireless signals were potentially considered in the safe zone .But it did not take long to invent devices that could intercept these wireless signals as well .Hence the integrity of data send over wireless networks could be easily compromised .With the developme nt of technology so has the methods and ways in which a network can be attacked become more vicious . Fig-1: WLAN (Wireless Local Area Network) Security of wireless networks against such vicious attacks is hence the become the priority for the network industry. This is because not all networks are equally secure .The security depends on where this network is used. For example, if the requirement of the wireless is to provide a wireless hotspot in a shopping mall then then the security of this is never concerned with but if its for a corporate they have their own security authentication and user access control implemented in the network. II. WHY WIRELESS networks are prone to attacks? There are number of reasons why wireless networks are prone to malicious attacks .These are the most challenging aspects to eb considered when a secure wireless network has to be established. a) Wireless network are open networks: The reason for this is that there is no physical media protecting these networks .Any packet transmitted and received can be intercepted if the receiver has the same frequency as the transmitter receiver used by h wireless network .There is also a common misconception that if the authentication and encryption are properly used the network will not be compromised .But what about the messages send back and forth before the authentication and encryption comes into play ? b) Distance and Location: The attacker can attack from any distance and location and is only limited by the power of the transmitter .Special devices have been designed which can attack even short distance networks such the Bluetooth c) Identity of the Attacker: Attacker can always remain unidentified because he uses a series of antennas or other compromised networks before reaching the actual target. This makes wireless network attackers very difficult to track. Some of the reasons why such attacks are so common is because of the easy availability of information from none other than the Internet, easy to use cheap technology and of course the motivation to hack . III. wireless hacking step by step To understand the security protocols for wireless networks currently in use, first it is important to understand the methods through which a weak network is attacked by a hacker .These are also known as wireless intrusion methods . A. Enumeration: Also know as network Enumeration, the first and foremost step to hacking which is finding the wireless network. The wireless network could be any specific target or even a random weak network which can be compromised and used to attack other end systems or networks .This feat is achieved by using a network discovery software which are now a days available online in plenty, to name a few are Kismet and Network stumbler . In order to have more information about the network, the packets that are send and received by the network can sniffed using network analyzers also known as sniffers .A large number of information can be obtained by using this including IP address, SSID numbers even sensitive information such as MAC address , type of information and also the other networks that this compromised end system. Yet another problem faced is the use of network mappers which can be used to find he servers that run these compromised networks hence also attacking these servers which could then affect proper functioning and information transfer between these servers and to other networks connected to it . B. Vulnerability Assesment: This is mainly done by the hacker y using a vulnerability scanner .After the hacker has found the network he want to attack he uses this program in order to detect the weakness of the computer , computer systems networks or even applications. After this the intruder decided on the most possible means of entry into the network. C. Means of Entry: IV. TYPES OF THREATS ATTACKS A. Eaves Dropping and Traffic Analysis: This is the form of attack that makes use of the weak encryption of the network .This always compromises the integrity and security of the network .All attacks such as war driving , war chalking ,packet sniffing traffic analysis all fall under this category B. Message Modification: These attacks are mainly used to modify the data that is send across a network .The modification might be giving wrong information or also adding malicious content to the data packet send form one station to another .This compromises the integrity and privacy of the Data . C. Rogue Devices: Theses could be devices such as APS , application software programs which has been compromised by the intruder and made to function according to him/her. Such devices can compromise the integrity of the network as well as the data send across it .These devices can also launch reply attacks and also make the network associated to malicious content websites or information. D. Session Hijacking: This attack occurs after a valid session has been established between two nodes to through the AP.In the attacker poses as a valid AP to the node trying to establish connection and a valid node to the AP .The attacker can then send malicious or false information to the node that the connection has already been established with .The legitimate node believe that the AP has terminated he connection with it . The hacker can then use this connection to get sensitive information from the network or the node . E. Man In the Middle Attacks: This is similar to that of a session hijacking attack but in this case it is a rogue AP that acts as valid client to the legitimate AP and valid AP to the legitimate client .Once this has been established the rogue AP can access all information from the , intercept communication , send malicious information to other clients through this . These are just few of the security threats and attacks in wireless environments .With the advancing technologies there many more possible security threats that can be faced by these networks in the future. V. BASIC REQUIREMENTS IN WIRELESS NETWORK SECURITY With the vulnerability of wireless networks ,security and countering o such malicious attacks have become one of the top priorities addressed by enterprises ,corporate as well as research fields in IT .There are many pints to be considered when the security of a network is concerned the most important f which are : authentication, accountability and encryption . A. Authentication: This is very familiar to anyone using a network in his or her work place or even accessing he email on the internet and the very first step in promoting a secure wireless network . .There many different ways of authentication and many different tools and methods have been used over the years in order.. make the primary process, more reliable and fool prof.Some of the most widely used methods are : a) User name and Password combinations generally defined as something that a person knows. b) Smart Card, RFIDs and Token technologies also known as something that a person has c) Biometric Solutions such as finger printing , retina scanning which can be generally defined as something that a person is or are. Now the reliability of each one of these methods can vary depending on the level on which it has been implemented .In the case very low level authentication s only one kind of method I used to secure the network .One of the weakest forms of authentication can be considered as the use of only ID card or token technologies as if a person looses this , he can compromise the security of the network .Even in the case of username and password the strength of the authentication is only as good as the complexity of the information used as username or even password .People generally prefer to use passwords that are easy to remember but also known to many other people in that organization or even outside One of the much better ways of securing a network through authentication is to use biometric solutions such as fingerprinting or retina scanning .But of course technology has advanced to the extend that even fingerprints or even retinas can be forged .Nowadays a number of methods of combinatio nal methods are used as authentication with high security premises or networks guarded by more than two or three kinds of authentications . B. Accountability After a user has been authenticated to use the network it is important to have t able to track the computer usage of each person using the network so that incase of any foul play the person responsible can be held responsible .When the networks were very small it was very easy f a network administrator to track the usage of each person on a network .But with huge networks, remote access facilities and of course the wireless networks it has become quite a difficult task .AS mentioned earlier , there are many ways in which a hacker can make himself difficult to track down .Many softwares and firmwares have been created which is used in conjecture with the authentication protocols inoder to make the wireless network more secure and robust . C. Encryption: This is the most important step in building and securing a strong wireless network infrastructure .he steps generally followed for this are : a) Methods based on public key infrastructure (PKI) b) Using high bit encryption scheme c) Algorithm used for encryption must be well known and proven to be very unbreakable. Current wireless network security solutions can be classified into three broad categories: a) unencrypted solutions b)encrypted solutions c) combination. In this paper with emphasis as explained in the abstract will eb on encrypted solutions for wireless security. A brief discussion on the unencrypted methods has still been given for basic understanding. I n the case of encryption based security protocols ,a details description is given about the ones that are commonly used in wireless LANS in this paper .After which the latest and developing technologies will be discussed .The three major generations of security as existing today and also cited in many papers ,journals and magazines are as follows : 1) WEP (Wired Equivalent Privacy) 2) WPA (Wi-Fi Protected Access) 3) WPA2 The image below shows the layer in which the wireless network security protocols come into play which is of course the link layer: Fig-1: 802.11 AND OSI MODEL VI. WIRELESS SECURITY UNENCRYPTED A. MAC Registration: This is one of the weakest methods network security..MAC registration was basically used to secure university residential networks as college apartments or dorm rooms. The basic way of doing this is to configure DHCP (Dynamic Host Configuration Protocol) to lease IP address to only a know set of MAC address which can be obtained manually by running automated scripts on a network server so basically any person with a valid registration can enter into the network .Session logs also cannot be generated because of which accounting of the logs become impossible. Last but not the least since this method of securing was basically used for switched and wired networks encryption was never included. B. Firewalls: In this method, network authentication is one through either HTTP( Hyper text Transfer Protocol),HTTPS or telnet .When an authentication requirement is received by the network it is directed to the authentication server .On validating the authentication the firewalls add rules to the IP address provided to that user , This IP address also has timer attached to it in order to indicate the rule time out of this IP address. When executed through HTTPS it is basically a session based as well as a secure process .But any other process which is adapted from a switched wired network firewalls does not provided encryption. C. Wireless Firewall Gateways : One of the most latest as well as considerably fool proof method in unencrypted solutions in Wireless Firewall Gateways or WFGs.This is a single wireless gate way is integrated with firewall, router, web server and DHCP server and its because of all these being in one system that makes WFGS a very secure wireless security solution. When a user connects to the WFG, he/she receives a IP address form the DHCP serve .Then the web server ( HTTPS) asks for a user name and password and this is executed by the PHP ( Hypertext Preprocessor).Address spoofing and unauthorized networks are avoided by PHP as the DHCP logs are constantly compare with the current updated ARP(Address Resolution Protocol).This verifies that the computer that is connect to the network is using he the IP address that has been leased to it by the DHCP server .Then this information is passed on to the authentication server which in turn adds rules to this IP address .Up ne the expiration of the DHCP lease the sessions ar e terminated . The WFGS hence make the authentication and accountably pat f the network more reliable ,But as this is also an unencrypted method it lacks the most important accept of security. VII. WEP-WIRED EQUIVALENT PRIVACY This protocol was written in accordance with the security requirements required for IEE 802.11 wireless LAN protocol .IT is adapted from the wired LAN system and hence the security and privacy provided by it is also equivalent to the security and privacy provided a wired LAN. Through its an optional part of wireless network security, it will give a considerably secure networking environment. The algorithm used in WEP is known as the RC4(Rivest Cipher 4) .In this method a pseudo random number is generated using encryption keys of random lengths .This is then bound with the data bits using a OR(XOR) functionality in order t generate an encrypted data that is then send .Too look at in more in detail : A. Sender Side: The pseudo random number is generated using the 24 bit IV(initialization Vector ) given by the administrator network and also a 40 r 104 bit secret key or WEP key given by the wireless device itself. Which is then added together and passed on to theWEP PRNG (Pseudo Random Number Generator).At the same time the plain text along with an integrity algorithms combined together to form ICV (integrity check value) .The pseudo number and the ICV are then combined together to form a cipher text by sending them through an RC4.This cipher text is then again combined with IV to form the final encrypted message which is then send. Fig-2: WEP SENDER SIDE B. Receiver Side: In the receiver side the message is decrypted in five steps .Firs the preshared key and the encrypted message are added together .The result is then passed through yet another PRNG .The resulting number is passed through an CR4 algorithm and this resulting in retrieving the plain text .This again combines with another integrity algorithm to form a new ICV which is then compared with the previous ICV t check for integrity. Fig-3: WEP RECIEVER SIDE C. Brief Descriptions: a) Initialization Vector : are basically random bit the size f which is generally 24 bits but it also depends on the encryption algorithm .This IV is also send to the receiver side as it is required for decrypting the data send . b) Preshared Key: is more or less like a password .This is basically provided by the network administrator and is shared between the access point and all network users c) Pseudo Random Number Generator: This basically creating a unique secret key for each packet sends through the network. This is done by using some 5 to at most 13 characters in preshared key and also by using randomly taken characters from IV. d) ICV and Integrated Algorithm: This is used to encrypt the plain text or data and also to create a check value which can be then compared y the receiver side when it generates its own ICV .This is done using CRC (Cyclic Redundancy Code) technique to create a checksum .For WEP, the CRC-32 of the CRC family is used. D. RC4 Algorithm: RC$ algorithm is not only proprietary to WEP .IT can also be called a random generator, stream cipher etc .Developed in RSA laboratories in 1987 , this algorithm uses logical functions to be specific XOR to add the key to the data . Figure 5: RC4 Algorithm E. Drawbacks of WEP: There are many drawbacks associated with the WEP encryptions. There are also programs now available in the market which can easily hack through these encryption leaving the network using WEP vulnerable to malicious attacks: Some of the problems faced by WEP: WEP does not prevent forgery of packets. WEP does not prevent replay attacks. An attacker cans simply record and replay packets as desired and they will be accepted as legitimate WEP uses RC4 improperly. The keys used are very weak, and can be brute-forced on standard computers in hours to minutes, using freely available software. WEP reuses initialization vectors. A variety of available Cryptanalytic methods can decrypt data without knowing the encryption key WEP allows an attacker to undetectably modify a message without knowing the encryption key. Key management is lack and updating is poor Problem in the RC-4 algorithm. Easy forging of authentication messages. VIII. WPA -WIFI PROTECTED ACCESS WPA was developed by the WI-FI alliance to overcome most of the disadvantages of WEP. The advantage for the use is that they do not have t change the hardware when making the change from WEP to WPA. WPA protocol gives a more complex encryption when compared to TKIP and also with the MC in this it also helps to counter against bit flipping which are used by hackers in WEP by using a method known as hashing .The figure below shows the method WPA encryption. Figure 6: WAP Encryption Algorithm (TKIP) As seen it is almost as same as the WEP technique which has been enhanced by using TKIP but a hash is also added before using the RC4 algorithm to generate the PRNG. This duplicates the IV and a copy this is send to the next step .Also the copy is added with the base key in order to generate another special key .This along with the hashed IV is used to generate the sequential key by the RC4.Then this also added to the data or plan text by using the XOR functionality .Then the final message is send and it is decrypted by using the inverse of this process. A. TKIP (Temporal Key Integrity Protocol): The confidentiality and integrity of the network is maintained in WPA by using improved data encryption using TKIP. This is achieved by using a hashing function algorithm and also an additional integrity feature to make sure that the message has not been tampered with The TKIP has about four new algorithms that do various security functions: a) MIC or Micheal: This is a coding system which improves the integrity of the data transfer via WPA .MIC integrity code is basically 64bits long but is divided into 32 bits of little Endean words or least significant bits for example let it be (K0 , K1) .This method is basically used to make that the data does not get forged . b) Countering Replay: There is one particular kind of forgery that cannot me detected by MIC and this is called a replayed packet .Hackers do this by forging a particular packet and then sending it back at another instance of time .In this method each packet send by the network or system will have a sequence number attached to it .This is achieved by reusing the IV field .If the packet received at the receiver has an out of order or a smaller sequencing number as the packet received before this , it is considered as a reply and the packet is hence discarded by the system . c) Key mixing: In WEP a secure key is generated by connecting end to end the base layer which is a 40 bit or 104 bit sequence obtained for the wireless device with the 24 bit IV number obtained from the administrator or the network. In the case of TKIP, the 24 bit base key is replaced by a temporary key which has a limited life time .It changes from one destination to another. This is can be explained in Phase one of the two phases in key mixing. In Phase I, the MAC address of the end system or the wireless router is mixed with the temporary base key .The temporary key hence keeps changing as the packet moves from one destination to another as MAC address for any router gateway or destination will be unique. In Phase II, the per packet sequence key is also encrypted by adding a small cipher using RC4 to it. This keeps the hacker from deciphering the IV or the per packet sequence number. d) Countering Key Collision Attacks or Rekeying : This is basically providing fresh sequence of keys which can then be used by the TKIP algorithm .Temporal keys have already been mentioned which has a limited life time .The other two types f keys provided are the encryption keys and the master keys .The temporal keys are the ones which are used by the TKIP privacy and authentication algorithms . B. Advantages of WPA: The advantage of WPA over WEP can be clearly understood from the above descriptions .Summarising a few: a) Forgeries to the data are avoided by using MIC b) WPA can actively avoid packet replay by the hacker by providing unique sequence number to each packets. c) Key mixing which generates temporal keys that change at every station and also per packet sequence key encryption. d) Rekeying which provides unique keys for that consumed by the various TKIP algorithms. IX. WPA2-WIFI PROTECTED ACCESS 2 WPA 2 is the as the name suggests is a modified version of WPA in which Micheal has be replaced with AES based algorithm known as CCMP instead of TKIP .WPA can operate in two modes: one is the home mode and he enterprise mode .In the home mode all he users are requires to use a 64 bit pass phrase when accessing the network. This is the sort encryption used in wireless routers used at home or even in very small offices. The home version has the same problems which are faced by users of WEP and the original WPA security protocol. The enterprise version is of course for used by larger organisation where security of the network is too valuable to be compromised .This is based on 802.1X wireless architecture , authentication framework know as RADIUS and the another authentication protocol from the EAP ( Extensible Authentication Protocol ) Family which is EAP-TLS and also a secure key . A. 802.1X: Figure 7: 802.1X Authentication Protocol In order to understand the security protocols used in WPA2 it is important know a little bit about the 802.1X architecture for authentication. This was developed in order to overcome many security issues in 802.11b protocol. It provides much better security for transmission of data and its key strength is of course authentication There are three important entities in 802.1x protocol which is the client, authenticator and authentication. a) Client : is the STA(station) in a wireless area network which is trying to access the network ,This station could be fixed , portable or even mobile. It of course requires client software which helps it connect to the network. b) Authenticator: This is yet another name given to an AP (Access Point).This AP receives the signal from the client and send it over to the network which the client requires connection from There are two parts to the AP i.e. the non control port and the control port which is more of a logical partitioning than an actual partition..The non control port receives the signal and check its authentication to see if the particular client is allowed to connect to the network .If the authentication is approved the control port of the AP is opened for the client to connect with the network. c) Authentication: RADIUS (Remote Authentication Dial in User Service) server .This has its own user database table which gives the user that has access to the he network, this makes it easier for the APs as user information database need not be stored in the AP .The authentication in RADIUS is more user based than device based .RADIUS makes the security system more scalable and manageable. Figure 8: EAP/RADIUS Message Exchange B. EAP (Extended Authentication Protocol): The key management protocol used in WAP2 is the EAP (Extended Authentication Protocol).It can also be called as EAPOW (EAP over wireless).Since there are many versions of this protocols in the EAP family it will advisable to choose the EAP protocol which is very best suited for that particular network .The diagram and the steps following it will describe how a suitable EAP can be selected for that network : a) Step1: By checking the previous communication records of the node using a network analyser program, it can be easily detected if any malicious or considerably compromising packets has been send to other nodes or received from to her nodes to this node . b) Step 2: By checking the previous logs for the authentication protocols used, the most commonly used authentication protocol used and the most successful authentication protocol can be understood. Figure 9: EAP Authentication with Method Selection Mechanism c) Step 3: The specifications of the node itself have to be understood such as the operating system used the hardware software even the certificate availability of the node. After all this has been examined the following steps can be run in order to determine and execute the most suitable EAP authentication protocol: 1. Start 2. if (communication_record available) then read communication_record; if(any_suspicious_packets_from_the_other_node) then abort authentication; go to 5; else if (authentication record available) then read authentication record; if (successful authentication available) then read current_node_resources; if (current_node_resources comply with last_successful_method) then method = last_successful_method; go to 4; else if (current_node_resources comply with most_successful_method) then method = most_successful_method; go to 4; else go to 3; else go to 3; else go to 3; else go to 3; 3. read current_node_resources; execute method_selection(current_node_resources); 4. execute authentication_process; 5.End X. RSN-ROBUST SECURITY NETWORKS RSN was developed with reference to IEEE 802.11i wireless protocol .This connection can provide security from very moderate level to high level encryption schemes .The main entities of a 802.11i is same as that of 802.1x protocol which is the STA (Client), AP and the AS (authentication server).RSN uses TKIP or CCMP is used for confidentiality and integrity protection of the data while EAP is used as the authentication protocol. RSN is a link layer security i.e it provides encryption from one wireless station to its AP to from one wireless station to another..It does not provided end to end security IT can only be used for wireless networks and in the case of hybrid networks only the wireless part of the network . The following are the features of secure network that are supported by RSN ( WRITE REFERENCE NUMBER HERE) : a) Enhanced user authentication mechanisms b) Cryptographic key management c) Data Confidentiality d) Data Origin and Authentication Integrity e) Replay Protection. A. Phases of RSN: RSN protocol functioning can be divided in the five distinct phases .The figure as well as the steps will describe the phases in brief: a) Discovery Phase: This can also be called as Network and Security Capability discovery of the AP.In this phase the AP advertises that it uses IEE 802.11i security policy .An STA which wishes to communicate to a WLAN using this protocol will up n receiving this advertisement communicate with the AP .The AP gives an option to the STA on the cipher suite and authentication mechanism it wishes to use during the communication with the wireless network. Figure 9: Security States of RSN b) Authentication Phase: Also known as Authentication and Association Phase .In the authentication phase, the AP uses its non control part to check the authentication proved by the STA with the AS .Any other data other than the authentication data is blocked by the AP until the AS return with the message that the authentication provided by the STA is valid .During this phase the client has no direct connection with the RADIUS server . c) Key Generation and Distribution: During this phase cryptographic keys are generated by both the AP and the STA. Communication only takes place between the AP and STA during this phase. d) Protected Data Transfer Phase: This phase as the name suggest is during which data is transferred through and from the STA that initiated .the connection through the AP to the STA on the other end of the network. e) Connection Termination Phase: Again as the name suggests the data exchanged is purely between the AP and the STA to tear down the connection

Tuesday, November 12, 2019

Organization transformation Essay

The need for a change is almost there on a daily basis in corporations. This is accentuated by particularly by the advent of new technology like the internet and new management methods and new technologies (Wallace, 2007). This brings in new ways of doing jobs within the company and thus the workers are affected. Companies which initially used to have the traditional organization model have increasingly adopted they are better and more efficient and modern transformed organizational models. An organization provides a mean of utilizing individual capabilities within a team to accomplish what cannot be achieved by the aggregate attempts of team members working in isolation. The aims of forming corporations and organizations are to deliver goods or services to consumers in a way that at the conclusion of the deal profits and not losses can be realized. Organizational change is geared at achieving this and thus winning the hearts and minds of the target population while concurrently bringing about a changed behavior and work culture to the partakers. In response to this Organizational transformation, roles, skills, job descriptions and structure of the workforce need to be re-designed. The Southwest Gas Corporation Such a company that has embraced organizational change from the traditional one to the modern organization transformation is the southern gas corporation of Nevada. Having realized that all organizations and corporations are unique due to unique environment in which they operate and their mode and ways of operations they should be structured to accommodate unique problems and opportunities Southwest Gas Corporation is a company engaged in the business of purchasing, distributing and transporting natural gas to residential, commercial and industrial customers in Nevada state of the southwestern United States. The Gas Corporation has employed about 2,500 workers who serve at least 1. 8million customers in Arizona, Nevada and parts of California states. The company is an investor owned utility whose shares are traded in the New York Stock Exchange and the pacific stock exchange (South West Gas Corporation, 2007). The company has been implementing a five year organizational transformation with an aim of offering better services to the customers and improving the quality of he workers. With respect to transformation certain areas should be prioritized for instance in redefining the business model, integrating acquisitions, building infrastructure, reframing markets and managing talents. The southern gas corporation has taken comprehensive plan to change from the traditional to the transformed organizational model studies done on this company indicated that a positive correlation between the working conditions and the productivity of the workers exists . the results of the studies revealed that innate forces of human behavior may have a greater influence on organizations than do mechanistic incentive systems. In response to that study southern gas corporation have done an almost complete overhaul in areas to do with transport, billing, the accounting system, meter reading systems and the whole organization structure of the company since 2002. Effects Having undergone the organizational change to a more better and modern one saw a number of transformations in the work force. Every member of the workforce was subjected to month long refreshment training as a way of crating a new working atmosphere and as a way of orientating them to the new working tools. The remuneration package was revised to increase the morale of the workers. On the part of the infrastructure the offices and other working areas were renovated. The total reorganization of the offices this was to cater for the psychological aspect of the workers The Organizations adopted a vertical division of labor practice involving the administrators then below them the managers and supervisors and lastly at the base we have the workers. The principal function of top level administrators or executives generally is to plan long-term strategy and administer the middle managers whose work is to guide the day to day activities of the corporations and oversee implementation of the top level strategy. Low-level supervisors and laborers put the made strategy into action and carry out the immediate tasks needed to keep the corporation running. Thus, the South west gas corporation has become a formal with reference to the extent of formalization of rules that have been adopted within the organization structure. In formal organizations, a mild impersonal relationship between the workers and the company is viewed as the best environment suitable for achievements of organization’s objectives by the managerial staff. Here subordinates duties more clearly defined and workforce with different applicable skills are dispensed duties to their areas of specialization in the corporation. It is the duties of workers at the bottom level to perform the essential duties of the corporation with supervisory assistance from the managers. Subordinate staff deals generally with supply and production chain of the corporation . The managerial needs of the whole business process is overseen by the higher cadre staff that includes the supervisors and the administrators. Two important implications into the change in the organization procedure there was equity due to just fair and impartial treatment of all workers, the organization was more orderly since employees were arranged where they would be of most value to the corporation. Initiative was fostered by encouraging the employees to act on their own. Similarly the employees cultivated more attributes and etiquettes (South West Gas Corporation, 2007). Motivation should come from different incentives rather than letting monetary rewards be the sole motivators. The spirit of comradeship among the workers fostered devotion to a common cause. The behavioral change by the managers that allowed greater latitudes stimulated the workers. In general, transformation made workers to become more productive. Having been provided with the best working conditions the workers employees have become capable of effective self-direction yielding self-actualization and this was among the biggest rewards that organizations has provided to its employees. Similar the shares of the southern gas company at the New York stock exchange gained value. Use of improved service delivery systems for instance the better gas safety management systems reduced the number of gas accident cases recorded prior to the five year period. Due to a liberalized approach towards the workers in the by the management they were able to create their labour organization to looks for their own interests, thus enhancing growth of the labour union organizations. This amounted to increase in vocal power of the workers to demand their rights. Conclusion In the world today organizations are operating in an increasingly complex platform. Changing multiple dimensions and high rates globalization trends and the implications of the post-industrial information age are driving these corporations to revolutinalize themselves (Wallace, 2007). The end product of this transformation is a successful company with competent work force. However, organizational transformation should not stop with the end of the project duration. During the benefit realizations stage of the lifecycle, emphasis should be continued on the need to encourage the workers and the community to adapt to the new ways of working and get the most from the system change.

Sunday, November 10, 2019

The Victory of Spanish over the Aztecs

The victory of Cortes over the Aztec was the result of certain military advantages the conquistadors enjoyed, as well as specific problems that weakened the Aztec people and made the empire more vulnerable. It is almost impossible to believe that a small amount of Spanish soldiers were able to conquer the mighty Aztec empire in this historic battle. As soon as Cortes and his army arrived to Mexico in 1519, where the Aztec used to live.They were kindly received by the emperor Montezuma, and their main goal of coming to Tenochtitlan was the gold. According to Sahagun, (2009), ‘’ when the Spanish had given the gold, they seemed to smile, to rejoice and to be very happy. Like monkeys they griped the gold’’, (p. 112). Despite their small number, the Spanish has defeated the Aztec, because of many advantages, such as the military technology they had, which were based on firearms, swords made by steel and iron and riding horses were a great advantage.Also, they ha d better weapon and a lot of the Aztec were scared of horses. Moreover, the Spanish looked like gods to the Aztecs, because of their aggression in killing people. What is more, the diseases that the Spanish carried, like smallpox and malaria, helped them a lot in victorious. â€Å" The pustules that covered people caused great desolation; very many people died of them, and many just starved to death; starvation regained, and no one took care of others any longer† (Sahagun, 2009, page 114).On the other hand, before the Spanish reached Mexico, there were many problems that faced the Aztecs, for example because of the Aztecs religion, it requested a large number of human sacrifices, which considered as an honor, where to be made to the Gods. â€Å" Once when Duran asked why the people were not content to sacrifice animals, he was told that the sacrifice of humans was the honored offering of a great lord â€Å" (Duran,2009,page 407). Furthermore, the Aztecs were not able to be united with other tribes, so the Spanish took this point as an advantage, by united with other tribes to fight the Aztecs.All of these factors were important reasons to destroy the Aztec’s civilization. In conclusion, the Spanish had no mercy in fighting with Aztec and they made many massacres back that time. They used many powerful battle methods against the Aztec, like swords, horses and diseases . Also, there were some interior troubles inside the Aztec society such as human sacrifices. after long battle between the Spanish and the Aztec and a long siege of the capital Tenochtitlan, where much of the population died from hunger and diseases.

Friday, November 8, 2019

Spelling Variations

Spelling Variations Spelling Variations Spelling Variations By Mark Nichol This post discusses several factors responsible for variations in spelling, with examples. For much of the history of the English language, spelling was more an art than a science; because of lapses in literacy, there was no standard orthography. Even now, well into the twenty-first century, thanks to ignorance and laziness (and some intentional slangy sabotage), misspelling is rampant, so many people are unaware, for example, that alot is not an acceptable synonym for many or that definitely, not defiantly, is what you write when you mean â€Å"most assuredly.† Some valid reasons for alternate spellings exist, however. One annoying but hopelessly entrenched cause of spelling variations can be blamed on American lexicographer and spelling reformer Noah Webster, who advocated diverging from English orthography in favor of a uniquely American (but frustratingly inconsistent) spelling system. Fortunately, many of his suggestions failed to catch on, but others prevailed, so that now we have such international discrepancies as defense/defence, honor/honour, meter/metre, and realize/realise. (See this post for a more detailed discussion with more examples.) Often, writers in the United States are unclear on the distinction, so that we see, for example, judgement instead of judgment, or grey when gray is correct. This kind of thing can get confusing when, for example, an exception is made for glamour but not glamorous and glamorize, or when woolen is spelled as such but woolly takes a different form because of the adverbial inflectional ending. Another complicating factor is when the British English spellings centre and theatre are employed in signage for venues in the United States. It’s easy enough, though distracting, for someone raised to read American English to understand written British English, and vice versa. But many international businesses publish materials reflecting both systems to distribute to various global audiences as appropriate, and book publishers have been known to change from one to the other when creating new editions of already published books. (I know this because I’ve been the one responsible for making or checking the changes in both contexts.) However, it’s nearly impossible to catalog (or is it catalogue?) the distinctions (though one can try). Spelling can also vary based on context. For example, antennae and antennas are both correct, but the appropriate spelling depends on the subject matter (anatomical and technical, respectively), and the plural of appendix can be treated appendixes or appendices. (See this post for more examples.) Another type of variation is one based on informal usage: Donut as a variation of doughnut and thru as a truncation of through are valid in certain contexts, but careful writers will use the standard spellings in formal writing. The same goes for yes/yeah and no/nope; in each case, the second alternative has its place, but that place is only when slang is appropriate, as in dialogue. And nonstandard spellings like lite and nite are acceptable only for playful proper nouns (as in the name of a product or a venue.) In addition, spelling sherbet with an extra r (sherbert) may reflect the way the word is often pronounced, but that misspelling is just as egregious as the unholy union of alot and the misuse of defiantly. And spelling the term for a short-sleeved pullover top â€Å"tee shirt† ignores the fact that it was named for the shape of the garment when laid out flat and should therefore be styled T-shirt. Sometimes, older spellings of words persist, as when both analog and analogue or omelet and omelette are variably employed; in such cases (actually, in all cases) let the dictionary be your guide. (See this post for a list of such terms.) Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Spelling category, check our popular posts, or choose a related post below:75 Contronyms (Words with Contradictory Meanings)When to Form a Plural with an ApostropheRunning Errands and Doing Chores

Wednesday, November 6, 2019

The Crimes of Florida Death Row Inmate Emilia Carr

The Crimes of Florida Death Row Inmate Emilia Carr Emilia Carr, 26, was sentenced to death for her role in the murder of Heather Strong in what authorities described as a deadly love triangle. Case Summary Josh Fulgham and Heather Strong started dating when Strong was 15 years old. Their relationship was tumultuous from the beginning, but despite it they had two children together. In 2003 the family moved from Mississippi to Marion County, Florida. Their fighting continued and over the next several years the couple fought, broke up, and then reunited several times. In June 2008, during one of their separations, Strong decided she and the children would move in with the couples friend, Benjamin McCollum. The plan was that she would be the live-in nanny for McCollums two children, but after about three weeks their relationship became intimate. Fulgham did not like that Strong lived with McCollum, even though he engaged to Emilia Carr, who had three children and was pregnant with his child. Over the next six months Fulgham stalked and  harassed both Strong and McCollum repeatedly and threatened them both with a gun. According to friends, Strong seemed very happy with McCollum and with her new life. They found it surprising when she decided to leave McCollum and return to Fulgham in December 2008. Carr was also surprised by the couples reunion. A few weeks into December, she was told by Fulgham that their relationship was over and that she had to move out. She told friends that she loved Fulgham and did not know how she would live without him, especially since she was pregnant with his child. By December 26, Fulgham and Strong got married; however their honeymoon was a short one. Six days into the marriage, Strong had Fulgham arrested after he threatened her with a shotgun during a heated argument. Fulgham   was charged with assault with a deadly weapon and remained in jail for several weeks. During that time Carr visited Fulgham and they rekindled their relationship. His mother and Carr, both who were on friendly terms with Strong, tried to get her to write a letter on Fulghams behalf, but she refused. During one such attempt, witnesses said Carr became so enraged by Strongs refusal to help get Fulgham released from jail, that she pulled her hair and held a knife to her neck. She only relinquished the knife after being held in a choke-hold by a mutual friend, James Acome. Hiring a Hit Man James Acome once dated Carr and she believed he was the father of her youngest child, although he never acknowledged it. He was also friends with Strong and Fulgham. In early January, while visiting Carr who was in the advanced stage of pregnancy with Fulghams child, she asked Acome and his friend, Jason  Lotshaw, if they would kill Strong for $500. They rejected her proposal. She told another friend to help her put the word out that she would pay someone $500 to kill Strong. She said that she planned to use her income tax refund to pay for the job. No one applied for the job. Acome and Strong In mid-January, Acome and Strong began dating and moved into an apartment together on January 26, 2009.  A week later Fulgham was released from jail and he moved in with his mother. Strong Disappears On February 15, Fulgham asked his mother to help him compose a letter for Strong to sign, giving him custody of their two children. This was motivated by Carr, who informed Fulgham while he was still in jail that Strong was planning on leaving the state with the children.   On that same day Strong left work after receiving an emergency phone call about her children. Around mid-day on the same day, Fulghams mother saw her son and Strong driving away from her home. Later that evening Acome returned home from work and found that Strong and her children had moved out. He then received a call from Fulgham who told him that he and Strong were back together. Reported as Missing On February 24, 2009, Misty Strong contacted the Marion County Sheriffs office and reported that her cousin Heather Strong had disappeared. The investigation led to Carr and Fulgham who were brought in for questioning. Over the course of several days and multiple interviews, both Carr and Fulgham blamed each other for the murder of Heather Strong. The Murder According to investigators, Fulgham and Carr plotted together to kill Strong because of his earlier arrest and because she had refused Fulghams request for custody of their children and was planning to move them to another state. On February 15, Fulgham lured Strong to a mobile home that was being used for storage and that was located on the property where Carrs family lived. Fulgham told Strong that Carr had hidden money inside the storage trailer. Once the two were inside, Carr, who was seven months pregnant, entered the trailer as planned. Seeing Carr frightened Strong and she attempted to leave the trailer, but Fulgham wrestled her back inside. Fulgham then tied Strong to a chair from which she managed to escape. Then Carr used duct tape to tape her body and hands to the chair while Fulgham held her down. Strong began crying and begging to be released. Instead, Fulgham forced her to sign the custody letter that his mother had helped him prepare. Carr said Fulgham broke the flashlight that she was carrying, when he used it to hit Strong over the head. He then placed a garbage bag over her head while Carr pulled off enough duct tape to wind around Strongs neck, which tightened the bag. Carr then made two failed attempts to break Strongs neck. When that did not work, Fulgham covered Strongs nose and mouth with his hand and suffocated her to death. Two days later, Fulgham returned to the trailer and buried Strongs body in a shallow grave nearby. Fulgham ended up disclosing the location of Strongs body to the detectives while he was being interviewed about her disappearance. He also told them that Carr was responsible for his estranged wifes death. Carr was being questioned at the same time and told detectives that Fulgham was the killer, but her story changed several times. Physical and forensic evidence found at the trailer, in the shallow grave and on Strongs body gave investigators enough to arrest both Carr and Fulgham and charge them with first-degree murder and kidnapping. Take Your Pick Unknown to Carr, Fulghams sister agreed to cooperate with the police. Carr trusted her and would often cry on her shoulder, not knowing her conversations were being recorded. What she told Fulgmans sister about the murder was completely different than what she told the police. At first she said she had not seen Strong since January 2009. Next she said she had information about Fulgham who she said told her that he killed Strong. That changed to discovering Strongs body inside the trailer a day after Fulgham committed the murder. She then admitted to seeing Fulgham kill Strong, which led to her final confession that she helped Fulgham carry out the plan to murder Strong. In her final admission before her trial, she provided investigators with information that proved her involvement; including an accurate description of a blanket and suitcase that she and Fulgham used when burying Strong, as well as a description of the clothing Strong was wearing when she was murdered. She also led police to Strongs shoes that had not been found on the body or in the grave. The Trial At her arraignment in April 2009 Carr waived her right to a speedy trial. Immediately afterwards, lead prosecutor Rock Hooker filed notice of his intent to pursue the death penalty. The trial began on December 1, 2010. State Attorney Brad King, the lead prosecutor, had built the case on circumstantial evidence. There was no real physical evidence found that proved Carr had anything to do with Strongs murder. However, several witnesses lined up to give testimony that they were asked by Carr to kill, or help her find someone to kill, her boyfriends estranged wife, Heather Strong. There was also testimony given about the time Carr held a knife to Strongs throat when she refused to drop charges against Fulgham after he threatened her with a shotgun. However, the most damaging evidence the prosecution presented were videos of Carr telling the police different versions of what happened the night of the murder.   He also presented the tape recordings of Carr talking to Fulgmans sister Michele Gustafson, who was working with the police. Carr supplied a detailed account of what inside the trailer, which contradicted her previous statements to police that she never entered the trailer on the night Strong was murdered. On the tape jurors clearly heard Carr talking about her attempts to break Strongs neck and how she thought it would be quick and painless. She also admitted to Gustafson that Strong fought off Fulgham, but that she helped him restrain her and that they duct taped her to a chair. She also said that she intended to tell authorities that Jamie Acome and Jason Lotshaw were responsible for the murder; although she left out that she had already implicated Fulgham. Carr described how Fulgham hit Strong hard on her head with the flashlight each time she said something that he did not like and finally how she placed the garbage bag over Strongs head and how Fulgham suffocated her to death. The jury deliberated for two and a half hours and found Carr guilty of kidnapping and first-degree murder. Penalty Phase During the penalty phase of the trial, defense attorney Candace Hawthorne spoke about the abuse Carr experienced as a child.  Members of Carrs family testified that she was traumatized as young child after being sexually abused by her father and grandfather. It had little impact on the jury who, in a slim 7-5 vote, recommended that Carr, age 26, receive the death penalty. Having remained silent since her arrest, Carr spoke out to the press after the jury voted for death. In yet another version of what happened, she said that she had never gone into the trailer and in fact did not even know that Fulgham and Strong were there. In reference to the secret tape recording that police had of her admitting her involvement to Fulgmans sister, she said that she was trying to get details about the murder to give to the State Attorney so that she could get immunity and get her children back. She needed details, so she made up stories. She said she felt pressure to make up things after the police threatened her with her children. In February 22, 2011, Circuit Judge Willard Pope formally sentenced Carr to life imprisonment on the kidnapping charges and death for the murder charges.  On February 23, 2011, Carr was moved to death row at Lowell Correctional Institution in Marion County, Florida. Fulgham Gets Off Easy Joshua Fulgham went on trial a year later. He was also found guilty of first-degree murder and kidnapping. His defense lawyer asked the jury to consider a life sentence because he suffered from mental and sexual abuse. The jury returned an 8-4 vote for a life sentence. Circuit Judge Brian Lambert upheld the jurys decision and Fulgham was given a life sentence with the possibility of parole.

Sunday, November 3, 2019

Finance and Accounting Assignment 2 Example | Topics and Well Written Essays - 1000 words

Finance and Accounting 2 - Assignment Example The interaction made with the organization based on relationship marketing can prove to be a part of ongoing relationship between the customer and the organization and this is because through the interaction, which was done through mail, highlights the importance of relationship marketing in the competitive environment and can be said to be a competitive advantage for organizations. Based on the interaction it has been learned that P&G has been using digital tools in order to build one on one relationship with the customers so to enhance the innovative and marketing capabilities of the company. According to P&G CEO, Bob McDonald the company aims to create indispensable relationship with the brands and it is possible though digital technology. The interaction on relationship marketing which took place can evaluate the way organization is thinking and to what extent they are ready to incorporate change to cater the needs of the customers. P&G is known for its innovation and customers e xpects the same level of innovation, involvement from the company while dealing with the requirements of the customers, therefore the interaction with the management of P&G is definitely an advantage to gather more information about the strategies which are adopted by the company to cater the needs of its target customers (Marketing Governance, 2011). Based on the interaction it has been revealed that P&G builds relationship with the customers based on trust and transparency. The company provides individual with choices and information with respect to communication strategy. The interaction further tends to create value for the ongoing relationship between the customers and the organization a whole. In the competitive world it has become extremely necessary to build trust on the customers so that loyalty is maintained with respect to specific brands and for this relationship marketing plays an important role and can be related to ongoing relationship between the customers and the or ganizations. Based on the interaction with P&G management, it has also been revealed that it has developed website allowing customers to shop through the site rather than visiting the stores. The online retail market is the new buzz word and companies are following it to attract and retain new and potential customers. By developing e-store P&G has created an image for itself in the minds of the customers as an accessible brand made available to the customers at any point of time and also helps to retain them from shifting to another brand offering the same facility. P&G advertise the sites and hopes that the convenience of shopping online by the customers draws more and more customers to the site (NBC News, 2010). The online retail stores have proved to be effective and have helped many retail outlets to incur profit ad increase revenue. Most important, it creates a perception in the minds of the customers that the brands is accessible and P&G being a huge FMCG giant and involved in many different sectors, the customers would prefer to buy products from the company which would further result in customer loyalty for the brand. This way the brand will be able to keep up the long term relationship with its target market and also potential target customers. Therefore organizations and brands are dependent on the customers providing them with an upper hand in comparison to the companies.

Friday, November 1, 2019

The Inspiration of Ignatius of Loyola and Why the Society of Jesus is Essay

The Inspiration of Ignatius of Loyola and Why the Society of Jesus is Different - Essay Example According to the discussion a small cannon ball shattered his right leg and although he submitted himself to surgery, it was only so that he would be deformed with a limp that he carried on through life. To relieve his boredom while recuperating, he asked someone for knightly romances, but was instead handed a book of piety, which â€Å"significantly changed the course of his life and indirectly influenced hundreds of thousands of people over the next five centuries.†This paper outlines that although such a prevailing contribution to the Society resulted from his conversion, his time at Manresa was not all an easy path. From the outset, he doubted about sustaining his new life for many decades to come, but was able to recognize God’s grace, which had liberated him from such doubts. Hence, despite obstacles such as money and support, he was able to initiate his new religious order. As Donnelly emphasized, Loyola "was certain God was calling him to help souls," but how wo uld he accomplish such task? This is exactly what makes the Society of Jesus particularly different from other religious orders, from this paper’s point of view.  Loyola's goal for the Society of Jesus was to "win people to Christ and reform their lives," but in order to do so, he and his followers knew that they must fulfill a good classical and theological education. He then decided to study Latin in order to work for his mission of winning souls for God. He went to Barcelona, Alcala, Salamanca, and Paris, where he studied philosophy for three years.