Thursday, October 31, 2019
The Vietnam War Essay Example | Topics and Well Written Essays - 1250 words - 1
The Vietnam War - Essay Example In their attempt to prevent Vietnam from being a Communist country, the United States opted to help France in defeating Vietnam and its revolutionaries. US, therefore, sent military aid to the French in 1950. US troopââ¬â¢s quantity continued increasing over time until April 1969, when they reached a climax of 5434000. There were a total of 2.7 million Americans serving in South Vietnam. 58000 of them died or went missing, while 300000 others were wounded. It has been documented that the American government spent over 140 billion dollars on this war. Despite this gigantic military effort by the US, its objectives were not achieved by the end of the war. That failure has led, to date, searching answers to why the war was actually fought, and whether better military and diplomatic outcome was possible for America (Lawrence 129). After suffering a significant defeat at Dien Bien Phu in 1954, French decided to leave Vietnam. A number of countries met at the 1954 Geneva Conference in t heir effort to determine how French would have withdrawn from Vietnam peacefully. From the conference, came an agreement that has been referred to as the Geneva Accords. It stipulated a composed extraction of French forces and a momentary splitting up of Vietnam across the 17th parallel (Wiest 23). This 17th parallel ended up splitting Vietnam into non-communist South Vietnam and communist North Vietnam. In addition to this, the conference agreed that a general independent election would be held in 1956 in order to bring back together the nation under a single government. Fearing that the communists would win during the election, the United States was against the election. South Vietnam, with the help of America, carried out the election within South Vietnam, rather than the entire country. Ngo...As the war between the South Vietnamese and the Viet Cong progressed, the United States, on the other hand, sent more guides to South Vietnam. On August 2nd, 1964 the North Vietnamese fired straight on two American vessels in global waters. This firing has been known as the Gulf of Tonkin Incident. The Congress acted in response with what has been referred to as the Gulf of Tonkin Resolution. US president, President Johnsonââ¬â¢s intention for the US taking part in the Vietnam War was not for America to prevail in the war, but for the US to reinforce South Vietnamââ¬â¢s defenses so that South Vietnam would take over leadership. Critics have argued that by getting involved in the Vietnam War without a goal to come first, President Johnson set a weak foundation for later open and military troop disappointments for America. This is one of the greatest impacts that the Vietnam War had on the Cold War, as far as Americanââ¬â¢s success was concerned. The Vietnam War was a turning point for the Cold War, as Americans realized that their military troops were not comparable to others in strength and not able to win in any war. They needed better modus operandi and org anization. Between 1965 and 1969, the Americans were majorly involved in a restricted war in Vietnam. Even though aerial bombing was still present at the North, President Johnson intended the fighting to be limited only to the South. This limitation ensured that the United States troops would not perform severe ground physical attacks at the North to directly attack the communists.
Monday, October 28, 2019
The Truth Behind Hitlerââ¬â¢s ââ¬ÅMein Kampfââ¬Â Essay Example for Free
The Truth Behind Hitlerââ¬â¢s ââ¬Å"Mein Kampfâ⬠Essay Have you ever wonder what is the driving force behind the killing of million of Jews in the regime of Hitler? The idea or the concept behind it came from a deeper belief that was supported by the history. ââ¬Å"Mein Kampfâ⬠, which means ââ¬Å"My Struggleâ⬠, is an original work of Hitler where his autobiography and his ideologies about life specifically its relation to politics were discussed. This book is particularly about the childhood days of Hitler in Nazi, his future plans in Germany and the struggle for conquering the world in the sense that it would affect the political science and the different human cultures of the world. The existence of the dominating mind was based in the concept of Aryanism which is considered by Hitler as the supreme form of culture. He was stating that the master race of all human culture is a Germanic man who has the physical appearance of fair skin, blond hair and blue eyes. Through this idea, he divided human to types and he established orders which can be classified into a higher or lower form. It also sets boundary that made the Northern Europeans exclusive. This principle was based on the idea that the Aryans are the only ones who can lead the world. Their place was considered as living space and these will lead in accordance to Hitlerââ¬â¢s plan. Like the country Russia, Hitler planned that it would be the place for the source of food for the Northern Europeans. To support his principle, he cited that like the British Empire, who conquered the quarter of the world, he would plan and organize the domination for the supremacy among the others. These are some ideas which Hitler espoused in the book. Considering the concept of cultural organization, it sounds irrational for the thinking of other diplomats. It is the racism that it became very exclusive to their race. The subordinates were established because Hitler believed that it would be an advantage for the others to be subjugated because others will come in contact with the supreme ones and will be given or will be shared with what the Aryans have. Hitler also compared the other races like the Slavic and Jews people as the Untermenschen who are racially inferior. He assigned this idea to Jews because he believed that the Jews are related into conspiracy. Hitler uses a lot of descriptions to the cultural form of the Jews as the unscrupulous and the parasites and not only the Jews but also the Czechs, Russians and the Poles. This was supported by his idea that the Aryans are culturally superior. The culture of the Aryanism as part of the struggle for domination is believed to be the outcome of the high level of arts and sciences and technology of the German people. Hitler believed that the Jews are the ones who manipulated the press and control the world finances, utilizing culture to scatter chaos to other cultures and inventing a liberal form of government like the democratic form. The political battle between the Aryans and the Jews are continued in many years. Even in the military aspect of Germany, the Aryanism was applied. This was strengthened when Germany was defeated in the World War I by France that made France as Germanyââ¬â¢s major aim to be conquered. This Nazism became one of the foundations in arranging the ways on how the society should work as planned by Hitler. The invasion was then regarded as part of the schemes of Aryanism to established their race as the supreme ones. This would be their concrete example of being the highest form. The differences between the Aryanism, as related to Nazism as a form of government, and the Jews concept of what should be the human culture, were showed in their endless cultural battle to dominate the world. Like the concept of white supremacy, it can lead to a very threatening tone to other races. Today, the different principles about the way on how should the culture adapt to a new one could be a threat to the original culture. Hitlerââ¬â¢s idea and his plans about being the supreme is a big threat to the constructive forms of government. This can be based on the concept of ethnocentrism where that race considers their selves as the center and the most knowledgeable among others. To sum this up, ââ¬Å"Mein Kampfâ⬠gives the idea of being the supreme like in the form of dictatorship where only one could lead and should be followed. WORK CITED ââ¬Å"Mein Kampfâ⬠. July. 1925. http://www. historyplace. com/worldwar2/timeline/kampf2. htm
Saturday, October 26, 2019
Strategies to Prevent Cyber Crime
Strategies to Prevent Cyber Crime Andrew Rayner Cyber Crime: Preventing the Horrific Crimes on the Internet In todayââ¬â¢s society, there are many aspects of crime committed on a regular basis. Civilians take advantage of people using online resources such as a fraudulent website requiring credit card information to get a free monthly trial. Other venues that may contain a potential for cyber crimes are online chatting websites, full of predators or websites requiring a downloadable program that contains a hacking virus. Sadly, there are many cases of cyber crime populating the internet. Acts of cyber crimes are considered violent acts like any other. Every day, citizens are constantly losing money and being victimized due to a variety fraudulent activities. Cyber crime, including fraud, identity theft, stalking, and hacking, is a growing problem which can be prevented by taking the proper precautions. The biggest case of cyber crimes are cases of fraud. ââ¬Å"Online fraud comes in many forms. It ranges from viruses that attack computers with the goal of retrieving personal information, to email schemes that lure victims into wiring money to fraudulent sourcesâ⬠(What is ââ¬Å"online fraudâ⬠). When browsing the internet, people will stumble upon websites offering a free trial. Some of these websites are real, but many are fake. Real examples can include ones like Netflix, Hulu, or Amazon Prime. A fake website, such as one offering too great of a deal often contains attempts of fraud, to gain access to credit card information. Another way of committing fraud is by sending fake emails to Craigslist advertisers make the victim think that he/she is getting a great deal. This type of fraud has to do with shipping. Criminals respond to Craigslist advertisements pretending to be a company such as PayPal, saying that the money is being held until the victim replies to the email with a valid tracking number. When the victims gives the requested information, the criminal ignores the victim and takes their money. Protection against offenders requires cautionary steps. ââ¬Å"Perpetrators act as hackers who intercept personal information while victims are online, either through website entry or through phony [emails] in which they disguise themselves as legitimate firms attracting victims to do business with themâ⬠(Dyke 3). Keeping personal information secure on the internet is vital for any personââ¬â¢s safety. Never give out credit card information online to any company unless the company is verified. One way of checking for authenticity is to see if the websites has a verification certificate. These certificates cant be given to any website unless it is approved to take vital information. This is a safe way of making sure credit card information is not given to anyone who might steal it. Although they donââ¬â¢t take credit cards, when dealing on Craigslist, never ship anything, for any reason, as this is a scam; instead, the deal should be handled in person. There is no safe way on the internet to ship any item between private parties, so it is best to avoid anyone wanting to work with shipping or money shipments. Anyone can use a credit card number online without a tangible card. Keeping credit card details safe is important when dealing online. Only give credit card information to a website if that the website is certified to take a card. Almost any credit card will have bank protection when purchasing virtual goods, but it is important to make sure card information is not given to an unknown or untrusted website. Many scam websites will have a fake certification seal to verify that the website is real, the seal should link to a valid certification location. A form of cyber crime involving personal information is identity theft. When browsing the internet, people often come across ads that supposedly allow the user to win an iPad or other expensive device when completing a survey. This is a scam and is never a valid offer. These surveys require the user to input personal information such as an address, email, phone number, and name. This is a common method to steal identities. People may also come across a practice of identity theft such as Free-Credit-Score websites. These websites will ask for every bit of personal information including a social security number. A common victim pool is false advertising on Craigslist such as a fake job offer. Social engineers are predators who prey on victims to get personal information resulting in a scam, or even worse, identity theft. Do not deal with anyone on Craigslist when trying to find a friend to chat with. They often are cyber thieves wanting every bit of information to use to their advantage. To prevent identity theft, never give personal information to any website or any person unless that website can is trusted. Some common websites that are trustable are PayPal, Amazon, Squirll, and verified bank websites. These sites all have approved certifications seals. Normally this is checkable by looking to the left of the URL (Website Address) for a Secure Sockets Layer (SSL) installation, which is indicated by a lock icon. Having stalkers outside of the web is dangerous, but because of advancements in technology, the internet is full of cyber stalkers as well. ââ¬Å"A cyberstalker only needs access to a computer and a modem. Due to the enormous amount of personal information available through the internet, a cyberstalker can easily locate private information about a potential victim with a few mouse clicks or key stokesâ⬠(Cyberstalking). Many websites on the internet offer instant messaging. A few examples are Omegle, Craigslist, and teen chat rooms. These rooms are normally a hangout for predators. The predators will act as someone they arent to try and convince victims to like them, resulting in giving them personal details. Chatting sites are extremely dangerous, and it is imperative that chat rooms are avoided to prevent a perpetrator finding you outside of the internet. Social sites such as Facebook, Myspace, and Twitter are also websites that require caution when using. Creating an account on these websites require no identification possibly resulting in the predator disguising as someone they arent such as a relative or friend. Never give information to anyone online in a chatting program such as Skype or instant messaging system. Putting information online having to do with personal information is never a good idea even if it is Facebook or other websites such as Google+. Cyber stalkers are normally found on chat websites and social media websites. It is important to always exercise caution for protection when speaking to anyone online, no matter the situation because of the dangers. ââ¬Å"Cyberstalking is just as frightening and potentially dangerous as a stalker at the victimââ¬â¢s front doorâ⬠(Cyberstalking 2). The biggest form of cyber crime is hacking for malicious reasons or personal gain. ââ¬Å"There are some career criminals who steal by electronic means. This small group poses a large problem for society, but itââ¬â¢s not a new one. Thieves are thievesâ⬠(Harvey 2). There are thousands of people on the internet trying to hack for gain on a daily basis. This is done through key loggers, Remote Administration Tools (R.A.T.S), and other types of malicious software. These are normally found within an executable file (.exe). These viruses will infect computers and try to steal information such as logins to websites, credit card information in files, or any type of person information. Many kids and some adults fall for this scam on a daily basis. When trying to find a premium code for a service such as Xbox Live or Spotify, people will come across a multitude of websites that give them instruction to complete a survey to unlock a premium code. These are not real. Do not download anything from a survey. Surveys will ask for permission to download a program to unlock the file which supposedly contains the free premium code for such service. Normally these programs are prone to contain an infected type of file, forcing advertisements and malicious software onto a computer. The last major type of virus is a phony antivirus program. When attempting to download a program to help fix an infected computer, normally the user results in having more remotely downloaded viruses. Instead of stealing information or logging computers, these viruses are typically used to force people to purchase the antivirus software to make the annoying virus go away. These are also used to lock ones computer and make him or her pay to have it unlocked. These viruses normally are the worst kind because they are so hard to remove from an infected machine, and scare the unknowing victim. Trustworthy programs are normally anything from trusted developers, such as Microsoft or Adobe. However, there are plenty of trustworthy ones on the internet. To determine if the websites/programs are trustworthy, check the SSL on the website from which the program is being downloaded, which means it is certified. If ever unsure about a program, websites such as Virus Total can scan the program for infections. These websites scan files for anything malicious. If any sort of malicious viruses are found, it will notify the user before the computer decides to run the file. Most of the time anything having to do with a bot, survey, free cracked program contains a virus. There is no reason to download any program having to do with a free item, which will completely prevent someone from being infected. These crimes are a few of the dangers on the internet. To provide full safety, never give personal information to dubious-looking website, download programs that are not trustworthy, speak to anybody on the internet unless positive of their identity, and never for any reason, try to get something for free that costs. These things are the most common type of cyber crimes people see on a daily basis. Although the internet is a great source for making money in legal ways, it can also be used for plenty of malicious black market money scams. It is imperative to carefully browse the internet when downloading programs, and talking to people online. Works Cited Cyberstalking. Marshall University. Marshall University, n.d. Web. 25 Jan. 2014. Dyke, Van, and Albrecht W. Identity Theft. U of NEBRASKAââ¬âLINCOLN. U of NEBRASKAââ¬âLINCOLN, n.d. Web. 26 Jan. 2014. Harvey, Brian.Computer Hacking and Ethics. Ed. Paul Goodman, P.G. Electrical Engineering and Computer Sciences. U of California, Berkeley, n.d. Web. 25 Jan. 2014. What is ââ¬Å"online fraudâ⬠? National Crime Victim Law Institute. Lewis Clark, 27 July 2010. Web. 24 Jan. 2014.
Thursday, October 24, 2019
Jury Nullification and Its Effects on Black America Essay -- Criminal
Jury Nullification and Its Effects on Black America à à à à à It is obvious that significant improvements have been made in the way that the criminal justice system deals with Blacks during the history of the United States. Blacks have not always been afforded a right to trial, not to mention a fair one. Additionally, for years, Blacks were unable to serve on juries, clearly affecting the way both Blacks and whites were tried. Much of this improvement has been achieved through various court decisions, and other improvements have been made through federal and state legislatures. Despite these facts, the development of the legal system with regard to race seems to have become stagnant. à à à à à Few in this country would argue with the fact that the United States criminal justice system possesses discrepancies which adversely affect Blacks in this country. Numerous studies and articles have been composed on the many facets in which discrimination, or at least disparity, is obvious. Even whites are forced to admit that statistics indicate that the Black community is disproportionately affected by the American legal system. Controversy arises when the issue of possible causes of, and also solutions to, these variations are discussed. à à à à à Although numerous articles and books have been published devising means by which to reduce variance within the system, the most recent, and probably most contentious, is that of Paul Butler, Associate Professor of Law, George Washington University Law School, and former Special Assistant United States Attorney in the District of Columbia. Butler's thesis, published in an article in the Yale Law Journal, is that "for pragmatic and political reasons, the black community is better off when some nonviolent lawbreakers remain in the community rather than go to prison. The decision as to what kind of conduct by African- Americans ought to be punished is better made by African-Americans themselves."1 The means by which Butler proposes for Blacks to implement these decisions is termed jury nullification. By placing the race of the defendant above the facts of the case, and thus producing either an acquittal or a hung jury, Butler hopes that Blacks will be able to keep a large portion of Black males out of prison. à à à à à Although several commentators have voiced criticisms with the ideas of Professor Butler, most ... ...11 See Coramae Richey Mann, Unequal Justice (1993) at 202-3. 12 Morris, supra note 3. 13 Morris, supra note 3. 14 Butler, supra note 1. 15 Michael R. Gottfredson and Travis Hirschi, A General Theory of Crime (1990), at 152. 16 Butler, supra note 1. 17 See William Julius Wilson, The Truly Disadvantaged: the inner city, the underclass, and public policy (1990), at 91. 18 See Kate Stith, The Government Interest in Criminal Law: Whose Interest Is It, Anyway?, Public Values in Constitutional Law (Stephen E. Gottlieb ed., 1993), at 137, 158 19 Randall Kennedy, The State, Criminal Law, and Racial Discrimination: A Comment, 107 Harvard Law Review (1994), at 1262. 20 Morris, supra note 3. 21 Morris, supra note 3. 22 See Douglas S. Massey, America's Apartheid and the Urban Underclass, Social Service Review (December 1994), at 480. 23 Butler, supra note 1. 24 Michael Vitiello, Reconsidering Rehabilitation, 65 Tulane Law Review (1991). 25 Benjamin A. Holden, Laurie P. Cohen, and Eleena De Lisser, Does Race Affect Juries? Injustice with Verdicts, Chicago Sun-Times (October 8, 1995) at 28. 26 Butler, supra note 1. 27 Butler, supra note 1.
Wednesday, October 23, 2019
Interpersonal Communication Essay
The capability of every individual create effective and efficient communicative mechanisms can help prevent the further escalation of a conflict. Each action, movement, speech is important in establishing such idea. Thus, proper facilitation of interpersonal communication can bridge the gap between two parties and help create possibilities for cooperation. Analyzing the problem critically, there are certain communicative lapses present between the parents and the owner of the day care. These lapses tend to create different perceptions and ideas that in the end result into conflict among members of the group. Another issue that can be argued revolves around the responsibility of the owner of the daycare. It has been elaborated that there are only certain parameters of care that the organization has to offer which is mandated by the handbook of DHA. These contending of ideas of how responsibility of care is administered also bring about struggles and conflict that can further impede and deteriorate the process of interpersonal communication. With these, solutions must be created to administer proper changes and facilitate communication. One important aspect to consider is to be sensitive to the situation and cultural background of the individuals. ââ¬Å"A stereotype, a fixed impression about a group, may influence your perceptions of individual members; you may see individuals only as members of the group instead of as unique individuals. â⬠(DeVito, ââ¬ËChapter 4ââ¬â¢, p. 1) The next thing to consider is the importance of creating effective listening skills both to individuals and groups. However, there are many factors that affect the way people listen and comprehend things. ââ¬Å"Members of different cultures vary on a number of communication dimensions that influence listening: speech and language, nonverbal behavioral differences, and preferences for direct and indirect styles of communication. â⬠(DeVito, ââ¬ËChapter 5ââ¬â¢, p. 1) In addition, individuals must be gender sensitive when it comes to listening. ââ¬Å"Men and women may listen differently; generally, women give more specific listening cues to show theyââ¬â¢re listening than do men. â⬠(DeVito, ââ¬ËChapter 5ââ¬â¢, p. 1) Thus, different strategies must be created to facilitate better avenues for listening. The next possible solution can be characterized how people perceive and interpret communication by means of verbal and non-verbal messages. The way to creating effective interpersonal communication is the advancing and merging of both listener and speaker. ââ¬Å"Meaning is more than words and gestures; meaning includes what speaker and listener brings to interpersonal interaction. â⬠(DeVito, ââ¬ËChapter 6ââ¬â¢, p. ) With this, words, gestures and other meanings given are important in establishing interpersonal communication. ââ¬Å"Meanings are context-based; the context heavily influences the meanings that words and gestures are given. â⬠(DeVito, ââ¬ËChapter 6ââ¬â¢, p. 1) Thus, these ideas prove to be a main catalyst in achieving interpersonal communication. The last process in trying to resolve this conflict is the communication process itself. The conversation between the listener and speaker plus the mechanisms that were used can be a vital tool in shaping the outcome of interpersonal communication. ââ¬Å"Maintaining conversations depends on the principle of cooperation; the maxims of quantity, quality, relation, and manner; the principle of dialogue; and the principle of turn taking. â⬠(DeVito, ââ¬ËChapter 9ââ¬â¢, p. 1) With mechanisms in place, conversation may be able to bridge the communication gap brought about by conflict. ââ¬Å"Preventing conversational problems may be aided by the disclaimer, a statement that helps to ensure that your message will be understood and will not reflect negatively on the speaker. â⬠(DeVito, ââ¬ËChapter 9ââ¬â¢, p. 1) In the end, giving solutions to the problem of communication revolves around the capability of an individual to harness and foster efficient and effective mechanisms that will create an environment of understanding, collaboration and sensitivity among the group/s. References DeVito, J. A. (2005) ââ¬ËChapter 4:Perception in Interpersonal Communicationââ¬â¢ in Pearson Education. [on-line] Retrieved December 9, 2007 from http://wpscms. pearsoncmg. com/ab_devito_intrprsnl_11/43/11047/2828208. cw/index. html DeVito, J. A. (2005) ââ¬ËChapter 5: Listening in Interpersonal Communication. In Pearson Education. [on-line] Retrieved December 9, 2007 from http://wpscms. pearsoncmg. com/ab_devito_intrprsnl_11/43/11047/2828276. cw/index. html DeVito, J. A. (2005) ââ¬ËChapter 6: Universals of Verbal and Non-verbal messagesââ¬â¢ in Pearson Education. [on-line] Retrieved December 9, 2007 from http://wpscms. pearsoncmg. com/ab_devito_intrprsnl_11/43/11048/2828345. cw/index. html DeVito, J. A. (2005) ââ¬ËChapter 9: Conversation. ââ¬â¢ in Pearson Education. [on-line] Retrieved December 9, 2007 from http://wpscms. pearsoncmg. com/ab_devito_intrprsnl_11/43/11049/2828563. cw/index. html
Tuesday, October 22, 2019
Stranded On A Desert Island Essays - Desert Island, Symbols
Stranded On A Desert Island Essays - Desert Island, Symbols Stranded On A Desert Island Many people would say that if they went to a deserted island they would probably say that they wouldnt go to one. I would say the opposite if I had to go to one. If I went to a deserted island I would probably bring with me a CD player with CDs, three or four girls and one of my friends, and I would also bring supplies to build a large house. When I get to the island we start to build a very large house before we start to populate the island. After about five years we would have a large population of children. We will cut down trees and build a tree house for the children, and we also would make clothes out of animal skin and leaves. Many people would still say that living on an island like that is barbaric, but it is a way of life. This is a question to ponder, if you were the founder of America like the Pilgrims, what difference would there be except for no Native Americans? Would there be a difference? I dont think there is but it is a good question to ponder. I feel that I should try it sometime, go to a deserted island and stay there for a week, and see how it feels. My feelings on this is that you do not have to be brave to do anything you just have to have the courage and will. I recommend that you try it sometime, it will feel exhilarating.
Monday, October 21, 2019
Misery-----Night by Elie Wiesel essays
Misery-Night by Elie Wiesel essays The autobiographical novel Night, by Elie Wiesel, describes his horrifying experiences and his physical and mental misery throughout the true event of the Holocaust. The American Heritage Dictionary defines the word misery as prolonged or extreme suffering. This word fits this horrible tale of murder and inhumanity to man perfectly. Elie suffers physical misery by starvation and certain types of tortures. Prior to his placement into the concentration camps, Elie always had food to eat everyday. Talking about his hunger, he says At about noon they brought us soup: a plate of thick soup for each person. Tormented though I was by hunger, I refused to touch it. I was still the spoiled child I had always been. My father swallowed my ration(39). During the transporting of the captives to Buchenwald, German workmen throw pieces of bread into one of the prison cars for entertainment. The prisoners become barbaric, trying for the scarce amount of nourishment. One man, desperately hungry, kills his own father for a piece of bread. The prisoners seemed to transfer into a pack of savage wolves, fighting each other for survival. One example of the heinous acts of the Germans that stands out occurs at the end of the war, when Elie and the rest of the camp of Buna is being forced to transfer to Gleiwitz. This long, arduous, and tiring transfer seemed like a journey for all of those involved. The painfully cold weather and snow falling heavily did not make the trip much easier. The distance that most people today would not even dream of walking does not even compare to the extensive distance that the prisoners traveled. The Kapo officers, whom controlled the prisoners, often forced the huge mass of people to run, and if one collapses, gets injured, or just simply can no longer bear the pain, they are shot or trampled without pity. In his novel, Elie says Beneath our feet someone let out a rattli ...
Subscribe to:
Posts (Atom)