Wednesday, November 27, 2019
Self Defence Issues and Implication in Cyberspace
Introduction Cyber crime is a growing global problem. Despite intense efforts by law enforcement officers to stop the practice, cyber crime continues to spread. Brenner (2010) says that partly, the growth of cyber crime stems from the extra-territorial nature of the practice. On the contrary, Wall (2007) argues that the growth of cyber crime mainly stems from the changing nature of such crimes.Advertising We will write a custom research paper sample on Self Defence Issues and Implication in Cyberspace specifically for you for only $16.05 $11/page Learn More The abuse of new technology has also led to the spread of this practice. Consequently, there have been rising numbers of cyber attacks in the United Kingdom (UK) and the United States (US). These countries have reported cyber crimes for many years and despite the increased attempts to curb their spread, they continue to increase. Loader (2012) reports that developed countries, which do not have an est ablished internet connection also, report increased incidences of cyber crime.à The American government has taken cyber security with utmost importance. In fact, the US Homeland Security considers America as a thriving ground for cyber crimes. This is because America is not only a victim of such attacks, but also the source of most attacks (Schell 2004). The Anti-Phishing Working Group recently produced new statics that show the growth of cyber crimes within the past year (Chik 2012). Increased awareness of cyber crime in the UK and America has largely informed the rise in the number of cyber crime litigation in both countries. However, most of these litigations do not have a common legislative basis.à This paper explores the nature of cyber crime in the context of the law of defence (in the US and the UK). From this analysis, this paper highlights the legal underpinnings of UK and US laws on self-defence. A lot of emphasis is made to compare the application of the law of defenc e on cyber crime, viz-a-viz the application of the same laws in the ââ¬Å"physical world.â⬠In this regard, this paper explores the law of defence (as outlined by the UN), the right to bear arms, and the implications of these laws in the cyberspace. UK and US Laws on Cyber Crime America Since federal and state governments govern American states, the process of formulating laws divides between the state and federal governments. Usually, state laws are more applicable to cyber crime, unless there is a special situation where there is a need for Federal intervention (Chik 2012). For example, when cyber crime threatens national security, Federal cyber laws may apply.Advertising Looking for research paper on common law? Let's see if we can help you! Get your first paper with 15% OFF Learn More Alternatively, when the prevention of cyber crime requires the uniform application of law, the Federal government may intervene in the formulation (or enforcement) of such laws. Therefore, because of the distributed functions of state and federal governments, both governments have contributed in the formulation and enforcement of cyber law. Nonetheless, because of the political differences in America, every state formulates and enforces their laws. There is therefore no legal requirement for all American states to adopt uniform laws (Chik 2012). UK Specific legislations on cyber crime in Europe inform UKââ¬â¢s cyber laws. Indeed, there is a close relationship between Europeââ¬â¢s public policy on self-defence and UKââ¬â¢s legislations on the same. For example, the UK is subject to cyber crime legislations, as formulated by Council of Europe (CoE). Therefore, the provisions of self-defence laws (under the convention) are applicable in the UK, as they are applicable in other European countries (that are signatories to the convention). The close historical, geographic, and economic relation between UK and Europe inform the close interconnection betwe en the UK and Europeââ¬â¢s cyber laws. Nonetheless, the most common law governing cyber crime in the UK is the Computer Misuse Act of 1990 (Securelist 2012). The government has however updated this act with newer and stiffer penalties. The quest to update this law came from the inadequacies of existing laws to curb hacking activities within the UK. More so, this issue came into sharp focus when previously existing legislations failed to convict Stephen Gold and Robert Schifreen for gaining unauthorised access to a UK organisation, BT Prestel services. Because of the inadequacy of the law to convict the two suspects, the court acquitted them. The Right of Defence Normally, every country has a right to defend its people against any form of attack. However, technological advancements have introduced a new form of attack, which contravenes the conventional wisdom regarding the right to defend a country. The cyberspace is the platform where conventional rules of self-defence have been broken (Arsene 2012).Advertising We will write a custom research paper sample on Self Defence Issues and Implication in Cyberspace specifically for you for only $16.05 $11/page Learn More However, as Moore (2010) observes, several countries still adopt a conventional approach to prevent cyber attacks. For example, the US uses the military to defend the country against cyber attacks. Arsene (2012) questions the justification for doing so, because there are many risks associated with adopting a military approach to defending a country against cyber attacks. One risk is the overlap of self-defence and conventional space defence strategies. In other words, militarising cyber security may take a war-like approach, which should not be the case. Therefore, while conventional wisdom may approve the use of force in conventional space, the use of force as a right to self-defence may not work in the cyber world. Therefore, even though a cyber attack may manifest the same characteristics as a conventional attack, responding to such an attack with force may be unlawful (Arsene 2012).à People often compare the self-defence law to the English law. Researchers say this law is part of private defence because it allows for the use of illegal means to prevent an attack (or protect a country from harm) (Himma 2008). In Britain, this law stems from the common law and the criminal law act of 1967 (Samaha 2005). One common principle of self-defence rules focus on the use of reasonable force to prevent an attack. Therefore, from the nature of the law, self-defence is more of a justification as opposed to an excuse (Scheb 2011, p. 417). Globally, the right of self-defence in cyber attacks is still an unresolved issue. Indeed, because of some complexities identified when comparing cyber attacks with conventional attacks, it is difficult for countries to exercise (blindly) their right to self-defence without considering the unique dynamics of cyber attac ks (Committee on Deterring Cyber attacks 2010, p. 163). The UK and the US share the same approach to cyber attacks. Both countries propose the use of force when cyber attacks result in death, injury, harm, or destruction of property. However, the US has been most vocal about this provision. In fact, there are loud calls in the US to treat cyber attacks like ââ¬Å"ordinaryâ⬠attacks if they cause death or property destruction. The US Defence Department claims that it will not hesitate to use force to defend itself against cyber attacks that can kill, destroy property, or harm its people.Advertising Looking for research paper on common law? Let's see if we can help you! Get your first paper with 15% OFF Learn More The Right of Defence as Per the UN Law and Proportionality of Response Article 2 (4) of the UN charter describes situations when countries can use force for self-defence (Ellen 2012). The clause discourages the use of force as a means to solve international conflicts, but it approves it when states need to defend themselves from external aggression. Article 51 of the UN charter stipulates this provision (Ellen 2012). Many people have interpreted the provisions of this charter to either support or oppose the use of force as a self-defence mechanism in cyberspace attacks (Jasper 2012). Here, the main dilemma centres on whether to use force, even when there is no armed attack (like in the cyberspace). Some analysts have approved the use of force in such situations, while others deny the use of force (Ellen 2012). Because of the dilemma caused by the application of Article 51 (the use of force as a self-defence mechanism), the International Court of Justice has been forced to interpret the use of force as a self-defence mechanism. Milhorn (2007) explains the courtââ¬â¢s ruling by demonstrating that the use of force as a self-defence mechanism only applies to situations where there is significant and the real threat of a country. The charter also stipulates that the use of force only apply to the specific country that wants to defend itself (Ellen 2012). Moreover, the article says that the intention to defend the country using force should show a high probability of success. Lastly, the charter says that the force applied should be proportional to the damage suffered from the attack (Schiller 2010). All the above stipulations are difficult to apply in the cyberspace. In fact, some observers say it is impossible to apply the above provisions in cyber crime (Wyler 2005). Usually, the complication arises when determining any direct loss of life (or any loss of property) that meets the conditions of triggering article 51. Broadly, it is often difficult to find the e vidence that would trigger the activation of article 51. The complications brought by the nature of cyber crime also pose a challenge to the implementation of article 51 of the UN charter because some cyber crimes are difficult to trace to one country. Moreover, even if a state traces the source of the attack to one country, they may not know the individual who is directing the attack (Wyler 2005). For example, an attacker may infiltrate innocent servers and use them to direct the attacks, as a zombie. Furthermore, trying to trace such attackers may consume a lot of time. Estonia and Iran provide examples of the difficulty of tracing attackers because even though the countries experienced cyber attacks a few years back, they have still been unable to know the real identity of the attackers. Lastly, the main issue affecting the use of force (as stipulated in article 51 of the UN charter) rests on the need to prove proportionality and necessity (Himma 2008, p. 410). Besides the time-c onsuming nature of knowing the identity of attackers, it is also difficult to prove that allowing a counter-attack may achieve the objective of preventing the attack. Similarly, it is difficult to limit the effects on intended targets if a defensive attack occurs. From the strict circumstances that the UN allows defensive attacks, it is difficult to meet the criterion for launching an armed attack in cyber crime (Carr 2011, p. 50). Therefore, even though cyber attacks may interfere with a countryââ¬â¢s economic sphere, air space, maritime space, and territorial integrity, it is difficult to depend on article 51 of the UN charter to justify defensive attacks on cyber crimes. Right to Bear Arms In the UK, the right to bear arms is part of the English common law. Scholars, such as, Aristotle and Machiavelli have also recognised this right as part of a personââ¬â¢s right to self-defence. Similarly, the US constitution also acknowledges the right to bear arms as part of self-defenc e laws. The same protection replicates in several state constitutions. Still in the US, the government introduced the right to bear arms as a second amendment to the bill of rights. In the UK, the common law tradition acknowledges the right to bear arms (Wyler 2005).à Parliamentary supremacy in the UK has however imposed many regulations to the right to bear arms. For example, the prerogative to control the right to bear arms shifted from the monarch to parliament. Notably, the Pistol act of 1903 was the main legislative provision that regulated the right to bear arms (Wyler 2005). The right to bear arms covers several weapons that are offensive to the law. Knives and firearms are the main weapons considered offensive by the UK law. While the right to bear arms may be a critical part of self-defence law, its applicability in the cyberspace is impractical. Indeed, the right to bear arms aim to protect a person from a physical assault (or harm). However, attacks in the cyber world a re intangible. Similarly, as other situations described in this paper, it is difficult to know the attacker. Therefore, it is equally difficult to apply the right to bear arms as a means to protect a person from cyberspace attacks. Case Studies Cyber space security poses unique challenges to the application of self-defence laws. For example, when two people share organisational resources through open port access, it is difficult to establish the legal justification for using self-defence legal provisions if an attacker tries to infiltrate the cyber network. This situation is true when one party gives another party the authority to gain access to the organisationââ¬â¢s resources, and the second party responds to a security threat through the established connection. Technically, the second party would not be breaching the law because he responds to the attacker through an established connection. In the above situation, it is difficult to establish the right legal framework for appr oaching the issue because the intention of the attacker is not established. If the second party knew the intention of the attacker, it would be easier to justify the action of the second party who acts in self-defence. This scenario elopes in the Computer misuse act, which seeks to establish the intention of the attacker (first) before any legal consequences are determined. Without knowing the intention of the attacker, it is difficult to establish that the law was broken. An incident that occurred in the UK, in 2004, demonstrates the need to establish the intention of the attacker before castigating an attacker. Here, an organisation accused a teenager of destroying a server by sending millions of mails to the server (Ellen 2012). However, the court ruled that the defendant had not contravened the computer misuse act because his actions did not lead to any unauthorised changes to the information in the computers. The failure to prove the intention of the defendant proved to be the biggest weakness here. However, if the organisation could prove that the teenager changed the information in their servers, they would have established the intention of the attack and held the defendant liable for his actions. They however failed to do so. The above case highlights the need to establish the intention of an attacker as he tries to gain access to the cyber network. With the absence of a determined intention from the attacker, it is difficult to justify a response to an enemy threat. Therefore, the existence of the intention to gain unauthorised access to a cyber attack does not provide sufficient ground to warrant a counter-attack. However, if the attacker went further and altered information on the servers, substantial grounds for a response would be sufficient to warrant a conviction. In a situation where an attacker declares that he is part of a wider network of global cyber commons, issues of self-defence also arise because if an attacker is part of the global cyb er commons, he may install cookies into an organisationââ¬â¢s resources. Cookie installation poses significant threats to online privacy and security because an organisationââ¬â¢s resources could be availed to a third party, thereby compromising an organisationââ¬â¢s cyber safety. Indeed, through the installation of cookies, an attacker may easily access an organisationââ¬â¢s resources and use them to harm it. Bajaj (2012) says that the installation of cookies resembles the storage of an organisationââ¬â¢s resource in a central database where everyone can gain access to it. Moreover, an attacker may intercept an organisationââ¬â¢s traffic (through cookies sent on ordinary unencrypted Http sessions) and use the information acquired here to harm the organisation (Bajaj 2012). Therefore, even though an attacker may be part of the global cyber commons, he may pose significant threats to an organisation. These threats prompt organisations to defend themselves. Therefore , based on the severity and the possibility of such threats occurring, it is crucial for an organisation to defend itself from such risks. Stated differently, if a burglar enters a personââ¬â¢s house, the owner of the house has a right to defend himself. However, the cyberspace (as part of the global cyber common) poses unique challenges to cyber security (and more specifically for issues of self-defence). Albeit an artificial one, Bajaj (2012) explains that the cyberspace is part of the global cyber commons. Therefore, like other national assets like the sea, oceans, land, and air, states need to protect the global cyber commons against any attack. However, unlike physical resources like land and oceans, the global cyber common does not have national borders. Therefore, except for a few strategies discussed in this report, it is very difficult to defend a country/organisation (completely) from attacks in the global cyber commons. However, if an attacker declares that he is part of the global cyber commons and installs cookies in an organisationââ¬â¢s resource base, the law of self-defence applies because as a resource owner it is crucial to monitor the activities of every website visitor. Even though there may be significant flaws in comparing the cyberspace with the physical world, monitoring visitor activities on an organisationââ¬â¢s website resembles installing CCTV cameras to monitor shoppersââ¬â¢ activities in a supermarket. This is a critical safety measure of self-defence.à Nationally, states also protect their interest in the global commons because they understand the implications of the global cyber commons on national security and strategic interests (Bajaj 2012). This is especially more profound in the US. Therefore, protecting a nationââ¬â¢s interest in the cyber common network forms part of national defence. The same justifications, which countries use to protect their national interests in the cyber commons, outline the justifi cation for the enforcement of self-defence laws to monitor visitorsââ¬â¢ activities on an organisationââ¬â¢s website.à Different organisations have adopted different strategies for defending themselves against attacks from the global commons. One such strategy is the installation of filters to enforce censorship. However, none of these strategies provide absolute protection to an organisation because the protocols for gaining access to organisational resources are accessible from anywhere in the world. Therefore, different servers and networks can access company resources from different locations around the world. Broadly, the laws for defending an organisation/country against cyber attacks are still unrefined, but it is crucial to say, different countries and organisations continue to pursue the same strategy they would use when defending themselves against physical attacks. Conclusion Self-defence laws aim to protect people and organisations from injury, or harm. However, the changing technological nature of the environment has brought new challenges to the applicability of these laws. Often, the law has played catch up to cyberspace attacks and even developed countries are still grappling with the challenge of enforcing self-defence laws without contravening other laws. This paper demonstrates that the provision for the enforcement of self-defence laws pose unique challenges to the enforcement of the same laws in the cyber world. Therefore, albeit cyber attacks may bear the same characteristics of an armed attack, it is difficult for organisations to evoke self-defence laws, even as outlined by article 51 of the UN charter. Some of the unique challenges posed to the enforcement of self-defence laws in the cyber world include proportionality issues, the trans-national nature of cyber attacks, and the difficulty experienced in identifying the attacker.à Besides the above challenges, it is similarly difficult to invoke self-defence laws (at least in the conventional way) in cyber attacks because cyber attacks (often) do not lead to the direct loss of life. Therefore, there is a significant mismatch between the use of armed attacks (as a self-defence mechanism) because it is difficult to satisfy the conditions for approving armed attacks in the cyberspace.à This paper also highlights significant differences and similarities in the applicability of defence laws in the UK and the US. By the nature of their geography and distribution, both countries are subject to larger legislative provisions in cyber laws. For example, the UK is a signatory to European laws on cyber attacks, while cyber defence laws that the Federal government formulates also bind American states. Even though cyber defence laws continue to evolve in these countries, the English common law is the basis of their enforcement. In America, the bill of rights also plays a critical role in the enforcement of these laws. Nonetheless, throughout the analyses in this pap er, there is a clear trend towards the militarisation of self-defence laws in cyberspace (especially in the US) (Greenwald 2012, p. 2). Analysts should treat this trend with a lot of caution because the militarisation of self-defence laws in the cyber world may fail to achieve the same objectives they would achieve in the ââ¬Å"realâ⬠world. It is therefore pertinent for international and local laws to encompass the unique dynamics of cyberspace attacks. The introduction of a new set of laws to accommodate these dynamics may be a good start for many countries to address the unique challenges of the cyber world. References Arsene, L. 2012, U.S. to Apply Self-Defense Rule if Cyber Attacks Turn Hostile. Web. Bajaj, K. 2012, Cyberspace as Global Commons. Web. Brenner, S. 2010, Cybercrime: Criminal Threats from Cyberspace, ABC-CLIO, New York. Carr, J. 2011, Inside Cyber Warfare: Mapping the Cyber Underworld, Oââ¬â¢Reilly Media, Inc., New York. Chik, W. 2012, Challenges to Crimin al Law Making in the New Global Information Society: A Critical Comparative Study of the Adequacies of Computer-Related Criminal Legislation in the United States, the United Kingdom and Singapore. Web. Committee on Deterring Cyber attacks 2010, Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, National Academies Press, New York. Ellen, M. 2012, ââ¬ËCyber Security without Cyber Warââ¬â¢, J Conflict Security Law, vol. 17 no. 2, pp. 187-209. Greenwald, G. 2012, Various matters: cyberwar, last gasps, and hate speech. Web. Himma, K. 2008, The Handbook of Information and Computer Ethics, John Wiley Sons, London. Jasper, S. 2012, Conflict and Cooperation in the Global Commons: A Comprehensive Approach for International Security, Georgetown University Press, Georgetown. Loader, B. 2012, Cybercrime: Security and Surveillance in the Information Age, Routledge, London. Milhorn, T. 2007, Cybercrime: How to Avoid Becoming a V ictim, Universal-Publishers, New York. Samaha, J. 2005, Criminal Justice, Cengage Learning, London. Securelist 2012, Cybercrime and the law: a review of U.K. computer crime legislation. Web. Scheb, J. 2011, Criminal Law, Cengage Learning, London. Schell, B. 2004, Cybercrime: A Reference Handbook, ABC-CLIO, New York. Schiller, J. 2010, Cyber Attacks Protection, CreateSpace, New York. Wall, D. 2007, Cybercrime: The Transformation of Crime in the Information Age, Polity, New York. Wyler, N. 2005, Aggressive Network Self-Defense, Elsevier, Massachussets. This research paper on Self Defence Issues and Implication in Cyberspace was written and submitted by user Barbara Berry to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.
Sunday, November 24, 2019
Beloved Adenuga Essays (849 words) - Pan-Africanism, Free Essays
Beloved Adenuga Essays (849 words) - Pan-Africanism, Free Essays Beloved Adenuga Dr. Greg Carr AFRO 005 sec 02 14 September,2017 How do we Undertake the Study of African Experience? ABSTRACT: We undertake the study of the African experience by studying the history of African people and by evaluating time periods to make sense of the African experience. We should know the origin of our people and understand what they knew so we can explain what is happening today. We also should understand the dismemberment of Africa and how that affected African peoples' cultural identity. CRITICAL REVIEW OF SCHOLARSHIP: I could answer framing question by pulling out points from Ngugi WA Thiong'o Something Torn and New and Gregg E. Carr's Towards an Intellectual History of Africana Studies: Genealogy and Normative Theory. Something Torn and New helped me understand the need to preserve our identity as Africans and not allow the Europeans to take away our cultural heritage and identity. Something Torn and New is a very thought-provoking book as it discusses in-depth the quest for African renaissance(rebirth). From the book Towards an Intellectual History of Africana Studies: Genealogy and Normative Theory, I understood how African people maintained their "self" throughout history despite the hardship that they been through. The book also made it clear that Africans will still face more hardship but it's only through unity that they will be able to win the fight against racism. Both books were very helpful in answering the framing question. Something torn and new made use of native stories to explain African experiences. Towards an Intellectual History of African Studies gave three major macro-episodic challenges face by Africans over the course of their encounter with the West which were helpful; however, I had difficulty understanding some concepts discussed in this book. DISCUSSION: We study African experiences because it applies to and affects everybody. To undertake the study of African experiences one must understand the dismemberment of African people from their origin and culture. From Something Torn and New, "The dismemberment of Africa occurred in two stages. During the first of these, the African personhood was divided into two halves: the continent and its diaspora." Dismemberment began in the colonial eras because of the need of slaves to work on land stolen from the native Americans and the Caribbean. Africans were colonized and taken away from their continent to work as slaves. Africans were also stripped off their memory. According to Dr. Carr "when someone's memory is cut off the notion of who they are is going to be informed by other people". The name of an object has everything to do with how it is identified, classified, and remembered. The memory of Africans was cut off by the oppressors by changing the names of Africans therefore c hanging their identities. African art works were stolen and taken to be stored in British museums; this is also to deprive Africans of their memory. Time and space also helps to understand the study of African experiences. The challenge of time and space is miseducation. For example, the challenge of time and space erased the genealogy of Phillis Wheatley as a Muslim. Her name was changed from Fatima to Phillis, after the name of the boat that brought her, and Wheatley after the name of her master. Her first two languages were Wolof and Arabic but she was made to learn new languages like English, Latin, Greek. From Something torn and New, "Africans, in the diaspora and on the continent, were soon to be the recipients of this linguistic logic of conquest, with two results: linguicide in the case of the diaspora and linguistic famine, or linguifam, on the continent". The forcing of Africans to learn and communicate in different languages other than their cultural language is Linguicide. But a situation where the older ones do not teach the younger ones the language of their origin, it is referred to as Linguifam. The challenge of time and space also creates blackness as the primary maker for power relationship. "African deep thought must now speak for itself. Rather than set up interview schedule containing the great issue of European Philosophical enquiry, African champions must break the chain that links African idea to European ideas and listen to the voice of the ancestors without European interpreters".
Thursday, November 21, 2019
Program Evaluation Paper Part 3 Essay Example | Topics and Well Written Essays - 2000 words
Program Evaluation Paper Part 3 - Essay Example If a kid weighs 40.55 pounds, this weight figure will be rounded off to the nearest tenth of a pound, which will make the childs weight as 40.6 pounds. If the child had weighed 40.54 pounds, then the weight measurement will be recorded as 40.5 pounds. This is an example of how data collection can influence the program evaluation plan by making the collection of kids measurements easier to do but without compromising its accuracy. The program evaluation itself is a mixed method, meaning it will use both quantitative and qualitative ways of gathering the data. Getting the exact weight measurements of the kids is part of the qualitative process of data gathering while using open-ended surveys in the form of a questionnaire will form the qualitative part of the data collection process. For this part of the data collection which is the qualitative part, it is important that the observations by parents and teachers are made honestly and describes in full detail what they had observed in the kids behavior. If they found out kids are more active after eating their fruits, for example, then it must be described in a meaningful way such as using an increasing scale, with 1 as the lowest and 10 as the highest so this will give the researchers a good idea of how active they were. The programs overall integrity will be evaluated based on the way data is collected and how reliable the data will be. This will greatly determine whether the program is a good one or needs some revisions based on the difficulty or ease of getting all the necessary data. It is at this point when the programs researchers can have a good idea on the probable outcome of their research project because data collection is the very heart of the research study itself. It will determine whether the entire project will be successful or not because on implementation aspects of the program such as the aforementioned data collection procedures. A strength of the data collection process is its
Wednesday, November 20, 2019
Information Management Case Study Example | Topics and Well Written Essays - 1750 words
Information Management - Case Study Example USS's major problems were evident in its order taking process. The orders were manual, imprecise and filled with errors; there was no coherence among the different processors as they had their own tracking and order system. There fore USS was unable to follow each order as it was processed and delivered. The communication system employed between the different processors was a dialup system meaning that data processing wasted a lot of time, invariably forcing the company to hold large inventory, increasing its production cost. All such problems made USS uncompetitive in face of other producers such as POSCO, which was recently setup with the latest technologies. To fix these problems USS took rapid steps to improve their production system. First of all, they provided their customers to place theirs order online specifying the product, quantity, price, composition, size, thickness, and even delivery date for their orders. The software was developed so as to allow the customer to be able to see the cost as well as the delivery dates of their order, to allow them to plan accordingly for their business. It also allowed for messages from different processors to be translated much more quickly and more efficiently. USS also connected DecisionExpress software from LiveCapital for customers which reduced its uncollectible debts. To further improve the accuracy of the order USS incorporated several other soft wares such as order fulfillment and later i2 Technologies. They also introduced soft wares such as iTrac to keep track of their shipments and Mechanical Item Generation System to regenerate orders for repeat customers. USS also setup a subsidia ry USS Engineers and Consultants, to sell these soft wares to assist other companies. To maintain its competitive advantage they only provide soft wares which are a version older than their current software (Bratislava, 2003). Results and Business benefits In 1996, when USS faced a disastrous situation of losing Ford Motor, USS identified that, in face of future competition computerization of the production system was a necessity. This direction allowed USS to be more efficient and more profitable. After the implementation of the software system USS required 3 work hours to produce a ton of steel, as compared to 4 hours in Germany and 4.8 hours in POSCO. Hence, USS was able to greatly benefit from strong economic conditions by supplying steel to United States, China and other countries (Michael Erman - 2007). Conclusion The progress of U.S. Steel depends on the world demand for their products i.e. steel. As witness from the world wide economic shock, demand for steel and other essential construction material has plummet. Widespread closer of factories has significantly halted further investments, resulting in drastic drops of steel prices. USS has invested great sum of financial capital in refining their production cycle but in current times it will be very difficult to gain
Sunday, November 17, 2019
DELL SWOTT TABLE Assignment Example | Topics and Well Written Essays - 1000 words
DELL SWOTT TABLE - Assignment Example The business macro environment describes factors like competition, clients, industries, market, companies and even clients. In the past Dell, unlike most of its competitors, has not made any significant accomplishments in the smartphone technology and business. Resultantly, this has led to a lot of criticism for the past decade with most people questioning its proficiency even in its core field, which is computer technology. In 2009, Dell launched its first ever smartphone that most of its supporters, consumers and other stakeholders had been waiting for with a lot of fanaticism, which is understandable considering its reputation in computer technology (Holman, 2005). The Mini 3i was among the biggest disappointments of the company as most of the reviews termed it as an attempt. The most disappointing thing was the location of the launch as the Chinese got the first experience being the aim market for Dell; evidently, this itself was substandard for the people in the west. This development has meant that the company conducts an analysis of its environment in order to determined the right approaches and strategies it can use in its marketing and other important functions towards it operations (Holman, 2005). It is important to realize that business environment analysis is an important process that happens for all businesses that want to create competitive advantages in their business operations. The internal business environment contains factors that the business can manipulate in the process of creating its competitive advantages (Arthur, 2012). These factors make up the strengths and weaknesses for a business when analyzing its SWOT. Some of the important factors in Dell computerââ¬â¢s internal business environment include the following With regard to strategy, the company relies on various approaches in its market entry requirements. The company has managed to put up a team that conducts
Friday, November 15, 2019
Creativity: The Most Common Tool to Explain Human Origin?
Creativity: The Most Common Tool to Explain Human Origin? Has Creativity Been the Most Common Tool to Explain Human Origin? Bryan Perezà Abstract The creative process is directly involved in the development of theories that explain the mans origin. In like manner, the religion and the science are connected by their provenance. The contemporaneous beliefs and the cultural stories from ancient civilizations are also influenced by creativity, equally, evolution shows a creative development located in some stages that shows morphological and psychological changes. This paper evaluates the creative influence in the development of theories which explain the mans origin. Web sources and also relevant books were used to identify and link different points of view about the topic. The most remarkable results locate the creativity as the process that humans develop all along, with attention to chronological interpretations such as the evolution stages and also common points in different religious and cultural beliefs. Finally, the conclusion stablishes how creativity may influence the theories postulation, issue where it should be as obj ective as possible to attempt to explain facts instead of thoughts. Introduction It is said that God has created man in his own image. But it may be that humankind has created God in the image of humankind (Hanh, 1999). Sometimes, people ask themselves how everything around them was created. What or Who is the creator of everything? Answers to these questions are generated by the same common people, children, teachers, youths and scientists, who constantly ask for explanations about their origin. This origin is usually related to some theories (creationism and evolutionism), which come from a process of investigation and a little part of imagination. Even when these theories explain facts (National Center for Science Education, n.d., para. 3), scientists do not have enough evidence about the first yoctosecond of the Universes existence. They may be obligated to complete the missing piece of the puzzle with some ideas elaborated by their creative minds. The evolution theory has undergone some changes throughout history. It is a consequence of the creative influence on the development of new theories. For interesting topics, creativity is really useful. Scientists should be conscious of the information they provide with their theories. Mans creativity has been an important part of the explanation of his origin, this statement is sustained in three relevant aspects: mans creation theories with a common theme about a creator, human evolutive process and its refutations, and lastly, the creative development that leads to reason beyond simple ideas. Common theme in creation theories Have been heard about humans out of yellow and white corn (Batz, 2012)? Or maybe Lake Titicaca Story? Those are theories that explain mans origin on the Mayas and the Incas creation. In another part, the Creationist theory is really linked with these, concluding that there are different theories about mans origin, but all of them have a common point of a unique Creator. Humans origin theories To understand the influence of creativity on these humans origin theories, it is necessary to explain three common examples. As the Bible says: So God created man in his own image, in the image of God he created him; male and female he created them (Gen. 1:27 English Standard Version). For Christianism, like a monotheistic religion, God is the only explanation for all questions about how man has come into existence until now. In another place the Mayas theory tells that the Creators (à ¢Ã¢â ¬Ã ¦) wanted to create human beings with hearts and minds who could keep the days (Batz, 2012). This last phrase complicated the situation for the Mayas gods, because they had to create three different types of humans. The first group was made of mud, but rain destroyed them and moreover they could not speak. Gods tried again, and created mans of wood, but these did not revere them. When these deities finally created humans out of yellow and white corn who could talk, they were satisfied (Batz, 2012), because these had intelligence and respect for their creators. In a last comparative theory, Incas converge in a general idea. God Viracocha created Manco Capac and Mama Ocllo[1], who emerged from the Lake Titicaca and walked guided by a wooden bar directly to El Cuzco, place where they found the Inca Empire (Cobo, 1979). Creativity on this common point As it is remarkable, the theories have showed a common theme in the idea of an only Creator or Creators. For Christianism, the human being was created from mud, while for the Mayas, muds man was a failure. The Incas, for their part, create a couple similar to Adam and Eve in Christianism but one more time, their God was who create everything around. Except for Christianity, the others are polytheistic, but this does not change that in almost every culture around the world, the religion of a particular culture began with a concept of a masculine, creator God who lives in the heavens (Zukeran, 2007). In the same line, creativity is therefore, responsible for this common point. Human beings develop creative ideas from 6 resources- intellectual processes, knowledge, intellectual style, personality, motivation, and environmental context (Sternberg Lubart, 1991). In consequence, it is thinkable that Individuals may be driven to try to create a sense of coherent self-identity through time, in particular in self-narratives of their development (Feinsten, 2006, p.26); in other words, past civilizations have developed the necessity to create a God in who believed and whom they can worship. To sum up, the similarities founded reflect that there is a common point that prevails between the theories analyzed, this point reflects the creative influence that man uses to explain his own origin in a religious context. Human evolutive process and its refutations It has been thought that evolution is the most acceptable theory to explain the mans origin. The theory bases its main argument on the most evidence that has been discovered through time, nonetheless, this theory has its own refutations, too. On this way, scientists are creative people who beyond postulate a theory, postulate a creative bond that establish the evolution as the explanation for the mans origin. The process of the evolution A Belgian priest, astronomer and professor of physics, Georges Lemaà ®tre proposed the Big Bang theory in 1933. For Catholicism, it was declared as a scientific validation, however, Lemaà ®tre resented this proclamation, stating that the theory was neutral and there was neither a connection nor a contradiction between his religion and his theory (Landsberg, 1999). As it is seen, this theory has a religious origin; but at the same time, it is considered like a valuable explanation for the current science. Lemaà ®tres thought gave birth the Evolution theory by explaining the Earth origin, place where human beings evolved from apes. It was only late in the Tertiary period (about 3-4 million years ago) that one of the branches of the Primates evolved into humans (à ¢Ã¢â ¬Ã ¦) Human fossils as well as molecular genetic and biochemical evidence demonstrate the existence of early life forms, which developed before and prepared the present living beings (Facchini, 2002). Do the refutations show a creative intervention of scientists? A 2010 study found no net fruit fly evolution after 600 generations (Thomas, 2012). This fact demonstrates that scientists do not concordat in a common explanation for the evolution process. In addition, another evidence tells that the transition from an amphibians three-chambered heart to a mammals four-chambered heart would require either a new internal heart wall that would block vital blood flow (Thomas, 2012). On the other hand, fossils are the main evidence to support the evolution theory; but as Ph.D. John D. Morris says, fossils appear abruptly in the record, fully formed and fully functional without less adapted ancestors in lower levels that would have preceded them in time (2003). This shows that fossils do not explain evolution as such, so it may be considered that scientists created the bonds between missing links of the evolution theory. The article Scientists are more creative than you might imagine, shows that the improvising brains (à ¢Ã¢â ¬Ã ¦) let the ideas bubble to the surface (Ossola, 2014). Some lines after, the article explain that its going to be the same phenomenon on scientists. Thus, it is reasonable to identify that scientists may develop an involuntary process of creativity when they try to explain unlinked ages of the evolution theory. The reason of all Creativity is the process of having original ideas that have value (Robinson, 2006), thus, it is possible to ask, how may the people create their own origin story by using their creativity? The creative development leads to establish questions or answers about this topic. Scientific postulations and also religious theories have a little influence of subjective thoughts. Indeed, the creativity is much more than an innate quality, it is a state where it is possible to create something. It is exemplified in the students who may demonstrated this by developing their skills into the schools. So, teachers have the big duty of drive the way students learn and what they need to learn (Segan, 2016), because it is changing rapidly. The reason of all comes from this fact, even with the scarcity of modern (à ¢Ã¢â ¬Ã ¦) supplies in poor parts of the world (Childress, 2007), creativity may be developed in every sense; including the development of new theories applicable to the subject of evolution or the mans origin. The reason of all also involves a great link between actual teachers and future scientists, something similar to the educational development of Finland (Faust, 2011), where the creativity is one of the pillars of the education. Therefore, the creative process shows that creativity is the question and the answer for this topic, it is involved in developing or repairing ideas to connect everything related in a theory postulation. In conclusion, the explanation for the mans origin is due to the creative process. This idea is based on three relevant aspects: theories of mans creation, human evolutive process, and lastly the creative development that leads to establish questionable answers about our origin. For the etymology of the Incas and also the Mayas, their existence comes from a gods creation. Historically, the Christianity changed these thoughts into a conventional belief in an only almighty God, who answers every question about human existence. On the contrary, the evolution theory postulates a continuous process of development during several generations in past ages of life. The creative intervention is located in every theory. Humans have a psychological need for a transcendent being that provides meaning and hope to their existence in this vast impersonal universe (Zukeran, 2007). This phrase clears the idea about how the man may include his own thoughts in objective statements like theories. Sometimes, creativity is underestimated in several ways, especially for science works, but it is an inherent quality of the human existence; so, the creativity influences our thoughts. The human being and his origin is a questionable topic. There are some theories of how he could exist from the first period of time. Creator or creators, evolution or not, the creativity was shown as the question and the answer for this topic because it is involved in developing or repairing ideas to connect everything related in a theory postulation. [1] The first couple of human beings in the Incas theory.
Tuesday, November 12, 2019
Land, Public and Private Essay
1. Why do humans value land? Humans value land because it has multiple purposes such as agriculture, housing, recreation, industry, disposing waste, mining, etc. 2. What is the tragedy of the commons? What is an externality? The tragedy of commons is when people share a common resource they tend to deplete is because of self-interest and for a short term profit. 3. What is maximum sustainable yeild? Maximum sustainable yield is the maximum amount of harvest that the land can produce without having to compensate the future of the land or resource. 4. What are the main uses of public lands in the U.S.? The main uses of public lands in the United States is National parks, Managed resource protections areas, Habitat and species management areas, Strict Nature reserves and Wilderness areas, Protected landscapes and seascapes, National monuments, etc. 5. How do human land use decisions influence categories of public land classification? Human land use decisions influence categories of public land classification because what land we have interest in we will express more environmental policies, laws, and put more time in managing the land. 6. What are the ways in which timber is harvested in U.S. Forest, and how do they compare in terms of their environmental impact? Timber in the United States is harvest by commercial logging in exchange for a percentage of revenue. Clear cutting removes almost all of the trees within a certain area. This method is the most economical method because all the trees will be the same age because they are all planted at the same time. This method can also cause habitat alterations that can lose biodiversity. Selective cutting removes single trees out of a few number of trees. This method works only among shade tolerant trees because the other trees grow adjacently. The environment impact is less but the overall negatives effects are the same. 7. What is the significance of the National Wilderness Area designation for parts of federally owned lands? The significance of the National Wilderness Area forà parts of federally owned lands is to set aside land to preserve large intact ecosystems. The designated wilderness area however has roads that existed before the designations and may be still in use, mining activities can be permitted , and human use is limited but can still be done. 8. What is NEPA, and what is an environmental impact statements (EIS)? A NEPA is the National Environmental Policy Act of 1969. This act involves federal money or federal permits. The Environmental impact statement (EIS) outlines the scope and purpose of development project that describes the environmental context. 9. What are urban sprawl and smart growth? Urban sprawl is the creation of urbanized areas that spread into rural areas and remove clear boundaries. Smart growth is the strategies that encourage the development of sustainable, healthy communities. 10. How can zoning help reduce urban sprawl? Zoning can help reduce urban sprawl because it can create a quieter and safer community.
Sunday, November 10, 2019
Is College Worth the Costs? Essay
ââ¬Å"Higher education canââ¬â¢t be a luxury, itââ¬â¢s an economic imperative that every family in America should be able to afford.â⬠These are the words spoken on the 2012 campaign trail by president Barack Obama, on the importance of higher education. The cost for a college education is a big conversation in many American homes, as well as in Washington. Families are deciding if they will be able to send their children to college due the high and rising cost of a college degree. Sadly, some of them are choosing to bypass college because they believe that the price is too high. Those who believe college is no longer worth the money think the risk of not finding a job is too high, the amount of debt incurred is ridiculous, and the financial effects on the economy are devastating. Although many of these points are true, college graduates tend to live longer, happier lives, are in better financial standing, and fill the critical demands of skilled professions. College tuition prices have increased rapidly over the past few decades, putting a damper on the idea of attending. In the last decade alone, tuition and room and board prices have increased by 23% at private institutions, and 36% at public ones (Mandel 1). Itââ¬â¢s to be expected that since the price of almost of everything has increased the last decade due to the economy, that education would too. But, the hike in the price of college tuition has surpassed inflation, making it difficult for almost all middle class Americans to finance a higher education. The argument, though, is not if families can afford to send their children to college; itââ¬â¢s if they believe that a college education is still worth the high cost it entails. Despite the increases in education costs, higher education is still important, though it may be harder to obtain. The risky job market is a reason students are choosing to bypass college. Along with high tuition prices, the job market for recent graduates is unstable. In the previous 2012 presidential election, a big topic in the live debates were that recent college graduates were unable to find jobs in their field, and if they did, most of the time they were most of the time,à underpaid. This is a scary situation that graduates hope they never have to deal with. New graduates are hoping for a solid job upon graduating from college to pay for their previous four years, and to start their careers and lives. The problem can be summarized by the statement, ââ¬Å"Indeed, 60 percent of the increased college graduate population between 1992 and 2008 ended up in these lower skilled jobs, raising real questions about the desirability of pushing to increase the proportion of Americans attending and graduating from four year colleges and universitiesâ⬠(Duke 3). If graduating from college means spending thousands of dollars to end up with the same job you would have if you didnââ¬â¢t go to college, people are asking, ââ¬Å"what is the point?â⬠More people are starting to realize this, and though students are still attending college, they are thinking hard about the possible risk of not getting the job of their choice after graduating. Sadly, some of them are turning down college because of the worry of not being able to find a job. Of course there are risks with every decision someone makes, and by attending college one is at risk of not finding a open position in their field and having to settle for something less. But there are also risks of not attending college. These risk include the health and well-being of oneââ¬â¢s self. Whether or not one finds the right job after graduating, the education and skills acquired still stays throughout their life. This involves learning and practicing healthy habits. Studies have shown that those who earn college degrees are more likely to live happier healthier lives than those who donââ¬â¢t. A report done by the Commission on Heath stated ââ¬Å"that those with more education are likely to live longer, experience better health outcomes, and practice healthy behaviors like exercise, avoiding smoking, and getting regular checkupsâ⬠(ââ¬Å"The Happy Stateâ⬠7). Those who are highly educated, have learned the importance of health and wellness, and usually live lives that reflect that. Living a healthier life includes: living longer, seeking more prosperous relationships, and having better community connections. Pew Research on Social and Demographic Trends, found that those who have graduated college are significantly happier than those will a high school diploma or less (ââ¬Å"Are We Happy Yet?â⬠). So although the risk of not finding a job after graduating is very real, one should consider theà risk of not attending school. Unfortunately, people tend to think more about wealth and not health when deciding whether or not to pursue a college degree. Students are accumulating massive debt, causing some to believe a higher education is not worth the large loans they are forced to take out. With higher tuition bills, students are have to take out more loans, leaving them with a large debt to pay after graduating. In 2012, the average loan debt for college graduates was $27,000, which is more than double from five years ago (Ross 7). No one wants to start their careers with an overwhelming amount of loan debt. Therefore, many students are justified in skipping college to jump straight into a job where the money they will be making will not have to go toward paying off school debt. A $27,000 debt upon graduating is not usually a selling point for prospective students deciding if attending college is a smart decision. To help cut down on the amount of loans one has to take out, universities are generous with financial aid. A majority of students earn some sort of financial aid, whether it be academic or need based. These financial grants and scholarships can significantly reduce the amount of money needed to finance a college education. In a study done on Dickinson College, in 2007 the average discount rate for first-years was 30 percent. It was also states that the average at liberal arts colleges is 40 percent (Massa and Parker 94). So, even though the students are forced to take out more loans to pay for college, obtaining financial aid by doing well in high school can reduce the amount needed to pay for college. Along with cutting down on expenses by taking advantage of financial aid awards, earning more money in a lifetime is a smart reason to go to college. College graduates make significantly more money in their lifetime. Though many high school graduates are eager to start making money, investing time and money into a college degree will end up being a bigger pay out in the end. The amount of money earned in a lifetime with a degree exceeds the amount of loans that one owes. According to the research done, ââ¬Å"college graduates earn, on average, about $20,000 a year more than those whoà finished their educations at high school. Add that up over a 40-year working life and the total differential is about $800,000[â⬠¦]â⬠(Clark 3). Even though there are rare cases where students end up making a large amount of money without a college degree, like Microsoft founder Bill Gates, the chances of one finding a high paying job without a college education is slim. So even though incurring debt is unattractive, the amount of money earned by obtaining a college degree is worth having to pay back college loans. An effect of borrowing so much money from the government and not finding a decent job, students are not able to make loan payments. This not only hurts the students but the economy as a whole. When graduates are not able to pay back the money they owe, the federal government suffers and loses money. The ââ¬Å"delinquenciesâ⬠of student loans is now higher than credit cards, mortgages, and all other kinds of consumer loans. The federal Consumer Financial Protection Bureau has stated that student debt has surpassed $1 trillion (Coy 1). As the economy incurs more of this debt, taxpayers are forced to pay more. This issue has greatly impacted not only students and their families, but the older generations. Other generations now believe that students are not able to pay their school debt, convincing them that college is not worth the enormous amount of debt that affects not only the graduates. Although it is true that defaulted loans hurt the economy, the nation still needs skilled employees with college degrees to fill critical professions. These graduates play a big role in the furthering of society. It is no new information most people believe a college education is the first step in becoming successful. Many believe an education opens doors and opportunities in the world to become prosperous. In fact, President Obama has greatly promoted higher education during his terms. He even donated most of his $1.4 million Nobel Peace Prize Award to support those who cannot afford a college education (Beaver 21). America needs higher educated people to make advancements in technology, medicine, and relations. Imagine for a moment that everyone decided that a college education was not worth it. Yes, the economy would not acquire as much debt, but who would continue to makeà advancements in science, treat the sick, or deal with foreign nations? Nations around the world are competing with the United States academically; as a result of this, countries like China, are making strides economically and technologically, competing with the U.S. as the worlds largest super power. A economic crisis like the one the United States is in now requires highly skilled professionals and leaders to make smart and effective decisions to better the country. These professionals are produced through higher education and knowledge. Without college graduates, there is no hope for bettering society. So, is college worth the costs? Many skeptical people believe that today it isnââ¬â¢t. Because of the risky job market, where recent college graduates are not able to find a job, or at least one in their field of study, students have chosen to skip college. Also, students are finding themselves struggling to afford the high tuition prices of most universities. The high tuition bills force students to rely on loans to pay for a degree, and when they cannot find jobs to pay back those loans, they default on those loans hurting themselves and the economy. These reasons have caused families to rethink attending college, and although they are legitimate reasons, there are still important reasons as to why college is worth the investment. It has been shown that those with a college education live happier, healthier lives. Graduates make significantly more money in a lifetime and are more financially stable. Lastly, people with higher education are essential for the country. Their knowledge makes the advancements needed to maintain a prosperous nation. Health, money, and social progression is why investment of a college education is worth the cost, even if the price is high. Works Cited Beaver, William. ââ¬Å"Do We Need More College Graduates?.â⬠Society 47.4 (2010): 308-311. Academic Search Complete. Web. 4 Nov. 2013. Clark, Kim. ââ¬Å"How Much Is That College Degree Really Worth?â⬠US News. U.S.News & World Report, 30 Oct. 2008. Web. 27 Oct. 2013. ââ¬Å"College Grads Happier.â⬠Pew Social Demographic Trends RSS. Pew Research Center, 3 Nov. 2010. Web. 02 Dec. 2013. Coy, Peter. ââ¬Å"The Needless Tragedy Of Student Loan Defaults.â⬠Businessweek.Com (2012): 3. Business Source Complete. Web. 4 Nov. 2013. Duke, Selwyn. ââ¬Å"DIPLOMA DISASTER? (Cover Story).â⬠New American (08856540) 29.15 (2013): 10-15. Academic Search Complete. Web. 30 Oct. 2013. Mandel, Michael. ââ¬Å"College: Rising Costs, Diminishing Returns.â⬠Businessweek 4148 (2009): 20. Business Source Complete. Web. 30 Oct. 2013. Massa, Robert J., and Annette S. Parker. ââ¬Å"Fixing the Net Tuition Revenue Dilemma: The Dickinson College Story.â⬠Strategic Financial Challenges for Higher Education: How to Achieve Quality, Accountability, and Innovation. By Donna Klinger and Lucie Lapovsky. San Francisco, CA: Jossey-Bass, 2008. 93-94. Print. Ross, Andrew. ââ¬Å"Mortgaging The Future: Student Debt In The Age Of Austerity.â⬠New Labor Forum (Murphy Institute) 22.1 (2013): 23-28. Business Source Complete. Web. 31 Oct. 2013. ââ¬Å"The Happy State of College Graduates.â⬠-. N.p., n.d. Web. 25 Oct. 2013.
Friday, November 8, 2019
Social Media Editorial Calendar How to Organize Yours (Free Template)
Social Media Editorial Calendar How to Organize Yours (Free Template) Social media editorial calendars are important tools for busy teams. They make it possible to plan posts ahead of time, avoid last-minute fire drills to create content, and keep your workflow organized. Without one, youre left scrambling to keep your social posting schedule full. But, you might have some questions: What exactly is a social media editorial calendar? How can I build one (or is there an app I can use instead)? Where can I find some templates to get started with? Well cover all those questions and more in this post. By the time youre done, youll know: How to get started using free templates and basic knowledge of social strategy. How to plan everything from one-off posts to entire campaigns on one calendar. How to organize effective scheduling workflows around your calendar. In short, your team will have one version of truth they can reference for all things social media marketing. Table of Contents What Is a Social Media Editorial Calendar? Three Social Media Calendar Format Examples Who Uses Social Calendars? What Are The Real Benefits? Download Your Free Social Media Editorial Calendar Template What Makes Up a Good Social Media Calendar? Developing a Social Media Content Strategy Figure Out What Content Works For Which Networks Plan Your Social Media Sharing Schedule Plan Your Social Media Content Creation Workflow Use Social Analytics In Use Data to Optimize Your Calendar Three Tips to Keep Your Calendar FullHow to Effectively Organize Your Social Media Editorial Calendar (Free Template) via @ So, What Is A Social Media Editorial Calendar? Heres the definition well work with: Social media editorial calendars are spreadsheets or apps used to schedule social posts in advance. Theyre also used to plan when and which content will be shared, manage campaigns, and track deadlines. That sounds simple enough, right? Lets look at a few different formats you might use: Printed calendars. The old-school approach. These can be helpful for mapping out content themes and making note of upcoming content and events needing social media promotion. You might keep something like this on your desk or pinned to your cubicle wall. Spreadsheets. Shared spreadsheets are flexible and free. However, they dont allow for automation quite as well as dedicated social media calendar apps and scheduling tools. The most efficient solutions. These apps add a level of automation (plus other powerful features) that spreadsheets cant match. Spreadsheets are workable solutions at firstà and are a great option when youre starting out. When you need more power and automation, though, a holistic marketing management platform like (which brings social into focus alongside all other projects and campaigns) is the best option.à As we continue in this post, well show you how to use both. Or schedule a demo today. How to Plan an Effective Social Media Editorial Calendar (Free Templates) via @ Three Social Media Calendar Format Examples So, what do these calendars look like in action? Lets take a look at some examples. Printed Calendar Example Spreadsheet Calendar Example Calendar Example Who Can Use a Social Calendar? Anyone creating social content, whether for a business, media company, or a serious blog, should consider using a calendar. Marketing teams: Marketing campaigns often have a lot of moving parts, including social components. Keeping teams organized and making sure everyone involved in a project understands the social promotion schedule is key. Plus, giving all your marketing departments visibility on whats going out, and when, helps everyone know whats going on and when things need to be finished. Small businesses: Staying organized with a calendar makes it much easier to save time and maintain consistency. This is important for small businesses, where resources are limited. Consultants: If youre managing social media marketing for multiple clients, you probably wish you had an extra set of hands. Unfortunately, medical science hasnt made that possible (yet). But, getting each client organized on their own calendar can help immensely (especially when you add automation). Media companies: If youre creating editorial content, itll need social media promotion. Keep it all together on your calendar. Bloggers: If your blog is your business, you dont have time to waste with dysfunctional tools. Make sure every post gets promoted on your calendar. What Are The Real Benefits? Before you invest the time into building out a completed calendar, you probably want to know what the real benefits are. We believe those benefits can be broken down into four areas: Turning chaos into harmony. Managing multiple social media accounts can turn messy fast. That kind of disorganization will kill your efficiency.à It can also diminish the effectiveness of your social media marketing efforts. Knowing what youll say and when youll say it saves time so you can get other important things done. Holding teams accountable. Calendars are great for setting deadlines. Its easy to procrastinate when deadlines are flexible (or nonexistent).à Laying out a clear plan eliminates excuses for not knowing what content to publish on your social channels. Saving time (that you can use to get real work done). No one ever has enough time. However, planning your social media outreach with a calendar lets you make the most of the time you have. Measurably improving your results. This is the benefit that supersedes all other benefits. After all, efficiency without effectiveness really justà meansà doing things poorly, quickly. Using a calendar allows you to schedule your messages for optimal times, increasing the odds theyll get seen. 4 reasons to use a social media calendar: Organization. Accountability. Efficiency. Effectiveness.So, that all sounds great. But, you probably want to see some hard data supporting these claims. did too. In the companys early days, Nathan Ellering, our Head of Demand Generation, gathered data on what happened he used a calendar to schedule multiple social posts promoting a single piece of content. Here are the results: 3,150% increase in clicks. Best of all, theres no reason you cant replicate similar success, too. Start By Downloading Your Free Social Media Editorial Calendar Template This template is built to make scheduling social media posts easy. No matter how many networks youre active on, youll be able to keep everything organized, all in one place. Its a free Excel file that can easily be uploaded to Google Sheets (which we recommend if your calendar will be shared with multiple users). Next, let's walk through each section of your template. 1. The Broad And General Calendar Youââ¬â¢ll need an overarching calendar to help you focus on topics that matter to your audience. For content marketers, it would be perfect to schedule your broad topic calendar four to six months out. Thatà gives you the opportunity to plan new contentà basedà your audienceââ¬â¢s reactions. To build your broad and general calendar, start by downloading the social media calendar bundle included in this post. Then, open up the Social Media Calendar Excel file. Youââ¬â¢ll find the ââ¬Å"Broad and General Calendarâ⬠section at the top of the first tab: Use the Main Theme row to map out your primary content themes for each month. Then, fill in sub-topics for content youââ¬â¢ll want to create and share that support those themes. You can base your general calendar on the model fromà traditional magazines. Theyà typicallyà offer these sorts of editorial calendars for an entire year to attract advertisers for specific magazine issues. For example, check out thisà editorial calendar example from Forbes. 2. The Content Calendar The content calendar provides a lot more detail. This is when you look at your topics and planà the actualà content typesà best suited to tell your specific stories- blog posts,à e-books, videos, webinars, events, and whathaveyou. Letââ¬â¢s look back at the social media calendar you downloaded from this post. Beneath the Broad and General calendar, youââ¬â¢ll find the Content Calendar. This is where you can map out all the content youââ¬â¢ll create (and later share and promote on social media): At this point, you assign the specific dates on which each piece will publish. Typically, you can work two to three months out with this calendar. Recommended Reading:à The Complete 14-Step Content Strategy That Will Boost Your Results By 434% 3. Theà Promotion Calendar The promotionà calendar is yourà plan to share all of the content you create. This is when youââ¬â¢llà schedule your social media messagesà and plan your emails, newsletters, and other ways youââ¬â¢ll share your content. Using your Social Media Calendar, click into any of the month tabs along the bottom. Hereââ¬â¢s what youââ¬â¢ll see: This is where youââ¬â¢ll create and store all your social media promotion content. Hereââ¬â¢s what you should put in each field: Content: This is your social media post copy. Image Link: If your post will have an image or video, upload it to a cloud storage service (such as Google Drive or Dropbox). Then, drop a link to the image here. This will give you easy access to your images when youââ¬â¢re ready to create your posts. URL: If a post will include a link, drop it in here. You can then assign the specific dates when youââ¬â¢ll share each of these messages, which usually takes place immediately after youââ¬â¢re done creating the content youââ¬â¢ll share (but youà canà plan this ahead of schedule with the right tools). What Makes Up A Good Social Media Calendar? It seems like a lot of content marketersà create great content, share it when it goes live, and then theyà call it good.à Theyââ¬â¢re all missing outà on their own 3,150% more click-throughs. Instead of taking this minimalist approach, a great social media calendar maximizes exposure of your content on the social networksà your audience uses- without being spammy. As you plan your content, these eightà things can make or break your social media calendar. 1. Understand Why Your Audience Shares Your Content Once you understand theà psychology of why your audience shares, you can create content in ways that are most likely toà connect with them. This will help you plan awesome content from the get-go, and help you interact- socialize- with your audience using social media. A report fromà The New York Timesà Customer Insight Group found five major reasons why people share content with their networks: 84% share to support a cause. 78% share toà stay connected with those they know. 69% share to feel involved in the world. 68% share to defineà themselves. 49% share for entertainment or to provide valuable content to others. The study also found that 73% of the survey takers shared content to understand the information more thoughtfully. As you can imagine, there are a lot of lessons to learn from this knowledge. As you plan your social media calendar, keep this in mind: Help Them Define Themselves Create content about your differentà customer typesà and help them self-identify. That will help you, and help them connect with your content. Help Them Connect With Others Imagine the possibilities a forum- or even a larger brand ambassador program- could present for your customers to ask each other questions and learn from one another. You could even start as simple as aà Twitter chat. Recommended Reading:à 21 Social Media Engagement Tactics That Will Grow Your Audience Value Them- And Let Them Know It If someone sends you a message, leaves you a comment, responds to a tweet- whatever it is- let them know that you valued their contribution.à Listenà and respond. Help Them Believe In Something Again, let your advocates know you appreciate their respect. Theyââ¬â¢re your rock stars, and almostà nothing is better than social proof. While some of this is more about creating awesome content in the first place,à this is the backbone on which youââ¬â¢ll build your social media calendar.à But without sharing good content in the first place, why would anyone want to interact with you? Build A Simple Social Media Content Strategy No one likes people who talk only about themselves. Nor does anyone want to be around someone only interested in talking about one topic. The same goes for brands. If you're only pushing your own content, you're unlikely to drive much engagement. The same is true if you're only publishing one type of content.à This is why you need a social media content strategyà to ensure you're sending a balanced content mix. If "content strategy" makes you think "large, boring document," then don't worry. This doesn't have to take a lot of time. You just need to define how much of which types of content you're going to share. Here's an example of what your messaging mixà might look like: Figure Out What Content Works For Specific Socialà Networks Some content lends itself better for certain social networks. And- assuming youà know your audience- youââ¬â¢re using specific social media to target your customers. Can you shareà your same piece of contentà on multiple networks? Yes. Just make sure your social media messages follow these best practices to get the mostà traffic. Use Twitter To Share Business Tips And Show Aà Little Personality Twitter has become content marketersââ¬â¢ best friend recently. Thatââ¬â¢s because one of the best ways to use Twitter is to share helpful business tips. And after all, thatââ¬â¢s exactly what youââ¬â¢re creating in your content, right? Other content types that work well for sharing are news and things going on behind the scenes to share your businessââ¬â¢ passion. Twitter Tip:à Share useful business tips that draw your readers in. Buffer found thatà sharing images on Twitter increases retweets by 150%. And when we tested GIFs in tweets recently, we increased clickthroughs by anotherà 166.6% more than static image tweets. So definitely try visualsà in your tweets to see if that will make a difference. Track Social also found data to support thatà 70ââ¬â100 characters is the ideal length for tweetsto get retweets. Imagine that: Just enough context to know what youââ¬â¢re sharing with enough room for them to add their own individual thoughts. Twitter Tip:à Share visual content on Twitter with a 70ââ¬â100-character message. Facebook Is For Entertainment Facebook wants your useful and entertaining content- the kind that people can share with their friends and family no matter their background. Industryà blahà contentà just doesnââ¬â¢t work on Facebook. Facebook Tip:à Share entertaining content. Think of quizzes that are fun to take or comment on- and then you also get some cool data. Or think of storytelling and how inspirational or emotional stories seem to light up your newsfeed. Facebook posts with less than 100 characters typically perform the best. Combine this withà images and videos, and your postsà will be even more likely to increase your engagement. Hereââ¬â¢s a good inspirational example from Ford Motor Company: Welcome to the Driver's Seat Women in Saudi Arabia will soon be free to take the wheel. Welcome to the driverââ¬â¢s seat. Posted by Ford Motor Company on Thursday, March 8, 2018 Facebook Tip:à Share visual content on Facebook with a message less than 100 characters long. Use LinkedIn To Share Your Business And Industry News Iââ¬â¢mà not talking cheesy press releases here that are all about you. Iââ¬â¢mà talking about valuable information like business case studies, how-to posts- examples of how to grow professionally as a person and business in your niche. Remember that people use social media to define themselves and build relationships? LinkedIn is exactly that for professionals. LinkedIn Tip:à Share content that helps your audience grow professionally. Images on LinkedInà get 98% more commentsà than posts without images. And apparently, video links to YouTube result in aà 75% higher share rate. Combine those visuals with shorter messages- questions, demands, or helpful takeaways you personally learned- and youââ¬â¢ll get some interaction with your content. LinkedIn Tip:à Share posts with images and short messages about why your audience should engage with your content. Google+ Combines Personal And Professional Content Google+ is kind of a grab bag between personal and professional. In your private circle, you can share pics of your kids, and in your public circle, you can share your professional content. But there are exciting opportunities with Google+ from a business perspective. Share your helpful content here like you might on LinkedIn. Imagine how-to videos, helpful GIFs to use your product, and other support content. Early research found that Google+ contentà is slightly tech-driven, so your straightforward content on doingà something better may be your best bet. Google+ Tip:à Share technical how-to content like videos, GIFs, and blog posts. For Google+ posts, differentiate your content withà longer richà text snippets. Long-form posts for Google+ help you stand out for your audience- and youââ¬â¢ll capitalize on the networkââ¬â¢s natural SEO juice. Pare down your introduction and pick two or three of your big ideas to share. Google+ Tip:à Use rich text to create paragraphs and mark up your text (bold, etc.). Try longer content to see what your audience will appreciate. The Only Way To Use Pinterest Is With Awesome Visuals The only way to use Pinterest really well is to share extremely awesome visual content. Think of small info-images, infographics, comics, custom photography, and memes. Pinterest Tip:à Brainstorm the best ways to connect with your audience visually and explore those media types. Donââ¬â¢t get stuck on one if itââ¬â¢s not working. Pinterest has an audience thatââ¬â¢s looking for fun, how-to content that looksâ⬠¦ wellâ⬠¦ awesome. Hereââ¬â¢s an example of one our own boards: Itââ¬â¢s no secret that Pinterest is dominated by women users too- 80% of their entire user base- so if thatââ¬â¢s your target audience, this may be a great platform for you. Some of the best content on Pinterest involvesà fashion, recipes, and DIY. Pinterest Tip:à Donââ¬â¢t even try Pinterest unless you have awesome visual content. Plan how youââ¬â¢ll do that before you just jump in. Plan Your Social Media Sharing Schedule In order to make the most out of your calendar, it helps to have a grasp on basic social media marketing mechanics. Know Your Post Frequency Targets There's a lot of discussion around how often you should post on each social network. Here is what we recommend as a starting point: Don't take these numbers asà gospel. If these numbers aren't getting you results, then mix it up. Test until you find out what works best for you. Recommended Reading: How Often to Post on Social Media? Proven Research from 14 Studies. Know The Best Times To Post On Each Network There is some debate about the best times to post on various social media networks. Fortunately, we've crunched the data from tons of different studies, and here's what we found: Plan Your Social Media Content Creation Workflow Now, let's explore how to use the calendar step-by-step. Follow along to plan out an entire social media marketing workflow for your team (or yourself), all based around your calendar. Step 1: Determine What You'll Be Creating Or Sharing Let's begin with a hypothetical social media campaign. Maybe you're promoting: A blog post or article A landing page An event A contest A brand or product, in general Whatever the case may be, knowing what you'll be promoting, creating, or sharing is likely where your process will start. Recommended Reading: How to Generate Better Social Media Campaign Ideas Like a Creative Genius Step 2: Write Your Post Copy As our own Nathan Ellering recently said on our blog: Think of each message as aà call to action: Sell your followers on the value theyââ¬â¢ll get if they just click through to read your blog post. Or make them question a current belief with the promise of a better solution to a problem. Or make them feel like theyââ¬â¢re missing out on something amazing. In short, words have power. Wield them intentionally to invoke the emotional response you want. Getting this right is key to driving engagement and traffic. So, what are some of the specific types of messaging that you can try out? Questions. Close-ended questions drive more clickthroughs. However, open-ended questions may drive more engagement (since you're asking for a response). Benefits. Hint at what's in it for your audience to click through on your link. FOMO. Otherwise known as "the fear of missing out."à This angle can work well ifà you're giving your audience a deadline to act. Stats. Numbers that seem hard-to-believe (but are accurate) can be a great way to stoke interest. Facts. Again, the harder to believe, the better. Controversy. This doesn't mean to be offensive. It means don't be afraid of questioning status quo. If you have a contrary opinion on a topic, put it out there. You just might spark a discussion that changes what folks consider common wisdom (which isn't always wise)Wield your words intentionally to invoke the emotional response that you want.If you don't want to write your posts directly into your spreadsheet, use in a word processor (Word, Google Docs, or anything else you prefer will work). Lay out your document like this: Network: [INSERT NETWORK] Post 1 Copy: [ENTER POST] Post 1 Image: [INSERT IMAGE DIRECTION] Post 1 Link: [INSERT URL] Post 2 Copy: [ENTER POST] Post 2 Image: [INSERT IMAGE DIRECTION] Post 2 Link: [INSERT URL] Continue until you've completed a full campaign's worth of posts. To make sure each post is the best it can be before publishing, run your copy through theà Social Media Optimizer: To use the social message optimizer, start by typing in your post copy: Selectà Score My Message, and your score for each social channel will appear. For a more detailed breakdown, scroll along the top bar to switch between channels: Scroll down for more detailed analysis. You'll find tips to improve your post, including recommendations for character counts, hashtags, emotional sentiment, and emojis: You'll also get guidance on the optimal time to post: Best of all, it's totally free. Try it yourself here. Recommended Reading: How to Write for Social Media to Create the Best Posts Step 3: Hand Off Your Campaign for Design Next, hand off your image ideas to your designer. You'll likely need to discuss your ideas with them and get their creative input before they begin design. For the sake of example, let's say this is an image we'll use for our campaign: Now that you've got a graphic, upload them to a folder in a cloud-based storage service of your choice (Google Drive, Dropbox, or any other option). Give the folder a name specific to this campaign: Then, upload your image: Do this for each photo in your campaign. That way, you'll have easy access to all your campaign's assets when you're ready to post them. Recommended Reading: How to Make the Best Social Media Images the Easy Way Step 4: Add All Your Campaign Content Onto Your Calendar Now, you have all the content for your campaign ready. It's time to place it all on the calendar. Start by pasting in your post copy: Then, grabà the URL for the image from your image storage service and paste that in, too. If you're using Google Drive, click the Get Shareable Link button below: Then, paste the link from the popup into your calendar: Next, add your URL: Finally, add in the time for your post: Repeat as necessary until you've entered all your content. Follow this same process for every post you create. Tip: Use the text wrap settings in Google Sheets or Excel to control how content fills each cell in your calendar: Alternately, you can do this all in , too.à First, go to your calendar, click theà + icon and selectà Social Message: Select the social channel you want to post to and compose your message: Schedule your post using either Best Time Scheduling, or manually schedule your time: Step 5: Measure Your Results Once you start using your calendar, you'll want to see results, right? One way to do that is to measure referral traffic to your blog or website using Google Analytics. On the first tab of the calendar template included in this post, you'll see this link to a Custom Report template for Google Analytics: Copy and paste this URL into your browser. Next, you'll see a screen that looks like this: Under Select A View, choose which site associated with a Google Analytics account you'd like to use. Then, you'll see your free social media traffic dashboard: Next, copy the link to your new Google Analytics dashboard, and paste it over the original link to the template: Now, you have quick access to your social media performance, direct from your calendar. Recommended Reading: How to Use Social Media Analytics to Create the Best Content Or, Use Social Analytics in To automate your social media measurement, consider using Social Analytics in . You can track engagement rates, post-level performance metrics, compare campaigns side-by-side, and more (with exportable reports, too): Use That Data to Optimize Your Calendar When it comes to art and design, taste is often subjective. Data, however, isn't (although your interpretation of it might be). The key to getting the best results from your social media content is to bring the head (data) and heart (visual and verbal creative) together.à This means testing, tweaking, and adjusting to get the best results.
Wednesday, November 6, 2019
Interview With a Former Part-Time MBA Student
Interview With a Former Part-Time MBA Student Marci Reynolds, 42, from Boston, MA, completed her associates, bachelors and masters degrees part-time, while working full-time. She is currently a Vice President for a large, publicly traded corporation in the New England area.Ã I recently had the opportunity to interview Marci about her experience with part-time degree programs. Heres what she had to say: Q: You earned an associate, bachelors, and masters degree in part-time programs. Did you work full-time throughout all three programs? A: Yes, I worked full-time throughout the entire process. I started working full-time right after I graduated high school, then started taking evening college courses in my 20s. Some years, I took 3-5 classes, other years I took only 1. It would depend on the responsibilities I had to fulfill in my full-time job. Q: Was it difficult to find time for both school and a career? How did you make it work? A: Time management was definitely a challenge! Since I am a morning person, I would often get up extra early, ex. 5 a.m., to write papers or do homework. I studied during my lunch hour at work. And, I would go to the library on weekends to limit distractions and get as much work done as possible in short time increments. There were several occasions I used vacation days to study for major exams or finish large projects. Q: Did your employers help you with your tuition? A:Ã Yes, I was lucky to have tuition reimbursement from every employer. At the very end of completing my bachelors degree, I was bulking up on classes and had used up the company policy allotment of reimbursement. I appealed to senior management and got additional funding for my last three to four classes which was awesome! Since my masters degree was much more expensive, tuition reimbursement only covered about 50-60% of the costs. Q:Ã Were there any drawbacks to receiving tuition reimbursement? A:Ã Other than the small amount of paperwork I needed to submit to human resources, there were no drawbacks. Q:Ã Like any programs, part-time programs have their pros and cons. What would you consider to be the biggest pro? A:Ã The biggest pro was I could pick exactly which classes I wanted to take on what nights or weekends with which instructors. I had total control and could best align the schedule with my work and personal life. Q:Ã How about the most obvious con? A:Ã In addition to the time management challenges, it took significantly longer to complete my degrees. I also missed out on the full time college experience that many adults talk about for years to come. Q:Ã Was there any aspect of attending school part-time that you hadnt considered prior to enrolling? In other words, was there anything surprising about your part-time experience? A:Ã The MBA program in which I enrolled catered to full-time students more than part-time, and the homework requirements were not always realistic. I also did not expect to have full-time students in their early 20s, mixed in with the part-time students, mainly 35, in the evening program. This caused challenges, especially on group projects. Q:Ã Were there any differences between a part-time undergraduate program and a part-time graduate program? A:Ã In my experience, yes. The part-time undergraduate program I attended definitely catered more to part-time students, and the attendees were almost all working full-time and going to school at night. The graduate program I attended had many younger students and mixed full-time and part-time students in the same classes. Also, there was significantly more homework and more group projects in my graduate program. Q:Ã I get a lot of letters from students who are worried that part-time MBA programs will not provide them with the same type of recruiting and networking opportunities that full-time programs can. Did you encounter fewer opportunities in your part-time program or were you satisfied with the level of resources made available to you? A:Ã Since almost every class I attended had a different mix of students, every class presented new networking opportunities. But, in a part-time program, you need to make more of an effort before class or during breaks. After class, everyone is running to their cars to get home for the evening. I do hear that full-time students have more networking opportunities with their professors. In night school, you dont have that opportunity unless you proactively request one-on-one meeting time. There just isnt time in class. Since I graduated, Ive used Linked In to stay in touch with several students and professors I met in night school. Q:Ã When you think about your part time MBA experience, what stands out? What were some of the highlights? A:Ã There were two experiences I want to call out from my MBA program that were particularly rewarding and great learning experiences. The first was a two week trip to Japan. At my university, they offered international travel business electives. For my trip to Japan, we visited about 12 Japanese businesses and learned a lot about their culture. We were graded on several large papers we had to write. I had never been to Japan and it was quite a journey! The second experience was a one-week intensive course I took on World Class Business Operations. I got permission to take five days off from work without using vacation time. The class visited eight New England companies who had won Best Place to Work Awards. We met with senior management, got tours of their operations and learned more about their unique offerings. It was fun and I learned a lot of relevant info I could then apply to my day job. Q:Ã Overall, are you happy with your decision to earn your degrees through part-time programs? Do you ever wish you would have chosen to attend school full-time instead? A:Ã No, I have no regrets. Because I went to school part-time, I have a lot more work experience than other working women my age. In this challenging economy, with a lot of competition, I now have both the degrees and the work experience. As someone who has done a lot of interviewing and hiring of employees, I have found that the mix of experience and degrees helps to set an applicant apart from other candidates. Q:Ã Do you have any additional advice for students who are considering a part-time program? A:Ã Even taking one class en route to a degree is valuable from a personal development and a resume perspective. Employers like to see that you are striving to complete your education. Also, taking classes that relate to your full-time job will often lead to better job performance. If you dont have any college experience, think about getting a certificate first. Complete that, and then enroll in an Associates program, etc. This is a positive, rewarding path to follow, and when you complete a step, it feels great! Last, if you are getting your MBA, do some additional research to learn more about the ratio of full-time and part-time students in the night classes. I would recommend schools who have fewer full-time students in these classes.
Sunday, November 3, 2019
Key Aspects of Warfare Logistics since World War II Assignment
Key Aspects of Warfare Logistics since World War II - Assignment Example The Second World War built up the backdrop of the largest logistics operations. The war involved thousands of personnel, hundreds of ships and supplies of force in terms of millions of tons (Langford, 2007). To exercise this massive operation logistically, planners used resupply throughput and supply point operations which included rear stockpiling of supplies at depots, transporting them to the units and moving them to the forward depots. In the month of August and September 1944, the forces started transporting food, medical supplies, ammunition, fuel, barrier materials and equipment to units quickly by road, rail and air. Ammunition and petroleum occupied half of the daily supplies and were indeed a real requirement (Johnson, 2006). Ammunition was the hardest supply on the battlefield because of its different configurations and types. Eventually, the problem solved by the army by combating the supply rate and establishing the required supply rate. Combat supply rate is the amount of ammunition the system can support whereas the required supply rate is the number of ammunition a commander requires for an operation (Gudehus, 2012). September 1944, 1st and 3rd armies experienced critical fuel problems due to the shortage of transportation. They built the pipeline to transport petroleum thus solving the problem of fuel shortages. Increased consumption and lack of truck transportation were the principal cause of petroleum shortages (Gudehus, 2012). Clothing problems involved everything from production to development and design to transportation problems. Also, blankets lacked in the needs of prisoners of war, the civilian population and French forces. There was a lack of blankets in the winter of 1944 (Gudehus, 2012). Second World War was an ongoing process of experimentation and initiatives to try and fit the correct logistic system with the right situation. Whenever logistician confronted roadblocks at a strategic level, they overcame them as fast as possible. Mulberries served as expedient piers at the operational level (Langford, 2007).Ã Ã
Friday, November 1, 2019
Frederick Douglas Essay Example | Topics and Well Written Essays - 2000 words
Frederick Douglas - Essay Example Largely, he did this through public speaking engagements and his writing. The first thing he published was the autobiographical Narrative of the Life of an American Slave in 1845. After which, he served as publisher of a newspaper, The North Star, before publishing his second novel, My Bondage and My Freedom, a decade later. While those works (which will be discussed later) were about his life, he later became a political activist in his pursuit to help people less advantaged than he. Surrounding the time that "Reconstruction" and "Appeal" were written, there was a lot of political activity, including the aforementioned Abolitionist Movement, which lasted from sometime in the 1830s, until about 1870. This movement should not be confused with the abolitionist movement started by feminists who wanted to end prostitution (arguing that prostitution was also a form of slavery). Instead, the Abolitionist Movement was fundamental in founding the Anti-Slave Society, which aimed at declaring that those enslaved should immediately become free. The Abolitionist Movement saw the end of slavery, but participants didn't consider its job complete. Once black people were free, they advocated for better education for them, so that men especially would get better jobs. If they could work, they'd be better able to support their families. The movement insisted on healthcare for freed slaves. It also offered assistance in helping family member locate other family members from whom they'd been separated during slavery. When the Fifteenth Amendment guaranteed African-American male suffrage, the Movement proper was over. In 1865, Congress had established the Freedman's Bureau. It helped with the tasks of education, healthcare, and jobs, and even the reunification of families. The Freedman's Bureau was especially helpful to refugees of the American Civil War. African-American women took up causes that affected black women at the time, and later, the National Association for the Advancement of Colored People (NAACP) was formed to aid all colored persons. All of this helped make Douglass the writer he became. When he wrote "Reconstruction," the Civil War had ended and the country was in a reconstructive state. The "Reconstruction" argument was that although the war had ended, there were still changes to be made. He wrote, "All that is necessary to be done is to make the government consistent with itself, and render the rights of the States compatible with the sacred rights of human nature" (para. 3). He was insisting that the government take a stand within each state, and remain consistent in supporting the rights of all people. He asked that citizens of the United States be able to move, interchangeably, throughout the states and have the same rights in each one. He finished his essay with the opinion that he was not the only person, nor were there only black people, who wanted equality for everyone. He wrote, "This great measure is sought as earnestly by loyal white men as by loyal blacks, and is needed alike by both. Let sound pol itical prescience but take the place of an unreasoning prejudice, and this will be done" (para. 10). In "An Appeal to Congress for Impartial Suffrage," Douglass' message was just as political, just as strong. His main focus was on the right to vote for African Americans. He asked Congress how they could have
Subscribe to:
Comments (Atom)