Thursday, October 31, 2019

Coca cola Essay Example | Topics and Well Written Essays - 1500 words

Coca cola - Essay Example alone recorded more than US$15 billion in 2006 (Kent, para 2-3). In the same year, market consumption volumes for the same product were more than thirty billion liters. This is usually not the same story with many multinationals. Company Overview Coca-Cola Company headquartered in Atlanta Georgia and specializes in soft beverage drinks. The company has operations in more than 200 countries. The plant in Atlanta produces the concentrate and sells it to certified Coca-Cola bottlers worldwide. Bottlers hold agreements with the Coca Cola Corporation, which permit them to produce the finished products. After which bottlers distribute and sell Coca-Cola products to retail stores and vending machines, who in turn sell the products to consumers. Advantages of Coca Cola Differentiated marketing method The most noticeable positional strategy of the Coca Cola Company is differentiated marketing method. This method has enabled the organization to satisfy the needs of a wide range of markets. For instance, it has bottled water products for any of its target segments. It also has Diet Coke which is specifically targeted for the aged or elderly people and those people who are drifting towards a healthier feeding lifestyle. Product levels One of the main advantages of Coca Cola Company over its rivals is that it offers products on three distinctive levels: the core product, the actual product, and the augmented product. In general, features and even materials used make the actual products which in the end avails the core product (Petretti 2-17). Consumers are attracted by Coca Cola products because of their high quality coupled with unsurpassed company standards. As consumers take the products they also end up getting the augmented product which is the extra or additional benefits the consumer derive from the product or the company. However, given that soft beverages are consumables, there is a tendency to pose limits on the augmented level. To counter this, Coca Cola Company not only provides its products in various quantities, it also provides its products in different tastes and coloration to enable the consumer to switch products without crossing over to competitor products. A good example is Diet Coke which is offered in various quantities like the Lagasse Diet Coke, Caffeine-Free Diet Coke, and Chaser Diet Coke basing on the consumer preferences. Global brand Unlike many of its competitors, Coca Cola Company is the leading manufacturer, marketer and even distributor of nonalcoholic drinks worldwide. Presently, the organization has operations in more than 200 countries. The company is a marketplace innovation driver and a solidified investor in local economies. At present, Coca Cola Company commands the beverage industry globally with over 500 beverage brands including about four brands out of the top-five sparkling brands on the planet (Kent, para. 4-6). Coca-Cola Company market share versus other soft drink companies worldwide in 2011, based on sa les value Source: Globalization and Health, Statistica. Disadvantages of Coca Cola Positioned as a monopoly The company has established itself as a monopoly in many countries. As a monopoly, there are many things that are attributed to the company are not encouraging. For instance, the company is likely to produce products that are substance. A case in point, in 2006, in Canada and India, the company was accused on producing

Tuesday, October 29, 2019

Capital Punishment Term Paper Example | Topics and Well Written Essays - 3500 words

Capital Punishment - Term Paper Example From the research it can be comprehended that the doctrine of birth and death are the most obvious and the unpredictable events in the Nature. Since time immemorial such has been the nature of occurrence. With the spread of civilizations, the greed and lust of mankind reached an epitome and uncontrolled desire of achievement lead to loss of human values. The seriousness of the degradation leads to crimes, wars, battles and loss of innumerable human life. The concept of punishment came into existence among humans and even life of people was not spared in providing penalty for their ill deeds. The age –old theory of capital punishment was immensely popular among the Phoenicians, Persian, Egyptians, Romans, Greeks, Chinese civilization, where the brutal act of convict prosecution was done by taking away their life. The process of killing was carried out in horrendous fashion, which turned the punishment to be more excruciating. Modes of capital punishment were innovated with diff erent procedures and the shameful act was carried out unremittingly. Ironically the modern era also did portray their interest and used modern technologies to kill the convicts in atrocious manner. Significantly the act of capital punishment was even carried among the juveniles till the last decade, and surprisingly the proclaimed super power developed nations of the world were a part of this severe in-humanitarian policy. Thesis Statement Capital punishment should be abolished from the world and in particular the act of juvenile capital punishment needs to be barred, as this extreme measure does not preclude the miscreants from committing further crimes. Capital punishment: A brief history The history of Capital punishment or death penalty is quite enriched with events and the start of the timeline of capital punishment begins in eighteenth century in Babylon under the regime of King Hammaurabi. The law related to death penalty covered 25 different crimes. Crucifixion, drowning, im palement, beating to death were some of the measures of providing capital punishment. In the sixteenth century, burning, beheading, drawing and quartering carried out executions. 222 crimes were listed under the execution of capital punishment in Britain, which even included mere acts of cutting down a tree. Lingering death was provided to the serious convicts on account of heinous crime where as lesser degree of criminal acts by the convicts resulted in quick and painless death (Introduction to the death penalty, n.d). In China during the medieval period many cases of death through thousand cuts and slow slicing were noted. The colonist in America induced the capital punishment in the state and 12 capital crimes were identified. The range of capital punishment varied across different part of the states. Some of the states provided limited control. The Northern colony limited its use. Idolatry, blasphemy, traitors were dealt under the jurisdiction of capital punishment. In spite of the less enthusiasm followed in some parts of America regarding capital punishment, but the massive colonization in America made capital punishment popular all over the country. The major reason cited for the implementation of capital punishment was to control the rate of occurrence of crime. However in the end of eighteenth century, only incidents of first-degree murders were punished till death. In the southern states the punishment was imposed to control on the actions of slaves. Evidence of racial discrimination prevailed in the process of atonement as the white people committing same sort of acts was relieved by mere compensation whereas the law of capital punishment was enforced on the other civilians of the society. The age-old tradition of capital punishment continued to leave its impact in the present modern era. Boundary of capital punishment though reduced and imposed on serious crimes, new methods were invented to carry on with the execution. Guillotine, Gas chambers, el ectric chairs, lethal injections became popular as modes of homicides. The incidents of capital punish

Sunday, October 27, 2019

Types of Cyber Crime and Strategies for Prevention

Types of Cyber Crime and Strategies for Prevention Crimes In cyber Age And Its Response By Indian Judiciary Table of abbrevaitions AIR All India Reporter AP Andhra Pradesh Art. Article Bom. Bombay ed. Edition Ltd. Limited. P. page number Pat. Patna SCC Supreme Court Cases SCR Supreme Court Reporter Sec. Section Crimes In cyber Age And Its Response By Indian Judiciary Introduction The advent of the third millennium has brought in an era of information society. The new era is the result of rapid changes brought about by the new technology and the cyber world. Obviously the information society offers vast scope and opportunities to human beings to identify information, to evaluate information, and to exchange information for the benefits of the citizens the world over. The in formation technology provides for a new environment, new work culture, new business links and trading networks. It allows information and knowledge based work to be located anywhere. It is virtually transforming and revolutionizing the world. The information technology is a double-edged sword, consistently presenting us with benefits and disadvantages. The increasing opportunities for productivities, efficiency and worldwide communications brought additional users in droves[1]. Today, the internet is a utility, analogous to the electric company and ‘.com has become a household expression. The reliability and availability of the internet are critical operational considerations. Activities that threaten these attributes like spamming, spoofing, etc, have grave impacts on its user community. Any illegal act, for which knowledge of computer technology is essential for its perpetration, investigation, or prosecution, is known as cyber crime. Among the various problems emerging out of the internet are the menace of hackers, cyber terrorism, spamming, Trojan horse attacks, denial of service attacks, pornography, cyber stalking etc. Through this paper the researcher will try to study the problem of cyber stalking, cyber defamation, various types of data theft and the laws relating to it. An effort will also be made to recommend some suggestions to fight these dangerous problems, with the response of Indian judiciary to it. Cyber staking Cyber stalking, has been defined as the use of electronic communication including, pagers, cell phones, emails and the internet, to bully, threaten, harass, and intimidate a victim. Moreover, it can also be defined as nothing less than emotional terrorism.[2] Cyber stalking can take many forms. However, Ellison (1999) suggests, cyber stalking can be classified by the type of electronic communication used to stalk the victim and the extent to which the communication is private or public. Ellison (1999) has classified cyber stalking as either ‘direct or ‘indirect. For example, ‘direct cyber stalking includes the use of pagers, cell phones and the email to send messages of hate, obscenities and threats, to intimidate a victim. Direct cyber stalking has been reported to be the most common form of cyber stalking with a close resemblance to offline stalking (Wallace, 2000). Why people do it? Generally, to be defined as stalking the behaviour must be unwanted and intrusive. Another important point is that the stalker must also have an intense preoccupation with the victim. The range of behaviour involved in stalking can be broadly grouped in three categories. Firstly, there is following, which includes frequenting workplaces and homes, maintaining surveillance, and engineering â€Å"coincidences.† Secondly, there is communicating—by phone, letters, cards, graffiti, gifts, and, Increasingly, electronic mail and the internet (â€Å"cyber stalking†).Often the stalker will order goods and services on the victims behalf. Finally comes aggression or violence, in which stalkers threaten their victims, harass their families, damage their property, make false accusations about them, and cause sexual or physical injury. Sexual attractions and motives are other very important reasons for cyberstalking. In USA, the federal law enforcement agencies have encountered numerous instances in which adult paedophiles have made contact with minors through online chat rooms, established a relationship with the child, and later made contact for the purpose of engaging in criminal sexual activities.[3] Nature of cyber staking The nature of cyber stalking is ascertains by the medium which is used for its execution. According to †¦ cyber stalking had been classified into four kinds[4] a) E-mail stalking b) Chat stalking c) Bulletin board systems d) Computer stalking. Email stalking Electronic mail is an electronic postal service that allows individuals to send and receives information in matter of seconds. This sophisticated use of telephone lines allows communication between two people who may or may not know each other but can ‘speak to each other using a computer. In general Email is an insecure method of transmitting information or messages. Everyone who receives an email from a person has access to that persons email id. With some online services as AOL, a persons screen name is also an email address. In addition, when a person posts an item on a newsgroup, that pesons email id may be available to anyone who reads that item. It is unsurprising, then, that email is a favoured medium for cyber stalkers. Technologically sophisticated email harassers send ‘mail bombs, filling a persons inbox with hundreds or even thousands of unwanted mails in the hope of making the account useless. Others send electronic viruses that can infect the victims files.[5] Chat stalking A chat room is a connection provided by online services and available on the internet that allows people to communicate in real time via computer text and modem. Cyber stalkers can use chat rooms to slander and endanger their victims. In such cases the Cyber stalking takes on a public rather than a private dimension. As live chat has become more popular amongst users of the internet with tools such as internet relay chat (IRC), it has also become more popular as a medium through which stalkers can identify and pursue their prey. When a person enters a chat room, his screen name joins the list of names of others in the group. Depending on the nature of the chat software, that person can address others in the room and vise versa as a part of the group discussing from a smaller group in a private chat room or send private, one to one instant messages to others anytime.[6] During ‘chat, participants type instant messages directly to the computer screens of other participants. When a person posts a message to a public news group this is available for anyone to view copy and store. In addition, a persons name, email address and information about the service provider are easily available for inspection as a part of the message itself. Thus, on the internet, public messages can be accessed by anyone anytime- even years after the message were originally written. In IRC, the harasser may chose to interrupt a persons chat electronically or otherwise target a chat system, making it impossible for someone to carry on a conversation with anyone else. The Cyberstalker can engage in live chat harassment or abuse of the victim( otherwise known as ‘flaming) or he/she may leave improper message o the message board or in chat rooms for or about the victim. Bulletin board systems A bulletin board system (BBS) is a local computer that can be called directly with a modem[7]. Usually they are privately operated and offer various services depending on the owner and the users. A bulletin board allows leaving messages in group forums to be read at a later time. Often a BBS is not connected to a network of other computers, but increasingly BBSs are offering internet access and co Cyber stalkers area using bulletin boards to harass their victims.[8] Online have been known to known to post insulting messages on electronic bulletin boards signed with email addresses of the person being harassed. The Cyber stalker can also post statements about the victims or start rumours which spread through the BBS. In addition a Cyber stalker can ‘dupe another internet users into harassing or threatening a victim by posting a controversial or enticing message on the board under the name , phone numbers or email address of the victim, resulting in subsequent responses being sent to the victim.[9] Computer stalking With computer stalking, cyber stalker exploits the internet and the windows operating system in order to assume control over the computer of the targeted victim. An individual ‘windows based computer connected to the internet can be identified, allowing the online stalker to exercise control over the computer of the victim. A cyber stalker can communicate directly with his or her target as soon as the target computer connects to the internet. The stalker can also assume control over the victims computer and the only defensive option for the victim is to disconnect and relinquish his or her current internet address.[10] An example of this kind of cyber stalking was the case of a woman who received a message stating ‘ Im going to get you. The cyber stalker then opened the womans CD-ROM drive in order to prove that he had control over her computer. cyberstalking trends and statistics offenders Previous studies that have investigated stalking offenders by and large, have focused on the offline stalking offender Regardless for the offenders group such as ‘simple, ‘love or ‘erotomanic statistics reports, male offenders to account for the majority of offline stalking offenders. Working to Halt Online Abuse (2000) statistics also support the gender ratio of offenders claiming, 68% of online harassers/cyber stalkers are male. Furthermore, common social and psychological factors have been found within offline stalking offender population. For example, social factors such as the diversity in socio-economic backgrounds and either underemployment or unemployment have been found significant factors in offline stalking offenders[11]. In a research done on young stalkers between 9 and 18 years of age little difference was found between young and adult offline stalking offenders. For example, the majority of offenders were male, had some form of previous relationship with the victim and experienced social isolation.[12] Victims Currently, there are limited studies on the victims of cyber stalking. Although, anyone has the potential to become a victim of offline stalking or cyber stalking, several factors can increase the statistical likelihood of becoming a victim. Studies[13] that have investigated offenders of offline stalking, have found some common factors within the selection of victims. For example, contrary to public belief, a large proportion of stalking victims are regular people rather than the rich and famous. Goode claimed[14], up to 80% of offline stalking victims are from average socio-economic backgrounds. In addition, the statistical likelihood of becoming a victim increases with gender. Working to Halt Online Abuse (2000) reports, 87% of online harassment/cyber stalking victims are female. However, victim gender statistics may not represent true victims, as females are more likely to report being a victim of online harassment/cyber stalking than males. Although studies have shown that the majority of victims are female of average socio-economic status, studies have also shown that offline stalking is primarily a crime against young people, with most victims between the age of 18 and 29.[15] Stalking as a crime against young people may account for the high prevalence of cyber stalking victims within universities. For example, the University of Cincinnati study showed, 25% of college women had been cyber stalked.[16]. Nevertheless, previous relationships have been shown to increase the likelihood of being stalked offline. For example, it was reported, 65% offline victims had a previous relationship with the stalker[17]. Although studies of offline stalking claim the majority of victims have had a previous relationship with the stalker Working to Halt Online Abuse Statistics[18] fails to support a previous relationship as a significant risk factor, for online harassment/cyber stalking. For example, 53% of victims had no prior relationship with the offender. Therefore, the risk factor of a prior relationship with the stalker may not be as an important factor in cyber stalking, as it is in offline stalking. Psychological effects of cyberstalking Currently, there are few studies on the psychological impact on victims. However, Westrup[19]studied the psychological effects of 232 female offline stalking victims. He found out that the majority of victims had symptoms of PTSD, depression, anxiety and experienced panic attacks. Additionally, it was found that 20% of victims increased alcohol consumption and 74% of victims suffered sleep disturbances[20]. Nevertheless, social and psychological effects of offline stalking cannot be separated as social effects can impact on psychological effects and psychological effects can impact on the social effects. Although the majority of studies have focused on the offline stalking victims, there is no evidence to suggest that cyber stalking is any less of an experience than offline stalking (Minister for Justice and Customs, 2000), As shown, there are many common themes between offline stalking and cyber stalking. For example, offenders are most likely to be male and offline stalking or cyber stalking is the response to a failed (offline/online) relationship. Additionally, young females account for the majority of victims. Furthermore, victims experience significant social and psychological effects from offline stalking or cyber stalking.[21] Legal responses to cyberstalking Cyber stalking is are a relatively new phenomenon and many countries are only now beginning to address the problem. India has also witnessed cases of cyber stalking, cyber harassment and cyber defamation. However, as there is no specific law or provision under the IT Act, a number of these cases are either not registered or are registered under the existing provisions of Indian Penal Code—which are ineffective and do not cover the said cyber crimes.[22] Since its promulgation, the IT Act 2000 has undergone some changes. One big change is the recognition of electronic documents as evidence in a court of law. Market players believe this will go a long way in giving encouragement to electronic fund transfers and promoting electronic commerce in the country. However, all hope is not lost as the cyber crime cell is conducting training programmes for its forces. It also has plans to organize special courses for corporate to combat cyber crime and use the IT Act effectively. Cyber defamation Defamation can be understood as the intentional infringement of another persons right to his good name. It is the wrongful and intentional publication of words or behavior concerning another person, which has the effect of injuring that persons status, good name, or reputation in society. It is not defamatory to make a critical statement that does not have a tendency to cause damage, even if the statement turns out to be untrue[23]. In this case a claim for malicious falsehood[24] may be raised. Another key feature of the Internet is that users do not have to reveal their identity in order to send e-mail or post messages on bulletin boards. Users are able to communicate and make such postings anonymously or under assumed names. This feature, coupled with the ability to access the internet in privacy and seclusion of ones own home or office and the interactive, responsive nature of communications on the Internet, has resulted in users being far less inhibited about the contents of their messages resulting in cyber space becoming excessively prone to defamation. What is defamatory? As to what is defamatory; Permiter v. Coupland[25] and Youssoupoff v. Metro Goldwyn Mayer Pictures Ltd[26] lay down that it is a publication without justification or lawful excuse, which is calculated to (meaning â€Å"likely to†) injure the reputation of another by exposing him to â€Å"hatred, contempt, or ridicule†[27] and make the claimant â€Å"shunned and avoided†. Then in Sim v. Stretch[28] the definition was widened to include the test whether the words tend to lower the plaintiff in the estimation of the right-thinking members of society in general. A persons good name can only be damaged if maligning statements are made to someone other than that person; that is, the defamatory statement must be disclosed to a third person, thereby satisfying the requirement of publication. Thus the law of defamation places a heavy burden on the defendant. All that a plaintiff has to prove, in a defamation action, is the publication of defamatory matter. The onus then lies on the defendant to prove innocence. In essence, the law on defamation attempts to create a workable balance between two equally important human rights: The right to an unimpaired reputation and the right to freedom of expression. In a cyber society, both these interests are increasingly important. Protection of reputation is arguably even more important in a highly technological society, since one may not even encounter an individual or organization other than through the medium of the Internet. Jurisdiction It is a fact that the tried and true real world legal principles do not apply in the digital generation. Even seemingly ubiquitous, time honoured principles must be examined, including whether a court has the power to exercise jurisdiction over a defendant because of the defendants ties to or use of the Internet or Internet related technologies. This jurisdictional rethinking requires us to address the concept that involves the right of the sovereign to exert its power and control over people or entities that use the Internet One of the complexities of the Internet is the fact that Internet communications are very different than telephone communications. The telephone communication system is based on circuit-switching technology, where a dedicated line is allocated for transmission of the entire message between the parties to the communication. A dedicated line, on the other hand, does not accomplish Internet communications. A message sent from an Internet user in India may travel via one or more other countries before reaching a recipient who is also sitting at a computer in India. Therefore, the lack of a physically tangible location and the reality that any Internet communication may travel through multiple jurisdictions creates a variety of complex jurisdictional problems[29]. Position in india Cases of cyber defamation do not fit neatly in the accepted categories of crimes. They represent harm of greater magnitude than the traditional crimes and of a nature different from them. Unlike the traditional crimes, they are not in the shape of positive aggressions or invasions[30]. They may not result in direct or immediate injury; nevertheless, they create a danger, which the law must seek to minimize. Hence, if legislation applicable to such offences, as a matter of policy, departs from legislation applicable to ordinary crimes, in respect of the traditional requirements as to mens rea and the other substantive matters, as well as on points of procedure, the departure would be justified[31] An effort is still wanted to formulate an international law on the use of Internet to curb this imminent danger of cyber crimes and to achieve a crime free cyber space. Defamation laws should be sufficiently flexible to apply to all media. The difficulty is that the defamation laws world over were principally framed at a time when most defamatory publications were either spoken or the product of unsophisticated printing. We do need a stronger legal enforcement regime in India to combat the increasing cyber crimes or in other words, efficacy in dispensation of justice will be instrumental in curtailing such activities. The position in Indian law is not very clear and amendments should be brought to Section 67 of the Information Technology Act, 2000[32] and also to Section 499 of the Indian Penal Code[33], by expressly bring within their ambit offences such as defamation in cyber space, which is certainly a socio-economic offence. Internet Banking Fraud The concept of internet banking was introduced to facilitate the depositors to have access to their financial undertakings globally. But every good thing has its own demerits; the introduction of this system was coupled by a number of fraud incidents in which the money of depositors was embezzled by the net swindlers popularly known as hackers.[34] Digital Extortion For any company doing business on the Internet, its the sound of doom: a computer voice warning of an inbound attack. Call it a cyber-shakedown: A hacker threatens to shut down a companys Web page, unless the business pays up.[35] Digital Extortion can be defined as, â€Å"Illegally penetrating through the system of an enterprise and then compelling it to pay substantial amounts in lieu of their secret data or to save their system from being wiped out by the hackers.† In a recent incident, Security researchers at Websense were trying to learn why a clients files were scrambled when they found a note demanding $200 for the electronic key to the files. The money was to be sent to an online payment service. The data was recovered without paying the ransom, but experts are worried that more sophisticated attacks could be more serious.[36] Credit Card Frauds Credit Card popularly known as plastic money has came up as a panacea for the troubles of carrying huge amount of money in the pocket. The credit card embodies two essential aspects of the basic banking functions: the transmission of payments and the granting of credit. But again the usage of this technology has brought in new forms of crimes with the fraudsters employing entirely new technologies to manipulate this technology for their illegal economic gains because unlike paper money, it was not anonymous and the usage of credit card can be traced. The Indian Legal Response to Data Theft Related Cyber Crimes In the past few years, India has emerged as a leader in information technology. Also, there has been an explosion of the BPO industry in India, an industry which is based primarily on IT[37], an industry where there is a huge risk of data theft since the business primarily is based on huge amounts of sensitive data of the customers. The numbers of computer literates have also grown at a rapid pace. The prices of computers and other peripherals have slashed drastically. Dial-up and Broadband connections, both are found and are easily accessed at cheap rates. All this has resulted in making the middle-class in India computer literate as well. Hence, as a result of all these developments, the Indian Parliament enacted the Information Technology Act, 2000. The researchers will discuss some of the remedies provided for in brief and has also provided certain suggestions as to where the act can be amended. 1) Penalty for Tampering with Computer Files As discussed already, Industrial espionage may also include tampering with the computer files to slow down the system or corrupt databases. Section 65 of the Act defines this sort of offence and prescribes an imprisonment of 3 years or fine extending to two lakh rupees. 2) Penalty for Hacking This also relates to data theft and industrial espionage. Hacking is where a person hacks into a computer resource and in any way destroys, deletes or alters any information is to be punished with an imprisonment of up to three years or a fine extending up to two lakh rupees. For this the requirement of mens rea, i.e. metal element is required. 3) Penalty for Damage of Computer, Computer System, etc. This is the section which can be said to deal directly with data spying. Section 43 says that whosoever without the permission of the owner accesses any computer ,downloads, copies or extracts any data, computer data base or such information is liable to pay compensation not exceeding rupees one crore. It takes care of all the possibilities arising out of such situations. In this case the condition of mens rea is not required, i.e. this section imposes a strict liability on every unauthorized access. 4) Penalty for breach of Confidentiality and Privacy Now, this section seeks to bring to the book people who secure access to any electronic record etc. and without the consent of the person concerned disclose the information to a third party. Shortcomings of the Act: * No steps to combat Internet Piracy- There is absolutely no legislation to combat the menace of piracy which has India firmly in its iron grip .As discussed by the researchers above India is one of the countries where there is rampant violation of copyrights. Pirates sell copyrighted material openly, on the streets, yet nothing can be done about it. * Power of Police To Search Limited to Public Places-Police officers can search public places and arrest any person having committed a cyber crime but it is seldom that such crime takes place in the open. Hence, the police have been limited in its powers by the act. * Issue of Privacy and Surveillance-There is no legislation that protects the citizens from having their physical features being examined and the details stored without their consent. When biometric systems gain currency in India the old argument of Privacy v. Security will have to be waged as it has been waged in the US. As we have seen, there are various aspects of data theft, not only the conventional one, though that remains one of the most well-known ways of data-theft, i.e. data spying .In todays world there is no one way of defining data. Data can still be in the form of a spreadsheet and also you can call information about a person including his physical features, which if they fall into the wrong hands can cause identity theft and can be used in various other ways to commit crime. The companies should monitor their employees, before hiring their employees and after hiring them. Employees should be given incentives and good salaries so that they resist the temptation to give away information to rival companies. Since it is a capitalistic system, competition will always remain, and companies will sink to unfair competition. Hence, unfair practices will always exist, and to minimize those companies should take all precautions necessary. As far as the laws concerning internet piracies go, not only in India, but the entire world needs better and more stringent laws that protect the copyright of intellectual property and stop the rampant copyright violation that has engulfed the whole world. Copyright laws need to be strengthened or else creativity will suffer since the artistes or investors will have no incentive. The music, film and publishing industry have all suffered heavily, to the tune of billions. India, also, needs more legislation, and most importantly of all, it needs to find ways to implement the existing laws, for example giving the police powers to search private places in case of suspicion of cyber crime. The definition of hacking needs to be modified and narrowed, since in the existing legislation the definition includes too many unnecessary acts. A lot of work regarding the use of biometric technology has to be done. The problem which the US face now (as has been discussed above) is the problem which is going to arise now, in India. Though biometric technology is definitely the way to go in view of the increased risk of terrorist attacks all around the globe, but there are serious issues of, not only violation of privacy, but also that of data theft, not only by criminals, but by the state itself Challenges of information technology to existing legal regime The impact of Internet on the existing legal regime can be well appreciated by the fact that the US Congress had introduced more than 50 bills pertaining to Internet and e- commerce, in the first three months of 1999 alone.[38] The issues, which need to be addressed urgently, are security of transactions, privacy, property, protection of children against an easy access to inappropriate content, jurisdiction, and validity of contracts, Procedural rules of evidence and other host of issues. Constitutional issues The issues raised by the advent of the Internet relevant to the constitutional lawyers are freedom of speech and privacy. The questions regarding the freedom of speech, which need to be answered, are: 1. Is publication, of information on the Internet equivalent to the speech and expression made by an ascertained person in real space within the political boundaries? 2. If it amounts to speech and expression should it be then regulated? 3. If it is to be regulated, should it enjoy the freedom available to press and thus subject to restrictions of article 19(2) or be treated as broadcast media, which is subject to governmental regulations? 4. Should we consider Internet a different media unparallel with the traditionally known and have to come up with different legal regime? In the developed world, a record bank is created in which individuals record image is stored. This record image is based on the information collected from different sources pertaining to an individual who remains unaware of the method, process and sources of record image[39].This record image has far reaching implications for an individual who may apply for insurance, medical care, credit and employment benefits.[40] The government also maintains electronic files, which contain sensitive information. This information is shared among the government agencies, private organisations and between the government and private sector, which in fact is facilitated by the technology itself. There is a possibility that the data collected from different sources to prepare a profile is outdated, inaccurate or out rightly false. Translating information to make it computer readable further compounds the problem. This increases the possibility of inaccuracies. Thus the objection is not that the inform ation has been collected with the knowledge of the concerned person, but the objection lies in the fact that an inaccurate information has been collected which will be repeatedly used to evaluate character, reputation, employment chances and credit worthiness of an individual who was not given chance to go through the information before it is finally stored, nor does he know the source where from the information has been collected. The Supreme Court of India has found article 21 flexible enough to encompass right to privacy within its fold. In Peoples Union for Civil Liberties v. Union of India[41] the apex court held the right to privacy a fundamental right. The apex court reminded that this right has its genesis in international instruments more particularly in articles 17[42]and 12[43] of the international Covenant on Civil and Political Rights, 1948, respectively to which India is a signatory and has to respect these instruments as they in no way infringe the domestic laws.[44] There are no two opinions about the fact that the Internet is going to be on central stage in future where an individual cannot be even in a take it or leave it situation. Its pervasiveness, speed and efficiency will provide little scope t

Friday, October 25, 2019

Financial Analysis of Oracle Corp Essay -- essays papers

Financial Analysis of Oracle Corp INTRODUCTION Background and History Oracle Corporation is a technology company that supplies software for the use of information management. They develop, manufacture, market and distribute computer software that helps other corporations manage their data so they can better grow and prosper. In 1977, Larry Ellison, Bob Miner, and Ed Oates founded System Development Laboratories. After being inspired by a research paper written in 1970 by an IBM researcher titled â€Å"A Relational Model of Data for Large Shared Data Banks† they decided to build a new type of database called a relational database system. The original project on the relational database system was for the government (Central Intelligence Agency) and was dubbed ‘Oracle.’ They thought this would be appropriate because the meaning of Oracle is source of wisdom. In 1978, Software Development laboratories moved from their offices in Santa Clara to ones in Menlo Park, the heart of the Silicon Valley. To better explain what they did, they changed their name to Relational Software Inc., or RSI. In 1979, RSI developed and distributed its first commercial SQL database V2, there was no version 1. In 1982, RSI changed its name to Oracle Systems Corporation, which later changed again to Oracle Corporation. They reasoning behind this was that they thought by naming the company after the product it would help the company obtain more recognition. In 1983, Oracle decided to make the Relational Database Management System (RDBMS) portable. They then introduce V3, the first portable database to run on Personal Computers, minicomputers and mainframes. In 1984, Oracle Corporation’s revenues reach $12.7 million and they move into a new eighty-four thousand square foot building in Belmont, CA. They also went international by working with companies in Canada, Netherlands, and a limited portion in the United Kingdom. In 1985 they hit $23 million in revenues and expanded to Austria, Germany, Japan, Sweden, and Switzerland. Their Initial Public Offering was on March 12, 1986, the same year their revenues reached $55 million. The stock opened at a price of $15 and closed at $20.75. Oracle Corporation expanded to Australia, Finland, France, Hong Kong (limited), Norway, and Spain. In 1987, Oracle’s revenues were $131 million, as ... ...rs, setting a good trend for the corporation. They also have a very low debt-to-equity ratio, indicating that they have enough equity to easily pay off any funds acquired from creditors. As a creditor I would feel safe in lending them funds for any future projects or endeavors. Bibliography: WORKS CITED Oracle Corporation 2000a. Investor Relation – Corporate History. 20 July. Internet: http://www.oracle.com/corporate/. Oracle Corporation 2000b. Investor Relations – Financials. 21 July. Internet: http://ww.oracle.com/corporate/. Oracle Corporation 2000c. 1999 Annual Report – Introduction. 21 July. Internet: http://www.oracle.com/corporate/annual_report/99/index.html. Oracle Corporation 2000d. Financial Highlights. 22 July. Internet: http://www.oracle.com/corporate/annual_report/99/financial/index.html?finhgh99.html. Moyer, Charles R., and McGuigan, James R., and Kretlow, William J. 1998. Contemporary Financial Management. South-Western College Publishing: Cincinnati, Ohio, 64-106. America Online, Inc. 2000. Personal Finance – Investment Research. 30 July. http://research.web.aol.com/index.adp?T1=orcl&item=4.

Thursday, October 24, 2019

Disproportionate Representation of African American Students in Special Education Essay

Abstract In 2011 there is still disproportionate representation of African American Students in special education classes. This can be defined as conflict in the education environment because, government legislation mandates that No child be left behind, yet African American students, males in particular, are disproportionately being just that, left behind. The purpose of this study is to discuss disproportionate representation. What it means and who it affects most will be identified. Contributing factors such as socioeconomic status and race and ethnicity will also be discussed. Possible solutions in the form of equity and early intervention will be discussed as well. Lastly with these factors identified, it is the hope that feasible and probable solutions can be reached or at least recommended. Review of Literature For more than 40 years the topic of Disproportionate representation has been addressed by scholars. The data collected has been qualitative and quantitative. According to Bollmer, Bethel, Garrison-Morgen, and Brauen â€Å"The issue of disproportionate identification and placement of racial/ethnic minorities in special education has been investigated extensively (Bollmer, Bethel, Garrison-Mogren, & Brauen, 2007). † They go on to share that the risk ratio, which is used to compare one racial/ethnic groups likelihood of receiving special education and related services to all other students is one of the most useful tools in this research (Bollmer, Bethel, Garrison-Mogren, & Brauen, 2007). Sometimes referred to as disproportionality, disproportionate representation covers both over and underrepresentation. Overrepresentation happens when the percentage of students from one group is larger than expected based on their numbers in the general population. Underrepresentation is occurring when a specific group of students are involved at a lower rate than their numbers in the general population. According to Beratan â€Å"The disproportionate representation of minority students in special education is as clear of a racist outcome as one can find. The Individuals with Disabilities Education Improvement Act of 2004 (IDEA) formally recognizes such disproportionate representation as a problem in special education (Beratan, 2008). † He goes on to share the following thoughts and statistics: A) Greater efforts are needed to prevent the intensification of problems connected with mislabeling and high dropout rates among minority children with disabilities. B) More minority children continue to be served in special education than would be expected from the percentage of minority students in the general school population. C) African-American children are identified as having mental retardation and emotional disturbance at rates greater than their White counterparts. D) In the 1998-1999 school year, African-American children represented just 14. 8 percent of the population aged 6 through 21, but comprised 20. 2 percent of all children with disabilities. E) Studies have found that schools with predominately White students and teachers have placed disproportionately high numbers of their minority students into special education (Beratan, 2008). Disproportionate representation not only speaks to the overrepresentation of African-American students labeled as learning disabled, but also to the gross lack of African-American students being labeled gifted. Bonner and Jennings share â€Å"According to the literature, African American males have been disproportionately place in special education classrooms and underrepresented in gifted and talented programs (Fred A. Bonner I. M. , 2007). † Bonner and Jennings go on to say that â€Å"The story of the African American male in gifted and talented programs is one of widespread underrepresentation (Fred A. Bonner I. M. , 2007). † Bonner and Jennings further share that lack of instructor referrals, substandard performance on standardized norm-referenced test scores and student and family choice contributed to the underrepresentation of African American males in gifted programs (Fred A. Bonner I. M. , 2007). The  authors continue to expound on this phenomenon by stating â€Å"Due to the potential for underachievement among African American students in first, second, and third grade, a time in which most identification processes for these programs are implemented, these students often go unidentified (Fred A. Bonner I. M. , 2007). † Artiles and Bal maintain that African American males and Native American students appear to be the most affected groups at the national level (Artiles & Bal, 2008). While disproportionate representation has touched all minority groups, African American males in particular have continually been identified as the most over represented population in Special education. Several factors are said to contribute to the disproportionate representation of minority students in Special Education. Yolanda Anyon shares: Barton and Tomlinson (1981) argue that the identification of students with learning disabilities and subsequent placement in special education is a form of social control to minimize problem behaviors in mainstream classrooms. Other researchers have documented that teachers and principals refer children for special needs assessment who are causing the biggest problems in the classroom be it passivity, failure to learn material or aggressiveness (Anyon, 2009). She further goes on to share â€Å"in this way, special education primarily serves social control functions in schools as it legitimizes the removal of â€Å"deviant† students from regular classrooms (Anyon, 2009). † Socioeconomic status is said to increase the likelihood that student will be placed in special education. It is also said that race and ethnicity of students can be a large variable that causes excessive amounts of students of color to be referred and placed in special education. Skiba and fellow scholars share: Among the most longstanding and intransigent issues in the field, the disproportionate representation of minority students in special education programs has its roots in a long history of educational segregation and discrimination. Although national estimates of disproportionality have been consistent over time, state and local estimates may show varying patterns of disproportionality. A number of factors may contribute to disproportionality, including test bias, poverty, special education processes, inequity in general education, issues of behavior management, and cultural mismatch/cultural reproduction (Skiba, et al. , 2008). They further go on to say that â€Å"special education was born out of, and owes a debt to the civil rights movement†, alluding to the fact that both the inspiration for and the strategies used by those whose work resulted in the initial national special education legislation came from the civil rights movement (Skiba, et al., 2008). They also maintain that â€Å"concerns about racial inequity were central to litigation that led to the promulgation of the first special education legislation (Individuals With Disabilities Education Act, IDEA) (Skiba, et al. , 2008). The scholars aptly point out the irony of racial disparity rates of special education service remaining one of the key indicators of inequity in our national educational system (Skiba, et al. , 2008). An additional contributing factor that they share is â€Å"A second factor that might contribute to a disproportionate rate of representation in special education among students of color are sociodemographic factors associated with economic disadvantage (Skiba, et al. , 2008). Skiba, et al, give this insight into the role of poverty in disproportionate representation: In order to directly assess the contribution of poverty to the disproportionate representation of African American students in special education, Skiba et al.(2005) studied the relationship of special education enrollment, race, socioeconomic and demographic factors, and test score outcomes in a sample of 295 school districts in a Midwestern state. Across ordinary least squares and logistic regression equations, poverty made a weak, inconsistent, and often counter-intuitive contribution to the prediction of disproportionality across a number of disability categories (Skiba, et al. , 2008). While there are no definitive causes of the issue of disproportionate representation the above named ones come up in study after study which lends ample credence to them as real and possibly surmountable issues. â€Å"It might well be expected that the students whose educational opportunities are limited will be more likely to be referred for special education services (Skiba, et al. , 2008). Another point expressed by Skiba and fellow scholars is: Of the possible links between general education practices and special education disproportionality, however, only the proportion of culturally consonant teachers in the teaching force has been directly investigaed. Serwatka, Derring and Grant (1995) found that as the percentage of African American teachers increased, overrepresentation of African American student in the emotionally distrubed category decreased. Similarly, in a cross-state comparison, Ladner and Hammons (2001) found that the discrepancy of African American and white rates of eligibility for special education rose in direct proportion to the percentage of the teaching force that was White, especially in districts with a White percentage of more than 60% (Skiba, et al., 2008). Just as there are no definitive causes identified, there are not any fool proof solutions laid out for correcting the issue of disproportionate representation. There are varying thoughts about strategies such as the following: If disproportionality in special education is multiply determined, no single intervention strategy can be universally relied on to reduce racial disparity. Rather, complex causality clearly suggests the need for comprehensive and multifaceted assessment and intervention plans. In particular, the possibility that the determinants of disproportionality are locale-specific suggests that remediation plans must be driven by local needs assessment capable of identifying unique local patterns (Skiba, et al. , 2008). Early intervention approaches are said to possibly reduce disparities to the level that economic disadvantage is at work (Skiba, et al. , 2008). â€Å"Early intervention would not be expected to address systemic failures or bias and would hence fail to address disproportionality that is due to institutional inequity (Skiba, et al. , 2008). † Researchers are beginning to look at the problem of disproportionate representation within the arena of equity studies (Artiles & Bal, 2008). According to the authors â€Å"researchers, practitioners, and policy makers continue to debate this problem and critical questions remain unanswered (Artiles & Bal, 2008). They go on to question the ability to, or lack thereof, explain how the phenomenon of disproportionate representation consistently remains in existence. Artiles and Bal have raised the following questions â€Å"How have researchers approached the study of this problem, and what are some key gaps in this knowledge base? Does the problem exist in the United States only (Artiles & Bal, 2008)? † These scholars have chosen to conduct research on â€Å"the problem of disproportionate representation as related to equity concerns in educational systems’ responses to difference (Artiles & Bal, 2008). Artiles and Bal share the following about equity in the United States educational system: Educational equity in the United States has aimed historically to enhance access and participation for students considered different. For instance, programs were created to address the educational needs of students who have different ability levels or whose proficiency in English is limited (i. e. , special education and bilingual education, respectively) (Artiles & Bal, 2008). They further go on to share that special education in the United States was created as an answer to some of the issues of difference: The creation of special education was a landmark achievement in the attention of students considered different on the basis of ability. Special education legislation entitled these students to free and appropriate public education, individualized educational programs, due process, and education in the least restrictive environment. Interestingly, an increasingly louder debate has emerged in the past 40 years in the United States about the disproportionate representation of ethnic minority and poor students in special education (Artiles & Bal, 2008). Laws that require states report placement data as it pertains to socioeconomic and racial lines to stay abreast of the problem of disproportionality have been imposed. States and school districts that find themselves faced with the issue of disproportionate representation are required to take remedial actions to address it (Artiles & Bal, 2008). If equity is the solution and special education was designed to level the playing field, why then the issue of disproportionality? This same question is posed by Artiles and Bal, â€Å"But why then is placement in programs that purportedly address equity issues for students with different ability levels considered a problem when it involves other groups of different students, namely, ethnic minorities and poor students (Artiles & Bal, 2008). † While that is a very rational and valid line of questioning, it is far too complicated to answer without factoring in the historical issues that plagued African American students long before special education legislation was implemented. Conclusions Disproportionate representation of African Americans in special education is not a new phenomenon. It has been studied and researched for well over 40 years. Whether it is referred to as disproportionality or disproportionate representation, the terminology covers both over and under representation within a group. While most of the research addresses overrepresentation, there is some out there that speaks to the underrepresentation of African Americans in gifted programs, more specifically African American males. There are no concrete reasons for this phenomenon, but several different factors have been considered contributing factors. Socioeconomic status and race and ethnicity are often the most discussed contributing factors. Special education having roots that stem back to civil rights legislation lends a great amount of credence to the belief that those two factors are probably the leading cause of disproportionate representation. The research shared a very specific accusation of how racism plays a very real part in disproportionate representation. Examples to that end were that studies have found that schools with predominately White students and teachers have placed disproportionately high numbers of their minority students into special education and African-American children are identified as having mental retardation and emotional disturbance at rates greater than their White counterparts. In regards to equity Skiba and fellow scholars give this advice to educators in regards to making effective interventions: Thus, educators and policy makers seeking effective interventions to close special education equity gaps must be willing to openly discuss and address issues of race, ethnicity, gender, class, culture, and language. Moreover, processes chosen to address inequity must have at their core a mechanism to ensure that the perspectives of all stakeholders, especially those of historically marginalized groups who have been the recipients of unequal treatment, are represented when interpreting data on racial and ethnic disparities (Skiba, et al. , 2008). As educators we must take heed to the information shared about disproportionality. Though this information is not new, it must continue to be shared as if it was. While this resarch was specifically about African Americans, other minorities are affected by disproportionate representation. I will be more cognizant of how I determine whether or not to suggest a student be tested for special education services. It is so easy to refer them, before taking the time to investigate the reasons behind the undesireable behavior. Works Cited Anyon, Y. (2009). Social Theories of Learning Disabilities: Understanding Racial Disproportionality in Special Education. Journal of Human Behavior in the Social Environment, 44-57. Artiles, A. J. , & Bal, A. (2008). The Next Generation of Disproportionality Research Toward a Comparative Model in the Study of Equity in Ability Differences. The Journal of Special Education, 4-14. Beratan, G. D. (2008). The song remains the same: Transposition and the disproportionate representation of minority students in special education. Race, Ethnicity and Education, 337-354. Bollmer, J. , Bethel, J. , Garrison-Mogren, R. , & Brauen, M.(2007). Using the Risk Ratio to Asess Racial/Ethnic Disproportionality in Special Education at the School-District Level. The Journal of Special Education, 186-198. Fred A. Bonner, I. M. (2007). Never Too Young to Lead: Gifted African American Males in Elementary School. Gifted Child Today, 31-35. Skiba, R. J. , Simmons, A. B. , Ritter, S. , Gibb, A. C. , Rausch, M. K. , Cuadrado, J. , et al. (2008). Achieving Equity in Special Education: History, Status, and Current Challenges. Exceptional Children, 264-288.

Wednesday, October 23, 2019

Stress Assessment Using Non Invasive Health And Social Care Essay

Stress is a physiological and psychological response to endangering state of affairss. Rapid socio-economical disagreement due to technological advancement and desire to accomplish luxury has led to emphasize. Although emphasis has a psychological beginning, it affects several physiological signals in the human organic structure like EEG, Heart Rate, Blood Pressure, Galvanic Skin Response, Reaction Time, etc. Hence there is a critical demand for stress appraisal. This paper reviews about experimental methods of emphasis appraisal utilizing EEG ( Electroencephalography ) and discusses approximately different methodological analysiss for patterning emphasis. Introduction The quickly increasing population with extremist betterment in engineering has increased cost of populating taking to feverish life style due to turning deadlines and demands in order to accomplish luxury life. This state of affairs has led to increasing emphasis degrees in people with turning demands for development of efficient stress appraisal systems. The term, emphasis, introduced by Selye, defined emphasis as â€Å" the non-specific response of the organic structure to any demand for alteration † . In general, emphasis is a â€Å" complex reaction form that frequently has psychological, cognitive and behavioural constituents † [ 1 ] . The emphasis can be measured and evaluated in footings of physiological psychological and physical responses. Questionnaires are normally used to deduce emphasis subjectively. Physiological alterations in the human organic structure can besides be used to measure emphasis. The biomarkers like Skin Temperature, Skin conductance, Blood force per unit area, Heart rate variableness, Respiration, EEG, EMG are used to mensurate emphasis. Previous researches have shown that these are efficient methods and produced acceptable truth rates. In this paper we merely see stress appraisal methods utilizing EEG. Harmonizing to present scenario, the Stress in America study consequences show that grownups continue to describe high degrees of emphasis, 75 % of grownups reported sing centrist to high degrees of emphasis in the past month and about half reported that their emphasis has increased in the past twelvemonth [ emphasis facts ] , The latest research by workspace supplier Regus shows that Indian workers are acquiring more stressed. The study reveals that work ( 51 % ) and personal fundss ( 50 % ) are the conducive factors for the increased emphasis degrees of the Indian work-force. [ hypertext transfer protocol: //articles.timesofindia.indiatimes.com/2012-09-10/india/33735958_1_stress-levels-counterparts-in-larger-firms-indian-workers ] . The research findings reveal that pupils are sing function overload, function stagnancy and self-role distance. Male pupils see higher degrees of function stagnancy than female pupils. [ hypertext transfer protocol: //link.springer.com/article/10.1007 % 2Fs11218-006-9010-y? LI=true ] . Stress can besides hold impact on immune system and it creates terrible impact on cardiovascular systems, The chronic emphasis can do persons more vulnerable to infections and incurable diseases. [ nihms4008 ] . Organizations like American Institute of emphasis [ www.stress.org ] , Indian Psychiatric Society ( IPS ) , National Institute of Mental Health and Neurosciences ( Nimhans ) and International stress direction association [ hypertext transfer protocol: //www.isma.org.in/about-isma.aspx ] are at that place to assist persons to cover with emphasis and related diseases at the same time making consciousness about emphasis. Stress due to tenseness, anxiousness and exhilaration had high power of Beta set [ ] . An addition of Alpha set power will reflect to loosen up and witting conditions. Meanwhile, lessening of Alpha set power and addition of Beta set power will bespeak that the individuals are making intense activity such as replying scrutiny inquiries, making mental arithmetic and so on [ ] . Research workers have come out with the ratio of EEG Power Spectrum in term of Alpha and Beta band power on right hemisphere of human encephalon with left hemisphere of human encephalon to find the encephalon reconciliation ( symmetrical ) where the asymmetrical in encephalon activity may bespeak to some chronic wellness disease such as depression, mental weariness, and so on. The ratio is called FBA ( Frontal Brain Asymmetry ) Measuring emphasis They are many features associated with emphasis they are chiefly classified as hormonal instabilities, physical and physiological alterations these are the symptoms of emphasis. When is individual feels stressed increased sum of emphasis endocrines ( hydrocortisone and catecholamine ) are released. These endocrine degrees are measured utilizing invasive methods and performed by scientists and practicians. These measurings require drawn-out experimental processs. Besides under emphasis, alterations in bosom rate ( HR ) [ ] , blood force per unit area ( BP ) [ ] , student diameter ( PD ) [ ] , take a breathing pattern [ ] , voltaic tegument response ( GSR ) [ ] , emotion, voice modulation, organic structure pose [ ] , reaction clip [ ] , Brain moving ridges ( EEG ) [ ] are observed, these alterations can be acquired non-invasively. This paper deals with non-invasive methods of measuring emphasis utilizing Electroencephalography ( EEG ) . Stress appraisal has many important applications in personal, authorities, industry military operations like bettering athlete public presentation, planing course of study and games for instruction, better work productiveness, to mensurate emphasis in combatant pilots, auto drivers, computing machine users, ground forces, sawboness etc [ ] . Measuring emphasis utilizing EEG There is a strong relationship between encephalon activity and emphasis. Datas can be acquired from the encephalon through different methods like functional magnetic resonance imagination, antielectron emanation imaging ( PET ) Magneto encephalography ( MEG ) and electroencephalography ( EEG ) . functional magnetic resonance imaging has high spacial declaration but really low temporal declaration, whereas EEG and MEG have higher temporal declaration. EEG is widely used in stress research because of higher temporal declaration, low intrusive equipment and low cost. Fig. 1: Spatial and temporal declaration of assorted experimental techniques [ 8 ] EEG is an of import method for analyzing the transient kineticss of the human encephalon ‘s large-scale neural circuits. In EEG, electrodes are placed at the caput tegument to do a good contact with scalp and register the electrical potencies due to neural activity. EEG provides good experimental informations of variableness in mental position because of its high temporal declaration. EEG wave form ( amplitude and frequence ) depends on the witting degree of the individual. Table 1 summarizes that spectral analysis of EEG can be split into several frequence sets. Frequency bands Frequency scope ( Hz ) Amplitude scope ( A µV ) Activity Delta 0.5-4 20-200 Watchfulness or anxiousness Theta 4-8 10 Relaxation Alpha 8-13 20-200 Dream slumber or stage between consciousness and sleepiness Beta 13-30 5-10 Coma or deep slumber Potentials at the scalp scope from 20 to 100 A µV, which can be recorded by braces of electrodes attached to the scalp ( on both sides of the encephalon hemisphere ) . The wave forms are characterized by frequence, amplitude, form and sites of the scalp. Besides, age and province of watchfulness is besides relevant to analyse the wave forms [ ] . Activities in the right hemisphere of the encephalon dominate the activities in the left hemisphere of the encephalon during negative emotions [ ] , which suggests an country for stress sensing. Electroencephalogram signals are categorized by frequence and each class represents some province for a individual. Beta and alpha moving ridges represent witting provinces whereas theta and delta moving ridges signify unconscious provinces [ ] . Rapid beta moving ridge frequences ( from lessening in alpha moving ridge frequences ) are the chief features bespeaking emphasis [ ] . Alpha waves appear on both sides of the encephalon, but somewhat higher in amplitude on the non-dominant side, by and large observed in people who are right-handed [ ] . Band base on balls filtering can be used to take noise and obtain certain parts and characteristics of an EEG signal before analysis. EEG signals can be filtered utilizing a set base on balls filter with appropriate values for low and high base on balls filters, e.g. 30 Hz and 4 Hz severally. Appraisal Techniques Raw EEG signals are acquired and analyzed to pull out required information. The first measure in this procedure is preprocessing, the characteristics are extracted from processed signal and classified into stressed or non stressed Preprocessing Preprocessing is really of import for any EEG signal analysis since signals are really sensitive to artefacts ; these artefacts are non from encephalon they are either from proficient grounds or due to behavioural and physical activities. Others include power lines noise ( 50/60Hz ) , broken EEG electrodes or leads, electric resistance fluctuation, electromagnetic noise and eye blink and motion of eyes and so on. Power line noises can be eliminated by using a 50/60 Hz notch filter. Independent constituent analysis ( ICA ) is used for unsighted beginning separation to divide constituents that have statistical difference. ICA recovers N linearly mixed beginning signals s= { s1 ( T ) , aˆÂ ¦ , sN ( T ) } , after multiplying by A, an unknown matrix, x ( I ) = { x1 ( T ) , aˆÂ ¦ , xN ( T ) } =As ( I ) [ ] . Rejection method is used discard contaminated signal, this method has drawback of taking the whole contaminated signal alternatively of taking merely noise [ ] . Subtraction method is used to take noise from contaminated EEG signal, this method assumes natural EEG signal as a additive combination of original EEG signal and noise and it is used to take oculus motion artifacts [ ] , Amplitude threshold can besides be used by specifying negative and positive thresholds, informations out of this scope is considered as artifact [ ] . Similarly Min-Max threshold can besides be used which defines a lower limit or upper limit allowed amplitude difference for a peculiar clip length. Gradient Criterion is another method where artefact threshold is defined based on point-to-point alterations in electromotive force relation to intersample clip [ ] . And eventually Joint chance method used that finds the chance of happening of a given value of point in clip in a specific channel and section relation to planetary chance of happening of such value [ ] . Feature Extraction Techniques Feature extraction is the procedure of pull outing utile information from the signal. Features are features of a signal that are able to separate between different emotions. We use a common set of characteristic values for encephalon signals. Nonlinear steps have received the most attending in comparing with the steps mentioned before, for illustration clip sphere, frequence sphere and other additive characteristics. The nonlinear set of characteristics used include fractal dimension and correlativity dimension signals. Features are extracted for each electrode of EEG signals. There are many feature extraction techniques used in literature some of the techniques are Power spectral denseness [ ] , Short clip Fourier transforms [ ] , Fast Fourier transforms [ ] , Wavelet Transforms [ ] and so on. Short clip Fourier transform ( STFT ) is a often used characteristic extraction technique in which separation of stationary signals is performed into little fragments [ ] . Comparing with STFT, Fourier transform ( FT ) , in which a finite length signal is expressed as the amount of infinite continuance frequence constituents, does non supply the accurate location of an event in the frequence sphere along the clip graduated table. Furthermore, FT is non suited for non-stationary signals analysis. The drawback of STFT is its finite length window. Narrow length window can increase the clip declaration but reduces the frequence declaration [ ] . Equation ( 1 ) is the mathematical representation of STFT, where ten ( T ) is analyzed signal and tungsten ( . ) represents the clip window map. STFTx ( tungsten ) ( T, degree Fahrenheit ) =aˆÂ ¦aˆÂ ¦.. ( 1 ) Fast Fourier transform is used in many of experiments [ ] . In the power spectral analysis from EEG informations, the signals are converted from clip sphere to frequence sphere. Spectral analysis divides the original signal into its frequence constituents, which can be expeditiously conducted by utilizing the fast Fourier transform ( FFT ) [ ] . Through the spectral analysis, we can individually analyze the four sets of EEG moving ridges with their specific frequences. Fourier transform is one of the techniques to make spectral analysis which is shown in Equation Ten ( K ) =aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦ ( 2 ) Where ten ( n ) is the EEG informations, N is the entire figure of samples. Wavelet transform ( WT ) solves the declaration job of STFT. It replaces the sinusoidal constituent of FT by interlingual rendition and dilation of a window map called ripple [ ] . Ripples are ideally suited for the analysis of sudden short continuance signal alterations [ ] . Equation ( 3 ) provides mathematical representation of uninterrupted ripple transform ( CWT ) , which is the portion of WT. CWT ( a, B ) =aˆÂ ¦aˆÂ ¦aˆÂ ¦.. ( 3 ) Here a and B are scaling factors, star in the superior represents the complex conjugate of map which is called the ripple. It can be obtained by scaling the ripple at B clip and a scale shown in equation ( 4 ) aˆÂ ¦aˆÂ ¦aˆÂ ¦ . ( 4 ) Ratio of power spectral densenesss of the alpha and beta sets has been calculated and analyzed for emphasis [ ] . Results suggested that the ratios for alpha ( rI ± ) and beta ( rI? ) powers defined as given in Eqs. ( 5 ) and ( 6 ) severally were negatively correlated with selfreports. rI ±=aˆÂ ¦aˆÂ ¦aˆÂ ¦aˆÂ ¦.. ( 5 ) rI?=aˆÂ ¦aˆÂ ¦aˆÂ ¦.. ( 6 ) where rI ± and rI? in the equations represent alpha sets on the right and left hemispheres of the encephalon. Beta sets, I? are likewise represented. Categorization Techniques After extraction of the coveted characteristics, In order to happen emphasis we use classifiers. A classifier is a system that divides some informations into different categories, and is able to larn the relationship between the characteristics and the province of emphasis. They are many types of classifiers used in the literature for stress appraisal. The categorization is performed utilizing many classifiers like additive discriminant analysis ( LDA ) [ ] , support vector machines ( SVM ) [ ] , nervous webs ( NN ) [ ] , Bayes regulation [ ] , and so on.

Tuesday, October 22, 2019

1984 comparative Essay

1984 comparative Essay 1984 Comparative EssayIn 1984, the main character is Winston Smith. He lives in Airstrip One also known as England in the states of Oceania. The world has been divided in to three states such as this: Oceania, Eurasia and Eastasia. There is no trust or love in this world, and the government, known as Big Brother is always watching you for signs of thought crime. If you dislike Big Brother even in a few seconds you neighbor, your children, or your wife could turn you in. In Winston world even the telescreens watch you in every second of every day. In Airstrip One and all of Oceania, feelings are seen as evil, distracting and just plain bad. You are not allowed to love one person or over another, but see everyone equally. Everyone is comrade: comrade Syme, comrade parsons and comrade Smith. You are not allowed to enjoy sex, either.Fictitious map, illustrating the political landsca...In fact, in girl's schools, they teach the women that should refer sex as "doing their duty to the Party " and other such drivel. And as for men if enjoy sex or wake up the sexual pleasure in women, they had just committed a crime. In the story, Winston has fall in love with Julia, but they get careless and get caught. In The Giver, Jonas was about to turn 12 years old, each child who turn 12 will be assigned to a different job. Jonas was chosen to be a Receiver of Memory.

Monday, October 21, 2019

The Power of Pythons String Templates

The Power of Pythons String Templates Python is an interpreted, object-oriented, high-level programming language. It is easy to learn because its syntax emphasizes readability, which reduces the expense of program maintenance. Many programmers love working with Python because- without the compilation step- testing and debugging go quickly.​ Python Web Templating Templating, especially web templating, represents data in forms usually intended to be readable by  a viewer. The simplest form of a templating engine substitutes values into the template to produce the output.   Aside from the string constants and the deprecated string functions, which moved to string methods, Pythons string module also includes string templates. The template itself is a class that receives a string as its argument. The object instantiated from that class is called a template string object. Template strings were first introduced in Python 2.4. Where string formatting operators used the percentage sign for substitutions, the template object uses dollar signs. $$ is an escape sequence; it is replaced with a single $.$identifier names a substitution placeholder matching a mapping key of identifier. By default, identifier must spell a Python identifier. The first non-identifier character after the $ character terminates this placeholder specification.${identifier} is equivalent to $identifier. It is required when valid identifier characters follow the placeholder but are not part of the placeholder, such as ${noun}ification. Outside of these uses of the dollar sign, any appearance of $ causes a ValueError to be raised. The methods available through template strings are as follows: Class string. Template(template): The constructor takes a single argument, which is the template string.Substitute(mapping, **keywords): Method that substitutes the string values (mapping) for the template string values. Mapping is a dictionary-like object, and its values may be accessed as a dictionary. If the keywords argument is used, it represents placeholders. Where both mapping and keywords are used, the latter takes precedence. If a placeholder is missing from mapping or keywords, a KeyError is thrown.Safe_substitute(mapping, **keywords): Functions similarly to substitute(). However, if a placeholder is missing from mapping or keywords, the original placeholder is used by default, thus avoiding the KeyError. Also, any occurrence of $ returns a dollar sign. Template objects also have one publicly available attribute: Template is the object passed to the constructors template argument. While read-only access is not enforced, it is best not to change this attribute in your program. The sample shell session below serves to illustrate template string objects. from string import Template s Template($when, $who $action $what.) s.substitute(whenIn the summer, whoJohn, actiondrinks, whaticed tea) In the summer, John drinks iced tea. s.substitute(whenAt night, whoJean, actioneats, whatpopcorn) At night, Jean eats popcorn. s.template $when, $who $action $what. d dict(whenin the summer) Template($who $action $what $when).safe_substitute(d) $who $action $what in the summer

Saturday, October 19, 2019

Addiction and Addictions Essay Example for Free

Addiction and Addictions Essay ? There are many factors that are damaging today’s society. Addictions are a fast growing concern, it has branched off and caused many problems whether it be related to drugs, alcohol, gambling, sex, Internet, or eating. Addictions are something society faces everyday. Although there are many reasons behind why addiction are growing, and where they stemmed from, today’s society has focused primarily on how someone with an addictions problem can seek help. Also the many Gaps and Barriers around addictions are enabling people who wish to seek help from receiving it. The increasing amounts of people with drug or alcohol addictions has increased vastly over the years especially among young teens who are still yet to be of age to buy alcohol. With addictions being a commonly known problem in society, there should be more awareness put out to people on how to help those with an addiction or more services that are equally accessible for those who wish to seek help on their addictions. Even though drugs and alcohol is widely known as bad in society, people continue to abuse it. Once on has chosen to abuse drugs or alcohol continuously they lose the ability to say â€Å"no† to another drink or † no† to another puff of weed. Soon the person will continuously think about drinking or using drugs, and cannot wait to abuse either substance again. Generally there are two components that stem from drug addiction: physical and psychological dependencies. Physical dependency occurs when a drug has been used habitually and the body has become immune to its effects. Where as psychological dependency occurs where a drug as been used immensely and the mind has become dependant and the mind begins to become emotionally reliant on the effects. Either to feel pleasure or to relieve pain, then the mind does not feel capable of functioning without the drug. Internet addictions not only include an over excessive amount of chat room participation, but it does not help their social or financial well being. Dysfunctional use of the Internet by children as well as adults can result in diminished participation in the family. Over thirty percent of Canada’s population has reported that they use the Internet to escape from everyday life or problems. Either by finding someone else on chat rooms with the same problems or just playing games or â€Å"surfing† the web. Gambling has many traumatic effects in a person’s life if it is abused the wrong way. It can cause people to loose their family; can put a person into bankruptcy, fraud, domestic abuse, theft or even homelessness. Pathological gamblers tend to be under the age of thirty. Six percent of gamblers in Canada commit suicide. The government profit from gambling in Canada is thirteen billion nationally. In Canada 340,000 people have a modern or severe case of a gambling addiction. Food addictions affect mostly a person’s health. Food addictions lead mostly to eating disorders, such as: obesity, diabetes, bulimia and food allergies. An eating addiction is signaled the same way in our brains as an alcohol addiction. Recent studies on rats have proven that eating triggers a pleasure receptor in our brain. Ten percent of people with anorexia or bulimia are male. Eight percent of children in Canada are obese, and twenty three percent are adults. The majority of agencies have no costs, no referrals, are wheelchair accessible and have age limited restrictions. The new internet addiction has left a gap in services, simply because it went so long before it was † discovered†, agencies are just now figuring out ways to support this  addiction. This makes it hard for someone with an Internet addiction to seek help due to the lack of support out there for the general public to use. The majority of services are available from ages thirteen plus. Which limits â€Å"teens† under the age of thirteen with addiction problems help. With today’s society having an increasing amount of children drinking, this set’s a bit of a barrier. Since there are no programs offered for children of a young age who have already begun drinking to seek help it allows the problem to grow instead of getting to it when it is still fresh and not yet a full-blown addiction. Although many services do not offer help to those who are disabled. Addiction services are generally offered only in English, which poses a problem for those who have immigrated to Canada or simply have grown up speaking a different language. The hours for addiction centers is limited, unless it is a housing service, most programs run on the nine to five clock, enabling those who seek help after hours from getting the service that is required by them. This shelter is for men going through withdrawals from drugs or alcohol. They offer a short-term residence. Also give information and education sessions for men in a safe environment. Also provide one on one counseling for individuals in purpose of defining specific needs and how to treat them. They take in men who are inebriated, who are going through withdrawals or that are at high risk of falling into old patterns. Service for this center in 7 days a week 24 hours a day, there is no fee; admission is immediate accordingly to bed availability. Mental Health and Addictions Services in Grey Bruce This program also known as DART (drug and alcohol registry of treatment) is helpful for people with addictions or mental health problems locate treatment options. It also links local communities with assessment and referral programs for themselves or people that they know. CAMH Center For Addictions and Mental Health The largest organization for addictions and mental health in Canada. Its provides research, broad-based education offerings, clinical services and health promotion activities. They provide information on the best services around, their facilities allow you to locate research resource materials, and contribute to addictions and mental health system planning. They are open Monday to Friday 8:30- 4:30, they are only partially accessible, and only provide services in English. This facilities helps youth with drug or alcohol based addictions. They work with clients one on one with any problems they are having. This is a private organization, and the program is only offered through referral. The program allows you to come and go as pleased, unless you are an involuntary client. The councilors help take you through the steps that got you to where you are and also the choices that you made to get you there. Located on downtown Hamilton. The hours are 8:00am to 6:00 pm. Appointments are to be made no walk inn’s are allowed. Throughout this report, there have been examples of all types of addictions. Showing how increasingly they are on the rise, and that day-to-day a new  addiction is born. Without services being available to the new born addictions they continuously grow and there is no way to receive help for them. The amount of young teens becoming addicted to things such as drugs or alcohol has grown increasingly and services are yet to be prepared for that situation. Many of the gaps and barriers within these programs or services are what prevent people from seeking the help they need and deserve. It has been proven that not only are addictions physical they are majority psychological and require a great deal of acknowledgement from family, friends, support groups, and government funded programs, so that people can acquire the amount of treatment necessary. With language and hours of availability being a barrier many people with problems are not getting the help they deserve, Canada needs to broaden its’ options when it comes to addiction programs, allowing twenty-four hour services for people with serious or mild conditions. If the programs continue to enable people from receiving help the amount of people with addictions will continue to increase. Being aware of the problem is the first step to solving one. Addiction and Addictions. (2016, Jul 25).

Friday, October 18, 2019

Questions unit 5 Assignment Example | Topics and Well Written Essays - 750 words

Questions unit 5 - Assignment Example By doing so, he had expressed his right to be bound by the contract. The fact that the agreement was not in writing is irrelevant as a consensus ad idem can be established (Elliott, p 21). 5. The requirement of payment of deceased debts by virtue of being an administrator does not have to be expressly provided. It is an implied term under which a party is required to carry on with the legal obligations touching on the estate of the deceased. 8. Generally, personal service contract cannot be delegated. An exception may exist, however with consent of the obligee on condition that they remain liable until the assignee has performed the contract to the satisfaction of the obligor. 9. a).In case the original contract is still in term, the minimum period remains unaltered, b).It poses a suitable break compared with assignment since with an assignment it is less clear as to who is liable for charges around the time of an assignment. 10. It is not ethical. The law sets out what must not be retained by such a person. The rationale being that they should have the property only sufficient for survival and ought not to be a

Community Action Personal Health Paper Essay Example | Topics and Well Written Essays - 750 words

Community Action Personal Health Paper - Essay Example The activity I chose to carry out was to send a letter to the Calvin Klein clothing company. The letter includes some points about the relationship between advertising and eating disorders, and how the Calvin Klein image is one of those which causes young people to hold themselves up to impossible standards. I feel that they are a company who really exemplifies the trend towards "thin at all costs" - the idea that thin is an ideal which should be pursued regardless of the consequences. I think that pursuit of this ideal is very unhealthy, particularly for young people. Because I have an eating disorder, carrying out this activity was quite empowering for me. I enjoyed it because advertising is such a powerful tool, and I firmly believe that if advertising were to change and start portraying real bodies wearing real-sized clothing, Western society's image of the ideal body would change. I am not really under the illusion that my letter will be the impetus for change but I am glad that I got the chance to express my opinions, and writing out exactly how I feel about these issues has felt really positive. Anorexia and Bulimia are increasingly in the public eye, particularly because the profile of these diseases is raised by celebrities who have battled these eating disorders. This is unfortunate in one sense because these diseases are legitimized by their association with the rich and famous. This is reinforced by the point that compulsive overeating and the morbid obesity which often results is far less socially acceptable than anorexia or bulimia. The community is far less inclined to accept compulsive overeating as an eating disorder, instead labeling sufferers as lazy and lacking in willpower. There are many organizations dedicated to promoting awareness of eating disorders. The National Association of Anorexia Nervosa and Associated Disorders is an example of an organization which operates at the national level. This association raises awareness of eating disorders with support groups, message boards and chat rooms, education packs for schools, and publicity drives with local and national media. (ANAD 2006) According to an article that appeared in the San Francisco Chronicle early this year, Bay Area residents don't have many options when it comes to finding support for eating disorders at the local level. (Harlick 2006) However support groups do exist. One such example is the Ohlhoff Eating Disorders Program, which provides a wide array of services to aid people in recovering from all types of eating disorders. (Ohlhoff 2006) Overall I think I have learned the most from completing the activity portion of this assignment. Even though I have read about and known how advertising and fashion companies have played an influential role in the increasing trend of eating disorders, actually writing to a company to express my views has really crystallized my views on the subject. References Harlick, J. People suffering eating disorders have precious few outpatient resources in the Bay Area. San Francisco Chronicle. January 6 2006. National Association of Anorexia Nervosa and Associated Disorders Retrieved May 23, 2006 from . Ohlhoff Eating Dis

The Great Los Angeles Earthquake Essay Example | Topics and Well Written Essays - 500 words

The Great Los Angeles Earthquake - Essay Example enter of the earthquake was around twenty five (25) miles north of Los Angeles and caused considerable damage to the city in terms of life and property of the citizens of Los Angeles. The movie appears to center greatly upon the fact that city officials chose to ignore the warnings that were given by seismologist Dr. Clark Winslow. The movie chooses to stress greatly upon the fact that city officials gave more importance to the calm of the city than to the very life of the city itself. For instance, one of the few areas where the movie reaches its climax is when the city officials finally realize that Dr. Clark Winslow’s warnings were legitimate and begin to advise the citizens of Los Angeles to begin taking immediate precautionary measures. However, as the movie shows, the time to take precautionary measures has passed and the earthquake strikes. The movie stands greatly upon this political intervention and ignorance of the city officials and chooses to use this as the main theme and plot. The movie also establishes itself upon the fact that while Dr. Clark Winslow’s warning was based on a fault line that was located around the Los Angeles area, th e tremors that set the city officials on alert were those that came from a lesser well known fault line near the city. However, leaving behind the main plot, the movie focuses on a number of subplots based upon a number of events that happened to the real people who got trapped in the earthquake and struggled to survive. About twenty thousand (20,000) lives were lost because of The Big One. The movie follows the lives of a few of these people and shows them as they try to resist the damage of the earthquake from trapping them and taking their lives. There is although a certain element of exaggeration in the movie. It appears that the creators of the movie chose to go along with the idea of creating the subplots for the movie out of the people who suffered series of events that could be commercially viable for the

Thursday, October 17, 2019

Reflection Essay Example | Topics and Well Written Essays - 1000 words - 2

Reflection - Essay Example Over the course of this semester, I have learned several skills, habits, and gained indispensable experiences in writing. In the beginning, my perception of writing was simply putting words on paper, and you are done. I have since learned that writing is not that simple, firstly it is a process, which consists of five stages. The first stage is prewriting, which involves gathering ideas for writing. Ideas are received through, reading, teacher motivation, the audience, voice, developing word banks and many more. Secondly, the rough draft stage follows, which a writing stage where ideas are put on paper. Consequently, the revising stage involves rearranging, modifying, adding, and deleting content and thus making the content appropriate to the audience. In this stage, the rough draft is improved. After the revising stage, follows the editing stage where the writer corrects grammatical errors and improves style and clarity. The final stage is going through the work to confirm everything is good and then submitting. I have always had a passion for writing, but taking this class exposed just how weak my writing and literary skills were. Consequently, I have polished these skills through several exercises that we have handled in class. For instance, through reading and summary exercise, I have managed to develop objectivity and accuracy regarding someone else’s work. As such, I have learnt to identify and concentrate on the main points when doing a summary. The reading, â€Å"Working at McDonalds,† for example, allowed me to develop and exercise these skills effectively thereby improving my writing abilities. Moreover, this class has taught me how recognize other people’s opinions presented in the literature, and thus, create my independent opinion either supporting or opposing another author’s ideas. As such, I have learned to construct a sound and coherent argument. Constructing a

Genomics Essay Example | Topics and Well Written Essays - 250 words

Genomics - Essay Example Because of the role that genomics has been proven to play in disease, modern nurses commonly are responsible for eliciting at least three generations from patients (Consensus, 2008). Nurses play a critical role in assessment of this information for use in preventative care, prognostics, selection of treatment, and treatment evaluation, necessitating firm understanding of genomic principles. Nurses are an essential educational resource for patients unaware of genomic technologies. Nurses also serve as advocates for clients that may benefit from genomic services and for the rights of those clients to make autonomous, informed genomic and genetic based decisions. As part of the nursing assessment, genomics allows a nurse to establish risk factors based on family history of disease. Perhaps more importantly, however, the nursing assessment should include patient attitude and knowledge of genetic and genomic technologies that may be beneficial. This assessment will also allow other health care professionals to interact more effectively with the patients by understanding their biopsychosocial views and is critical in allowing patients to make informed decisions based on these new technologies.

Wednesday, October 16, 2019

The Great Los Angeles Earthquake Essay Example | Topics and Well Written Essays - 500 words

The Great Los Angeles Earthquake - Essay Example enter of the earthquake was around twenty five (25) miles north of Los Angeles and caused considerable damage to the city in terms of life and property of the citizens of Los Angeles. The movie appears to center greatly upon the fact that city officials chose to ignore the warnings that were given by seismologist Dr. Clark Winslow. The movie chooses to stress greatly upon the fact that city officials gave more importance to the calm of the city than to the very life of the city itself. For instance, one of the few areas where the movie reaches its climax is when the city officials finally realize that Dr. Clark Winslow’s warnings were legitimate and begin to advise the citizens of Los Angeles to begin taking immediate precautionary measures. However, as the movie shows, the time to take precautionary measures has passed and the earthquake strikes. The movie stands greatly upon this political intervention and ignorance of the city officials and chooses to use this as the main theme and plot. The movie also establishes itself upon the fact that while Dr. Clark Winslow’s warning was based on a fault line that was located around the Los Angeles area, th e tremors that set the city officials on alert were those that came from a lesser well known fault line near the city. However, leaving behind the main plot, the movie focuses on a number of subplots based upon a number of events that happened to the real people who got trapped in the earthquake and struggled to survive. About twenty thousand (20,000) lives were lost because of The Big One. The movie follows the lives of a few of these people and shows them as they try to resist the damage of the earthquake from trapping them and taking their lives. There is although a certain element of exaggeration in the movie. It appears that the creators of the movie chose to go along with the idea of creating the subplots for the movie out of the people who suffered series of events that could be commercially viable for the