Sunday, December 29, 2019

Anglo-Saxon Culture - Free Essay Example

Sample details Pages: 5 Words: 1446 Downloads: 2 Date added: 2019/05/08 Category Literature Essay Level High school Tags: Beowulf Essay Did you like this example? Â  In the longest epic poem of Old English, Beowulf, there are many symbols, allusions, and traditions weaved through out the historical piece. Anglo-Saxon tradition in Beowulf accurately illustrates and is effected by the traditions of Anglo-Saxon culture. By comparing and contrasting Anglo-Saxon values to the text of Beowulf, we are able to analyze how Beowulf was composed and influenced by the culture. Don’t waste time! Our writers will create an original "Anglo-Saxon Culture" essay for you Create order We therefore, are able to dissect where the values or ideas of Anglo-Saxon culture may have been exaggerated or were even altogether false. By surveying the overall plot, we can have a birds eye view of what inspired this epic poem and how it was relevant to the time, as well as if it can still be relevant in the twenty-first century; furthermore, this will depend on the values reflected in the text of Beowulf. Anglo-Saxons were people in the 5th century who inhabited Great Britain. Their social structure consisted of Kings or, sometimes called, Lords. And then below them were their warriors called thanes or retainers. An Anglo-Saxon king would have to earn the respect of his thanes through heroic wins in battles. Although thanes freely followed a king without contract, there was a since of pride belonging to a King, especially a noble one. A thanes sense of identity came from belonging to a tribe. Therefore, it was a thanes worst fear to exiled from his tribe. After a battle, an Anglo-Saxon king would be expected to share the riches earned in tribal warfare, rather than store them up for himself. The king was expected to be very generous and giving, and the same went for the kings wife. Fighting was a large part of Anglo-Saxon culture. It was a way to earn honor in their tribe. Furthermore, revenge was an opportunity to earn a respected place in your tribe. If there was an opportunity to avenge the death of a family member, and you choose not to, you would be going against their social etiquette. Therefore, there were endless blood-feuds in Anglo-Saxon society, and they were mostly an excuse to go to war and be triumphant, earning you respect in the tribe. However, that wasnt the only way to end a blood-feud, there are two more ways. The first being to pay a price, or wergild which means man price. The second was to arrange a marriage. Women in Anglo-Saxon culture carried this idea of peace, often being called peace makers because they could end feuds. While this may be true, for Germanic tribes fighting was much more honorable than paying a price for peace or marrying another tribes daughter. Therefore, peace through blood-shed was the popular choice. Sometimes Anglo-Saxons would temporarily gather their tribes to fight a larger battle or Viking invanders. Oral tradition was a big part of Anglo-Saxon culture, as they hadnt developed a written language. It wasnt until Pope Gregory the Great sent St. Augustine in 597 to convert the Anglo-Saxons to Christianity. It was because of the Christian missionaries that writing and the Latin alphabet was brought to the Anglo-Saxon Tribes. In 627 King of Northumbria, Edwin, converted to Christianity and started to write laws. Alexander the Great, who was a patron of literature, helped works be translated into old English. Such as Beowulf. However, before Pope Gregory sent missionaries, the Anglo-Saxons had no written language. This means that stories werent read in books, they were told by word of mouth. For centuries stories like Beowulf were passed down orally. From generation to generation the stories details may have changed, but the overall plot and its symbols remain. From oral tradition birthed poetry. Poets and harpists recited and sung as entertainment in the mead halls. Anglo-Saxon poetry wasnt like todays typical rhyme and meter writing, it focused more on accent and alliteration. The Anglo-Saxons language and style is called old English. Literature has to treat it as a language in spite of it being composed of different dialects. Our syntax of words and sentences come from Anglo-Saxons, as well as how we tend to shorten words and simplify grammar. Our days of the week are named after Anglo-Saxon gods. For example, we get Wednesday from Woden, the war god and Friday from Frigga, the goddess of the home. Old English is not uniform like many languages are. Anglo-Saxons valued, as you might have concluded by now, honor. More specifically, being honored by their tribe. A lot of a Thanes self-worth was tied up in whether their king and tribe respected and honored them. Thanes earned this honor by winning in battle. Or even sacrificing themselves during battle. There were also ways you could be dishonored; for example, being the last to live in a battle where most of your tribe members died would be a disgrace. It would be seen that you didnt fight hard enough, to your death essentially. Beowulf is the oldest surviving long epic poem, consisting of 3,182 alliterative lines. Its popularly credited one of the most important works of old English literature. Its a story of the supernatural and of Anglo-Saxon history. The story takes place in Denmark and Sweden in the 6th century. The story is focused around Beowulf and his tribe The Geats. Although it is not known whether Beowulf was a real man, the Germanic history incorporated in the poem is accurate. Beowulf was a story passed down through oral tradition; therefore, it has lost its original interpretation. Much of the information about the origin of Beowulf is from speculation. What we do know is that the only manuscript left is from circa 1000 AD. The author of Beowulf is also unknown, as most poets of the Anglo-Saxon time are. Despite the different interpretations, the general plot and symbols remain the same. The story goes like this. King Hrothgar of Denmark has had a successful reign and has built a mead hall called, Heorot. It was a place for the kings warriors to eat, drink, listen to stories, music, and be entertained. But the noise was too much for Grendel, a demon wo lived in the swamplands. Now every night Grendel would come terrorize and kill the warriors, despite the warriors efforts the fight back they never defeated Grendel and the terrorizing went on for years. Now a young Geatish warrior named Beowulf heard of King Hrothgars distress and sails across the sea with a small group of men, determined to come to the rescue, and defeat Grendel. Now Hrothgar did a great favor for Beowulfs Father Ecgtheow, therefore the king accepts Beowulfs offer to fight Grendel, and then they have a feast to celebrate. During the feast one of the Kings men taunts Beowulf and says he doesnt deserve his reputation and Beowulf defends himself by sharing some of his accomplishments. At last Grendel arrives and Beowulf defeats him with no weapons, proving he is stronger than the demon. When Grendel tries to escape, Beowulf tears Grendels arm off leaving him fatally wounded and Grendel dies. They hung Grendels arm in the mead hall like a trophy. The king was overjoyed by the triumph so he through Beowulf a party to celebrate his victory, but after everyone had gone to sleep Grendels mother arrived enraged by her sons death and kills one of Hrothgars most trusted soldiers, then slips away. Grendels mother lives in a swampy lake, where Beowulf dives into her underwater layer and kills her with a sword made for giants. After, Beowulf finds Grendels dead body and decapitates his head to bring to the mead hall. King Hrothgar and his Danes were once again overjoyed and celebrated their land being free from the demons. Throughout the story we see many Anglo-Saxon values like fighting for revenge. When Grendels mother killed one of the kings Danes, Beowulf killed her. We also see honor in the story where each time Beowulf is victorious, he is celebrated and therefore respected. These two values are the most important in Anglo-Saxon tradition. There are a few symbols throughout the story as well. Such as the negative aroma surrounding water. In the beginning Beowulf must travel through the treacherous sea, Grendel lives near a swamp. Grendels mother lives in a layer in a dark swamp. Swords are also symbolized in the story as useless. When Beowulf fights unarmed to prove he doesnt need them and is stronger than the demon, and again when Beowulf uses the sword to fight Grendels mom and her blood melts the sword. All in all, Anglo-Saxon tradition in Beowulf accurately illustrates and is effected by the traditions of Anglo-Saxon culture. Beowulf most accurately demonstrates the traditions and culture through the overall theme of honor through battle and respect of others.

Saturday, December 21, 2019

Patrick Henry s Give Me Liberty - 1784 Words

Patrick Henry’s â€Å"Give me Liberty, or Give me Death:† A Rhetorical Analysis On March 23, 1775, in the meeting hall of St. John’s Church in Richmond, Virginia, a group of important statesmen, merchants, plantation owners, military leaders, and various others met to determine the fate of their beloved colony. The colony of Virginia, under the governorship of Lord Dunmore, was tearing at its seams between monarchists, who remained loyal to the British Crown, and patriots in support of independence. In the years leading up to this meeting, called the â€Å"Second Virginia Convention,† the British Crown had been increasingly exerting its authority over its colonial constituents. Several substantial taxes on colonial imports and exports had been†¦show more content†¦While Henry’s speech was not particularly long, it packed quite the proverbial punch through its efficacious use of rhetoric and symbolism, and is looked to even today as an example of persuasive oratory. Throughout this paper, Henry’s rhetoric will be analyzed via an Aristotelian method of rhetorical analysis called the â€Å"rhetorical triangle.† According to an article on Study.com, written by Diedra Taylor, almost every form of rhetorical device can be categorized as one of the three points on this triangle: â€Å"Ethos,† â€Å"logos,† and â€Å"pathos.† While Aristotle, himself, did not originally postulate a triangular method of examination, he was the fir st influential intellectual to write about the three points previously mentioned, and because of this, the theory is credited to him. Taylor uses the analogy of a nacho chip to represent a particular piece of rhetoric, and toppings of guacamole, meat, and cheese to represent ethos, logos, and pathos, respectively. While a chip with only one or two of the toppings is still good, it is most delicious with all three in conjunction. The same is true of rhetoric; it is most persuasive when it contains a variety of the three types of devices, all working in concurrence with one another. In addition to this, it is very possible for some rhetorical anecdotes and devices to fall under the umbrella of more than one point on the triangle, but for the purposes of this paper, they will be examined one at aShow MoreRelatedEssay On Patrick Henry And His Influence1133 Words   |  5 PagesJerico Overson Mr. Villate Mr. Howard Building America Term 1 October 26, 2017 Patrick Henry and His Influence Patrick Henry was an American lawyer born in the colony of Virginia while it was under Britain’s rule. He is mostly known for his rebellion and his call to action against British rule. Henry’s call to action was through a speech known as â€Å"Give me liberty, or give me death!† This speech was an inspiring to many people throughout Early America and it was vital in convincing the conventionRead MorePatrick Henry Was More Than Just The Man That Said969 Words   |  4 PagesPatrick Henry: Was he more than just the man that said, â€Å"Give me liberty or give me death†? Many people do not realize how he helped shape this country and light the fire for liberty. He was one of the first in America to stand up against the bully England and speak out against the tyranny. He helped rally this nation together against England for one great cause, freedom! Who know what our country would be like today without a brave man like that to stand up for our God given righ ts. Patrick HenryRead MoreEssay about Patrick Henrys Famous Speech897 Words   |  4 PagesPatrick Henrys Famous Speech Give me liberty or give me death. These famous words were uttered by Patrick Henry on March 23, 1775, as a conclusion to his speech delivered to the Virginia House of Burgesses. Within his speech, he uses the three rhetorical appeals (ethos, logos, and pathos) to convey a feeling of urgency toward the changes occurring in policy within the Americas implemented by the British government. He cleverly uses these appeals to disrupt the paradigm that Great BritainRead MoreRhetorical Analysis Of Patrick Henry And The Massachusetts Convention1634 Words   |  7 Pagespersonal beliefs. â€Å"Give Me Liberty or Give Me Death† by Patrick Henry and â€Å"To the Massachusetts Convention† by Jonathan Smith are two of the strongest orations of the 18th century. While they are in many ways similar, they are also vastly different. Although they both begin with the exact same address of, â€Å"Mr. President,† they have many more differences, including contexts, purposes, and rhetorical strategies. They are also given by two men who share virtually nothing in common. Patrick Henry and JonathanRead MoreRhetorical Analysis Of Patrick Henry s Speech1375 Words   |  6 PagesBeneteau English 1101 November 11, 2016 Rhetorical Analysis: Give Me Liberty or Give Me Death! Many men were pivotal to the American cause in the War for Independence, and one of the most influential was Patrick Henry. In his famous speech â€Å"Give Me Liberty or Give Me Death† Patrick Henry delivered a powerful speech through the manipulative use of language and word choice. On March 23, 1775, the third Virginia convention was held in St. John s Church in Richmond. The convention was held to discuss relationsRead MoreRhetorical Analysis Of Patrick Henry s Speech1649 Words   |  7 PagesIn this essay, I hope to convince the reader that Patrick Henry’s speech â€Å"Give Me Liberty or Give Me Death† given on March 23rd, 1775, at the third Virginia convention, held in St. John s Church in Richmond, was the best argument to encourage American colonists to support the cause of independence from Britain. The main reason Patrick Henry’s speech was so effective was through his use of emotion and logic to convince colonists’ that they were dealing with the question of whether they are contentRead MorePatrick Henry s Rhetorical Strategies1104 Words   |  5 PagesPriyanka Sen Mr. Middleton AP English Language and Composition March 11, 2016 Patrick Henry Rhetorical Strategies Patrick Henry, an attorney and politician, delivered a speech at St. John’s Church in Richmond. Virginia on March 23, 1775. This speech was later considered the â€Å"Give me Liberty or Give me Death† speech due to it’s powerful conclusion. In the speech Henry discusses the colonies’ freedom-freedom from the royal crown, Britain. He attempts to explain that this revolutionary war in inevitableRead MoreAnalysis Of Patrick Henry s Speech955 Words   |  4 Pages â€Å"Give me liberty or give me death† Patrick Henry’s speech to the Virginia Convention written and spoken by Patrick Henry raised the people s attention. He spoke passionate words because he no longer wanted to be a slave to Britain.The men that attended the Virginia Convention realized that they needed to start fighting back after all the troubles the British caused. The British terrorized innocent people of America, even killed men, women, and childrenRead MorePatrick Henry Led Early America with his speeches Essay732 Words   |  3 PagesIn March of 1775, the words of Patrick Henry rang in the ears of his fellow Virginians. He stood in St John’s Church, located in Richmond, made an audacious public speech containing his opinions in relation to the colony’s next step of action in the war. This was not the first time that Henry stood in front of an audience to present a speech. Henry was known for speaking messages that people did not forget. Prior to this speech, Patrick Henry had made his n ame known by writing the ‘Virginia Resolutions’Read MoreAssessment Questions On The Virginia Convention Essay1104 Words   |  5 PagesBrianna Tredway Ms. Laura Brown AP Language 11a 26 September 2016 Assessment Questions 1. According to Patrick Henry, what is the basic question being debated at the Virginia Convention? According to Patrick Henry the basic question being debated is a question of freedom or slavery. Throughout the speech Mr. Henry discusses the immensity of the situation. 2. What reasons does Henry offer to suggest that the British were not worthy of trust at that time? One of Mr. Patrick’s main reasons is that

Friday, December 13, 2019

How Was the Piece Received at Its First Performance Free Essays

Explore the circumstances surrounding the composition of the last movement of the Drum Roll Symphony. How was the piece received at its first performance? Haydn wrote Symphony 103 (nicknamed the Drum Roll Symphony due to the long roll on the kettle drums at the start of the 1st movement) in the winter of 1794/1795 during his second visit to London. The success and popularity Haydn experienced in London during his first visit made him eager to return, along with the demand from Salomon that he should compose 6 new symphonies that Salomon himself would conduct in a series of concerts. We will write a custom essay sample on How Was the Piece Received at Its First Performance? or any similar topic only for you Order Now However this trip, which was planned to be in the winter of 1793, was postponed due to the reluctance of Prince Anton to let Haydn have a second leave of absence (during this time there was much unrest in Europe). Haydn contented himself to stay in Vienna for a while and finally left for London on January 19, 1794, arriving two days after the scheduled first concert Salomon had promised him. Haydn’s visit to London was highly anticipated by the public and his fame meant he spent time in the highest of company including The Prince of Wales and the Dukes of Cumberland and Gloucester with whom he performed chamber music. These social events did not get in the way of his compositions and he produced a flood of music including his last 6 symphonies (it is thought that he had decided earlier that he would compose no more symphonies after his return to Vienna). This can be seen in Symphony 103 which was his penultimate symphony. While in his first visit to London he adjusted his style to please the audience, he was now sure they were on his side and so his last six symphonies aimed to push his listeners. They were more complex and overall were on a grander scale than his previous symphonies. Symphony 103 has many unusual features in it which shows Haydn’s interest in exploring the boundaries of his composition. Symphony 103, like a lot of his other works, has influences from the traditional music he heard during his 30 years working as the Kapellmeister for Prince Esterhazy of Austria. During the summer the family, and so Haydn, would spend time in their summer palace of Esterhaza which was in Hungary on the border with Austria. There, Haydn became hugely interested in the local traditional music as well as Croatian folk songs which he heard from people living in Croatian ethnic enclaves found on the east border of Austria with Hungary. These influences can be heard throughout the symphony, with the 3rd movement using some of the unusual Hungarian rhythms and the last being based on an old Croatian folk tune, which is first played by the violins after the horn opening, called â€Å"Divjcica potok gazi† which means â€Å"the little girl treads on a brook†. The song melody lineHaydn’s adaptation for his symphony While the earlier movements were meant to challenge the audience, the last movement of most of Haydn’s symphonies was a lively, dance-like piece which would be light and undemanding (at least for the listener! ). Haydn clearly had this in mind when composing the last movement of this symphony as it is full of energy and variety with varying polyphonic and homophonic texture. However he did still use new ideas such as giving the bases and cellos a separate line in some parts which had hardly been done before. He also took advantage in using a clarinet which was a new instrument in that time and had only been used by him once before in symphony 102. This symphony was performed in the fourth of the Opera concerts on Monday 2rd March 1795. This was not where the symphony was originally meant to premiere as Salomon had planned it to be part of his own concert series however Salomon suddenly had to pull out of doing his own series due to being in financial disarray. Be that as it may, he agreed to that Haydn could perform his new symphonies in the Opera Concerts, in which series he himself frequently appeared as soloist. The new concerts were arranged on the largest scale known at that time. The performances took place every two weeks starting on Monday 2nd February 1795 in the great new concert hall of the King’s Theatre which seated 800 audiences, more than most of the other important concert venues. Viotti was the artistic director and Haydn shared the conductorship with Vincenzo Federici, who for three years had been accompanist at the Italian opera in London. The orchestra led by the violinist William Cramer and comprised of no less than sixty players which was one of the largest orchestras seen in that day. Haydn himself was thought to have played the fortepiano in this premiere although this is now usually left out of performances. The piece was played, as requested by Haydn, in the second half so it could show its superiority over the other works played in the concert. The symphony was a complete success as the Sun wrote â€Å"HAYDN’s new Overture was much applauded. It is a fine mixture of grandeur and fancy. † The Morning Chronicles reviewer also wrote â€Å"Another new Overture, by the fertile and enchanting Haydn, was performed; which, as usual, had continual strokes of genius, both in air and harmony. The Introduction excited deepest attention, the Allegro charmed, the Andante was encored, the Minuets, especially the trio, were playful and sweet, and the last movement was equal, if not superior to the preceding. † It is said that the second movement was even encored. The symphony was later played again as it was so popular however before Haydn introduced to Vienna he made a cut in the final. This cut took away the modulation into C flat, which although stood alone in this movement, was hinted at in the 3rd movement. This cut made the Finale tighter and conductors have kept this cut in out of respect for Haydn. Overall though this symphony showed the genius that Haydn was in being able to turn a simple tune into a complex and demanding symphony and paved the way for him to be known as â€Å"the Shakespeare of music†. How to cite How Was the Piece Received at Its First Performance?, Essay examples

Thursday, December 5, 2019

Epidemiology and Communicable Diseases HIV free essay sample

HIV or the Human Deficiency virus is like other viruses including the flu, but the one thing that makes this virus so different than any other is that the body is unable to clear this one out completely. Once someone is infected, there is no cure. Over time, HIV can also hide or mask itself in the bodys cells. The cells within a persons body that fight off infection are called CD4 cells or T cells. HIV attacks these cells and copies or replicates itself inside these cells, then destroys them. HIV over time will destroy so many of these cells that the body is unable to fight off infection anymore. When this starts happening, AIDS or Acquired Immunodeficiency Syndrome happens which is the final stage of HIV. HIV is transmitted through someones blood or bodily fluids which can encompass semen, breast milk, vaginal fluids, and rectal mucous (AIDS. We will write a custom essay sample on Epidemiology and Communicable Diseases: HIV or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page GOV, 2013) and usually it is passed from one person to another through sexual contact; however, HIV can also be transmitted through childbirth or IV drug use. Healthcare workers are also at risk from infected bodily fluids. Fluids from an infected person can deliver the virus to someone elses bloodstream. Within 2-4 weeks, and up to as late as 3 months, exposure to HIV can happen with a sudden onset of flu like symptoms including fever, chills, rash, night sweats, muscle aches, sore throat, fatigue, swollen lymph nodes or ulcers in the mouth (CDC, 2013). Sometimes no signs or symptoms of infection are present in someone with HIV. Certain individuals may feel sick as HIV turns into AIDS or have occasional bouts of sickness, but not really know or feel they are infected. When HIV progresses to HIV, the flu like sign and symptoms mentioned earlier can become far more severe. Many of the complications stemming from HIV are opportunistic infections, which happen in patients with a weakened immune system (CDC, 2013). â€Å"Some of these opportunistic infections include tuberculosis, salmonellosis, cytomeglaovirus, candidiasis, cryptococcal meningitis, toxoplasmosis, cryptosporiosis, Wasting Syndrome, neurological problems, and kidney disease (Mayo Clinic, 2013). Specific skin cancers including Kaposis Sarcoma and lymphomas also happen in patients who are HIV positive† (Mayo Clinic, 2013). Antivirals are the treatment for HIV and presently there is no known cure. Treatment most often involves combinations of different drugs to avoid creating strains of the virus that are immune to single drug treatments (Mayo Clinic, 2013). The number of CD4 or T cells monitors treatment response. The viral load should be undetectable while undergoing antiviral therapy. The count is checked when treatment starts and usually monitored every 3-6 months. Even if someone has an undetectable viral load, the spreading of HIV is still a possibility. According to estimates and numbers provided by the CDC, about one and a half million people 13 years of age and younger is HIV positive. Demographics also show that almost 20% of people who are infected do not know they have the virus. The CDC estimates that now every year, there are about 50,000 new cases diagnosed (2013). At risk groups include gay men, bisexual people, and African Americans (CDC, 2013). Young African American males are at greatest risk for contracting HIV among various ethnicities and races (CDC, 2013). An individuals risk for HIV or social determinants of health related to HIV is income, education, geographic region, poverty, gender orientation, early childhood experiences, and alcohol or substance abuse. The CDC states, that by reducing the number od new HIV infections and improving the health and well-being of those already infected with HIV depends on changing the social determinants that place people at risk of infection (CDC, 2-13). The epidemiological triangle of HIV consists of three things: the person, the causative agent, or the environment (Smith, 169). The causative agent that causes AIDS is HIV or the virus itself. The host is a person in the case of HIV and the environment is the neither the host or the agent, but a factor that influences interaction between the two. The epidemiological triangle consists of three things: the person, the causative agent, or the environment (Smith, 169). In the triangle for HIV, the agent that causes AIDS is HIV or the virus. The host is a person in the case of HIV. The environment is neither the host nor the agent, but something that influences interaction between the two (Smith, 169). The host factors for HIV include age, sex, ethnic background, race, sexual orientation, education, and economic status (Smith, 169). The agent factors or causative agent for HIV are the virus itself and the mode of transmission, life cycle and virulence of the virus (Smith, 169). The environmental factors for HIV include social and economic considerations including family, community, political organization, public policy, regulations, institutions, workplace, occupation, economic status, technology, mobility, housing population density, attitudes, customs, culture, health practices, health services (Smith 169-170). A community health nurse with an emphasis on HIV/AIDS would work in a community or public health setting, educating at risk groups about safe sex practices and the dangers of sharing needles. Ideally, the nurse would connect patients to support groups and services, teach patients or people in the community about the prevention of the spreading of the disease, and help administer treatments and medications. â€Å"Some important issues that nurses are bringing to the forefront in today’s world include implementing strategies to keep HIV patients engaged in routine HIV medical and nursing care, incorporating prevention research findings to help reduce transmission locally and globally, carrying out routine HIV testing in health care settings, ensuring access to antiretroviral drugs, and preparing for emerging issues in HIV care such as diabetes, liver disease, obesity and elder care† (Kirton, 2007, p. 58). The Global Fund to fight AIDS, Tuberculosis and Malaria is a national organization that channels a portion of its funds to the international financing for he fight against HIV and AIDS. It also gives funds to strengthening health systems, as most are inadequate to educate and inform communities and people about the prevention of HIV. Programs supported by the Global Fund give to communities with lifesaving antiviral therapies and counseling on the prevention of the virus. There is also a local organization called AFAN or Aid for Aids of Nevada that provides support and advocacy for HIV positive people or people who are dealing with HIV in Nevada. â€Å"AFAN provides direct client service programs, food programs, prevention and education programs, and community outreach. It is the mission of our client service programs to enhance the physical health and psychosocial wellness of the individuals we serve, while promoting their dignity and improving the quality of their lives† (AFAN, 2013). HIV affects millions of children and people worldwide and will continue to do so without the proper community health initiatives. It will begin from education and awareness and it is our responsibility as front line healthcare providers to do our part to help put an end to HIV infections. It needs to start within our own communities and hopefully reach beyond to make a positive impact in a fight against a deadly disease. ?

Thursday, November 28, 2019

Robert Graves Essays - British Poetry, Poetic Form, Mental Cases

Robert Graves Although the poems Recalling War by Robert Graves and Mental Cases by Wilfred Owen are both concerned with the damage that war does to the soldiers involved, they are different in almost every other respect. Owen's poem examines the physical and mental effects of war in a very personal and direct way - his voice is very much in evidence in this poem - he has clearly seen people like the 'mental cases' who are described. It is also evident that Owen's own experiences of the war are described: he challenges the reader with terrifying images, in order that the reader can begin to comprehend the causes of the madness. Graves on the other hand is far more detached. His argument is distant, using ancient images to explore the immediate and long-term effects of war on the soldier. The poem is a meditation on the title, Graves examining the developing experiences and memories of war with a progression of images and metaphors. Mental Cases is a forceful poem, containing three substantial stanzas which focus on different aspects of Owen's subject. The first stanza is a detailed description of what the 'mental cases' look like. Their outward appearance is gruesome, Baring teeth that leer like skulls', preparing the reader for the even more horrifying second stanza. The second verse concentrates on the men's past experiences, the deaths they have witnessed and the unimaginable nightmares they have lived through: Multitudinous murders they once witnessed. The last stanza concludes the poem, explaining how the men's lives are haunted by their experiences, they go mad because the past filters into every aspect of their present lives, the men retreat away from the memories and into madness. The form of Owen's poem is, therefore, built around three main points: the appearance of the men, their experiences, and the effect this has on their lives. In Graves' poem the form is also key to understanding the poem, but perhaps in a less obvious way. Recalling War has five stanzas, in a form that corresponds to the psychological emotions and physical experience war provokes. The first stanza describes how Graves expects the war to be remembered twenty years after the event: the wounds have healed and the blind and handicapped men forget the injuries the war caused, as their memories are blurred by the distance of time; The one-legged man forgets his leg of wood. In the second stanza Graves moves on to question the nature of war. This verse is a description of the atmosphere and setting of war. Even when the season was the airiest May/ Down pressed the sky, and we, oppressed, thrust out. The third stanza focuses on the battle itself, and the fourth explores the aftermath of battle and the unbearable nature of the war. The fifth and final stanza returns to the ideas expressed in the first stanza, of war being an unreal memory. The for m of this poem is crucial to its understanding. The progressions marked by the stanzas highlights the argument Graves is making. Mental Cases and Recalling War are both poems that rely on the atmosphere and tone they create, indeed this is a key source of their power. Owen creates a terrifying atmosphere throughout the poem, which is clearly a reflection of his subject matter. Not only does Owen describe in awful detail the shocking appearance of the men, he also includes horrific images of war. The tone is very powerful, with Owen asking questions in the first stanza, but who are these hellish?, a device which cleverly establishes direct contact with the reader and an engaging discourse. This connection with the reader is exploited in the second verse, in which the reader experiences the full force of Owen's imagery. The final stanza opens with a tone that is factual: -Thus their hands are plucking at each other, summarizing the fact that these men behave the way they do because of the events they have and are experiencing. Owen ends the poem by insisting on the complicity of both himself and the reader in th e fate of these men, an accusation which, after the powerful prelude, is hard to deny. Whereas Owen's poem is powerful as a

Sunday, November 24, 2019

buy custom China Long March into the Twenty First Century Book Report

buy custom China Long March into the Twenty First Century Book Report Wealth and Power by Schell Orville Wealth Power: by Schell Orville John Delury Wealth and Power: China Long March into the Twenty First Century is a book written by Orville Schell and John Delury. It outlines the way the mission for national transformation and wealth and power has for a long time been at the hands of present Chinese political and intellectual thought. The authors gives clear highlights on what makes the modern leadership, and why making a bet against their resolution to improvement may be dangerous in the average to long term. It explains the way China that was both politically and economically weak as a country in the past three decades rose in a greater way and became famous. Wealth and power provide the reader with what he or she requires from the two authors. It gives the reader the urge to enquire more by being detailed, convincing, lively, critical, and sympathetic. The authors perceive crucial patterns having the knowledge of the chaos and contradictions; thus, expressing the ideas in a great way.

Thursday, November 21, 2019

Financial Fragility, Capital Regulation and Bank Testing Essay

Financial Fragility, Capital Regulation and Bank Testing - Essay Example As the discussion highlights  bank mergers can reduce the cost of operation and increase scope of activities thus enabling them to control market and funding liquidity. This document examines the effects of bank mergers on market and funding liquidity and their interactions during the financial crisis. The activities of the bank influence their capacity to control market and funding liquidity. Investors prefer strong institutions that they perceive as being less risky because they are fairly stable during the periods of the economic downturn.  Ã‚  This paper outlines that liquidity risk is the risk that a particular asset or portfolio may not be exchanged in the market quickly in order to evade a loss, and it results from uncertain liquidity. Liquidity risk could either be due to the market liquidity or funding liquidity. Market liquidity is the condition whereby the assets cannot be traded in the market due to lack of liquidity in the market. The market liquidity can drain sudde nly, interlinked with instability, have cohesion across securities, co-varies with the market, and is dependent on â€Å"flight to quality†. Funding liquidity refers to ease with which traders can obtain funding for assets. The investors require portfolio security with high returns in case the market is illiquid and require return premium for an illiquid security in a situation where the entire market is illiquid. Small banks pose high risk to the investor because they may not be able to acquire funding during the periods of the economic downturn.

Wednesday, November 20, 2019

Psychology essay Example | Topics and Well Written Essays - 2500 words

Psychology - Essay Example Nine months after the implementation of these changes, a recent employee performance appraisal revealed that employee performance and motivation levels had decreased. This article will utilize the theory of psychological contract and the attribution theory to evaluate why the employees are experiencing the above mentioned changes. These will be followed by recommendations that the firm could apply in order to improve on this situation. A psychological contract could be defined as a set of promises and beliefs held by an individual employee about the terms of the exchange between the employee and his or her organization, or the agent of the organization (Wellin, 28). The psychological contract can be a complex concept since it is an unwritten rule that cannot be directly expressed in a tangible way. Nevertheless, there have been arguments to the effect that a breakdown of the psychological contract can result in poor performance of individual workers or of the organization as a whole (Anderson, 102). This can be caused by a reduction in levels of organization commitment, lack of motivation, absence and attendance problems and high levels of staff turnover, some of which the financial company is already experiencing. Being a psychological rather than a legal contract, a psychological contract refers to beliefs about the deal as opposed to what is contained in writing within the formal employment contract about the deal (Conway & Briner, 23). Breach is probably the most important idea in psychological contract theory since it is the main way of understanding how the psychological contact affects the feelings, attitudes and behaviours of employees. A breach of the psychological contract occurs when one party perceives that the other has failed to fulfil promised obligations. In this case, the financial organization’s freeze on pay-rises and overtime payments combined with the freeze in almost all training could

Monday, November 18, 2019

Research Methods in Education (Topic Question undecided) Essay

Research Methods in Education (Topic Question undecided) - Essay Example A quantitative study conducted on 415 students and 83 teachers in public schools in the US revealed that students and teachers in schools with uniform policies generally felt safer, had higher self-esteem and more positive attitudes toward school climate, than students and teachers in public schools where no uniform policies were in place (Wade & Stafford, 2003). A study conducted by Gottfredson and Gottfredson (2001) involving 848 school principals in the US indicate that one of the main activities that schools implement to improve student behaviour and academic outcomes is to improve school climate. Implementing mandatory school uniform policies have been a subject of much discussion with increasing interest in its relationship to improved school climate. It has been suggested that the mere implementation of a school uniform policy at the very least symbolizes a school’s commitment to school climate change and this perception alone improves student outlook and performance (Brunsma & Rockquemore, 1998). Brunsma and Rockquemore (2003) observe however that with all the interest in the link between school uniform policies and school climate and the importance of school climate to student behaviour, safety and academic achievement, research on the significance of school uniform is sorely lacking. Much of the research is purely theoretical or uses flawed methods. Therefore, more research is needed on the implications and effectiveness of mandatory school uniforms (Brunsma & Rockquemore, 2003). This proposed research will thus fill a gap in the literature by examining and analysing the extent to which a mandatory school uniform policy effects perceptions of school climate. It is anticipated that this research will provide empirical evidence of student and teachers’ perception of school uniform and its relationship to school climate and will identify areas for further

Friday, November 15, 2019

UK Identity Cards and Civil Liberties

UK Identity Cards and Civil Liberties â€Å"The introduction of identity cards in the UK infringes upon our human rights and civil liberties whilst actually doing very little to counter crime and terrorism† Discuss Contents Abstract Introduction Chapter One – Surveillance as a means of crime prevention counter terrorism 1.1 Is surveillance needed for crime prevention? 1.2 Is surveillance needed for counter terrorism? Chapter Two – Increased surveillance – the viability of data retention 2.1 Data retention and identity cards 2.2 Is data retention a positive thing? 2.3 The scope of data retention laws Chapter Three – Has the introduction of the identity cards scheme served to breach individual human rights and civil liberties regarding privacy in the same way as other forms of surveillance? 3.1 The right to personal privacy 3.2 Are human rights and civil liberties effectively recognised domestically? 3.3 How far is the right to personal privacy recognised in law? 3.4 How does the ICA 2006 fit into understanding human rights and civil liberties? Conclusion Bibliography The aim of this study is to consider whether the introduction of identity cards in the UK would indeed infringe upon our human rights and civil liberties, whilst also looking to determine whether it would actually be an effective way of combating crime and terrorism. Therefore, this paper will look to consider the enactment of the Identity Cards Act (‘ICA’) 2006 and the problems that are likely to arise from the introduction of the proposed scheme. Then, it will also be necessary to consider the background to the enactment of the ICA 2006 by putting this development into context with a consideration of Closed Circuit Television (‘CCTV’) and the development of data retention surveillance techniques used to gather information about people with the aim to prevent crime and counter terrorism. However, this paper will also look to recognise the legal reasoning used to justify this kind of surveillance and information gathering that, although contrary to the recognition of the human rights and civil liberties of individuals, is considered necessary to guard the interest of society as a whole against the threat of terrorism and serious crime. But, at the same time, this paper will also recognise this kind of surveillance may actually be doing very little to counter terrorism and serious crime and is not only breaching people’s recognised human rights and civil liberties, but also criminalizing the population and breaking the law in the process. Then, finally, in summation it will be necessary to look to conclude with a balanced and logical overview of this discussion effectively derived from an understanding of the issues covered to present a reasoned view regarding this issue. At the end of 2006, legislation was passed domestically in this country in relation to the introduction of identity cards throughout the UK in the form of the ICA 2006 as a means of crime prevention and counter terrorism. But, interestingly, in spite of its apparently noble intentions, the ICA 2006 is seen by many as only ‘enabling legislation’ that merely provides the legal framework around which the scheme of identity cards is to be developed and it does not purport to provide details of every aspect of the schemes overall operation[1]. This is because the Act itself proposed the use of biometric identity cards[2] to establish and maintain a database of information called the National Identity Register (‘NIR’) on all individuals currently residing within the UK in support of ongoing efforts to help prevent terrorism or serious crimes from occurring[3] by allowing for an easy means to ascertain and prove an individual’s identity[4]. Therefore, the en actment of this legislation meant both private and personal companies could access this register to confirm an individual’s identity or simply check the accuracy of their information. However, this policy is not without its problems. This is because whilst sections 19 and 23 of the ICA 2006 only permit access to records without consent if it is in the interests of national security or for purposes connected with the prevention or detection of crime, the legislation allows for information to be added without the individuals’ knowledge with the aim of eventually having fifty pieces of an individual’s personal information on their card that would then be stored on the aforementioned database with the NIR[5]. But despite the fact many critics argue the NIR will allow the government to monitor and record almost every aspect of a person’s life, almost all of the information listed in Schedule 1 of the ICA 2006 as being required that includes signature, photograph from a passport, name and address (both current and previous), date of birth and national insurance number for this purpose is already in the government’s possession and everyone has the right to see what information is held about them. Nevertheless, there is a fear that ‘hackers’ are bound to attempt to gain access to the NIR database in the same way as in the US, in April 2005, when it was reported Reed Elsevier may have accidentally released the personal information of 310,000 US citizens during 59 separate criminal incidents[6]. It is perhaps little wonder then that the scheme to be developed under the ICA 2006 has led to a great deal of criticism from various organisations. Economists, in particular, have argued that such a scheme would be excessively expensive for what they believe to be somewhat limited results in view of the fact that whilst government estimates have put the cost of the scheme’s introduction alone at around  £6 billion pounds[7], a group of analysts at the London School of Economics consider the figure to be closer to  £18 billion that must ultimately come out of the public’s pocket through taxation[8]. Therefore, whilst the use of identity cards brought about by the enactment of the ICA 2006 could be considered the latest advancement of surveillance technology with the legitimate aim of preventing crime and counter terrorism, question marks remain over whether this kind of policy is an acceptable tool in view of the need to recognise individual human rights and civil liberties[9]. But this is not the first time that the legitimacy of surveillance has been called into question, despite its aims to prevent crime and counter terrorism, so it is necessary to look to consider whether the use of this kind of surveillance technology has achieved anything in this regard. â€Å"Every man should know that his conversations, his correspondence, and his personal life, are indeed private.† Lyndon B Johnson 1908-1973 – President of the United States of America In spite of Lyndon B. Johnson’s view ostensibly in support of Mill[10], the use of surveillance techniques has become increasingly widespread with the passing of time because technology in this area has advanced at such a pace that even the public at large is becoming ever more aware that surveillance no longer simply refers to the work of spies in Ian Fleming novels. The word itself in French literally means ‘watching over’[11] and, in this context, refers to all forms of observation or monitoring of another for public or private purposes. Now, however, most people are aware such techniques are used by law enforcement agencies, business and even private individual so as to gain useful information in relation to the activities of suspected criminals and terrorists where a threat is perceived leading to an eventual arrest where it is warranted[12]. In particular they are usually most commonly aware of the use of CCTV cameras on buildings and in shops. But the use o f identity cards is just another means of surveillance as its production and use will effectively act like a form of tracking whereby the authorities and private and public organisations will gain yet another insight into the private lives of individuals by creating a verifiable ‘document trail’ that the authorities can follow. 1.1 Is surveillance needed for crime prevention? The UK leads the world in the concentration of public surveillance devices to people[13]. This is because, about ten years ago, the UK government used  £150 million each year to develop a Closed-Circuit Television (‘CCTV’) network around the country[14] so that the industry grew exponentially throughout the 1990’s so, by 2003, at least two and a half million cameras could be found in this country[15] that continues to increase at around 20% per year[16]. The ‘net effect’ is substantial. It is widely believed everyone in London is caught on camera at least three hundred times each day[17] and very often these cameras do not just watch and record us, but also use facial recognition software to scan subjects against a criminal database[18]. Although statistical evidence is somewhat limited in relation to the effectiveness of surveillance technology in view of the fact there is usually much more to crime prevention and counter terrorism[19], the authorities downplay this negative element and emphasise the positive where a security issue of national significance is resolved. Such a view is effectively illustrated by the fact whilst the police review of CCTV tapes played a significant role in identifying a suspected terrorist handler involved in the bombing of King’s Cross in July 2005[20], there remains a prevailing view that, if anything, crime levels have stayed the same or even increased despite the widespread installation of CCTV cameras. National statistics have shown that, whilst around three quarters of the Home Office Crime Prevention budget has generally spent on CCTV, a comprehensive review has revealed the overall reduction in crime was only around 5% by 2002[21] and has continued to make small incremental reductions nationally ever since[22]. But as a stark mark of the success of CCTV in preventing crime, a parallel systematic review found that street lighting saw a reduction in crime of 20%, whilst CCTV cameras usefulness is then further marked against because it is understood that only around 3% of all street robberies in London are solved using CCTV footage[23]. Interestingly, however, in Portsmouth the City Council released crime statistics for the first three months of 2008 that showed that of 1384 recorded incidents this led to 346 arrests that were recorded by the network of 172 CCTV cameras in Portsmouth and marked this out as mark of their usefulness as crime solving tool[24], whilst, in Newham, police claimed an 11% drop in assaults, a 49% drop in burglary, and a 44% drop in criminal damage[25] where cameras were installed[26]. However, as well as possibly being merely an aberration in our understanding of the overall usefulness of CCTV cameras and surveillance technology as a whole, the source of the statistics is a branch of government. Therefore, unfortunately, this may mean the results have been embellished to present CCTV as being a good use of public money and, even where this is not the case, the police may have made the same number of arrests anyway so that it is somewhat surprising that the cameras have such support to enforc e the law[27]. 1.2 Is surveillance needed for counter terrorism? However, since the tragic events of 9/11 in the US, such action is also justified because it is arguable this led to the establishment of a renewed approach to surveillance in the interests of national and international security across the world. Therefore, 9/11 effectively served to reveal terrorist groups had organised themselves ‘transnationally’ making it harder to trace them using traditional surveillance techniques[28]. As a result, whereas in the past, terrorist groups could be readily categorised by reference to territory, this is no longer the case because, organised on a global scale, these loosely affiliated ‘cells’ can operate simultaneously in various States. This is because they are not unified by a single vertical command but horizontally[29] by using modern communication and transportation technology, whilst the integration of financial markets also facilitates their mobility and range of targets without claiming a particular territory as â €˜home’[30]. On this basis, globally, countries realised they had a shared interest in enhancing international co-operation to fight terrorism because of the fear groups may be in possession of non-conventional weapons such as biological, chemical and nuclear[31]. Therefore, the international community must work together because such a threat cannot be vanquished by single States alone[32], as the UN recognises certain States being unable or unwilling to prevent or stop the traffic of such weapons means â€Å"the ability of non-State actors to traffic in nuclear material and technology is aided by ineffective State control of borders and transit through weak States†[33]. Clearly, the international community must hold together to find effective solutions because, although 9/11 undoubtedly showed the world that even the leading democracy was not safe from terrorist attacks. Whereas in the past a series of diplomatic, economic and financial measures nationally to fight terrorist structures[34], to multiply the effect of such measures, States agreed to co-operate internationally by using treaty law with around a dozen multilateral conventions on anti- and counter-terrorism[35]. Therefore, in theory, no terrorist activity would go unpunished[36]. But the UN has struggled since its inception to formulate an effective response. On the one hand, it has provided a solid international legal framework for combating terrorism via the adoption of terrorism-related treaties by the General Assembly and UN agencies. But, on the other hand, the UN has been unable to reach agreement on a definition of terrorism that outlaws all indiscriminate attacks against civilians and circumvents the need to recognise the human rights and civil liberties of the public at large, so more than twenty different parts of the UN system deal with terrorism in one form or another[37]. However, in Europe it was not until the 2004 train bombings in Madrid that the EU looked to take significant action to counter terrorism and prevent serious crime. This is because those investigating the attacks in Madrid discovered telecommunications played a significant role in planning of the attacks because they were co-ordinated by mobile phone and via the Internet. Unfortunately, however, at the time of the attacks the Spanish authorities had only limited access to help to telecommunications networks in order to further their investigations when more traditional methods of surveillance associated with the aforementioned use of CCTV were somewhat lacking[38]. This is because with the advancement of technology in this area, traditional surveillance has been made somewhat redundant by the use of Internet so that, in order to be able to effectively prevent serious crime and counter terrorism in the modern age, there is a need to utilise data retention technology. Chapter Two – Increased surveillance – the viability of data retention 2.1 Data retention and identity cards On this basis, the original justification for the ICA 2006 identity cards scheme was the supposed need to combat the serious problems of illegal working and identity fraud. This is because the government estimated identity fraud amounted to a  £1.3 billion annual loss to the UK economy[39], and the government’s first consultation paper in this area specifically eschewed many of the claims for identity cards that some other advocates suggest they would bring – such as combating terrorism, benefit fraud and crime more generally[40]. However, the draft legislation clearly presented the identity card as a device with which to combat terrorism, whilst the 2003 government’s white paper[41] emphasised the use of identity cards as an effective tool. According to Privacy International, government ministers in the UK have argued in broadcast interviews that, although the 2001 New York and 2004 Madrid[42] atrocities had been committed by people with valid US documents and Spanish identity cards respectively, many other terrorists use false identities and they also claimed the quality of the database underpinning the British scheme would be much higher than the Spanish. 2.2 Is data retention a positive thing? Nevertheless, aside from the more secure nature of the identity cards scheme proposed in the UK under the ICA 2006, this kind of data retention has previously proved to be a very positive thing that has served to enhance the lives of those living within our society. As most people are aware, such technology is already being used in the form of services that text details of the closest restaurant based on a mobile phone location when your hungry, or help to pick an exit at the next roundabout when you are lost can be very useful. But any retention of collected data is also very negative because the advantages of technology come at a price, since one person’s ‘enhanced information’ can invade another’s privacy[43]. This is because an individual’s right privacy is becoming increasingly susceptible to the advancement of technology with the introduction of ‘wiretaps’, biometrics, and video surveillance cameras all each having the potential to erode privacy[44] in the same way as identification cards, whilst digital interactive television technology may even soon tell advertisers exactly which programs people view in their homes[45]. Therefore, such advancements are clearly both beneficial and frightening[46]. This is because it is commonly understood that no modern technology derived from the development of telecommunications poses a greater threat to privacy than the Internet[47] by allowing researchers to collect data much more cheaply and efficiently[48] because what once took a great many days hard labour can now be accomplished with a keystroke[49]. But it is also important to appreciate that the remit of the Data Retention Directive[50] effectively allows EU Member States to synchronise their laws so all telephony companies and ISP companies within each and every EU Member State are obliged to retain details on all electronic communications for up to two years for the purpose of investigating, detecting and prosecuting serious crimes[51]. 2.3 The scope of data retention laws The main categories of data ‘generated and processed’ to be retained under the Data Retention Directive regarding communications are the retention of data to (a) trace and identify its source (e.g. caller); b) identify its destination (e.g. number dialled); (c) identify its date, time and duration; (d) identify its type (i.e. network or service used); (e) identify equipment (i.e. means); (f) identify that equipments location; and (g) regarding unsuccessful calls[52]. But this is somewhat controversial because ‘unsuccessful calls’ occur where a telephone call has successfully connected, but has not been answered[53]. However, whilst no data regarding the content of the communications is to be retained[54], EU Member States should also ensure data’s security is respected as a reflection of equivalent provisions for the protection of personal data in the Data Protection Directive[55]. This is because, through measures to protect data against accidental or unlawful destruction, accidental loss or alteration, or unauthorised or unlawful storage, processing, access or disclosure[56] of data is accessible by authorised personnel[57]. As part of this process, EU Member States must also have measures in place to ensure any criminal access to or transfer of data retained under the Data Retention Directive is punishable by effective penalties[58]. Therefore, the Data Retention Directive provides only data retained should be provided to the ‘competent national authorities in ‘specific cases’[59], but fails to recognise which authorities are likely to be competent and the reasons why such data may be accessed. This effectively means this could lead to uneven access to data across the EU because there is no definition of ‘specifically authorised personnel’ or ‘law enforcement authorities’, but Article 9 recognises each Member State must designate one or more public authorities to be responsible for monitoring the application of the Directive regarding security of stored data. Therefore, in the UK, the Home Office has looked to publish a set of draft Regulations in the form of the Data Retention (EC Directive) Regulations (‘Regulations’)[60] to effectively implement the Data Retention Directive’s nature and scope[61]. But the Regulations only looked to address the retention of certain call data by telephony companies because EU Member States can delay the Data Retention Directive’s implementation regarding traffic data for an additional 18 months until March of 2009[62]. Nevertheless, even before they have been implemented, the UK Regulations also nothing to allay the fears raised by human rights’ advocates regarding the EU’s Data Retention Directive because the Regulations remain as unspecific and unrestrictive as the Directive. However, domestically, the authorities have â€Å"a great deal of experience with the retention of traditional communications data† because they â€Å"have been working with the ind ustry to ensure the retention of this data since 2003, when Parliament first approved the code of practice for the voluntary retention of communications data under Part 11 of the Anti-Terrorism, Crime and Security Act 2001†[63]. Nevertheless, whilst the retention of data was voluntary under the Anti-Terrorism, Crime and Security Act (‘ATCSA’) 2001, because it was made in response to the terrorist attacks of 9/11, its voluntary code has served as the foundation for establishing a practical framework for the enforced retention of communications data so the draft regulations provide the next step towards a mandatory framework[64]. Such a view was supported by the fact that the EU set a high global standard in data privacy protection when it forged its Data Protection Directive[65], which became effective in October 1998[66], and created such a rigorous legislative approach to privacy[67]. But the ATCSA 2001 was then amended so that the purpose of such retention became â€Å"(a) for the purpose of safeguarding national security; or (b) for the purposes of prevention or detection of crime or the prosecution of offenders which may relate directly or indirectly to national security†[68] so the a ccess would then be just for limited purposes. Therefore, it is important to recognise that the UK’s Regulations have established provisions to continue with the policy of reimbursing public communications providers their expenditure from adjusting their business practices to comply with the Government’s requirements for the retention of communications data. But the interception of communications and the obtaining and disclosure of data relating to them is currently regulated by the Regulation of Investigatory Powers Act (‘RIPA’) 2000 because section 21 recognises communications data does not include the contents of the communications, but that, in the interests of national security, they may still obtain it. Consequently, the Data Retention Directive will effectively serve to augment RIPA 2000 that does not currently require the specific retention of data in advance, but the police are able to serve ‘section 22’ (‘S22’) telecommunication companies within the industry for acces s to the data that they retain. Accordingly, whilst the RIPA 2000 will only permit the interception of communications in the UK by defined bodies in specified circumstances to protect individuals’ privacy, the longer the data retention period, the greater the period of access that will provided to the authorities in the interests of security[69]. Nevertheless, ostensibly, it is to be appreciated that the RIPA 2000 is designed â€Å"to ensure that the relevant investigatory powers are used in accordance with human rights†, since it extends the legal regulation of interceptions to cover private networks that are â€Å"attached, directly or indirectly to a public telecommunications system†, and includes â€Å"anything comprising speech, music, sounds, visual images or data of any description†. Therefore, a criminal offence is not committed in the UK if the controller of a private network intercepts a communication in the course of its transmission, but section 1(3) provides that intercepti ons â€Å"without lawful authority† are still actionable under the remit provided for by the HRA 1998 that is discussed below[70]. On the basis of this understanding of data retention laws discussed in the previous chapter, it is also important to look to consider whether the scheme for identity cards proposed under the ICA 2006 based on personal data retention as a means of identification will serve to violate the recognition of individual human rights and civil liberties. This is because whilst it would clearly be hard to argue using surveillance technology to gain solid evidence for the purposes of preventing serious crime and encouraging counter terrorism is a bad thing, there is an all too prevalent need within the current climate for the striking of a balance between maintaining national security and unnecessarily invading an individual’s privacy. In spite of their legitimate aims, the introduction of identity cards in the UK could be considered to be just the latest step in the government’s efforts to encourage crime prevention and counter terrorism at the expense of the individual rights and freedoms. This is because, in the same way as other advancements in surveillance technology, identity cards are also not without their problems. There is a prevailing feeling the use of identity cards across the nation will serve to breach individual human rights and civil liberties in the same way as many other forms of surveillance. In particular, it has been argued the use of identity cards will serve to breach individual rights to privacy because of the nature of the personal data that will be stored and retained within them and on the NIR database[71]. Therefore, although there is little doubt the use of such technology for information gathering is very advantageous to help the government, the police, and even everyday people, question marks have arisen in relation to just how far surveillance technology should be used to monitor the public. Consequently, there is an argument those who use surveillance for the purposes of information gathering should take on certain responsibilities they must then uphold in view of the implementation of the ECHR into the UK via the HRA 1998. But in some ways technological advances have arguably hindered the recognition of human rights and civil liberties as much as they have helped crime prevention and counter terrorism by allowing the authorities an unprecedented look into people’s lives. 3.1 The right to personal privacy The right to personal privacy is an important right, however, it is all too easily taken for granted because, like freedom, no one really appreciates its value until it is threatened, as in this case with the enactment of the ICA[72], so that in the wake of technological advancement privacy has all too easily become an afterthought in social advancement[73]. This is a significant failing. The right to privacy should not merely be limited to the idea an individual may live their personal life how they choose. It is also meant to include the right to establish and develop relationships with other people for the development and fulfilment of one’s own personality[74], whilst sexual relations are the most intimate aspect of the right to a private life[75]. However, the right to a private life also covers an individual’s physical and moral integrity[76], encompassing protection against compulsory physical interventions and treatments[77]. Moreover, in spite of the

Wednesday, November 13, 2019

barn burning :: essays research papers

Barn Burning As "Barn Burning" opens, an adolescent boy named Sartoris Snopes is in court, hoping he will not have to testify in the arson case against his father -- a charge of which Sarty knows Mr. Snopes is absolutely guilty. The judge, whom Sarty perceives as kindly, is nonetheless Sarty’s enemy because he is his father’s enemy, and Sarty has not yet separated himself from his father. Sarty’s family are itinerant farmers, but they move around even more often than is typical because of his father’s habit of burning something down every time he gets angry. Sarty realizes that there is something deeply psychologically wrong with his father, but he underestimates his father’s danger. When they arrive at the beautiful plantation of Major de Spain, therefore, Sarty feels the de Spains are safe: "People whose lives are a part of this peace and dignity are behind his touch, he no more to them than a buzzing wasp: capable of stinging for a little moment but that’s all; the spell of this peace and dignity rendering even the barns and stable and cribs which belong to it impervious to the puny flames he might contrive." Sarty does not know that his father can just as easily bring down a big plantation as a cow barn. It would be easy to say that Sartoris, in the end, must make a choice between right and wrong, between the "peace and dignity" represented by the de Spains with the squalor and misery of the Snopes family, but it is more than that. At the story’s beginning, when Sarty was ready to testify that his father did not burn down that barn, he would have done it because a son’s job is to stick to his father. At the story’s end, he warns Major de Spain that his father is about to burn down his beautiful plantation, even though he knows that this will bring his family down once and for all, even though he knows that this means he will never be able to go

Sunday, November 10, 2019

Choose two characters from the novel ‘Of Mice and Men’ Essay

America in the 1930’s was a class-based society where women had no choice. The Wall Street Crash in 1929 meant the ‘Great Depression’ was occurring, people living in poverty because of this but most would travel round to find work. Racism was still a critical problem in this time so this was affecting many lives, only white people could get a decent job, if a black person could it would be living in the same conditions as slaves, even though slavery was abolished in 1865- over 60 years before. Crooks is the stable buck and is black, he is a clever but lonely man who just wants some companionship. Curley’s wife is seen as a ‘tart’, we see that she is also lonely and very misunderstood. In the novel, even though Steinbeck had made the characters an isolated group, they all represent different sides of the society, this allows him to criticise what he sees as problems. Slavery started in America in the 15th century, thousands of slaves arrived looking for a better way of life than what they had left, but infact their ‘new lives’ were worse. Slavery meant big business in America. In the north most Negroes were free but in the south it was the way of life. Slaves were employed as either field workers; they worked long hours, lived in huts and slept on the floor. Then there were the house workers who would cook, clean, run the masters house and bring up the children, they lived a more comfortable life, but caused mistrust between the two. Sometimes a way to solve this was to split up families, selling the children. Slave revolt was common and in 1831 people started to understand the need to abolish slavery, in 1833 it became more widespread but Lincoln and the civil war offered more help to the black society. Finally in 1865 slavery was abolished – â€Å"Neither slavery nor involuntary servitude shall exist in the United States.† Crooks was not a slave but was still a victim of racial prejudice. He is lonely and very clever, ‘He reads a lot. Got books I his room’, and we see that he is aware of his rights, ‘a tattered dictionary and a mauled copy of the California Civil code for 1905-98’ this in a way is worse as he knows that he could have a better life. He loves company but hides it, as he is sure this was the best his life would get. The men know that they can be racist towards him and get away with it; this is made clear when George asks ‘give the stable-buck hell?’ Asking why it’s ok, he is given the simple answer from candy that it’s fine because he is a ‘nigger.’ Crooks was still very much treated as a slave. The men tell the stories of how they make him fight for a use of entertainment but ‘on the count of the niggers got a crooked back, Smitty can’t use his feet’ the men think its fine beating Crooks up and that they’re being kind. The group do not realise that Crooks is scared of them and so isolates himself from everyone and everything going on around him – ‘he kept his distance and demanded everyone else kept theirs’ but by doing this he had to live alone in the stables while the men on the ranch lived together, however they did respect he was a human because they did keep away from him. Crooks ‘pain-tightened lips’ show he is suffering and is punishing himself, he tells himself that ‘he ain’t wanted in the bunk-house’ and so other people ‘ain’t wanted in my room’. He says this to Lennie, who doesn’t understand why crooks doesn’t want to talk to someone or why he doesn’t go in the bunk house, Crooks’ response to this is that the men say ‘I stink’- another example of the racial prejudice; he’s black so therefore he must stink. Crooks sees that with Lennie he has someone he can tease and so does, when he tease s him Steinbeck writes that, ‘Crooks pressed forward some kind of private victory.’ Crooks’ victory is that probably all his life he has been teased because of his colour, now he has someone he can pick on that he can beat. There is a sense of war in which black verses white and unusually the black can easily win. Crooks know he can get away with picking on Lennie, his ‘face lighted with pleasure in his torture’, he is enjoying that he can pick on a white person. Crooks is a dreamer, he has one dream of the past; ‘I remember when I was a little kid on my old mans chicken ranch. Had two brothers. They were always near me, always there.’ He dreams of his past because he knows that he has no future, and that the others do have a future, there is a slight sense of jealousy as he cant leave the ranch. This is also another example of Crooks’ need for companionship; he is showing how lonely he is. Lennie then tells Crooks’ of his and Georges dream to own some land, to which he replies, ‘Nobody never gets to heaven, and nobody ever gets no land’ he knows what societies like and has seen many men with dreams but none ever come true, but even though he is pessimistic he is right. However even saying this he is still tempted to join the dream, he wants to be around people and is happy when people talk to him. He says ‘I didn’t mean it. Jus’ foolin’. I wouldn’t want to go no place like that.’ He knows he has to support black people and that it wouldn’t happen. Through the character of crooks we see that Steinbeck thought that Crooks’ was treated badly and that he obviously felt sympathy for him and all black people in America. We see examples of Crooks being afraid of all people, including Curley’s wife, in a time where women weren’t listened to, Steinbeck puts the message across that he shouldn’t have to pull back and have to live in fear, worrying about what is going to happen to him and who by. If Crooks had been white he wouldn’t be treated in the way he was. Curley’s wife is another character that is seen as by the men on the ranch as insignificant, like Crooks. There are many similarities between the two; they are outcast, misunderstood, and oppressed. Neither are treated as equals and are trapped in the same life with no future. Even so she does not see these similarities and picks on Crooks for the same reason he picks on Lennie, because she can she knows that he will listen to her and be afraid. Curley’ s wife is all she was ever called, she was not given a name showing that she means nothing and is only a possession to Curley. This suggests that women were on the same level as black people and in some ways the same position. As Negroes were victims of racial prejudice – women were victims of sexism. Curley’s wife has no relationship with her husband and she doesn’t look after the household like she is supposed to, this suggests that she is trapped and is only there so Curley can say he’s mar ried. She doesn’t love him and is only there for his satisfaction. Curley’s wife is lonely and when she looks for companionship within the ranch, the men say that she is too flirty, they think that ‘Curley’s married a tart’ but they don’t understand her and don’t try to. The men don’t trust her and there is a sense of danger when George describes her as ‘jail-bait.’ This also proves what the men think of her. There is a description of her, it goes through that she has, ‘full, rouged lips and wide spaced eyes, heavily made up. Her fingernails were red. Her hair hung in little rolled clusters, like sausages’ this is very superficial and shows that in a way she is covering herself and her feelings with a mask. Knowing that her husband is at a whorehouse she says ‘I don’t like Curley. He ain’t a nice fella’ this is very simplistic and suggests her interest, it also suggests that Curley does not love her either. She is obviously lonely and only gets a cold reception from the workers, she is isolated from the world and has lost all chance of having friends, and Steinbeck feels pity for her. He gives this message when she says ‘think I don’t like to talk to somebody ever’ once in a while? Think I like to stick in the house alla time? She questions them and gets no response from being kind. We see her lash out on page 111 when she is talking to Crooks, Lennie and Candy, she is angry because of Curley and so takes it out on them; people who she has a sense of power over; ‘Ever’ body out doin’ som’pin. Everybody! An’ what am I doing? Standin’ here talking to a bunch of bindle stiffs- a nigger an’ a dum- dum’. This also gains her pity from the reader. Curley’s wife is lonely and frustrated that there is nothing she can do or say make herself feel better but she does try by taking it out on the men, in this case Crooks. She says to him ‘well, you keep your place then, Nigger. I could get you strung up on a tree so easy it ain’t even funny’ although she is being so nasty we still feel sympathy for her, we understand that she is so lonely, we can relate to this. As Crooks does Curley’s wife dreams of the past and what could have been, she says to Lennie ‘I could of went with the shows. Not jus’ one, neither. An’ a guy tol’ me he could put me in the pitchers’. She also talks about her dream later. She says that the only reason she married Curley was that she wanted to leave home. This is because she thought that her mother had stopped her from being an actress by stealing a ‘letter’ from a man who had said he could make her famous. She explains ‘I ast her if she stole it, too, an’ she says no. So I married Curley. Met him at the Riverside Dance Palace that same night’ she married him out of spite to her mother and no other reason. This is a tragic picture, she is being very naà ¯Ã‚ ¿Ã‚ ½ve in thinking that a letter was being sent, she doesn’t realise that the man was playing her for a fool, this gains her sympathy from the reader. When she is dead there is such a sense of calmness and tranquillity, ‘ and the meanness and the planning’s and the discontent and the ache for attention was all gone from her face. She was very pretty and simple, and her face was sweet and young.’ This is saying that she is now at peace and in a way because her life was such a disaster in which she had no future she is better off dead. It was the only way she could be happy and escape Curley and her loneliness. The 1930s was a class- based society within America. Racism was an ongoing problem and black people were still being treated as slaves, even though slavery was abolished in 1865. The ‘great depression’ was also still a huge problem with 3 million people unemployed in 1930 and 13 million in 1932. People were living in poverty and any jobs going were poorly paid. However life was worst for black people, who were victims of racial prejudice and discrimination and women who were seen as insignificant and ‘possessions’ of their husbands or fathers and were only there to look ‘purty’ and look after the house. In the novel, even though Steinbeck had made the characters an isolated group, they all represent different sides of the society, this allows him to criticise what he sees as problems. Curley’s wife and Crooks are just two characters that illustrate what life was like in America in the 1930’s.

Friday, November 8, 2019

environment relationships using The Light in the Forest by Conrad Richter as a vehicle

essay exploring indian/environment relationships using The Light in the Forest by Conrad Richter as a vehicle Section 1The plot in the story starts with True Son, a white boy who was raised by Indianssince he was four years old. A Native American family raised him as their own when theirson had died and True son was taken as prisoner. True Son's Indian parents said wordsthat made him an Indian. True Son considered this to be his life, and these people to behis family.One day when he was 15, he was told by his father that a new law was passed andbecause he was white, he had to go back and live with his real family. Then True Son isescorted by white soldiers back to the place where his parents live. His cousin and bestfriend Half Arrow accompanies him on part of this journey.True Son is reluctant to go and hates his white family. They force him to wear theirclothes, speak their language and interact with other whites daily.Gordie Howe's star on Canada's Walk of FameThe only white personhe likes is Gordie, his younger brother. Gordie is the only one who tries to understandTrue Son, he's also th e only one to call him True Son instead of John Butler, his realname.Once while he was living with his white family he tried to escape. When Gordiebegged to go too, True Son brought him too. But Before they could get very far, they werecaught. A while later, True Son became ill and did not seem to get better with themedicines that the Whites had. One night Gordie told True son that some Indians hadbeen seen in the town. Once he was left alone in his room, True Son put on his Indianclothes and went out the window to meet his people.He finds Half Arrow...

Wednesday, November 6, 2019

Health Hazards of E-Waste Recycling and Hospitals Role in India

Health Hazards of E-Waste Recycling and Hospitals Role in India Free Online Research Papers E-Waste Management is one of the major areas of concerns today. Researchers are trying to find new ways to reduce, recycle and reuse the E-Waste and governments are trying to find methods of implementations of e-waste management schemes. Developed nations are trying to cope up with this startling problem and the result is the dumping of e-waste into the developing countries like India. New health problems are emerging due to the unmanaged E-Waste industry. As the electronic recycling is an unregulated industry in India, the recycling process is dangerous to the health of its employees. A study of the related health studies in China has shown the impact of e-Waste recycling on health of workers. Such studies are important for India as these will help in designing better policies of E-Waste Management. In this paper, we present the problem of e-waste with the focus on the health. A study about the role of hospitals in dealing with this problem is also being presented with a focus of new initiatives that can be taken by hospitals in this regard. INTRODUCTION It is a major area of concern today that the wealthy countries are dumping large quantities of e-waste into the developing world. According to (Rachel Kesselman, 2007), currently, companies export 80 percent of the worlds electronic trash to Asia, and 90 percent of this flows into China, according to a BBC report. The article (Toxic Links, 2008) besides discussing the problem of e-waste recycling in India and the economies involved expresses the urgent need for educating consumers and the general public regarding the potential threat to public health and the environment posed by their products and for raising awareness for the proper waste management protocols. E-WASTE RECYCLING IN INDIA According to (Rachel Kesselman, 2007), The Indian government estimates that the country generates approximately 146,000 tonnes of e-waste annually, and that another 150,000 tonnes of used PCs, printers and other IT devices enter its ports illegally. Greenpeace International released a report (GreenPeace International, 2005) in August 2005 about the hazardous chemicals found in scrap yards in India that include tin, lead, copper, cadmium and antimony in the soil and local rivers around scrap yards where the electronic waste is recycled. It also emphasized the fact that all stages in e-waste processing could release substantial quantities of toxic heavy metals and organic compounds into the workplace environment. HEALTH HAZARDS The e-waste recycling and disposal operations found in developing countries are extremely polluting and likely to be very damaging to human health (Robert Bortner, 2008). According to (Habib Beary, 2005), computers, refrigerators, televisions and mobiles contain more than 1,000 different toxic materials. Chemicals such as beryllium, found in computer motherboards, and cadmium in chip resistors and semiconductors are poisonous and can lead to cancer. Chromium in floppy disks, lead in batteries and computer monitors and mercury in alkaline batteries and fluorescent lamps also pose severe health risks. The author (Mike Mcphate, 2004) writes about the patients suffering from problems such as bleeding from the throat and breathlessness, lung ailments including asthma, bronchitis and chronic lung infections, relating these to e-waste recycling methods used, burning of wires and handling of green circuit boards such as the task of recovering copper from printed circuit boards (PCBs). The author also shows the concern to the use of a brew of nitric acid, a toxic substance during the recycling process that releases copper as well as cancer-causing lead and mercury. According to (Emmanuel K. Dogbevi, 2007), plastics used to house computer equipment and cover wire cables to prevent flammability often contain poly-brominates flame retardants, a class of dangerous chemicals. Studies have shown that ingesting these substances may increase the risk of cancer, liver damage, and immune system dysfunction. The chemicals contained in e-waste are a cocktail of dangerous pollutants that kill both the environment and humans slowly. The recycling units are mostly in the residential areas, where children play with trash. This can lead to further health hazards. The example, as in (Andrew Pollack, 1984), specifies As batteries have become smaller, especially with the introduction of button-shaped versions, infants have started swallowing them. A swallowed battery can burn holes in the intestines and cause inflammations. SOLUTIONS FOR INDIA It is not that there is no solution for this problem. There are various articles such as (Intersindia.com, 2007), where the authors give suggestions to keep a check on this seemingly uncontrolled problem of recycling. However, to give importance to such ideas and to implement these, there is a need to understand the health hazards of this unwatched process of recycling. There is also the need of bringing health awareness to masses regarding this issue. As this recycling industry contributes to the economics of the country, the need is also to study the health impacts and to relate these directly to the recycling process. Such studies will not only help in designing controlled, supervised and monitored processed of recycling e-waste but will also help in cautious reduction of e-waste. RELATED RESEARCHES The research conducted by (Xia Huo et. Al, 2007) found that the lead contamination from e-waste processing appears to have reached the level considered to be a serious threat to children’s health around the e-waste recycling area, and that the elevated Blood Lead Levels in Guiyu children are common as a result of exposure to lead contamination caused by primitive e-waste recycling activities. Another important research, (Annao. W. Leung et. Al, 2007), is the human health risk assessment study conducted concerning dust exposure at an uncontrolled e-waste recycling site and the results can serve as a case study for similar e-waste activities in countries such as Africa, India, and Vietnam where e-waste is becoming a growing problem. COEH, Center for Occupational and Environmental Health is also involved in e-Waste management research projects and claims to be the only such center out of the 240 Medical Colleges in India (T. K. Joshi and Neeraj Gupta, 2008). HOSPITALS’ PROJECTS AND NEW INITIATIVES In recent years, some U.S. hospitals have taken proactive measures to not only minimize or eliminate the impact of hazardous e-waste on their nation’s environment, but also for saving the valuable dollars as well. One such hospital (Premier, 2009) in New England, Hartford, CT-based Saint Francis Care entered into an agreement with WeRecycle!, in 2005. The combined effort was not to allow hazardous e-waste to be sent to solid waste landfills, incinerators, prison recycling operations or developing countries. In India, it is needed that hospitals should get involved in such life saving initiatives for people of India and the ‘Mother Earth’. Hospitals in India can come up with different initiatives to help in this regard, such as To conduct the public health awareness programs on dangers of uncontrolled e-waste recycling. To find the impact on health on people working in E-waste recycling units in India. To find the impact on health on people living near the E-waste recycling units in India, specially the pregnant women and children. To relate to specific health problems and their increase to e-waste recycling issues. In paper (Violet N. Pinto, 2009), the table 1, specifies E-Waste Component, the process needed for dismantling, the related potential occupational and environmental hazards. Such studies should be used by the hospitals to create mass awareness. The hospitals can take the initiatives of keeping a check or recording the patient’s health history if it is suspected to be related to E-Waste mismanagement. The hospitals can also further publish reports, based on such recordings for making the government alert on the increase of health problems of people in a given location, which is suspected to be related to E-waste. DEVELOPMENT OF HEALTH MONITORING SYSTEM AS PART OF E-WASTE RECYCLING MANAGEMENT Hospitals in India can provide a real measure of problem severity, may it be the rate of increase of stress and suicides, the criminal offences, the domestic fights, even the impact of mosquito-bites. However, this is only possible if hospitals play a pro-active role in monitoring, recording and analysis of factors related to life and death, even those that are seemingly not directed related to the diagnostics and treatments. Hospitals’ role play had been considered related to E-Waste Management only to the extent of hospital or bio-waste management. However, as the sufferers of the E-Waste recycling processes also come to the hospitals for treatment, the track of recycling processes, impacts, health hazard and possible treatments can be kept easily by hospitals. HEALTH MONITORING SYSTEM (Hospitals’ initiatives and Projects/ Collaborations) Check on the health hazards related to E-Waste Recycling Recording Cause and Impact on Patient’s health. Keeping Track of such patient’s occupational processes and habits. Recording the number of similar cases in the locality. Research Analysis on treatments and improvements. Public Awareness Schemes. Reports Publications. Figure 1: A Health Monitoring Framework CONCLUSIONS This paper has presented the areas of Health Monitoring System, which can be further elaborated and embedded in the daily processes of hospitals. The E-waste Management Systems with health monitoring frameworks can lead to results in only the health improvement of patients but also in public thought and views related to E-waste recycling. ACKNOWLEDGEMENTS The authors are grateful to Fausta Research and Development Pvt. Ltd, Faridabad, for making of ‘Fausta Research Community’, to motivate research collaborations between researchers and multi-disciplinary organizations, and initiating the IT and healthcare projects. REFERENCES Andrew Pollack, Battery Pollution Worries Japanese, Published: June 25, 1984, The New York Times, retrieved on 3rd June 2008, http://query.nytimes.com/gst/fullpage.html?sec=technologyres=990CE3DB1439F936A15755C0A962948260 Annao. W. Leung et. al, Heavy Metals Concentrations of Surface Dust from e-Waste Recycling and Its Human Health Implications in Southeast China, (2007), Environ. Sci. Technol. , Retrieved on 5th June 2008, ban.org/Library/Scientific/Leung_HM_Dust_Guiyu_2008.pdf Emmanuel K. Dogbevi, E-Waste is killing Ghanaians slowly, August 27, 2007, http://ghananewsonline.blogspot.com/2007/08/e-waste-is-killing-ghanaians-slowly.html, Retrieved on 3rd June 2008. GreenPeace International, Toxic Technology contaminates e-waste recycling yards in China and India, 17 August 2005, Retrieved on 3rd June 2008, greenpeace.org/international/press/releases/toxic-technology-contaminates Habib Beary, Bangalore faces e-waste hazards, BBC News, Bangalore, Last Updated: Monday, 31 January, 2005, Retrieved on 3rd June 2008, http://news.bbc.co.uk/2/hi/south_asia/4222521.stm Intersindia.com, E-Waste Management in Indian Scenario, 2007, Retrieved on 5th June 2008, internsindia.com/download.php?download_file=../profiles/E-Waste.www.internsindia.com.pdf. Mercedes Oestermann van Essen, â€Å"The Air You Breathe Is Full Of Toxins, And I Am Not Talking About Exhaust Fumes†, Retrieved on 3rd June 2008, content4reprint.com/health/the-air-you-breathe-is-full-of-toxins-and-i-am-not-talking-about-exhaust-fumes.htm Mike Mcphate, E-waste a health hazard, Delhi NewsLine, Retrieved on 3rd June 2008, http://cities.expressindia.com/fullstory.php?newsid=81450, Published: Sunday , April 11, 2004 Premier, ‘Saint Francis Care’s e-waste initiatives save environment, costs’, premierinc.com/quality-safety/tools-services/safety/green-link/green-corner/st-francis-ewaste.pdf, retrieved on: 12th Oct 2009. Rachel Kesselman, Intel Brief: E-waste hazards, for ISN Security Watch (27/07/07), Mercyhurst-ISN intelligence, Retrieved on 3rd June 2008, isn.ethz.ch/news/sw/details.cfm?id=17914 Robert Bortner, Acumen International, Asia, Near East (ANE) Computer Recycling and Disposal (E-Waste), Retrieved on 5th June 2008, dot-com-alliance.org/resourceptrdb/uploads/partnerfile/upload/258/Ewaste%20Research%20Final.doc T. K. Joshi, Neeraj Gupta, Impact of E-Waste on Health along with case studies, Retrieved on 5th June 2008, www.assocham.org/events/recent/event_64/Dr_T_K_Joshi_Dr_Neeraj_Gupta_COEH.ppt Toxic Links, E-WASTE IN INDIA System failure imminent – take action NOW!, Retrieved on 5th June 2008, noharm.org/details.cfm?type=documentid=1175 Violet N. Pinto, â€Å"E-waste Hazard The Impending Challenge†, http://medind.nic.in/iay/t08/i2/iayt08i2p65.pdf, Retrieved on: 14th Oct, 2009. Xia Huo et. al, Elevated Blood Lead Levels of Children in Guiyu, an Electronic Waste Recycling Town in China, Environ Health Perspect. 2007 July; 115(7): 1113–1117. ––––– ***** ––––– Research Papers on Health Hazards of E-Waste Recycling and Hospitals' Role in IndiaDefinition of Export QuotasInfluences of Socio-Economic Status of Married MalesMarketing of Lifeboy Soap A Unilever ProductGenetic EngineeringThe Effects of Illegal ImmigrationNever Been Kicked Out of a Place This NiceTwilight of the UAWThe Project Managment Office SystemBionic Assembly System: A New Concept of SelfThe Relationship Between Delinquency and Drug Use