Friday, January 24, 2020

Henrik Isbens A Dolls House :: A Dolls House Essays

A Doll’s House When the play â€Å"A Doll’s House† by Henrik Ibsen was first performed, society was much different, and the play shocked many people. Today we don't have quite the same problem, but a deeper look at the "meaning" of the play reveals that it is about problems themselves, not a specific issue. Perhaps a play about gay parenting, internet privacy, or AIDS in the workplace can strike chords of concern in our contemporary audience, and Ibsen's works (perhaps) should be viewed in light of their impact upon social awareness rather than as purely historical pieces. If Nora’s story seems somewhat "archaic" to us, because of our own enlightenment, then we can in a sense thank Ibsen for his pioneering work as a social conscience. Rather, what the play symbolizes about our needs in society, to communicate, and to work towards understanding and tolerance, are much more important issues to a modern day audience. It makes us wonder; can we still learn from Ibsen? Yes we can. Many modern day values are presented in this family. Money is still such a vital role in society. If you don’t have it your worthless, and if you do you are nice to have around. People need money, and still today they will go out of their way to get it. At the time Ibsen's wrote and presented this play it was unheard of that a women COULD leave her family in pursuit of herself and her own happiness. Nowadays this idea is commonplace. Ibsen showed that women were first people, not just doll's, not a â€Å"play thing† for her husband. And that women are intelligent and had others needs then raising a family, and taking care of the home.

Thursday, January 16, 2020

The Security Investigation

Part I. The availability of the personal computer or PC at every home and every office desktop, and the dawn of the Internet brought to focus not only the benefits derived from these technologies but abuse and to a greater extent, crimes as well. Suddenly, cybercrime is at an all time high and ways and means of detecting and making these criminal hackers pay became a forefront competence in information technology and law enforcement. One of the best deterrents to computer crime is to catch those who commit the dastardly acts (Solomon & Prosise, 2001)! Of all the types of criminal hackers, the worse is the â€Å"insider† – a current employee or a former â€Å"disgruntled employee† – since they are or were in a â€Å"trust relationship† with their employer, and they demeaned that trust by attacking the information systems of the company. When this type of crime, or cybercrime, occurs, the recourse is to call in computer forensics and incident response professionals to remedy the situation. Solomon et al. (2005) describes computer forensics as, â€Å"Computer investigation and analysis techniques that involve the identification, preservation, extraction, documentation, and interpretation of computer data to determine potential legal evidence.† Once there is a probable determination that a cybercrime was committed, the computer forensics and incident response experts follow a well-choreograph methodology to successfully document evidence and prosecute a cybercrime. Robbins (2002) lists down the basic but critical procedures to computer forensics: 1.Protect the subject computer system during the forensic examination from any possible alteration, damage, data corruption, or virus introduction; 2.Discover all files on the subject system including existing normal files, deleted yet remaining files, hidden files, password-protected files, and encrypted files; 3.Recover as much as possible all of discovered deleted files; 4.Reveal to the extent possible the contents of hidden files as well as temporary or swap files used by both the application programs and the operating system; 5.Access, if possible and if legally appropriate, the contents of protected or encrypted files; 6.Analyze all possibly relevant data found in special and typically inaccessible areas of a disk including but not limited to the ‘unallocated' space on a disk, as well as ‘slack' space in a file; 7.Print an overall analysis of the subject computer system, including listing of all possibly relevant files and discovered file data, then provide an opinion of the system layout, the file structures discovered, any discovered data and authorship information, any attempts to hide, delete, protect, encrypt information, and anything else that has been discovered and appears to be relevant to the overall computer system examination; and 8.Provide expert consultation and/or testimony, as required. While the experts are doing the investigation, it is important to liaise and coordinate, depending upon the legal parameters of the crime, with local or federal cybercrime units. In some states in the U.S., it is a federal crime not to report computer crimes and soon, reporting of cybercrimes will be federally mandated. But the key point in cybercrime investigation is ensuring that the evidence gathered will stand up to legal scrutiny. Part II. A common story heard about cybercrimes is the use of â€Å"social engineering techniques.† Social engineering basically is playing the â€Å"con man† to elicit information from gullible or unknowing victims. A Help Desk employee for example can call a secretary and ask for her password since he needs it to diagnose her PC remotely. Since there is a â€Å"trust relationship† already, the secretary gives her PC password. The Help Desk employee then accessed the secretary's PC and downloaded confidential memos and reports. He then sells these documents to competitors and the competitors ended up gaining advantage on the Help Desk employee's company because they already have insider information. A case like this could have been prevented if the company, or even any government agency, had good security policies in place. Part of the security policies would have been user education training and if the user's had been properly trained, they would have known that nobody needs to know their passwords but themselves. In securing the information systems, the baseline or starting point is having good security policies in place and these policies should and must be based on globally accepted standards and industry best practices. The ISO 17799 or Code of Practice for Information Security Management (ISO/IEC, 2005) is always one of the best standards to adapt whether small, medium or large enterprises – even government agencies for that matter! Shaurette (2002) stated that, â€Å"Information security is not just about technological controls. Security cannot be achieved solely through the application of software or hardware. Any attempt to implement technology controls without considering the cultural and social attitudes of the corporation is a formula for disaster.† Once this has been taken into mind, mitigation of risks to the information systems will be achieved and prevention of cybercrimes, whether from malicious insiders or external criminal hackers, will be tempered.

Wednesday, January 8, 2020

The Separation Of Ethics And Government - 1819 Words

â€Å"Ethics is the manner by which we try to live our lives according to a standard of right or wrong† (Ghillyer). And government ethics is â€Å"the application of ethical rules to government† (Wikimedia Foundation, Inc.). The separation of ethics and government was seen with the unraveling of Hurricane Katrina, which was a category 4 hurricane that made landfall in New Orleans on August 29, 2005. New Orleans, Louisiana was a racially segregated city occupied predominately by a black majority and had defied regional trends by reaching a new ceiling of poverty. The community was vulnerable to their environment and to the government. When vulnerable, the option for unethical responses heightens. Hurricane Katrina was the opportunity needed for the government to defy ethical responsibility and to exploit the vulnerability of the poor. A majority of New Orleans is below sea-level and is surrounded by the Mississippi River and Lake Pontchartrain. When Hurricane Katrina hit southeast Louisiana and east New Orleans, â€Å"levees and flood walls failed or were breached in more than 50 locations. Eighty percent of the city of New Orleans was flooded, to a depth of more than 3 m (10 ft.) in some neighborhoods† (New Orleans Hurricane Katrina Levee Failures). Ivor van Heerden was the deputy director and a hurricane expert at Louisiana State University. He and his colleagues had generated computer models showing the potential devastation of a large storm to New Orleans. Since 2001 Ivor and his teamShow MoreRelatedDemocracy And The Australian Political System Essay1627 Words   |  7 Pagesnon-democratic and democratic instruments. The extent to which the Australian political system produces a democratic and fair society is dependent upon instruments such as the Constitution, Bicameral parliament, Separation of power s, Representative government, Responsible government and the ethic and values during a particular time. An instrument in the Australian political system that produces a fair and democratic society is the Federal Constitution 1901 because it outlines the powers and constraintsRead MoreThe Articles Of Confederation Essay1574 Words   |  7 Pagesknew about such as the balance of powers (Checks and Balances), the right to bear arms, free speech, slavery, etc†¦. The fight between states and the federal government from the creation of the Constitution till now have laid down the law and the public’s interests that are at stake. The Checks and Balances system gives each branch of the government power to limit the other branches so that one can’t exert its power over the others and be dominant. Throughout American history, the Legislative and ExecutiveRead More Seperation of Powers, Rule of Law and Responsible Government1709 Words   |  7 Pagescomplexities of present diverse societies have led parliaments to develop various types of laws and regulations on the basis of the establishment of these intricate notions of rule of law, separation of powers and responsible government in order to maintain social order and harmony between police, citizens and the government. These implementation have distinctive application within contemporary society and the way in which they are applied to policing, as they all aim to achieve civilized and agreeable lawsRead MoreThe Stains of Watergate1568 Words   |  6 Pagesscandal proliferated public skepticism of and mistrust in the federal government, and an angry American public called for immediate response. The widespread public mistrust and skepticism led to new regulations that curbed presidential powers, enforced ethics in politics, and increased government transparency. When Nixon took office in 1969, the nation was divided. There was partisanship in Congress, racial and generational separation, and ideological differences over the Vietnam War and civil rightsRead MoreJohn Steinbeck s Harvest Gypsies 1664 Words   |  7 Pagesworkers were refused the basic human rights that the government vowed to protect. Harvest Gypsies, written by John Steinbeck just 30 years later, brought rural farmers’ grievances into the picture after their land was destroyed during the Dust Bowl. The rhetoric used in these works criticizes the exploitative working environment in response to a strong capitalist agenda, discourages the separation of classes caused by the ‘Protestant Ethic’, and attempts to humanize impoverished and overworkedRead MoreThe Ethics Of The Drone Warfare1703 Words   |  7 Pagesdevelopment of a new version of ethics. This approach develops the notion that allows for the throwing out of what is right and what is wrong, and dictates that cost is more important. By this it assumes that the killing of a potential terrorist is more important than the lives of the innocent. The consequentialist concept and the ethics of duty give two approaches of how ethics view this new approach of warfare. The similarities and difference promote a version of ethics that can be viewed as the moreRead MoreThe New Jersey Court And Errors875 Words   |  4 Pageslegitimate powers of government reach actions only, not opinions, I contemplate with sovereign reverence that act of the whole American people which declared that their legislature should make no law respecting an establishment of religion, or prohibiting the free exercis e thereof, this building a wall of separation between Church State† (Jefferson, 1802). Today, the â€Å"wall of separation† between church and state is much more evident in many physical ways. Public or government properties are noRead MoreThe Principles And Principles Of Democracy876 Words   |  4 PagesAccountability, the Rule of Law and Separation of Powers. These principles are indeed fundamental and essential to the democracy process. Although, certain principles said to be related and contribute to the democracy society, and that they are not as desirable but are considered essential to democracy, I disagree. Furthermore, by evaluating democratic principles as they relate to democratic governance, democracy identifies, develops, and implements government policy in order to protect and meetRead MoreTechnological Advances in Analytics and Mobility: Positive and Negative Aspects of Technology871 Words   |  3 Pagesentirely new business models, from social networks to the ability of enterprises to create complex supply chains globally. The impact of innov ation in analytics and mobility continues to also raise the paradoxical question of personal and corporate ethics as well (Sollie, 2007). With advanced analytics the traceability of transactions for entire groups of people down to each specific person are now possible. Mobility advances have made it possible to track the exact movements of a person through theirRead MoreThe Social Responsibility Of Business932 Words   |  4 Pages(Friedman, 1991). While Robert Solomon and Milton Friedman both champion the use of ethics and morality in business, they disagree on industry’s responsibility to society, and corporations role to include communal obligation while crafting policies and guiding principles for their business decisions. In his landmark paper â€Å"The Social Responsibility of Business is to increase its profits† Friedman decrees a distinct separation between personal views and professional decision making, is required on behalf